Alert: Ops DB Free Space Low
Resolution:
Go to the Operation Manager database, enable the autogrowth and change the initial size value according to your database size calculation.
Before:
After:
Thursday, 29 January 2015
Wednesday, 28 January 2015
IT Technology: AirDroid
AirDroid lets you use and manage your Android device over the air, using only a Web browser. It’s a wire-free solution for those who hate having to switch between computer and phone/tablet frequently.
All that you need to be able to use AirDroid are the following:
Android phone or tablet with AirDroid installed. You can get AirDroid for free from the Play Store.
A desktop computer, notebook, or netbook with a standards-compliant Web browser (e.g., Mozilla Firefox, Google Chrome, Opera). Unlike many other wireless solutions or remote managers for Android, AirDroid doesn’t need you to install additional companion software on your computer because you can access AirDroid directly from any Web browser. This also means that AirDroid works on all major desktop platforms — Linux, Mac, Windows.
Wireless LAN. You’ll need your Android device to be connected to a local wireless network, at the very least. But, having an Internet connection is preferred if you want to enjoy more AirDroid features and options. AirDroid serves as a control center that accesses your data on your Android device and relays the data to your Web browser. Your Internet connection serves as the pathway between AirDroid and your computer.
IT Technology: Google Taps WePay to Put Wallet Support in 200K More Online Stores
Google Wallet just struck up a partnership with payment processor WePay to put its Instant Buy API in 200,000 e-commerce shops.
WePay is a payment processor that powers invoicing applications, marketplaces, and donation platforms like GoFundMe. Through its relationship with InvoiceASAP, it also provides payment processing for some 200,000 small and medium online businesses.
“This integration with WePay will now expand its reach and allow us to support small business owners through WePay’s hosted payment offering, making it easier for them to accept payments online and on mobile devices,” says Steve Klebe, Business Development, Payments for Google.
The integration will allow consumers to pay with their Google Wallet with a couple of taps both online and on mobile. It will also make Google Wallet more visible.
Right now the most visible wallet service on the web is PayPal. On many e-commerce sites PayPal appears alongside Visa and MasterCard. Google launched Google Wallet Instant Buy API in 2013, so that people would have more of an opportunity to use its wallet. Two years down the road it doesn’t have the pervasiveness that PayPal has.
With the launch of Apple Pay, digital payments have been jettisoned into the spotlight. In order to capitalize on that Google needs to make a case for its own payment solution — and fast.
Many merchants are not partial to a payment method. They’re happy to accept whatever consumers want to use — so long as it doesn’t cost them too much.
WePay CEO Bill Clerico is also agnostic. He says WePay is in the process of incorporating Apple Pay.
IT Technology: SAN versus NAS versus DAS
NAS stands for Network Attached Storage. It differs from traditional, directly attached storage in that, in NAS, the operating system and other software on the NAS product are dedicated solely to data storage.
SAN stands for Storage Area Network. A SAN is a network designed to attach storage hardware and software to servers. SANs generally come in two forms: as a network primarily dedicated to transferring data between computer systems and storage systems, or as a complete system that includes all of the storage elements and computer systems within the same network.
DAS stands for Directly Attached Storage. DAS is generally used to differentiate between storage systems directly attached to a server or workstation and NAS and SAN setups.
IT Security: Malware Makers Cash In With Fake YouTube Views
Programmers of malware software have found a new way of making their exploits pay: A newly-discovered scam downloads malware to unsuspecting users’ computers and then makes those machines watch YouTube videos to cash in on the video service’s partner program. The malware, dubbed Trojan.Tubrosa, was able to generate more than two million views for videos uploaded by the malware makers, according to security researchers at Symantec.
YouTube has a few safeguards in place to prevent users from gaming the system. Not only does the video service monitor the types of content uploaded to YouTube to make sure that users aren’t infringing any rights, it also monitors for fraudulent clicks, much in the same way Google monitors its ads for irregular activities.
The developers of Trojan.Tubrosa tried to circumvent these safeguards by dynamically changing referrers in an attempt to trick YouTube’s servers into thinking that each view came from just a single user. In reality, affected machines were generating lots of views. From Symantec’s blog:
“In order to keep its malicious activities secret, the malware will lower the volume of the compromised computer’s speakers to zero. The malware will even update or install Flash on the user’s computer to allow it to view these videos. The user may not realize that anything is amiss until their computer’s resources are fully used up and they experience significant performance degradation.”
Symantec’s researchers expect that the developers of this particular malware made “several thousand dollars.” Google apparently caught on to it eventually, telling Symantec that it was “aware of this malware.”
