Search

Latest articles

View:
Vladyslav Savchenko
Vladyslav Savchenko
Pre-Sales Solutions Engineer at StarWind with expertise in virtualization technologies, along with a strong background in storage and system administration.
  • Vladyslav Savchenko
    Vladyslav Savchenko
  • November 21, 2023
  • 11 min to read

How to Create a File Share with StarWind VSAN

Discover how to create SMB and NFS file shares in StarWind Virtual SAN (VSAN).

  • Vladyslav Savchenko
    Vladyslav Savchenko
  • October 24, 2023
  • 21 min to read

What is Business Continuity?

Ever wondered how companies survive cyber-attacks, fires, or data center meltdowns? It’s all about Business Continuity. This article unveils the crucial elements of a Business Continuity Plan and why it’s a must in today’s world.

  • Vladyslav Savchenko
    Vladyslav Savchenko
  • October 4, 2018
  • 11 min to read

StarWind rPerf: All-in-one free tool for ensuring the maximum performance level of your RDMA network connections

Nowadays we often meet systems with RDMA connections configured for increasing the performance of the system. Also, it’s not a news that we can meet environments with the different OS installed. In our case, we will be looking into a vital aspect of the process – the performance of RDMA connections. So, let’s have a look at the configuration of RDMA and what we need for building and testing RDMA connections, problems that you possibly can face, and the final part is making it perform in a way that will make us happy. So, let’s start.

  • Vladyslav Savchenko
    Vladyslav Savchenko
  • June 26, 2018
  • 11 min to read

Secure your data for good with Challenge Handshake Authentication Protocol

Today we will look at one of them – Challenge Handshake Authentication Protocol or CHAP. Before we start, let me tell you a few words about CHAP. Challenge Handshake Authentication Protocol (CHAP) is a network login protocol that uses a challenge-response mechanism. You can use CHAP authentication to restrict iSCSI access to volumes and snapshots to hosts that supply the correct account name and password (or “secret”) combination. Using CHAP authentication can facilitate management of access controls because it restricts the access through account names and passwords, instead of IP addresses or iSCSI initiator names.