Saturday, 25 November 2017

CISCO linksys router WRTG45GS Advance Settings and Description


LINKSYS Router:-





Wireless Router Advance Setting Description.


The Wireless screen allows you to customize data transmission settings. In most cases, the advanced settings on this screen should remain at their default values.




Authentication Type


The default is set to Auto, which allows either Open System or Shared Key authentication to be used. For Open System authentication, the sender and the recipient do NOT use a WEP key for authentication. For Shared Key authentication, the sender and recipient use a WEP key for authentication. If you want to use only Shared Key authentication, then select Shared Key.


Transmission Rate


The default setting is Auto. The range is from 1 to 54Mbps.
The rate of data transmission should be set depending on the speed of your wireless network. You can select from a range of transmission speeds, or keep the default setting, Auto, to have the Router automatically use the fastest possible data rate and enable the Auto-Fallback feature. Auto-Fallback will negotiate the best possible connection speed between the Router and a wireless client.


Basic Rate


The default value is set to Default. Depending on the wireless mode you have selected, a default set of supported data rates will be selected. The default setting will ensure maximum compatibility with all devices. You may also choose to enable all data rates by selecting ALL. For compatibility with older Wireless-B devices, select 1-2Mbps.


CTS Protection Mode


The default value is set to Disabled. When set to Auto, a protection mechanism will ensure that your Wireless-B devices will connect to the Wireless-G Router when many Wireless-G devices are present. However, a performance of your Wireless-G devices may be decreased.


Frame Burst


Allows packet bursting which will increase overall network speed.

Beacon Interval


The default value is 100. Enter a value between 1 and 65,535 milliseconds. The Beacon Interval value indicates the frequency interval of the beacon. A beacon is a packet broadcast by the Router to synchronize the wireless network.


RTS Threshold


This value should remain at its default setting of 2347. The range is 0-2347 bytes.

Should you encounter inconsistent data flow, only minor modifications are recommended. If a network packet is smaller than the preset RTS threshold size, the RTS/CTS mechanism will not be enabled. The Router sends Request to Send (RTS) frames to a particular receiving station and negotiates the sending of a data frame. After receiving an RTS, the wireless station responds with a Clear to Send (CTS) frame to acknowledge the right to begin transmission.


Fragmentation Threshold


This value should remain at its default setting of 2346. The range is 256-2346 bytes. It specifies the maximum size for a packet before data is fragmented into multiple packets. If you experience a high packet error rate, you may slightly increase the Fragmentation Threshold. Setting the Fragmentation Threshold too low may result in poor network performance. Only minor modifications of this value are recommended.


DTIM Interval


The default value is 1. This value, between 1 and 255 milliseconds, indicates the interval of the Delivery Traffic Indication Message (DTIM). A DTIM field is a countdown field informing clients of the next window for listening to broadcast and multicast messages. When the Router has buffered broadcast or multicast messages for associated clients, it sends the next DTIM with a DTIM Interval value.  Its clients hear the beacons and awaken to receive the broadcast and multicast messages.


AP Isolation


Creates a separate virtual network for your wireless network. When this feature is enabled, each of your wireless client will be in its own virtual network and will not be able to communicate with each other. You may want to utilize this feature if you have many guests that frequent your wireless network.



Wireless MAC Filters


The Wireless MAC Filters feature allows you to control which wireless-equipped PCs may or may not communicate with the Router's depending on their MAC addresses. To disable the Wireless MAC Filters feature, keep the default setting, Disable. To set up a filter, click Enable, and follow these instructions:

1.      If you want to block specific wireless-equipped PCs from communicating with the Router, then keep the default setting, Prevent PCs listed from accessing the wireless network. If you want to allow specific wireless-equipped PCs to communicate with the Router, then click the radio button next to Permit only PCs listed to access the wireless network.
2.      Click the Edit MAC Filter List button. Enter the appropriate MAC addresses into the MAC fields.

Note: For each MAC field, the MAC address should be entered in this format: xxxxxxxxxxxx (the x's represent the actual characters of the MAC address).
3.      Click the Save Settings button to save your changes. Click the Cancel Changes button to cancel your unsaved changes. Click the Close button to return to the Advanced Wireless screen without saving changes.


Wireless


Mode

If you have Wireless-G and 802.11b devices in your network, then keep the default setting, Mixed. If you have only Wireless-G devices, select G-Only. If you want to disable wireless networking, select Disable. If you would like to limit your network to only 802.11b devices, then select B-Only.