And of course, YouTube isn’t alone in being targeted by fraudulent views. Ad fraud is a huge problem that the industry doesn’t like to talk about, and estimates vary widely. Some think that around 36 percent of all ad impressions are fraudulent, while others believe the number could be even higher. Kraft went public last year saying that it rejects up to 85 percent of digital ad impressions because of possible fraud and other quality concerns.
Friday, 23 January 2015
IT Technology: WhatsApp Web
You will now have the ability to use WhatsApp on your web browser. The web client is simply an extension of your phone: the web browser mirrors conversations and messages from your mobile device -- this means all of your messages still live on your phone.
To connect your web browser to your WhatsApp client, simply open https://web.whatsapp.com in your Google Chrome browser. You will see a QR code --- scan the code inside of WhatsApp, and you’re ready to go. You have now paired WhatsApp on your phone with the WhatsApp web client. Your phone needs to stay connected to the internet for our web client to work, and please make sure to install the latest version of WhatsApp on your phone. Unfortunately for now, we will not be able to provide web client to our iOS users due to Apple platform limitations.
Reference:
WhatsApp Web
https://blog.whatsapp.com/614/WhatsApp-Web
Thursday, 22 January 2015
Microsoft: Microsoft Windows 10 for FREE!
Microsoft's Windows 10 event is just getting started, and it sounds like the company is eager to make it as easy and cheap as possible for those running older versions of Windows to upgrade. Terry Myerson just announced on stage that, for the first year after Windows 10 launches, any device running Windows 7, Windows 8.1, or Windows Phone 8.1 will be able to upgrade to the latest version of MIcrosoft's OS — for free. How exactly this program will work isn't clear just yet — it'll certainly be subject to some hardware requirements, particularly for older machines running Windows 7. But a simplified upgrade path will likely do a lot to help Windows 10 adoption — rather than dealing with a number of different versions of Windows and different upgrade costs, most consumers will simply take this free update and enjoy running Microsoft's latest.
Beyond this, Myerson shared Microsoft's vision for Windows as a service, not just an operating system. A big part of that is Microsoft's new commitment to keep devices consistently updated throughout the "supported lifetime for the device." It sounds like that means those upgrading from Microsoft's older versions of Windows will consistently receive updates to keep it as up-to-date as possible. Myerson noted that this will let developer "target every single Windows device" when they build apps — anything that makes it easier for developers to reach more users will certainly be appreciated by both the developer community as well as end users.
Reference:
Windows 10 will be a free upgrade for Windows 7 and 8.1 users
http://www.theverge.com/2015/1/21/7866679/windows-10-will-be-a-free-upgrade-for-windows-7-and-8-1-users
Monday, 19 January 2015
Cisco: Cisco Identity Services Engine ( ISE )
Get a security policy management platform that automates and enforces secure access to network resources. Cisco Identity Services Engine (ISE) delivers superior user and device visibility to support enterprise mobility experiences. It shares contextual data with integrated partner solutions to accelerate their capabilities to identify, mitigate, and remediate threats. Cisco Identity Services Engine (ISE) is a network administration product that enables the creation and enforcement of security and access policies for endpoint devices connected to the company’s routers and switches.
Cisco ISE helps IT professionals conquer enterprise mobility challenges and secure the evolving network across the attack continuum. ISE provides you with several capabilities, some of which are listed below.
1. Centralize and unify network access policy management to provide consistent, secure access to end users, whether they connect to your network over a wired, wireless, or VPN connection.
2. Gain greater visibility and more accurate device identification. ISE's superior device profiling and zero-day device profile feed service provides updated profiles for the latest devices. Combined, these two features help reduce the number of unknown endpoints (and potential threats) on your network.
3. Implement logical network segmentation based on business rules by taking full advantage of Cisco TrustSec technology. Use it to create role-based access policy to dynamically segment access without the complexity of multiple VLANs, replicating complicated access control lists across your network, or completely changing network architecture.
4. Simplify guest experiences for easier guest onboarding and administration. Use ISE’s easily-customizable, branded mobile and desktop guest portals to create access in just minutes. ISE’s dynamic visual workflows let you fully manage every aspect of guest access.
5. Streamline BYOD and enterprise mobility with easy, out-of-the-box setup for self-service device onboarding and management. ISE includes an internal certificate authority, multi-forest Active Directory support, and integrated enterprise mobility management (EMM) partner software.
With support for 250,000 active, concurrent endpoints (and up to 1,000,000 registered devices), ISE allows enterprises to accelerate mobility projects across the extended network.
6. Share deep contextual data with third-party ecosystem partner solutions through Cisco Platform Exchange Grid (pxGrid), included within ISE. Contextual data improve the efficacy of partner solutions and accelerate their abilities to identify, mitigate, and remediate network threats.
