Data Center

Network, server, and storage administrators get valuable advice and best practices to help meet the challenges they face in keeping systems connected, available, and running at high efficiency.

  • David Davis // July 23, 2008, 11:00 PM PST

    Get to know the Cisco IOS Feature Navigator

    David Davis tells you how the Cisco IOS Feature Navigator can help you find the information you need, including what features your current IOS image has, the differences between two IOS images, and whether your router can support the latest IOS.


  • David Davis // July 22, 2008, 11:00 PM PST

    SolutionBase: Does the Cisco Self-Defending Network really work?

    David Davis explains why the Cisco Self-Defending Network might be the right choice for your company.


  • Rick Vanover // July 20, 2008, 6:01 PM PST

    Active Directory User authentication with the Untangle appliance

    The ability to bring low cost solutions with high functionality is priority one for most SOHO's. Untangle offers Active Directory authentication for the remote portal at an incredible price.


  • Michael Kassner // July 21, 2008, 4:35 AM PST

    Road warriors: Take your library with you

    E-book readers allow you to take hundreds of books and documents along with you in a device that's not much bigger than your smart phone. Michael Kassner will look at the technology behind these products and give some opinions about two of the e-book readers using a road warrior's perspective.


  • Rick Vanover // July 27, 2008, 9:01 AM PST

    Can't shake WINS? Consider the GlobalNames zone in Windows Server 2008 DNS

    WINS has been around forever, and with every core upgrade of the network infrastructure it seems to make a case to stay around. Windows Server 2008's DNS engine has a feature that can aid in the removal of WINS, the GlobalNames zone.


  • Michael Kassner // July 27, 2008, 11:19 AM PST

    Deep Packet Inspection: What you need to know

    All sorts of public and private entities would love to monitor your Internet browsing habits. It's now possible using "Deep Packet Inspection." Michael Kassner will shed some light on the technology involved and possible privacy issues.


  • Justin James // July 29, 2008, 3:55 AM PST

    Spiceworks further integrates crowdsourcing

    Spiceworks recently rolled out a new initiative that continues its tradition of involving users in product development. Justin James talks to Spiceworks' Jay Hallberg to learn more about how the company is incorporating crowdsourcing into its network monitoring application.


  • David Davis // August 7, 2008, 11:00 PM PST

    Roll back changes on your Cisco router with this command

    Have you ever made changes to your Cisco router or switch and then needed to remove them? There are several ways to do this, but which is the safest and easiest method? Rebooting the router or switch isn't the answer. In fact, a simple command is a much better bet.


  • Michael Kassner // August 5, 2008, 7:44 AM PST

    Storm Worm: The energizer bunny of botnets

    In the world of botnets, Storm isn't king anymore, but the Storm botnet's owners aren't giving up. This article is a reminder by Michael Kassner of the need to remain vigilant and not fall prey to the Storm worm or its relatives.


  • Michael Kassner // August 10, 2008, 12:35 AM PST

    DNS: The Internet dodged a bullet, thankfully

    The Internet becomes a scary place if DNS can't be trusted. Michael Kassner would like to explain why, and how a group of DNS experts recently prevented that from happening.


  • Rick Vanover // August 10, 2008, 11:08 PM PST

    Open source tools becoming commercial products? This can be a good thing.

    Making an effort to be familiar with the open source tool community is important, as good software is generally the product of community development. Open source tools may be part of your core infrastructure as needs arise.


  • Michael Kassner // August 12, 2008, 7:11 AM PST

    Behavioral targeting: The government wants some answers

    It appears Behavioral Targeting and similar applications are more prevalent than anyone knew. It's important for anyone using the Internet to understand this, especially if their ISP has incorporated Behavioral Targeting.


  • Deb Shinder // August 12, 2008, 7:03 AM PST

    Ergonomics tips for IT pros

    Your IT job can compromise your comfort and even lead to injury or chronic physical problems. Deb Shinder offers this rundown of conditions to watch out for, along with some recommended ergonomic workarounds.


  • Andy Moon // August 12, 2008, 1:36 PM PST

    Doubts and potential solutions surround cloud computing

    The recent Gmail outage clearly highlights one of the major problems with cloud computing. If a service in the cloud becomes unavailable, it can affect thousands or tens of thousands of users rather than the far smaller number of users affected if a single company's servers go down.


  • Andy Moon // August 13, 2008, 10:41 AM PST

    Cybersecurity is in the news, as usual

    In a letter addressed to the next President, whoever that turns out to be, BT Security chief Bruce Schneier laid out three suggestions that he called too "detailed" to actually be adopted by either of the two campaigns, but the memo contained some fantastic direction for our next commander-in-chief.