Holodeck Lab: Multi-Tenancy routing with VRF’s…

Holodeck Lab: Multi-Tenancy routing with VRF’s...The Holodeck Lab is up and running and some of the components have been replaced by pfSense. This has been described in a couple of blogs. Now it’s time to start working on the use cases I wanted to explore with this lab. The first one is doing Multi Tenancy … Continue reading Holodeck Lab: Multi-Tenancy routing with VRF’s…

Broadcom Reintroduces ESXi (Evaluation) Version…

Broadcom Reintroduces ESXi (Evaluation) Version...In an exciting development for the VMware community, Broadcom has reintroduced ESXi as a free offering, available for download directly from the Broadcom Support Portal. This move is a game-changer for many IT professionals, organizations, and individuals who rely on ESXi to power their virtual [..] Broadcom Social Media Advocacy

Want to Speak at VMware Explore 2025? Today is…

Got a story worth sharing? The #VMwareExplore Call for Proposals is open for 1 more week! Share your story, lead the conversation, and take the stage in Las Vegas. Submit your session by April 25:Want to Speak at VMware Explore 2025? Today is...Submit your proposal to speak at VMware Explore 2025. Submissions are open March … Continue reading Want to Speak at VMware Explore 2025? Today is…

CMTY Podcast #721 – What I Wish My Mom Had Told…

Join us on the next VMware CMTY Podcast as we dive into "What I Wish My Mom Had Told Me About VCF" with Konstantinos Kaminaris, Systems/Solution Architect at IPTO SA. Explore how VMware Cloud Foundation (VCF) enhances cloud infrastructure with scalability, security, and efficiency. Discover the Holodeck Toolkit and its role in simplifying VCF deployments. … Continue reading CMTY Podcast #721 – What I Wish My Mom Had Told…

Ransomware: The New Threat Vector

Ransomware remains a top security concern for executives because of its difficulty to defend against and its potential to cause widespread organizational impact. Traditionally, ransomware is delivered through phishing emails containing malicious attachments or links. Once executed, the ransomware begins encrypting or locking critical files and systems. However, attackers have increasingly shifted to exploiting Internet-facing … Continue reading Ransomware: The New Threat Vector