<?xml version="1.0" encoding="UTF-8"?>        <rss version="2.0"
             xmlns:atom="http://www.w3.org/2005/Atom"
             xmlns:dc="http://purl.org/dc/elements/1.1/"
             xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
             xmlns:admin="http://webns.net/mvcb/"
             xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#"
             xmlns:content="http://purl.org/rss/1.0/modules/content/">
        <channel>
            <title>
									Tech News - VHT Forum				            </title>
            <link>https://www.virtualizationhowto.com/community/tech-news/</link>
            <description>Virtualization Howto Discussion Board</description>
            <language>en-US</language>
            <lastBuildDate>Wed, 22 Apr 2026 08:48:30 +0000</lastBuildDate>
            <generator>wpForo</generator>
            <ttl>60</ttl>
							                    <item>
                        <title>Docker has released Hardened Images Free and This is interesting for Home Labs</title>
                        <link>https://www.virtualizationhowto.com/community/tech-news/docker-has-released-hardened-images-free-and-this-is-interesting-for-home-labs/</link>
                        <pubDate>Wed, 17 Dec 2025 15:56:23 +0000</pubDate>
                        <description><![CDATA[Docker has announced they are releasing Docker Hardened Images for free for everyone! Pretty cool development. It is worth a look even if you are not running enterprise workloads.
Short ver...]]></description>
                        <content:encoded><![CDATA[<p data-start="90" data-end="250">Docker has announced they are releasing Docker Hardened Images for free for everyone! Pretty cool development. It is worth a look even if you are not running enterprise workloads.</p>
<p data-start="252" data-end="449">Short version is this: Docker is offering official container images that are more locked down by default. Fewer packages, fewer attack surfaces, more secure defaults, and more focus on security overall out of the box.</p>
874
<p data-start="451" data-end="638">These are not custom third party images. They are maintained by Docker and meant to be drop-in replacements for the images many of us are already using. Things like base OS images and popular runtimes.</p>
<p data-start="640" data-end="674">A few things that stood out to me:</p>
<ul data-start="676" data-end="1085">
<li data-start="676" data-end="776">
<p data-start="678" data-end="776">Images are intentionally minimal. Less stuff is installed which means fewer vulnerabilities to worry about</p>
</li>
<li data-start="777" data-end="884">
<p data-start="779" data-end="884">It also focuses on supply chain security, which is a big deal. Docker is clearly trying to make it easier to trust what you are pulling</p>
</li>
<li data-start="885" data-end="1010">
<p data-start="887" data-end="1010">It is built for developers, not just security teams. You still get something usable without having to harden everything yourself</p>
</li>
<li data-start="1011" data-end="1085">
<p data-start="1013" data-end="1085">It is designed to work with Docker Scout and vulnerability scanning workflows</p>
</li>
</ul>
<p data-start="1087" data-end="1344">From a home lab perspective this is great. A lot of us run containers exposed internally or even externally (hopefully not but sometimes it is needed), and we usually just grab the <strong>latest </strong>and move on. But having more secure base images by default helps to reduce the risk.</p>
<p data-start="1346" data-end="1540">I also see this being useful for anyone publishing Compose stacks or example configs. If hardened images become common, it raises the baseline security level for everyone copying those examples.</p>
<p data-start="1542" data-end="1665">This does not magically make containers secure in every way, but it does remove a bunch of low hanging fruit that normally gets ignored in terms of security.</p>
<p data-start="1667" data-end="1693">Curious what others think. Would you switch your existing containers to hardened images? Do you care about this in a home lab, or only for production? Is this something Docker should have done a long time ago?</p>
<p data-start="1885" data-end="2005" data-is-last-node="" data-is-only-node="">Here is a link to the official post from Docker:<a class="decorated-link" href="https://www.docker.com/blog/docker-hardened-images-for-every-developer/" target="_new" rel="noopener" data-start="1934" data-end="2005" data-is-last-node=""> https://www.docker.com/blog/docker-hardened-images-for-every-developer/</a></p>]]></content:encoded>
						                            <category domain="https://www.virtualizationhowto.com/community/tech-news/">Tech News</category>                        <dc:creator>Brandon Lee</dc:creator>
                        <guid isPermaLink="true">https://www.virtualizationhowto.com/community/tech-news/docker-has-released-hardened-images-free-and-this-is-interesting-for-home-labs/</guid>
                    </item>
				                    <item>
                        <title>NAKIVO Backup &amp; Replication v11.1 New Features for Proxmox, VMware, and MSPs</title>
                        <link>https://www.virtualizationhowto.com/community/tech-news/nakivo-backup-replication-v11-1-new-features-for-proxmox-vmware-and-msps/</link>
                        <pubDate>Tue, 28 Oct 2025 19:52:19 +0000</pubDate>
                        <description><![CDATA[In case you haven&#039;t heard, NAKIVO has just released version 11.1 of their Backup &amp; Replication platform. It has a lot of noteworthy features I think that make it a more flexible solution...]]></description>
                        <content:encoded><![CDATA[<div data-pm-slice="1 1 []" data-en-clipboard="true">In case you haven't heard, NAKIVO has just released version 11.1 of their Backup &amp; Replication platform. It has a lot of noteworthy features I think that make it a more flexible solution. NAKIVO has also improved the security, and made it even more capable for multi-platform environments (running VMware, Proxmox, Hyper-V, etc). This release has new capabilities for virtualization, physical servers, and cloud workloads. It also adds several new features that home lab users and MSPs will appreciate. Let's take a look at the high points from this release. </div>
