management

Comprehensive Cybersecurity Risk Assessment for Small and Medium-Sized Businesses

Comprehensive Cybersecurity Risk Assessment for Small and Medium-Sized Businesses

In today\’s digital landscape, small and medium-sized businesses (SMBs) face increasing cybersecurity risks that can have detrimental effects on their operations, finances, and reputation. To effectively protect their sensitive data and systems from cyber threats, SMBs must conduct comprehensive cybersecurity risk assessments.

Comprehensive Cybersecurity Risk Assessment for Small and Medium-Sized Businesses Read More »

The technical pathways of Brocade in cloud storage adoption

Brocade isn\’t always very forthcoming about what they are working on. Obviously a fair chunk of development and engineering efforts are spent on cloud integration  and enablement of their software and hardware stack into this computing methodology. Acquisitions like Foundry, Vyatta and now Connectem show that the horizon has broadened the views of Brocade. To

The technical pathways of Brocade in cloud storage adoption Read More »

Storage in 2013 and beyond.

It\’s comes to no surprise that a couple of technologies really struck in 2012. Flash disk drives, and specifically in flash arrays, have gone mainstream. One more technology still clinging on is converged networking and of course Big Data. Big Data has become such a hype-word that many people have different opinions and descriptions for it. What is basically boils down

Storage in 2013 and beyond. Read More »

Brocade Fabric Watch – The most underutilised feature

Many customer cases I handle are related to poor connectivity. A connectivity problem can be caused by unclean connectors, broken cables or SFP\’s. (See one of my earlier blog posts). Although the switches are capable or identifying physical issues and subsequently notifying administrators, it\’s  hardly ever being followed up. Very often an acute issue is

Brocade Fabric Watch – The most underutilised feature Read More »

Scroll to Top