Friday, November 27, 2009

How to disable Internet Explorer password caching

To disable password caching, follow these steps:
1.Click Start, click Run, type regedit, and then click OK.
2.Locate and then click the following registry subkey:
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings
3.On the Edit menu, click New, and then click DWORD Value.
4.Type DisablePasswordCaching to name the new registry entry, and then press ENTER.
5.Right-click DisablePasswordCaching, and then click Modify.
6.Make sure that the Hexadecimal option button is selected, type 1 in the Value data box, and then click OK.
Quit Registry Editor.

Tuesday, November 10, 2009

Deadlock Situation

From
Boss to Secretary
For a week we will go abroad, so make arrangement.
Secretary to Husband
For a week my boss and I will be going abroad, you look after yourself.
Husband to Secret lover
My wife is going abroad for a week, so let's spend the week together.
Secret lover to Small boy (whom she is giving private tuition)
I have work for a week, so you need not come for class.
Small boy to Grand-father
Grandpa, for a week I don't have class 'coz my teacher is busy. Let's spend the week together.
Grandpa (the 1st boss ;) ) to Secretary
This week I am spending my time with my grandson. We cannot attend that meeting..
Secretary to Husband
This week my boss has some work, we cancelled our trip.
Husband to Secret lover
We cannot spend this week together; my wife has cancelled her trip.
Secret lover to Small boy
This week we will have class as usual.
Small boy to Grandfather
Grandpa, my teacher said this week I have to attend class. Sorry I can't give you company.
Grandfather to Secretary
Don't worry this week we will attend that meeting, so make arrangement

Thursday, November 5, 2009

SCS - fully featured SIP based IP PBX from Nortel

Nortel’s Secure Router 4134 now supports SCS (Software communication system- fully featured SIP based IP PBX) functionality through a blade.
The Secure Router 4134 Server Module with SCS delivers a complete unified communications solution for enterprise sites of up to 250 users. It effectively integrates two products – Nortel’s Secure Router 4134 and Software Communication System (SCS) into a single, unified device.
The combined solution effectively integrates the following functions of Nortel’s SCS and the Secure Router 4134:
• SIP-based call server with support for a range of hard clients, soft phone and application plug-ins
• Full suite of UC applications including:
• Unified messaging
• Secure presence and instant messaging
• Audio and video conferencing
• Auto attendant (corporate and personal)
• Basic contact center capabilities
• Integration with Microsoft Outlook and IBM Sametime / Lotus Notes
• Communications-enabled business processes
• PSTN gateway
• IP routing
• Stateful firewall and IPSec VPN
• Wide-Area Networking (WAN) connectivity
• Ethernet switching with PoE

1. Standalone solution- can handle all of a business’s voice and data communications needs as an all-in-one “office-in-a-box” solution. It delivers all the call server, unified communications, PSTN and WAN connectivity.
2. Distributed Solution - can also be deployed as a “branch-in-a-box” solution as part of a larger distributed network with a centralized SCS server – leveraging the multi-site, multi-branch capabilities of SCS.

Friday, October 23, 2009

How to remove field codes (eg: {page})from my Word documents

Simply click: Alt + F9
If they're TC or XE fields, they're formatted as Hidden text, so the usual
Alt+F9 toggle doesn't work for them; you have to hide Hidden text instead.
In Word, click on Tools | Options | View | uncheck the "Hidden text" box
| OK.

Wednesday, October 21, 2009

Enabling Account Privileges in WMI of a Vista or Server 2008 computer

The account you specify in the Credentials Library must possess security access to the namespace and subnamespaces of the monitored target computer. To enable these privileges, complete the following procedure.
To enable namespace and subnamespaces privileges:
1. Log on to the computer you want to monitor with an administrator account.
2. Navigate to Start > Control Panel > Administrative Tools > Computer Management > Services and Applications. You need to switch to the Classic View of the Control Panel to use this navigation path.
3. Click WMI Control, and then right-click and select Properties.
4. Select the Security tab, and then expand Root and click CIMV2.
5. Click Security and then select the user account used to access this computer and ensure you grant the following permissions:
Enable Account
Remote Enable

6. Click Advanced, and then select the user account used to access this computer.
7. Click Edit, select This namespace and subnamespaces in the Apply to field, and then click OK.
8. Click OK on the Advanced Security Settings for CIMV2 window.
9. Click OK on the Security for Root\CIMV2 window.
10. Click Services in the left navigation pane of Computer Management.
11. Select Windows Management Instrumentation in the Services result pane, and then click Restart.

Allowing WMI through the Windows Firewall of a Vista or Server 2008 computer

You must allow WMI traffic through the firewall of the monitored application server. The following procedure walks you through allowing WMI through the Windows Firewall.
To allow WMI traffic through the Windows Firewall:
1. Log on to the computer you want to monitor with an administrator account.
2. Navigate to Start > Control Panel > Security Center. You need to switch to the Classic View of the Control Panel to use this navigation path.
3. Click Windows Firewall in the left navigation pane.
4. Click Allow a program through Windows Firewall in the left navigation pane.
5. Check Windows Management Instumentation (WMI), and then click OK.

