6. August 2024

Trivy Scanner for Docker Image Vulnerability…

Trivy Scanner for Docker Image Vulnerability Scanning Trivy Scanner for Docker Image Vulnerability… Learn how to use trivy scanner which is a free and open source vulnerability scanner for Docker container images, IaC code, OS packages Broadcom Social Media Advocacy

6. August 2024

Quick Steps: Viewing DFW Rule…

Quick Steps: Viewing DFW Rule Creation/Modification Time – Browser API Calls Quick Steps: Viewing DFW Rule… A short conversation on how to run API calls on Browser to check the time of DFW rule creation or modification time! CuriousTechie: Hello IT Guy, I need to check the time of creation and modification of a Distributed Firewall rule. Is there a quick way to check these […]

5. August 2024

Kubernetes Persistent Volume (PV) Encryption…

Kubernetes Persistent Volume (PV) Encryption with Native Key Provider in vSphere… Kubernetes Persistent Volume (PV) Encryption… You can now encrypt Persistent Volumes using the vSphere CSI driver and the Native Key Provider in vSphere 8.0U3. Broadcom Social Media Advocacy

5. August 2024

Announcing Dual DPU Support in VMware Cloud…

Announcing Dual DPU Support in VMware Cloud Foundation 5.2 Announcing Dual DPU Support in VMware Cloud… We are thrilled to introduce the latest enhancement in VMware Cloud Foundation 5.2 with the launch of Dual DPU Support. This feature is designed to significantly boost performance and deliver high availability for your network infrastructure. Why Dual DPU Support Matters As organizations […] Broadcom Social Media Advocacy

5. August 2024

Secure Multi-Tenant Networks with VPNs

Secure Multi-Tenant Networks with VPNs Secure Multi-Tenant Networks with VPNs VMware Cloud Foundation 5.2 introduces an enhancement for multi-tenant environments: the ability to create and manage VPNs directly within NSX Projects. This empowers project administrators with control over their network connectivity, while maintaining the security and isolation that projects […] Broadcom Social Media Advocacy

5. August 2024

Private AI Automation Services Enhancements in…

Private AI Automation Services Enhancements in Newest VMware Aria Automation Rel… Private AI Automation Services Enhancements in… In a previous blog, we discussed the March 2024 release of VMware Aria Automation 8.16.2, highlighting the integration of Private AI Automation Services with NVIDIA’s GPU Cloud (NGC). The new features include the VMware Private AI Foundation for NVIDIA (PAIF-N), which provides a secure, self-[…] Broadcom Social Media […]

5. August 2024

VMware Aria Operations Eliminates Configuration…

VMware Aria Operations Eliminates Configuration Drifts for vCenter VMware Aria Operations Eliminates Configuration… Th new VMware Aria Operations Configuration Drifts feature enables Admins to monitor and view vCenter configuration settings that have drifted from assigned templates without needing to track every change manually. Broadcom Social Media Advocacy

5. August 2024

Automated VMware Cloud Foundation (VCF) 5.2…

Automated VMware Cloud Foundation (VCF) 5.2 Import Lab Deployment Script Automated VMware Cloud Foundation (VCF) 5.2… VMware Cloud Foundation (VCF) 5.2 had just GA’ed last week and it is a packed release with a ton of new capabilities! Creating a brand new VCF environment (greenfield) is generally much easier than converting an existing vSphere-based environment (brownfield) into a compliant VCF environment, […] Broadcom Social Media […]

5. August 2024

VCF5.2 DE SDDC Deployment

VCF5.2 DE SDDC Deployment Ep 4 #germancontent VCF5.2 DE SDDC Deployment In Episode 4 ist es endlich soweit! Wir starten das Deployment unserer VMware Cloud Foundation 5.2 Umgebung. Dabei zeigen wir euch auch einige Insights und allgemeine Informationen. Schaut zu, wie wir die Schritte des Deployments durchgehen. Erhaltet Einblicke in den Deployment Prozess. […] Broadcom Social Media Advocacy

4. August 2024

Superior Snapshots using VMware vSAN Data…

Superior Snapshots using VMware vSAN Data Protection Superior Snapshots using VMware vSAN Data… Data protection strategies often include snapshots in some form or another. They can play an integral part of a comprehensive 3-2-1 data protection strategy, as well as augment formal data protection practices to make recovery operations more convenient. But snapshots tend to introduce other technical challenges and limitations that can impact their […]