Archive for March 2012
Virtualization is a great tool which is making management of resources more effective and so reducing the investment cost. If you also want your enterprise to get Virtualized you must get equipped with the basics. Since it is an expensive investment every enterprise should make proper understanding of this technology before actually using it enterprise wise.
Virtualization environment comprises two forms – standalone hypervisors and bare metal hypervisors. in the standalone hypervisors group, there is VMware vSphere, VMware ESXi, Microsoft Hyper-V and Citrix XenServer. On the other hand, in the bare metal hypervisors we typically run into the most PCI compliance engagements. although virtualization is a good concept but one striking feature is that lot of IT professionals do not recognize a hypervisor as an operating system. Undoubtedly, it is a high-tech operating system but works similar to the Linux and UNIX environment. moreover, virtualization security is an issue. These specialized operating systems have some special requirements, which are hardening as compared to their counterparts like Linux and UNIX. usually, while making an enterprise virtualization compliance the hypervisor vendors give hardening standards for each of their operating systems. All you need to do is to go to the hypervisor vendor’s web site and download the security hardening guide. every version has a specific guide, simply click on that and get it downloaded. Read the instructions which are very nicely designed for the users.
This should be a good point while choosing a vendor. If your vendor is not providing you with a security hardening guide, you have the option to choose another supplier. Online you will find a large number of vendors, go to their websites and read about their services, compare with their counterparts and then choose the most right one. Today customer has many option, you should use this right and get virtualization compliance from the best vendor. once you have good vendor by your side you will surely install a good system. for finding a reputable and authentic supplier you must reach globally, you can get a good vendor anywhere.
Implementation of virtualization is a specialized task, which should be done with proper care and thus need specialist. for bare metal implementation, the major step would be securing your hypervisor. However, with the hosted virtualization it is important to host the operating system with the hypervisor. with this, you need to have security hardening guide as well. But this is not the end of the job. You have to very particular about each of the steps involved in the implementation of Virtualization system. So, be very careful
LucidLogix® (Lucid), GPU virtualization software leaders, today announced DynamiX™, a unique software implementation that will allow selected formerly unplayable high-performance games to be enjoyed on mainstream and low-end laptops and Ultrabooks™ equipped with only an integrated GPU. a free trial version that initially expands the playability of the game The Elder Scrolls® V: Skyrim™ on a variety of notebooks is immediately available for download.*
“With DynamiX, a single embedded GPU is all you will need to enjoy your favorite high-performance titles on most new notebooks without reducing display resolution or minimizing game performance settings,” said Offir Remez, Lucid co-founder and president. “We are offering this FREE trial beta version as a proof-of-concept, while working to provide DynamiX for more games. try it and tell us what you think!”
DynamiX is a unique implementation of real-time dynamic resolution technique that is designed to enable a tunable minimum performance level to increase the playability of a game by dynamically changing the render target resolution of objects in real time, without the need of the game developer to design it in advance. with DynamiX, games such as Skyrim, which is virtually unplayable (running under 20 FPS), now is available for millions of mainstream laptop users. All game HUDs (heads up displays), menus and maps are unchanged and displayed in full resolution as high as HD on equipped laptops.
Many first person shooter (FPS), adventure and role-playing games (RPGs) are designed for systems that employ high-performance discrete GPUs, usually in combination with embedded or integrated GPUs. for this reason, most laptops lack the hardware to run games such as Skyrim. LucidLogix DynamiX makes it possible for users to enjoy these games even on systems with single embedded GPUs, such as Core-i5 Ultrabooks, without compromising performance.
DynamiX BETA version, initially for Skyrim, is available at the Lucid eShop for a limited time. Following the trial period a production version will be released along with versions that enable more games. in order to initiate the download, visitors will need to initiate a free, no charge purchase. for more information or to download DynamiX visit http://eshop.lucidlogix.com/?q=dynamix1.
Lucid Technologies develops vendor-independent GPU virtualization software that dramatically improves graphics performance, while reducing power consumption and minimizing cable-swapping. Lucid’s Virtu MVP has redefined the gaming experience with its Virtual Vsync and HyperFormance technologies, which improve responsiveness, accelerate frame rates and eliminate visual artifacts. Lucid’s mission is to satisfy the global demand for more performance and longer battery life by expanding Virtu technologies to handhelds, tablets, smartphones and the Cloud. Headquartered in Kfar Netter, Israel with sales and marketing in Santa Clara, California, Lucid’s innovations are protected by more than 60 patents pending. for more information, visit lucidlogix.com or follow @LucidHYDRA on Twitter.