SSID

The SSID is the network name shared among all devices in a wireless network. The SSID must be identical for all devices in the wireless network. It is case-sensitive and must not exceed 32 alphanumeric characters, which may be any keyboard character. Make sure this setting is the same for all devices in your wireless network. For added security, Linksys recommends that you change the default SSID (Linksys) to a unique name of your choice.


SSID Broadcast

When wireless clients survey the local area for wireless networks to associate with, they will detect the SSID broadcast by the Router. To broadcast the Router SSID, keep the default setting, Enable. If you do not want to broadcast the Router SSID, then select Disable.


Channel

Select the appropriate channel from the list provided to correspond with your network settings, between 1 and 11. All devices in your wireless network must use the same channel in order to function correctly.


Check all the values and click Save Settings to save your settings. Click Cancel Changes to cancel your unsaved changes.



Thursday, 23 November 2017



How to Develop a Holistic Cloud Data Management Strategy –


Actifio Briefing Note





Many organizations have identified the public cloud as an important tool in their data protection and data management strategies. Vendors are quick to jump on this interest. The problem is most of the solutions vendors provide are fairly myopic and only use a part of the cloud capabilities in their solutions. IT needs to look for a solution that enables a more holistic use of the public cloud.

A Public Cloud Capability Inventory

Most organizations, as they start their cloud journey, look at the cloud as a giant digital dumping ground. They store backups and maybe even archive data to one type of cloud storage at one provider. This dumping ground use case ignores the fact that there are multiple cloud providers, each with different types of storage tiers and, of course, there is a vast amount of processing resources available to act on the data they move to the cloud. Also, different cloud providers are developing expertise in certain areas, some are better at video and audio processing, others at machine learning and analytics, other still are known for airtight security.

To tap into this inventory of capabilities IT needs to equip the organization with tools that allow for not only the movement of data to and between clouds, but also the ability to move data in its native form and in some cases, even transform that data so it is ready to run in the destination cloud.

Data Protection is Just a Starting Point

There is a reason data protection is the number one task organizations use to begin their cloud journey. Cloud backup, and especially disaster recovery as a service (DRaaS), simplify most difficult to manage processes in the data center. And data protection should continue to be the first step, but IT needs to be careful the solution isn’t so myopic that as the organization looks for other cloud use cases it can’t leverage the data protection process to enable them.

DRaaS is certainly a step in the right direction. It expands the cloud backup use case by enabling a customer’s virtual machines (VM) to run in a provider’s cloud in the event of a disaster. In this case, the cloud is used for more than just storage. These solutions leverage cloud compute to instantiate those VMs.

To be more than just data protection, the solution has to provide several key capabilities. First, it has to, obviously, support multiple cloud providers like Amazon, Google, Azure and others. It also has to support private cloud storage (object storage).

Second, the solution needs to move data in its native format, not a proprietary backup format. Storing data in a backup format means time is required to move the data out of the format into another format.

Third, the solution needs to be cloud-tier aware. Each of the major cloud providers has at least three tiers of storage; a high performance but expensive tier, a more affordable but less performing middle tier, and a cold tier that is cost effective but slow to retrieve data from. IT needs the flexibility to use more than one tier depending on the use case. The solution should enable them to quickly move data between tiers based that need.

Finally, the solution needs to be multi-cloud aware. The ability to move data between clouds is becoming increasingly important. It enables the organization to leverage specific capabilities of a particular cloud provider or to provide redundancy against cloud failure.

Introducing Actifio 8.0

Actifio is a software-based solution that provides enterprise data-as-a-service. It enables the instant use of data across data centers and multiple clouds. It also enables near real-time protection of data, tracking all those changes, to provide near-instant rollback from cyber-attacks or disasters. Finally, it eliminates the uncontrolled proliferation of copy data by creating what it calls a “Virtual Data Pipeline.”

It works by installing a virtual or physical appliance on-premises and after the initial copy of data is created, new writes are split as data is sent to primary storage. Essentially, the primary copy is updated incrementally forever. The Actifio Virtual Data Pipeline then manages this copy of data and provides read/write virtual copies of data to various processes like analytics, test-dev and DR.

In its 8.0 release, Actifio raises the bar. First, it provides native, multi-cloud support. Actifio can copy data to and from on-premises storage to a wide variety of public cloud providers including Amazon AWS, Google Cloud Platform, Microsoft Azure, IBM Bluemix and Oracle Cloud.

More importantly, it places that data in those respective clouds in a native format so the applications running in those clouds can instantly access it. As it does with on-premises data, an Actifio instance in the cloud can manage a single cloud copy and then present virtual images to cloud based applications.

