by Paul Comfort | Sep 14, 2018 | Uncategorized
By Paul Comfort. CISSP, Lead Engineer, Chi Corporation A little background before diving in. A SAN is a Storage Area Network. In x86 server environments, before there were SANs, servers themselves contained or controlled the storage that they used in an isolated...
by Christine Thome | Aug 17, 2018 | Security
Originally published on the Mimecast Blog, August 15, 2018, by Bob Adams, Product Marketing Manager – Security Your organization has been – and will be – attacked. The sophistication of these attacks has changed over time and will continue to evolve....
by Christine Thome | Aug 17, 2018 | Storage
Originally published on the Pivot3 Blog | August 7, 2018 One of the biggest challenges placing stress on IT infrastructure today is the sheer amount of data being created, and it’s only going to increase. By 2025, IDC predicts that global data will reach 163...
by Christine Thome | Aug 17, 2018 | Networking, Uncategorized
Where a Second Lost on the Network has Insurmountable Consequences Originally published on Network World | JUNE 22, 2018 | by Norman Rice, Chief Marketing, Development, and Product Operations Officer of Extreme Networks The network edge is the new...
by Paul Comfort | Aug 17, 2018 | Cloud, Security, Storage
Many businesses are moving towards the cloud for enterprise applications. Where to store important data, however, may be problematic for some. Paul Comfort, Chi Corporation’s lead engineer, answers commonly asked questions to help you determine whether or not...
by admin | Jul 26, 2018 | Infrastructure, Storage
Original article appeared in the March 6, 2018 Pivot 3 Blog. Posted by Edgar Perez – VP of WW Solution Architects and Professional Services It’s clear that many companies have benefited from deploying Hyperconverged Infrastructure (HCI) solutions. Compared to...
by Paul Comfort | Jul 16, 2018 | Infrastructure, mobile threats, Security
Twenty years ago, if you mentioned spam and phishing in the same sentence, one would assume you were enjoying some time on the lake and a sandwich made from canned meat. In today’s IT world, those words have much more menacing meanings (although the canned meat...
by Christine Thome | Jul 3, 2018 | Infrastructure, Storage
Historically, achieving high throughput and lower latency meant overprovisioning hardware or using software to mitigate, but not fully eliminate performance issues. These workarounds have high CAPEX and OPEX costs and still don’t meet the requirements for...
by Christine Thome | Jul 3, 2018 | mobile threats, Security
Chances are you’d be more inclined to open and act on an email from a colleague, friend or someone you know as opposed to someone you don’t. Cybercriminals know this, which is why they are sending attacks to your friends and colleagues—from your email account....
by Christine Thome | Jun 27, 2018 | Networking
There’s no question that Cisco is the big dog when it comes to network solutions. But like a regal and older Great Dane, Cisco tends to be content with the large dish of customers in front of them, deciding to conserve their energy instead of spending it on...