For example, with ISE, integrated partner solutions can more rapidly remediate threats and streamline network forensics and endpoint vulnerability remediation. They can also provide adaptive single sign-on to identity-federated devices, and even extend secure access to SCADA/control networks - all based on context and identity received from Cisco ISE.
Reference:
Cisco Identity Services Engine
http://www.cisco.com/c/en/us/products/security/identity-services-engine/index.html
Cisco ISE helps IT professionals conquer enterprise mobility challenges and secure the evolving network across the attack continuum. ISE provides you with several capabilities, some of which are listed below.
1. Centralize and unify network access policy management to provide consistent, secure access to end users, whether they connect to your network over a wired, wireless, or VPN connection.
2. Gain greater visibility and more accurate device identification. ISE's superior device profiling and zero-day device profile feed service provides updated profiles for the latest devices. Combined, these two features help reduce the number of unknown endpoints (and potential threats) on your network.
3. Implement logical network segmentation based on business rules by taking full advantage of Cisco TrustSec technology. Use it to create role-based access policy to dynamically segment access without the complexity of multiple VLANs, replicating complicated access control lists across your network, or completely changing network architecture.
4. Simplify guest experiences for easier guest onboarding and administration. Use ISE’s easily-customizable, branded mobile and desktop guest portals to create access in just minutes. ISE’s dynamic visual workflows let you fully manage every aspect of guest access.
5. Streamline BYOD and enterprise mobility with easy, out-of-the-box setup for self-service device onboarding and management. ISE includes an internal certificate authority, multi-forest Active Directory support, and integrated enterprise mobility management (EMM) partner software.
With support for 250,000 active, concurrent endpoints (and up to 1,000,000 registered devices), ISE allows enterprises to accelerate mobility projects across the extended network.
6. Share deep contextual data with third-party ecosystem partner solutions through Cisco Platform Exchange Grid (pxGrid), included within ISE. Contextual data improve the efficacy of partner solutions and accelerate their abilities to identify, mitigate, and remediate network threats.
For example, with ISE, integrated partner solutions can more rapidly remediate threats and streamline network forensics and endpoint vulnerability remediation. They can also provide adaptive single sign-on to identity-federated devices, and even extend secure access to SCADA/control networks - all based on context and identity received from Cisco ISE.
Reference:
Cisco Identity Services Engine
http://www.cisco.com/c/en/us/products/security/identity-services-engine/index.html
Friday, 16 January 2015
IT Technology: DNS Amplification DDoS Attack
DNS Amplification Attacks are a way for an attacker to magnify the amount of bandwidth they can target at a potential victim. Imagine you are an attacker and you control a botnet capable of sending out 100Mbps of traffic. While that may be sufficient to knock some sites offline, it is a relatively trivial amount of traffic in the world of DDoS. In order to increase your attack's volume, you could try and add more compromised machines to your botnet. That is becoming increasingly difficult. Alternatively, you could find a way to amplify your 100Mbps into something much bigger.
The original amplification attack was known as a SMURF attack. A SMURF attack involves an attacker sending ICMP requests (i.e., ping requests) to the network's broadcast address (i.e., X.X.X.255) of a router configured to relay ICMP to all devices behind the router. The attacker spoofs the source of the ICMP request to be the IP address of the intended victim. Since ICMP does not include a handshake, the destination has no way of verifying if the source IP is legitimate. The router receives the request and passes it on to all the devices that sit behind it. All those devices then respond back to the ping. The attacker is able to amplify the attack by a multiple of how ever many devices are behind the router (i.e., if you have 5 devices behind the router then the attacker is able to amplify the attack 5x, see the diagram above).
SMURF attacks are largely a thing of the past. For the most part, network operators have configured their routers to not relay ICMP requests sent to a network's broadcast address. However, even as that amplification attack vector has closed, others remain wide open.
Reference:
Deep Inside a DNS Amplification DDoS Attack
https://blog.cloudflare.com/deep-inside-a-dns-amplification-ddos-attack/
The original amplification attack was known as a SMURF attack. A SMURF attack involves an attacker sending ICMP requests (i.e., ping requests) to the network's broadcast address (i.e., X.X.X.255) of a router configured to relay ICMP to all devices behind the router. The attacker spoofs the source of the ICMP request to be the IP address of the intended victim. Since ICMP does not include a handshake, the destination has no way of verifying if the source IP is legitimate. The router receives the request and passes it on to all the devices that sit behind it. All those devices then respond back to the ping. The attacker is able to amplify the attack by a multiple of how ever many devices are behind the router (i.e., if you have 5 devices behind the router then the attacker is able to amplify the attack 5x, see the diagram above).
SMURF attacks are largely a thing of the past. For the most part, network operators have configured their routers to not relay ICMP requests sent to a network's broadcast address. However, even as that amplification attack vector has closed, others remain wide open.
