Category Archives: Network Security

Myths Related To Endpoint Security Solutions

The technology’s sorry state related to the security is something repeatedly witnessed and commonly accepted. As the virtual machines have become a furniture-like part of both small and large businesses, safeguarding the data with these machines has start turning out to be a growing concern for most of the business owners. There are certain factors […]

Read More...

How to configure FC Card (Host Bus Adapter (HBA)) in Server 2008 & 12 (Hyper V)

Software Requirement : –  Server 2008 with Administrator Privilege, FC Card Drivers Hardware Requirement : –  FC Card, FC Cable & SFP Module Process:- 1.    Turn off your server and open the Cabinet Install the FC card in your server PCI Express Card Slot. 2.    Connect your Storage cables to your FC Card with Help […]

Read More...

Installation and Configuration of SNMP on CentOS

This guide describe how to install and do a basic configuration of SNMP on a CentOS. Probably it will work on many other *nix systems. 1. Installation Run command yum install net-snmp-utils [root@dull etc]# yum install net-snmp-utils Loading “fastestmirror” plugin Loading “dellsysidplugin” plugin … … Dependencies Resolved ============================================================================= Package                 Arch       Version          Repository        Size ============================================================================= Installing: […]

Read More...

what is the Necessity of Ricoh Cloud DR solution?

As we aware that in current competitive world down time to any crucial infra in an organization leads to the loss of large revenue. For overcoming this time loss as well as revenue loss Disaster recovery is the best way to make your server’s and related application’s to be highly available all over the globe […]

Read More...

How RPASS Backup Works?

RPASS takes an initial full backup image which includes user data and all configuration data. The image is stored locally on an Appliance. After the initial backup, incremental snapshots are taken; all data is securely replicated to cloud storage.   Backup images can be: • Restored to original, replacement or temporary hardware • Instantly mounted […]

Read More...