Enabling DCOM of a Vista or Server 2008 computer

Windows Management Instrumentation (WMI) uses DCOM to communicate with monitored target computers. Therefore, for enable WMI, DCOM must be enabled and properly configured.
To enable DCOM permissions for your credentials:
1. Log on to the computer you want to monitor with an administrator account.
2. Navigate to Start > Control Panel > Administrative Tools > Component Services. You need to switch to the Classic View of the Control Panel to use this navigation path. (You can also launch this console by double-clicking comexp.msc in the /windows/system32 directory. Configuring WMI on Windows Vista and Windows Server 2008 for your requirment.
3. Expand Component Services > Computers.
4. Right-click My Computer, and then select Properties.
5. Select the COM Security tab, and then click Edit Limits in the Access Permissions grouping.
6. Ensure the user account you want to use to collect WMI statistics has Local Access and Remote Access, and then click OK.
7. Click Edit Default, and then ensure the user account you want to use to collect WMI statistics has Local Access and Remote Access,
8. Click OK.
9. Click Edit Limits in the Launch and Activation Permissions grouping.
10. Ensure the user account you want to use to collect WMI statistics has Local Launch, Remote Launch, Local Activation, and Remote Activation, and then click OK.
11. Click Edit Default, and then ensure the user account you want to use to collect WMI statistics Local Launch, Remote Launch, Local Activation, and Remote Activation.
12. Click OK.

Allowing WMI through the Windows Firewall of a Vista or Server 2008 computer

If you are monitoring a target in a workgroup, you need to disable remote User Account Control (UAC). This is not recommended, but it is necessary when monitoring a workgroup computer. Disabling remote user account control does not disable local user account control functionality.
Warning: The following procedure requires the modification or creation of a registry key. Changing the registry can have adverse effects on your computer and may result in an unbootable system. Consider backing up your registry before making these changes.
To disable remote UAC for a workgroup computer:
1. Log on to the computer you want to monitor with an administrator account.
2. Click Start > Accessories > Command Prompt.
3. Enter regedit.
4. Expand HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System.
5. Locate or create a DWORD entry named LocalAccountTokenFilterPolicy and provide a DWORD value of 1.
Note: To re-enable remote UAC, change this value to 0.

To add your monitor account to the local administrator group of a Vista or Server 2008 computer:

1. Log on to the computer you want to monitor with an administrator account.
2. Navigate to Start > Control Panel > Administrative Tools > Computer Management >Local Users and Groups > Groups. You need to switch to the Classic View of the Control Panel to use this navigation path
3. Right-click Administrators, and then click Add to group
4. If the account you want to use is not currently a member of this group, complete the following procedure
a. Click Add on the Administrators Properties window
b. Type the name of the account you want to use to gather WMI statistics, and then click OK
5. Click OK on the Administrators Properties window, and then close the Computer Management window

Tuesday, October 13, 2009

HOW TO: Configure the Simple Network Management Protocol (SNMP) Service in Windows Server 2003

How to Configure SNMP Agent Information
To configure SNMP agent information:
Click Start, point to Control Panel, point to Administrative Tools, and then click Computer Management.
In the console tree, expand Services and Applications, and then click Services.
In the right pane, double-click SNMP Service.
Click the Agent tab.
Type the name of the user or administrator of the computer in the Contact box, and then type the physical location of the computer or contact in the Location box.

These comments are treated as text and are optional.
Under Service, click to select the check boxes next to the services that are provided by your computer. Service options are:
Physical: Specifies whether the computer manages physical devices, such as a hard disk partition.
Applications: Specifies whether the computer uses any programs that send data by using TCP/IP.
Datalink and subnetwork: Specifies whether this computer manages a TCP/IP subnetwork or datalink, such as a bridge.
Internet: Specifies whether this computer acts as an IP gateway (router).
End-to-end: Specifies whether this computer acts as an IP host.
Click OK.
NOTE: If you have installed additional TCP/IP network devices, such as a switch or a router, see Request for Comments (RFC) 1213 for additional information. To view RFC 1213, visit the following Internet Engineering Task Force (IETF) Web site:


http://www.ietf.org/rfc/rfc1213.txt (http://www.ietf.org/rfc/rfc1213.txt)
Microsoft provides third-party contact information to help you find technical support. This contact information may change without notice. Microsoft does not guarantee the accuracy of this third-party contact information.


Back to the top
How to Configure SNMP Communities and Traps
To configure traps:
Click Start, point to Control Panel, point to Administrative Tools, and then click Computer Management.
In the console tree, expand Services and Applications, and then click Services.
In the right pane, double-click SNMP Service.
Click the Traps tab.
In the Community name box, type the case-sensitive community name to which this computer will send trap messages, and then click Add to list.
Under Trap destinations, click Add.
In the Host name, IP or IPX address box, type the name, IP or IPX address of the host, and then click Add.

The host name or address appears in the Trap destinations list.
Repeat steps 5 through 7 to add the communities and trap destinations that you want.
Click OK.
Back to the top
How to Configure SNMP Security
To configure SNMP security for a community:
Click Start, point to Control Panel, point to Administrative Tools, and then click Computer Management.
In the console tree, expand Services and Applications, and then click Services.
In the right pane, double-click SNMP Service.
Click the Security tab.
Click to select the Send authentication trap check box (if it is not already selected) if you want a trap message sent whenever authentication fails.
Under Accepted community names, click Add.
To specify how the host processes SNMP requests from the selected community, click the permission level that you want in the Community Rights box.
In the Community Name box, type the case-sensitive community name that you want, and then click Add.
Specify whether or not to accept SNMP packets from a host. To do so, do one of the following:
To accept SNMP requests from any host on the network, regardless of identity, click Accept SNMP packets from any host.
To limit the acceptance of SNMP packets, click Accept SNMP packets from these hosts, click Add, and then type the appropriate host name, IP or IPX address in the Host name, IP or IPX address box.
Click Add.
Click OK.
IMPORTANT: If you remove all of the community names, including the default name "Public", SNMP does not respond to any community names that are presented.

