Windows 10: What’s in it for Work?

Highlights from Windows 10 Introductory Presentation: Windows 10 is the next OS from Microsoft. In this article, let’s see some interesting features available in it for work. * Windows 10 detects and adapts to the device and it’s capabilities (mobile, touchscreen, keyboard/mouse, etc.) automatically. Streamlined and universal app platform for…

Continue reading

Boosting SIP Trunk Security: 5 Tips

Session Initiation Protocol (SIP) trunking remains a popular alternative to time division multiplexing (TDM) trunks as a cost-effective way to leverage VoIP services and pave the way for more sophisticated universal communications (UC) services such as real-time video conferencing or instant messaging. It’s not all good news, however — in…

Continue reading

ERP on Wearable Devices

I went to an event hosted by Ramco Systems at Chennai, India (my hometown) where they demonstrated their ERP App for wearable devices like Google Glass and Pebble Smart Watch. But first, see this introductory video on Google Glass: And here’s the Google Glass that I saw (and saw through)…

Continue reading

Distributed Core/Leaf-Spine Network Architecture: An Intro

Distributed Core/Leaf-Spine Network Architecture is catching up with large data center/cloud networks due to its scalability, reliability, and better performance (vs. 3-tier Core-Aggregation-Edge Tree Networks). Maybe it’s time for enterprises and smaller networks to consider implementing Distributed Core/Leaf-Spine Networks, as the architecture enables companies to start small and scale up…

Continue reading

Bluetooth Monitoring?

Monitoring the Wi-Fi spectrum for unauthorized connections/probing/intrusion is quite common, but what about the Bluetooth spectrum? Shouldn’t unauthorized connections be monitored there too? Isn’t it possible for a scammer to connect with a Laptop, Computer or handheld device from outside your premises via Bluetooth and steal confidential info like payment…

Continue reading