The 8.0 release also improves Actifio’s cloud mobility capabilities. It can now convert from physical server to a VMware VM’s VMDK to an Amazon AMI. At that point, the VM can run in the Amazon cloud. The solution is not limited to Amazon, it can provide this capability for all of its supported clouds.

In the Amazon use case, Actifio can also convert back to VMDK. For example, a VMware VM could be pushed to Amazon AWS, run for a period of time, a seasonal peak, then be converted back to a VMDK and moved back on-premises.

With data now potentially spread across several clouds and organization owned data centers, knowing what data is where is a big challenge. Fortunately, the 8.0 release provides a global catalog, creating a common metadata index of all data regardless of data. Now multi-cloud organizations can find their data no matter where.

Finally, the 8.0 release unveils Actifio’s Cloud-based customer success. This is an always-on customer engagement platform for monitoring, supporting and resolving the customer’s Actifio architecture. The solution correlates analytics, not actual data, to provide a community approach to identifying and solving problems.

StorageSwiss Take

Organizations are understanding the value of the data they create and collect. As a result, they are storing more data. And that data needs to be operated on by more than the user, application or location that created it. Instead, that data needs to be made available to multiple locations, clouds and other compute services.

Actifio created one market, copy data management, then evolved into a data as a service company based on how enterprises were utilizing the technology. It enables organizations to leverage the data they create and then move that data to the platform or cloud that makes the most sense to operate on that data. 8.0 is a significant step toward unshackling data, while at the same time curtailing its growth so that organizations can extract more value than ever from the data that they store.



Friday, 10 November 2017

Tape Capacities Show No Sign of Slowing Down


LTO Generation:-

The LTO consortium announced the availability of LTO-8, the next generation of LTO tape technology.  LTO is run by three technology provider companies (TPCs), namely HPE, IBM, and Quantum.  Since the first products were released in 2000, LTO media has increased from 100GB capacity with LTO-1 to 12TB on LTO-8.  The future shows a roadmap of cartridges capable of holding half a petabyte of compressed data within another decade.

Timeline of the growth of LTO media from 2000 to 2017





LTO Roadmap


Figure 1 shows the LTO timeline of product releases, with capacities and throughput.  The right axis shows capacity, scaling from 100GB to 12,000GB with LTO-8.  I’ve drawn the graph with a logarithmic scale because the early products don’t show on the graph at all.  Figures are quoted in GB because the graph would revert to negative numbers when using TB capacities (100GB = 0.1TB, but is negative on a log scale).  The right axis shows throughput in MB/s, from 20MB/s initially, to 300MB/s with LTO-8.  Again this scale is logarithmic.

We can see straight-line growth improvements in capacity from the technology, to the point you can almost draw a line with a ruler across the data points.  Throughput has been more challenging, with modest improvements until the jump at LTO-6.  LTO-9 onwards (where the figures are projections rather than actual) show bigger jumps in performance.  There are two straight-line leaps to around 1100MB/s.

LTO Future

The increases in capacity continue for LTO-9 onwards, with a commitment to LTO-11 and LTO-12 generations that weren’t on the previous roadmap.  LTO-12 will have a raw capacity of 192TB (480TB with 2.5:1 compression) and throughput of 1100MB/s.  The idea of being able to store half a petabyte of data on a single cartridge seems hardly imaginable to where the LTO project originally started from.

One of the interesting aspects to LTO and tape continuing to develop at such a rate is the way in which hard drive technology gets incorporated into tape over time.  LTO-8 drives, for example, use TMR heads (tunnel magnetoresistive) rather than GMR.  TMR was originally introduced into disk drives around 2004.  So tape (not just LTO) benefits from the development work done in the hard drive industry.

LTO-8-M

As a small bonus, the new LTO-8 drives will accept new (unused) LTO-7 cartridges and provide 50% additional capacity over an LTO-7 drive.  This capability is being called LTO-8 Type M and is aimed at easing the transition from LTO-7 to LTO-8 for customers who have already invested in LTO-7 media.  So LTO-7 media (typically 6TB) will store 9TB when used in LTO-8 drives.

Changing Role of Tape

When LTO was first introduced, tape was a mainstay of the backup world.  In the 1990’s we saw huge tape silos from vendors like StorageTek that used tape for both backup and archive.  In most cases, archive wasn’t really a thing, but just a collection of historical backups from which data was restored.  The industry has moved on, with dedicated backup appliances now replacing the first generation of disk-based backup storage.  It’s much more practical to use disk for backup, so tape is being positioned more as an archive technology.