<h2>A multilingual interface for global teams<span style="font-size: 14px"> </span></h2>
<div>NAKIVO is thinking about multilingual teams with this release as they now officially support seven languages total. These include <strong>English, Spanish, French, Italian, German, Polish, and Chinese</strong>. So, especially for MSPs and multinational organizations, it means admins and partners can manage backups, reports, and alerts without issues in translation. Notifications and alerts are localized so it makes it easy to make sure real errors or other issues are not lost in translation. </div>
<h2>MSP Direct Connect simplifies remote management<span style="font-size: 14px"> </span></h2>
<p>NAKIVO is also upgrading the experience for MSPs. There is a new <strong>Direct Connect</strong> feature that has been expanded so MSPs can use it to manage environments without the need to open ports on the firewall and other network hoops to jump through on client networks. This will also help to reduce the attack surface since firewall exceptions do not need to be made. Also, all communication between the MSP director solution and client transporters are encrypted. This will help to make sure security and compliance regulations can be met for audit purposes. </p>
<p>The Direct Connect solutions supports Microsoft Hyper-V, VMware, Proxmox VE, and physical machines. All in all, this will be a good feature to give MSPs a way to manage different types of customer environments. </p>
<h2>Expanded backup capabilities for Proxmox VE<span style="font-size: 14px"> </span></h2>
<div>Proxmox VE Server is gaining massive steam in both the home lab but also the enterprise. Many organizations are exploring the use of Proxmox VE Server as a migration target for VMware environments. However, enterprise backup solutions are a must for production environments. With this release, NAKIVO is expanding the capabilities for Proxmox VE Server. Now, admins can instantly boot virtual machines from backups using flash boot. You can now also replicate virtual machines for high availability and automatically verify backup integrity with screenshots of test recoveries. Backing up and restoring VM templates is also possible with this release along with log truncation of Microsoft Exchange and SQL Server.  </div>
<div> </div>
<div>
746
</div>
<h2>Real-time replication for VMware environments</h2>
<div>If you are running a VMware environment, there is a new real-time replication feature that is automatically installed and configured. You don't need to do any manual setup steps to get this up and running. Components like the IO filter and Journal service are already preconfigured.</div>
<div>VMware users gain real-time replication that installs and configures itself automatically. There is no manual setup required for services such as the IO Filter or Journal Service. If you experience an outage, failover to real-time replicas happens automatically as part of the Site Recovery workflow in NAKIVO NBR. Also, you can carry out non-disruptive testing to make sure that failover plans work before you ever need them. For security and compliance purposes, replicas are encrypted using AES-256 for secure transfers. </div>
<div> </div>
<div>
747
</div>
<h2>Granular backup options for physical servers</h2>
<p>With the NAKIVO 11.1 release, physical server backups get an upgrade as well. You can now back up specific folders or volumes only if you choose. This can be on either Windows or Linux systems. So, no longer are you required to back up the entire server if you only need specific data. This will save a tremendous amount of time for the backup and storage space as well. </p>
<p>Backups for physical servers can be stored in a local repository, in the cloud, or on deduplication appliances, and also tape. For ransomware protection, you get backup immutability, encryption and air-grapped storage. You can perform granular restores as well. You can target just specific SMB or NFS shares if you want. Smaller restores can also be sent through email or downloaded in a browser session.</p>
<h2>Flexibility and performance</h2>
<div>One of the things that I have liked in the home lab and production environments with NAKIVO is that it installs quickly using their virtual appliance. You can also just quickly download the app on a supported NAS device and have an all-in-one backup appliance. You can target multiple backup targets that include local storage, but offsite cloud storage as well. You can send backups to S3 compatible storage like Wasabi, Azure Blob storage, and Backblaze B2. </div>
<div> </div>
<div>NAKIVO has continued to work on performance with each release. Incremental backups are now faster, it has global deduplication, and compression. The backup verification process is automated also and each job has detailed reported so you can go back and see what state things are in or why something failed.  </div>
<h2>A worthy release for upgrade</h2>
<p>The NAKIVO 11.1 release has some really good improvements underneath the hood. NAKIVO continues to evolve the functionality of the product with even more features that bring it on par with something like Veeam for lower cost. Proxmox support and features are continuing to get better with each release and that is great news for those that are looking for even more reasons to transition off VMware with the now much higher pricing under Broadcom.</p>
<div>MSPs get a lot of good new features with this release as well, including the new Direct connect feature and the VMware real-time replicas continue to take VMware disaster recovery even further under the platform.</div>
<div> </div>
<div>Here’s the official release link again if you want to dig into the details: <a href="https://www.nakivo.com/resources/releases/v11-1/" target="_blank" rel="noopener">https://www.nakivo.com/resources/releases/v11-1/</a></div>
<div> </div>
<div>Has anyone here already tested Flash Boot or the new Proxmox replication? I would be interested to hear how you feel it compares with the built-in Proxmox backup solution and vzdump recovery in various scenarios.</div>]]></content:encoded>
