Business World
30 views | +0 today
Your new post is loading...
Your new post is loading...
Scooped by Virender Singh!

Why You Should Invest Residential Apartments in Gurgaon

Why You Should Invest Residential Apartments in Gurgaon | Business World |
ATS Tourmaline has best residential apartments in Gurgaon for those who looking for residential project for investment. Call to know about ATS resale price.
No comment yet.
Scooped by Virender Singh!

ATS Tourmaline | Sector 109, Dwarka Expressway Gurgaon

ATS Tourmaline | Sector 109, Dwarka Expressway Gurgaon | Business World |
ATS Tourmaline is the upcoming residential project in Sector 109, Dwarka Expressway, Gurgaon. Dial 9811020192 for ATS Tourmaline Price and Resale.
No comment yet.
Scooped by Virender Singh!

This is Why Investors Need to Invest in Orris Market City 89

This is Why Investors Need to Invest in Orris Market City 89 | Business World |
Orris Market City in Sector 89 Gurgaon is the new commercial project by Orris Infrastructure Pvt. Ltd is the new hope of investors to grow their business.
No comment yet.
Scooped by Virender Singh!

How to Find SaaS Products That Help to Grow Your Company

Are you wondering what this SaaS is, that everyone is talking about these days? SaaS or Software-as-a-service is a new manner in which the service providers are distributing software rather than selling it. Still wondering what this means? Let’s explain! The software services have become available to the clients over the internet via cloud-computing technology. So, no more are the software installed, in fact, service vendors host the software at their server and charge accordingly! Sounds great? Isn’t it!The popularity of SaaS knows no bounds today, and so, more and more companies
No comment yet.
Scooped by Virender Singh!

How Essential is Data Management to RFID Technologies?

Increasingly, as computers have been able to capture more data about more business transactions of various kinds and record more pieces of data about each individual transaction, tremendous volumes of data have become available for exploration. Specialized repositories called data warehouses excel at collecting, normalizing, organizing, and keeping at close hand these volumes of records and making them available for rapid analysis.


What may be less obvious is that as these data records become individually richer, and comprise more independent fields of data, considerably more effort is required in order to identify all the most useful and meaningful patterns and correlations that may exist across a collection of such records. Indeed, the required effort increases geometrically, if not exponentially with each increase in data complexity. When dozens of variables, or fields of data, are involved, simple human intuition no longer suffices, and neither does merely plotting a couple of variables for visual analysis. Instead, some powerful, computation-based techniques must be employed, techniques that can explore what are, as mathematicians view them, multidimensional spaces that the human mind can grasp or navigate only with extreme difficulty, if at all.


Imagine a marketing specialist, for instance, who may want to explore a mass of historical sales transactions in hopes of determining the three or four factors that seem to most strongly indicate who is likely to buy a certain product—a certain kind of shampoo. Once these factors are identified, of course, they can be used to fine-tune a marketing campaign. This analyst may have a hunch that it's suburban mothers, age 28 through 45, with three children or more, and household incomes of $100,000 or more. The question is, how does the analyst go about proving her conjecture, based on all this hard data that's available?


The answer is a technique called online analytic processing, or OLAP. It is a set of software tools that work on masses of multidimensional data—data whose individual records may include perhaps 100 or more independent variables. To make sure that a search through 500,000 complex records takes only a few seconds, the records and their many data fields are organized in a special way, with rich cross-indexing paths linking their fields in mathematically precise and efficient ways. This organization of the records is quite different from what's found in the more common relational database, whose job is mainly to locate one or a small set of records in a flash and perhaps update them with 100 percent reliability. Think of OLAP processing as involving tasks such as looking for the intersection of two sets of records, each numbering 20,000 and with 50 sub fields of data per record.


Read more about this topic click on this link:

No comment yet.
Scooped by Virender Singh!

Small Business and the Social Media Conundrum - RightStart Blog

Small Business and the Social Media Conundrum - RightStart Blog | Business World |
Mark Traphagen shares his insights regarding small businesses using social media. Small steps, even if done imperfectly, are worth doing. Learn more.
No comment yet.
Rescooped by Virender Singh from Into the Driver's Seat!

