In high-availability environments with multiple application nodes, the reverse proxy acts as a load balancer across backend servers. In these cases, managing a sticky session (or session affinity) is essential to keep the user bound to the same node throughout their session. Why Use Sticky Sessions? Prevents session loss in environments without centralized session stores…
Read more
In this article, we walk through the successful conversion of a KVM/QEMU virtual machine from Legacy BIOS to UEFI, using Windows Server 2022 as the operating system. Requirements An existing VM with Windows Server 2022 installed in Legacy BIOS mode Access to the VM’s XML definition file OVMF firmware installed on the host (usually via…
Read more
Power Consumption Monitoring in the Data Center with SNMP and Cross-Platform Delphi Apps In our data center (CED), I developed a custom solution to monitor the power consumption of equipment, with the goal of improving energy efficiency, preventing overload, and optimizing resource usage. Why a custom system? My goal was twofold: To monitor energy consumption…
Read more
SSH Key Sharing Introduction In this article, we explore how to generate and share SSH keys securely and efficiently, comparing RSA 4096-bit and Ed25519 algorithms. Generating Strong Keys To create robust keys: # RSA 4096-bit key ssh-keygen -t rsa -b 4096 -C “you@example.com” # Ed25519 (256-bit) ssh-keygen -t ed25519 -C “you@example.com” RSA 4096: provides maximum…
Read more
A Simple Method to Safely Migrate a Firebird Database One straightforward and safe way to migrate a Firebird database is by performing a backup on the old system and restoring it on the new one. This allows the database engine to perform all necessary compatibility checks before the database is used in production. Here are…
Read more
Valutare le soluzioni di archiviazione oggi disponibili per aumentare velocità e affidabilità