Reference:
Deep Inside a DNS Amplification DDoS Attack
https://blog.cloudflare.com/deep-inside-a-dns-amplification-ddos-attack/
Google: Google Translate Now Does Real-Time Voice And Sign Translations On Mobile
Google Translate is already a hugely useful app for anyone who lives overseas or travels regularly, and it just got even smarter on mobile. A new update to the Android and iOS apps that is rolling out today introduces two very spiffy features: real-time voice and sign translation.
The app has already offered image-based translation, but now the magic occurs without any delay at all… and — best of all for regular travelers — it works offline.
The visual translation feature is activated when you select the phone camera option inside the app. You then simply point the camera at the sign that you want translated — ensuring that it is captured fully — and the app will translate it.
Real-time voice translation is equally incredible, and can act as an intermediary for two people holding a conversation using different languages.
You tap the in-app mic once and starting talking in the foreign tongue first. Then — once the first language has been recognized — tap the mic again and both people can begin talking. The app pulls in text-based translations of both sides of the conversation in real-time, helping overcome the language barrier.
Voice translation has been a feature on Google Translate for Android for some time, but now it is coming to iOS and will also be “faster and more natural” on Android, Google says.
The sole caveat is that these instant translation features are somewhat limited at first. They only work for English to and from French, German, Italian, Portuguese, Russian and Spanish, but Google said it has plans to expand support with time.
Interestingly, the company also threw out some new stats about the popularity of Translate. It claimed that 500 million people use the service in some form each month, with more than one billion translations made per day.
Those figures are quite incredible and — with two hugely useful new features now up and running on both iOS and Android — Google Translate is likely to grow into even more of a monster hit.
Reference:
Google Translate Now Does Real-Time Voice And Sign Translations On Mobile
http://techcrunch.com/2015/01/14/amaaaaaazing/
The app has already offered image-based translation, but now the magic occurs without any delay at all… and — best of all for regular travelers — it works offline.
The visual translation feature is activated when you select the phone camera option inside the app. You then simply point the camera at the sign that you want translated — ensuring that it is captured fully — and the app will translate it.
Real-time voice translation is equally incredible, and can act as an intermediary for two people holding a conversation using different languages.
You tap the in-app mic once and starting talking in the foreign tongue first. Then — once the first language has been recognized — tap the mic again and both people can begin talking. The app pulls in text-based translations of both sides of the conversation in real-time, helping overcome the language barrier.
Voice translation has been a feature on Google Translate for Android for some time, but now it is coming to iOS and will also be “faster and more natural” on Android, Google says.
The sole caveat is that these instant translation features are somewhat limited at first. They only work for English to and from French, German, Italian, Portuguese, Russian and Spanish, but Google said it has plans to expand support with time.
Interestingly, the company also threw out some new stats about the popularity of Translate. It claimed that 500 million people use the service in some form each month, with more than one billion translations made per day.
Those figures are quite incredible and — with two hugely useful new features now up and running on both iOS and Android — Google Translate is likely to grow into even more of a monster hit.
Reference:
Google Translate Now Does Real-Time Voice And Sign Translations On Mobile
http://techcrunch.com/2015/01/14/amaaaaaazing/
Apple: Aperture and iPhoto are Dead!
Aperture and iPhoto are both being discontinued. They have been updated to run on Yosemite but will not be developed further. They will be replaced by a new app, called Photos.app in this year.
If those have older Aperture or older iPhoto libraries on their older Apple computers and have external drives with images that have ANY value to them whatsoever - you must now take the steps to externally back up those Aperture/iPhoto libraries. You must also then upgrade your systems to Apple OSX 10.10 Yosemite if you can, and then also upgrade your iPhoto libraries to version 9.6 and your Aperture libraries to version 3.6. If you do not - you will be unable to use these "legacy" Aperture and iPhoto libraries in the soon to be released OSX "Photos" software. If you jump ship now and convert your photo libraries to Adobe image processing, you may not be able to convert those same Aperture and iPhoto libraries to the new "Photos" in a few months.
If those have older Aperture or older iPhoto libraries on their older Apple computers and have external drives with images that have ANY value to them whatsoever - you must now take the steps to externally back up those Aperture/iPhoto libraries. You must also then upgrade your systems to Apple OSX 10.10 Yosemite if you can, and then also upgrade your iPhoto libraries to version 9.6 and your Aperture libraries to version 3.6. If you do not - you will be unable to use these "legacy" Aperture and iPhoto libraries in the soon to be released OSX "Photos" software. If you jump ship now and convert your photo libraries to Adobe image processing, you may not be able to convert those same Aperture and iPhoto libraries to the new "Photos" in a few months.
Thursday, 15 January 2015
IT Technology: PUTTY Auto-Login and Send Command to Remote Server
For PUTTY SSH connection, to auto-login, you can simply create a shortcut and pass in these parameters.
