Welcome 192TB to the Ootbi Family | Learn more here >>

Posts by Geoff Burke

Geoff BurkeGeoff Burke
Geoff Burke

More than 20 years of experience in IT and 12 years working in the field of Data Protection. VMCE and VMCA certified as well as Kubernetes CKA and CKAD. Very active in IT Communities as a Veeam Vanguard, Veeam Legend, Tanzu Vanguard and Calico Big Cat Ambassador. Geoff’s enthusiasm for technology is contagious and his energy and passion for the subject inspires others to expand their knowledge and interests.


Disaster Recovery Testing with Veeam and Ootbi by Object First

Disaster recovery is about more than just having backups—it's about ensuring you can restore your data when it matters most. But are you confident your system will perform when disaster strikes? In this blog, we'll guide you through the critical steps of testing your Veeam backups with Ootbi so you can sleep easy knowing your recovery process is rock-solid. 

| 6 min to read

Out of the box Interview Rick Vanover. Part 2

Geoffrey Burke: We are back with the one and only Rickatron! If you missed the first part of our series, go back and find out how he got that nickname. Let’s get back to talking about IT communities.

| 8 min to read

Out of the Box Interview with Rick Vanover. Part 1

Geoffrey Burke: Hi Rick, it is great to have you here with me today. I will jump right into the first question, who is Rickatron? 
Where did you come from before this position at Veeam? 

| 5 min to read

Meet the Aces Luis Freixas

Luis: I’m Luis Freixas, based in Spain. I was an IT Infrastructure and Backup specialist, and I am now a Global Infrastructure Business Analyst—a translator between the business and IT. I am an Infrastructure advisor, community lover, Dad, Husband, Friend…  

| 4 min to read

Integrated Appliances VS. Target Repositories

It’s the age-old dilemma of ease of use versus security. This tug-of-war will probably continue forever, but the stakes have recently grown even higher regarding your Data Protection environment. 
Ransomware and breaches have become daily news. Where IT viruses and malware were once considered nuisances, they now continuously pose critical risks to businesses.  

| 8 min to read

Unlocking the Secrets of the Veeam Hardened Repository Part 2

In my previous blog, I discussed the Veeam Hardened Repository, why we need it, its uses, and its limitations. Today, I want to discuss this subject in more detail while providing links to build instructions with commentary. There are numerous ways to build a Veeam Hardened Repository, and one must choose carefully which method to use, as any errors or miscalculations will be very difficult to solve further down the road. 

| 7 min to read

Veeam Backup & Replication 12.1.2: Everything You Need to Know

Veeam has just released Veeam Backup & Replication 12.1.2, which brings a host of new features, security updates, and performance enhancements. Explore the significant changes and improvements to stay updated, enhance data security, and optimize your backup processes. 

| 7 min to read

VeeamON 2024 Being There in the Moment

VeeamON 2024 is behind us, and as always, it is time to reflect on the event and review some of the highlights.

Attending IT conferences is always special, but after experiencing the lockdowns of the COVID-19 pandemic, they have taken on even more meaning and significance. Often, one learns through deprivation, which was certainly the case regarding IT gatherings during the lockdowns.

| 5 min to read

Aces Community Blog April

Welcome back to the Object First Aces Blog for April. It’s an exciting time for us, as we are now one month into the Object First Aces program! If you missed our previous announcement and blog about the Object First Aces, be sure to give it a read.

| 5 min to read

Unlocking the Secrets of Veeam Hardened Linux Repository Part 1

Veeam Hardened Repository (VHR) is an option for secure, immutable backup storage and is a popular choice among Veeam enterprise customers. However, IT security and Linux expertise are required to deploy and manage VHR properly over time, and as such, it is not a suitable option for environments lacking in-house IT security skills. This blog post series is intended to provide an overview of the pros and cons as well as technical and operational considerations while choosing VHR for your environment.