Security Holes – Part 2

In Part-1 of this post we spoke about security holes and 2 sources of vulnerabilities: Buffer Overflow and SQL Injection. We will cover next 3 sources in…

Getting along with SDN

The latest topic in enterprise networking is software-defined networks (SDNs), which increase the intelligence of the core network making it more receptive to overall IT and business…

VHDX: The New Wave in Virtual Hard Disk Formats

  A bit about VHDs Virtual hard disk or VHD is a way to provide storage medium for virtual machines, which is represented as a disk image…

Is it the end of an era for FC SAN?

  The recent changes in the storage industry may be signaling the end of the SAN era. Why? The problem that SAN was designed to solve, still…