1. Create a shortcut on the desktop to putty.exe
2. Rename the shortcut to PuTTY - server.com
3. Right-click shortcut and choose Properties
4. Modify the target similar to: "C:\Program Files\PuTTY\putty.exe" user@server.com -pw password
5. Click OK
To send a command to the remote server, you may perform the steps below:
1. Create a text file containing the commands you like to send to the remote server
2. Add the following parameters at the end of the target: -m <path>\<filename>
For example, "C:\Program Files\PuTTY\putty.exe" user@server.com -pw password -m C:\Temp\Command.txt
1. Create a shortcut on the desktop to putty.exe
2. Rename the shortcut to PuTTY - server.com
3. Right-click shortcut and choose Properties
4. Modify the target similar to: "C:\Program Files\PuTTY\putty.exe" user@server.com -pw password
5. Click OK
To send a command to the remote server, you may perform the steps below:
1. Create a text file containing the commands you like to send to the remote server
2. Add the following parameters at the end of the target: -m <path>\<filename>
For example, "C:\Program Files\PuTTY\putty.exe" user@server.com -pw password -m C:\Temp\Command.txt
Wednesday, 14 January 2015
Google: Chrome Remote Desktop
We have looked at some of the various ways in which remote access of your computer can be achieved, including using TeamViewer and VNC, but if you have Chrome installed you can do the same with nothing more than a browser extension.
It does not matter whether you’re using Windows or OS X (sadly, Linux users are left out in the cold), all you need is the Chrome Remote Desktop extension.
Grab yourself a copy of the add-on from the Chrome Web Store – click the Add To Chrome button followed by Add.
You’ll need to install the extension on both the computer you want to be able to used remotely and any machines you want to be able to use to dial in. Start with the machine you want to be able to control.
This is actually a surprisingly large extension, weighing in at some 22.6MB, but it will install very quickly nonetheless. Once installed, click New Tab and you can access the remote access tool from the list of installed apps.
The first time you launch Chrome Remote Desktop, you’ll need to grant it permission to access your computer. Click Continue, make sure that you are signed into your Google account, and then click ‘Allow access’.
Chrome Remote Desktop can be used in one of two ways – to offer remote assistance to someone or to take remote control of another computer of your own. Click the ‘Get started’ button in the My Computers section. Click the ‘Enable remote connections’ button
As a security measure, you will need to choose a PIN to protect your computer, so enter and confirm a code that is at least six digits in length and then click OK.
You will also need to click Yes in the User Account Control dialog that appears to permit the changes. Once this is done, re-enter your PIN and click Confirm, followed by OK.
Now turn your attention to the machine you’d like to use to take control of your first computer. Run through the same steps to install the necessary extension in Chrome. Make sure that you are signed into the same Google account and then authorize the extension to access it.
Click the Get Started button in the lower portion of the page and you should see an entry for your other computer. By default, this is labeled using the name of the machine, but you can change it by clicking the pencil icon to the right and entering a new name.
To start a remote session, click the name of the computer you would like to connect to, enter the PIN you set up, and hit Connect.
You get to jump in and take control of your remote computer just as if you were sitting in front of it. At the top of the screen, you’ll find a slide-down drawer where there are a limited number of options.
The Disconnect button is self-explanatory, while the ‘Send keys’ menu makes it possible to send keyboard combinations to the remote machine without them being intercepted by the local computer.
From the ‘Screen options’ menu, you can toggle full screen mode on and off as well as choose between viewing the remote desktop at its native resolution or scaled to fit the size of your browser window.
Reference:
How to Use Google Chrome to Remotely Access Your Computer
http://www.howtogeek.com/142146/how-to-use-google-chrome-to-remotely-access-your-computer/
It does not matter whether you’re using Windows or OS X (sadly, Linux users are left out in the cold), all you need is the Chrome Remote Desktop extension.
Grab yourself a copy of the add-on from the Chrome Web Store – click the Add To Chrome button followed by Add.
You’ll need to install the extension on both the computer you want to be able to used remotely and any machines you want to be able to use to dial in. Start with the machine you want to be able to control.
This is actually a surprisingly large extension, weighing in at some 22.6MB, but it will install very quickly nonetheless. Once installed, click New Tab and you can access the remote access tool from the list of installed apps.
The first time you launch Chrome Remote Desktop, you’ll need to grant it permission to access your computer. Click Continue, make sure that you are signed into your Google account, and then click ‘Allow access’.
Chrome Remote Desktop can be used in one of two ways – to offer remote assistance to someone or to take remote control of another computer of your own. Click the ‘Get started’ button in the My Computers section. Click the ‘Enable remote connections’ button
As a security measure, you will need to choose a PIN to protect your computer, so enter and confirm a code that is at least six digits in length and then click OK.
