Ask the Experts
Ask the Experts
- 
			Star schema vs snowflake schema: Which is better?Yahoo’s data and business intelligence architect, Rohit Chatter, answers the latest debate, Star versus Snowflake schema, by breaking down the differences, one aspect at a time Continue Reading 
- 
			Securing big data: Architecture tips for building security inExpert Matt Pascucci advises a reader on securing big data with tips for building security into enterprise big data architectures. Continue Reading 
- 
			Techniques for preventing a brute force login attackA brute force login attack can enable an attacker to log in to an application and steal data. Rob Shapland explains how to prevent brute force attacks. Continue Reading 
- 
			File upload security best practices: Block a malicious file uploadDo your Web app users upload files to your servers? Find out the dangers of malicious file uploads and learn six steps to stop file-upload attacks. Continue Reading 
- 
			Session fixation protection: How to stop session fixation attacksSession fixation attacks rely on poorly managed Web application cookies. Rob Shapland answers a reader’s question on session fixation protection. Continue Reading 
- 
			The reasons for missing hard drive space on storage arraysIf you installed disk and didn’t get the capacity you expected, the missing hard drive space can be a result of operating system calculations, formatting, RAID and use of hot spares. Continue Reading 
- 
			Adding an old hard drive to RAID sets on serversWhen adding an old hard drive to RAID sets on servers, it’s important to account for factors such as the number of drive bays in the host. See how to configure the drives to the appropriate RAID format for the workload. Continue Reading 
- 
			test CW eoc answersummary text for test CW eoc answer. Continue Reading 
- 
			Fibre Channel over IP: What it is and what it’s used forFibre Channel over IP bundles Fibre Channel frames into IP packets and can be a cost-sensitive solution to link remote fabrics where no dark fibre exists between sites. Continue Reading 
- 
			Key steps for a successful SAN migrationFor a successful SAN migration, it’s key to understand your current environment and the future state of the SAN, as well as to carry out a testing phase against each platform and migration strategy. Continue Reading 
- 
			Choosing a RAID level depends on capacity needs and data criticalityIn this Ask the Expert, Steve Pinder talks about which RAID level to choose, depending on the criticality of your data or the capacity required. Continue Reading 
- 
			Planning a NAS migration projectNAS migration requires careful planning around the needs of your organization. In this Ask the Expert, find out which approach to use for an effective migration. Continue Reading 
- 
			RAID 5 explained: Sharing a 10 MB file among 5 drivesFind out how RAID 5 handles sharing data shares data in a 10 MB file among five drives, including how striping and parity data figure into the equation. Continue Reading 
- 
			Synchronous vs asynchronous replication: Order of events during data writesLearn about the order of events during data writes in synchronous vs asynchronous replication. Continue Reading 
- 
			How to set up a Dell EqualLogic configuration in a VMware environmentFind out what the key steps are for setting up a Dell EqualLogic configuration for an iSCSI SAN in a VMware virtual server environment. Continue Reading 
- 
			SAN troubleshooting: What are the key steps and best practices when troubleshooting a SAN?Learn which tools you need to perform SAN troubleshooting, which metrics point to a sign of trouble, and why granular and regular data collection is important. Continue Reading 
- 
			How does the RAID 5 calculation work?Learn how to determine how much capacity you'll have in a RAID 5 drive configuration. Continue Reading 
- 
			What does the parity bit do in RAID?Find out how the use of a parity bit protects RAID groups and how it's used as a method for error detection. Continue Reading 
- 
			Dynamic code analysis vs. static analysis source code testingManaging vulnerabilities involves a wide array of security testing, including both dynamic and static source code analysis. Learn how the two differ, as well as how they are performed in this expert response. Continue Reading 
- 
			RAID 5 recovery: What is the maximum number of physical drives in a RAID 5 configuration?Adding drives to a RAID 5 set increases your ROI and the likelihood of simultaneous drive failures, and lengthens RAID rebuild times. So what should be your physical drive limit? Continue Reading 
- 
			Do all drives in a RAID 10 array need to be the same specification?We tell you the one requirement when matching drive specs in a RAID 10 array. But will mixing drives of various performance levels compromise your RAID level? Continue Reading 
- 
			RAID 10 vs RAID 50: What is the best way to configure a storage array with 16 1 TB drives?Learn the characteristics of RAID 10 and RAID 50, as well as which RAID level is appropriate for your applications. I/O and protection needs contribute to your RAID choice. Continue Reading 
- 
			Fibre Channel SAN zoning: Pros and cons of WWN zoning and port zoningLearn the difference between World Wide Name zoning (WWN zoning) and port zoning, as well as the pros and cons of each on a Fibre Channel storage-area network (Fibre Channel SAN). Continue Reading 
- 
			RAID 10 vs. RAID 1: Mirrored drives matterWhile RAID 10 and RAID 1 are both mirroring technologies that utilise half the available drives for data, a crucial difference is the number of drives they can use in a RAID group. Continue Reading 
- 
			RAID 10: How many disk drives should you use?The minimum number of drives required for RAID 10 is four. RAID 10 should not be confused with RAID 0+1, which involves creating two RAID 0 stripe sets and then mirroring them. Continue Reading 
- 
			What is a LUN and why do we need storage LUNs?
- 
			RAID 5 configuration: How to calculate disk space for data storage and parity storageFind out how to calculate the disk space available for data storage and how much disk space is utilised for parity storage in a RAID 5 configuration. Continue Reading 
- 
			NAS Backup: What are my options?
- 
			What are the dangers of using Facebook, other social networking sites?Ken Munro discusses the dangers associated with allowing employees to access social networking sites such as Facebook, and explains how corporations can avoid these risks by monitoring the information placed in employee profiles and using email ... Continue Reading 
- 
			Disk-based backup vs. tapeGet advice on choosing disk versus tape for small businesses. Continue Reading 

 
		