Aidan Finn writes about Microsoft virtualization for the Petri IT Knowledgebase. He is a Microsoft Valuable Professional with the Virtual Machine (Hyper-V) expertise. Aidan has been working in IT infrastructure since 1996, and is the Technical Sales Lead for MicroWarehouse Ltd., a Microsoft value added distributor in Ireland. He runs the aidanfinn.com blog and has written or co-written books such as Windows Server 2012 Hyper-V Installation And Configuration Guide, Microsoft Private Cloud Computing, and Mastering Hyper-V Deployment.
Aidan Finn's Recent Posts
Aidan Finn discusses Microsoft’s recent preview of disks that are up to 4TB in size in Azure and explains the benefits of using.
Aidan Finn explains Compute Resiliency.
Aidan Finn explains how to use a preview feature of the Azure Backup MARS agent to backup and restore system state for Windows Server machines.
Aidan Finn explains how a new preview feature, Azure Site Recovery for Azure Virtual Machines, can provide disaster recovery services for virtual machines that are running in Azure.
Learn about several infrastructure-related feature enhancements for Azure Storage that Microsoft announced at the recent Build conference.
Aidan Finn goes over several announcements Microsoft made regarding Azure virtual machines at the recent Build conference.
Aidan Finn walks you through deploying Azure virtual machines with smaller OS disks.
Aidan Finn shows you how to deploy VHD Sets on Windows Server 2016 Hyper-V.
Aidan Finn explains what Shared Virtual Hard Disk Sets are and why to use them to create shared virtual storage on Windows Server 2016 Hyper-V.
Aidan Finn explains how storage resiliency decreases downtime to virtual machines that are running on Windows Server 2016 Hyper-V.
Microsoft finally launched an updated interface for managing Azure Active Directory in the Azure Portal, which makes it available for administrators of all Microsoft enterprise cloud services.
Aidan Finn shows you how to use virtual machine groups on Windows Server 2016 Hyper-V to manage a set of virtual machines, including adding support for operational actions on VHDX Sets.
Take a look at the steps which, when taken together, should minimize your risks of being successfully attacked by ransomware such as WannaCrypt, CryptoLocker, and a plethora of other variants that are ravaging businesses of all sizes around the world.