You will also need to click Yes in the User Account Control dialog that appears to permit the changes. Once this is done, re-enter your PIN and click Confirm, followed by OK.
Now turn your attention to the machine you’d like to use to take control of your first computer. Run through the same steps to install the necessary extension in Chrome. Make sure that you are signed into the same Google account and then authorize the extension to access it.
Click the Get Started button in the lower portion of the page and you should see an entry for your other computer. By default, this is labeled using the name of the machine, but you can change it by clicking the pencil icon to the right and entering a new name.
To start a remote session, click the name of the computer you would like to connect to, enter the PIN you set up, and hit Connect.
You get to jump in and take control of your remote computer just as if you were sitting in front of it. At the top of the screen, you’ll find a slide-down drawer where there are a limited number of options.
The Disconnect button is self-explanatory, while the ‘Send keys’ menu makes it possible to send keyboard combinations to the remote machine without them being intercepted by the local computer.
From the ‘Screen options’ menu, you can toggle full screen mode on and off as well as choose between viewing the remote desktop at its native resolution or scaled to fit the size of your browser window.
Reference:
How to Use Google Chrome to Remotely Access Your Computer
http://www.howtogeek.com/142146/how-to-use-google-chrome-to-remotely-access-your-computer/
IT Technology: Single Mode versus Multi-Mode Fiber Optic Cable
Fiber Optics is sending signals down hair-thin strands of glass or plastic fiber. The light is “guided” down the center of the fiber called the “core”. The core is surrounded by a optical material called the “cladding” that traps the light in the core using an optical technique called “total internal reflection.”
The core and cladding are usually made of ultra-pure glass. The fiber is coated with a protective plastic covering called the “primary buffer coating” that protects it from moisture and other damage. More protection is provided by the “cable” which has the fibers and strength members inside an outer covering called a “jacket”.
<< Single Mode Fiber Optic Cable >>
Single Mode fiber optic cable has a small diametral core that allows only one mode of light to propagate. Because of this, the number of light reflections created as the light passes through the core decreases, lowering attenuation and creating the ability for the signal to travel faster, further. This application is typically used in long distance, higher bandwidth runs by Telcos, CATV companies, and Colleges and Universities.
Single Mode fiber is usually 9/125 in construction. This means that the core to cladding diameter ratio is 9 microns to 125 microns.
<< Multimode Fiber Optic Cable >>
Multimode fiber optic cable has a large diametral core that allows multiple modes of light to propagate. Because of this, the number of light reflections created as the light passes through the core increases, creating the ability for more data to pass through at a given time. Because of the high dispersion and attenuation rate with this type of fiber, the quality of the signal is reduced over long distances. This application is typically used for short distance, data and audio/video applications in LANs. RF broadband signals, such as what cable companies commonly use, cannot be transmitted over multimode fiber.
Multimode fiber is usually 50/125 and 62.5/125 in construction. This means that the core to cladding diameter ratio is 50 microns to 125 microns and 62.5 microns to 125 microns.
Reference:
Single Mode vs. Multi-Mode Fiber Optic Cable
http://www.multicominc.com/training/technical-resources/single-mode-vs-multi-mode-fiber-optic-cable/
Friday, 9 January 2015
VMware: VMware vRealiz Log Insight
VMware vRealiz Log Insight delivers real-time log management for VMware environments, with machine learning-based Intelligent Grouping, high performance search and better troubleshooting across physical, virtual, and cloud environments.
Features:
1. Extends Analytics to Log Data
With huge amounts of machine data generated in dynamic, virtual and cloud infrastructures on a daily basis, there is an acute need to apply analytics-based technologies to solve IT problems. vRealize Log Insight extends VMware’s leadership in analytics capabilities to unstructured data and log management, giving you operational intelligence and deep, enterprise-wide visibility across all tiers of your IT infrastructure and applications.
2. Easy to Use and Accessible Log Management
Unlike command line-based tools or highly specialized solutions that are only available to the largest of enterprises, vRealize Log Insight’s is accessible to everyone. Its log management is fast to deploy and easy to use, with intuitive interactions that get you started with log analytics immediately, without the need to learn a new query language.
3. Optimized for your VMware Environment
Get built-in support for your VMware deployments and the predictable, competitive pricing you expect from VMware.
4. Intelligent Log Analysis Operations
Log Insight adds to the predictive analytics of vRealize Operations Management with machine learning-based Intelligent Grouping, an important new technology that can group related data together to aid you in detecting problems more quickly than the leading solution.
5. Unified Management
Get easy integration with vRealize Operations and many other vendors. In addition, universal unstructured data collection extends operational visibility and proactive management capabilities across infrastructure and applications across physical, virtual and cloud environments.
