Google Cloud Datastore Demo

Google Cloud Datastore Demo

May 18
  • 76 Views
  • 0 Likes
  • 0 Comments
Google Cloud Datastore Demo The next service we are going to look at is Google Cloud Datastore. Cloud Datastore is a NoSQL document database. It is built for automatic scaling, high performance, and ease of application development. The important difference is, unlike SQL, Google Cloud Datastore is b
Google SQL Cloud

Google SQL Cloud

May 17
  • 108 Views
  • 0 Likes
  • 0 Comments
Google SQL Cloud The next service we are going to look at is the relational database. That is Google Cloud SQL. This service is managed. That means all the administrative tasks to manage the database like patching, or backups are managed by Google and included in pricing. We are going to create SQL
Google Cloud Storage

Google Cloud Storage

May 17
  • 207 Views
  • 0 Likes
  • 0 Comments
  Google Cloud Storage The next service we are going to look at is Google Cloud Storage. From the main menu, I go to storage submenu. Under sub-menu, you will come across a concept called buckets. Buckets are containers for storing files and folders. I start by creating a bucket by giving a buc
Microsoft Power BI Demo & Reviews

Microsoft Power BI Demo & Reviews

May 01
  • 45 Views
  • 0 Likes
  • 0 Comments
Microsoft Power BI Demo & Reviews
Components of Backend Architecture

Components of Backend Storage Architecture

Apr 21
  • 161 Views
  • 0 Likes
  • 0 Comments
Components of Backend Storage Architecture When we talk about backend storage architecture, we should know that there are different ways to interconnect individual disks within enclosures. For example, fiber channel technology and SAS. A storage system contains main controller boards that contain
Mesh and Core Edge Switch Network Topology

Mesh and Core Edge Switch Network Topology

Mar 31
  • 144 Views
  • 0 Likes
  • 0 Comments
Mesh and Core Edge Switch Network Topology A storage network is built by connecting several switches togeather and attaching end devices like computers or servers to ports. The links between the switches are called Inter-Switch links or ISL’s. These ISL’s enable the expansion of networks
What is Buffer Overflow vulnerability or attack

What is Buffer Overflow vulnerability or attack

Mar 28
  • 85 Views
  • 0 Likes
  • 0 Comments
What is Buffer Overflow vulnerability or attack Buffer overflow occurs when a process or program puts more data into a buffer or memory area that is allocated for temporary storage. Buffers are created to hold a finite amount of data, the extra data which has to go somewhere, overflows or overwrites
Google Cloud Platform Overview

Google Cloud Platform Overview

Mar 26
  • 279 Views
  • 1 Likes
  • 0 Comments
Google Cloud Platform Overview
NetBackup Video Tutorial

Basic NetBackups Troubleshooting Commands

  • 1,018 Views
  • 1 Likes
  • 0 Comments
Basic NetBackups Troubleshooting Commands   This video tutorial contains basic NetBackup commands for starters in NetBackup learning. Let’s begin with connection commands frequently used to troubleshoot connection errors between NetBackup Servers and client servers. To test connections we
SAN

Storage Area Network Topology Chapter5

Feb 20
  • 1,005 Views
  • 2 Likes
  • 0 Comments
  Storage Area Network Topology Chapter5   Storage Area Network Topology: There are 3 types of topology in Fiber Channel. Point to point , Arbitrated loop, and switch fabric. storage devices connection is illustrated in the diagram Point to Point or Direct attached: The most simple form of
NetBackup Processes Services Daemons

NetBackup Processes Services Daemons

  • 981 Views
  • 4 Likes
  • 0 Comments
NetBackup Processes Services Daemons In operating systems such as UNIX, a daemon is a computer program that runs in the background and is always active. On Microsoft Windows operating system, this type of program is called service. The term process refers to a program that is inactive until trigger
NetBackup VMware Policy Configuration and Best Practices

NetBackup VMware Policy Configuration and Best Practices

  • 854 Views
  • 2 Likes
  • 0 Comments
NetBackup VMware Policy Configuration and Best Practices This video tutorial demonstrates steps to configure NetBackup VMware policy for backing up through VADP snapshot based backups and best practices. The first step is to add a virtual machine or vCenter server. Right click and add vCenter as sho
Network Devices and Components

