Tips
Tips
-
BackTrack: The gotta-have, free, network security tool you've never heard of
Get the power of Linux-based security tools on Windows with this free suite of open source security tools. Contributor and vulnerability assessment expert Kevin Beaver introduces BackTrack and explains its network security testing features. Continue Reading
-
iSCSI network configuration, design and optimization
It's a must to consider more than just cabling when designing an iSCSI-based storage network. Learn to look at the bigger picture when configuring or optimizing an iSCSI-based storage network. Continue Reading
-
Secure network against illegal users
Lisa Phifer gives advice on how to handle illegal users on a network. Continue Reading
-
Testing iSCSI SAN performance with Iometer
Iometer, a performance test tool for tuning Windows environments, can also be used to tune performance in iSCSI SANs. The tool lets you simulate the SAN's performance by setting many of the parameters and running tests. Repeated runs with different ... Continue Reading
-
NAS: How does a client access files?
NAS expert Randy Kerns offers advice to a reader who asked: "How does NAS appear to machines accessing files from it?" Continue Reading
-
Remote backup: What are the alternatives to tape?
Archiving expert Bill Tolson offers advice to a reader looking for alternatives to shipping tape offsite, including a graphical representation of the remote replication backup process. Continue Reading
-
NAS: Can you add capacity non-disruptively?
Storage expert Randy Kerns offers advice about adding capacity to a NAS system non-disruptively in this Q&A. Continue Reading
-
How to create and enforce employee termination procedures
In this Ask the Expert Q&A, Shon Harris, our security management expert, reviews how the the security group, HR and management should work together to define and enforce employee termination policies, and reviews what should be done during each ... Continue Reading
-
ISCSI SANs: How to alleviate the congestion
Careful configuration of an iSCSI SAN will usually preclude most problems. But for slow network performance, adapter and switch settings can help speed things up. Continue Reading
-
British Winter Time UTC/GMT/BST Confusions!
This is one for those of you who live in the UK, but could be relevant to anyone. Remember that at various times in the year we are one hour shy of UTC because we operate on BST (British Summer Time) not UTC/GMT. Continue Reading
-
Zoning 101: Why zone?
Zoning can offer a number of benefits for your SAN. This tip details the advantages of zoning and offers an explanation of the different methods. Continue Reading
-
Archiving unstructured data
Companies must find ways to automate and simplify the process of archiving files and e-mail messages. ECM software addresses this large pool of unstructured data. Continue Reading
-
CDP: Super snapshots -- eventually
This tip details two different definitions of CDP, the offerings from vendors in each camp and how continuous data protection differs from snapshots. Continue Reading
-
How to use NAS gateways
What you will learn from this tip: NAS gateways are moving off the array and into the network. Here's how to manage them. Continue Reading
-
How to create a business continuity plan
In today's business environment, the only acceptable data loss is none at all. Find out how to create a business continuity plan that really works. Continue Reading
-
Five ways to secure iSCSI
Storage expert Stephen Foskett outlines five specific ways to secure an iSCSI SAN. Continue Reading
-
Pros and cons of disk-to-disk backup
Some of the characteristics of disk-to-disk can make it a poor choice for your only form of backup. Continue Reading
-
Microsoft supports iSCSI SAN clusters -- kind of
This expert tip outlines how to get the support you need for iSCSI SANs using more than two clusters. Continue Reading
-
A beginners guide to iSCSI
After five years of working with Fibre Channel storage area networks (SANs), I have personally been quite confused about iSCSI, about exactly what it really does and more importantly how it works and how we can actually use it to solve real customer... Continue Reading
-
Zoning, part 2: Hard zoning vs. soft zoning
Zoning is a fundamental management technique that basically controls who can see what in a storage area network (SAN). The following is part 2 of a three-part series on zoning. Continue Reading
-
Zoning, part 1: An overview of zoning
Zoning is a fundamental management technique that basically controls who can see what in a storage area network (SAN). The following is part 1 of a three-part series on zoning. Continue Reading
-
Zoning, part 3: Zoning schemas
Zoning is a fundamental management technique that basically controls who can see what in a storage area network (SAN). The following is part 3 of a three-part series on zoning. Continue Reading
-
Capacity planning in the enterprise
Capacity planning is becoming an increasingly important way to balance future hardware costs with computing needs. Continue Reading