Search

Latest articles

View:
Vladyslav Savchenko
Vladyslav Savchenko
StarWind Solutions Architect. Vladyslav has a broad expertise in virtualization technologies, and a strong background in storage and system administration.
Vladyslav Savchenko
  • Vladyslav Savchenko
  • December 14, 2023

What Is Enterprise Hybrid Cloud Architecture?

Explore Enterprise Hybrid Clouds, the backbone of modern IT. Combining public and private clouds simplifies management, cuts costs, and propels businesses into the digital future.
Read more
Vladyslav Savchenko
  • Vladyslav Savchenko
  • November 21, 2023

How to Create a File Share with StarWind VSAN

Discover how to create SMB and NFS file shares in StarWind Virtual SAN (VSAN).
Read more
Vladyslav Savchenko
  • Vladyslav Savchenko
  • October 24, 2023

What is Business Continuity?

Ever wondered how companies survive cyber-attacks, fires, or data center meltdowns? It’s all about Business Continuity. This article unveils the crucial elements of a Business Continuity Plan and why it’s a must in today’s world.
Read more
Vladyslav Savchenko
  • Vladyslav Savchenko
  • July 25, 2023

Creating a function in Windows PowerShell and saving it as a module

Every admin knows that maintaining all the local area networks within an IT environment manually is a major headache. Fortunately, there are multiple ways to remedy that by automating a number of functionalities, one of which is command-line shells.
Read more
Vladyslav Savchenko
  • Vladyslav Savchenko
  • October 4, 2018

StarWind rPerf: All-in-one free tool for ensuring the maximum performance level of your RDMA network connections

Nowadays we often meet systems with RDMA connections configured for increasing the performance of the system. Also, it’s not a news that we can meet environments with the different OS installed. In our case, we will be looking into a vital aspect of the process – the performance of RDMA connections. So, let’s have a look at the configuration of RDMA and what we need for building and testing RDMA connections, problems that you possibly can face, and the final part is making it perform in a way that will make us happy. So, let’s start.
Read more
Vladyslav Savchenko
  • Vladyslav Savchenko
  • June 26, 2018

Secure your data for good with Challenge Handshake Authentication Protocol

Today we will look at one of them – Challenge Handshake Authentication Protocol or CHAP. Before we start, let me tell you a few words about CHAP. Challenge Handshake Authentication Protocol (CHAP) is a network login protocol that uses a challenge-response mechanism. You can use CHAP authentication to restrict iSCSI access to volumes and snapshots to hosts that supply the correct account name and password (or “secret”) combination. Using CHAP authentication can facilitate management of access controls because it restricts the access through account names and passwords, instead of IP addresses or iSCSI initiator names.
Read more