David Carr's syllabus for Press Play ~ Tech & Learning ~ by Kevin Hogan

David Carr's syllabus for Press Play ~ Tech & Learning ~ by Kevin Hogan | Business World |

"The surprising death last week of New York Times mediareporter David Carr was upsetting for many reasons, one of which I didn’t expect until after reading his obituary. Carr had recently begun teaching a media studies course at Boston University. His syllabus is at once a model for best online learning practices, 21st century research skills, and real world rules for digital etiquette in the classroom."

Quote from Kevin Hogan's into to the Tech & Learning email newsletter, dated Feb. 18, 2015.  They syllabus is fascinating to read and its reading assignments are terrific.-JL

Via Jim Lerman
No comment yet.
Rescooped by Virender Singh from Into the Driver's Seat!

A Map Of The Carbon Footprint Of All 31,000 ZIP Codes In The U.S. ~ Fast Company ~ by Ben Schiller

A Map Of The Carbon Footprint Of All 31,000 ZIP Codes In The U.S. ~ Fast Company ~ by Ben Schiller | Business World |
Which households contribute most to climate change? To find out, take a look at this interactive map created by researchers at the University of California, Berkeley. It provides estimates for all 31,000 ZIP codes, based on everything people consume in a single year, including energy, travel, goods, and services.

A major finding of the research: suburbs account for more greenhouse gas emissions than other areas. In total, suburbs produce about 50% of household emissions, despite housing only 143 million people in total from a U.S. population of 313 million. Inner city residents tend to have lower carbon footprints, because they live in smaller homes and use more public transit. Some urban households produce 50% of the national average, while some suburban households emit double the national average.

Via Jim Lerman
No comment yet.
Scooped by Virender Singh!

The Benefits of RFID Application in the Retail Sector

The Benefits of RFID Application in the Retail Sector | Business World |
Virender Singh's insight:

The obvious benefit of RFID for any company directly affected by the Wal-Mart mandate is that compliance will help ensure their survival as a supplier to the world's largest retailer. Beyond the obvious sort of "slap and ship" scenario—slap on a tag and ship the product—the technology has the potential to provide tremendous value to corporations: It will help companies squeeze inefficiencies from their logistics operations and give them better visibility into their supply chains.


Consider this statement: Until fairly recently, enterprise computing was concerned mainly with recording and executing business transactions—orders, shipments, and payments, for example. More recently, methods were developed for delving into masses of transaction records—usually well after the fact—to identify patterns and correlations and thereby gain new insight into customers and their behavior.


Companies, then, could use these insights to create more accurate forecasts, develop improved products, and fine-tune their marketing and promotional activities. Naturally, as computers gained speed and storage capacity, this processing and analyzing of transactions was greatly improved, which led to new business efficiency and effectiveness. Add low-cost, ubiquitous data networking, and entire business processes could be reworked, automated more thoroughly than ever, and in some cases speeded up by orders of magnitude.

For example, although it might have taken days, in the 1970s, for a catalog merchant like Sears Roebuck to process an order arriving by mail, Web-based retailers now process and confirm customer's orders within seconds. And, whereas Sears published a new catalog every few months, at best, a company like can adjust the products, prices, and marketing messages it presents to individual customers in milliseconds, as quickly as any visitor to its Web site clicks from one Web page to another. This is problematic for businesses which can only thrive in real-time operational structures.


RFID is poised to shorten and accelerate even further the vital feedback loops that connect the world out there and the world—or, more accurately, the symbolic model of the world—inside the computer. Now, rather than merely enable customers to serve as data-entry clerks—which has been, in fact, the Web's primary contribution to retailing—RFID turns potentially every machine and object in the world into a data-entry clerk. Everything, in other words, becomes able to sense some aspect of itself or its surroundings and, more or less immediately, communicate those findings to the appropriate business systems. Rapidly disappearing is the need for workers on loading docks or in factories, for instance, to manually enter data through keyboards or to scan bar codes to make note of the tasks they have just accomplished or record observations they have made.


For more information about RFID visit:

No comment yet.
Scooped by Virender Singh!

