Archive for ‘Network’

July 17, 2011

Smart Phones & Tablets to Work

In corporate environment more and more knowledge workers are using Smart Phones & Tablets. Virtualised working environment is developing. Geographically dispersed professionals are working through collaboration tools. Technologies such as Video conferencing, IP Telephony, Portal, Virtual Client, and Cloud etc.. Smart Phones & Tablets are catering the requirement to work remotely and virtually.

Smart Phones & Tablets to Work

Smart Phones & Tablets to Work

Last week I read the Toastmaster Magazine June 2011 edition. Article “Presentations TO GO!” Written by Dave Zielinski describing about couple of tools which useful for presentations and toastmaster speeches.  That is the thread I’m presenting here.

Applications which are supports smart phones & tablets. Those applications are very useful to work from smart phones & tablets. I’m listing those applications below.

  • Keynote Presentation Design Software
  • Documents to Go
  • ThinkFree Mobile
  • Prompster
  • ProPrompter
  • SpeechPrompter
  • Dragon Dictation

Advertisements
July 4, 2011

Cloud Client Computing

Client cloud computing offers lot of benefits to the organisation. Energy efficient (Green IT), up to date, more reliable, access anywhere, portable, mobility, cost effective, easy to deploy, easy to re-store, less management and maintenance. Client computing challenges are handled by cloud client computing.  To maintain client systems, every organisations spending good amount money. Engineers required all the sites. These challenges handled by cloud. In this category I can recommend a product Wyse.

Cloud Client Computing

Cloud Client Computing

Wyse Cloud Client Portfolio

  1. Wyse Cloud Clients
    • Wyse Thin Clients – Sophisticated. Secure. Friendly. Performance with flexible functionality.
    • Wyse Zero Clients – Simple. Secure. Stingy. Performance with dedicated functionality.
    • Cloud PCs – Familiar. Performance. Improved. The PC, only better – with centralized OS, applications, and content.
  2. Handhelds – Complete support for Apple iOS and Google Android smartphones and tablets viaWyse PocketCloud, the leading Mobile Cloud Software for enterprises and consumers.
  3. Wyse Ultra-thin Firmware – Wyse ThinOSLinuxWindows CE and Windows Embedded Standard– the most comprehensive, secure, scalable and reliable cloud client firmware suite in the industry.

Wyse Cloud Software Portfolio

  1. Wyse Cloud Client Software
    • Wyse Zero™ – Cloud-based technology engine powering a new world of cloud-connected dedicated Zero Clients.
    • Wyse Mobile Cloud Software – Wyse PocketCloud, the leading cloud-based mobile app suite connecting you to your personal, private or public cloud from any handheld.
    • Wyse Cloud PC Software – Cloud-based software to cloudify your PCs, TCs, or VMs by centralizing their OS, apps and content in a private cloud.
  2. Wyse Management Software – Secure. Scalable. Cloud-centric remote device management for the extended enterprise.
  3. Wyse Virtualization Software – Delivering the best user experience and optimized performance for any cloud client deployment.

June 23, 2011

Virtual Desktop to Smartphone and Tablets

In this platform we were discussed about cloud, virtualisation, smart phones, and tablets. Knowledge workers and mobile workers are increasing in corporate environment. The main devises in use is Smartphone and Tablets. More and more companies and users are moving towards this direction. This year survey shows the PC sales slips and Smartphone sales increased.

Virtual Desktop to Smartphone and Tablets

Virtual Desktop to Smartphone and Tablets

Now we have to work for how to deliver the desktop features to smart phones and tablets. Security and application delivery are key-points. Cortado Workplace is the central hub for your mobile requirements. Whether with smartphone, tablet, PC, Mac or notebook – Cortado Workplace allows round-the-clock access to your files and documents. Exchange them between devices and work on the go just as with your desktop PC. It supports all the smart phone and tablet platforms.

  • iPhone & iPad
  • BlackBerry
  • Android
  • Symbian

Key Features:-

  • Seamless integration of smartphones and tablets
  • Use of the existing IT infrastructure
  • One solution for all mobile plattforms
  • Maximum level of security
  • Optimal operation for each device
  • Multi-device support

March 10, 2011

Cloud Computing World Forum Middle East and Africa in Dubai

I had a chance to attend the conference (09-03-2011). It was rich contented and lot of thought process in different angles. Its benefits, commercials, challenges, security, legal and future. One thing sure the drive is towards cloud, it’s private, public and hybrid. Cloud computing is there the time internet started or the mainframe started. Now the service delivery models changed. Tomorrow this service can call it as different name with some added value or modifications. Discussion of PaaS, IaaS, SaaS was fruitful and given thought of the service model. Cloud model has CAPX and OPX benefits. But it’s depends the maturity of the organization or how the approach is. Couple of challenges related to this region discussed about the connectivity, legal aspects and security. More and more players coming this market with different service design. The concept still to go for more maturity and definitions. Virtualisation, consolidation, thin clients are the couple of components making this journey. Anywhere any time access. Optimization and de-duplication also part in it.

