Archive

Disaster Recovery for SMEs

by January 7, 2004

Using a normal tape drive, backup software and some other settings, you can easily and safely recover failed systems in no time

Read More [shareaholic app="share_buttons" id="15671367"]

Disaster Recovery in a Call Center

by January 7, 2004

DR plan here calls for building redundancy into it 

Read More [shareaholic app="share_buttons" id="15671367"]

Business Continuity Planning

by January 7, 2004

Equating BCP with disaster recovery or disk storage is a common fallacy. In fact, business continuity is a larger superset of activities and processes, of which DR site or backup disks are just a couple of issues

Read More [shareaholic app="share_buttons" id="15671367"]

Disaster Recovery and Business Continuity Planning

by January 7, 2004

Cut to today, and think of what could …

Read More [shareaholic app="share_buttons" id="15671367"]

DR Planning and Strategies

by January 7, 2004

Some macro-level planning and strategy considerations

Read More [shareaholic app="share_buttons" id="15671367"]

Build and Secure a Wireless Network

by January 6, 2004

If you’re actively considering deploying wireless LAN on your network, start by first defining what you’re going to do with it. What’s the compelling need for it, and what benefits will your business derive out of fulfilling it?

Read More [shareaholic app="share_buttons" id="15671367"]

How to Build a Wireless Network

by January 6, 2004

When designing a wireless network, you need to strike a balance between coverage and bandwidth per user

Read More [shareaholic app="share_buttons" id="15671367"]

Set up a simple wireless network

by January 6, 2004

You don’t have to worry too much about the RF coverage and bandwidth availability. All you need is one or two APs/routers and wireless cards for the clients

Read More [shareaholic app="share_buttons" id="15671367"]

Securing a Wireless Network

by January 6, 2004

Wi-Fi networks are considered to be insecure, but there are ways to make it difficult to break into

Read More [shareaholic app="share_buttons" id="15671367"]

How To Secure Your Wi-Fi LAN

by January 6, 2004

Securing a Wi-Fi network with PEAP, 802.1x and RADIUS protocols using Windows 2003 server

Read More [shareaholic app="share_buttons" id="15671367"]

Embed Videos in HTML Pages

by January 5, 2004

Use Windows Media Player ActiveX control with FrontPage 2000 to do so

Read More [shareaholic app="share_buttons" id="15671367"]

Bandwidth Aggregation

by January 5, 2004

See how you can aggregate bandwidth on both a home PC and on your corporate networks

Read More [shareaholic app="share_buttons" id="15671367"]

It Aint Fully Wireless Yet

by January 5, 2004

Technological advancements and implementation have a long way to go before we can live in a fully wireless world

Read More [shareaholic app="share_buttons" id="15671367"]

Dealing with the EU?

by January 5, 2004

Some pointers on data protection and privacy laws for companies dealing with data transfers with the EU

Read More [shareaholic app="share_buttons" id="15671367"]

Using video in Flash

by January 5, 2004

Import video in Flash and optimize it for streaming

Read More [shareaholic app="share_buttons" id="15671367"]

Advance Formulae in Excel

by January 5, 2004

Perform complex calculations such as those for income tax liability by using array formula in Excel

Read More [shareaholic app="share_buttons" id="15671367"]

Web Content on a CD

by January 5, 2004

Use FrontPage 2000 to publish Web content on a CD 

Read More [shareaholic app="share_buttons" id="15671367"]

Text Effects in Photoshop

by January 5, 2004

Use clipping layers to put text in high-detail image. Also add metallic chrome effects to your text

Read More [shareaholic app="share_buttons" id="15671367"]

Next Windows OS: Longhorn

by January 5, 2004

The upcoming Windows OS has a lot of architectural enhancements, which would make life a lot easier for software developers

Read More [shareaholic app="share_buttons" id="15671367"]

Signature-based IDS

by January 5, 2004

Design and architecture issues when implementing Signature-based Intrusion Detection Systems

Read More [shareaholic app="share_buttons" id="15671367"]