SAN security was (and sometimes still is) lagging behind performance, speed, and port counts aspects. But in a contemporary Data Center with SAN being its part, security is quite important. more
When setting up the Distributed Data Center, the architect has to decide which method will be used for site selection to distribute client traffic between the sites.
Apart from strictly network orient... more
Remember the early Data Centers using proprietary protocols and platforms? Since then Data Centers have evolved to a decentralized architecture. But the "retro" is in and the Data Centers are evolving... more
Ever feel confused by all the protocols or emerging technologies around, and the plethora of devices available at your disposal? How do you decide which technology to bet on for the long run? more
Are you building a Backup Data Center (BDC) and having headaches due to the related expenses? Or perhaps you already have a BDC and you simply want to reduce its operational costs? more
The general term network security is widely used to identify actions designed to monitor or prevent unauthorized access, misuse, modification or denial-of-service of an organization’s computer network... more
You might remember Cisco Prime Access Registrar (PAR) by its former names, Cisco Access Registrar (CAR) and CNS Access Registrar. The newest Access Registrar release brings the new name, as the produc... more