Categories
Storage

IT Simplified:SAN

A storage area network (SAN) is a high-speed block-based storage network that provides access to data storag . It connects servers with storage devices like disk arrays, RAID hardware, and tape libraries. In these configurations, the server’s operating system views the SAN devices as if they were directly connected. The data stored on those devices is then made available to all authorized users on the network, even if they’re in a different part of the data center or office building.

A SAN leverages a high-speed architecture that connects servers to their logical disk units (LUNs). A LUN is a range of blocks provisioned from a pool of shared storage and presented to the server as a logical disk. The server partitions and formats those blocks—typically with a file system—so that it can store data on the LUN just as it would on local disk storage.

Categories
computing

IT Simplified: IT Service Management

IT service management (ITSM) is a set of policies, processes and procedures for managing the implementation, improvement and support of customer-oriented IT services. Unlike other IT management practices that focus on hardware, network or systems, ITSM aims to consistently improve IT customer service in alignment with business goals.

ITSM encompasses multiple IT management frameworks that can apply to centralized and de-centralized systems. There are multiple frameworks that fall under the ITSM discipline, and some address unique industry-specific IT needs, including those in healthcare, government or technology. Businesses using ITSM consider IT as a service, with a focus on delivering valuable services to internal and external stakeholders, rather than a department that manages technology.

Categories
Emails security

IT Simplified: Email Authentication

Email authentication helps validate who is sending emails. Email authentication methods can help protect your domain, your brand, your reputation, as well as help improve deliverability overall. Here we understand what and how’s of email authentication and what happens after you hit the button send.

Email authentication isn’t just about security – it’s also about deliverability. By putting records in place and authenticating your emails, you can protect your brand and help your emails successfully reach the inbox. It helps in preventing email fraud, improve your email deliverability, and ensure continued delivery.

Categories
security

IT Simplified: Distributed denial of service

Hack vector created by freepik – www.freepik.com

Distributed denial- of- service attacks, or  DDoS attacks are a variant of denial-of-service attacks in which an attacker or a group of attackers employs multiple machines to simultaneously carry out a Denial of service(DoS) attack, thereby increasing its effectiveness and strength. The “army” carrying out the attacks are mostly often composed of innocent infected zombie computers such as an home router manipulated to be bots and being part of a botnet. These bots are cleverly controlled by the attacker via a Command and Control Server . It also insures the anonymity of the original attack since the distributed denial of service attack traffic originates from the bots’ IPs rather than the attacker’s. They may still be short, but may persist as powerful and sudden “punctuated” attacks that will last for several hours or several days. 

Categories
computing

IT Simplified: SSDs

M.2 vs. PCIe (NVMe) vs. SATA SSDs: What’s the Difference?

There are many types of SSDs (solid state drives) and it can be overwhelming when deciding which SSD to purchase for your next storage upgrade. The good news is, SSDs are more affordable than ever and in this blog, we’ll break down the major differences between M.2, PCIe NVMe and SATA SSDs.

Categories
computing

The CPU

The CPU, or Central Processing Unit, principal part of any digital computer system, generally composed of the main memory, control unit, and arithmetic-logic unit. It constitutes the physical heart of the entire computer system; to it is linked various peripheral equipment, including input/output devices and auxiliary storage units. In modern computers/ mobiles, the CPU is contained on an integrated circuit chip called a microprocessor.

The control unit of the central processing unit regulates and integrates the operations of the computer. It selects and retrieves instructions from the main memory in proper sequence and interprets them so as to activate the other functional elements of the system at the appropriate moment to perform their respective operations. All input data are transferred via the main memory to the arithmetic-logic unit for processing, which involves the four basic arithmetic functions (i.e., addition, subtraction, multiplication, and division) and certain logic operations such as the comparing of data and the selection of the desired problem-solving procedure or a viable alternative based on predetermined decision criteria.

Categories
security

Honeypot

In computer terminology, a honeypot is a computer security mechanism set to detect, deflect, or, in some manner, counteract attempts at unauthorized use of information systems. A honeypot can be modelled after any digital asset, including software applications, servers or the network itself. It is intentionally and purposefully designed to look like a legitimate target, resembling the model in terms of structure, components and content. In computer terminology, a honeypot is a computer security mechanism set to detect, deflect, or, in some manner, counteract attempts at unauthorized use of information systems. A honeypot can be modelled after any digital asset, including software applications, servers or the network itself. It is intentionally and purposefully designed to look like a legitimate target, resembling the model in terms of structure, components and content.