						                            <category domain="https://www.virtualizationhowto.com/community/tech-news/">Tech News</category>                        <dc:creator>Brandon Lee</dc:creator>
                        <guid isPermaLink="true">https://www.virtualizationhowto.com/community/tech-news/nakivo-backup-replication-v11-1-new-features-for-proxmox-vmware-and-msps/</guid>
                    </item>
				                    <item>
                        <title>UniFi Network 9.5 Released with New Features like Channel AI</title>
                        <link>https://www.virtualizationhowto.com/community/tech-news/unifi-network-9-5-released-with-new-features-like-channel-ai/</link>
                        <pubDate>Tue, 14 Oct 2025 00:15:00 +0000</pubDate>
                        <description><![CDATA[UniFi has just released version 9.5 of the Network application. And, I have to say, they have dropped in a feature that I think AI was meant to handle. The focus with this release  is on sma...]]></description>
                        <content:encoded><![CDATA[<p data-start="191" data-end="492">UniFi has just released version 9.5 of the Network application. And, I have to say, they have dropped in a feature that I think AI was meant to handle. The focus with this release  is on smarter automation and reliability. It contains several quality of life improvements which should make life easier for anyone managing larger environments or multi-site setups.</p>
<p data-start="494" data-end="986">The highlight of the release is the new <strong data-start="534" data-end="548">Channel AI</strong> feature. It takes WiFi optimization to a whole new level. Let's face it, these are the types of tasks that we don't want to do by hand. AI is so much better at doing this kind of analysis and management by analyzing interference and automatically generating an efficient channel plan across your access points. Think about this possibility. Instead of you spending hours checking for overlap and tweaking settings, you can now visualize the RF environment, see neighboring APs, and let Channel AI apply optimizations. You can do all of this with a single click. What used to take days of testing can now be handled in minutes! That's pretty cool.</p>
741
<p data-start="988" data-end="1337">UniFi has also improved multicast handling and added service-forwarding controls. You can now assign specific services to specific APs. This will save airtime and improve performance in certain use cases. When you pair this with the new mDNS gateway settings, it will help to balance performance and compatibility across certain devices. These will include things like smart TVs, IoT sensors, and office equipment.</p>
<p data-start="1339" data-end="1692">Another area that got attention in this 9.5 release is client roaming. The new version makes it faster and more stable when devices move between APs or switch frequency bands. Apple devices especially should see better reliability and fewer connection hiccups. These kinds of improvements will make noticeable differences end users.</p>
<p data-start="1694" data-end="2055">On the wired side, there’s a new feature called <strong data-start="1742" data-end="1758">Port Anomaly</strong>. It keeps an eye on your switch ports for flapping, loops, or other early signs of trouble and alerts you. It does this through the Alarm Manager. This proactive monitoring can help you identify issues before they cause downtime or performance problems. This will be a big win for maintaining your network, both in the enterprise and the home lab.</p>
<p data-start="2057" data-end="2224">I think overall, UniFi Network 9.5 feels like a very strong release. It is applying AI in a way that will allow it to do the heavy lifting with configuration that has typically been complicated and time consuming to adjust when making channel adjustments.</p>
<p data-start="2226" data-end="2416">You can read the full announcement and details on the official blog: <a class="decorated-link" href="https://blog.ui.com/article/releasing-unifi-network-9-5" target="_new" rel="noopener" data-start="2300" data-end="2414">https://blog.ui.com/article/releasing-unifi-network-9-5<span class="ms-0.5 inline-block align-middle leading-none" aria-hidden="true"></span></a></p>
<p data-start="2418" data-end="2570" data-is-last-node="" data-is-only-node="">What do you think about Channel AI and these new reliability tools? Have you already pulled the new Unifi Network 9.5 application container? Or are you planning to update soon?</p>]]></content:encoded>
						                            <category domain="https://www.virtualizationhowto.com/community/tech-news/">Tech News</category>                        <dc:creator>Brandon Lee</dc:creator>
                        <guid isPermaLink="true">https://www.virtualizationhowto.com/community/tech-news/unifi-network-9-5-released-with-new-features-like-channel-ai/</guid>
                    </item>
				                    <item>
                        <title>Ubuntu 25.10 released with new features and download</title>
                        <link>https://www.virtualizationhowto.com/community/tech-news/ubuntu-25-10-released-with-new-features-and-download/</link>
                        <pubDate>Fri, 10 Oct 2025 15:34:58 +0000</pubDate>
                        <description><![CDATA[If you haven&#039;t heard the news, Canonical has officially released Ubuntu 25.10. This is the latest version in the Ubuntu release cycle. As most of us know, Ubuntu pushes out a new version eve...]]></description>
                        <content:encoded><![CDATA[<p data-start="338" data-end="769">If you haven't heard the news, Canonical has officially released Ubuntu 25.10. This is the latest version in the Ubuntu release cycle. As most of us know, Ubuntu pushes out a new version every six months. This is usually one in April and one in October. Then every two years they deliver an LTS (Long Term Support) release. Since Ubuntu 24.04 was an LTS, 25.10 is the next interim version toward the next big one, <strong data-start="731" data-end="751">Ubuntu 26.04 LTS</strong> coming next year.</p>
740
