June 8, 2011

Digital ants protect critical infrastructure

Wake Forest University security expert developed “digital ants” to protect critical networks; unlike traditional security approaches, which are static, digital ants wander through computer networks looking for threats such as computer worms, self-replicating programs designed to steal information or facilitate unauthorized use of computers; when a digital ant detects a threat, it summons an army of ants to converge at that location, drawing the attention of human operators to investigate

“The idea is to deploy thousands of different types of digital ants, each looking for evidence of a threat,” Fulp said. “As they move about the network, they leave digital trails modeled after the scent trails ants in nature use to guide other ants. Each time a digital ant identifies some evidence, it is programmed to leave behind a stronger scent. Stronger scent trails attract more ants, producing the swarm that marks a potential computer infection.”

The concept has proven successful in testing on a small scale, but will it still work when it’s scaled up to protect something as large and complex as the nation’s power grid? Fulp and two of his students — computer science graduate students Michael Crouse and Jacob White — are working this summer with scientists at PNNL and from the University of California at Davis to answer that question. Even using PNNL’s vast computer platforms, they can only rely on computer simulations to predict the ants’ “behavior” up to a point.

“In nature, we know that ants defend against threats very successfully,” Fulp said. “They can ramp up their defense rapidly, and then resume routine behavior quickly after an intruder has been stopped. We’re trying to achieve that same framework in a computer system.”

June 7, 2011


QR is short for Quick Response. A QR Code is a two-dimensional barcode, which has encoded in it a URL (web address), text, calendar event, contact info (such as a vCard), email address, SMS, geo location or other information. They come to us from Japan where they are very common. It can be read by a QR code scanner, including QR scanner smart phone apps.

QR codes link offline information to online content, effectively providing additional information and even multimedia to an offline experience. If you’ve created print material that included a URL for more information, a QR code for that URL could also be added to enable smart phone users to go directly to that web page without having to type in the web address.

Your business, no matter how small or large could use QR codes in a number of ways. You might auto generate one next to every product on your web site containing all the product details, the number to call and the URL link to the page so they can show their friends on their cell phone. You could add one to your business card containing your contact details so it’s easy for someone to add you to their contacts on their cell phone.

There’s a place for QR codes in your marketing toolbox. Most of current advertisements that uses QR codes.

  • ·         QR Codes on business cards.
  • ·         Labelling.
  • ·         Storefront displays.
  • ·         Promotions, discounts and giveaways.
  • ·         Laptop stickers.
  • ·         T-shirts.
  • ·         Use QR codes to get Likes and Follows.

You can easily generate a QR code using a site like:-





May 26, 2011

Xen Virtual Desktop

One of the latest trends in business desktops are virtual desktop. Citrix Xen desktop playing major role here. It delivers any desktop, any user and any location. In today’s business environment mobile employees are more. Where ever user moves he gets all the access. Managing or setting up small offices with physical desktops are highly expensive. This is one of the challenges addressed by virtual desktops. Power and cooling requirement. Earlier the delivery quality and speed of virtual desktops was bad. Now the access speeds increased, delivery quality matured. Antivirus, patch management, deployment of new applications, setting up of new work stations. These are the areas we have major savings. Once we deploy virtual desktops. Virtual desktops accessible from laptop, smart phones and other smart devises. This is one of the major IT cost saving technology.

May 8, 2011

PMI – AGC PMP Certification Exam Preparation (In-House Training) Seminar on 12 – 16 & 19 – 24 March 2011 (10 evening sessions), Traders Hotel, Dubai, U.A.E.

 PMI - AGC PMP Certification Exam Preparation (In-House Training)

PMI - AGC PMP Certification Exam Preparation (In-House Training)

Ten SME’s (subject Matter Expertise) handled the training. That was the beauty of the training. Each day different trainer with PMP body of knowledge. Training provided good understanding of PMBOK4. Now the turn to materialise it. Through clear exam and practical use. All participants are interactive and helpful. Lot of good discussion and sharing. Trainers and trainees shared couple of documents to achieve milestones. Venue and the organising were excellent. These types of training sessions and events handling by PMI – AGC are appreciated. Getting benefitted both attendees and trainers. In terms of knowledge, experience and PDU.

 PMI - AGC PMP Certification Exam Preparation (In-House Training)

PMI - AGC PMP Certification Exam Preparation (In-House Training)

April 25, 2011

Smart phones and Tablets

The smart phones and tablets market is incredibly hot. More players are there in the market to compete. Smart phones and tablets are coming with high processing capacity, and new features. This reduces the sales of laptops, desktops and normal phones. The convenience from smart phones and tablets are much higher than ordinary systems. The trend moving towards that. Solid state drives devices and long battery back. Convenient to use all range of users, mobility, portability and faster. Consumer Electronic market is flooded with lot product ranges. Now these products are less expensive.

