April 29, 2020

Importance of Cyber Security

With so much of our daily lives conducted online these days, it’s astounding that the issue of cyber security is not more discussed. Only occasionally does the issue come up in national consciousness, usually during a celebrity photo leak or a breach of political security.

However, common cyber crime is much more prevalent than these occasional headlines suggest. Every day, cyber criminals victimize people who shop, bank and send or receive money online.

Read more @ Switch Networking

And the sad truth is that few of these criminals can be described as experts or masterminds. The lack of awareness about cyber security makes most people an easy target for anyone trying to hack into their personal data.

High-Tech Crime Requires Sophisticated Professionals

In the United States in 2013, 3,000 companies reported instances of security breach by cyber attack. This statistic didn’t just include small businesses running on homemade websites, but giant retailers such as Target and Home Depot were also among the companies victimized. Customer data and credit card information was stolen, money was lifted from paycheck accounts, trade secrets and other intellectual property were copied and leaked, and in some cases, the criminals hacked into internal systems and held them for ransom.

It is estimated that cyber crime costs the global economy over $400 billion per year. As a result, companies and organizations all over the world, including the U.S. Government, are making cyber security a top priority for the coming year and are setting up standards for cyber security protocol. Last year, President Obama asked the National Institute of Standards and Technology (NIST) to draw up a set of best practices for cyber security. Created with the input of thousands of security experts, the plan is designed to help organizations manage the risks of a cyber security breach.

Posted by: Jack prabha at 06:17 AM | No Comments | Add Comment
Post contains 304 words, total size 2 kb.

April 27, 2020

IoT offers a way to track COVID-19

A company called Kinsa is leveraging IoT tech to create a network of connected thermometers, collecting a huge amount of anonymous health data that could offer insights into the current and future pandemics.

The company’s founder and CEO, Inder Singh, said that the ability to track fever levels across the U.S. in close to real time could be a crucial piece of information for both the public at large and for decision-makers in the healthcare sector and government.


The system’s networking technology is relatively straightforward – the thermometer connects via Bluetooth to an app on the user’s phone, which reports anonymized data back to Kinsa’s cloud over the Internet. Singh emphasizes that the company only organizes data down to the county level, and asserts that identifying individuals through Kinsa’s data is more or less impossible.

"We’re not providing PII, we’re not providing identified data,” he said. "The app just guides you to the care and services you need.”

Armed with the temperature reading and some basic demographic information about the person whose temperature was taken and their other symptoms, the app can offer rudimentary guidance about whether a visit to the doctor is needed or not, and whether the user’s area is seeing unusual levels of fever.

Posted by: Jack prabha at 09:27 AM | No Comments | Add Comment
Post contains 219 words, total size 2 kb.

April 23, 2020

capacities of LAN, MAN and WAN networks?

A LAN (local area network) is a group of computers and network devices connected together, usually within the same building. By definition, the connections must be high speed and relatively inexpensive (e.g., token ring or Ethernet). Most Indiana University Bloomington departments are on LANs.

Know more: IT analyst salary

A LAN connection is a high-speed connection to a LAN. On the IUB campus, most connections are either Ethernet (10 Mbps) or Fast Ethernet (100 Mbps), and a few locations have Gigabit Ethernet (1000 Mbps) connections.
A MAN (metropolitan area network) is a larger network that usually spans several buildings in the same city or town. The IUB network is an example of a MAN.
A WAN (wide area network), in comparison to a MAN, is not restricted to a geographical location, although it might be confined within the bounds of a state or country. A WAN connects several LANs, and may be limited to an enterprise (a corporation or an organization) or accessible to the public. The technology is high speed and relatively expensive. The Internet is an example of a worldwide public WAN.

Posted by: Jack prabha at 07:08 AM | No Comments | Add Comment
Post contains 191 words, total size 1 kb.

April 22, 2020

Facts about CompTIA Storage+ Certification

CompTIA Storage+ Certification driven by SNIA is a vendor-neutral certification that authorizes the skills and knowledge that is required of IT professionals in the storage area.

Since the past few years, storage-based certifications have been recognized in various company and employment market assessments.

There is a high demand for a variety of networked methods of storage via Network-Attached Storage (NAS), Storage Area Networks (SAN), and Storage-as-a-Service (STaaS), which deals with moving storage into clouds in the contemporary workplace.

Also IT professionals who are inclined towards seeking employment in data hub as well as in network support interrelated positions are suggested to have strong storage background in discharging their responsibility towards their jobs.


