Skip to main content

Posts

Showing posts with the label Technical

Cisco Identity Services Engine

Next-generation secure network access Gain awareness of everything hitting your network. Provide access consistently and efficiently. Relieve the stress of complex access management. ISE Overview

Virtualization with Windows Server 2012 R2

  Windows Server® powers many of the worlds' largest datacentres, enables small businesses around the world, and delivers value to organizations of all sizes in between. In this fast paced TechNet Live session we will cover Server Virtualization end to end in Windows Server 2012 R2 by looking at what has changed and what is new. Come along and see how the Microsoft Server Virtualization platform can help you transform your IT Operations by reducing costs and delivering a whole new level of business value. TechNet Live Series - Virtualization with Windows Server 2012 R2 Source: Technet.Microsoft

Cisco EnergyWise

The Cisco Energy Management Cloud delivers powerful, easy-to-use energy management capabilities. This data lets you measure energy usage across your data center and distributed offices. Manage all of your network-connected devices - including PCs, phones, printers, monitors, virtual servers, and more - not just Cisco devices. And do it through the cloud and an easy-to-use web-based interface. Cisco Energy Management Cloud offers robust database, analytics, and reporting features from a single management pane. Cisco EnergyWise began as a Cisco IOS Software-based protocol used to measure and control the energy use of an enterprise's IT network. The Cisco EnergyWise Suite is designed to help you cut energy costs across your distributed office by 35 percent and gain 100 percent visibility into the energy use of every device in your data center.   Source: www.Cisco.com and www.Youtube.com

Cisco’s Managed Threat Defense

  Managed Threat Defense provides dynamic real-time detection and remediation against known vulnerabilities as well as advanced persistent threats. Cisco provides the hardware, software and expertise to deliver threat defense in a subscription-based model via a global network of security operation centers. Cyber Threat Defense exposes advanced threats using the following automated capabilities: NetFlow analysis—Identifies suspicious network traffic patterns inside the network File analysis—Performs reputation scoring and dynamic analysis of files traversing the network Deep-packet inspection—Identifies exploits that can lead to system compromise Log analysis—Uncovers stealthy activity that may be spread across days, weeks, or months.   Source: Cisco.com & Youtube

Touch Screens of the Future

Carnegie Mellon's Chris Harrison demonstrates TouchTools and TapSense, tablet apps he built to explore new ways of that people might interact with screens in the future. Source: YouTube

What is Cloud computing?

Cloud computing is a term used to refer to a model of network computing where a program or application runs on a connected server or servers rather than on a local computing device such as a PC, tablet or smartphone. Like the traditional client-server model or older mainframe computing, a user connects with a server to perform a task. The difference with cloud computing is that the computing process may run on one or many connected computers at the same time, utilizing the concept of virtualization. With virtualization, one or more physical servers can be configured and partitioned into multiple independent "virtual" servers, all functioning independently and appearing to the user to be a single physical device. Such virtual servers are in essence disassociated from their physical server, and with this added flexibility, they can be moved around and scaled up or down on the fly without affecting the end user. The computing resources have become "granular", which pr...

Understanding SSID / BSSID

  Understanding the Network Terms SSID The terms BSSID, ESSID, and SSID are all used to describe sections of a wireless network (WLAN)—the three terms have slightly different meanings. As a wireless user you are concerned only with the broadcast SSIDs that let you connect to a wireless network. As an administrator, you also need to keep track of BSSIDs and, to a lesser degree, ESSIDs. This topic describes: An SSID is the Name of a Network BSSIDs Identify Access Points and Their Clients An ESS Consists of BSSs     An SSID is the Name of a Network Each BSS or ESS is identified by a service set identifier ( SSID ) - a 1 to 32 byte string. This is normally a human-readable string and thus commonly called the "network name". Because multiple WLANs can coexist in one airspace, each WLAN needs a unique name—this name is the service set ID (SSID) of the network. Your wireless device can see the SSIDs for all available networks—therefore, when you click a wireless icon, t...

Cisco Configuration Professional

  Cisco ® Configuration Professional has two types: Cisco Configuration Professional and Cisco Configuration Professional Express. Both Cisco Configuration Professional and Express are GUI-based device-management tools for Cisco Integrated Services Routers (ISRs). Cisco Configuration Professional is a PC-based application that provides the device management for ISRs. It simplifies router, firewall, intrusion prevention system (IPS), VPN, unified communications, WAN, LAN, and basic wireless configuration through easy-to-use wizards. Cisco Configuration Professional Express, a lightweight version of Cisco Configuration Professional, is an embedded device manager that is available on the router flash memory and can be used to configure some of the LAN and WAN interfaces and basic configurations to bootstrap the router. Cisco Configuration Professional tools are valuable productivity-enhancing tools for network administrators and channel partners for deploying routers in medium...

Bluetooth Ring to Control Your Devices

  The Nod ring is a Bluetooth-enabled gesture controller that connects to your smartphone to accomplish a number of input and controller tasks all by using natural motions with your finger. In addition extending the capabilities of your smartphone, the ring can also be connected to other smart devices, such as a smart television and other Internet-connected devices like the Nest. If a device doesn't have Bluetooth capability, you can connect the ring to your smartphone, which will then connect to the device via Wi-Fi. Read more

So, What is MHL?

  MHL Stands for ‘Mobile High-Definition Link’ . It is an industry standard for a mobile audio/video interface that allows consumers to connect mobile phones, tablets, and other portable consumer electronics (CE) devices to high-definition televisions (HDTVs) and audio receivers. The MHL 3.0 standard supports up to 4K (Ultra HD) high-definition (HD) video and 7.1 surround-sound audio, including TrueHD and DTS-HD, while simultaneously charging the connected device. MHL-enabled products include adapters, automotive accessories, AV receivers, Blu-ray Disc players, cables, DTVs, monitors, projectors, smartphones, tablets, TV accessories, and more. Key Features of MHL Technology Real Plug & Play Fast Charging Greater than 900mA power to charge your mobile device Brilliant Resolution HD display with up to 1080p60 video Immersive Audio 8-channel sound Remote Control Interoperable remote control features to navigate your apps on the big screen No Lag Ideal for playing music, vide...

Using vLookup in Excel 2013

Facebook Data Center

Inside Google's Data Center

Firefox OS

iOS and Android are great, but they each have their own rules and policies that certainly inhibit the creative efforts of developers. Mozilla has since decided to build a new mobile operating system from scratch, one that will focus on true openness, freedom and user choice. It’s Firefox OS . Firefox OS is built on Gonk, Gecko and Gaia software layers – for the rest of us, it means it is built on open source, and it carries web technologies such as HTML5 and CSS3 . Click the image for more info:

Parallella – Supercomputer in $99?

  Making parallel computing easy to use has been described as "a problem as hard as any that computer science has faced". With such a big challenge ahead, we need to make sure that every programmer has access to cheap and open parallel hardware and development tools. Inspired by great hardware communities like Raspberry Pi and Arduino, we see a critical need for a truly open, high-performance computing platform that will close the knowledge gap in parallel programing. The goal of the Parallella project is to democratize access to parallel computing. If we can pull this off, who knows what kind of breakthrough applications could arise?  Maybe some of them will even change the world in some small but positive way. For more info click the image below -

CCIE Voice Re-certification!

 

Distributed Denial of Service Attack?