Reference:
vRealize Log Insight (formerly vCenter Log Insight)
http://www.vmware.com/products/vrealize-log-insight
Thursday, 8 January 2015
VMware: Re-size ( Extend or Shrink ) Virtual Disk
The methods below allow you to extend or shrink your virtual disk.
<< Method 1 – Using vmkfstools and GParted to extend a disk >>
<< Method 2 – Using VMware Converter to shrink or extend a disk >>
<< Method 3 – Using vmkfstools and another Windows virtual machine to extend a disk >>
<< Method 4 – Using vmkfstools and System Rescue CD to extend a disk >>
<< Method 5 – Using Knoppix Live CD with QtPartEd to shrink a disk >>
<< Method 6 – Use Ghost or another 3rd party imaging product to shrink a disk >>
<< Method 1 – Using vmkfstools and GParted to extend a disk >>
- Download the GParted Live CD ISO and make it available so it can be mounted by the virtual machine’s CD-ROM
- Shutdown the virtual machine you want to resize
- Log into the ESX Server console via Putty
- Type “vmkfstools -X /vmfs/volumes/<volume name>/<VM directory name>/<virtual disk file name>” ie. /vmfs/volumes/Storage1/my_vm.vmdk. New disk size can be specified in kilo, mega or gigabytes and will be the total size of the new disk. So if you want to increase a virtual disk from 20GB to 24GB you would specify either 24000m or 24g
- Power on the Virtual Machine and make sure it boots properly, load Disk Management and you will see the new unallocated space
- Now to join the unallocated space to the primary partition, first shutdown the Virtual Machine
- Connect the Virtual Machine to the GParted ISO file and make sure you enable Connected at Power On
- Power on the Virtual Machine
- Press ESC at the Bios screen to get to the Boot Menu
- Select CD-ROM as the Boot device
- Gnome Partition Editor will load, press Enter at the boot screen
- At the Boot option screen select Manual Video Card and then select Done
- Select US English at the Language screen
- Select qwerty/us.map at the Keyboard screen
- Select Generic VESA Compatiable at the Video Driver screen
- Select 8 at the Display Depth screen
- Select 1024×768 at the Resolution screen
- Once the partition editor loads, click on /dev/sda1 in the partition list
- Click the Resize/Move button
- Click and drag the arrow to extend the size of the partition, make sure you do a resize (double arrow) and not a move (four way arrow) so you should 0 free space preceding and following and then click the Resize/Move button
- Next click the Apply button and then the operation will start, you can expand Details to see the progress, once completed click the Close button
- Click the power button in the bottom right corner, then select reboot
- Edit the VM and remove the ISO from the CD/ROM device (change to Client)
- When the server restarts it will do a Check Disk, let this complete, Windows will prompt for a reboot after you login
- Reboot and load Disk Management and your Primary Partion will be the new size without any unallocated space
<< Method 2 – Using VMware Converter to shrink or extend a disk >>
- When you use Converter to copy a VM it will transfer the data to the destination server by one of two ways. If you do not change the disk size or increase the size of your original disks then it does a block level clone of the drive. If you reduce the size of your original disks it instead does a file level clone of the drive.
- Download Converter and install it on the VM that you want to resize the drives, reboot after the install completes
- Start Converter application, click the Import Machine button
- Click Next at the Welcome screen and then Next again at the Source screen
- Select ‘Physical Computer’ and click Next o Select “This Local Machine” and click Next
- At the Source Data screen select your volumes and change “Maintain Size” to “Type Size in GB” and enter your new disk size and click Next
- At the Destination screen click Next
- Select “Import this machine to a Vmware ESX Server or VirtualCenter virtual machine” and click Next
- At the Destination login screen, select your ESX/VC server and enter the login information and click Next
- At the Virtual Machine Name and Folder screen enter a new name for your VM and select a folder and click Next
- At the Host or Cluster screen select a host for your destination and click Next
- At the Datastore screen, select a datastore and click Next
- At the Networks screen, configure your NICs and click Next
- At the Customization screen, click Next
- Click Finish and the conversion will begin
- Once the Conversion is complete, edit the new VM settings and remove any extra hardware that Converter adds (USB/serial/parallel ports, etc.)
- Shutdown your original source VM and power on your new destination VM
- Make sure everything is functioning properly on the new VM and you can delete the original VM
<< Method 3 – Using vmkfstools and another Windows virtual machine to extend a disk >>
- Shutdown the virtual machine you want to resize
- Log into the ESX Server console via Putty
- Type “vmkfstools -X /vmfs/volumes/<volume name>/<VM directory name>/<virtual disk file name>” ie. /vmfs/volumes/Storage1/my_vm.vmdk. New disk size can be specified in kilo, mega or gigabytes and will be the total size of the new disk. So if you want to increase a virtual disk from 20GB to 24GB you would specify either 24000m or 24g
- Shutdown the second helper virtual machine
- Edit the settings of the second VM and add the hard disk from the first VM
- Power on the second VM and load the Disk Management snap-in and verify that the disk from the first VM has un-allocated space on it
- Select Start, Run and enter diskpart.exe
- The command ‘list volume’ will show you all volumes.
