Monday, January 29, 2018

"Week 8 Blog Posting"



In this week reading in chapter 8 on Security, it had a lot of good information ranging from access controls, types of permissions and encryption. I thought the encryption section was very useful information with good detail in the various types of categories like Symmetric-key encryption and Asymmetric-key encryption. These computer systems are used with computers or devices either in the home or business sector in order to keep data encrypted with use of one or multiple keys. When these encryptions are used there are several ways to protect your data from being compromised on the network, one of these options is the use of Disk Encryption. This technology is used to convert your data into a code that is unreadable, and that only authorized by an administrator that has the permissions to decipher and read it. Another type of encryption that is used is File Encryption. This technology is also used by companies to safeguard their information with the use of a filing system. It works similar to disk encryption, but it does it by encrypting files individually.

Tuesday, January 23, 2018

"Week 7 Blog Posting"



This week's reading on Business Continuity was in an interesting chapter read.  Even though it was about 23 pages, it was informal. I like the way it broke down the options with uses of storage you can use from tapes, CD-ROM, or external hard drives. Pending on how much your company wants to spend, these options all have a certain percentage rate for backup success on your network. Implementing backup implementations like LAN-free and serverless backup up will increase the amount of time when backup storage because LAN-free will give you the option to back up the data to the server without the use of a LAN, by using tape device that is directly connected to a storage media. Which the use of Serverless backup, no bandwidth is used so it chooses what should be back up with the use of Fibre Chanel or SCSCI.  Having offsite locations for storing data will give you the option when picking the right company that specializes in protecting all the data that needs to stored.  You want to make sure that the company that you use has the compacity to storage data without running out of space, and have measures in place in case of natural disasters.

Wednesday, January 17, 2018

Week 6 Blog


This week's reading assignment on storage management was actually pretty good. I am still new to some of these subjects, but I like learning about the content and how storage is managed, and how administrators control how much data is stored with the use of provisioning, management, monitoring. With the use of all these protocols, it gives the IT administrator the permission to gather and log information on all systems and devices, while being able to see how the data is being stored efficiently by evaluating the trends of how the networking is receiving and storing the information. This what I got out of reading this chapter, but overall a good subject on storage management.

Friday, January 12, 2018

Week 5 Blog


This week chapter to me is definitely one of the hardest ones. I had to read over a couple of times to get an idea of how virtualization works.  Chapter 5 had a lot of information that range from the uses of virtual tape storage and file utilization, and how they are used to stored data by level of classes with the use of logical networks and VLANS. I think pending on the type of business you're running, file system virtualization would be a viable system to use because the user would be able to retrieve and store files from multiple servers with the use of VLAN and VSAN. This chapter to me is definitely one of hardest