Skip to main content


Showing posts from February, 2019

2019 Gartner Magic Quadrant for Network Performance Monitoring and Diagnostics

Innovation at VIAVI means focusing on an outcome driven strategy. Our customers want outcomes that solve their problems – automated user-experience insight, comprehensive on-prem and cloud visibility, and getting problems fixed faster using complete forensic detail for investigations. We innovate to solve.   We are pleased to announce that in addition to being named a Leader for the 6th year in a row 1 , Gartner has positioned VIAVI furthest for its completeness of vision.  Access the Gartner report over at Viavi here or at Gartner over using the following link: Network Performance Monitoring and Diagnostics (NPMD) Magic Quadrant

How to Design Self-service Network Analytics into Your Services

We recently blogged on why network insight is essential for communications service consumers , including why self-service portals are increasingly important for today’s network and network operators. In that blog post, we looked at self-service portals from an end-user standpoint.  At Kentik, we believe in curated, actionable insight catering to different user personas across organizations. So, in this post, we will look into these portals in terms of design considerations for service providers.  If you are a service provider or enterprise and have decided to provide your customers with traffic visibility into their networks, amongst many other decisions you may find yourself thinking about: Differentiation Speed of delivery and deployment Read the blog post over at Kentik over here .

BA IT systems failure: Uninterruptible Power Supply was interrupted

An IT bod from a data centre consultancy has been fingered as the person responsible for killing wannabe budget airline British Airways' Boadicea House data centre – and an explanation has emerged as to what killed the DC. Earlier this week Alex Cruz, BA's chief exec, said a major "power surge" at 0930 on Saturday 27 May caused the airline's systems to "collapse". Its Boadicea House (BoHo) data centre went down for around a quarter of an hour, seemingly taking the airline's failover systems with it. Read the article over at elReg here .

Ten Essential Steps To A Successful Data Center Migration

Vinay Nagpal of Digital Realty Data Centers and Kelly Morgan of 451 Research participated in a webinar about data center migrations providing best practices and tips for successfully and efficiently moving infrastructure between data centers with minimal operational impact to your company. Read the blog over at Inerglobix here .

Automatic Application Performance Management (APM)

Monitor any Application with Instana APM – Monoliths, SOA, Microservice and Kubernetes  Find out more about the product over at Instana here .

Contactless RFiD Safety Switch helps secure hazardous industrial areas

Protecting employees from hazardous industrial areas just got easier The new, contactless RFiD safety switch from Telemecanique Sensors provides a high level of protection in a compact, highly tamper-proof, and easy-to-install device. Find out more about the product over at Telemecanique over here .

Pricing: Snapt, F5 and Citrix

We've recently published an updated version of our price and feature comparison for Snapt. Highlighted in this is F5 and Citrix, two leading ADC competitors of ours.  Read the blog post over at Snapt here .

Information Security Policy Templates

Welcome to the SANS Security Policy Resource page, a consensus research project of the SANS community. The ultimate goal of the project is to offer everything you need for rapid development and implementation of information security policies. You'll find a great set of resources posted here already, including policy templates for twenty-seven important security requirements. Access the policies over at SANS here . A security policy can either be a single document or a set of documents related to each other. It contains a description of the security controls and it rules the activities, systems, and behaviors of an organization. A security policy template won’t describe specific solutions to problems. Instead, it would define the conditions which will help protect the assets of the company. It will also seek to protect the company’s ability to carry out business.  Download 42 Information Security Policy Templates [Cyber Security] over here .

GateBook: Electronic Vistor Management

Find out more about the product here .


