• When is it most appropriate to use a software iSCSI initiator vs. a hardware iSCSI initiator?

    Margaret Rouse22,640 pointsBadges:
  • iSCSI initiator

    An iSCSI initiator is software or hardware that enables a host computer to transmit data to an iSCSI-based storage array through a network adapter over a TCP-based IP network.

    Margaret Rouse22,640 pointsBadges:
  • Dell customers not so keen on Blade Arrays concept

    Now that Dell has rolled out its iSCSI EqualLogic Blade Arrays at Dell Storage Forum 2012, customers wonder if they pack enough performance to merit consideration.

    Sonia Lelii3,520 pointsBadges:
  • ISCSI, e-mail archiving to rule data center

    Experts and analysts alike agree that iSCSI and e-mail archiving will have profound impacts on the data center. See how these two technologies may impact your only systems.

    Alan Earls2,200 pointsBadges:
  • Using iSCSI for virtual server environments

    In this podcast interview, Mike Laverick discusses the pros and cons of using iSCSI for virtual server environments. Learn how to implement and configure iSCSI and more.

    mike112,070 pointsBadges:
  • VMware’s vSCSI filter: What it does and how it works

    Find out how VMware’s vSCSI filter tool operates upon iSCSI data to handle data loss prevention as well as to offload replication tasks from the host and save money on replication.

    SearchVirtualStorage25 pointsBadges:
  • Expert video: VMware RDM and iSCSI initiator for data access

    Virtualization expert Howard Marks explains how to access data in a virtual environment by using VMware raw device mapping and iSCSI initiators.

    ITKE434,520 pointsBadges:
  • Where should the iSCSI initiator run in a Hyper-V environment?

    Learn what Microsoft expert Brien Posey has to say about when and how to use an iSCSI initiator when using Windows Server 2012 R2 Hyper-V.

    Brien Posey14,565 pointsBadges:
  • How does the shared VHDX file feature in Windows Server 2012 R2 work?

    The new shared VHDX feature brings shared storage to guest clusters by eliminating the need for an iSCSI or Fibre Channel connection.

    Brien Posey14,565 pointsBadges:
  • How can I prevent rogue access to an iSCSI Cluster Shared Volume?

    Expert Brien Posey explains how to create a secure connection for iSCSI-attached Cluster Shared Volumes in Hyper-V R2.

    Brien Posey14,565 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

Thanks! We'll email you when relevant content is added and updated.

Following