<p data-start="771" data-end="1244">This release updates the GNOME desktop experience, and refines moving to modern tech stacks. Under the hood, Ubuntu 25.10 ships with Linux kernel 6.11. It also has improved power efficiency for laptops and ARM-based systems, and better performance on Ryzen and Intel Core Ultra chips. Canonical has also been doing work with Snap updates to improve reliability and launch times.</p>
<p data-start="1246" data-end="1776">One of the big quality-of-life updates with this release is improved <strong data-start="1312" data-end="1341">Wayland session stability</strong>. Also it has enhanced support for NVIDIA and AMD GPUs. Many users who had to stick to Xorg for a long while will find Wayland much more usable now. This is the case even for multi-monitor and hybrid graphics setups. On the server side, Ubuntu 25.10 brings updated containers tools. These include with <strong data-start="1608" data-end="1635">Podman, Docker, and LXD</strong>. All of these are getting the latest updates which will make it a great release for home labbers and those who are working with DevOps stacks.</p>
<p data-start="1778" data-end="2090">The installer continues to change and evolve too. It now has a <strong data-start="1821" data-end="1855">Flutter-based </strong>Ubuntu installer that is smoother and faster. It has better feedback during setup and Canonical seems like it is heads down on improving the user experience. These are improvements that have been a long while coming but are finally getting upgraded both in desktop and server builds.</p>
<p data-start="2092" data-end="2345">For developers, Ubuntu 25.10 has updated <strong data-start="2150" data-end="2190">Python 3.13, GCC 14, and OpenSSL 3.3 </strong>libraries. There are also newer base images for container builds. This makes it a good choice if you’re testing against the latest toolchains or building portable environments.</p>
<p data-start="2347" data-end="2569">It’s also worth mentioning the Ubuntu flavors like Kubuntu, Xubuntu, and Ubuntu Server 25.10. These will all have their own updates, from Plasma 6 improvements in Kubuntu to newer desktop tweaks in Xubuntu.</p>
<p data-start="2571" data-end="2914">If you’re on Ubuntu 24.04 LTS, there is definitely not a need to rush into upgrading. LTS versions will continue to receive updates and are still the best choice for production or long-term use in the home lab. But if you’re like me and enjoy experimenting and breaking things with the latest Linux builds, 25.10 looks to be a fun release to try out while we wait for 26.04 LTS next April.</p>
<p data-start="2916" data-end="3043">You can check out the official release info and downloads here: <a class="decorated-link" href="https://ubuntu.com/download" target="_new" rel="noopener" data-start="2985" data-end="3043">https://ubuntu.com/download</a></p>]]></content:encoded>
						                            <category domain="https://www.virtualizationhowto.com/community/tech-news/">Tech News</category>                        <dc:creator>Brandon Lee</dc:creator>
                        <guid isPermaLink="true">https://www.virtualizationhowto.com/community/tech-news/ubuntu-25-10-released-with-new-features-and-download/</guid>
                    </item>
				                    <item>
                        <title>OpenVPN Access Server 3.0 is a Big Overhaul for Admins, APIs, and the Home Lab Crowd</title>
                        <link>https://www.virtualizationhowto.com/community/tech-news/openvpn-access-server-3-0-is-a-big-overhaul-for-admins-apis-and-the-home-lab-crowd/</link>
                        <pubDate>Fri, 10 Oct 2025 15:22:50 +0000</pubDate>
                        <description><![CDATA[OpenVPN has just released Access Server 3.0, and it’s one of the biggest updates they have released to the platform in years. This release isn’t just a small patch. It’s a full uplift of how...]]></description>
                        <content:encoded><![CDATA[<p data-start="381" data-end="797">OpenVPN has just released <strong data-start="406" data-end="427">Access Server 3.0</strong>, and it’s one of the biggest updates they have released to the platform in years. This release isn’t just a small patch. It’s a full uplift of how the product looks and works. It also integrates into existing environments. I wanted to share what’s new and a few thoughts from the admin side on what this means for both enterprise environment and home lab setups.</p>
<p data-start="799" data-end="1242">The most obvious change you’ll notice is the <strong>new web admin interface</strong>. The old one always felt a bit dated and slow, but now it’s built on a modern React frontend and feels much smoother and more responsive. Navigation finally works as you would expect, and most of the CLI-only options we used to have to dig around for are now exposed directly in the UI. It’s one of those quality-of-life improvements that will save a lot of time managing the solution and cut down on mistakes.</p>
<p data-start="1244" data-end="1717">The other big news is the expanded <strong>REST API</strong>. You can now automate far more of the VPN actions without having to script against the old <strong>sacli</strong> command. For those of us who want to automate our environments, this is a huge improvement. It makes it easier to integrate OpenVPN into automation pipelines. This could be with Ansible, Terraform, or your own in-house tools. OpenVPN even built in a way to test and document the API from the interface, which is a nice touch.</p>
<p data-start="1719" data-end="2193">Security and identity management also got new improvements. The admin interface now supports SAML login and full SSO integration. This means you can tie admin access directly into providers like Azure AD or Okta. For the enterprise where centralized identity is a requirement, that’s a big improvement. Multi-factor authentication (MFA) is also easier to manage now. You can reset or enroll MFA for users directly from the UI instead of running obscure commands.</p>
<p data-start="2195" data-end="2651">Another important update is the backend’s shift toward supporting <strong data-start="2272" data-end="2284">nftables</strong> alongside iptables. It’s still listed as experimental, but this shows OpenVPN is preparing for the shift as more Linux distros move to nftables by default. There are also new optimizations under the hood that improve performance, compress assets, and make the whole system a bit leaner. They seem to be improving the backend as much as the frontend.</p>