Visitor identity is crucial  to the effective security of an estate or complex. Manual visitor record books are ineffective means of management as information is largely inaccurate and mostly illegible.  With the implementation and roll out of the Protection of Information (POPI) Act, paper based access control registers are no longer compliant and will soon become obsolete. OnGuard has developed a modern solution for its replacement called Identiscan, a hand-held mobile data terminal effective in scanning both motor vehicle and driver licences.  The Identiscan electronic visitor management system (EVMS) ensures all data is encrypted and stored offsite on a secure server.  The guard managing the IdentiScan scanner must first correctly identify himself using his personal PIN before he can collect data, ensuring accountability for management of the scanner as well as the allocation of the access record to the specific guard. No longer can a staff member say “It wasn’t me who let the vi

Detector SiFi

An autonomous fire detector with connectivity to the Internet of Things (IoT) via the wireless SIGFOX global network.  The detector works both autonomously and as part of a wireless network. Fire detection is based on an optical and temperature principle. The detector is battery powered.  Find out more about the product here .

ZKBioSecurity future proof technology

ZKBioSecurity is the ultimate “All in One” web based security platform developed by ZKTeco. It contains multiple integrated modules. Find out more about the product here .

Best Answer to “Sell Me This Pen” I Have Ever Seen

I personally never thought anyone would actually say, “sell me this pen” in a sales interview. I was wrong. It will happen to you too. And to avoid panic, you should know exactly what to say back.  I am going to give you the right sales framework to respond perfectly every time.  On a quick side note, did you know this sales interview question has been around for millions of years? Its origins date back to the earliest of cavemen. Selling slingshots cave-to-cave. Except back then, they asked, “sell me this bowl of crushed berries.”  Anyways. The point is, one day it will happen to you and I want you to be prepared.  Because if you start to describe how smooth the pen feels and how shiny the pen looks, just like you saw in the Wolf of Wallstreet…  You probably won’t get the job. Read the article over at LinkedIn here .

Netwrix Auditor for Network Devices

Complete visibility into configuration changes, logon attempts, scanning threats and hardware malfunctions on Cisco and Fortinet devices. Find out more about the product over at Netwrix here .

Download Time Switch Guide

Find the time switch guide from CBI here .

GPRS transmitter

Alarm communication and home automation. A single unit provides alarm signaling as well as simple home automation in one unit. Full extended data reporting. Connects to the panel via the telephone interface and reports full Contact ID. Dual SIM-redundancy on MTN and Vodacom. The system roams from one service provider to another in the event of a GSM network outage or any other technical difficulty. Chip SIMs are available for certain services. Remote home automation. Two onboard relays allow a gate to be opened, a light to be switched on etc. Remote programming and firmware updates. Program transmitter units remotely using a software application. Update firmware remotely. Download transmitter event logs. Download unit event logs without having to go to the site. The unit buffers up to 100 events. Fixed monthly cost. All activations are sent via GPRS, saving the typical call costs incurred with telephone monitoring. SAIDSA dual c

Joburg M2 bridge repairs set to cause traffic gridlock

The M2 motorway between Crown Interchange and Maritzburg Street will get a facelift and that is because the structural integrity of the concrete has been reduced.  Over 12,000 motorists are at risk if the M2 West bridge in the Johannesburg CBD isn't fixed up.  The Johannesburg Roads Agency is rehabilitating one of the busiest routes in the city and it will take months to do this and will cause traffic disruptions. Read the article over at eNCA here .

The SInclair ZX80, ZX81, and Timex Sinclair 1000

Awesome video by the 8-bit guy

Lexis Refcheck

Lexis RefCheck enables recruitment agencies and employers to verify the personal details of a potential employee or candidate prior to offering employment. By improving transparency and disclosure, informed decisions can be made regarding one of the most important assets of an organization, its employees. Arguably one of the most essential tools in human resource management and staff recruitment, Lexis RefCheck promises to deliver quality assured verifications with integrity and speed, meeting all your pre-employment and background screening needs. Benefits of Lexis RefCheck 24/7 Online Access - As an online consent-driven service, Lexis RefCheck allows 24/7 access which is password and username restricted. Complete Transparency – Lexis RefCheck carries no registration cost or monthly subscription fee, and no hidden costs. Affordable

Metropolitian Trading Company - Chief Technology Officer

A comprehensive CV, certified relevant qualification and certified ID copy should be emailed to MARIA NCUBE MANAGEMENT SUPPORT EXECUTIVE CLOSING DATE: 19 FEBRUARY 2019 View the job specification here .

