Understanding Networking in Virtual Machine (VM) Environment

Understanding Networking in Virtual Machine (VM) Environment

Server Virtualization packs applications in Virtual Machine (VM) format and runs multiple applications in a single server. So how is networking handled in a scenario where there are multiple VMs in each server, and multiple servers? The above diagram represents networking in one such Virtual Machine environment. (Citrix XenServer. I am using their concept to... »

Steve Jobs by Walter Isaacson (Book Review)

Steve Jobs is the biography of the iconic Apple Executive & CEO, written by Walter Isaacson. I finished reading this book recently and thought why not write a review. So here I am Steve Jobs’ Apple Computers redefined many technological products over the last... »

Why Not Automate Tasks for IT/Networking Products?

IFTTT - IF This Then That – refers to a web service (currently free) that enables the automation of certain (repetitive) tasks for supported applications. In the IoT (Internet of Things) space, companies have built products and applications that support IFTTT, especially in the home automation segment.... »

Change and Configuration Auditing for File Servers

There are numerous software applications available today for file server change and configuration auditing. These applications continuously monitor files server configuration state, report about any changes to data stored there, and alert system administrators in real-time when a confidential file is tampered with, or... »

Boosting SIP Trunk Security: 5 Tips

Session Initiation Protocol (SIP) trunking remains a popular alternative to time division multiplexing (TDM) trunks as a cost-effective way to leverage VoIP services and pave the way for more sophisticated universal communications (UC) services such as real-time video conferencing or instant messaging. It’s not... »

ERP on Wearable Devices

ERP on Wearable Devices

I went to an event hosted by Ramco Systems at Chennai, India (my hometown) where they demonstrated their ERP App for wearable devices like Google Glass and Pebble Smart Watch. But first, see this introductory video on Google Glass: And here’s the Google Glass... »

Predictive Analytics for IT Systems, Anyone?

You can identify a potential IT system/network problem, a few minutes or hours before it actually happens. Predictive Analytics for IT systems enables you to do that and more. And such systems (though new) are available today. What is Predictive Analytics for IT Systems?... »

MoCA: Carry Data & Video over Coaxial Lines

MoCA: Carry Data & Video over Coaxial Lines

MoCA stands for Multimedia over Coax Alliance. It’s a technology that enables coaxial lines (provided for Cable TV) to carry data, voice and video inside a home/small office. It’s an alternative to wired/wireless/powerline networking technologies. Advances in home networking segment (such as this) might... »

DHCP Fingerprinting: Identify Device type, vendor and OS

What is DHCP Fingerprinting? A DHCP client interacts with the DHCP server in a network to obtain unique IP address (for the session). But it also acquires other info like default gateway, DNS server, etc. During the DHCP protocol exchange, there is an option... »

Distributed Core/Leaf-Spine Network Architecture: An Intro

Distributed Core/Leaf-Spine Network Architecture: An Intro

Distributed Core/Leaf-Spine Network Architecture is catching up with large data center/cloud networks due to its scalability, reliability, and better performance (vs. 3-tier Core-Aggregation-Edge Tree Networks). Maybe it’s time for enterprises and smaller networks to consider implementing Distributed Core/Leaf-Spine Networks, as the architecture enables companies... »

Bluetooth Monitoring?

Monitoring the Wi-Fi spectrum for unauthorized connections/probing/intrusion is quite common, but what about the Bluetooth spectrum? Shouldn’t unauthorized connections be monitored there too? Isn’t it possible for a scammer to connect with a Laptop, Computer or handheld device from outside your premises via Bluetooth... »

PCoIP: Enabling Graphics with Desktop Virtualization

PCoIP, developed by Teradici (and licensed by desktop virtualization vendors) is a useful protocol that enables high-definition and 3D graphics (among other demanding applications) without lag in centralized DV scenarios. PCoIP is a desktop display protocol that transmits encrypted images of desktop sessions to... »

Asus Zenfone 5: Advantages & Limitations

Asus Zenfone 5: Advantages & Limitations

Disclaimer: This post is about a new phone we bought, and are excited about. It is not about Computer Networking/IT Technologies. Video Introduction: So we bought this new Asus Zenfone 5 Smart Phone recently. Here is our observation on the main advantages and limitations... »

Get email updates when new articles are published

Enter your email address:

Delivered by FeedBurner

Network equipment

Follow me in Twitter!