<p data-start="2653" data-end="2985">There’s a new “support report” feature built into the UI that lets you generate logs and diagnostic data to send to OpenVPN support. When you are troubleshooting production VPN issues, not having to manually collect a dozen files from different directories can save a ton of time.</p>
<p data-start="2987" data-end="3477">Now, for the pros of the solution for IT admins.</p>
<ul>
<li data-start="2987" data-end="3477">From an admin’s perspective, this update brings Access Server in line with modern expectations. Juggling web UI and CLI for basic configuration are mostly gone. The REST API support means it plays well with automation tools and can fit into infrastructure-as-code environments. And the move toward identity-based access for admins should make security teams breathe a little easier.</li>
</ul>
<p data-start="3479" data-end="3906">For home labbers, it is easier to get up and running.</p>
<ul>
<li data-start="3479" data-end="3906">You can spin it up in a VM, Docker container, or cloud VM. And now you can manage almost everything without touching the terminal. The better UI and MFA integration make it more practical for personal or home lab setups. If you’ve avoided it before because it felt a little too “enterprisey,” 3.0 is I think the release that helps to fix that.</li>
</ul>
<p data-start="3908" data-end="4419">There are, of course, a few things to watch out for. This is a major overhaul, and like any "X.0" release, it’s bound to have some quirks. The patch to 3.0.1 already fixed a few early issues with SAML logins and API tokens, so I’d recommend testing it quite a bit in your lab environment before dropping it into production. I’d also be cautious with the nftables support until it’s out of experimental mode. The last thing you want is a firewall bug taking down your VPN.</p>
<p data-start="4421" data-end="4782">Upgrading from an older version might not be totally seamless, especially if you’ve got custom firewall rules, clustering, or specific NATs. Make sure to back up everything and have a rollback plan in place before running the upgrade (snapshot your VM, etc). Also, the new interface may not expose every advanced option yet, so you might still need the CLI for a few things still yet.</p>
<p data-start="4784" data-end="5245">In larger environments, I see the biggest win being around automation and identity. Since we are now able to tie VPN admin access into SSO and enforce MFA policies it will make compliance a lot easier. You can even start building self-service workflows where VPN accounts are provisioned and revoked automatically based on user status. For smaller environments or home labs, the benefit is really about simplicity. It will mean fewer steps, a cleaner UI, and less command-line pain.</p>
<p data-start="5247" data-end="5544">The main trade-off with any major update with more APIs exposed is that you’re increasing the surface area. More APIs mean more things to secure. If you’re running Access Server exposed to the internet, it’s worth locking down those endpoints. I would carefully watch for updates as OpenVPN hardens the new version.</p>
<p data-start="5546" data-end="5907">Overall, I think this is a great move for OpenVPN. It was starting to feel dated compared to some of the newer VPN and zero-trust solutions out there. I think this release has the promise to make it feel like a platform that can keep up at least for now. </p>
<p data-start="5909" data-end="6184">If anyone here has already upgraded to 3.0, I’d love to hear what your experience has been. Did the upgrade go smoothly, and how’s the new UI holding up under real-world use? I’m planning to test it next week in a small Docker deployment and see how it performs.</p>
<p data-start="5909" data-end="6184">Read the full release notes from OpenVPN here: <a href="https://openvpn.net/as-docs/as-3-0-release-notes.html#bug-fixes-and-improvements--241204">Access Server 3.0 Release Notes and Version Updates</a></p>]]></content:encoded>
						                            <category domain="https://www.virtualizationhowto.com/community/tech-news/">Tech News</category>                        <dc:creator>Brandon Lee</dc:creator>
                        <guid isPermaLink="true">https://www.virtualizationhowto.com/community/tech-news/openvpn-access-server-3-0-is-a-big-overhaul-for-admins-apis-and-the-home-lab-crowd/</guid>
                    </item>
				                    <item>
                        <title>UniFi Just Released Their Own UPS and Here’s What to Know</title>
                        <link>https://www.virtualizationhowto.com/community/tech-news/unifi-just-released-their-own-ups-and-heres-what-to-know/</link>
                        <pubDate>Wed, 08 Oct 2025 02:17:15 +0000</pubDate>
                        <description><![CDATA[Ubiquiti is definitely known for taking somewhat boring devices and making them very cool in their own right. Think about how they have made their access points, power distribution units, sw...]]></description>
                        <content:encoded><![CDATA[<p data-start="245" data-end="520">Ubiquiti is definitely known for taking somewhat boring devices and making them very cool in their own right. Think about how they have made their access points, power distribution units, switches, and other gear extremely cool with lots of capabilities at the same time. Now, it looks like they have officially entered the power protection game with a new line of their own UniFi-branded UPS units. </p>
<p data-start="522" data-end="1026">This seems to be really just a natural progression of devices that they already have. Think about the devices in their lineup like their networking products, cameras, access control, and even EV chargers. Now they’re adding uninterruptible power to the mix. Most of us have been using third-party UPSs for years. I think the biggest draw here is that these new UPS units integrate directly into the UniFi Network application. This means you’ll be able to see power status, battery health, and runtime information. And this will be shown right along with your switches and access points.</p>