User Profile Hive Cleanup Service

The User Profile Hive Cleanup service helps to ensure user sessions are completely terminated when a user logs off. System processes and applications occasionally maintain connections to registry keys in the user profile after a user logs off. In those cases the user session is prevented from completely ending. This can result in problems when using Roaming User Profiles in a server environment or when using locked profiles as implemented through the Shared Computer Toolkit for Windows XP

Thursday, September 3, 2009

How to apply new Group Policy for XP client

1. Logon it as an administrator.
2. Delete all the files under path
C:\windows\security\templates\policies
3. Then, run gpupdate /force
4. Try to logon it use other accounts to see if the problem has been solved.

Wednesday, September 2, 2009

Creating an ASP .NET Web Application Using the SAP .NET Connector

SAP.NET Connector along with Microsoft.NET can be used to create Web Applications. The following example illustrates creating .NET project using Microsoft Visual Studio. NET. Here, a client application reads and displays customer data from an SAP System using a search value and then displays it in a data grid.



The example uses the function module RFC_CUSTOMER_GET, which requires that customer data exist in the target SAP System, for example, in IDES. Although it is possible to rename all development objects and generated proxy classes, default names are used in this example. This example is provided as part of the connector sample code (DNCWebApp).






Procedure of Creating an ASP .NET Web Application Using the SAP .NET Connector:

1. Open Microsoft Visual Studio .NET.

2. Create a new C# Web form project:
Choose New. New Project. Visual C# Projects. ASP .NET Web Application.


You can also create a project in any other common programming language for .NET, for example, in Visual Basic .NET. In this case, you must add the SAP .NET proxy classes as a separate project in the Microsoft Visual Studio .NET solution.



3. Rename the form Webform1.aspx to Default.aspx.

4. Add Web controls to your Web form.

5. Add proxy classes to connect the Web applications to your SAP server.

a. In the Solution Explorer, right-click on your project.

b. Choose Add. Add new item.

c. Select Web Project Items.

SAP Connector Class and choose Open.

The SAP .NET Connector Wizard opens.

d. Decide from where you want to generate the proxy classes.

Proxies can be created from

- Web Services Description Language (WSDL) files that originate in an SAP interface repository (IFR)
- An SAP server
- Standard WSDL files
e. Select the client proxy object type and select beautify names option.

f. Select the Remote Function Modules (RFM) you want to use in your proxy object.

You can use search filters to look for the Remote Function Modules. In the example, enter the search argument RFC_CUST* in Name-Filter and select RFC_CUSTOMER_GET.

g. Add the modules to your proxy object and choose NEXT.

The proxy classes for the referenced table and structure types are automatically created and added to the project.

6. Build the solution with Build. Build Solution.

7. Create an SAP Login page to support user name and password authentication

a. In the Solution Explorer, right-click on your project.

b. Choose Add. Add new item.

c. Select Web Project Items. SAP Login Form

Leave the name as SAPLogin1.aspx.

8. Set the system connection information in the destination object of the SAPLogin1.aspx page:

a. In the Solution Explorer window find the item SAPLogin1.aspx and double-click on it to bring it up in the designer.

b. Look for the component destination1 on the bottom of the form.

c. Click on the destination component and set the properties for connecting to your SAP system (for example AppServerHost and System Number). The other properties like client, Password and username will be set from the login page.

9. Data bind the data grid to BRFCKNA1Table:

BRFCKNA1Table is the parameter of RFC_CUSTOMER_GET that contains the list of customers.

a. Select SAP Table Wizard from the SAP proxy toolbox and Drag Drop it to your working area. In the dialog box, select BRFCKNA1Table.

b. Select the data grid, and under Properties change Data Source to BRFCKNA1Table using the drop down list.

c. Customize the list of columns displayed on the data grid by modifying the Columns collection property.

10. On the default.aspx page, double-click the Button control you added earlier to create an event handler for the control.

11. Add the connect code to your project:

Select Connect code from the SAP proxy toolbox.

Drag Drop it in the source code of your event handler. A fragment of sample code is then inserted. It connects to the SAP server using the authorization settings from the Proxy Wizard. Normally, you must change these settings.



The syntax for the application will be

private void btnSearch_Click(object sender, System.EventArgs e)

{

// Declare parameters here

SAPProxy1 proxy = new SAPProxy1();

try

{

proxy.Connection =

SAP.Connector.SAPLoginProvider.GetSAPConnection(this);

// Call methods here

proxy.Rfc_Customer_Get("", txtCust.Text, ref brfcknA1Table1);

// Now update Data Bindings. On WinForms this will be automatic, on

// WebForms call the following line

this.DataBind();

}

catch(Exception ex)

{

// If SAPLoginProvider.GetSAPConnection(this) cannot get a connection,

// we might get an error.

// Normally this can be ignored as it will automatically will force a

// relogon.

}

}

12. Build and run the application.

The browser window opens and you are redirected to your SAPLogin1.aspx login page.

13. Enter connection data (for example user, password and client).


If you select SAVE this login information will be stored as an encrypted cookie on your computer and will provide an alternative single sign-on capability the next time you wish to access the site. If you do not select SAVE, the login information will still be saved in the ASP .NET session state but will be lost once the browser is closed.




