Before rolling out the analysis, itâ€™s important to understand the technology. Microsoft Lync 2013 helps connect to multiple people across different operating systems and mobile devices. As a unified enterprise-ready communications platform, it enables an environment that facilitates instant video conferencing, messaging, voice chats and meeting. In short, it provides a single and consistent presence experience for its client.
While Microsoft may project changes brought about in the Lync Server 2013, enabling better experiences than ever before, there are a few concern areas that you users need to be aware of.
- Video Conferencing limitations: Continuing to be a low area, this version of Microsoftâ€™s Lync too has been observed to be immature in terms of its video conferencing capabilities. Besides, it doesnâ€™t provide end-to-end solutions such as video-room systems, video desktops, telepresence systems or video gateways. Its solutions for multi-party video conferencing, works on desktops only. Its conferencing capabilities are also limited with allowing a maximum of five people in a conference only and feature lacks such as server-side recording, dual presentation and multi-casting. Other problems associated with its video conferencing capabilities are its interoperability constraints with 3rd party products and that it consumes exorbitant bandwidths which are about 600% more than its counterparts.
- ĂĽ Lack of consistent BYOD support: BYOD is the next big revolution thatâ€™s happening in working environments. As such Lync 2013â€™s compatibility with the BYOD culture is critical. While it does support presence and instant messaging on platforms like iOS, Android and Windows, it falls short of features like simultaneous multi-party video and viewing shared meeting content.
- ĂĽ Voice limitations persist: This was one of the major lookout areas in terms of improvements expected. To begin with, users will have to invest in conference phones, Session Border Controllers for security purposes and 3rd party gateways. If you have a pre-existent system in place, you actually have to rip it apart. Besides it doesnâ€™t even have call recording, call parking or contact centre features, making it troublesome for most users.
- ĂĽ Real-time collaboration shortcomings: Microsoftâ€™s Lync 2013 requires sourcing a number of applications from various 3rd party vendors, making it unsuitable for users looking for an all-in-one solution.
- ĂĽ Investments in trainings: Due its nature of complexities, organizations will need to invest in training their staff, in-mates. Besides, they will also have to hire individuals with Linux certifications to help deploy and manage the system and troubleshoot as and when required. All this requires huge investments that organization may want to reconsider beforehand.
- ĂĽ Investments in Lync Voice too high: As per the conclusions from detailed interviews done with 211 real world customers, it was observed that Lyncâ€™s users spent $1,912 on an average, in installations (on the 1st year itself).
- ĂĽ Customer Choice is limited: Essentially Microsoftâ€™s way with its products and sales strategies, for instance, product bundling, can end up in users being locked into their systems.
For the perfect communications solution, organizations require services that can be imbibed into existing systems, with delivering effective and efficient quality services in a cost-effective structure.
Have you been using Microsoft Lync 2013? How has your experience been? What according to you are its biggest drawbacks? Share your thoughts and takes with us.
This week another episode of Minimarte - web animated series, made with open source tools, got out of the box.
The animation is on youtube, at: http://www.youtube.com/watch?v=2I82gEaX-r4
And a small text with some making of images are at oficial site, at: http://www.minimarte.com/2014/02/26/episodio-2-as-primeiras-aparicoes/
All series, and all animations made with: Gimp, Inkscape, Blender, Synfig, Audacity, Kdenlive.
-Gimp is used for frame-by-frame animation;
-Inkscape for vector illustration
-Synfig for vector animation and compositions
-Blender for character animation
-Audacity for audio tracks and effects
-Kdenlive for video editing.
Story, screenplay: Ricardo GraĂ§a, Eduardo GraĂ§a
Animation, Direction, Editing: Ricardo GraĂ§a
Sound effects and tracks: Jorge Cruz
Images ( making of ):
An Internet Protocol (IP) address is a numerical identifier that is assigned to every device or machine in a computer network. If you are planning to start your own Internet business, using a virtual private network VPN or VOIP, you need to be adequately informed about IP addressing. We all (should) know â€“ there are static and dynamic IP addresses. But when should you use them?
What is a Dynamic IP Address?
A dynamic IP address changes each time you boot your machine or network device. It also changes when you dial into your Internet service provider. Some ISPs change your IP each time you log on to their network while some make the changes periodically.