March 10, 2011

Cloud Computing World Forum Middle East and Africa in Dubai

I had a chance to attend the conference (09-03-2011). It was rich contented and lot of thought process in different angles. Its benefits, commercials, challenges, security, legal and future. One thing sure the drive is towards cloud, it’s private, public and hybrid. Cloud computing is there the time internet started or the mainframe started. Now the service delivery models changed. Tomorrow this service can call it as different name with some added value or modifications. Discussion of PaaS, IaaS, SaaS was fruitful and given thought of the service model. Cloud model has CAPX and OPX benefits. But it’s depends the maturity of the organization or how the approach is. Couple of challenges related to this region discussed about the connectivity, legal aspects and security. More and more players coming this market with different service design. The concept still to go for more maturity and definitions. Virtualisation, consolidation, thin clients are the couple of components making this journey. Anywhere any time access. Optimization and de-duplication also part in it.

Cloud Computing World Forum Middle East and Africa in Dubai

March 3, 2011

Security Threats In VoIP

Users have been exposed to the risks of sending data over the Internet while at the same time having the expectation that telephone conversations are strictly confidential. Security issues in the data and voice networks are in fact very similar, but completely separate in the minds of most users. Major security concerns of VOIP networks.

• Phreaking
Phreaking is a slang term coined to describe the activity of a subculture of people who study, experiment with, or explore telecommunication systems. This is sometimes called the H/P culture (with H standing for hacking and P standing for phreaking). Through this making calls through another user network, putting cost to that person.
• Eavesdropping
Eavesdropping is how most hackers steal credentials and get important information like business data. Through eavesdropping, a third party can obtain names, password and phone numbers, allowing them to gain control over voicemail, calling plan, call forwarding and billing information.
• Vishing
Vishing is a party calling you faking a trustworthy organization (e.g. your bank) and requesting confidential and often critical information.
• DoS (Denial of Service)
DoS attacks can be carried out by flooding a target with unnecessary SIP call-signaling messages, thereby degrading the service.
• SPIT (Spamming over Internet Telephony)
SPIT attacks consist of sending a voicemail to a person, masquerading it with information from a party trustworthy to the receiver, like a bank or online paying service, making him think he is safe.
• Man-in-the-middle attacks
VoIP is particularly vulnerable to man-in-the-middle attacks, in which the attacker intercepts call-signaling SIP message traffic and masquerades as the calling party to the called party, or vice versa. Once the attacker has gained this position, he can hijack calls via a redirection server.

February 10, 2011

Identity management and single sign-on (SSO)

Identity management has become a very important issue in IT today. As Web applications have grown throughout the years to support many of our business processes, these same applications have expanded the number of users, groups and roles that must be managed. The more systems that are put in, the greater the burden on the systems administration and help desk teams. If we list the number of accounts we are holding to operate business application, it’s huge. If we don’t have an identity and SSO, below are the major problems.

a) Too many credential
b) Which one for which application
c) Multiple logons
d) Provisioning new accounts
e) Password management
f) Auditing user activity
g) De-provisioning users
h) Managing non-employees access

January 10, 2011


Technology and concept is changing day by day. New strategy and solutions. Interaction and integration is vital everywhere. To thrive in today’s economy, you have to collaborate with colleagues, partners, and customers around the globe at a moment’s notice. At the same time, you want to conduct your business in a way that enhances the quality of your relationships. Here are numerous applications for telepresence, ranging from corporate conferencing to remote surgery. It is actively used for both of these things, and can also be seen in the education field, using telepresence to connect educators, students, and professionals across varying distances. Some companies also use telepresence in dangerous spaces, such as under the sea or deep within the Earth, to allow employees to visit the site without putting themselves at risk. As the technology is refined, developers claim, people could use telepresence to visit archaeological sites without damaging them, or to take trips to distant regions.

Read More:-
1. Cisco Telepresence
2. Polycom Telepresence
3. Telepresence World

December 23, 2010

Cloud Infrastructure

I was reading through the could infrastructure. It’s going to change the way we work with infrastructure. For me as an infrastructure professional it’s change the environment. Very easy to build the systems. Easy access, easy disconnection and lot more change the way we manage.

My end user desk tops are from cloud. My server’s and application’s are from cloud. I will be keeping a big pipe WAN link, dump terminals, telephones, and LAN connections of these. The entire infrastructure is from cloud. Applications are browser based. All the applications are accessed through an integrated area or form a portal. All the infrastructure is managed cloud provider. Locally no server, no data, no application. More and more mobile workers. Good to see more……

Cloud Infrastructure