Cloud Computing World Forum Middle East and Africa in Dubai

March 3, 2011

Security Threats In VoIP

Users have been exposed to the risks of sending data over the Internet while at the same time having the expectation that telephone conversations are strictly confidential. Security issues in the data and voice networks are in fact very similar, but completely separate in the minds of most users. Major security concerns of VOIP networks.

• Phreaking
Phreaking is a slang term coined to describe the activity of a subculture of people who study, experiment with, or explore telecommunication systems. This is sometimes called the H/P culture (with H standing for hacking and P standing for phreaking). Through this making calls through another user network, putting cost to that person.
• Eavesdropping
Eavesdropping is how most hackers steal credentials and get important information like business data. Through eavesdropping, a third party can obtain names, password and phone numbers, allowing them to gain control over voicemail, calling plan, call forwarding and billing information.
• Vishing
Vishing is a party calling you faking a trustworthy organization (e.g. your bank) and requesting confidential and often critical information.
• DoS (Denial of Service)
DoS attacks can be carried out by flooding a target with unnecessary SIP call-signaling messages, thereby degrading the service.
• SPIT (Spamming over Internet Telephony)
SPIT attacks consist of sending a voicemail to a person, masquerading it with information from a party trustworthy to the receiver, like a bank or online paying service, making him think he is safe.
• Man-in-the-middle attacks
VoIP is particularly vulnerable to man-in-the-middle attacks, in which the attacker intercepts call-signaling SIP message traffic and masquerades as the calling party to the called party, or vice versa. Once the attacker has gained this position, he can hijack calls via a redirection server.

February 10, 2011

Identity management and single sign-on (SSO)

Identity management has become a very important issue in IT today. As Web applications have grown throughout the years to support many of our business processes, these same applications have expanded the number of users, groups and roles that must be managed. The more systems that are put in, the greater the burden on the systems administration and help desk teams. If we list the number of accounts we are holding to operate business application, it’s huge. If we don’t have an identity and SSO, below are the major problems.

Problems:-
a) Too many credential
b) Which one for which application
c) Multiple logons
d) Provisioning new accounts
e) Password management
f) Auditing user activity
g) De-provisioning users
h) Managing non-employees access

January 10, 2011

TelePresence

Technology and concept is changing day by day. New strategy and solutions. Interaction and integration is vital everywhere. To thrive in today’s economy, you have to collaborate with colleagues, partners, and customers around the globe at a moment’s notice. At the same time, you want to conduct your business in a way that enhances the quality of your relationships. Here are numerous applications for telepresence, ranging from corporate conferencing to remote surgery. It is actively used for both of these things, and can also be seen in the education field, using telepresence to connect educators, students, and professionals across varying distances. Some companies also use telepresence in dangerous spaces, such as under the sea or deep within the Earth, to allow employees to visit the site without putting themselves at risk. As the technology is refined, developers claim, people could use telepresence to visit archaeological sites without damaging them, or to take trips to distant regions.

Read More:-
1. Cisco Telepresence
2. Polycom Telepresence
3. Telepresence World

December 23, 2010

Cloud Infrastructure

I was reading through the could infrastructure. It’s going to change the way we work with infrastructure. For me as an infrastructure professional it’s change the environment. Very easy to build the systems. Easy access, easy disconnection and lot more change the way we manage.

My end user desk tops are from cloud. My server’s and application’s are from cloud. I will be keeping a big pipe WAN link, dump terminals, telephones, and LAN connections of these. The entire infrastructure is from cloud. Applications are browser based. All the applications are accessed through an integrated area or form a portal. All the infrastructure is managed cloud provider. Locally no server, no data, no application. More and more mobile workers. Good to see more……

Cloud Infrastructure

December 23, 2010

Orion Network Performance Monitor (NPM)

Orion Network Performance Monitor (NPM) makes it easy to quickly detect, diagnose, and resolve performance issues within your ever-changing corporate or data center network. It delivers real-time views and dashboards that enable you to visually track network performance at a glance. Plus, with our dynamic network topology maps and automated network discovery features, you can keep up with your evolving network without breaking a sweat. And Orion NPM is the easiest product of its kind to use and maintain, meaning you will spend more time actually managing networks, not supporting Orion NPM.