Most dynamic IP addresses are assigned using the Dynamic Host Configuration Protocol (DHCP). The router on your home network assigns IP addresses to your computers and other network devices as you put them on. Private IP addresses usually have this format: 192.168.0.x. Your router's IP address will usually be 192.168.0.1 while your computers will be assigned numbers ranging from 192.168.0.2 to 192.168.0.254.
In situations where you need to remotely administer a particular computer on a network, you may need to reserve a particular address for it. To assign static IPs to certain computers and dynamic IPs to others on the same network, you should reserve the IPs for the specific machines on the DHCP server. This will help you to administer the network centrally without the need to assign static IPs manually. It will also prevent the occurrence of IP conflicts.
When Should You Use Dynamic Ips?
Dynamic IPs will be good for anyone who uses their computer or home network for the following:
* To browse the Internet and upload or download files
* To send and receive email through a mail server or via a web based email service like yahoo mail, hotmail or gmail.
* To use online chat services or instant messaging
* To use FTP servers or web servers that only require access from your LAN or corporate network but do not require access from the Internet.
What is a Static IP Address?
A static IP address is a fixed IP address that is manually assigned to a device on a network. It is called a static IP because it is not changed each time the device is switched on. Static addresses remain the same each time you connect to the network or send a message.
When Should You Use a Static IP?
Static IP addresses provide greater reliability for applications such as voice over Internet protocol (VOIP). If you run a service that permits incoming audio or video, you may need to use a static IP. For example if you have an on-site IP-PBX, you will need to have at least one static IP address.
A static IP will also be required if you have a machine that functions as a server and requires external access from the users online. This includes running a web server, e-mail server, FTP server, or DNS server. A static IP allows you to enjoy faster upload speeds which boost the efficiency of these services.
If you intend to host a gaming website or you want to use Play Station, X-Box or a VPN to provide secure access to files from your corporate network server, you should also consider buying a public static IP address.
How to Set Up a Static IP in Linux?
Here are the steps you should take to assign a static IP address on a Linux system.
1. Make sure you are logged on as root
2. Create a backup copy of the /etc/network/interfaces file on your machine. You can easily restore the backup if something goes wrong.
3. Edit the /etc/network/interfaces file. From the text console, you can load this file into the famous vi editor.
4. Scroll down the file until you locate the network interface card. An Ethernet connection is usually identified by eth0 or wlan0 while a wifi connection is identified as wifi0.
5. Replace â€ś iface eth0 inet dhcp â€ś with â€ś iface eth0 inet static â€ś.
6. Add these lines: (you can replace the address and dns nameserver with your own configuration)
If you are running Slackware or Red Hat Linux, one of the simplest methods is to log on as root and then type ifconfig/netstat at the console. You can then use the text-based menu to modify the configuration settings.
In Slackware the settings will take effect instantly. But in Red Hat you need to type â€ś service network restart â€ś and press enter.
Unless you have no life, don't watch the news, and don't care about others snooping around your secrets, you are well aware that these days the government's favorite activity is spying and monitoring their people from all sides, by all means, with no scruples and no remorse, possibly including yourself.
Even if you do have a life, do watch the news, and do care about others snooping around your secrets, you certainly use one of those free popular e-mail accounts that boast of their awesome unlimited features without realizing that they are the ones that are secretly stabbing you on the back and violating your privacy.
It was because of such things that our team wrote a book on advanced e-mail security with cryptography and we want to share it with you. In this book you'll get the following benefits:
- Awareness: you will understand how things work and never be fooled again.
- Privacy: no one will spy your e-mails anymore, your communications will remain private.
- Security: if your e-mails ever get compromised, no one will be able to decipher and read them.
- Credibility: you will demonstrate to others how much you care about your privacy and your security, as well as theirs.
- Flexibility: the system can be implemented anywhere, from home to business to mobile devices.
- Power: high level military grade cryptography being developed for more than 15 years.
- Freedom: 100% free/libre software based on an open standard, open source, no spyware, no malware, no viruses, nothing.
- Cost: completely free - gratis - you won't have to buy or pay for any software.
