Qcentral - problematic launch?

In my earlier post, I discussed QSAN matrices. Each of them has its own built-in management panel, but the question arises whether it is possible to manage several matrices from one place. The answer is - YES. All you need is QCentral software. I will not elaborate on the possibilities of this software now, I would like to share only the experience I gained while running this application.

This software is written in java. The file has a .jar extension. Hence, problems with starting Qcentral may arise. If the program cannot be started, check if the Java virtual machine - JRE (Java runtime enviroment) is installed in the system. If we still can't run Qcentral please add environment variables. Below is an example for Java 7 on a 64-bit system. Find the location of the java.exe file on your own system.

Continue ...

Chasing EPS. Is it profitable to be innovative?

 

 

ChRL-HP-Aruba

On Monday, March 2, I received it information on the acquisition of Aruba Networks by HP. The transaction, valued at $ 2.7 billion, is designed to strengthen HP's position in the wireless network solutions market. In this way, HP will become the No. 2 player after Cisco Systems, which is the undisputed leader in the global market. Currently, Cisco has a 52% share in WLAN sales, Aruba 13% and HP just over 4%.

The question is whether HP will be able to take advantage of the transaction opportunities since it failed to do so in previous WLAN acquisitions - Colubris in 2008 and 3Com in 2010. Another question is that Aruba is a supplier to HP competitors such as Dell. Brocade or Juniper. Will these companies continue to buy WLANs from Aruba while it is owned by HP? Nevertheless, we can say with certainty that a new strong competitor, HP-Aruba, has emerged behind Cisco's back, and with the estimated 40% WLAN market growth until 2019, Cisco's share of sales will decline in the coming years.

Continue ...

Social engineering, or about social sciences in the world of technology.

Technology is not everything.

When talking about security and security, we first think of advanced technologies and expensive devices: intruder detection systems, active prevention systems, data protection against leakage, secure authentication, authorization and sharing of resources. In order to feel safe, we spend a lot of money and surround ourselves with barriers, scanners, probes, tokens, fingerprint readers or the iris of the eye. We install systems that scan and filter traffic for viruses, worms, Trojans, attack signatures or other anomalies. To process data from so many systems, we launch new ones, used to log events, correlate them, analyze and warn us about threats. It would seem, therefore, that by doing so much, with so much resources, we have the right to feel confident about the security of our systems and the data processed with them. The reality is unfortunately very brutal. While doing so much, we forgot about the essential thing - the level of safety, just like the strength of a chain, is not determined by the sum of all its links, but by the strength of the weakest of them. The question "what is this link?" will not lead us to an answer. For we should ask not "what" but "who" is.
Continue ...

QSAN - high quality at a reasonable price.

In connection with granting Upgreat the status Authorized QSAN Sub-distributor in Poland, we decided to share our impressions about the products offered by this manufacturer.

But let me start with maybe general information about mass storage.

They are present in almost every large enterprise, institution or used for private purposes. Most of the Internet resources are stored on mass memory. Hence, it is important that these devices are reliable and efficient. Our experience with such devices is based mainly on such vendors as HP, IBM, NetApp. Due to the award of the status of the Authorized QSAN Sub-distributor, we received two matrix models from this manufacturer. It is a Taiwanese manufacturer that started operating in 2004. Qsan Technology (this is the full name of the company) specializes in the production of a complete line of SAN, iSCSI, Fiber Channel SAN storage network products for global enterprises, medium and small businesses.

Continue ...

Are 15K drives more efficient than 10K?

In the course of discussions with the client about the configuration and size of the storage, I went down to a fairly low level of detail. To my surprise, it turned out that 15,000 rpm disks do not have to be faster than 10K disks !!!

HDD-Seagate

It is assumed that the performance of various types of disk drives should be estimated as follows:

Continue ...

HP Storage - meeting of MASE engineers

On December 10-11, at the Remes hotel in Opalenica, a meeting of HP MASE engineers devoted to new products for 2015 was held. UpGreat engineers also participated in the training. Among the premieres of the 3PAR and MSA matrices in the coming months, attention should be paid to e.g. introducing such functionalities as:

  • File Persona Software in 3PAR arrays, allowing for the implementation of, inter alia, NFS and SMB file sharing protocols
  • Virtual pools in MSA arrays, allowing the "stretching" of volumes on different raid groups
  • Second level Read Cache based on SSD disks in MSA arrays
  • New, prettier and more intuitive web GUI in MSA arrays
  • Automatic tiering in MSA matrices

 

Simple, fast and secure transmission of confidential content.

Sending confidential content by e-mail is a fairly common practice. Unfortunately, not always people exchanging information with each other are able to take advantage of such facilities as encrypted e-mail communication, encryption keys or certificates. If sending confidential data is incidental and is not systematically resolved by the IT department, users often resort to the simplest measures in the form of office suite files protected with a password or compressed with a password-protected program such as winzip or winrar. Such solutions, although they seem safe, are characterized by a high level of risk. For the sake of compatibility, the most popular document formats are saved using low-security algorithms. There is a whole range of tools available to help crack passwords for files in the .doc, .docx, .xls, .xlsx or .zip formats.

So how to deal with a situation when the data we want to send must be quickly and securely delivered to the recipient? Continue ...

Email is not enough, i.e. modern group work tools ...

The basic method of electronic communication in enterprises in Poland is the use of e-mail messages. At the same time, in private applications, a much wider range of electronic media is used, such as Facebook, Skype, Google+, Hang-out, ChatOn, Twitter and good old SMS messages. In this document, we will consider whether and how the cooperation tools in the company can be enriched with functionalities used in social media.

It should be assumed that free communication tools are chosen by millions of users because of their advantages. Let's consider what features of the above-mentioned solutions make their use so common.

Continue ...

Problem with accessing the HP MSA P2000 web interface

In HP MSA P2000 arrays, there is an occasional problem with accessing the controller interface from a web browser. Fortunately, the solution to this problem is quite simple and requires no interruption in access to the matrix. Log in with the ssh client or console cable to one of the array controllers and restart it with the command below:

restart mc [a | b | both]

Continue ...

Running 16 bit applications from Windows 2008 and 2012 file server

Moving data from an older file server to the new Windows Server 2008 or 2012 may result in the older 16-bit applications running from a network share failing to obey us. Although the system on which we are trying to run the application from a network share does not change, a message may appear informing that the application or one of its components has not been found:

Can't run 16-bit Windows program
Cannot find file X: \ directory_name \ file_name.exe (or one of this components)

Continue ...