On pure media costs alone, tape is way cheaper than disk and a fraction the cost of using online cloud services like S3.  Obviously, TCO includes drives, libraries, software, people as well as media.  So we can’t just look at the cost of a single tape.  However, in a well structured archive, the cost of the media becomes the incremental costs in managing more capacity.  So as an archive scales, the $/GB cost continues to reduce.

Gateway to Tape

Tape is of course purely the medium for storing data.  We need a way to get data on and off tapes and that’s where we see a challenge.  In a recent Storage Unpacked podcast, Martin and I talked about some of the challenges, like using LTFS for format independence.  We also discussed Black Pearl from Spectra Logic.  The Black Pearl appliance is effectively a cache in front of one or more Spectra tape libraries.  It manages the translation of API calls based on AWS S3 into storing data onto tape media.

S3 and object storage, in general, is seen as a great way to archive content, however, using disk at large scale (or even S3) may not be cost-effective.  Large amounts of data in an archive can be inactive, making the cost of storing on disk an expensive one.  AWS itself is probably using tape for Glacier because the access times for content are so long.  This is, of course, reflected in the cost of the service.

Not sure that the object storage vendors have fully embraced tape yet.  To fully scale, object stores will need to support tape and in a way that makes it flexible and easy to use.

Shiny fun stuff tends to get the news in storage (and probably all of IT).  However, storage has always had a cost/performance/capacity balancing act to achieve.  Data Tiering has been around forever and there’s no reason to not include tape.  While backup may be better served by disk, long-term retention of data suits tape well.  This could be for compliance or as part of an active archive.


Monday, 9 October 2017

New software turns mobile-phone accessory into breathing monitor



The Optical Society ( OSA)


Researchers have developed new software that makes it possible to use low-cost, thermal cameras attached to mobile phones to track how fast a person is breathing. This type of mobile thermal imaging could be used for monitoring breathing problems in elderly people living alone, people suspected of having sleep apnea or babies at risk for sudden infant death syndrome (SIDS).





In The Optical Society (OSA) journal Biomedical Optics Express, the researchers report that their new software combined with a low-cost thermal camera performed well when analyzing breathing rate during tests simulating real-world movement and temperature changes.

"As thermal cameras continue to get smaller and less expensive, we expect that phones, computers and augmented reality devices will one day incorporate thermal cameras that can be used for various applications," said Nadia Bianchi-Berthouze from University College London, (UK) and leader of the research team. "By using low-cost thermal cameras, our work is a first step toward bringing thermal imaging into people's everyday lives. This approach can be used in places other sensors might not work or would cause concern."

In addition to detecting breathing problems, the new approach could one day allow the camera on your computer to detect subtle breathing irregularities associated with pain or stress and then send prompts that help you relax and regulate breathing. Although traditional video cameras can be used to track breathing, they don't work well in low-light situations and can cause privacy concerns when used for monitoring in nursing homes, for example.

"Thermal cameras can detect breathing at night and during the day without requiring the person to wear any type of sensor," said Youngjun Cho, first author of the paper. "Compared to a traditional video camera, a thermal camera is more private because it is more difficult to identify the person."

Personal thermal cameras

Thermal cameras, which use infrared wavelengths to reveal the temperature of an object or scene, have been used in a variety of monitoring applications for some time. Recently, their price and size have dropped enough to make them practical for personal use, with small thermal cameras that connect to mobile phones now available for around $200.

"Large, expensive thermal imaging systems have been used to measure breathing by monitoring temperature changes inside the nostrils under controlled settings," said Cho. "We wanted to use the new portable systems to do the same thing by creating a smart-phone based respiratory tracking method that could be used in almost any environment or activity. However, we found that in real-world situations this type of mobile thermal imaging was affected by changes in air temperature and body movement."

To solve these problems, the researchers developed algorithms that can be used with any thermal camera to compensate for ambient temperature changes and accurately track the nostrils while the person is moving. In addition, the new algorithms improve the way breathing signals are processed. Instead of averaging the temperature readings from 2D pixels around the nostrils, as has been done in the past, Cho developed a way to treat the area as a 3D surface to create a more refined measurement of temperature in the nostrils.

Testing in real-world situations

In addition to indoor laboratory tests, the researchers used the mobile thermal imaging approach to measure the breathing of volunteers in a scenario that involved breathing exercises with changes in ambient temperature and in a fully unconstrained test where volunteers walked around inside and outside of a building. During the walking tests, the thermal camera was placed between 20 and 30 centimeters from a person's face using a rig that attached the camera to a hat. A cord then connected the camera with a mobile phone carried by study volunteers. It is also possible to hold a smartphone with an imaging camera about 50 centimeters from the face to measure breathing.

