7.6 Using Deduplication techniques in SAN infrastrucutre

Deduplication is also one of the Storage Capacity Optimization techniques which will identify the duplicate data and making sure that duplicate data is not stored...

Security Operations Center (SOC) Basics and Best Practices

Do you know that in the next 24 hours, there are 27.9% chances of cybersecurity attacks globally? If you think that you can overlook the...

12.1 Data Replication Techniques Introduction

It is important for any organization to protect their critical data across physical, virtual, and cloud environments to minimize the risk of business disruption....

FOLLOW US

1,224FansLike
2FollowersFollow
3FollowersFollow
29FollowersFollow

Subscribe to our newsletter

Storage Basics and Fundamentals

Storage is another fundamental core IT infrastructure component that is found in both on-prem and cloud datacenters. In this post we will learn the...

1.1 Introduction to Data and Information

The terms Data and Information are closely connected and it's common for the two terms to be used interchangeably. However, it's vital to grasp...

4.6 Fibre Channel (FC) SAN Topologies Overview

Out of the FC SAN inter-connectors such as Hub, Switch and Directors, FC Switch and FC Directors are majorly used devices in any Storage...

Virtualization Basics and Fundamentals

Virtualization is the process or a technique which can create a virtual version of IT datacenter components such as Compute, storage and network etc....

4.4 Introduction to Fibre Channel (FC) SAN Architecture and port virtualization

The FC SAN physical components such as network cables network adapters and hubs or switches can be used to design a Fibre channel Storage...

13.1 Introduction to Storage Infrastructure Management

Storage Infrastructure management  defines the management and monitoring of the storage devices in the data centers. The three major areas of management are capacity, performance, and availability. These...

LATEST Posts

Top Cybersecurity Best Practices to Protect Data and Business

Installing paid antivirus software is not enough to protect your business against cybersecurity attacks and threats. As long as your computer is connected to...

Security Operations Center (SOC) Basics and Best Practices

Do you know that in the next 24 hours, there are 27.9% chances of cybersecurity attacks globally? If you think that you can overlook the...

Cloud Infrastructure Performance Tuning -Basics and Fundamentals

Applications in cloud environment may need to be tuned for the performance over the time and to meet the continuous changes in the user...

Benefits of Adopting a DevOps Culture in 2020

  The adoption of DevOps practices rose 17% in 2018 as compared to 10% in 2017, according to Statista. It has been seen that top...

What are Chatbots and how they are used today

User experience has become the most critical aspect of the success of any business. The age of quick responses with the Chatbot is here....

POPULAR Posts