About 33 results
-
10 troubleshooting tips for your storage and SAN environment
Remote replication and the associated hardware are powerful tools to ensure continuity of business. But care must be taken in deployment and use.
-
Brocade networking additions extend reach in the SDN space
Scott Reeves looks at some recent announcements by Brocade that are aimed at cementing their place as a network and SDN vendor.
-
IBM's Linux investment signals move into cloud and big data market
Scott Reeves looks at a recent announcement by IBM of a USD $1billion investment in Linux and Open Source on Power Systems.
-
First look: IBM's new x86 servers take aim at the cloud
Scott Reeves looks at the latest x 86 servers from IBM.
-
Storage virtualization: Pros and cons
Scott Reeves takes a look at the advantages and disadvantages of storage virtualization.
-
Take a look at the new IBM Power Linux 7R4 high-performance server
The 7R4 is the latest PowerLinux server from IBM. Scott Reeves looks at some of the key points.
-
How Linux is taking over the network
Is world domination by Linux a fanciful dream, or could it be a reality in ways we don't expect? Scott Reeves sees the signs.
-
What you need to know about EPON: Enabling technology for NGNs
Learn what EPON is and how it can benefit access networks.
-
Key features of Next Generation Networks
Next Generation Networks have been a talking point for the last few years. Scott Reeves describes some of the features and talks about some of the advantages of NGNs.
-
Network-attached storage as a SOHO server alternative
Features available on today's NAS devices make them much more versatile -- they can even be a competitive alternative to a conventional server for a SOHO network.
-
What to watch out for when adding a second router into a SOHO network
Scott Reeves runs through some guidelines for adding a second Wi-Fi router to a SOHO network.
-
Pros and cons of Fibre Channel and Ethernet storage
Scott Reeves looks at some of the differences between Fibre Channel and Ethernet Storage. Both have their place, depending on the size of the business, and whether there is existin...
-
Make sure BYOD doesn't mean Bring Your Own Disaster
Scott Reeves takes a look at the security gaps that BYOD can open up for the corporate network. Create a policy and cover these basic points.
-
Analyzing and graphing weather data with wview
Scott Reeves shows how to extract climatological data from the open source weather program, wview. This data can be further analyzed or filtered using awk or Perl, and allows for t...
-
The history and evolution of 4G
Scott Reeves looks at the two main contenders for 4G and where they differ from the current 3G systems in operation.
-
Using the flow graph feature on Wireshark
Scott Reeves demonstrates the flow graph feature of the Wireshark tool, which can help you check connections between client server, finding timeouts, re-transmitted frames, or drop...
-
Using wview to monitor the weather on your own weather station
Weather geeks will want to check out this free weather station software program called wview. Scott Reeves shows you how to get it and configure some of its features.
-
Use Wireshark to inspect packets on your network
Scott Reeves illustrates how you can use Wireshark to inspect packets, looking specifically at various points in the OSI layer, to troubleshoot network issues.
-
Use jperf and Wireshark for troubleshooting network issues
Scott Reeves explains how to use jperf to simulate a TCP or UDP connection and then use Wireshark to analyze the traffic in order to help pinpoint network issues.
-
How to use RCS to maintain DNS files
Scott Reeves shows in this step-by-step how to use Revision Control Software (RCS) to control DNS files.
-
Using version control with the LyX document preparation program
Scott Reeves introduces the LyX document prep program with a GUI front-end that makes formatting easy.
-
Using iwconfig to configure settings on wireless cards
Scott Reeves shows you a command that allows you to set and change parameters of a wireless card, including changing the bitrate.
-
Four of my most-used CLI commands
Scott Reeves lists four of the commands in Linux that he uses most often along with some examples of how he uses them. What are the commands you can't live without?
-
Two simple filters for wireshark to analyze TCP and UDP traffic
Scott Reeves shares the wireshark filters that helps you isolate TCP and UDP traffic.
-
Using jperf to check network performance
Scott Reeves explains how to use the GUI version of iperf for network monitoring and testing.
-
iperf: a simple but powerful tool for troubleshooting networks
Scott Reeves demonstrates the use of iperf, which provides basic information on throughput, packet loss, and jitter to help you troubleshoot UDP and TCP issues.
-
Use kismon to view kismet log files
Scott Reeves introduces a GUI front-end available to users of Kismet, the wireless network detecting tool.
-
Beacon frames, 802.11 devices, and Kismet
Scott Reeves follows up on his introduction to the Kismet network monitor to examine how it uses beacon frames to detect devices on a 802.11 network.
-
Try kismet for detecting hidden 802.11 wireless networks
Kismet is an open source tool similar to netstumbler, and it's particularly good for discovering hidden wireless networks that might be adversely affecting your network.
-
Use vgcfgbackup and vgcfgrestore to back up metadata on LVM
Scott Reeves shows how to use two handy commands to back up and restore volume group metadata on LVM.