RFID Technology to Ensure Aviation Safety

RFID Technology to Ensure Aviation Safety | Business World |

It didn't take long for the work of flying a plane to be expanded from one brave individual to a team designed to minimize risk. With the introduction of RFID, 

Virender Singh's insight:

larger planes developed with multiple engines, a copilot joined the pilot to provide safety through redundancy. A flight engineer joined the crew to closely monitor the increasing amount of machinery and electronics on the plane. A navigator was also introduced to perform all the calculations that were required, because more primitive forms of navigation no longer worked for long flights during the day or night or at high altitudes. Radio officers were introduced to operate communications equipment on-board since long-range communications are now transmitted through RFID.


The number of instruments on the plane quickly ballooned and left the flight engineer with hundreds of points of data to keep track of as the plane flew along. The flight engineer's job and the crew's task of monitoring were made easier by an automatic warning system, which was an early example of today's automated computer analysis system, the flight-warning computer. The flight-warning computer was programmed to monitor many key indicators on the plane and to emit a warning alert whenever certain thresholds were exceeded.


This system provided assistance to the flight engineer and crew and served as a fail safe device in case certain problems were missed. As the number of instruments on planes grew larger, the job of the flight engineer and crew became impossible without automation that analyzed values from hundreds of sensors and provided guidance to the flight engineer and crew about how to conduct analysis during the flight to ensure safety. Thus, as the number of sources and the quantity of information grow, analysis must be automated.


The flight-warning computer was just the beginning. Planes became much more complex. Jet engines, pressurized cabins, high-altitude flights, and radar all came with new technology that at first required care and special handling by the flight engineer and navigator, but eventually became highly integrated through automation. Navigation was the first system to change dramatically.


Even a few years back navigation still required the use of some ancient methods. On transcontinental flights, navigators would use a sextant to observe the stars through special slots in the ceiling of the cockpit. But then navigation computers arrived that used a variety of methods, and eventually global positioning systems, to completely automate navigation and provide a real-time view of the position of the plane and any deviation from the planned course.


Before these RFID systems were introduced, reaction from pilots and navigators ranged from the suspicious to the downright hostile. On some airlines, before the systems were introduced and in use, pilots and navigators refused to use them. Especially on flights that crossed the North Pole, pilots were afraid that the systems wouldn't work in the strange polar magnetic environment. But, with RFID, things have fortunately taken a turn for the better.

Read More about RFID Solutions at:


No comment yet.
Scooped by Virender Singh!

PB&J Day School Home

PB&J Day School Home | Business World |

PB&J Day School is a private, non-denominational preschool for ages 1-5 in Franklin, TN.

No comment yet.
Scooped by Virender Singh!

Looking for an Apartment? A Must Follow Guidelines

Looking for an Apartment? A Must Follow Guidelines | Business World |
Read these guidelines before you purchase an apartment in residential projects. We wish you a happy future home and without losing your money
No comment yet.
Scooped by Virender Singh!

Looking for an Apartment? A Must Follow Guidelines

Looking for an Apartment? A Must Follow Guidelines | Business World |
Read these guidelines before you purchase an apartment in residential projects. We wish you a happy future home and without losing your money
No comment yet.
Scooped by Virender Singh!

Orris Market City Sector 89 Gurgaon

Orris Market City in Sector 89 Gurgaon is the new commercial project by Orris Infrastructure Pvt. Ltd. Dial +91-9811020192 for booking studio apartments and retail shop in Orris Market City. Booking starts @ Rs.7000 SQFT with 12% assured return. It’s offering premium retail shops, food courts, offices space and studio apartments at reasonable prices.
No comment yet.
Scooped by Virender Singh!

What is the Significance of Oracle in a Remote Monitoring Infrastructure?

One might question the existence of the PERL interpreter on a firewall with the capabilities of this language. However, the version of PERL provided has been secured and does not provide network sockets support. Configuration of services can then run in a CH-root environment. Remote monitoring systems are composed of a collection of management programs that operate the system and apply the rules for each incoming or outgoing packet. The guardian application is the module that offers services similar to the standard super-server. It performs some rudimentary checking of the incoming requests, examining the source and destination addresses and ports, at which point it either accepts or denies the requested connection.


