Plot an X, Y Axis/Axes Column or Bar Chart in Excel
Recently my sister asked me to plot a bar chart in excel from a table of data. There were 5 different columns but she only wants to choose 2 columns, one going to X- Axis/Axes or Y-Axis/Axes. Now...
View ArticleCreating a Performance Indicator in MS Access
Very often I have been amused by the KPI or Key Performance Indicator’s used in CRM (Customer Relations Management) systems basically displaying the number of leads, sales & revenues. These are...
View ArticleSetting up Internet connection on TV
Many of the latest LCD, LED TV’s come with LAN port or WI-FI capability. This essentially means that they connect to your home internet connection and these TV’s have applications or apps that can be...
View ArticleMy Iphone Apps
After waiting for long time, I finally got my hands on the Iphone 4 and boy its a nice piece of gadget to be held on to. The iphone 4 definitely has all the pomp and glory that most us has heard about...
View ArticlePrinting, Collating & Stapling MS Access Batch Reports
Very recently I came across a Xerox 5665 printer, which obviously can print, but then collate and staple documents. This is a very efficient and intellgent machine in its class to do all these...
View ArticleUsing Iphone to Share Internet Connection (Tethering)
Sharing internet connection using iphone commonly called “Tethering” is one of the cool features this phone provides (others do too). Since I am finding new venues to tethering at my work as well as...
View ArticleNetwork Attached Storage – Not another external hard drive
Network Attached Storage or NAS has been around for a while. Though these devices have recently got attention with the growth of cloud based platforms and virtualization. These are not clearly the $100...
View ArticleVOIP or Not to VOIP
Voice over Internet Protocol (VOIP) is one of the most prevalent topics today in the technology industry. As we grow more reliant on internet and its communication channels, the attraction to an...
View ArticleMPLS, Secure VPN & MPLS VPN
There has been a mixup between an MPLS connection and Secure VPN connection. During one of my recent engagements to upgrade our corporate infrastructure, I came across these terms very often and it...
View ArticleResponsive websites
The concept of responsive website has been give much attention. One could say that it is the “hot” topic in the web world. Though the concept of making very website fit into multiple screen size has...
View ArticleService/Help Desk SPOC – ITIL Based
When creating an Information Technology Help Desk or Service Desk, the most common and well used framework or methodology is by ITIL – Information Technology Infrastructure Library. ITIL framework...
View ArticleSecurity Layers-SSL 128,256,1024 bits
In the world of web security, SSL or Secure Socket Layer is a widely referenced term. SSL is a standard security technology for establishing an encrypted link between a server and a client—typically a...
View ArticleMy experience with TOGAF Certification
I started thinking of getting certified in TOGAF after working various application projects working as a Solution Architect. Though my projects were not large scale but my involvement was pretty...
View ArticleShadow IT- the ignored threat
Shadow IT, the use of technology systems and solutions without the explicit approval of the organization. Shadow IT is happening right now in your organization, you just don’t know it. Your data is at...
View ArticleIDS-IPS-SIEM on corporate network
Intrusion Detection System (IDS), Intrusion Prevention System (IPS) and Security information and event management (SIEM) tools are critical part of a corporate or enterprise network. An Intrusion...
View ArticleWorld of DevOps
Definition DevOps is a term used to refer to a set of practices that emphasize the collaboration and communication of both software developers and information technology professionals while automating...
View ArticleWhat is Whaling?
Whaling is a specific kind of phishing targeted at high-ranking bankers, executives or others in powerful positions or job titles. This highly targeted phishing attacks (masquerading as legitimate...
View Article
More Pages to Explore .....