The book is short, full of images and graphics and easy to understand. It was written for laypersons, so anyone can follow it and do the required steps very easily.
And how about the price? Well you'll love that part: you can get and share the book for free, no hidden fees or registration required, you pay how much you want for it. That's it, that's how we work, you only pay if you like.
If you like it we suggest a contribution of $10.00, the price of a decent cappuccino cup. We put a lot of effort to write it and it took a long time to be finished, so if you like it we would very much appreciate a $10.00 contribution from you.
You can get a copy of the book right here in our official website: https://goldencontest.wordpress.com
Are you still not convinced? We are giving you 10 reasons why this book will benefit you. It is called "The 10 most common mistakes people make when using e-mail". Here they are:
- MISTAKE 1: I use a popular e-mail provider
- MISTAKE 2: I think only the recipients can read my messages
- MISTAKE 3: When I empty the trash bin I believe my messages were erased forever
- MISTAKE 4: I think it is great that my e-mail account is free
- MISTAKE 5: I own my own messages, they are mine
- MISTAKE 6: I think cryptography is unecessary
- MISTAKE 7: I donâ€™t care about what the NSA is doing
- MISTAKE 8: I think my messages are safe
- MISTAKE 9: I trust my e-mail provider
- MISTAKE 10: I believe I have privacy online
You can find the detailed description of all those mistakes in our website, as well as how to correct them.
Check out our website now and get a copy of our book for free. You will not only get a book, you will also get your security and privacy back.
The Golden Keys Team
The worldwide market for physical security was valued at USD 48.05 billion in 2012 and is projected to reach the market size of USD 125.03 billion by 2019, growing at a CAGR of 14.9% during the period from 2013 to 2019. Some of the major factors driving the demand for physical security include rising global security concerns and increasing budget allocations for physical security by governments to prevent terrorism and crime activities. In addition, regulations imposed by governments of different countries demanding increased security levels is driving the adoption of physical security in several end-user sectors including industrial and business organizations. Continued investments in infrastructure worldwide, especially, in Asia Pacific region is expected to emerge as a significant factor behind the growth of physical security market in coming years.
The primary concern in physical security is the protection and prevention in order to serve security interests of people, equipment, and property. The increase in incidences of terror activities and crime has resulted in escalated demand for physical security solutions. It is expected that internet protocol (IP) video, sophisticated access control systems and biometric solutions would drive the demand for physical security solutions. Further, the emerging trend of convergence of logical and physical security and increased demand for integrated physical security solutions are expected to boost the growth of physical security market.
The different components of physical security include hardware, software and services. The market for physical security hardware has been further segmented into intrusion detection and prevention systems, access control systems and others (fire and life safety, visitor management and backup power). Among intrusion detection and prevention hardware products, video surveillance was the largest market and held around 72% share in 2012 and is expected to be the fastest growing segment throughout the forecast period. In access control segment, biometric access control held the largest market share of around 38% of total access control market in 2012. Physical security software market has been segmented into physical security information management (PSIM) and management, analysis and modeling software. PSIM is fast gaining market demand, driven by declining costs, increased sophistication and increasing awareness among end-users. Physical security services market has been segmented into video surveillance as a service (VSaaS), remote management services, technical support, public safety answering point (PSAP), security consulting, public alert, customer information and warning systems and others (data source, hosted access control, managed access control, alert notification, mobile security management). Among the services segments, VSaaS is expected to be the fastest growing market driven by benefits such as cost savings, simplicity, and remote access.
End-user segments of physical security include transportation and logistics, government and public sector, control centers, utilities/energy markets, fossil generation facilities, oil and gas facilities, chemical facilities, industrial (manufacturing sector excluding chemical facilities), retail, business organizations, hospitality and casinos and others (stadiums, educational and religious infrastructure, healthcare organizations). Transportation industry which includes aviation, rail, ports, road and city traffic and new start projects (including light rail, rapid rail, metro rail, commuter rail, bus rapid transit, and ferries) in transportation and logistics sector was the largest end-user of physical security in 2012. North America emerged as the largest regional market for physical security in 2012. In view of high terrorism incidences, the region has been increasing security measures across all end-use verticals. Moreover, governments in North America have significantly increased the regulatory measures for adoption of physical security. Asia Pacific is one of the fastest emerging markets for physical security, growing at a CAGR of around 17% owing to significant push from governments and the police to enhance security in view of increasing crime and terror in the region.