<a href="https://youtu.be/Y4L61NbDibM?si=Nu_hNY1s64SjTLn7" target="_blank" rel="noopener">https://youtu.be/Y4L61NbDibM?si=Nu_hNY1s64SjTLn7</a>
<p data-start="1028" data-end="1550">There are two models launching out of the gate. The first is a rack-mounted <strong data-start="1104" data-end="1114">UPS-2U</strong>, rated for 1.44 kVA. It has eight outlets, surge protection, and a field-replaceable 216 Wh battery. The second is a smaller <strong data-start="1240" data-end="1259">UniFi UPS Tower</strong>. This is more of a desktop or compact unit meant for a single switch, access point, UniFi Dream Machine or your workstation. Both models will show up in the UniFi dashboard automatically and can pair with UniFi storage devices like the UNVR for coordinated shutdowns during power outages.</p>
<p data-start="1552" data-end="2091">Ubiquiti also mentioned that these units will include built-in <strong data-start="1615" data-end="1642">Network UPS Tools (NUT)</strong> server support. That means you can use them to send status data to other systems and not just UniFi gear. I think this is a nice touch for those running home labs, Linux servers, or NAS boxes outside of the UniFi ecosystem and who want to integrate with open-source tools they may already be running. According to the blog, this is just the beginning of a full lineup of UPS products. Higher-end models with pure sine wave output and lithium-ion batteries are in the worksa. These will be aimed at larger setups and enterprise environments.</p>
<p data-start="2093" data-end="2575">The integration angle is what’s really interesting here. Most UPS units are standalone appliances with basic USB or SNMP monitoring. Having something that’s plug-and-play within the UniFi controller could be a big win for small business and home lab users who want visibility for their power protection. This will be possible without the complexity of managing separate power software, etc. You’ll be able to see which devices are running on backup, track remaining runtime, and monitor events like brownouts or surges in real time.</p>
<p data-start="2577" data-end="3035">Of course, a few questions still remain in my mind. Runtime will depend heavily on the load and that 216 Wh battery doesn’t sound huge, so we’ll need to see a real-world test of the unit. It’s also not clear to me whether the output is pure sine or stepped approximation. This definitely makes a difference for sensitive equipment and much of our sensitive gear these days. </p>
<p data-start="2577" data-end="3035">Pricing for the units:</p>
<ul>
<li data-start="2577" data-end="3035"><strong>UPS-2U: $279</strong></li>
<li data-start="2577" data-end="3035"><strong>Unifi UPS Tower: $159</strong></li>
</ul>
739
<p data-start="3037" data-end="3444">Still, it’s exciting to see Ubiquiti finally enter this space. Power protection is a natural fit for them. I think having a UPS that just “shows up” in UniFi Network could simplify things for ones running their gear in a rack or home lab setup. If they follow through with their roadmap for higher-capacity and lithium models, this could theoretically end up being one of their most useful new product lines.</p>
<p data-start="3037" data-end="3444">You can read their official announcement that is now live on their blog here: <a class="decorated-link" href="https://blog.ui.com/article/introducing-uninterruptible-power" target="_blank" rel="noopener" data-start="394" data-end="520">https://blog.ui.com/article/introducing-uninterruptible-power</a></p>
<p data-start="3446" data-end="3583">What do you all think? Is this something you’d add to your rack, or do you still prefer sticking with known UPS brands for now?</p>]]></content:encoded>
						                            <category domain="https://www.virtualizationhowto.com/community/tech-news/">Tech News</category>                        <dc:creator>Brandon Lee</dc:creator>
                        <guid isPermaLink="true">https://www.virtualizationhowto.com/community/tech-news/unifi-just-released-their-own-ups-and-heres-what-to-know/</guid>
                    </item>
				                    <item>
                        <title>Qualcomm’s New Snapdragon X2 Elite Chips Could Be a Game Changer for Windows and Home Labs</title>
                        <link>https://www.virtualizationhowto.com/community/tech-news/qualcomms-new-snapdragon-x2-elite-chips-could-be-a-game-changer-for-windows-and-home-labs/</link>
                        <pubDate>Thu, 02 Oct 2025 13:34:55 +0000</pubDate>
                        <description><![CDATA[So Qualcomm just dropped details on their new Snapdragon X2 Elite and X2 Elite Extreme chips and I think this is going to shake things up a bit. There are some pretty impressive specs that a...]]></description>
                        <content:encoded><![CDATA[<p data-start="85" data-end="735">So Qualcomm just dropped details on their new Snapdragon X2 Elite and X2 Elite Extreme chips and I think this is going to shake things up a bit. There are some pretty impressive specs that are rolled into these new processors. They are built on a <strong>3nm process and scale up to 18 cores</strong>. The Extreme variant has:</p>
<ul>
<li data-start="85" data-end="735">12 “prime” cores hitting 5 GHz boost</li>
<li data-start="85" data-end="735">6 performance cores at 3.6 GHz</li>
</ul>
They’re combining the specs above with Adreno X2-90 graphics, 80 TOPS NPU for Copilot+ and AI workloads, and support for up to 128 GB of LPDDR5x with massive bandwidth. Connectivity is pretty stacked too. It has WiFi 7, Bluetooth 5.4, and a Snapdragon X75 5G modem. You also get USB4 and PCIe Gen5 which is pretty wild for an ARM laptop chip.<br />
<p data-start="737" data-end="1207">What Qualcomm is really hyping is performance per watt. They’re claiming up to 75% faster CPU perf at the same power vs competitors and over 2x perf/watt gains for the GPU compared to the last X Elite. In AI tests they’re saying it’s like <strong>5.7x faster than Intel’s Core Ultra 9 285H</strong>. Whether that holds up in the real world we’ll see, but on paper this is looking like ARM is getting seriously competitive in high-end Windows laptops.</p>
737
