Bluetooth Monitoring?

Monitoring the Wi-Fi spectrum for unauthorized connections/probing/intrusion is quite common, but what about the Bluetooth spectrum? Shouldn’t unauthorized connections be monitored there too? Isn’t it possible for a scammer to connect with a Laptop, Computer or handheld device from outside your premises via Bluetooth and steal confidential info like payment card numbers, etc.? Especially... »

PCoIP: Enabling Graphics with Desktop Virtualization

PCoIP, developed by Teradici (and licensed by desktop virtualization vendors) is a useful protocol that enables high-definition and 3D graphics (among other demanding applications) without lag in centralized DV scenarios. PCoIP is a desktop display protocol that transmits encrypted images of desktop sessions to... »

Asus Zenfone 5: Advantages & Limitations

Asus Zenfone 5: Advantages & Limitations

Disclaimer: This post is about a new phone we bought, and are excited about. It is not about Computer Networking/IT Technologies. Video Introduction: So we bought this new Asus Zenfone 5 Smart Phone recently. Here is our observation on the main advantages and limitations... »

Cloud ERP: Should You Opt for it?

An ERP (Enterprise Resource Planning) suite is a software application that integrates multiple department functions into a single platform. With everything else available on the cloud, why should the ERP software be on-premises only? There are vendors who specialize in Cloud ERP solutions now, and... »

Delivering your Desktop from the Public Cloud?

I guess you are familiar with Desktop Virtualization. Using it, companies can host (and process) user’s desktop sessions in their data centers, and just send the desktop image to the end-user terminal over the network. This process happens within the enterprise network/private cloud. What... »

Zero Clients – Advantages and Limitations

What are Zero Clients? You maybe familiar with a thin client used in desktop virtualization. There is also something called as Zero Client, also used in desktop virtualized scenarios. In a Zero Client – unlike a thin client – there is no CPU, no local storage,... »

WW-DRT: Open Source Wi-Fi Router Firmware

It is possible to replace the firmware/GUI that comes built-into most consumer-grade wireless routers with a third-party open source firmware (DD-WRT). But why should you do that? To increase the features and functionality of the consumer-grade wireless router, of course. You may not be able... »

Event: HP World Tour 2014 (Mumbai, India, July 04)

HP World Tour 2014 event will be held on July 04 at the Grand Hyatt Hotel, Santacruz, Mumbai, India. This is a one-day business conference featuring (among others) spotlight sessions on hot topics like Big Data, Cloud, Mobility & Security. HP Executives, industry luminaries... »

My First Novel has been Published as an eBook!

Disclaimer: This is a general post, not related to Computer Networking/IT Technologies. If you were wondering why I’ve not been active on this blog for sometime, it’s because I was busy writing a novel! This story is titled – ‘The Archers Revenge’ and has... »

An Interesting Perspective on ERP Systems

ERP or Enterprise Resource Planning System/Software is an important enterprise application that integrates all the individual department functions into a single software application. But an ERP System is not a magic wand that will solve all the problems faced by companies, and increase profits/reduce errors,... »

Can you buy Network Switches & Load an OS of Your choice? – Yes!

On the day of writing this article, customers can buy bare-metal or white-box network switches and load any one from (at least) three flavors of Linux-based network operating systems, into it. If that makes you hope that network switches may one day become like general-purpose... »

What is a SIP Threat Management Device (STM)?

You may be familiar with UTM – Unified Threat Management device, but have you come across an STM – SIP Threat Mangement device, that is used to protect the IP PBX and IP Phones/Telephony infrastructure from threats/attacks? Here is a guest post by Martin... »

Increase Data Center Energy Efficiency – Learn from Facebook & Google!

Let’s admit it – Data Centers are tremendous energy guzzlers. Anti-Green. But, you wouldn’t have much of a reason to think about improving the energy efficiency of data centers just because you need to make the earth a greener place to live in. But... »

Get email updates when new articles are published

Enter your email address:

Delivered by FeedBurner

Network equipment


Bi-Monthly Computer Networking/IT Industry Updates (12 – 25 Aug. ’14)

By Rajesh K

Hello, Welcome to bi-monthly Computer Networking/IT industry updates. In this edition, let’s look at product releases and news from the vendors in our industry,... »