*Based on in-house development and testing by Lucid. Does not imply endorsement or support from the makers of Skyrim.
LucidLogix and DynamiX are trademarks or registered trademarks of LucidLogix. Elder Scrolls and Skyrim are trademarks or registered trademarks of Bethesda Softworks LLC. All other trademarks or trade names are the property of their respective owners.
CBR Staff Writer Published 22 March 2012
Ratmir Timashev, CEO, Veeam Software, writes exclusively for CBR on the challenges on Big Data and why it is important to have processes in place to deal with the new trend
As we move more of our lives online, it’s no wonder that businesses are extracting and creating more and more data each year.
Research from IDC found that 1.8 Zettabytes of day was generated in 2011 alone – enough to fill 115 billion 16GB iPads – and 0.6 Zettabytes more than was generated in 2010.
This figure is set to reach a total of 35 Zettabytes by 2020, not only through businesses generating data through the likes of loyalty cards, but also through them then using that data to analyse how many customers buy X product X times a month.
But the Big Data question is: are businesses properly equipped to ensure their IT infrastructure is kept afloat or are they at risk of sinking quicker than the Titanic?
Avoiding the ‘ship of fools’Many enterprises today are built on a hub of data that passes across the wider IT infrastructure. With the sheer volume of data that is being generated it is critical to ensure this infrastructure is capable of scaling quickly to meet demand and here virtualisation has played a vital role by maximising the resources of physical servers at a relatively low cost.
Indeed, virtualisation gives businesses the ability to both scale server infrastructure upwards and downwards at the flick of a switch.
From a Big Data perspective this is hugely beneficial as the cost of running the infrastructure can be better controlled – imagine a shipper having to invest in new vessels to support a large cargo project and then finding the vessels are not needed after the project is finished.
Enterprises need to better manage their IT infrastructure so that they are not making unnecessary investments that do their business more harm than good.
Implementing lifeboatsMinimal downtime is critical for any enterprise. this is all the more true for Big Data in the event of IT failure. however, most businesses do negate some of this challenge with the aid of ‘lifeboats’.
The process of server replication, unlike general backup, involves copying data to production standard hardware so that it can be brought quickly online in the event of an outage.
But CIO research from Vanson Bourne highlights some major barriers to server replication such as the high cost of hardware and replication software, and straightforward complexity.
However, the research does show how businesses that replicate as little as 26% of business critical servers estimate that the cost savings in the event of an outage to be an average of $417,391 per hour.
Nonetheless the remaining 74% of unreplicated server estate can cost a business an estimated $436,189 per hour.
Server replication is imperative for a business that generates vast amounts of business-critical data on a daily basis. It can act as a lifejacket when businesses face a systems failure by taking a snapshot of data in real-time so that even if a document is being updated constantly, none of the data is lost if the server unexpectedly fails.
However, with the use of virtualisation, businesses have the ability to replicate more of their business-critical data. With many virtual machines fitting on a single server and with each virtual machine existing only as a single disk file which can be backed up and recovered as a single image, it is much easier and more efficient to maintain a replicated environment which can be restored when needed.
Plain SailingAs businesses increase their aspirations and goals for the future, they have the increasing need to generate more data to reach their goals. As such, businesses should be looking to adopt virtualisation and build this into their replication strategies.
With virtualisation, businesses will be able to have more scope over how much and what they can replicate: with virtual machines being squashed down to single disk files, businesses have the ability to replicate more machines in the same amount of space they’d usually replicate X amount of servers. As such, they can ensure that they have mitigated risk in more of their mission-critical server estate.
So instead of backing up on an hourly, daily or even weekly basis as is the current approach with physical and virtual IT, organisations can bring backup windows down so that they are near non-existent.
If businesses are looking to increase the load on their infrastructure, they also need to ensure they are increasing the data protection strategies they have in place, and virtualisation enables to do this easily, efficiently and at a lower cost.
Only then can enterprises continue to exploit vital data for analysis and expand their IT infrastructure without the fear of going under.
Does your computer emit a beep when switching it on? do you get a Windows Blue Screen of Death (BSOD) at random times and on the screen it displays techno jargon like IRQL_Less_or_Not_Equal? well I’m afraid to say that your computer memory might be faulty.
What are the common symptoms of failing memory?
- Computer doesn’t switch on, and if it does it doesn’t show a proper boot up screen.
- An odd beeping noise. this noise comes from the motherboard after it does its P.O.S.T (Power on self test). when it finds faulty ram it emits this beeping morse code.
