Internet bandwidth is major limitation. Assuming only a T1 connection, heavily used application in the cloud would have a maximum bandwidth of 1.5 Mbps compared to 100 Mbps or more from an internal server.
View Answer | May 18, 2010 6:08 AM
Cloud Computing in 2010, Encryption, Encryption key management
In order to setup your ASAs to failover over you need to determine which one you want as the primary unit and secondary unit. On the primary you need to setup failover using the code: failover failover lan unit primary failover lan interface Failover GigabitEthernet0/3 (You can chance the GE0/ whatever you want. Both units [...]
View Answer | May 17, 2010 1:46 PM
Adaptive Security Appliances, Cisco ASA 5520, Cisco ASA 5520 Configuration, DMZ, LAN Security
You didn’t say what your platform mix was. What systems are you currently using for authentication? More information on the 8 and their requirements might help us with recommendations.
View Answer | May 16, 2010 4:27 AM
Active Directory User Profiles, User authentication, User Management, User profiles
Hi Wiki, you have probably solved your problem by now . If you are still interested, I suggest you look at FastPassCorp.com. We have synchronization solutions which works without MIIS, and can handle multiple forests regards Finn
View Answer | May 14, 2010 8:57 AM
Forest, Identity management, Microsoft Identity Integration Server, Microsoft Systems Management Server, MIIS, Password
Look into a Cisco 4400 Wireless LAN Controller. You can flash your APs with a lightweight access point protocol and manage all your APs with a single controller.
View Answer | May 14, 2010 6:22 AM
Access Point troubleshooting, ACL, Cisco 1242, Cisco Aironet
Hi Varun, it actually depends a lot on you. to give some example, some of my friends completed their degree and they continue to do other certification and became expert in it…. there is another friend, he did his diploma in IT and after that he started to go for Cisco certification and he is [...]
View Answer | May 12, 2010 9:31 AM
Certifications or Degree, Networking careers, Networking certifications, Security certifications
YES and NO YES if it is a site like this one where we exchange work related information. NO if it is a site for getting a date or for telling the world what you had for breakfast. -Meandyou —————– Good question!! And I think the answer to this can be a very personal one [...]
View Answer | May 11, 2010 4:29 PM
IT security, Risk management, Social media security
mac has firewall , they are not different from windows their basic work is to control connections made to your computer from other computers,for Mac instead controlling it by ports it by per application and it doesnt affect their appletalk protocol..i hope i answered your question Yes it does but software based firewall pre-installed and [...]
View Answer | May 10, 2010 11:31 AM
Firewalls, Mac OS X
There are Anti-Virus packages available for the MAC, and there are virus’s out there for the MAC. However as long as the MAC holds such a small market share compared to Windows, Windows will always be the bigger target. Because of the much larger user base that Windows has it is simple ROI for the [...]
View Answer | May 10, 2010 11:12 AM
Antivirus, Mac OS, Mac OS X
The best software for your goal to achieve is the Roxio Toast 9 Titanium where you can compile all type of cd/dvd and can configure it as per your requirements. you can download it from http://www.roxio.com/enu/products/toast/titanium/ .
View Answer | May 10, 2010 10:01 AM
AutoPlay, AutoRun, Cd, Cross Platform, Dvd, Mac, Windows 2000 Server
I’m sorry, It was a problem with Library List, it was created the QPRINT in QTEMP library. Problem solved.
View Answer | May 6, 2010 3:34 PM
AS/400, iSeries, SFTP, SSH
service set identifier, a 32-character unique identifier attached to the header of packets sent over a WLAN that acts as a password when a mobile device tries to connect to the BSS. The SSID differentiates one WLAN from another, so all access points and all devices attempting to connect to a specific WLAN must use [...]
View Answer | May 6, 2010 1:46 PM
Hi there, In order to create a small network that will allow 12 computers to communicate you be glad to know you actually need very little equipment. You have 2 directions you can go in though so first thing is you have to make decision!! I will give you some options for both though so [...]
View Answer | May 6, 2010 11:41 AM
Database connectivity, Network design, Network equipment, network setup, routers and switches
Hi there, The details on Fogs website are only for Cisco IOS and not Cisco PIX OS. I think its important to point out here that whilst some similarities exist between the 2 operating systems, for instance show run can be done in both, they are totally different. This is why you cannot find the [...]
View Answer | May 6, 2010 10:46 AM
Cisco ASA 5510, Cisco Firewall, DHCP, DHCP Configuration, Firewalls, FOG
5/5/2010: Not too many changes to the list, but it’s not too late to earn more points. TomLiotta Carlosdl Aguacer0 Technochic Mrdenny Mshen Jim4522 ToddN2000 Splat RichS Boost your total now with an extra 200 Knowledge Points just for entering the <a href=”http://itknowledgeexchange.techtarget.com/intel-open-port-scavenger-hunt/”>Intel Open Port Scavenger Hunt.</a>. Then earn an extra 100 Knowledge Points by [...]
View Answer | May 5, 2010 6:05 PM
Database, DataCenter, DataManagement, Developement, Exchange, Linux, Lotus Notes, Mobile, Network connectivity, Oracle, SAP, Security, SQL Server, VMware, VoIP, Windows
There is no question here, but I imagine a couple of questions: is this normal ? if not, how to fix it ? Also, there is not enough information to provide an accurate answer. If this is related to an Exchange server running on a Windows 2003 server cluster, then this could help: <a href=”http://support.microsoft.com/default.aspx?scid=kb;en-us;843546″>Increased [...]
View Answer | May 5, 2010 3:05 PM
Spanning tree Protocol is used for network link redundancy. in you case there are no redundancy links between the switches, so it should have zero affect on your unmanaged network.
View Answer | May 5, 2010 1:19 PM
Router and switch management, Spanning Tree Protocol, Switches, Unmanaged Switches
Check my <a href=”http://itknowledgeexchange.techtarget.com/network-technologies/open-source-network-gateway/”>article</a> about untangle.
View Answer | May 5, 2010 1:15 PM
Firewalls, Network Configuration, Network management
Hi, You can also turn on auditing for this user. Look at the CHGUSRAUD command and other related commands. This will capture all activity for that users job as the activity happens. You won’t have to wait for the job to end. The DSPAUDJRNE command will allow you to view the activity for that user [...]
View Answer | May 5, 2010 7:23 AM
AS/400 user profiles, User access, User profiles
Hello, You could do the command DSPUSRPRF, hit F4 to prompt, Display User Profile (DSPUSRPRF) Type choices, press Enter. User profile . . . . . . . . . . > *ALL Name, generic*, *ALL Type of information . . . . . . > *BASIC *BASIC, *ALL, *CMDAUT… Output . . . . [...]
View Answer | May 3, 2010 3:22 AM
Access Rights, AS/400 user profiles, User access