<p data-start="1209" data-end="1672">For the home lab side of things, this has me wondering if we’re going to see these chips filter down into mini PCs and maybe even server-style boards? They’ve already submitted Linux patches, so it’s not just Windows. If you could run Proxmox or even container-heavy workloads on something like this with crazy efficiency, it could be huge and really a paradigm shift in hardware configurations. Imagine an 18-core ARM box sipping power but handling AI inference, VMs, and containers with USB4 and PCIe Gen5 expansion.</p>
<p data-start="1674" data-end="2050">It feels like we’re seeing the same kind of momentum Apple brought with M1/M2/M3, but now in the Windows/ARM world. If Qualcomm and Microsoft can keep software compatibility as a priority, this could finally push ARM as a real alternative. I am thinking it could be a game changer for both enterprise laptops and maybe even small lab servers. I’m pretty excited to see how the ecosystem reacts when first devices land in 2026.</p>
<p data-start="1674" data-end="2050"><a href="https://www.qualcomm.com/products/mobile/snapdragon/laptops-and-tablets/snapdragon-x2-elite">Snapdragon X2 Elite | Qualcomm</a></p>
<p data-start="2052" data-end="2160" data-is-last-node="" data-is-only-node="">Anyone else looking at these and thinking ARM is finally about to have its moment?</p>]]></content:encoded>
						                            <category domain="https://www.virtualizationhowto.com/community/tech-news/">Tech News</category>                        <dc:creator>Brandon Lee</dc:creator>
                        <guid isPermaLink="true">https://www.virtualizationhowto.com/community/tech-news/qualcomms-new-snapdragon-x2-elite-chips-could-be-a-game-changer-for-windows-and-home-labs/</guid>
                    </item>
				                    <item>
                        <title>Docker Hardened Images with Helm Charts Beta Launches for Secure Kubernetes Deployments</title>
                        <link>https://www.virtualizationhowto.com/community/tech-news/docker-hardened-images-with-helm-charts-beta-launches-for-secure-kubernetes-deployments/</link>
                        <pubDate>Tue, 30 Sep 2025 14:58:26 +0000</pubDate>
                        <description><![CDATA[Docker just announced that their Hardened Images catalog now includes Helm charts, and it is currently in beta. This feels like a pretty big deal for both enterprise teams and home lab users...]]></description>
                        <content:encoded><![CDATA[<p data-start="98" data-end="308">Docker just announced that their Hardened Images catalog now includes Helm charts, and it is currently in beta. This feels like a pretty big deal for both enterprise teams and home lab users alike who are running Kubernetes. If security is top of mind (and it should be), this could be a game changer.</p>
<p data-start="310" data-end="829">Helm is already the go-to tool for deploying apps into Kubernetes. But one of the biggest concerns has always been the security of the packages. With this update, Docker is providing charts that automatically reference their Hardened Images. That means you get secure, SLSA Level 3 builds, and quick CVE patching that is built right in. For enterprise environments that need to comply with regulatory requirements, this will help close some big gaps. For home labbers, it just means less worry about pulling sketchy charts or images from random repos on the Internet.</p>
<p data-start="831" data-end="1243">The timing is also pretty interesting to me given Broadcom’s changes to Bitnami. A lot of the free Bitnami charts and images are now locked behind commercial subscriptions (Like everything Broadcom is doing). This has left many folks scrambling for alternative sources. Docker is positioning this as a drop-in option. You can still use free Docker Official Images. But if you want the extra security and enterprise-grade compliance, the hardened images with Helm charts are there.</p>
<p data-start="1245" data-end="1525">The beta is invite-only for now, but Docker says they want feedback from teams to help shape which charts get priority. If you are experimenting with Kubernetes in your lab, or if you are in the enterprise looking at migration paths post-Bitnami, this is worth checking out.</p>
<p data-start="1527" data-end="1621">Full announcement here: <a class="decorated-link" href="https://www.docker.com/blog/docker-hardened-images-helm-charts-beta/" target="_new" rel="noopener" data-start="1551" data-end="1619">https://www.docker.com/blog/docker-hardened-images-helm-charts-beta/</a></p>]]></content:encoded>
						                            <category domain="https://www.virtualizationhowto.com/community/tech-news/">Tech News</category>                        <dc:creator>Brandon Lee</dc:creator>
                        <guid isPermaLink="true">https://www.virtualizationhowto.com/community/tech-news/docker-hardened-images-with-helm-charts-beta-launches-for-secure-kubernetes-deployments/</guid>
                    </item>
				                    <item>
                        <title>Xen Orchestra 5.111 Brings New Security Features and Home Lab Benefits</title>
                        <link>https://www.virtualizationhowto.com/community/tech-news/xen-orchestra-5-111-brings-new-security-features-and-home-lab-benefits/</link>
                        <pubDate>Tue, 30 Sep 2025 14:46:15 +0000</pubDate>
                        <description><![CDATA[There is a big update from the Xen Orchestra team that just dropped. Version 5.111 has been released. This one’s got a mix of polish and some pretty serious enterprise featires that also ben...]]></description>
                        <content:encoded><![CDATA[<p data-start="80" data-end="269">There is a big update from the Xen Orchestra team that just dropped. Version 5.111 has been released. This one’s got a mix of polish and some pretty serious enterprise featires that also benefits home lab users.</p>
<p data-start="271" data-end="311">A few highlights that stood out to me:</p>
<ul data-start="312" data-end="1028">
<li data-start="312" data-end="546">
<p data-start="314" data-end="546">There’s a brand-new security advisory system (VSA) so you have one place to track vulnerabilities across the whole Vates stack. That is a big deal if you are running this in production or even just want to stay patched in the lab and I think this is pretty much a requirement these days for being serious about the enterprise</p>