The knowledge and skills required for configuring basic networks to include archive, backup, and restore technologies are covered by this exam. Those who clear this exam will be able to comprehend the basics of business continuity, system integration, application workload, and storage/system administration, while executing basic troubleshooting on issues related with connectivity and referencing documentation.

Certain vendor-neutral storage certifications are provided by the Storage Networking Industry Association (SNIA). Many vendor-specific storage certifications are available from vendors that offer storage systems and solutions which are: Cisco, IBM (BCS), HP (H3C), Hitachi Data Systems (HDS), Symantec, Oracle and many more.

Usually in the world of IT certification a vendor neutral certification would weigh more on your resume and experience as it offers a first-rate entry point in the field sought. On the other hand a vendor specific may be helpful as long as you are with your current employer providing the certification.

Posted by: Jack prabha at 07:16 AM | No Comments | Add Comment
Post contains 272 words, total size 2 kb.

April 20, 2020

CISCO’S NEW CERTIFICATION PROGRAM IS HERE

Cisco has always been an industry leader in networking solutions. With solutions for enterprise networks, wireless networks, network security, network automation and DevOps, Cisco’s offerings are tremendous.

To accompany these solutions, February 2020 saw the launch of Cisco’s revamped certification program, completely redefining their certification tracks and creating several brand new certifications.


To highlight the changes, gone are CCNA level specialties, and a single CCNA certification remains. Additionally, the traditional professional level and CCNP specialties have changed a bit. The professional and CCNP level certifications call for passing a core exam within each specialty, and then learners will choose a single concentration exam to further measure their skills. Also of note, the CCNP level core exams constitute the written exam portion of CCIE certification.
It’s a lot to take in, but the good news is that Pluralsight is ready with many certifications already covered and plenty more to come!

Posted by: Jack prabha at 10:32 AM | No Comments | Add Comment
Post contains 160 words, total size 1 kb.

April 16, 2020

Technical support

Technical support or tech support refers to a range of services by which enterprises provide assistance to users of technology products such as mobile phones, televisions, computers, software products or other electronic or mechanical goods. In general, technical support services attempt to help the user solve specific problems with a product—rather than providing training, customization, or other support services. Most companies offer technical support for the products they sell, either freely available or for a fee. 


Know more: IT technician job description and salary

Technical support may be delivered over the telephone or online by e-mail or a website or a tool where users can log a call/incident. Larger organizations frequently have internal technical support available to their staff for computer related problems. The internet is also a good source for freely available tech support, where experienced users may provide advice and assistance with problems. In addition, some fee-based service companies charge for premium technical support services.

Posted by: Jack prabha at 10:06 AM | No Comments | Add Comment
Post contains 159 words, total size 1 kb.

April 14, 2020

contingent worker definition

Used to describe work arrangements that differ from regular/permanent, direct wage and salary employment. Contingent work and workers are primarily distinguished by having an explicitly defined or limited tenure. 


Contingent workers include temporary employees provided by an outside staffing agency and independent contractors/consultants. Contingent workers may also include temporary workers from an internal pool, and others (such as summer interns, seasonal workers, freelancers, "crowd-sourced” workers, etc.) employed directly by an organization for an intentionally limited time period. From an employer point of view, contingent work also includes statement of work (SOW) consultants who work for the company on a short term basis. While the consultants themselves may or may not have an expectation of ongoing employment with their consulting firm, their work for the client is considered contingent. 

Self-employed individuals should only be defined as contingent workers if they provide themselves as contract labor or SOW workers to other organizations. Otherwise, they should not be included in the contingent workforce, because they may have stable occupations or careers that are clearly not conditional or limited in tenure. 


Workers in Professional Employer Organization (see definition) arrangements are not contingent workers, because the relationship is by definition ongoing. Similarly, outsourced service workers would not be included in contingent work as this work is expected to have an ongoing rather than explicitly defined, short-term tenure. The "contingent worker” label applies to all workers of any skill type or experience level who meet this definition, including those in professional, blue-collar, or office/clerical roles.

Posted by: Jack prabha at 01:33 PM | No Comments | Add Comment
Post contains 259 words, total size 2 kb.

April 13, 2020

Microsoft Office 2016 Features

Microsoft Office 2016 is a suite of productivity applications that includes Microsoft Word, Microsoft Excel, Microsoft PowerPoint and Microsoft Outlook. It is the successor to Microsoft Office 2013 for Windows and Office for Mac 2011.


