jackprabha's blog

If 35% of IT leaders expect to reduce their technology and innovation budget by 2021, the expectation is to focus efforts on managing expenses and controlling costs. Thus, these executives hope to increase the operational efficiency of the businesses.

Not least because, part of the IT budget in 2020 was intended to increase the infrastructure of companies to support the remote work of employees. This is the case with NorthMarq, a mortgage services company.

In three weeks, the company expanded its IT infrastructure , developed a new VPN , purchased notebooks for remote employees and planned a capital investment in this area for the next 18 months. All this due to the sense of urgency brought about by the crisis.

Extra Space Storage, a storage unit company, had a traditional contract signing process. However, the new coronavirus pandemic temporarily closed offices.

data center technician should answer questions and take queries from various sources and provide them with the right information.

With no forecast for the resumption of business, IT executives entered the scene. In three days, they were able to develop, test and release a remote subscription feature for granting a storage unit to the customer.

Operational efficiency has always been a will for Extra Space Storage, but the company has always hesitated to change the processes that, for it, worked well. The expectation is, now, to take advantage of the DevOps team to make more agile deliveries.

May 27 '21 · 0 comments

The time when all cloud resources were centralized in the data center is beginning to fade. Today it is already possible to find cloud applications that help to enhance the performance of ships, aircraft, cars and homes. Access to cloud computing and storage is moving from robust data centers to rural communities, remote areas and even orbits close to Earth. In practice, the cloud is arriving everywhere.


Today, advances make it possible to bring cloud technologies closer than ever to customers around the world. As we see the expansion of 5G networks, operators begin to implement wavelength zones so that traffic from 5G device applications can take full advantage of the low latency and high bandwidth of these modern networks. When fast connections to the cloud are expanded to the furthest points of the network, many good things can happen.


By removing latency and performing more processing on the device located at the edge of the network (or edge) , we are beginning to overcome the only limitation that still affects all technologies on Earth: the speed of light. Operations that require very low latency, including autonomous cars, natural language processing and the active management of vital infrastructures, no longer have to rely on moving information from the ends of the planet to a central server. It is now possible to perform tasks where the results are most needed. And do you know what the effect is? Autonomous cars become reality; factories, homes and offices are becoming increasingly efficient and resilient; and those who like to play video games can count on a faithful representation of the work, wherever they are.


DHCP server allots a dynamic IP number. The DHCP server has a group of IP addresses which can serve the purpose.


As the cloud expands from centralized locations to the environments in which we live and work, we will increasingly see software running on the cloud running close to you, which will lead to improvements in all aspects of life, including health, transportation, entertainment, manufacturing and more. In 2021, this transition to the edge of the system will be accelerated.

May 25 '21 · 0 comments · Tags: cloud

Finally, one of the primary elements in the infrastructure for network design is its security.

We know that the Internet is a world of many possibilities and, while this is positive, facilitating access to information and optimizing business time, on the other hand, there are still many points that can be negative.

After all, it proves to be a somewhat insecure environment, with risks and intrusions to the network, to steal sensitive data and information. A company that values ​​its future and its market competitiveness can never let that happen.

For this reason, it is necessary to prepare the infrastructure to receive the best resources that strengthen the security of the network: firewalls. The firewall is a tool that aims to limit access to a computer's input and output ports through the network, preventing intruders from entering.

banner-partnership-12

In other words, this feature is able to prevent the entry and exit of information from the computer, preventing confidential files from being sent to the network.

In a practical way, the firewall blocks the sending of data packets that have not been configured in your whitelist.

There are three types of firewalls: those that are located on the network, on computers and in applications. They all help to ensure that no malicious activity takes place on the network, on computers, let alone on the website, email servers and other applications that the business uses.

The tasks for a server technician are varied, with everything from providing cost estimates to upgrading hardware and software as needed. The server for a business hosts a lot of data and information, and server repair technicians need to be aware of what a business needs.

Therefore, for the network design to be complete, it is necessary to pay attention to this detail: the infrastructure must be compatible with the types of firewalls chosen by the business.

In addition, it is necessary to rely on other solutions that help combat any unauthorized activity on the network and that can harm the business, such as antivirus and antispyware and malware solutions to help maintain the security of the network. Together, they will help to reduce any possibility of invasion.

May 17 '21 · 0 comments · Tags: security of your network

how to avoid the main threats to which your company may be exposed?

Spoofing and Phishing

Spoofing is a type of technological forgery that seeks to deceive the user, making him believe that the source of information is reliable, settling on his network. Phishing, in turn, occurs when criminals trick the user into revealing personal information, such as passwords, credit card details, social security numbers and bank account numbers. Just like spoofing, they do this by sending fake emails or directing you to untrusted websites.