"For all three types of studies, the algorithms showed significantly better performance in tracking the nostril area than other state-of-the-art methods," said Cho. "In terms of estimating the breathing rate, the tests outside the laboratory showed the best results when compared with the latest algorithms. Although the results were comparable to the traditional breathing belt sensor, for mobile situations our approach seems to be more stable because the belt tends to get loose."

Because the new approach is more stable than standard chest belt respiratory sensors, the method could potentially be used to optimize an athlete's performance by providing more reliable and accurate feedback on breathing patterns during exercise.

The researchers took their work one step further by inferring a person's mental load or stress through automatic breathing analysis. They used their thermal imaging software to track the breathing of people who were free to move around while performing various types of tasks, and the results aligned well with findings from studies that used much more sophisticated equipment, indicating the portable thermal-camera based approach could be a useful tool for apps that help people relax.

"By using mobile thermal imaging to monitor only breathing, we obtained results very comparable to what other studies had found," said Bianchi-Berthouze. "However, those studies used complex, state-of-the-art techniques that involved multiple sensors monitoring not just breathing but also heart rate."

The current version of the software doesn't estimate the breathing rate in real time, but the researchers are working to incorporate this capability and to test their algorithms in more real-life situations.



Wednesday, 4 October 2017

How to Lock the File in UNIX


FILE Locking in UNIX



LOCK THAT FILE DOWN

Sometimes you want to make a file very very secure.

To do this, change the permissions to 000





# chmod 000 [file]

No one except root will be able to access it.
Even the owner will have to change the
permissions to be able to do anything to it.


Although It's like a red flag that says.. "I'm an important file"





NOTE: DO NOT EVER DO THIS TO THE /etc/passwd FILE!

Sunday, 1 October 2017

How to reset the MAC hardware



Reset Mac Hardware:-



NVRAM corruption is fairly uncommon, but if your Mac seems to take forever to figure out which disk to boot from, if it starts up with the wrong screen resolution, or if you have weird audio problems (like there’s no sound whatsoever, or the menu bar’s volume control is grayed out), it doesn’t hurt to reset the NVRAM—it’s quick and harmless.




To reset your NVRAM, you use exactly the same procedure you once used to reset PRAM.

-- Shut down your Mac.

-- Press the power button, and as soon as you hear the startup chime, hold down Command-Option-P-R.

-- Keep holding down those keys until you hear a second startup chime. Then let go and allow your Mac to continue starting normally.

-- Then check the Startup Disk, Display, and Date & Time panes of System Preferences to make sure they’re set the way you want them.




Saturday, 16 September 2017

Ten Countries Where One Indian Rupee Will Make You Feel A Lot Richer



Indian Rupee Will Make You Feel A Lot Richer


We think twice before planning a trip to New York, Paris or Australia. Because we think that Indian rupee is a weak currency and one needs pots of money to travel to foreign countries.

But what if I tell you that there are several countries in the world where carrying less money won't affect your travel experience anymore. Because Indian Rupee is a strong currency compared to currencies of those countries.

Yes! You can spend vacations at beautiful places where the Indian rupee is held as a strong currency.

In nutshell, these are the countries where the Indian currency is higher. Fret not, just book affordable flights to these countries and explore without bothering much for the budget. No time for being price conscious now because, at these places, Indian Rupee will make you feel rich.

Conversion rates may alter  


1. Sri Lanka  



1 INR (Indian Rupee) = 2.37 LKR (Sri Lankan Rupee)

Sri Lanka is a perfect place to visit for people who love thrill and wildlife. Did you know that though the country is small in size, it is considered among the top five biodiversity hotspots in the world?

Elephants, sloth bear, leopards, sambar and wild buffaloes are a treat to watch. The country is also known for being one of the best places for beach holidays because of its two monsoon winds that bring rains in two corners of the country at the different point of time.





2. Indonesia



1 INR (Indian Rupee) = 207.58 IDR (Indonesian Rupiah)

What makes Indonesia wonderful is that it is the largest archipelago ( a group of islands) in the world comprising 13,466 large and small tropical islands.

I don't know about you, but I love beaches. The white sandy beach, rolling waves, enchanting culture, dance and music... Wow! Indonesia has pure, blue seas where one can dive with dugongs, dolphins and large manta rays. You must have heard about the giant Komodo lizard, the Orang Utan, the Java rhino, the Sulawesi anoa dwarf buffalos, the cockatoo and the bird of paradise, these all are the jewels of this country.