Office 2016 allows greater collaboration than past versions of Office. The Modern Attachments feature allows users to attach a file that is stored in SharePoint Online, OneDrive or OneDrive for Business and set permissions for the file without leaving Outlook. Users can also share documents quickly and easily using the "Share" button in the Ribbon in Word, Excel and PowerPoint.

OneNote 2016, PowerPoint and Word also support co-authoring for documents shared in SharePoint Online, OneDrive and OneDrive for Business. Another new feature is Smart Lookup, which can be used in Word, Excel, PowerPoint and Outlook and uses Bing to search for a term without leaving the application. Changes in PowerPoint include a Designer sidebar to optimize the layout of slides and new chart types and templates in Excel. Word, PowerPoint and Excel also include a data loss prevention feature. Office 2016 also includes the ability to insert an online video in OneNote.

Microsoft Office 2016 was released on OS X for Office 365 customers on July 9, 2015. The licensed version for Windows and OS X was released on Sept. 22, 2015. Microsoft released a November update to Windows Office Insiders on December 3, 2015 and to Office 365 Current Branch users on December 9, 2015. The update included new features for Word, Excel, PowerPoint and One Note. One new feature in the November includes a "Send a copy" or "Send a PDF" link in documents in Word and PowerPoint.

Posted by: Jack prabha at 06:44 AM | No Comments | Add Comment
Post contains 285 words, total size 2 kb.

April 09, 2020

What Does a Network Administrator Do?

A network administrator is responsible for keeping an organization’s computer network up-to-date and operating as intended. Any company or organization that uses multiple computers or software platforms needs a network admin to coordinate and connect the different systems. Seems simple enough—but there’s another common IT job title that may trip you up: systems administrator.

Find more: Workstation PC

So, is a network administrator the same thing as a systems administrator?
In short—not really. But the lines can blur depending on the work environment. Careers in IT can sometimes take a page from the rules of Whose Line Is It, Anyway?—"Where the titles don’t matter and the duties are made up!” While that’s clearly a bit of an exaggeration, in many smaller organizations, the terms "network administrator” and "systems administrator” are often interchangeable as they cover the same tasks. That being said, the differences between network and systems administrators become much clearer in large organizations. The best way to differentiate between the two is to examine the type of work they do—so let’s dive in.

Posted by: Jack prabha at 09:36 AM | No Comments | Add Comment
Post contains 180 words, total size 1 kb.

April 07, 2020

Information Technology Administration

As a technology enthusiast, you’re determined to take on a career path that challenges you to reach your full potential. Perhaps, you should consider a future in IT administration. This profession appeals greatly to analytical types with an appreciation for advanced network systems, mobile applications, and cybersecurity.

At ACU Online, our Bachelor of Science in Information Technology Administration offers a versatile program intended to prepare you for the challenges you might face in an IT career. You’ll also be equipped to grow and respond as the profession evolves, which is sure to undergo exciting changes in the next few years.

Read on to learn more about this valuable degree program—and to discover how it could lead to your next job.

Essential Skills for Becoming an IT Administrator
IT administration requires an analytical mindset in which no detail is too small to warrant consideration. Beyond this, however, a variety of skills are necessary. Some of these skills may come naturally to some professionals, but others need to be developed in an academic setting or on the job.

Posted by: Jack prabha at 12:10 PM | No Comments | Add Comment
Post contains 179 words, total size 1 kb.

April 03, 2020

Implement Secure LAN Transmission

Although SSL can be used within a LAN and in an intranet, it requires a security server (which function IIS fulfills) and can get in the way of applications that are working across a LAN. The answer to this is Internet Protocol Security (IPSec), which works between any two computers over a network to supply encrypted transmission of information without a security server and without getting in the way of applications. IPSec is a part of IP and works at the third (Network) layer, below any applications, and therefore seldom interferes with them.