DFA SqwidNet Smart Manhole Case Study

SqwidNet drives innovation through IoT. An anti-tampering solution was created and implemented for Dark Fibre Africa to prevent tampering with their manhole covers

Sherlo 3Amp

12Vdc 3.2 Amp regulated power supply excluding battery - 7Ah 12 Volt.  Used for alarm systems requiring additional power.  Access control power supply Features: Microprocessor Controlled charging output. Low battery switch off at 10V DC. Buzzer tones on battery low and AC Fail. Resettable Fuse protection on output. Fuse protection on AC input. ABS Plastic enclosure. Find out more about the product over at Alarmtec here or from the manufacturer here .

Power Trolley 8

Emergency power for TVs, DSTV Decoders, M-Net Decoders, Lights, Alarm Systems, Laptop Computers, Desktop Computers, DeskJet Printers, Radios, Hi-Fi Systems, Security Systems, Cash Registers, PABX systems, modems, hubs, routers and more... Find out more about the product here . 

BiB 071: SnapRoute CN-NOS For Whitebox Focuses On Operators

In this podcast : Drew Conry-Murray & Ethan Banks were briefed by SnapRoute co-founders Adam Casella and Glenn Sullivan in February 2019. After a year plus of post-launch quiet, SnapRoute has re-emerged with a new focus and energy centered around a shiny new whitebox network operating system called CN-NOS.

SD-WAN can help solve challenges of multi-cloud

With SD-WAN becoming remote users’ primary access to cloud-based applications, and with organizations deploying multi-cloud environments to optimize performance, it’s important for IT pros to choose SD-WAN technology that supports secure, low-latency and easy-to-manage connectivity to their cloud providers. Read the article over at Network World here .

Chipfox GPS tracker Really small GPS tracker with many functions.

Chipfox GPS tracker is small battery-operated, highly energy efficient device for tracking and securing of non-powered assets, animals or people. Communicates on Sigfox network. It doesn't need SIM card,  you don't have to recharge credit or battery, battery lasts for several years. Signal is resistant to jamming. Tracker features can be customized via web and mobile applications.  Find out more about the product here .


Our advanced NetOS® platform allows network owners to free themselves from the constraints of the past, enabling the sorts of flexibility, agility and control that were unimaginable just a few years ago, and which are increasingly needed by today’s – and tomorrow’s – network owners. Find out more about the product over at Zeetta Networks here . 

ALLNET - Building automation

The IP-based control, measurement and control systems of ALLNET offers modern, cost-effective and comprehensive solutions for the management and control of your IT systems and / or other technical building equipment. You can control everything from a PC, notebook or other mobile device. Whether the devices that you control or measure, are in the same building or on another continent. The medium is your existing computer network and the Internet. Measure values such as temperature, humidity, barometric pressure, etc. You can receive warnings about temperature limits, water levels, gas smell, movement messages easily by Email. In addition to regular measurements such as power consumption and power feeding from the photovoltaic system, the state of all components can be monitored from anywhere via network. Find out more about the products here .

Software-defined connectivity planned for colocation data centers

Stateless is working on a new architecture to bring software-defined networking to colocation data centers that are constrained by physical cross-connects. Read the article over at Network World here .

Major incidents in Information Technology explained by Ronald Bartels

Why are IoT platforms so darn confusing?

Everyone talks about IoT platforms, but they don’t always agree on exactly what they’re talking about. This analysis helps make sense of it. Read the article over at Network World here . 

The 7 Deadly Sins Of Product Development

Read the article over at LinkedIn here .