14. Enter a search argument, for example A* in the Textbox field and choose Search. Thus we create an ASP.NET Application using Visual Studio .NET using Proxy classes to connect to the server and Binding the DATA GRID. Your application connects to the SAP System and displays the requested data in the Data Grid.

1.1 Windows 7 System Requirements

1.1 Windows 7 System Requirements
As the current version of Windows 7 is still not the final
version, the system requirements are subject to
change. However, the current minimum system
requirements are as follows:
•1 GHz 32-bit or 64-bit processor
•1 GB of system memory
•16 GB of available disk space
•Support for DirectX 9 graphics with 128 MB
memory (to enable Aero theme)
•DVD-R/W Drive
I’ve tested Windows 7 with 512MB of RAM and found it
to work well; however, I do not recommend running
with such low memory – unless you really have to.

Friday, August 14, 2009

“MOSS Setup error: This product requires ASP.NET v2.0 to be set to ‘Allow’ in the list of Internet Information Services (IIS) Web Server Extensions.”

“MOSS Setup error: This product requires ASP.NET v2.0 to be set to ‘Allow’ in the list of Internet Information Services (IIS) Web Server Extensions.”
From command prompt
basically run cmd from start, change to this folder ‘C:\WINDOWS\Microsoft.NET\Framework\v2.0.50727′, then run the command ‘aspnet_regiis -i’ at the prompt.
From GUI
Or open above folder and run ASPNET_REGIIS.exe

Windows SharePoint Services Overview

Windows SharePoint Services allows teams to create Web sites for information sharing and document collaboration, benefits that help increase individual and team productivity. Windows SharePoint Services is a component of the Windows Server 2003 information worker infrastructure and provides team services and sites to Microsoft Office System and other desktop programs. It also serves as a platform for application development. Including such IT resources as portals, team workspaces,
e-mail, presence awareness, and Web-based conferencing, Windows SharePoint Services enables users to locate distributed information quickly and efficiently, as well as connect to and work with others more productively.

Its free with your server 2003...........

Free Small Business Accounting Apps form Microsoft

If you're running a company of any size,(small or large scale) you'll need accounting software to help you track your income, expenditures, customers, and so on. But if your outfit is small, one thing you don't need to do is pay for that software—there are solid options out there that can get you the functionality you need without having to go through your AP person (or, more likely, your own wallet). These three free accounting software packages will help you keep your money and your focus where they belong: on building your business.

Microsoft Office Accounting Express 2009 It gives you all the basic general ledger, accounts payable and receivable, payroll, online banking, sales tracking, inventory management, and reporting capabilities you need. It also integrates very well with Microsoft Office (its interface even resembles Outlook's), which makes it even easier to get your work done.

more....

Thursday, August 13, 2009

Windows 7: The Good, and The Bad,

I've been testing the Win7 RC at home for a few months now on a five year old PC. My focus thus far has been on determining how well my oldest software and hardware can run on the new OS.

Basically, I think users of XP who plan to upgrade their old PCs to 7 and have old hardware that depend on included software for critical added functionality should proceed with caution, if at all. I encoutered issues where the accompanying software that came with the old hardware was unable to recognize and use the driver that Win7 had provided automatically.

The worst case was with the Audigy card that I had installed in the PC. Win7 installed a driver automatically but when I installed the software suite that the card came with and then tried to run it with the Win7 driver, it failed to recognize the device. I then tried to upgrade the software to the Vista-compatible version and Win7 crashed and subsequently refused to boot. I had to use a restore point to get Windows working again. So basically the card is installed, but without the additional card software, it can't be configured to take full advantage of the 5.1 surround sound speaker setup that's connected to the PC. I do get 5.1 surround sound with DVD movies played in WMP, but sound playback is otherwise limited to a 2.1 speaker configuration with no crossover, DSP effects processing, equilizers, 3D balance etc as those are provided by the additional software that refuses to work with 7.

If you've got old PC hardware whose accompanying software is not currently being updated by the developer to support the Win7 platform, you'll get the best use of your hardware if you stick with XP until you're ready to dump the old PC and buy or build a new one.

Thursday, August 6, 2009

Release Ubuntu 9.10 (Karmic Koala) Alpha-3

The Ubuntu developers are moving quickly to bring you the absolute latest and greatest software the Open Source Community has to offer. The Karmic Koala Alpha 3 is the third alpha release of Ubuntu 9.10, bringing with it the earliest new features for the next version of Ubuntu.

New features
ext4 by default
New Intel video driver architecture available for testing
New default compiler
hal deprecation
Linux kernel 2.6.31
Ubuntu One file sharing
Download Alpha 3
Get it while it's hot. ISOs and torrents are available at:
http://cdimage.ubuntu.com/releases/karmic/alpha-3/ (Ubuntu Desktop, Server, and Netbook Remix)

Tuesday, August 4, 2009

How to Virtualize

Data center virtualization projects
Executive Summary
Data center virtualization projects have a ripple effect throughout an organization’s infrastructure and operations. Collapsing multiple physical devices into software affects the people and processes supporting the data center. Before embarking on data center virtualization deployments, enterprises should account for how business processes, administrative rights, capacity planning, performance monitoring tools and security strategies will need to change.