The Oracle, or Authentication Server, is responsible for implementing the policies and rules configured by the security manager. The result of the Oracle’s processing can be one of several scenarios:


The client is properly authenticated and the connection is allowed to proceed.

The client has not been properly authenticated.

The client is not permitted to connect, in which case the connection is terminated.


Remote monitoring includes a series of proxy agents, or processes that relay information from one side of the server to the other. Mail on remote monitoring is handled through a specialized mail handler known as DuhMail. DuhMail consists of two components: a mail receiver and a mail sender. The mail receiver is started by Guardian whenever a connection on port 25 is received. The message is collected and saved in a secure area on disk and then transmitted to the remote site by the mail sender.


Remote monitoring does not run sendmail; therefore, it is not prone to the typical sendmail attacks. Remote monitoring requires that an SMTP server running sendmail or another SMTP Message Transfer Agent be on the private network to handle the message delivery. The remote monitoring alarm system constantly reviews the log messages being recorded and watches for patterns specified by the security manager. When a match is found, a predetermined action is taken, which can include sending e-mail messages, ringing the console bell, and calling a pager.


The final core module is the report generator. This module is used to construct statistical reports based on the log file and traffic flow analysis. Once generated, these reports are typically sent via e-mail to the security manager. A printer can be attached directly to the system to generate paper copies of the report if required. The reports available include the following:


Traffic summary by hour

Incoming traffic

Outgoing traffic

Connections per hour

Traffic by port

Top ten destinations


All in all, Oracle is extremely important in the operational processes of remote monitoring technology.


Read more about remote monitoring infrastructure on this link: ;

No comment yet.
Scooped by Virender Singh!

17 Important Factors Consider Before Hiring Web Hosing Provider

17 Important Factors Consider Before Hiring Web Hosing Provider | Business World |

We are all entangled in a web, and we love it. Yes, I'm talking about the great WWW (World Wide Web). Over the years, the internet has made a significant impact on our lives. Ever since its introduction in the late 90s, it spread like wildfire in many nations. And today, we cannot imagine our daily life without it. It has become an indispensable part of our lives similar to electricity, telephone, and water supply.


In recent years, it has served as a great platform for brand promotion. Yes, you've heard that right. Giving visiting cards to your potential clients is a decade-old marketing strategy. Nowadays, it is important for every company to have their own websites. A website is an excellent medium to inform the people about your business as well your expectations from the business. See, creating a website is easy but, what is more important is the hosting of that site on the World Wide Web. To cater to this need, we have web hosting services.


What is Web Hosting?


Web hosting is a type of internet hosting service. It allows the companies as well as individuals to make their website available on the WWW. The job of web hosts or web hosting service providers is to provide their clients a specific space on the server that is owned or leased for use by the client. You can host a complete website or a single web page as per your requirements.


How to Choose the Best Web Hosting Providers?


Most of the companies opt for low-cost web hosting. The best example for such cost-effective web hosting is the shared web hosting service where you share the same server with other users. For users who don't have any plans to opt for shared web hosting, there are thousands of service providers in the market today. To pick the best web hosting service, we rely on web hosting reviews by the experts.


To make the task of choosing the right web hosting provider easier, here are the 17 tips you must follow:


What are your hosting needs?


It is the question that you should ask yourself before opting for the services of the web host. One should be fully aware of his/her hosting needs. Once you have the complete list of what all you need then the task of finding the perfect service provider becomes easier.


Track the Uptime Score


It is important for us to obtain the web host uptime information. At present, the uptime score below 99.5% is not acceptable. So, please check the uptime score of your web host's server.


Multiple Domain Compatibility


We all know that domain names are quite cheap. And that is the main reason most of the people own hundreds of domain names. But here's the catch! Not all hosting companies provide multiple domain compatibility for a single account. Few years back, you could use only one domain name from a single account.


Upgrade Options


For a website to grow in coming years, the web hosting should grow. The word 'grow' here indirectly refers to the upgradation of the web host. Always look for server upgrade options.


Check the Renewal Prices


If you are willing to be in contract with the same web host for years, then check the renewal prices. Usually, hosting deals are cheap but the 'elephant in the room' is the monthly renewal price. It is absolutely necessary to check the terms of service (TOS) before opting for the service.