NetBackup Media Server Deduplication Case Study and Best Practices

  • 768 Views
  • 0 Likes
  • 0 Comments
  NetBackup Media Server Deduplication Case Study and Configuration   Summary: As there is a constant growth in Organizational data, the demand to protect it increases. This leads to increased backup window. Traditional backup consumes heavy primary and secondary storage like tapes and ext
Introduction to Backup and Recovery

Backup Components and Architecture chapter2

  • 767 Views
  • 0 Likes
  • 0 Comments
  Backup Components and Architecture Netbackup is basically 3-Tier architecture that includes master server, media server and clients.   Master Server Master Server is the brain of Netbackup domain.  It maintains the meta data or the catalog that consists of all the information related
Direct Attached Storage Vs SAN

Direct Attached Storage vs SAN

Mar 16
  • 766 Views
  • 0 Likes
  • 0 Comments
Direct Attached Storage vs SAN In this video, we will explain Shared Storage Model with case example.  THE SNIA Shared Storage Model is divided into 3 categories or layers. To learn about Shared Storage Model architecture click on below link. Storage Area Networks Shared Storage Model (SNIA) Consid
how scsi works

How SCSI Works

Feb 26
  • 752 Views
  • 1 Likes
  • 0 Comments
How SCSI Works Small computer systems interface (SCSI) is a interface cable used to transfer data between devices on both internal and external computer buses. It is the fastest way of communicating between servers or between computers and peripheral devices like scanners and printers. Each SC
Google Cloud Datastore Demo

Google Cloud Datastore Demo

May 18
  • 76 Views
  • 0 Likes
  • 0 Comments
Google Cloud Datastore Demo The next service we are going to look at is Google Cloud Datastore. Cloud Datastore is a NoSQL document database. It is built for automatic scaling, high performance, and ease of application development. The important difference is, unlike SQL, Google Cloud Datastore is b
Google SQL Cloud

Google SQL Cloud

May 17
  • 108 Views
  • 0 Likes
  • 0 Comments
Google SQL Cloud The next service we are going to look at is the relational database. That is Google Cloud SQL. This service is managed. That means all the administrative tasks to manage the database like patching, or backups are managed by Google and included in pricing. We are going to create SQL
Google Cloud Storage

Google Cloud Storage

May 17
  • 207 Views
  • 0 Likes
  • 0 Comments
  Google Cloud Storage The next service we are going to look at is Google Cloud Storage. From the main menu, I go to storage submenu. Under sub-menu, you will come across a concept called buckets. Buckets are containers for storing files and folders. I start by creating a bucket by giving a buc
Microsoft Power BI Demo & Reviews

Microsoft Power BI Demo & Reviews

May 01
  • 45 Views
  • 0 Likes
  • 0 Comments
Microsoft Power BI Demo & Reviews
Components of Backend Architecture

Components of Backend Storage Architecture

Apr 21
  • 161 Views
  • 0 Likes
  • 0 Comments
Components of Backend Storage Architecture When we talk about backend storage architecture, we should know that there are different ways to interconnect individual disks within enclosures. For example, fiber channel technology and SAS. A storage system contains main controller boards that contain
Mesh and Core Edge Switch Network Topology

Mesh and Core Edge Switch Network Topology

Mar 31
  • 144 Views
  • 0 Likes
  • 0 Comments
Mesh and Core Edge Switch Network Topology A storage network is built by connecting several switches togeather and attaching end devices like computers or servers to ports. The links between the switches are called Inter-Switch links or ISL’s. These ISL’s enable the expansion of networks
What is Buffer Overflow vulnerability or attack

What is Buffer Overflow vulnerability or attack

Mar 28
  • 85 Views
  • 0 Likes
  • 0 Comments
What is Buffer Overflow vulnerability or attack Buffer overflow occurs when a process or program puts more data into a buffer or memory area that is allocated for temporary storage. Buffers are created to hold a finite amount of data, the extra data which has to go somewhere, overflows or overwrites
Google Cloud Platform Overview

Google Cloud Platform Overview

Mar 26
  • 279 Views
  • 1 Likes
  • 0 Comments
Google Cloud Platform Overview