Introduction

Virtualization projects are under consideration or already in progress at many organizations looking to decrease their capital and real estate expenses and to launch energy-conservation initiatives. Through the use of special virtualization products and services, data center managers can apportion computing hardware resources to operating systems and applications on a time-sharing basis. In doing so, they can significantly boost the utilization and efficiency of servers, network equipment and storage devices. Such projects reduce the overall number of physical devices needed, the floor and rack space needed to house them and physical equipment management requirements.
Virtualization, then, holds a number of potential capital and operational cost-saving benefits. But it raises a few questions, too. For example, a mature virtual infrastructure will cross many traditionally separate internal groups of employees, such as those responsible for servers, networks, storage and security. So a virtualization project is likely to have an impact on organizational structure and responsibilities. Therefore, getting executive commitment and support, particularly from chief financial executives able to see the big-picture savings potential of going virtual, is critical to organization-wide buy-in and cooperation.
There are basic technical and logistical questions to consider when considering a virtualization plan:
• How do you calculate the appropriate ratio to use when consolidating physical servers and other devices into software-based virtual machines (VMs)?
• What is the impact of VMs on current disaster recovery and high-availability plans?
• Do security requirements shift in a virtual environment?
• How might software licensing/pricing models, power requirements and patch management processes need to change?
Preparing a well-documented business case based on an assessment of the current environment will help answer some of these questions. In your assessment and business case, you’ll need to calculate the physical host metrics needed – such as processor type and speed; RAM amount and utilization; network interface speeds and quantities; disk resources and other metrics.
The business case should also delineate the problems you expect virtualization to solve. For example, are you currently experiencing low utilization rates on servers while growing numbers of servers are becoming unwieldy to house and manage? Going through the exercise of calculating the hard benefits will help you answer some of these questions and drive acceptance and adoption of the virtualization project throughout the organization.
Let’s also take a look at each of these virtualization questions in a bit more detail.
Determining Consolidation Ratios
A primary benefit of virtualization is optimizing the use of physical equipment, such as servers, rather than letting them run underutilized much of the time and wasting money. However, it’s best to avoid extremely high consolidation ratios that push physical hosts to near 100% utilization. Rather, data center managers should leave some wiggle room for moving VMs around in the event that there is a planned or unplanned outage. About 65% to 75% utilization is generally a good average to shoot for to make virtualization worthwhile but safe.
Something to consider when calculating maximum consolidation ratios is moving off of small-form-factor blade servers and onto larger chassis, the enclosures for the server blades, to allow for greater consolidation density. An approximate maximum consolidation ratio of a 1U blade server is 6:1, for example, where a maximum consolidation ratio of a 4U chassis is 30:1. So consolidation ratios might be bigger, and savings greater, with larger chassis.
Note, too, that the deployment of emerging applications, such as real-time presence and video streaming services, might require greater network capacity for shuttling communications quickly among VMs. These applications might also lower the consolidation ratio that can be achieved compared to an existing data center environment without these applications in operation.
High-Availability Implications of VMs
The wiggle room afforded by retaining a spare 25% to 35% capacity helps address failover and disaster recovery when determining the appropriate number of VMs to consolidate onto a single physical host. Fortunately, the failure of a given VM on a physical host will not affect the operation of another VM on that host, because each VM has its own isolated set of compute, memory and power resources. So a VM could fail over to another VM on the same physical host or, in the case below, to a VM on a separate physical server.
Physical Redundancy
Virtualization, again, reduces the number of physical hosts in operation by consolidating multiple VMs onto a single physical machine. The greater the consolidation ratio, then, the greater the impact will be if a single physical machine should go offline.
For example, if a single server in the past hosted a single application and served a handful of users, only that one application and those users would be affected if the server went offline. If you put 10 applications and support for hundreds of users on a single physical device, however, and the host becomes unavailable, the failure affects many more applications and users, and has greater impact throughout the organization.
You need to have a disaster recovery plan in place to address that issue. For example, a given physical host might be configured to fail over to one or more other physical hosts. Traditional high-availability configurations often require a 1:1 ratio of primary device to backup device. A virtualized environment, however, could be configured such that a physical server can fail over to one of a set of backup servers, determined, in part, by the load balancing equipment that front ends the physical servers. This allows, then, for a many-to-one backup-to-primary configuration ratio, which increases service availability .
Security in a Virtual Environment
Moving to a virtualized data center means moving to two-tier security. The physical hosts must be secured, as always, and, now, so do the VMs. In unvirtualized data centers, most security is provided by special-purpose physical appliances that protect static resources, such as servers with unchanging IP addresses. In a virtual environment, however, enterprise security teams will need to deploy security tools that account for devices that might change addresses frequently in response to changing workloads.

cont....................

Saturday, August 1, 2009

Windows 7 RTM

The future of Windows is upon us. On July 22, Microsoft released its next major operating system, Windows 7, to manufacturers. The final version of the OS (called GA, for "general availability) will ship on October 22. In the meanwhile, however, I spent a week with the latest version of the code, and, I have to say, Windows 7 continues to look to look solid. It's bolder in terms of new capabilities and user interface design than Apple's soon-to-be-released Snow Leopard, but it shares with that update a firm basis in its predecessor OS, in this case, Vista.

Till you purchase new license you can you Windows 7 RC (ONE YEAR FREE)
The program closes on August 15, 2009.

http://technet.microsoft.com/en-us/windows/dd353205.aspx

Thursday, July 30, 2009

SAP OPPORTUNITIES & Demand

* *ERP * *

Facts about SAP
-> Largest Independent software supplier in the world.
-> Available in 14 languages.
-> 45% of SAP customers world wide are under $300 millions.
-> 8 of the top 10 highest profit US companies use SAP software.
-> More than 92,000 customers in the world have chosen SAP.
-> SAP has 16 millions end users world wide.
-> SAP has a close to 2 million SAP professionals.