</li>
<li data-start="547" data-end="663">
<p data-start="549" data-end="663">XCP-ng 8.2 finally hit end of life, so if you are still on that you will want to move to 8.3 as soon as you can</p>
</li>
<li data-start="664" data-end="879">
<p data-start="666" data-end="879">EasyVirt’s DC Scope and NetScope are now baked right into XO, which means you can deploy them straight from your appliance. That means you can do resource optimization and cost tracking without leaving the XO UI</p>
</li>
<li data-start="880" data-end="1028">
<p data-start="882" data-end="1028">UI refinements and smoother backups are good quality of life improvements with this one</p>
</li>
<li data-start="880" data-end="1028">
<p data-start="882" data-end="1028">The REST API keeps getting more love, which is good news for automation</p>
</li>
</ul>
<p data-start="1030" data-end="1297">On the enterprise side, Vates has also announced a partnership with Eviden. This partnership will mean they validate their big Bull Sequana SH server hardware with XCP-ng. This looks to have serious horsepower with up to <strong>8 socket servers and up to 960 vCPUs</strong>. It shows they are going after the VMware exodus hard and heavy.</p>
736
<p data-start="1299" data-end="1666">For home labbers, the neat part is that all these features land in the same product you can spin up at home. Better backups, better APIs, and easier integration with monitoring or optimization tools. This means a smoother lab environment. Also home labs benefit as well knowing when CVEs now drop, allowing you to be more proactive with patching.</p>
<p data-start="1668" data-end="1858">Overall, 5.111 looks like another step forward both for the enterprise crowd, especially those dropping VMware. This gives Vates a much more serious solution for scale and compliance in the enterprise. And, for home lab folks who just want things to run reliably with modern features and use what they may be using in production.</p>
<p data-start="1860" data-end="1932">Full details here: <a class="decorated-link" href="https://xen-orchestra.com/blog/xen-orchestra-5-111/" target="_new" rel="noopener" data-start="1879" data-end="1930">https://xen-orchestra.com/blog/xen-orchestra-5-111/</a></p>]]></content:encoded>
						                            <category domain="https://www.virtualizationhowto.com/community/tech-news/">Tech News</category>                        <dc:creator>Brandon Lee</dc:creator>
                        <guid isPermaLink="true">https://www.virtualizationhowto.com/community/tech-news/xen-orchestra-5-111-brings-new-security-features-and-home-lab-benefits/</guid>
                    </item>
				                    <item>
                        <title>Netdata 2.7.0 released with new features including AI, annotations, OpenTelemetry plugin</title>
                        <link>https://www.virtualizationhowto.com/community/tech-news/netdata-2-7-0-released-with-new-features-including-ai-annotations-opentelemetry-plugin/</link>
                        <pubDate>Fri, 26 Sep 2025 17:53:06 +0000</pubDate>
                        <description><![CDATA[Just saw that Netdata dropped version 2.7.0 and wanted to share some of the highlights for anyone else running it in their lab.
The big headline is Netdata AI. They’re calling it your “co-S...]]></description>
                        <content:encoded><![CDATA[<p data-start="112" data-end="241">Just saw that Netdata dropped version 2.7.0 and wanted to share some of the highlights for anyone else running it in their lab.</p>
<p data-start="200" data-end="645">The big headline is <strong data-start="220" data-end="234">Netdata AI</strong>. They’re calling it your “co-SRE” for troubleshooting. You can ask it plain English questions about your infra like “why are my pods crashing in us-east-1” and it will spit out a report with timelines and possible causes. You also get automated investigations and alert root cause analysis. You also have the ability to schedule reports like weekly health checks. Everyone gets a handful (10) of free AI sessions to play with.</p>
735
<p data-start="647" data-end="914">Another nice addition is chart annotations. You can now drop notes right on the charts to mark deployments, incidents, or whatever else you want to have tracked. Makes it way easier when you’re collaborating or just trying to remember what happened at a certain spike.</p>
<p data-start="916" data-end="1080">They also added a quick data export option. Any chart or table can be exported out to CSV, PNG, or PDF. Perfect if you want to share stuff outside of Netdata.</p>
<p data-start="1082" data-end="1238">For folks running more complex setups, there’s now an <strong data-start="1136" data-end="1160">OpenTelemetry plugin</strong> (alpha) that ingests metrics via OTLP gRPC and maps them to Netdata charts.</p>
<p data-start="1240" data-end="1275">Couple of solid improvements too:</p>
<ul data-start="1276" data-end="1501">
<li data-start="1276" data-end="1365">
<p data-start="1278" data-end="1365">SNMP profiles are now stable and default with 15k entries for better device coverage</p>
</li>
<li data-start="1366" data-end="1434">
<p data-start="1368" data-end="1434">Nodes show up as node name/IP by default which is super handy</p>
</li>
<li data-start="1435" data-end="1501">
<p data-start="1437" data-end="1501">A bunch of stability fixes to squash crashes and memory issues</p>
</li>
</ul>
<p data-start="1503" data-end="1648">I already pulled the update in my lab and going to play around with the new AI features. Curious if anyone else here has kicked the tires on 2.7.0 yet? Let me know.</p>]]></content:encoded>
						                            <category domain="https://www.virtualizationhowto.com/community/tech-news/">Tech News</category>                        <dc:creator>Brandon Lee</dc:creator>
                        <guid isPermaLink="true">https://www.virtualizationhowto.com/community/tech-news/netdata-2-7-0-released-with-new-features-including-ai-annotations-opentelemetry-plugin/</guid>
                    </item>
							        </channel>
        </rss>
		