Call Us Today! 1.555.555.555|info@yourdomain.com
UK:+44-203-793-8668 US/Canada:+1-512-256-8699
/Brandon Lee
Avatar for Brandon Lee

About Brandon Lee

Brandon Lee is a guest blogger for Vembu. He has been in the IT industry for over 15+ years now and has worked in various IT industries spanning education, manufacturing, hospitality, and consulting for various technology companies including Fortune 500 companies. Brandon is a prolific blogger and contributes to the community through various blog posts and technical documentation primarily at Virtualizationhowto.com
23 05, 2019

What is VMware Project Dimension and Use Cases

By | May 23rd, 2019|0 Comments

One of the exciting areas in today’s enterprise architecture and that is gaining momentum is the edge environments. Edge computing and edge networks are getting more visibility and traction in various use cases. In today’s fast-paced and demanding data-driven infrastructure, customers need extremely fast and [...]

22 05, 2019

Configure Basic Hyper-V Virtual Machine Resources – Part 2 – Memory Resources and Settings

By | May 22nd, 2019|0 Comments

In the last post, we took a look at how to configure basic Hyper-V virtual machine CPU resources and settings. Hyper-V contains a wide range of settings that affect and control how the hypervisor allocates CPU resources from the physical host over to the virtual [...]

21 05, 2019

Windows Server 2019 Failover Clustering Types and Uses

By | May 21st, 2019|0 Comments

One of the powerful features of Windows Server is the ability to create Windows Failover Clusters. With Windows Failover clustering, pools of hardware resources can be bound together in a virtual entity that allows seamlessly hosting resources in a way that is highly available and [...]

15 05, 2019

Configure Basic Hyper-V Virtual Machine Resources – Part 1 – CPU Resources and Settings

By | May 15th, 2019|0 Comments

After standing up a new Microsoft Hyper-V environment, creating and configuring virtual machines is one of the first tasks that by default, an administrator will be tasked with. Hyper-V contains a wealth of possible virtual machine configuration parameters to suit the needs of most environments. [...]

14 05, 2019

Hyper-V Virtual Switch – Part 3 – Managing Hyper-V virtual switches

By | May 14th, 2019|0 Comments

In the previous post, we examined how Hyper-V virtual switches are created using the Hyper-V Manager and Powershell. In this third and last part of the Hyper-V virtual switch overview, let’s look at managing Hyper-V virtual switches. We will also take a look at the [...]

10 05, 2019

Common Active Directory Security Issues and How you can fix them

By | May 10th, 2019|0 Comments

Microsoft's Active Directory is at the heart of many enterprise organization's authentications and access management mechanisms. Active Directory serves as the center of mechanisms that allow users and computers to authenticate as well as applications to integrate and make use of user permissions to run [...]

8 05, 2019

Whats New in Windows Server 2019 Remote Desktop Services RDS

By | May 8th, 2019|0 Comments

Windows Server 2019 brings about tremendous changes and improvements to Windows Server architecture. There are great improvements in the realm of hybrid cloud, storage spaces direct, security, HCI, and many others that help to take the enterprise data center to the next level when running [...]

7 05, 2019

Hyper-V Virtual Switch – part 2 – Creating Hyper-V Virtual Switches

By | May 7th, 2019|0 Comments

In the previous post, we looked at the overview of Hyper-V virtual switches and saw the architecture of the virtual switch in the realm of Hyper-V as well as its capabilities, features, and functionality within the Hyper-V environment. Creating and managing Hyper-V virtual switches is [...]

2 05, 2019

How to Configure Active Directory Authentication for vSphere 6.7 Update 1

By | May 2nd, 2019|0 Comments

Authentication is one of the basic requirements of securing any environment and having the ability to be able to assign permissions to various resources across the infrastructure landscape. Authentication plays a key role in basic security measures and is central to the overall security posture [...]