The market for physical security was highly fragmented in 2012 and no single player was dominant; however, Honeywell Security Group emerged as the market leader, accounting for around 5% share in 2012. Honeywell Security group was followed by Bosch Security Systems Inc, Morpho SA (Safran), Hikvision Digital Technology, Assa Abloy AB, Axis Communication AB, Pelco Inc, Tyco International Ltd, NICE Systems Ltd, and others.
Source : http://www.transparencymarketresearch.com/physical-security-market.html
â€śRegular expressionsâ€ť (often shortened to â€śregexâ€ť) is a language used to represent patterns for matching text. Regular expressions are the primary text-matching schema in all text-processing tools, including grep,egrep,awk ,sed.
Read more in ...in website link
Apache Tomcat is an opensource webserver product of Apache Foundation like Apache HTTP server. It is used to deploying Java Servlet and JSP applications. To deploy any application in Tomcat we can simply create a war fileand deploy them. For more details about you can visit apache official site.
Continue to following article to Install Apache Tomcat 7 on CentOS/RHEL Servers.
Cantata, a Qt-based music player for MPD (Music Player Daemon), has reached version 1.3.0 just yesterday, and a fix for compiling it in KDE, 22.214.171.124, was put out a few moments ago. This release comes with 87 fixes and improvements. Some major changes and new features include:
- add option to control start-up state: visible, hidden or remembered from previous run
- undo/redo support for play queue
- many interface fixes and improvements
- add remove duplicates functionality to playlists and play queue
- read lyrics from the LYRICS tag in FLAC, Vorbis, Opus and Speex files
Image source: Image credit
Overall, Cantata suffered major overhauls on all levels. The interface has suffered lots of fixes and improvements; communication with MPD was improved too; playlist and play queue handling also suffered fixes.
Image source: Image credit
Installing Cantata 1.3.0 in Ubuntu 13.10
Installing from the PPA
Open the terminal and type the following commands to install Cantata from the PPA:
sudo add-apt-repository ppa:ubuntuhandbook1/cantata
sudo apt-get update
sudo apt-get install cantata
Installing from Source
Make seems to give the following error on Ubuntu 13.10 with Cantata 1.3.0 (this was fixed in Cantata 126.96.36.199):
lconvert: could not exec '/usr/lib/i386-linux-gnu/qt4/bin/lconvert': No such file or directory
make: *** [translations] Error 1
make: *** [po/CMakeFiles/translations.dir/all] Error 2
make: *** [all] Error 2
However, the binary is successfully built, available in the build directory and you can run Cantata as ./cantata.
Cantata 188.8.131.52 was released few moments ago with a fix for compiling it. Follow the next steps:
Download the source tarball from here and uncompress it:
tar -xjf cantata-184.108.40.206.tar.bz2
Next, install the dependencies:
sudo apt-get build-dep cantata
You will need the source repositories enabled for this to work.
Finally, change the working directory to cantata-220.127.116.11 and type the commands:
mkdir build && cd build
sudo make install
To install as normal user in a different prefix, use this:
mkdir build && cd build
cmake .. -DCMAKE_INSTALL_PREFIX=$HOME/usr
Cantata offers a wealth of options, as well as Internet services like Jamendo and support for podcasts:
A Martian packet is nothing but an IP packet which specifies a source or destination address that is reserved for special-use by Internet Assigned Numbers Authority (IANA). You can log packets with un-routable source addresses on Linux operating system. This tutorial explains how to log spoofed packets on Debian / Ubuntu / CentOS / RHEL / Linux based server.
Linux: Log Suspicious Martian Packets / Un-routable Source Addresses
Bitcoin is a decentralized peer-to-peer payment system and digital currency that is powered by its users with no central authority, central server or middlemen. Instead, managing transactions and issuing money are carried out collectively by the network. Bitcoin is controlled by all Bitcoin users around the world.
To provide an insight into the quality of software that is available, we have compiled a list of 5 highly promising Bitcoin clients. Hopefully, there will be something of interest here for anyone who wants ease of use, security and advanced features.