- Funny display characters in Windows.
- Blue text screens which indicate an error has been encountered.
- Firstly always open up the computer with the power disconnected, and remove all the ram from the motherboard
- Clean the gold connectors on each ram stick with alcohol.
- Place a single stick into the memory bank marked DDR1 (or the first slot closest to the CPU)
- Run a memory test program, ie MemTest86+. a memory test tool can easily be found on the AVG anti-virus website which provides an AV rescue ISO. Burn this ISO to disk, boot up your computer and then select the memory test option.
- Repeat the process for each memory stick until all your memory is tested.
The test could take some time to run, but testing each one individually is the best way of isolating which memory stick is faulty. once a memory stick is faulty go to your local computer repairs company taking the faulty memory module with. The local operator will be able to help you source a new one. place this new memory stick into your computer and it’s advisable to then run another full test on your motherboard.
It’s also advisable to make sure that you use memory from the same manufacture, mixing and matching different memory could lead to incompatibilities.
If you find that the memory tests fine you may wish to start casting your eye upon your motherboard and the electronics that handle the memory.
Be warned, if you are unsure of the inner workings of a computer, it’s best to call your local computer geek.
Like us on Facebook
On the other hand, Transformer Prime has 10.1-inch Super IPS+ LCD touchscreen with a resolution of 1280 X 800 pixels. Screen is protected with Corning Gorilla Glass.
Processor, Memory and Storage
The new iPad has dual-core 1 GHz A5X processor with quad-core graphics and 1GB of RAM. it offers 16/32/64GB of internal storage. however, the new iPad lacks microSD card slot for external memory options.
Turning towards Transformer Prime, the Android tablet has quad-core 1.3 GHz Cortex A9 processor fitted on Nvidia Tegra 3 chipset. it has 1GB of RAM and 32/64 GB of internal storage. Outgunning the new iPad, Asus Transformer Prime also supports microSD card up to 32GB.
The third generation iPad comes with Wi-Fi only and Wi-Fi + 4G connectivity models. it feature Bluetooth version 4.0. however, GPS is only feature in 4G models.
Asus Transformer Prime does not support any 3G or 4G network. it comes with Wi-Fi only option. other connectivity features are Bluetooth with A2DP support, assisted GPS, microUSB version 2.0 and micro HDMI port.
Apple, answering all camera related calls, has upgraded its new iPad with 5-megapixel iSight camera sensor that can record 1080p videos at 30fps. There is also a front-facing VGA camera in the device. Image quality is good but lower than quality of iPhone 4S' camera.
Asus Transformer Prime has 8-megapixel camera with LED flash support. the camera is one of best cameras on a tablet. There is also a secondary 1.2-megapixel camera in the device.
The same old question of iOS vs Android rises again in this section. both have advantages and disadvantage over each other. iOS v5.1 on the third generation iPad looks like a charm with excellent graphics. On the other hand, Asus has updated its Transformer Prime with the latest Ice Cream Sandwich. Android is best for customization while iOS is more business-oriented.
The third generation iPad has a bigger battery but battery life is same as iPad 2. Apple's new tablet comes packed with 42.5Wh Lithium-Polymer battery, which can keep the tablet powered up to 10 hours (9 hours on 4G) without needing a recharge.
With a smaller battery, Transformer Prime stays ahead of the new iPad, in terms of battery life. Asus Transformer Prime, packed with 25Wh Lithium-Polymer, can run for up to 12 hours without needing a recharge.
If you are looking for a 4G tablet, then you might not have been reading this article up to the end. 16GB Wi-Fi only model of third generation iPad costs $499. while 32GB model of Transformer Prime is also priced at $499. 4G model of the new iPad will cost you $130 more. Comparing base models of both these device, Transformer Prime gives more value for money.
Also, who can forget the touchpad dock that brings physical keyboard to Transformer Prime for easy typing. But, if you want a LTE-enabled tablet or are looking for a tablet best suitable for business purpose, then you better go for the new iPad. also, the recent benchmark tests conducted by an Australian-based blogger suggest the new iPad is faster in performance than Transformer Prime.
(reported by Johnny Wills, edited by Surojit Chatterjee)
To report problems or to leave feedback about this article, e-mail: to contact the editor, e-mail:
Eager to get your hands on the Windows 8 Consumer Preview? Before you download and mount that ISO image, you’ll have to pause for a second and think about how you want to install it.
Dual booting allows you to select which operating system you want to load, and is an excellent choice when trying out a beta version of a new operating system. You can download the straight ISO image of Windows 8 Consumer Preview if you want to use your own mounting tool.