 These two threats have become quite common and, increasingly, cybercriminals have improved their technique to deceive users. How to protect yourself? In addition to investing in antivirus and firewall software so that these threats do not reach your network, the ideal is also to take some precautions, such as:


Do not respond to any email requesting account information or personal data, even if the sender is from a known user or institution.

If you suspect something, do not open the email or link.

Watch out for any changes in the appearance or behavior of trusted sites. Before passing the information requested on the page, be 100% sure that it is true.

Be wary of a tone of urgency and alarm, they are usually dangerous.

Do not open attachments or install anything that comes from unknown emails or that you are unsure of.

Ransomware (Data Hijacking)

Ransomware is a type of attack that makes stored data inaccessible and, usually using encryption, requires ransom payment to restore access to the user. This type of attack happens mainly with companies, and the demand for payment via cryptocurrency, especially bitcoin, has grown.


A network engineer is required to have the necessary skills to plan, implement and oversee the computer networks that support in-house voice, data, videos and wireless network services.


The most common ways for ransomware to spread are by e-mails with the malicious code attached or that induce the user to follow a link and intrusion due to system vulnerabilities. It is very important to avoid being infected, because once your data is hijacked, it is very difficult to recover it. So stay tuned:


Keep the operating system and programs installed with all updates applied;

Have an antivirus, firewall and other security software active;

Be careful when clicking links or opening files;

Make backups to have access to your data, in case your equipment is infected.

May 12 '21 · 0 comments · Tags: threats

The software-defined wide area network is designed not only for the current but also the future needs of the organization. In addition, it can help reduce your overall bandwidth costs.



Analysts estimate that about 30% of companies are already using public cloud services; the volume of their use will increase annually by 17%.


In addition, the proliferation of mobile versions of enterprise applications is increasing; they become available on various devices outside the office. This is a very important trend, given the fact that in 2018 half of all employees in the corporate sector will use mobile devices. Networks have become a strategically important asset for companies, and therefore IT leaders must plan for alternative methods of connecting mobile devices in corporate wide area networks.


The communication requirements of companies have outgrown the capabilities of private WAN MPLS services to provide communications between remote offices and data centers. The current network architecture, which is more than ten years old, does not meet today's requirements: an increase in the number of connected devices, mobility, increased security needs. The software-defined wide area network (SD-WAN) is designed not only for the current needs of the organization, but also for the future. SD-WAN technology allows you to create hybrid networks that combine access technologies such as Internet services, dynamic traffic routing and real-time connection configuration based on available bandwidth or selected criteria. Besides,


KNow more: Computer Science vs Computer Engineering


In 2015, the emerging SD-WAN market was estimated at almost $ 225 million.According to IDC forecasts, in 2016 this market will grow by 165% to $ 595 million. Then in 2017 - by 129%, in 2018 - by another 87%, reaching 2.6 billion. According to analysts, by 2020 the average annual growth rate of the SD-WAN market will be 93%, which will allow it to reach more than $ 6 billion.

May 7 '21 · 0 comments · Tags: sd wan

1. Assist in telephone service and registration of work orders
The first of the IT support activities is to assist in answering service request calls .

In large companies, it is necessary to have a person responsible for receiving calls, registering the reasons for the service request and creating the service order register .

Service orders are usually recorded on a system and distributed among professionals on the IT support team.

Thus, the work of each technician is more organized and they can go out to solve one or more calls and even be assigned to new ones during the workday.

2. Price quotation for computer parts
Another of the IT support activities is to quote the prices of the parts needed for equipment maintenance services.

With this work, the IT support team maintains contact with several suppliers from different segments and thereby creates a close relationship.

Thus, it is possible to obtain parts at a good cost-benefit and, especially, when it is necessary for service.

As much as maintenance activities minimize emergencies, there is always a situation where it is necessary to obtain last minute parts.

If the company has a list of suppliers for reference, it is easier to find a solution.

Technicians are well-versed with the brass tacks of the services/products, which they provide support for. If IT Technicians are unable to resolve a problem, it is escalated to the senior team.

3. Taking questions from customers
IT support activities also involve asking questions about technical issues or any error in the daily use of equipment and programs.

These calls can take place over the phone, without the need to move a technician to the location.

Every company needs to have an IT support reference to turn to when there is a question in the team.

In such cases, the technician can identify patterns of inappropriate use of the systems that can be corrected so as not to jeopardize the security of the stored data .

4. Conduct training
Other IT support activities include training for companies .

The lack of knowledge in relation to technology, many times, makes the companies need to align the understanding about the use of the equipment.

The good practices developed to guarantee the security of the company's systems, the longevity of the equipment and avoid errors in the insertion of data that can harm the results, etc.

The training can be provided by IT support technicians so face and also virtual customers.

May 5 '21 · 0 comments · Tags: it support