WHY SAP FOR YOU?????
Today corporate like WIPRO, SATYAM, INFOSYS, IBM, TCS, ACCENTURE, MAHINDRA etc. require 400-500 + consultants every month.

You could also be a consultant even if you do not have a formal background in computers.

-> SAP offers excellent job opportunities since the market demand for consultants is very very high and there is an acute shortage of consultants.

->You have an opportunity to increase your income 2-3 times as a consultant.
->Domain experience will counted at the time of interviews.
->Without changing your profile you can shift yourself from Non IT to IT field.

CAREER OPENINGS FOR YOU IN SAP
Basically SAP offers 3 openings:-
-> Technical Consultants
-> Functional Consultants
-> New Dimensional Consultant

ERP ECC 6 Technical Modules:
1. ABAP (Programming)
2.BASIS (Installation and Networking)
3. BIW (Business Information Warehousing)
4.BI(Business Intelligence (7.0)

Functional Modules:
1. FI/CO (Finance and Controlling With CIN)
2. HR (Human Resource)
3. PP (Production Planning)
4. MM (Material Management With CIN)
5. SD (Sales and Distribution With CIN)
6. PM (Plant Maintenance)
7. PS (Project System)
8. QM (Quality Management)

New Dimensional :
1. CRM (Customer Relationship Management)
2. SCM (Supply Chain Management)
3. SEM (Strategic Enterprise Management)
4. APO (Advanced Planner Optimizer)
5. EP (Enterprise Portal)
6. SRM (Supplier Relationship Management)
7. XI (Exchange Infrastructure)
8. IS Retail (Industry Specific Retail)

OTHER COURSES :
@ DATA WAREHOUSING
@ ORACLE FINANCIAL
@ ORACLE TECHNICAL
@ TERADATA
@ SAS (STATISTICAL ANALYSIS SYSTEMs)
@ SOFTWARE TESTING

Free SAP Training
http://www.onestopsap.com/

Windows 7 keys

7600.16385.090713-1255_x86fre_client_en-us_Retail_Ultimate

6JQ32-Y9CGY-3Y986-HDQKT-BPFPG
MT39G-9HYXX-J3V3Q-RPXJB-RQ6D7
9JBBV-7Q7P7-CTDB7-KYBKG-X8HHC
MM7DF-G8XWM-J2VRG-4M3C4-GR27X
KBHBX-GP9P3-KH4H4-HKJP4-9VYKQ
BCGX7-P3XWP-PPPCV-Q2H7C-FCGFR
MVBCQ-B3VPW-CT369-VM9TB-YFGBP
C43GM-DWWV8-V6MGY-G834Y-Y8QH3
P72QK-2Y3B8-YDHDV-29DQB-QKWWM
RGQ3V-MCMTC-6HP8R-98CDK-VP3FM
Q3VMJ-TMJ3M-99RF9-CVPJ3-Q7VF3
KGMPT-GQ6XF-DM3VM-HW6PR-DX9G8
GPRG6-H3WBB-WJK6G-XX2C7-QGWQ9
6F4BB-YCB3T-WK763-3P6YJ-BVH24
MVYTY-QP8R7-6G6WG-87MGT-CRH2P
6F4BB-YCB3T-WK763-3P6YJ-BVH24
MVBCQ-B3VPW-CT369-VM9TB-YFGBP
C43GM-DWWV8-V6MGY-G834Y-Y8QH3
GPRG6-H3WBB-WJK6G-XX2C7-QGWQ9
MVYTY-QP8R7-6G6WG-87MGT-CRH2P
P72QK-2Y3B8-YDHDV-29DQB-QKWWM
RFFTV-J6K7W-MHBQJ-XYMMJ-Q8DCH
QXV7B-K78W2-QGPR6-9FWH9-KGMM7
GG4MQ-MGK72-HVXFW-KHCRF-KW6KY
4HJRK-X6Q28-HWRFY-WDYHJ-K8HDH
6JKV2-QPB8H-RQ893-FW7TM-PBJ73
JYDV8-H8VXG-74RPT-6BJPB-X42V4
7XRCQ-RPY28-YY9P8-R6HD8-84GH3
482XP-6J9WR-4JXT3-VBPP6-FQF4M
D9RHV-JG8XC-C77H2-3YF6D-RYRJ9
TQ32R-WFBDM-GFHD2-QGVMH-3P9GC
K98KK-W2RF2-8JHT3-JBKM8-437GC

