Data Center

Network, server, and storage administrators get valuable advice and best practices to help meet the challenges they face in keeping systems connected, available, and running at high efficiency.

  • Rick Vanover // August 7, 2011, 11:17 PM PST

    Use Angry IP Scanner to find hosts by open ports

    Finding systems on a network can be a challenge, especially if critical services like DNS are not available. In this post, IT pro Rick Vanover shows how the Angry IP Scanner can help you find systems on a network.


  • Rick Vanover // July 31, 2011, 11:15 PM PST

    Network and storage protocol options: Choose wisely

    There are a plethora of network and storage protocols available today, each with their own benefits. IT pro Rick Vanover explains that these are important decisions today and also in the future.


  • Paul Mah // June 30, 2008, 4:59 PM PST

    Better than lithium-ion?

    The last few years have seen a dramatic increase in the proliferation of portable consumer gadgets: iPods, PSP, mobile phones and laptops are all power-hungry devices. A common lament is that battery technology has failed to keep up. Silver-zinc battery technology however, might just change that.


  • Rick Vanover // June 29, 2008, 6:01 PM PST

    Allow Windows Vista, Server 2008 systems to interact with older Samba installations

    Windows Vista and Server 2008 have a default version requirement of MS-LAN Manager communication that prohibits communication to older Linux-based Samba installations. This can be fixed via group policy or the local security policy.


  • Michael Kassner // June 29, 2008, 9:59 AM PST

    Skype: Telepresence for the masses

    Video conferencing accounted for 28 percent of all Skype calls last year. Michael Kassner discusses why Skype should be considered a telepresence platform and how the multimedia technology of Skype has improved.


  • David Davis // June 26, 2008, 2:26 AM PST

    How to properly secure your Cisco router with passwords

    Some of the worst security breaches occur because people neglect basic security measures. David Davis discusses the importance of maintaining proper passwords on your router, explains the three modes for the Cisco IOS, and shows you how to configure the five main passwords that protect your network.


  • Andy Moon // June 16, 2008, 7:48 PM PST

    IBM may make DB2 open source, and Microsoft wants an open source census

    IBM may move DB2, its flagship database server, to an open source model. Meanwhile, Microsoft is co-sponsoring an open source "census."


  • Andy Moon // June 17, 2008, 1:54 PM PST

    Browser wars redux

    Will the release of Firefox 3 breathe new life into the browser wars? The new release, in beta for seven months, promises faster rendering and better resource management.


  • David Davis // June 19, 2008, 11:44 PM PST

    Cisco Administration 101: Understand the OSI model to become a better Cisco troubleshooter

    David Davis explains how the seven layers of the OSI Model can help you as a Cisco administrator. Get a brief overview of the OSI model and learn why it is more than just a textbook concept -- understanding it will help you every day of your career.


  • Paul Mah // June 22, 2008, 2:59 PM PST

    Network and wireless technologies at CommunicAsia

    CommunicAsia2008 was held in Singapore last week. I managed to squeeze out a couple of days to brave the vast exhibition halls at the Singapore Expo. I am finishing up the fully gallery at the moment, but I shall highlight a few of exhibits -- of the networked and wireless varieties, that caught my attention.


  • Michael Kassner // June 23, 2008, 5:35 AM PST

    Cisco TelePresence: Not your average virtual meeting

    Using a telepresence meeting room is like taking a step into the future. The technology creates near-lifelike virtual conferences, allowing people at opposite ends of the earth to communicate as if they were in the same room.


  • Michael Kassner // July 31, 2008, 7:42 AM PST

    Behavioral targeting: What you need to know

    Behavioral targeting is advertising's attempt at supplying you with specialized ads developed from your Internet history. The intent of this article by Michael Kassner is to shed light on how behavioral targeting works and how it could affect you.


  • Justin James // July 29, 2008, 3:55 AM PST

    Spiceworks further integrates crowdsourcing

    Spiceworks recently rolled out a new initiative that continues its tradition of involving users in product development. Justin James talks to Spiceworks' Jay Hallberg to learn more about how the company is incorporating crowdsourcing into its network monitoring application.


  • Lori Hyde // May 28, 2009, 3:03 AM PST

    Cisco ASA's new Botnet Traffic Detector: Too good to be true?

    Lori Hyde discusses the new Botnet Traffic Detector feature in the latest version of the Cisco ASA firewall. She explains how it's supposed to work but wonders how it will fare in the real world.


  • Rick Vanover // May 24, 2009, 2:02 AM PST

    Learn from early adopters of successful cloud solutions

    As organizations mull how and if the cloud will fit into their technology landscape, good resources are forming to ease these decisions. IT pro Rick Vanover gives some starting points for this emerging area.