Posts

Showing posts from February, 2019

2019 Gartner Magic Quadrant for Network Performance Monitoring and Diagnostics

Image
Innovation at VIAVI means focusing on an outcome driven strategy. Our customers want outcomes that solve their problems – automated user-experience insight, comprehensive on-prem and cloud visibility, and getting problems fixed faster using complete forensic detail for investigations. We innovate to solve.   We are pleased to announce that in addition to being named a Leader for the 6th year in a row1, Gartner has positioned VIAVI furthest for its completeness of vision. 
Access the Gartner report over at Viavi here or at Gartner over using the following link:

How to Design Self-service Network Analytics into Your Services

Image
We recently blogged on why network insight is essential for communications service consumers, including why self-service portals are increasingly important for today’s network and network operators. In that blog post, we looked at self-service portals from an end-user standpoint.  At Kentik, we believe in curated, actionable insight catering to different user personas across organizations. So, in this post, we will look into these portals in terms of design considerations for service providers.  If you are a service provider or enterprise and have decided to provide your customers with traffic visibility into their networks, amongst many other decisions you may find yourself thinking about: DifferentiationSpeed of delivery and deployment Read the blog post over at Kentik over here.


BA IT systems failure: Uninterruptible Power Supply was interrupted

Image
An IT bod from a data centre consultancy has been fingered as the person responsible for killing wannabe budget airline British Airways' Boadicea House data centre – and an explanation has emerged as to what killed the DC. Earlier this week Alex Cruz, BA's chief exec, said a major "power surge" at 0930 on Saturday 27 May caused the airline's systems to "collapse". Its Boadicea House (BoHo) data centre went down for around a quarter of an hour, seemingly taking the airline's failover systems with it.
Read the article over at elReg here.


Ten Essential Steps To A Successful Data Center Migration

Image
Vinay Nagpal of Digital Realty Data Centers and Kelly Morgan of 451 Research participated in a webinar about data center migrations providing best practices and tips for successfully and efficiently moving infrastructure between data centers with minimal operational impact to your company.
Read the blog over at Inerglobix here.


Automatic Application Performance Management (APM)

Image
Monitor any Application with Instana APM – Monoliths, SOA, Microservice and Kubernetes 

Find out more about the product over at Instana here.


Contactless RFiD Safety Switch helps secure hazardous industrial areas

Image
Protecting employees from hazardous industrial areas just got easier The new, contactless RFiD safety switch from Telemecanique Sensors provides a high level of protection in a compact, highly tamper-proof, and easy-to-install device.
Find out more about the product over at Telemecanique over here.


Pricing: Snapt, F5 and Citrix

Image
We've recently published an updated version of our price and feature comparison for Snapt. Highlighted in this is F5 and Citrix, two leading ADC competitors of ours. 
Read the blog post over at Snapt here.


Information Security Policy Templates

Image
Welcome to the SANS Security Policy Resource page, a consensus research project of the SANS community. The ultimate goal of the project is to offer everything you need for rapid development and implementation of information security policies. You'll find a great set of resources posted here already, including policy templates for twenty-seven important security requirements.
Access the policies over at SANS here.


A security policy can either be a single document or a set of documents related to each other. It contains a description of the security controls and it rules the activities, systems, and behaviors of an organization.
A security policy template won’t describe specific solutions to problems. Instead, it would define the conditions which will help protect the assets of the company. It will also seek to protect the company’s ability to carry out business.

 Download 42 Information Security Policy Templates [Cyber Security] over here.

GateBook: Electronic Vistor Management

Image
Find out more about the product here.


Identiscan

Image
Visitor identity is crucial to the effective security of an estate or complex. Manual visitor record books are ineffective means of management as information is largely inaccurate and mostly illegible.  With the implementation and roll out of the Protection of Information (POPI) Act, paper based access control registers are no longer compliant and will soon become obsolete. OnGuard has developed a modern solution for its replacement called Identiscan, a hand-held mobile data terminal effective in scanning both motor vehicle and driver licences.  The Identiscan electronic visitor management system (EVMS) ensures all data is encrypted and stored offsite on a secure server.  The guard managing the IdentiScan scanner must first correctly identify himself using his personal PIN before he can collect data, ensuring accountability for management of the scanner as well as the allocation of the access record to the specific guard. No longer can a staff member say “It wasn’t me who let the visi…

Detector SiFi

Image
An autonomous fire detector with connectivity to the Internet of Things (IoT) via the wireless SIGFOX global network.  The detector works both autonomously and as part of a wireless network. Fire detection is based on an optical and temperature principle. The detector is battery powered. 
Find out more about the product here.


ZKBioSecurity future proof technology

Image
ZKBioSecurity is the ultimate “All in One” web based security platform developed by ZKTeco.
It contains multiple integrated modules.

Find out more about the product here.