Microsoft also has a tool for downloading Windows 8 and mounting it onto a bootable USB flash drive.
The Consumer Preview version of Windows 8 isn’t going to be around forever either, and will probably expire on or close to the launch of the final RTM version of Windows 8 – meaning you’ll need to upgrade to the new version or revert to your old Windows.
This is why dual booting Windows 8 Consumer Preview alongside your existing Windows installation is a great option, as when you turn on your PC you get to choose which version of Windows to use, and allows both versions of Windows to work side by side without you losing any files.
1. Download the package
To get started you’ll need to download the installer for the Windows 8 Consumer Preview. Click ‘Get it now’, then ‘Download Windows 8 Consumer Preview’ to begin downloading. Click ‘Run’ twice and allow the program to make changes to your computer if you’re prompted.
2. Prepare to install
When the program starts, it will scan your PC to ensure it’s compatible with Windows 8. it will then determine which version of Windows 8 you’ll need (32 or 64-bit) and download the relevant files. During this process you might be asked to perform a few tasks on your computer, like clearing space on your hard drive.
3. make a bootable flash drive
The next screen will ask whether you’re ready to install the Consumer Preview. make sure you select ‘Install on another partition’ and click ‘Next’. Select ‘USB flash drive’ (unless you’d rather make a bootable DVD), then click ‘Next’ and select your flash drive from the list (make sure it is inserted into your PC first). Click ‘Next’ to begin. the process might take a while.
4. create a partition (part one)
You now need to make a partition on our hard drive to install Windows 8 onto. Before you begin, it’s best to back up all your important files, just in case. then open up the start menu and right-click on ‘Computer’ and select ‘Manage’. Select ‘Disk Management’ from the list on the left. Right-click your hard drive at the bottom of the screen and select ‘Shrink volume’.
5. create a partition (part two)
You’ll want at least 20GB available to install Windows 8, so enter 20,000 in the box labelled ‘Enter the amount of space to shrink in MB’ and click ‘Shrink’. now your hard drive will be 20GB smaller, and a new unallocated section of 20GB will be displayed. Right-click it and select ‘New simple volume’ Click ‘Next’ on the next three screens. in ‘Volume label’ type Windows 8, then click ‘Next’ and finally ‘Finish’.
6. Boot from USB flash
You then need to restart your computer. To ensure your PC boots from the USB drive you created, access the BIOS, go to ‘Boot > Boot device priority’ and make sure the USB drive comes before your hard drive. Press [F10] to save and exit, and the Windows 8 install utility should now run. once Windows 8 Setup has loaded, click ‘Next’, then ‘Install now.’
7. Select the partition to install
When prompted, enter the product code DNJXJ-7XBW8-2378T-X22TX-BKG7J. Continue through the process until you’re asked which type of installation you want. Click ‘Custom: Install Windows only’. in the next window select the partition you created earlier – it should say Windows 8 – then click ‘Next’.
8. Dual boot
Now all you need to do is wait for the Windows 8 installation process to complete. once that’s done the PC will boot into Windows 8. if you like, enter your Windows Live ID. now when you restart your PC, you should be presented with an option to boot into Windows Consumer Preview or Windows 7. Click ‘Change defaults or choose other options’ to make sure Windows 7 is your default operating system.
Cisco networking is all about designing efficient networks that offer the best compromise between security of each local network and the amount of data that is required between each of the sub networks so that they operate with no problems or at the very least, minimal impact to the users who operate these equipment.
Ever since the basic structure of the local area network was established, there has been an exponential rise in the complexity of the basic local area network. With the improvements in bandwidth utilization, the type and amount of data being passed from network to network and the type of use that the Internet sees in the corporate world, designing a network is not what it used to be.
If you were design the perfect network for a modern house, it only used to need a router, some cables and the optional wireless routers and switches to complete it. now, you have the option to even print straight from your laptop to your printer without connecting to it and at the same time letting other computer print to the same printer; Or how about a centralized security system that use the home network as data repository, for example.
This is simple compared to designing a network for, a top 500 fortune company, for example; or designing an Internet network for all the buildings of a university. all these thing take time and proper design to allow for the least degradation of network performance from each of the individual networks within that campus network as stated by Cisco themselves.
Cisco in fact offers certification for this type of undertaking and Cisco calls it CCNA or Cisco Certified Network Administrator training. There are different levels for CCNA and each has its own qualification exams to be certified for that level. With Cisco networking, you get the best training from the most widely known and trusted networking provider.
