Data Center

Network, server, and storage administrators get valuable advice and best practices to help meet the challenges they face in keeping systems connected, available, and running at high efficiency.

  • Michael Kassner // May 30, 2008, 2:23 AM PST

    Wi-Fi power management: Road warriors beware

    Road warriors strive to save battery power in any way possible, but is the effort worth it when it comes to Wi-Fi power-saving methods? Or are they actually hurting overall performance?

    0

  • Rick Vanover // June 1, 2008, 2:40 PM PST

    Co-Administration is the new virtualization endpoint

    In some virtualization environments, the roles of network administrator and server administrator can become confused. Who administers the virtual switch when the network and server administration are handled by different groups? Rick Vanover explains the co-administration approach and how it can resolve this dilemma.

    0

  • David Davis // June 5, 2008, 1:02 AM PST

    What you need to know about Cisco IOS access-list filtering

    Cisco IOS ACLs are difficult to use. You can unwittingly create havoc on your network if you don't know some of the basic rules. David Davis focuses on the role of ACLs in packet filtering and tells you what you must know in order to make them work for you.

    0

  • Paul Mah // June 5, 2008, 10:17 PM PST

    Comcast switch to throttling bandwidth hogs

    In the wake of an investigation by the FCC (Federal Communications Commission) that attempts by Comcast to throttle P2P applications violated network neutrality principles, Comcast have announced that it will be shifting towards a more agnostic approach.

    0

  • Rick Vanover // June 8, 2008, 6:01 PM PST

    MAC address scorecard for common virtual machine platforms

    When you need to track down a virtual machine on the network, knowing what platform a MAC address relates to may help you identify its location. Here is a rundown of common MAC address organizationally unique identifiers (OUI) and their associated platforms to help identification of virtual machines on the network.

    0

  • Michael Kassner // June 7, 2008, 4:27 AM PST

    Bluetooth headsets: Only two that are worthwhile

    I'm happy to report that my list of acceptable Bluetooth headsets has now grown to two. Motorola's H12 and Aliph's new Jawbone are light years ahead of the competition. Only problem is, which one should I use?

    0

  • Andy Moon // June 9, 2008, 1:24 PM PST

    Is encryption part of your strategy yet?

    Encryption, or the lack thereof, is in the news recently, as a laptop belonging to Stanford University was recently stolen. The problem is that the laptop contained personal information for some 72,000 current and former employees. The data on the laptop was not encrypted and this incident is only the latest involving unencrypted laptops, including one containing information about managers for AT&T.

    0

  • Andy Moon // June 10, 2008, 1:31 PM PST

    Is Google's plan realistic or do they have their heads in the cloud?

    Andy Moon considers the "cloud computing" movement. How long will it take most users to overcome concerns about security and privacy to embrace the idea of trusting their data to third parties like Google and Amazon?

    0

  • David Davis // June 12, 2008, 2:59 AM PST

    Troubleshoot Cisco routers and switches using the debug commands

    David Davis shows you how to get to the bottom of router and switch issues with Cisco's debug commands. Debug can give you a lot of detailed troubleshooting information, but watch out for the debug mistakes that can seriously affect your network.

    0

  • Andy Moon // June 11, 2008, 3:00 PM PST

    E-mail security shouldn't be this tough

    Andy Moon advances an idea for e-mail security that would allow consumers to choose a trusted verification authority and would require registration and compliance from senders. Could this work to beat spam and e-mail borne threats?

    0

  • David Davis // June 12, 2008, 11:33 PM PST

    10 commands you should master when working with the Cisco IOS

    Becoming proficient with the Cisco IOS means learning some essential commands. This quick reference describes 10 commands you'll need to rely on when handling various configuration and troubleshooting tasks.

    0

  • Paul Mah // June 13, 2008, 4:34 AM PST

    Enterprise, meet the iPhone

    As expected, Apple unveiled a 3G version of the iPhone at the Worldwide Developers Conference earlier this week. No real surprise here - its hardware specifications simply served more as a confirmation of details already leaked the Web over. The real gem is really in the software, however. In this regard, Apple is making a solid attempt to push the iPhone squarely at the enterprise. It appears that Apple has carefully studied the market, and positioned itself to emulate and improve upon the best traits of its competitors.

    0

  • Michael Kassner // June 15, 2008, 2:19 AM PST

    RF interference: Just how important are antennas

    Being able to co-locate multiple RF systems within millimeters of each other in modern wireless devices is in large part due to reducing RF interference. Many of these "interference-busting" innovations are the result of engineers making improvements to antenna systems.

    0

  • Rick Vanover // June 15, 2008, 6:01 PM PST

    ClarkConnect: Open source gateway options for the remote office

    Rick Vanover introduces the ClarkConnect gateway, based on Red Hat Linux and the 2.6 kernel. The goal of Toronto-based ClarkConnect is to provide an easy-to-use product that revolves around services targeted to broadband technology market.

    0

  • Andy Moon // June 16, 2008, 7:48 PM PST

    IBM may make DB2 open source, and Microsoft wants an open source census

    IBM may move DB2, its flagship database server, to an open source model. Meanwhile, Microsoft is co-sponsoring an open source "census."

    0