Check the Refund Policy


Sometimes, it is very important to ask basic questions regarding the company's refund policy. If you decide to opt no longer for the services of a specific web host, you should be aware of the cancelation charges.


Look for Basic Features


Most of the web hosting companies do not offer basic features. Yes, it may come to you as a surprise but it's a fact. You need basic features like auto script installer, Cron, .htaccess, etc.


Good Tech Support


It is extremely important for your web hosting provider to provide you with 24/7 assistance. You should check whether they have a good tech support or not.


E-commerce Websites


What if you want to host an e-commerce website? You have to check whether your web host provides e-commerce features or not.


Unlimited Web Hosting is a Myth!


Yes, there is no such thing as 'unlimited web hosting'. It is just a marketing strategy that most of the companies use. Your account will be suspended the moment you are using too much of CPU power. As mentioned before, it is important to read the company's TOS.


Look for Eco-friendly Web Hosts


According to a study, a web server produces 630 kg of carbon dioxide annually. God bless our ozone layer! Don't worry, there is an alternative. In recent years, eco-friendly web hosts or green hosts have been introduced. They produce almost zero carbon dioxide.


Is there an E-mail Feature?


For those who want to host e-mail accounts with their website, there is an e-mail feature available. Please check for this feature before signing up for the deal.


Avoid Long Contracts


Many web hosts indirectly force their clients to sign up for long contracts. Never fall into their trap. You should avoid getting into the long-term agreements.


Backup Options


Some things in life and internet are really unpredictable. What will happen if your website crashes? Simple, you'll look for backup. If your web host does regular site backups then your website can be easily restored.


User-friendly Control Panel


A complex control panel is always a turnoff for clients. Therefore, it is important to have a user-friendly hosting control panel. Otherwise, you'll always be calling tech support.


24/7 Live Chat


In this age of 24/7 services, it is obvious to expect more from our web host. We should check whether our web host provides 24/7 live chat support or not.


Don't Worry About the Disk Space


With a broad range of applications and software available for storing multimedia files (Dropbox, Youtube, etc.), you should not worry about data storage capacity.

No comment yet.
Scooped by Virender Singh!

What are the Types of IT Service Providers Today?

The beauty of the current state of ITSM maturity is the choice the business customer has to take advantage of. This can actually be an advantage or a disadvantage. Ample choice brings competitive pricing, innovative delivery, and negotiating strength, but to the uneducated consumer, it also leads to mismatched partnerships, missed expectations, and costly mistakes. 

Virender Singh's insight:

There are typically three main types of service providers, each with distinct strengths, advantages, and benefits. Most organizations have partnerships with at least two types, and sometimes all three.

Type I ITSP—Internal Customer Dedicated


A type I provider is one that shares the corporate structure with a

business unit and often referred to as an internal IT department.

The provider mandate is closely tied to the business objectives of the unit, and success is measured in terms of functional performance and cost-effectiveness. Often, the structure of the company has key revenue-generating lines of business as separate departments, and the criticality of the underpinning IT is tied directly to the success and profitability of the line of business.


This creates a direct dependency on the ITSP and hence the need for senior corporate control to be direct-line in nature. This often drives the type I provider model to exist for competitive and revenue-generation reasons. Very often, the type I provider operates with a net-zero budget model where it simply recovers or records costs, which are then funded by the business unit in the company. It makes no profit on its own and is often thought

of as an expense item on the balance sheet.


The following are distinct characteristics of a type I provider:


• Operates exclusively within an internal market space dictated

by the business unit.


• Is tightly coupled with the business unit and managed under a common strategy.


• Decision-making about services is often simplified and quick paced.


• Services are highly customized for the business customer.


• They are generally geared to high service levels.


• Allow the business to avoid certain risks of doing business with third-party providers.


• Service portfolios tend to be smaller and more manageable.


• IT innovation is confined by business growth.


• Will have overlap between ITSPs in common services if no other ITSP type is utilized.


Type II ITSP—Internal Shared Services


This type of provider is also an internally focused IT service provider; however, it tends to operate within a shared services structure and offers services to numerous departments or units within the company. This provider generally offers “shared” services, which are corporately used and whose needs are similar across multiple business units.


