|

Dell

  • Results for "Dell"
  1. Emulex OCm14104-UX-D Quad Port 10Gbe rNDC CNA​

    Emulex OCm14104-UX-D Quad Port 10Gbe rNDC CNA​

  2. Aligning Partitions on AF/512e Hard Drives for Server Operating Systems

    Aligning Partitions on AF/512e Hard Drives for Server Operating Systems

  3. Emulex OCe14102-UX-D Dual Port PCIe adapter CNA

    Emulex OCe14102-UX-D Dual Port PCIe adapter CNA

  4. Emulex OCm14102-U3-D Dual Port 10GBe bMezz CNA

    Emulex OCm14102-U3-D Dual Port 10GBe bMezz CNA

  5. Emulex OCm14102-U2-D Dual Port bNDC CNA

    Emulex OCm14102-U2-D Dual Port bNDC CNA

  6. Dell EqualLogic TCO Analysis

    Organizations of all sizes are struggling to meet the conflicting challenges associated with macro-level global financial uncertainty and micro-level information storage growth and complexity.

  7. Configuring a Dell EqualLogic SAN Infrastructure with Virtual Link Trunking (VLT)

    Virtual Link Trunking (VLT) is a Layer 2 networking protocol technology that enables Dell Networking (or Force 10) switches to aggregate multiple physical links across separate physical switches or chassis, yet appear as a single logical link. Unlike a traditional static Link Aggregation Group (LAG), a VLT link can connect across multiple physical switches, therefore providing higher bandwidth, load balancing and redundancy for those links. EqualLogic iSCSI SANs can directly benefit from using VLT because of its ability to use all of the available bandwidth while still maintaining the redundancy required to provide a resilient storage area network.

  8. Best Practices for Securing a Dell EqualLogic SAN

    Data security is a primary concern in almost any IT environment. Business critical or confidential information must be protected from unauthorized access and properly disposed of when required. Many organizations are compelled to implement data protection technologies due to regulatory compliance. This paper explains deploying a secure EqualLogic SAN to prevent unauthorized access to the PS Series administrative interfaces and to protect data at rest using self-encrypting drives and data in flight using IPsec network layer security.