Deciding to move on to a cloud means moving your data into somebody’s computers. To develop your computing facilities without investing in hardware and infrastructure is what cloud computing all about. In an organization, you may be the decision maker thanking about whether to put your data in a third party cloud or in your own cloud. You can have a look at the following advantages and disadvantages of cloud so that you can make an informed decision on whether you should switch over to third party cloud infrastructures. [Read more…]
You may need to add new disk to your Linux LVM for various reasons such as for adding capacity for your existing applications or new applications. This post aims to show you how you can add a new disk to your existing LVM as well as to a new LVM. The difference between adding a new disk to a new LVM and to an existing LVM is that in the latter case you do not have to create a new volume group using vgcreate command. [Read more…]
This post aims to help learn how to connect an android mobile to laptop for sharing Internet connection. For USB tethering, you must need to your mobile’s USB cable to connect to the computer or can use wireless connection. [Read more…]
Massachusetts Crime Watch has developed a useful home security list that helps to enhance home security. If you are looking for simple tips to make your home safer than before, have a look at the following list. Remember that you do not need to implement all the recommendations. Have a look at the list at first and then decide which recommendation fits your needs. [Read more…]
You may be subject to intelligence espionage while you travel in foreign countries. There can be a number of reasons whey you can be a target. You can be government officials or may be a business person. If the intelligence agency in the foreign country thinks you possess valuable information, you can be a victim. This post helps you identify the clues that may suggest that someone is trying to gather intelligence from you while you are travelling the host country and helps you to mange your travel risk to a mimimum level.
There are only a handful of tools for checking Windows server vulnerabilities. If you are familiar with Microsoft security tools testing tools you may have noticed that their tools focus on the security configuration setting of the server. What if your server has a number of applications such as PHP, MySQL or any other database related extension. Rapid7 has a community edition(free edition) for checking Windows server vulnerabilities. Securitywing has tested this edition of Nexpose in a test environment built with a Windows 2008 r2 server. The followings are the procedures you can follow to check your windows security. [Read more…]
One of the quickest and easiest ways to hardening your windows server 2008 r2 security is using automated tools to check the current security status of your server. Once you identify the security loopholes in the server, you can fix those security issues straight away. The good thing is that most of the tools can suggest a list of recommended settings that you need to use to fix the security drawbacks. The tools that you can use for securing Windows 2008 servers are:
- SCM ( Windows security compliance manager)
- MBSA (Microsoft baseline security analyzer)
- SCW ( Security configuration wizard) [Read more…]
Since router is the key to access an organization’s network from the outside world, the maximum security priority should be given to routers that are connected to the Internet and to the important application servers. ISO-27001 has already defined standard router security checklist, which any organization can use to improve their router securities. This post aims to familiarize you with some critical router security checklist so that you can have an in-depth and clear understanding of router security standards.
Sustainable growth of a company is not any easy task and it is a clear indicative of a company’s objective of continuous quality control. In today’s world we see that there are only a handful number of companies that stand out others with their product. Why only a few company is making billions when some are thinking about closing down a product’s life cycle or even closing their business.? The reason is not straight forward, but one of the major reason of a company’s excelling in performance is its ability to control and improve the quality of the products. This article is not about what the quality control is all about , it is about what the quality pioneers though about quality control.
Dr. W. Edwards Deming
One of the leading force of the 19th century behind the development of quality control management process. he was born in Iowa, USA in October 1900 and received a Bachelor degree in Electrical Engineering and a PhD in the same subject. His philosophy of quality control are simple and easy-to-follow. Below are some of his philosophy that I’ve explained with my own understanding of quality control.
- Identify the common and special causes that influence the quality of a product. There are some common causes that is inherent to that system and control the quality of a particular product-by ensuring that these common causes are not a threat or at least reducing the probability of occurring such threats during process of producing a product will certainly improve quality. [Read more…]
This article will show you a few but the most important sample questions and answers that a project manager may face in an interview.Please read all the questions carefully and prepare your own version of the answers depending on what kind or type of projects you already have completed.
Q: Please describe a project that you undertaken?
I have the opportunity to undertake a data network capacity upgrade and software update project of a mobile phone operator. The project objective was to increase data capacity and update the data node software’s in order to provider our user’s better bandwidth and to accommodate more users at a time in the network. The project was mainly divided into the following parts. [Read more…]