Checkout

Cart () Loading...

    • Quantity:
    • Delivery:
    • Dates:
    • Location:

    $

Resource Library

Filter By
Show Filters
Result Filters:

678 Results Found

Results per page: 10 40 80

10 Weak Points of Administrative Security

Article | Dec. 18, 2020

Organizations rely on administrators to do a lot. If you’re admin reading this, you know this far too well.

How to Use MPLS Ping and Traceroute

Article | Dec. 17, 2020

With Multiprotocol Label Switching (MPLS) as popular as it is in the provider space and private MPLS clouds for larger enterprise, we needed some tools to help troubleshoot and maintain these networks. With the providers in mind, the normal ping or traceroute may not be enough.

What’s the Difference Between Hubs, Switches & Bridges?

Article | Dec. 17, 2020

The key difference between hubs, switches and bridges is that hubs operate at Layer 1 of the OSI model, while bridges and switches work with MAC addresses at Layer 2 of the OSI model.

What Separates a Good Cloud Architect from a Great One?

Article | Dec. 16, 2020

Let's start with defining the job of a cloud architect. You are responsible for planning, designing, migrating, and implementing cloud-based infrastructures, but the effectiveness of these specialists is not guaranteed.

4 Mistakes Cloud Architects Can’t Afford to Make in Their Jobs

Article | Dec. 15, 2020

These mistakes can be resume-updating events if you are not careful. Take the time to learn the skills of a cloud architect and both your career and your employer will benefit.

Can One VLAN Reach Another Without a Router or OSI Layer 3 Device?

Article | Dec. 15, 2020

Early one morning, an engineer end user discovered that the Engineer servers were unreachable, and he didn’t know if he could reach the Internet. The administrator investigated the user’s PC with the IPCONFIG /ALL command and verified that the PC was a DHCP client, but it had received an address from the Accounting DHCP server, not the Engineering DHCP server.

Does a MAC Address Mean Apple Invented It?

Article | Dec. 15, 2020

While Apple has created many fine things, they were yet to be created themselves when Xerox PARC scientists created Media Access Control addresses. These MAC addresses are 48 bits or 6 bytes long, so they are also known as MAC-48 or EUI-48. EUI stands for Extended Unique Identifier. It is written in hexadecimal characters as shown below:

FLOGI, PLOGI, and PRLI

Article | Dec. 15, 2020

When you connect your server or storage, it will send a Fabric login (FLOGI) request. This FLOGI request serves two purposes: Fibre Channel ID is the WWPN connection to this port from the FLOGI server Exchange buffer credits with the switch To better understand the first function, it is exactly the same if I rewrite it as, “request an IP address for a MAC address from the DHCP server”.

10 Ways to Test Your Network’s Defenses

Article | Dec. 04, 2020

Hackers are looking for your company’s network. Unless you are offline and have no internet connectivity, the company network is discoverable.

10 Steps to Improve Your Job Position as a Cybersecurity or IT Professional

Article | Nov. 30, 2020

Finding the right job may not always be that easy. For IT and cybersecurity professionals who are searching for a new job, or would just like to hang onto their current one, there are steps you can take to improve your job position. Whether you’re looking to get better at your job or advance up the ranks of your organization, these tips are aimed at you!