A perfect package for holidays where you don't need to spend a lot of money because the value of the Indian rupee is higher than country's currency.  





3. Vietnam



1 INR (Indian Rupee) = 353.78 VND (Vietnamese Dong)

Vietnam is known for its beaches, old towns, rural adventures and islands and waters. It is famous for its Ruou ran (snake wine), a Vietnamese speciality of rice wine with a pickled snake inside, and is believed that it can cure any sickness. A fascinating thing about the country is that the Vietnamese language has six different tones. This means that every time the tone changes, so does the meaning of the word. This makes the language a bit difficult to understand.  





4. Costa Rica



1 INR (Indian Rupee) = 8.96 CRC (Costa Rican Colón)

Called as one of the most visited international destinations, Costa Rica, is a place one can visit any time of the year. The jungle, the beaches, lush flora and adventures are the highlight of the country.

It has Tortuguero National Park, which is called little Amazon forest because of its rich biodiversity. It has green turtle, the manatee, the American crocodile and the Gaspar fish, which is a living fossil. You will be surprised to know that Costa Rica is home to some of the most important turtle nesting beaches in the world. This means hundreds of turtles arrive on Costa Rican beaches to complete their tireless mission for survival.





5. Japan



1 INR (Indian Rupee) = 1.70 JPY (Japanese Yen)

Japan is famous for its dense cities, imperial palaces, mountainous national parks and thousands of shrines and temples. Couples in Japan celebrate Christmas just like Valentine's Day. If you're a foodie, Japan offers famous Noodles, especially soba (buckwheat), that is slurped loudly when eaten. It's believed that slurping indicates that the food is delicious.  




6. Iceland 



1 INR (Indian Rupee) = 1.66 ISK (Icelandic Króna)

Iceland has no forests. The country has many more things that will amaze you. Like the babies in Iceland are routinely left outside to nap. There are no surnames in Iceland. People use the traditional Nordic naming system. Under this, an individual's name includes his/her father's name first. The father's name follows one's own name.    




7. Paraguay:-



1 INR (Indian Rupee) = 88.24 PYG (Paraguayan Guarani)

Did you know that Paraguay was called Parrot? According to the ancient facts, the name Paraguay comes from a parrot which was known by the name of Frank. It was first found and eaten by the earliest Jesuit who settled in this place.    





8. Cambodia:-



1 INR (Indian Rupee) = 63.69 KHR (Cambodian Riel)

There goes a saying that Cambodians can eat anything. People buy fresh food daily from many open air markets located across cities. They have the greeting tradition called 'sampeah', which is based on India's way of saying 'namaste.'

As per old tradition, birthdays are not celebrated in Cambodia. Older people don't even remember
their birthdays.  





9. Hungary



1 INR (Indian Rupee) = 4.00 HUF (Hungarian Forint)

An extraordinary country where wine is produced since the 5th century AD. For those who have never been to Hungary, there's a place Budapest's City Park which has the statue of Anonymus. He holds a pen. According to local legends, touching it can bless you with great writing abilities. Hungarian nagymamák (grandmas) swear by the power of Pálinka. It is a famous fruit brandy, which is a cure for most ailments. This is how it goes.

Headache? Pálinka. Menstrual pains? Pálinka. Feeling nervous? Pálinka. As the saying goes: "Palinka in small amounts is a medicine, in large amounts a remedy."





10. South Korea



1 INR (Indian Rupee) = 17.67 (KRW) South Korean Won

South Korea will dazzle you with beautiful landscapes, amazing food, advanced technology, efficient public transit system and incredible shopping offers. You will be shocked to know about the 'Ajummas', Korean for 'elderly ladies'.

'Ajummas' rule the streets as they can rob you of your belongings, or they can even shoo you away. But they are respected in South Korean society no matter what they do



Free PDF books available for download


PDF books 

Dear All,

In need of any book(.pdf) relating to any subject/field or topic?
go to your browser and type:

 www.pdfdrive.net





And u will get access to millions of books u need for free.
Unlimited downloads.


You may browse by title or author, etc.

Currently 289,564,453 books are available for free and every minutes around 50 new books are added to the database.
All downloads are free😊.



Sharing is caring!!

Wednesday, 6 September 2017

What is Data Protection Manager (DPM)?



Data Protection Manager

I’ve talked about DPM a lot lately and I still receive more questions like: “What is DPM?” and “What makes DPM so good?”.  To me, DPM is the best backup solution for the Windows Platform. Period!  DPM allows you to backup File Servers (even open files!), that’s easy, but it also allows you to backup Exchange Servers, SQL Servers, SharePoint Servers, Virtualized workloads, and desktops!  DPM can even back up your mobile desktops.