The IPSec Process IPSec is almost totally automated, and once group policies are established for its operation, network users don't realize that their network communication is taking place securely. The process for establishing and carrying out IPSec is as follows:

  1. Domain or local computer policies are established that specify what network traffic needs to be secure and how that security will be handled.
  2. Based on the policies, IPSec establishes a set of filters to determine which network packets require secure transmission.
  3. When IPSec receives from a sending application a series of network packets that require secure transmission, the sending computer passes this fact to the receiving computer. The two computers exchange credentials and authenticate each other according to IPSec policies.
  4. Given authentication, the two computers work out an algorithm whereby each computer can generate the same private key without having to transmit the key over the network, again according to IPSec policies.
  5. The sending computer uses the private key to encrypt the packets it is transmitting, digitally signs them so that the receiving computer knows who is sending the packets, and then transmits the packets.
  6. The receiving computer authenticates the digital signature and then uses the key to decrypt the packets and send them on to the receiving application.
Know more: what does lan mean

Posted by: Jack prabha at 01:42 PM | No Comments | Add Comment
Post contains 312 words, total size 2 kb.

April 01, 2020

The Benefits of a dedicated DHCP Server

A better approach than trying to use DHCP on your router/switch is to use a centralized DHCP server. This is particularly true for network environments that require support of both DHCP for IPv4 and DHCP for IPv6 at the same time. Virtually all DHCP server vendors support both protocols so you can use the same management interface for IPv4 and IPv6. There are several benefits that make it advantageous for an enterprise to use DHCPv6.

Read more: how dhcp works

  • Having a DHCPv6 server that is integrated into your IP Address Management (IPAM) system for IPv6 gives visibility to the IPv6-enabled client nodes.
  • You also would want this same functionality for IPv4. As IPv4 address space becomes increasingly constrained, you will want to keep track of your DHCP scopes and determine if your lease time is adequate with the plethora of BYOD systems joining your networked environment.
  • DHCP servers provide logging and management interfaces that aid administrators manage their IP address scopes. Your organization will want an accounting of what is on your network regardless of IP version being used.
  • DHCP servers can provide redundancy and high availability. If one DHCP server were to fail, the clients will preserve their current IP addresses and not cause an interruption for the end-nodes.
  • Organizations will prefer a DHCPv6 server that has been tried and tested. For example, The Infoblox DHCPv6 server has been certified as "IPv6 Ready” by the USGv6 certification laboratory.

Organizations that are beginning to implement IPv6 should migrate DHCP for IPv4 scope off the routers/switches and put them on a robust DHCP server infrastructure. This change will also mean that your organization would want to have DHCP operate the same for both protocols. Enterprise organizations will want to take advantage of the centralized dual-protocol DHCP server to provide IPv4 and IPv6 addresses to client devices.

Posted by: Jack prabha at 08:24 AM | No Comments | Add Comment
Post contains 313 words, total size 2 kb.

The Benefits of a dedicated DHCP Server

A better approach than trying to use DHCP on your router/switch is to use a centralized DHCP server. This is particularly true for network environments that require support of both DHCP for IPv4 and DHCP for IPv6 at the same time. Virtually all DHCP server vendors support both protocols so you can use the same management interface for IPv4 and IPv6. There are several benefits that make it advantageous for an enterprise to use DHCPv6.

Read more: how dhcp works

  • Having a DHCPv6 server that is integrated into your IP Address Management (IPAM) system for IPv6 gives visibility to the IPv6-enabled client nodes.
  • You also would want this same functionality for IPv4. As IPv4 address space becomes increasingly constrained, you will want to keep track of your DHCP scopes and determine if your lease time is adequate with the plethora of BYOD systems joining your networked environment.
  • DHCP servers provide logging and management interfaces that aid administrators manage their IP address scopes. Your organization will want an accounting of what is on your network regardless of IP version being used.
  • DHCP servers can provide redundancy and high availability. If one DHCP server were to fail, the clients will preserve their current IP addresses and not cause an interruption for the end-nodes.
  • Organizations will prefer a DHCPv6 server that has been tried and tested. For example, The Infoblox DHCPv6 server has been certified as "IPv6 Ready” by the USGv6 certification laboratory.

Organizations that are beginning to implement IPv6 should migrate DHCP for IPv4 scope off the routers/switches and put them on a robust DHCP server infrastructure. This change will also mean that your organization would want to have DHCP operate the same for both protocols. Enterprise organizations will want to take advantage of the centralized dual-protocol DHCP server to provide IPv4 and IPv6 addresses to client devices.

Posted by: Jack prabha at 08:24 AM | No Comments | Add Comment
Post contains 313 words, total size 2 kb.

<< Page 1 of 1 >>
41kb generated in CPU 0.0116, elapsed 0.0411 seconds.
32 queries taking 0.0322 seconds, 84 records returned.
Powered by Minx 1.1.6c-pink.