As you might know, Computer Servers are powerful computers which are accessed by multiple users. But, what exactly are the advantages of a Server over a desktop? Why should one...
There is something called as ‘Open Compute Project’ initiated by Facebook that seeks to make compute infrastructure designs open-source, so that people can custom design their computing hardware according to...
In the Internet era, one doesn’t have to physically access a phone line to tap communications and spy on others. They just need to incite someone to install a piece...
In other words, why are Wireless Access Points always proprietary to the vendor who supplied the Wireless Controller? Any customer who has built a large wireless network knows that all...
This is a guest post by Steve of Syntax. Managed services refers to the practice whereby a business transfers day-to-day management functions (usually IT functions) over to a professional managed...
TACACS+ is a AAA Protocol (Authentication Authorization and Accounting Protocol) that allows secure user access to network devices by controlling who can access the device and what they are allowed...
The Document Foundation, which is the entity behind Libre Office – the major open-source based office productivity suite, has come up with its third major release – Libre Office 3.5....
Cell phones are a wonderful invention! But sometimes, wonderful inventions can be misused/ abused by certain individuals. That’s why we have network security (for example). But what about cell phones?...
When there are a lot of servers to connect (like in a Data Center), networking needs to be flexible enough to support the compute power required for large installations. Two...
There are a number of advantages of deploying Chassis based Network Switches in the Data Center/ Core-Distribution layers in enterprises. Chassis Network Switches are fault-tolerant, expandable and offer higher performance,...
What is a Database Cluster? Databases offer back-end support to any critical application used in the enterprise (like ERP, CRM, etc) by storing, organizing and retrieving all the data used...
We are familiar with VLAN (Virtual LAN) which segments a Layer-2 Network into subnetworks and hence limits the broadcast domain. There is a new (upcoming) IETF draft standard called VxLAN...
Botnets are automated computer programs that install themselves on many unsuspecting victim machines and launch coordinated attacks against target systems. Spam bot is a type of botnet, but there are...
How would you like your data center to be ready in weeks, instead of months? How would you like your data center to be shipped to you in a single...