Not only does it allow you to intelligently backup these workloads, but it does all of this without creating an outage to take these backups.  DPM will make backups of your Exchange Servers, SQL Servers, SharePoint Servers, Virtualized workloads, File Servers, and desktops in real time without user interruption!  Take note: virtualized workloads can be backed up in real time as long as the guest OS is VSS aware (Volume Snapshot Service).  VSS is included in Windows Server 2003, Windows Server 2008 (and R2) as well as the Client OS’, Windows XP, Windows Vista, and Windows 7.  These virtualized versions of Windows can be backed up in real time.  Keep in mind that the Windows Client OS’ are the professional SKUs only.  The home use SKU’s are not supported in a virtual environment.





For non-VSS aware OS’, the VM is paused while a snapshot backup is taken.  Typically, this snapshot backup takes less than two minutes, but there is an outage while this snapshot is being taken.  DPM can even allow you to backup an Exchange, SQL or SharePoint server within a VM.  I just love this flexibility, because now you can backup (and restore) all of your important workloads seamlessly with one tool.


As you know, I love doing the “How to videos” so you can see our products in action.  This time, instead of doing the video myself, I’m going to point you to a great video presented by Jason Buffington.  Jason was one of our Technical Product Managers for DPM and does a great job of helping you understand the impact DPM can have on your backup needs.  



Here’s more detail on how to get started with DPM:

DPM Overview Datasheet

How to protect Exchange with DPM Datasheet


The Data Protection Manager landing page with more information on DPM:


http://www.microsoft.com/en-us/server-cloud/system-center/data-protection-manager.aspx


Friday, 28 July 2017

When using screen tool error cannot open your terminal /dev/pts/0 in Linux

Screen Tool Error

When using the screen tool you may be unable to start a screen session but instead encounter an error:

Logs:-

Cannot open your terminal '/dev/pts/0' - please check.
This is because another user (you) initiated the current terminal – you probably did a sudo su into the user you are now trying to run screen as, right?'





There are two ways to resolve this:

Sign out and properly connect / sign in as the user you wish to use.
Run script /dev/null to own the shell (more info over at Server Fault); then try screen again.
Important: Do not chmod the virtual terminal device like suggested at (way too many) places around the interwebs. This gives other users read and write access to the terminal session!

Thursday, 27 July 2017

Microsoft launches smartphone app called Kaizala


KAIZALA


Microsoft today launched a new smartphone app called Kaizala. Microsoft Kaizala is meant for organizations and businesses to conduct group communications and manage work easily. Microsoft Kaizala is available for both iOS and Android users for free. Additionally, Kaizala Pro, the paid version for enterprises was also launched yesterday.





Microsoft today launched a new smartphone app called Kaizala. Microsoft Kaizala is meant for organizations and businesses to conduct group communications and manage work easily. Microsoft Kaizala is available for both iOS and Android users for free. Additionally, Kaizala Pro, the paid version for enterprises was also launched yesterday.





Every file shared within the group, particularly action cards can be commented on, liked, and shared by users. Groups created in Kaizala have a unique feature of adding members in bulk. Also, the limit of members in one group can go up to millions, as said by Anant Maheshwari, President, Microsoft India. 


Aimed at a mobile-centric world, Maheshwari clarifies that Kaizala is different from existing platforms like Microsoft Teams and Office 365. Both of these products are desktop friendly, and aimed at businesses respectively. Keeping India’s poor internet connectivity in mind, Kaizala is optimized to work offline and on 2G network as well. Maheshwari also says that this is a ‘Made for India’ product, and there are no plans for a global launch yet.





Speaking about Microsoft Kaizala Pro, it can be purchased at a price of Rs 130 per month. It comes with more features like user and group management, system integration and automation using Microsoft Kaizala APIs. Users can also perform advanced reporting and analytics, publish custom actions, create public groups and more.



Tuesday, 18 July 2017

About Log Shipping SQL Server


Log Shipping:-


Log shipping is the process of automating the backup of a database and transaction log files on a primary (production) database server and then restoring them onto a standby server. This technique is supported by Microsoft SQL Server, 4D Server, MySQL, and PostgreSQL.




Similar to replication, the primary purpose of log shipping is to increase database availability by maintaining a backup server that can replace production server quickly. Other databases such as Adaptive Server Enterprise and Oracle Database support the technique but require the Database Administrator to write code or scripts to perform the work.