Microsoft Windows Server 2008 R2 Is Finally Available

Microsoft released the Windows Server 2008 R2 and the System Center Virtual Machine Manager 2008 R2 (SCVMM) to manufacturers. For those who can't wait that long, Microsoft is making the code available to TechNet and MSDN subscribers next week.
Windows Server 2008 R2 and SCVMM 2008 R2 are designed to work in synergy in data centers. SCVMM provides centralized deployment and management of multiple Hyper-V servers, including rival VMWare ESX Servers. In addition, SCVMM can provide performance and resource management, allowing administrators to provision Hyper-V servers based on work loads. Everything that administrators can do with Hyper-V can also be done in SCVMM.
Windows Server 2008 R2 offers live migration of virtual machines, virtual clustering of servers and power management. Microsoft also improved Hyper-V's performance for the RTM code. Redmond is putting lots of resources into virtualization with R2, and the improvements are dramatic. Market dominant VMWare has something to fear. Hyper-V, for example, supports more CPU cores, which means more logical 64-bit processors to handle enterprise workloads. A side effect of clustering provides migration of storage as well. You can move virtual machines between LUNs just like you files on network shares. The advantage of staying with the Microsoft virtualization stack is obvious. Microsoft's long dominance are giving customers that already familiar with the Microsoft server, a good reason to use one vendor to manage host and guest OSes in a virtual data center.
Microsoft is also offering Hyper Server R2 RTM for free. Yes, free. It's capable of clustering virtual machines, which means that you also get live migration for free. Virtualization of any guest OS is free to run on Hyper Server, which can also be managed by SCVMM.
Microsoft has created a new logo certification for power management. Power savings is a big deal in Windows Server 2008 R2. R2, for instance, can boot remotely from a SAN and even communicate with hot bus adapters and let them know to shut down LUNs that don't contain files or are not being used.

How to Create a strong password




A strong password is one that's difficult for others to determine by guessing or by using automated programs. A strong password is an important first step in protecting your personal information. A strong password:

Contains seven to thirteen characters.
Uses three of the following four types of characters:
Uppercase letters (A, B, C).
Lowercase letters (a, b, c).
Numerals (1, 2, 3).
Special characters (` ~ ! @ # $ % ^ & * ( ) _ + - = { } | [ ] \ : " ; ' < > ? , . /) .
Isn't a common word or name, or a close variation on a common word or name.
Your password can't contain:

Spaces or non-English characters.
The portion of your e-mail address before the @ symbol.
Your question or secret answer.
Notes
Passwords are case sensitive (Capable of distinguishing between uppercase [capital] and lowercase [small] letters. For example, A is different from a. If information is case sensitive, it must be typed with the required capitalization.) .
To help secure your personal information, don't write down your password, or share it with anyone else.
If you have more than one e-mail account, use a different password for each account.

Wednesday, July 29, 2009

Sri Lankan Cops

Useful Tips to up-date your general knowledge

1. A single Cop, CANNOT stop you on the road !
(it's prohibited and you are not suppose to Stop either !)

2. A single cop CANNOT seize your driving license !

3. Only a 'traffic control' cop has the authority to request
anything MORE than your NIC when you are behind wheels.

4. A single traffic cop NEVER can press charges against you.
HE MUST HAVE A WITNESS IF DOES SO.

5. That's why you always find 'two' cops together

6. Police is a peace controlling force. NOT AN ARMED FORCE !!!
They are prohibited by LAW to carry anything more than a BATON !
(but due to the prevailing WAR, they are issued Guns by a supreme
court ruling,till the war ENDS)

7. So, if a Cop pulls a gun on you, YOU CAN sue him !!!

8. If a COP claims that you are drunk, you have the FULL right
to ask for a 'balloon test', if they DO NOT HAVE it in
their possession on the time of your request, you can GO.

9. Only Traffic Cops have the RIGHT to stop any moving
vehicle. (that's why you find at least 1 normal cop in
every checkpoint even though they are manned by Army)

10. COPS, CANNOT ENTER YOUR HOME OR WORK
PREMISES without a court Order. You have the
FULLEST right ASK for it, if they try to enter and also
DENY their entrance if you 'feel' like it.

11. A traffic cop CANNOT seize your driving license UNTIL he
fully states the crime you have committed and the relating
penal code violation. If he is unsuccessful in stating
them, you can go free

12. If a traffic cop seizes your license by force and ask you
to come to the police station to collect it. DO NOT GO !
Lodge a complain directly to Police commission or the
'Provincial IGP', YOU can get the cop SACKED for his
misconduct and unruly behaviour.

13. (for girls), If a COP asks for your Identifications and
(if you think he's doing it on purpose to harass you)
you CAN deny his request. He
cannot arrest you ! you have the RIGHT to request for a
Female Police officer.

14. (for Girls) If you are asked to be Body checked, it's your
right to get it done by a female cop. If they don't have
one in present, DENY their action.

THE SOURSOP FRUIT (katu anodha)



THE SOURSOP FRUIT

The Sour Sop or the fruit from the graviola tree is a miraculous natural cancer cell killer

10,000 times stronger than Chemo.
Why are we not aware of this? Its because some big corporation want to make back their money spent on years of research by trying to make a synthetic version of it for sale.

So, since you know it now you can help a friend in need by letting him know or just drink some sour sop juice yourself as prevention from time to time. The taste is not bad after all. It’s completely natural and definitely has no side effects. If you have the space, plant one in your garden.
The other parts of the tree are also useful.

The next time you have a fruit juice, ask for a sour sop.


How many people died in vain while this billion-dollar drug maker concealed the secret of the miraculous Graviola tree?
This tree is low and is called graviola in Brazil, guanabana in Spanish and has the uninspiring name "soursop" in English. The fruit is very large and the subacid sweet white pulp is eaten out of hand or, more commonly, used to make fruit drinks, sherbets and such.

The principal interest in this plant is because of its strong anti-cancer effects. Although it is effective for a number of medical conditions, it is its anti tumor effect that is of most interest. This plant is a proven cancer remedy for cancers of all types.

Besides being a cancer remedy, graviola is a broad spectrum antimicrobial agent for both bacterial and fungal infections, is effective against internal parasites and worms, lowers high blood pressure and is used for depression, stress and nervous disorders.