Examples of shared services are the following:


• Communication—Email, phones, desktops, fax


• Connectivity—Network, intranet, Internet


• Support—Service desk, service catalog


• Administration—Human resource systems, financial systems


A type II provider also offers services unique to specific business

units as well. The type II provider is governed at the enterprise

level and might be funded either at this level entirely, or funded from the enterprise level for shared services and from specific business units for their own services. A type II provider generally will have more complex strategic, tactical, and operational structures for service provision, funding, billing, governance, audit, and so on.


The following are distinct characteristics of a type II provider:

• Ability to share costs and risks across the enterprise

• Can use economies of scale for a larger common-service user base


• Will typically offer market-based pricing


• Can be subject to competition by external providers


• Will have larger, more complex service portfolios than type I


• Geared toward stable one-size-fits-all type of service levels


If you still looking for best IT service provider I have brought your this link check it out.

No comment yet.
Scooped by Virender Singh!

Top 5 Things You Can't Avoid while Choosing Monitoring - TRAKAID RFID enabled smart tracking

Top 5 Things You Can't Avoid while Choosing Monitoring - TRAKAID RFID enabled smart tracking | Business World |
No comment yet.
Scooped by Virender Singh!

How do Remote Monitoring Systems Involve the Drawbridge Packet Filter?

How do Remote Monitoring Systems Involve the Drawbridge Packet Filter? | Business World |
Virender Singh's insight:

The Texas AMU security tools include a package for implementing screening routers called Drawbridge. Drawbridge can be found at many security-related sites, so it might be best to research using WWW or Archie to find the closest and latest version. Version 1.1 of Drawbridge is available in drawbridge-1.1.tar.Z and drawbridge-1.1-des.tar.Z. The drawbridge-1.1.tar.Z package is the Drawbridge base package without DES support.


The drawbridge-1.1-des.tar.Z package is a supplemental package that contains the DES support. This package is installed in addition to the drawbridge-1.1.tar.Z package; just extract it on top of the regular package. This adds a few source files and new make files to the filter and fm directories. Note that the DES package is not required to operate Drawbridge; it only allows you to manage Drawbridge in a secure manner.


Remote monitoring models that come with Flash ROM kits are quite cost-effective. These routers can be obtained with different networking options, such as the following:


Ethernet-to-wireless bridging and routing using the




Ethernet-to-56 KB/64 KB/T1/E1 bridging and routing, Ethernet-to-


Async SLIP line


A standard Hayes AT command set compatible modem (supports V.Fast modems, auto dial, dial on demand, and secure lines)


Because of United States export restrictions, only U.S. domestic sites can download the DES package. The package can function without any encryption package, but with reduced security on filter updates across the network. Drawbridge is a copyrighted but freely distributed bridging filter. It uses a PC with two. Ethernet cards to perform the filtering. It is composed of the following three tools:




Filter Compiler


Filter Manager


Overview of Drawbridge


Drawbridge was designed and programmed by David K. Hess, Douglas Lee Schales, and David R. Safford of Texas A&M University. Drawbridge is a bridging filter that has filtering at the center of the design. It uses custom, table-driven software called the Filter that can run on a dedicated PC. The authors recommend a 33-MHz 486 or better PC. The PC requires two Ethernet cards. Only 16-bit SMC cards are currently supported.


The Filter Manager and Filter Compiler both run on Sun workstations. If additional performance and reliability are needed to withstand larger extremes of heat, dust, and restarting after power failures, you might want to use the commercial version of network monitoring. Currently, if you are using the shareware version of security monitoring, you must use SMC Elite 16 cards with the 83C690 chip.

The Filter Manager communicates and manages Filter (running on a PC) using SUN’s NIT support. The Filter Compiler generates filtering tables that are loaded into Filter through the Filter Manager. The Filter program filters TCP/IP on an incoming and outgoing basis and UDP/IP on an incoming basis. All other protocols are transparently bridged. For more information about remote monitoring system click here:

No comment yet.
Scooped by Virender Singh!

How Do Remote Monitoring Systems Bridge Data Exchange?