Best Answer to “Sell Me This Pen” I Have Ever Seen

Image
I personally never thought anyone would actually say, “sell me this pen” in a sales interview. I was wrong. It will happen to you too. And to avoid panic, you should know exactly what to say back.  I am going to give you the right sales framework to respond perfectly every time.  On a quick side note, did you know this sales interview question has been around for millions of years? Its origins date back to the earliest of cavemen. Selling slingshots cave-to-cave. Except back then, they asked, “sell me this bowl of crushed berries.”  Anyways. The point is, one day it will happen to you and I want you to be prepared.  Because if you start to describe how smooth the pen feels and how shiny the pen looks, just like you saw in the Wolf of Wallstreet…  You probably won’t get the job.
Read the article over at LinkedIn here.


Netwrix Auditor for Network Devices

Image
Complete visibility into configuration changes, logon attempts, scanning threats and hardware malfunctions on Cisco and Fortinet devices.

Find out more about the product over at Netwrix here.


Download Time Switch Guide

Image
Find the time switch guide from CBI here.


GPRS transmitter

Image
Alarm communication and home automation. A single unit provides alarm signaling as well as simple home automation in one unit.

Full extended data reporting. Connects to the panel via the telephone interface and reports full Contact ID.

Dual SIM-redundancy on MTN and Vodacom. The system roams from one service provider to another in the event of a GSM network outage or any other technical difficulty. Chip SIMs are available for certain services.

Remote home automation. Two onboard relays allow a gate to be opened, a light to be switched on etc.Remote programming and firmware updates. Program transmitter units remotely using a software application. Update firmware remotely.

Download transmitter event logs. Download unit event logs without having to go to the site. The unit buffers up to 100 events.

Fixed monthly cost. All activations are sent via GPRS, saving the typical call costs incurred with telephone monitoring.

SAIDSA dual communication specifications. Ideal when installed in conjunction…

Joburg M2 bridge repairs set to cause traffic gridlock

Image
The M2 motorway between Crown Interchange and Maritzburg Street will get a facelift and that is because the structural integrity of the concrete has been reduced.  Over 12,000 motorists are at risk if the M2 West bridge in the Johannesburg CBD isn't fixed up.  The Johannesburg Roads Agency is rehabilitating one of the busiest routes in the city and it will take months to do this and will cause traffic disruptions.
Read the article over at eNCA here.


The SInclair ZX80, ZX81, and Timex Sinclair 1000

Image
Awesome video by the 8-bit guy


Water Management Device

Image
Smart Meter ReadingAutomatic Data CollectionRemote Shut-off Find out more about the device at lesira here

Lexis Refcheck

Image
Lexis RefCheck enables recruitment agencies and employers to verify the personal details of a potential employee or candidate prior to offering employment. By improving transparency and disclosure, informed decisions can be made regarding one of the most important assets of an organization, its employees. Arguably one of the most essential tools in human resource management and staff recruitment, Lexis RefCheck promises to deliver quality assured verifications with integrity and speed, meeting all your pre-employment and background screening needs.
Benefits of Lexis RefCheck 24/7 Online Access - As an online consent-driven service, Lexis RefCheck allows 24/7 access which is password and username restricted.Complete Transparency – Lexis RefCheck carries no registration cost or monthly subscription fee, and no hidden costs.Affordable Payments - Pay per check solution with users being charged only for the checks they submit.Verifications offered by Lexis RefCheck Criminal Records Che…

Metropolitian Trading Company - Chief Technology Officer

Image
A comprehensive CV, certified relevant qualification and certified ID copy should be emailed to  Hr@mtc.joburg.org.za

MARIA NCUBE
MANAGEMENT SUPPORT EXECUTIVE
CLOSING DATE: 19 FEBRUARY 2019

View the job specification here.


DFA SqwidNet Smart Manhole Case Study

Image
SqwidNet drives innovation through IoT. An anti-tampering solution was created and implemented for Dark Fibre Africa to prevent tampering with their manhole covers

Sherlo 3Amp

Image
12Vdc 3.2 Amp regulated power supply excluding battery - 7Ah 12 Volt.  Used for alarm systems requiring additional power.  Access control power supply
Features: Microprocessor Controlled charging output. Low battery switch off at 10V DC. Buzzer tones on battery low and AC Fail. Resettable Fuse protection on output. Fuse protection on AC input. ABS Plastic enclosure. Find out more about the product over at Alarmtec here or from the manufacturer here.



12V CCTV Power Supply

Image
Power Supply Unit with Battery Backup • 12VDC 3A UPS • with Battery Compartment for 7Ah Battery (Battery NOT Included) 
Find out more about the product here.


Tescom 2000VA UPS

Image
This Apex UPS is an entry-level cost effective solution, it is rated 2000VA, and is specifically for use with 4 PCs, it also has 6x output ports. It is designed to provide enough time for an orderly shutdown.
Find out more about the product here.


Power Trolley 8

Image
Emergency power for TVs, DSTV Decoders, M-Net Decoders, Lights, Alarm Systems, Laptop Computers, Desktop Computers, DeskJet Printers, Radios, Hi-Fi Systems, Security Systems, Cash Registers, PABX systems, modems, hubs, routers and more...
Find out more about the product here