Ask the Experts
Ask the Experts
-
Star schema vs snowflake schema: Which is better?
Yahoo’s data and business intelligence architect, Rohit Chatter, answers the latest debate, Star versus Snowflake schema, by breaking down the differences, one aspect at a time Continue Reading
-
Securing big data: Architecture tips for building security in
Expert Matt Pascucci advises a reader on securing big data with tips for building security into enterprise big data architectures. Continue Reading
-
Techniques for preventing a brute force login attack
A brute force login attack can enable an attacker to log in to an application and steal data. Rob Shapland explains how to prevent brute force attacks. Continue Reading
-
File upload security best practices: Block a malicious file upload
Do your Web app users upload files to your servers? Find out the dangers of malicious file uploads and learn six steps to stop file-upload attacks. Continue Reading
-
Session fixation protection: How to stop session fixation attacks
Session fixation attacks rely on poorly managed Web application cookies. Rob Shapland answers a reader’s question on session fixation protection. Continue Reading
-
The reasons for missing hard drive space on storage arrays
If you installed disk and didn’t get the capacity you expected, the missing hard drive space can be a result of operating system calculations, formatting, RAID and use of hot spares. Continue Reading
-
Adding an old hard drive to RAID sets on servers
When adding an old hard drive to RAID sets on servers, it’s important to account for factors such as the number of drive bays in the host. See how to configure the drives to the appropriate RAID format for the workload. Continue Reading
-
test CW eoc answer
summary text for test CW eoc answer. Continue Reading
-
Fibre Channel over IP: What it is and what it’s used for
Fibre Channel over IP bundles Fibre Channel frames into IP packets and can be a cost-sensitive solution to link remote fabrics where no dark fibre exists between sites. Continue Reading
-
Key steps for a successful SAN migration
For a successful SAN migration, it’s key to understand your current environment and the future state of the SAN, as well as to carry out a testing phase against each platform and migration strategy. Continue Reading
-
Choosing a RAID level depends on capacity needs and data criticality
In this Ask the Expert, Steve Pinder talks about which RAID level to choose, depending on the criticality of your data or the capacity required. Continue Reading
-
Planning a NAS migration project
NAS migration requires careful planning around the needs of your organization. In this Ask the Expert, find out which approach to use for an effective migration. Continue Reading
-
RAID 5 explained: Sharing a 10 MB file among 5 drives
Find out how RAID 5 handles sharing data shares data in a 10 MB file among five drives, including how striping and parity data figure into the equation. Continue Reading
-
Synchronous vs asynchronous replication: Order of events during data writes
Learn about the order of events during data writes in synchronous vs asynchronous replication. Continue Reading
-
How to set up a Dell EqualLogic configuration in a VMware environment
Find out what the key steps are for setting up a Dell EqualLogic configuration for an iSCSI SAN in a VMware virtual server environment. Continue Reading
-
SAN troubleshooting: What are the key steps and best practices when troubleshooting a SAN?
Learn which tools you need to perform SAN troubleshooting, which metrics point to a sign of trouble, and why granular and regular data collection is important. Continue Reading
-
How does the RAID 5 calculation work?
Learn how to determine how much capacity you'll have in a RAID 5 drive configuration. Continue Reading
-
What does the parity bit do in RAID?
Find out how the use of a parity bit protects RAID groups and how it's used as a method for error detection. Continue Reading
-
Dynamic code analysis vs. static analysis source code testing
Managing vulnerabilities involves a wide array of security testing, including both dynamic and static source code analysis. Learn how the two differ, as well as how they are performed in this expert response. Continue Reading
-
RAID 5 recovery: What is the maximum number of physical drives in a RAID 5 configuration?
Adding drives to a RAID 5 set increases your ROI and the likelihood of simultaneous drive failures, and lengthens RAID rebuild times. So what should be your physical drive limit? Continue Reading
-
Do all drives in a RAID 10 array need to be the same specification?
We tell you the one requirement when matching drive specs in a RAID 10 array. But will mixing drives of various performance levels compromise your RAID level? Continue Reading
-
RAID 10 vs RAID 50: What is the best way to configure a storage array with 16 1 TB drives?
Learn the characteristics of RAID 10 and RAID 50, as well as which RAID level is appropriate for your applications. I/O and protection needs contribute to your RAID choice. Continue Reading
-
Fibre Channel SAN zoning: Pros and cons of WWN zoning and port zoning
Learn the difference between World Wide Name zoning (WWN zoning) and port zoning, as well as the pros and cons of each on a Fibre Channel storage-area network (Fibre Channel SAN). Continue Reading
-
RAID 10 vs. RAID 1: Mirrored drives matter
While RAID 10 and RAID 1 are both mirroring technologies that utilise half the available drives for data, a crucial difference is the number of drives they can use in a RAID group. Continue Reading
-
RAID 10: How many disk drives should you use?
The minimum number of drives required for RAID 10 is four. RAID 10 should not be confused with RAID 0+1, which involves creating two RAID 0 stripe sets and then mirroring them. Continue Reading
-
What is a LUN and why do we need storage LUNs?
-
RAID 5 configuration: How to calculate disk space for data storage and parity storage
Find out how to calculate the disk space available for data storage and how much disk space is utilised for parity storage in a RAID 5 configuration. Continue Reading
-
NAS Backup: What are my options?
-
What are the dangers of using Facebook, other social networking sites?
Ken Munro discusses the dangers associated with allowing employees to access social networking sites such as Facebook, and explains how corporations can avoid these risks by monitoring the information placed in employee profiles and using email ... Continue Reading
-
Disk-based backup vs. tape
Get advice on choosing disk versus tape for small businesses. Continue Reading