- Select your volume based on the results of the list volume command, ie. ‘select volume 1′
- Type the command ‘extend’ to extend the volume
- Check the Disk Management snap-in again and the volume should be extended with a larger capacity
- Shutdown the second VM and remove (not delete) the disk from it
- Power on your first VM and the new space should be there and ready to use
<< Method 4 – Using vmkfstools and System Rescue CD to extend a disk >>
- Download the System Rescue ISO and make it available so it can be mounted by the virtual machine’s CD-ROM
- Shutdown the virtual machine you want to resize
- Log into the ESX Server console via Putty
- Type “vmkfstools -X /vmfs/volumes/<volume name>/<VM directory name>/<virtual disk file name>” ie. /vmfs/volumes/Storage1/my_vm.vmdk. New disk size can be specified in kilo, mega or gigabytes and will be the total size of the new disk. So if you want to increase a virtual disk from 20GB to 24GB you would specify either 24000m or 24g
- Power on the Virtual Machine and make sure it boots properly, load Disk Management and you will see the new unallocated space
- Now to join the unallocated space to the primary partition, first shutdown the Virtual Machine
- Connect the Virtual Machine to the System Rescue ISO file and make sure you enable Connected at Power On
- Power on the Virtual Machine
- Press ESC at the Bios screen to get to the Boot Menu
- Select CD-ROM as the Boot device
- Press Enter at the boot screen
- Press Enter after boot sequence is complete and then type ‘startx’
- Once X-windows loads, double-click the GpartEd icon (drive icon, 3rd down on the right hand side)
- Once the partition editor loads, click on /dev/sda1 in the partition list
- Click the Resize/Move button
- Click and drag the arrow to extend the size of the partition, make sure you do a resize (double arrow) and not a move (four way arrow) so you should 0 free space preceding and following and then click the Resize/Move button
- Next click the Apply button and then the operation will start, you can expand Details to see the progress, once completed click the Close button
- Click the power button in the bottom right corner, then select reboot
- Edit the VM and remove the ISO from the CD/ROM device (change to Client)
- When the server restarts it will do a Check Disk, let this complete, Windows will prompt for a reboot after you login
- Reboot and load Disk Management and your Primary Partion will be the new size without any unallocated space
<< Method 5 – Using Knoppix Live CD with QtPartEd to shrink a disk >>
- Download the Knoppix Live CD ISO and make it available so it can be mounted by the virtual machine’s CD-ROM
- Shutdown the virtual machine you want to resize
- Add a second virtual disk of the new smaller desired size to the VM you want to resize
- Connect the Virtual Machine to the Knoppix Live CD ISO file and make sure you enable Connected at Power On
- Power on the Virtual Machine
- Press ESC at the Bios screen to get to the Boot Menu
- Select CD-ROM as the Boot device
- Press Enter at the boot screen
- Click on the K Menu icon and then select System and then QTPartEd
- Select your original drive (usually sda) and click on the partition 1
- Select Operations from the top menu and then Resize, resize the drive so it is just less then the new drives (sdb) capacity
- Select File from the top menu and then Commit, click Yes at the warning window
- Once complete, select Cancel if you get a unmounted hard disk window and then OK at the Progress window
- Open a Konsole window and type “dd if=/dev/sda of=/dev/sdb” This copy will take a long time and will not show a status while it is running. Yyou will get an insufficient space error at the end of the copy, this is normal because the drive you’re copying from is bigger then the destination. But as long as the partition is smaller, everything will work
- Shutdown the VM and edit the VM settings, remove the original C: drive and change the SCSI ID of the new drive to match the old one (usually 0:0)
- Power on the VM and it will run a Chkdsk and you will be all set
<< Method 6 – Use Ghost or another 3rd party imaging product to shrink a disk >>
- Shutdown the virtual machine you want to resize
- Add a second virtual disk of the new smaller desired size to the VM you want to resize o Use Ghost to clone the first disks partition to your second virtual disk
- Once complete make sure the second virtual disk is ‘Active’
- Switch your disks by editing the virtual machine settings and switching the SCSI id’s (0:0 and 0:1)
- If the virtual machine boots OK and you verify that everything works then shutdown the VM and remove the larger disk and delete it
Reference:
Re-sizing Virtual Disks
Subscribe to:
Posts (Atom)