The basic local area network is made up by the router, or the device that provides IP addresses to the entire network and the switch, or the device that allows all users to connect to the same network and access the Internet via shared resources. Before the router is the interface that allows the Internet to be distributed. In the case of a campus, we have the wide area network, or WAN and this allows the different buildings to have their own access to the Internet. The WAN itself can be labeled as its own network as it distributes data from a central source to the intended destination or from one building to another. It acts like a big traffic signaling station, directing where each bit of data should be going.
Designing the hardware to make all of these possible is quite arduous to say the least. you have to buy equipment that fulfills the required criteria for this network and at the same time, be compatible with the network of the other buildings and to the central server as well.
It is not an easy job, but as a certified Cisco networking designer, it makes the job easier to do with the least worry.
ATI has recently released a slew of PCI Express cards and this baby is one ‘wonder’ of a card. Traditionally, ATI All-In-Wonder cards combine all the features you need to enjoy TV and video games on your PC.
Let’s see what features it has and what it is good for.
Graphics Processor and Memory
If you’re looking for a graphics card, the most important thing you look out for is the graphics processor. How does the X600 Pro stack up when it comes to the graphics processor? well, the card itself comes equipped with a ATI graphics processor clocked at 400MHz and with 256MB of DDR memory. that is plenty for playing the latest games and running the latest video applications.
Design and Construction
In terms of design and construction, this graphics board is a looker. If you’re seen boards from ATI (or the latest graphics cards for that matter), you’ll realize that many of them come with nice shades of blue or red – and intentionally so. It is to attract the attention of the consumer and the hardcore gamer – and they do a good job of it. The ATI All-In-Wonder X600 Pro looks really cool and it’s worth a look at if you want a pretty board.
Bundled Software and Accessories
If you are a stickler for good software in graphics cards, then you won’t be disappointed with the ATI All-In-Wonder X600 Pro. It comes with Pinnacle Studio and Meditator 7.0 and also some TV recording software which is great for capturing your local TV programs and enjoying TV digitally on your computer.
I’ve always liked All-In-Wonder cards in the sense that they allow this TV recording feature, but in terms of price – you have to pay more. however, if TV recording is a feature you’re dying to have, then its worth paying the money for.
If your want to overclock the card, there are many resources out there on the Internet to teach you how to do it. I, for one, do not really like to go and overclock a nice graphics board from ATI (or any other brand for that matter). But the choice is yours. If you want to squeeze every bit of performance out of your board, then overclocking is a good way to go. just don’t burn your board while doing it.
How does the ATI All-In-Wonder X600 Pro perform? well, a quick scan of the Internet reveals that the card gives great scores on all gaming benchmarks. But it is not the drop dead type of card that will give you the highest frame rates. however, given the ice performance for its price, it’s a good value card to buy.
If you’re thinking if this card has shortcomings – well, one of them is certainly the average TV quality. Apparently, the programs captured by the card are reported to be of merely average quality compared to higher end cards. So if you bought the card for TV recording as the main purpose – then maybe you should reconsider.
Overall, the ATI All-In-Wonder X600 Pro is a great graphics card and gives decent TV recording capabilities. If you want super high end graphics performance, this is not the card to get. But if you want a decent 3D card for general gaming and video, then you should certainly consider it.
In today’s article, I’m going to quickly inform you about the Cisco IOS webvpn context configuration mode command named browser-attribute import.
CCNAs (like you) use the browser-attribute import command to import user-defined browser attributes into a webvpn context.
Below is the command’s syntax:
browser-attribute import device:file
As you can see, the command also uses two arguments device: and file.
device:- This argument (with colon) is used to indicate the storage device on the system.
file – And, this argument is used to indicate the name of file to be imported. by the way, the file name should include the directory location.
Note: If you decide to use the command; it will override any other browser attributes that have already been configured.
Below is an example of the command being used:
Router(config)#webvpn context sslvpn
Router(config-webvpn-context)# browser-attribute import flash:example-attr.xml
Router#copy run start
In the example above, the file named example-attr.xml is to be imported from the router’s flash. And, notice that the browser-attribute import command is being performed while the router is in webvpn context configuration mode.
And, like with mostly all Cisco IOS commands; you can use the word no in front of the command to remove (disable) the configured command; like you see below:
Router(config-webvpn-context)#no browser-attribute import flash:example-attr.xml
I hope this article was very informative and helped you quickly understand the usage of the browser-attribute import command. If you need to learn more; I suggest you visit my website, were you’ll find the latest information regarding the Cisco CCNA (640-553) Security exam techniques.
To your success,