Does your network run mainly on a Linux server? Just like any other network server, your Linux system needs to be checked regularly to keep it in good shape. There are a few things you may be able to do without having to call for outside help. One of the most...
Infrastructure, in the context of IT servers, is simply organized server support. It refers to how the servers are physically, logically, and/or functionally grouped together and includes the tools (mostly provided by vendors and occasionally custom-made by the system...
The idea of converged infrastructure revolves around forming a single optimized IT package by putting together several components to meet present-day business needs. According to HP, converged infrastructure meets these needs “by bringing storage, servers, networking,...
At least three serious vulnerabilities in the Network Time Protocol (NTP) have been uncovered by security researchers at Google in 2014. This is quite serious because of the sheer number of computers that may potentially be targets of DDoS (click here to read earlier...
Intrusion detection systems (also called ID systems and IDS) have been, and are still constantly being developed in response to past and present attacks on many high-profile websites and networks, including those of Sony, eBay, Yahoo Mail, Google, Apple iCloud, UPS,...
“More creative and varied”, this is how Brad Casemore describes the current nature of DDoS attacks in a recent article in the TechTarget website. Casemore, who is research director at International Data Corporation (IDC), said that the burden is on the...
A few posts back, we encountered the evolving term big data which describes gigantic mass of data that big business enterprises are eyeing to mine for whatever value can be obtained from the data. Examples of big data may be found in the unimaginable collection of...
Yes. Cisco Systems, the dominant giant in the networking equipment industry, migrated to Active Directory. But before we look into the why or how of this story, let’s have a little background on Active Directory and on Cisco. Active Directory Active Directory (AD),...
Many layers of virtualization are currently at work, and one of them is application virtualization. Application virtualization is software technology that implements the encapsulation of an application so that it can be isolated from its host OS. The resulting...
A user doing daily routine work in front of a virtualized system may not be aware of the fact that there is some “illusion” taking place right before his eyes. He may be running Linux applications one moment and Windows applications the next while using exactly the...