If there ever was a single example that makes it dramatically clear why the existence of Health Sciences Institute is so vital to Americans like you, it's the incredible story behind the Graviola tree.

The truth is stunningly simple: Deep within the Amazon
Rainforest grows a tree that could literally revolutionize what you, your doctor, and the rest of the world thinks about cancer treatment and chances of survival. The future has never looked more promising.

Research shows that with extracts from this miraculous tree it now may be possible to:
* Attack cancer safely and effectively with an all-natural therapy that does not cause extreme nausea, weight loss and hair loss
* Protect your immune system and avoid deadly infections
* Feel stronger and healthier throughout the course of the treatment
* Boost your energy and improve your outlook on life

The source of this information is just as stunning: It comes from one of America 's largest drug manufacturers, the fruit of over 20 laboratory tests conducted since the 1970's! What those tests revealed was nothing short of mind numbing... Extracts from the tree were shown to:

* Effectively target and kill malignant cells in 12 types of cancer, including colon, breast, prostate, lung and pancreatic cancer..
* The tree compounds proved to be up to 10,000 times stronger in slowing the growth of cancer cells than Adriamycin, a commonly used chemotherapeutic drug!
* What's more, unlike chemotherapy, the compound extracted from the Graviola tree selectivelyhunts
down and kills only cancer cells. It does not harm healthy cells!

The amazing anti-cancer properties of the Graviola tree have been extensively researched--so why haven't you heard anything about it? If Graviola extract is as half as promising as it appears to be--why doesn't every single oncologist at every major hospital insist on using it on all his or her patients?

The spine-chilling answer illustrates just how easily our health--and for many, our very lives(!)--are controlled by money and power.

Graviola--the plant that worked too well

One of America 's biggest billion-dollar drug makers began a search for a cancer cure and their research centered on Graviola, a legendary healing tree from the Amazon Rainforest.

Various parts of the Graviola tree--including the bark, leaves, roots, fruit and fruit-seeds--have been used for centuries by medicine men and native Indians in South America to treat heart disease, asthma, liver problems and arthritis. Going on very little documented scientific evidence, the company poured money and resources into testing the tree's anti-cancerous properties--and were shocked by the results. Graviola proved itself to be a cancer-killing dynamo.

But that's where the Graviola story nearly ended.

The company had one huge problem with the Graviola tree--it's completely natural, and so, under federal law, not patentable. There's no way to make serious profits from it.

It turns out the drug company invested nearly seven years trying to
synthesize two of the Graviola tree's most powerful anti-cancer ingredients. If they could isolate and produce man-made clones of what makes the Graviola so potent, they'd be able to patent it and make their money back. Alas, they hit a brick wall. The original simply could not be replicated. There was no way the company could protect its profits--or even make back the millions it poured into research.

As the dream of huge profits evaporated, their testing on Graviola came to a screeching halt. Even worse, the company shelved the entire project and chose not to publish the findings of its research!

Luckily, however, there was one scientist from the Graviola research team whose conscience wouldn't let him see such atrocity committed. Risking his career, he contacted a company that's dedicated to harvesting medical plants from the Amazon Rainforest and blew the whistle.

Miracle unleashed
When researchers at the Health Sciences Institute were alerted to the news of Graviola, they began tracking the research done on the cancer-killing tree. Evidence of the astounding effectiveness of Graviola--and its shocking cover-up--came in fast and furious....

....The National Cancer Institute performed the first scientific research in 1976. The results showed that Graviola's "leaves and stems were found effective in attacking and destroying malignant cells." Inexplicably, the results were published in an internal report and never released to the public...

...Since 1976, Graviola has proven to be an immensely potent cancer killer in 20 independent laboratory tests, yet no double-blind clinical trials--the typical benchmark mainstream doctors and journals use to judge a
treatment's value--were ever initiated...

....A study published in the Journal of Natural Products, following a recent study conducted at Catholic University of South Korea stated that one chemical in Graviola was found to selectively kill colon cancer cells at "10,000 times the potency of (the commonly used chemotherapy drug) Adriamycin..."

....The most significant part of the Catholic University of South Korea report is that Graviola was shown to selectively target the cancer cells, leaving healthy cells untouched. Unlike chemotherapy, which indiscriminately targets all actively reproducing cells (such as stomach and hair cells), causing the often devastating side effects of nausea and hair loss in cancer patients.

...A study at Purdue University recently found that leaves from the Graviola tree killed cancer cells among six human cell lines and were especially effective against prostate, pancreatic and lung
cancers... Seven years of silence broken--it's finally here!

A limited supply of Graviola extract, grown and harvested by indigenous people in Brazil , is finally available in America .

The full Graviola Story--including where you can get it and how to use it--is included in Beyond Chemotherapy: New Cancer Killers, Safe as Mother's Milk, a Health Sciences Institute FREE special bonus report on natural substances that will effectively revolutionize the fight against cancer.
This crucial report (along with five more FREE reports) is yours ABSOLUTELY FREE with a new membership to the Health Sciences Institute. It's just one example of how absolutely vital each report from the Institute can be to your life and those of your loved ones.

>From breakthrough cancer and heart research and revolutionary Amazon Rainforest herbology to world-leading anti-aging research and nutritional medicine, every monthly Health Sciences Institute Member's Alert puts in your hands today cures the rest of America --including your own doctor(!)--is likely to find out only ten years from now.