Change and Configuration Auditing for File Servers

There are numerous software applications available today for file server change and configuration auditing. These applications continuously monitor files server configuration state, report about any changes to data stored there, and alert system administrators in real-time when a confidential file is tampered with, or an important server configuration is changed. Such change and configuration... »

Boosting SIP Trunk Security: 5 Tips

Session Initiation Protocol (SIP) trunking remains a popular alternative to time division multiplexing (TDM) trunks as a cost-effective way to leverage VoIP services and pave the way for more sophisticated universal communications (UC) services such as real-time video conferencing or instant messaging. It’s not... »

ERP on Wearable Devices

ERP on Wearable Devices

I went to an event hosted by Ramco Systems at Chennai, India (my hometown) where they demonstrated their ERP App for wearable devices like Google Glass and Pebble Smart Watch. But first, see this introductory video on Google Glass: And here’s the Google Glass... »

Predictive Analytics for IT Systems, Anyone?

You can identify a potential IT system/network problem, a few minutes or hours before it actually happens. Predictive Analytics for IT systems enables you to do that and more. And such systems (though new) are available today. What is Predictive Analytics for IT Systems?... »

MoCA: Carry Data & Video over Coaxial Lines

MoCA: Carry Data & Video over Coaxial Lines

MoCA stands for Multimedia over Coax Alliance. It’s a technology that enables coaxial lines (provided for Cable TV) to carry data, voice and video inside a home/small office. It’s an alternative to wired/wireless/powerline networking technologies. Advances in home networking segment (such as this) might... »

DHCP Fingerprinting: Identify Device type, vendor and OS

What is DHCP Fingerprinting? A DHCP client interacts with the DHCP server in a network to obtain unique IP address (for the session). But it also acquires other info like default gateway, DNS server, etc. During the DHCP protocol exchange, there is an option... »

Distributed Core/Leaf-Spine Network Architecture: An Intro

Distributed Core/Leaf-Spine Network Architecture: An Intro

Distributed Core/Leaf-Spine Network Architecture is catching up with large data center/cloud networks due to its scalability, reliability, and better performance (vs. 3-tier Core-Aggregation-Edge Tree Networks). Maybe it’s time for enterprises and smaller networks to consider implementing Distributed Core/Leaf-Spine Networks, as the architecture enables companies... »

Bluetooth Monitoring?

Monitoring the Wi-Fi spectrum for unauthorized connections/probing/intrusion is quite common, but what about the Bluetooth spectrum? Shouldn’t unauthorized connections be monitored there too? Isn’t it possible for a scammer to connect with a Laptop, Computer or handheld device from outside your premises via Bluetooth... »

PCoIP: Enabling Graphics with Desktop Virtualization

PCoIP, developed by Teradici (and licensed by desktop virtualization vendors) is a useful protocol that enables high-definition and 3D graphics (among other demanding applications) without lag in centralized DV scenarios. PCoIP is a desktop display protocol that transmits encrypted images of desktop sessions to... »

Asus Zenfone 5: Advantages & Limitations

Asus Zenfone 5: Advantages & Limitations

Disclaimer: This post is about a new phone we bought, and are excited about. It is not about Computer Networking/IT Technologies. Video Introduction: So we bought this new Asus Zenfone 5 Smart Phone recently. Here is our observation on the main advantages and limitations... »

Cloud ERP: Should You Opt for it?

An ERP (Enterprise Resource Planning) suite is a software application that integrates multiple department functions into a single platform. With everything else available on the cloud, why should the ERP software be on-premises only? There are vendors who specialize in Cloud ERP solutions now, and... »

Delivering your Desktop from the Public Cloud?

I guess you are familiar with Desktop Virtualization. Using it, companies can host (and process) user’s desktop sessions in their data centers, and just send the desktop image to the end-user terminal over the network. This process happens within the enterprise network/private cloud. What... »

Zero Clients – Advantages and Limitations

What are Zero Clients? You maybe familiar with a thin client used in desktop virtualization. There is also something called as Zero Client, also used in desktop virtualized scenarios. In a Zero Client – unlike a thin client – there is no CPU, no local storage,... »

Get email updates when new articles are published

Enter your email address:

Delivered by FeedBurner

Network equipment

Follow me in Twitter!