Posts

How to plan a software-defined data-center network

Image
How to plan a software-defined data-center network Architectures for software-defined data centers can address the need for flexibility and agility, but implementing them is difficult and calls for coordinating a host of complex features including containers, security, provisioning, scaling and migration to hybrid cloud. The data-center network is a critical component of enterprise IT’s strategy to create private and hybrid-cloud architectures. It is software that must deliver improved automation, agility, security and analytics to the data center network. It should allow for the seamless integration of enterprise-owned applications with public cloud services. Over time, leading edge software will enable the migration to intent-based data-center networks with full automation and rapid remediation of application-performance issues. This article evaluates the data-center networking requirements for private enterprises that manage their own internal IT resources. It ...

How to set up G-Suite / Gmail in Outlook

Image
How to set up G-Suite / Gmail in Outlook Your Gmail account can be accessed anywhere using an email app on your phone or by logging on to Gmail.com, but you may prefer to use Outlook to access your email. This tutorial will walk you through the setup process in Outlook for your Gmail account. 1 Enable IMAP and Outlook access in Google In order to connect Outlook to Gmail, you'll need to first enable the IMAP connection that Outlook will use. Log in to your Google Apps account at Gmail.com, and click the gear button to access your settings Click "Settings" Go to the "Forwarding and POP/IMAP" tab Click the radio button to "Enable IMAP". You can leave the default settings for the additional options that appear, unless you specifically want to change them. Save your changes Now, you'll need to click this link to allow Outlook to log in to your account:   https://www.google.com/settings/security/lesssecureapps If you're unable to...

How to enable AHCI in Windows 7 RC after installation

Image
How to enable AHCI in Windows 7 RC after installation    AHCI  (Advanced Host Controller Interface) enables native command queuing and hot-plugging through SATA host controllers (Serial-ATA) for your hard drives. In many scenarios, it enables more efficient multi-tasking. Vista was the first Windows OS to support AHCI out of the box, whereas Windows 7 does the same. But an issue with AHCI is that if you install the OS without enabling AHCI in the BIOS, enabling it after installation will render your OS unusable. This is because Windows disable the AHCI driver since it is not needed during the installation. There is one way to fix this, although you need to have knowledge of registry editing. The   detailed steps   from Microsoft are as follows: To resolve this issue, enable the AHCI driver in the registry before you change the SATA mode of the boot drive. To do this, follow these steps: Exit all Windows-based programs. Click   Start , type ...

CHAMP - Dhairya's 8th Birthday

Image
CHAMP - Dhairya's 8th Birthday It's an Introduction Session... From Left to Right :- Shaheryar, Moksh, Mantra, Mira, Arshnit, Vedansh, Gopal From Left to Right :- Om, Moksh, Gopal, Vedansh, Shaheryar, Mantra, Mira, Arshnit From Left to Right :- Om, Moksh, Gopal, Vedansh, Shaheryar, Mantra, Mira, Arshnit From Left to Right :- Om, Moksh, Gopal, Vedansh, Shaheryar, Mantra, Mira, Arshnit From Left to Right :- Om, Moksh, Gopal, Vedansh, Shaheryar, Mantra, Mira, Arshnit From Left to Right :- Om, Moksh, Gopal, Vedansh, Shaheryar, Mantra, Mira, Arshnit From Left to Right :- Om, Moksh, Gopal, Vedansh, Shaheryar, Mantra, Mira, Arshnit From Left to Right :- Om, Moksh, Gopal, Vedansh, Shaheryar, Mantra, Mira, Arshnit And, NOW...Guidance for GAMES... From Left to Right :- Moksh, Gopal, Vedansh, Shaheryar, Mantra, Mira, Arshnit Game Started...Blind FOLD From Left to Right :- Amor, Shourya Singh, Jenil, Mitush, Mira, Arshnit, Shaheryar, Mantra, V...

The Anatomy of a Phishing Email: 5 Things to Look For Before You Click

Image
The Anatomy of a Phishing Email: 5 Things to Look For Before You Click... Phishing attacks are now considered the main source of data breaches.  91% of cyber attacks start with a phishing email * Ten years ago, if you asked someone what ‘phishing’ was, they probably would have no idea. Since then, times have changed considerably; phishing attacks are now responsible for a significant number of major data breaches . Phishing may have made its way into the mainstream vernacular, but there is still confusion about the subject—and rightfully so. Phishing attacks are becoming more sophisticated and targeted, and even the most tech- or security-savvy people can find themselves a victim. So, how do you make sure you don’t fall victim as well? Use this five-point checklist to closely examine the validity of incoming email. When in doubt, don’t click! 1) The Sender This is your first clue that an email may not be legitimate. Do you know the sender? If not, treat th...

Google Cloud tutorial: Get started with Google Cloud

Image
Google Cloud tutorial: Get started with Google Cloud From virtual machines and Kubernetes clusters to serverless functions and machine learning APIs — how to navigate Google’s cloud riches   When people think of the word Google, they think about search and the immense computational infrastructure that converts your words into a list of websites that probably have exactly what you’re looking to find. It took Google years to hire the engineers, design the custom computers, and create the huge collection of hardware that answers web queries. Now it can be yours with just a few keystrokes and clicks. Google rents out much of that expertise and infrastructure to other web companies. If you want to build a clever website or service, Google is ready to charge you to run it on its vast collection of machines. All you need to do is start filling out some web forms and soon you’ll have a big collection of servers ready to scale and handle your chores. Step 1: Set up yo...

The Linux Foundation Announces 35 New Silver and 3 New Associate Members

Image
The Linux Foundation Announces 35 New Silver and 3 New Associate Members Associate members include government agencies and not-for-profit organizations   The Linux Foundation, the non-profit organization enabling mass innovation through open source, announced the addition of 35 Silver members and three Associate members. Linux Foundation members help support development of the greatest shared technology resources in history, while accelerating their own innovation through open source leadership and participation. "It is exciting to welcome so many wonderful organizations from across technology, finance, education, transportation, communications and other important industries into The Linux Foundation," said Jim Zemlin, executive director, The Linux Foundation. "We look forward to working with them and the broader open source community to continue building new and better innovative technologies." In addition to joining the Foundation, many ...