Most monitoring bridges pass data packets with a broadcast or multicast address as their source (when the first bit is set to 1). The monitoring specification for Non-Source Routing bridges does not allow these types of packets. These types of packets can be considered “bad” packets. A common failure mode of many monitoring interfaces and networking software is to transmit packets that have broadcast or multicast addresses in their source address fields. If you do not need the data to pass Source Routing packets, you can configure remotely to drop these packets. The default is to pass bad packets.


Pass Unseen Monitoring Source


Monitoring bridges always forward packets with destination addresses that have not been learned (addresses that have not been seen as a source address in a packet). This characteristic is essential for the proper operation of a monitoring bridge. However, failure mode of many monitoring interface cards is to send out erroneous packets with good CRCs but with random monitoring destination and source addresses.


Standard bridges pass these erroneous packets because they have not learned the random destination address, and they add this packet’s random source address to their finite learned table. This situation can hinder the operation of standard bridges. If you chose to drop unlearned packets, the remote does not forward unicast packets to a monitoring address that has not already been seen as a source address. This scheme works for most protocols because it relies on the characteristics of most upper-layer protocols to transmit ARP requests or Hello packets. The default is to pass packets with unseen source addresses.


Enable Learned Table Lockdown


A standard bridge watches the source addresses of each packet it receives on any of its ports. As new addresses are seen, entries are added in the bridge table. These entries contain the source address and the port number on which that address was received. If that source address is later seen on a different port, the bridge changes the port number in the learned table entry. This condition could happen in a correctly functioning network if someone moved the computer to a different part of the network.


Enabling learned table lockdown prevents the port number from being changed after the source address has been seen. A standard bridge also times-out the learned table records. If learned table lockdown is enabled, then these records are not be timed out; once a record is learned, it cannot be changed or deleted until either the bridge reboots or the learned table becomes completely filled and needs to be reset. A typical remote learned table can contain over 10,000 records. The default is for this option to be disabled.


For more information about the remote monitoring solutions visit this link..

No comment yet.
Scooped by Virender Singh!

4 New Social Media Ads You Should Try In 2015

4 New Social Media Ads You Should Try In 2015 | Business World |

With Facebook banking on making businesses pay for exposure, brands have had to invest in advertising. 


Mandy Edwards does a great job laying out the types of ads that could work for brands in 2015. Her list:


- Google Plus post ads

- Facebook mobile app ads

- "Buy Now" ads

- Target people on Facebook who visited your website


Which type of ad do you think could be the most efficient?


Read the article at




Cendrine Marrouat



Gary Campbell's curator insight, January 13, 2015 8:29 AM

It 's obvious that advertising thru a social media platform is the future. Based on your budget, I believe small business people must begin using ads and check on the efficiency. of what they use. I am learning everything is a tweaking process, one platform may work well for your brand or service, but another platform may not. Opportunity abounds because these processes could be blogged about, as it helps us all learn the pathway for success within this new terrain of social media marketing.

Rescooped by Virender Singh from Into the Driver's Seat!

What Teachers Need to Know about Critical Thinking Vs Creative Thinking ~ Educational Technology and Mobile Learning

What Teachers Need to Know about Critical Thinking Vs Creative Thinking ~ Educational Technology and Mobile Learning | Business World |

Via Educatorstechnology, Mark E. Deschaine, PhD, Jim Lerman
Willem Kuypers's curator insight, December 16, 2014 10:47 AM

Clarification de deux types pensées, tous les deux aussi nécessaires l'un que l'autre. Puis le lien est fait avec l'apprentissage et le mobile.

James Mackie's curator insight, December 22, 2014 9:43 AM

Understanding the differences between critical thinking, creative thinking and the intersection of both

Manú Iñaki's curator insight, April 7, 2015 9:08 AM

Muchas personas piensan que el pensamiento crítico y el pensamiento creativo son similares o iguales, sin embargo aunque hay áreas comunes, existen diferencias sustanciales, en este post se analiza la diferencia y coincidencia entre estas formas de pensar

Scooped by Virender Singh!

MsFairy - Fashion Dresses, Clothing, Shoes, Accessories for Women Online Sale Store - YouTube Msfairy fashion and Boutique Clothes has the great deals when it comes about the fashion. MsFairy online store supplies women fashion...
No comment yet.