Quantcast
Channel:
Browsing all 17 articles
Browse latest View live

Plot an X, Y Axis/Axes Column or Bar Chart in Excel

Recently my sister asked me to plot a bar chart in excel from a table of data. There were 5 different columns but she only wants to choose 2 columns, one going to X- Axis/Axes or Y-Axis/Axes. Now...

View Article



Creating a Performance Indicator in MS Access

Very often I have been amused by the KPI or Key Performance Indicator’s used in CRM (Customer Relations Management) systems basically displaying the number of leads, sales & revenues. These are...

View Article

Setting up Internet connection on TV

Many of the latest LCD, LED TV’s come with LAN port or WI-FI capability. This essentially means that they connect to your home internet connection and these TV’s have applications or apps that can be...

View Article

My Iphone Apps

After waiting for long time, I finally got my hands on the Iphone 4 and boy its a nice piece of gadget to be held on to. The iphone 4 definitely has all the pomp and glory that most us has heard about...

View Article

Printing, Collating & Stapling MS Access Batch Reports

Very recently I came across a Xerox 5665 printer, which obviously can print, but then collate and staple documents. This is a very efficient and intellgent machine in its class to do all these...

View Article


Using Iphone to Share Internet Connection (Tethering)

Sharing internet connection using iphone commonly called “Tethering” is one of the cool features this phone provides (others do too). Since I am finding new venues to tethering at my work as well as...

View Article

Network Attached Storage – Not another external hard drive

Network Attached Storage or NAS has been around for a while. Though these devices have recently got attention with the growth of cloud based platforms and virtualization. These are not clearly the $100...

View Article

VOIP or Not to VOIP

Voice over Internet Protocol (VOIP) is one of the most prevalent topics today in the technology industry. As we grow more reliant on internet and its communication channels, the attraction to an...

View Article


MPLS, Secure VPN & MPLS VPN

There has been a mixup between an MPLS connection and Secure VPN connection. During one of my recent engagements to upgrade our corporate infrastructure, I came across these terms very often and it...

View Article


Responsive websites

The concept of responsive website has been give much attention. One could say that it is the “hot” topic in the web world. Though the concept of making very website fit into multiple screen size has...

View Article

Service/Help Desk SPOC – ITIL Based

When creating an Information Technology Help Desk or Service Desk, the most common and well used framework or methodology is by ITIL – Information Technology Infrastructure Library. ITIL framework...

View Article

Security Layers-SSL 128,256,1024 bits

In the world of web security, SSL or Secure Socket Layer is a widely referenced term. SSL is a standard security technology for establishing an encrypted link between a server and a client—typically a...

View Article

My experience with TOGAF Certification

I started thinking of getting certified in TOGAF after working various application projects working as a Solution Architect. Though my projects were not large scale but my involvement was pretty...

View Article


Shadow IT- the ignored threat

Shadow IT, the use of technology systems and solutions without the explicit approval of the organization. Shadow IT is happening right now in your organization, you just don’t know it. Your data is at...

View Article

IDS-IPS-SIEM on corporate network

Intrusion Detection System (IDS), Intrusion Prevention System (IPS) and Security information and event management (SIEM) tools are critical part of a corporate or enterprise network. An Intrusion...

View Article


World of DevOps

Definition DevOps is a term used to refer to a set of practices that emphasize the collaboration and communication of both software developers and information technology professionals while automating...

View Article

What is Whaling?

Whaling is a specific kind of phishing targeted at high-ranking bankers, executives or others in powerful positions or job titles. This highly targeted phishing attacks (masquerading as legitimate...

View Article

Browsing all 17 articles
Browse latest View live




Latest Images