Although the actual failover mechanism in log shipping is manual, this implementation is often chosen due to its low cost in human and server resources, and ease of implementation. As a comparison, SQL server clusters enable automatic failover, but at the expense of much higher storage costs. Compared to database replication, log shipping does not provide as much in terms of reporting capabilities, but also backs up system tables along with data tables, and locks standby server from users' modifications.

A replicated server can be modified (e.g. views) and therefore is not suitable for failover purposes.




About Log Shipping (SQL Server):-


SQL Server Log shipping allows you to automatically send transaction log backups from a primary database on a primary server instance to one or more secondary databases on separate secondary server instances. The transaction log backups are applied to each of the secondary databases individually. An optional third server instance, known as the monitor server, records the history and status of backup and restore operations and, optionally, raises alerts if these operations fail to occur as scheduled.

-- Benefits
-- Terms and Definitions
-- Log Shipping Overview
-- Interoperability
-- Related Tasks
-- Benefits

Provides a disaster-recovery solution for a single primary database and one or more secondary databases, each on a separate instance of SQL Server.

Supports limited read-only access to secondary databases (during the interval between restore jobs).
Allows a user-specified delay between when the primary server backs up the log of the primary database and when the secondary servers must restore (apply) the log backup. A longer delay can be useful, for example, if data is accidentally changed on the primary database. If the accidental change is noticed quickly, a delay can let you retrieve still unchanged data from a secondary database before the change is reflected there.

Terms and Definitions

Primary server:-

The instance of SQL Server that is your production server.

Primary database:-

The database on the primary server that you want to back up to another server. All administration of the log shipping configuration through SQL Server Management Studio is performed from the
primary database.

Secondary server:-

The instance of SQL Server where you want to keep a warm standby copy of your primary database.
secondary database

The warm standby copy of the primary database. The secondary database may be in either the RECOVERING state or the STANDBY state, which leaves the database available for limited read-only access.

Monitor server:-

An optional instance of SQL Server that tracks all of the details of log shipping, including:
When the transaction log on the primary database was last backed up.
When the secondary servers last copied and restored the backup files.
Information about any backup failure alerts.

Important

Once the monitor server has been configured, it cannot be changed without removing log shipping first.

Backup job

A SQL Server Agent job that performs the backup operation, logs history to the local server and the monitor server, and deletes old backup files and history information. When log shipping is enabled, the job category "Log Shipping Backup" is created on the primary server instance.

Copy job

A SQL Server Agent job that copies the backup files from the primary server to a configurable destination on the secondary server and logs history on the secondary server and the monitor server. When log shipping is enabled on a database, the job category "Log Shipping Copy" is created on each secondary server in a log shipping configuration.

Restore job:-

A SQL Server Agent job that restores the copied backup files to the secondary databases. It logs history on the local server and the monitor server, and deletes old files and old history information. When log shipping is enabled on a database, the job category "Log Shipping Restore" is created on the secondary server instance.

Alert job

A SQL Server Agent job that raises alerts for primary and secondary databases when a backup or restore operation does not complete successfully within a specified threshold. When log shipping is enabled on a database, job category "Log Shipping Alert" is created on the monitor server instance.




Tips:-

For each alert, you need to specify an alert number. Also, be sure to configure the alert to notify an operator when an alert is raised.

Log Shipping Overview
Log shipping consists of three operations:
Back up the transaction log at the primary server instance.
Copy the transaction log file to the secondary server instance.
Restore the log backup on the secondary server instance.

The log can be shipped to multiple secondary server instances. In such cases, operations 2 and 3 are duplicated for each secondary server instance.

A log shipping configuration does not automatically fail over from the primary server to the secondary server. If the primary database becomes unavailable, any of the secondary databases can be brought online manually.

You can use a secondary database for reporting purposes.
In addition, you can configure alerts for your log shipping configuration.

A Typical Log Shipping Configuration

The following figure shows a log shipping configuration with the primary server instance, three secondary server instances, and a monitor server instance. The figure illustrates the steps performed by backup, copy, and restorejobs, as follows:





The primary server instance runs the backup job to back up the transaction log on the primary database. This server instance then places the log backup into a primary log-backup file, which it sends to the backup folder. In this figure, the backup folder is on a shared directory—the backup share.

Each of the three secondary server instances runs its own copy job to copy the primary log-backup file to its own local destination folder.

Each secondary server instance runs its own restore job to restore the log backup from the local destination folder onto the local secondary database.

The primary and secondary server instances send their own history and status to the monitor server instance.