Monthly Archives: June 2011

Strong cryptography in PHP

If you are a professional web developer, security is an important aspect of your job. If you are planning to store some critical or sensitive data in your web application, like passwords, credit cards, etc, you should use strong cryptography … Continue reading

Posted in Access Control, Cryptography, Network Security, Security, Tech Tips | Leave a comment

Scottish SME’s increasingly adopting the latest technology.

Nowadays, cloud computing, unified comms and virtualisation are the technologies most in demand but it would seem that the public sector will not be the sector who are most interested in them. According to a recent Pearlfinders Index, which monitors … Continue reading

Posted in Cloud Computing, Enhance Customer Contact, Enterprise Collaboration, Innovation, Internal Systems, Larger Enterprise, Messaging and Collaboration, Operational Efficiency, private cloud, Productivity Up, Costs Down, public cloud, Realtime, Small Business, Take the office with you, Unified Comms, Video Conferencing, Voice, VOIP | Leave a comment

The rise of the Network Plumber

As the worlds journey through the second industrial (Internet) revolution carries on apace, todays businesses face an emerging challenge. Unless your company has its own “in-house” network professionals it is likely that the demands the Internet places on your business, … Continue reading

Posted in Critical Infrastructure, Data, Home Networking, Larger Enterprise, Small Business, Voice, Web Services | Leave a comment

What is a BPDU

In a Local Area Network layer 2 broadcast domain, the Spanning Tree Protocol is a Data Link Layer protocol. It is standardized as IEEE 802.1D. As the name suggests, it creates a spanning tree within a mesh network of connected … Continue reading

Posted in Data, LAN, LAN Switching, Tech Tips | Leave a comment

Could ants power Web3.0 to new heights? OSPF v’s ANTS

One of our engineers having recently completed their latest M.Eng block on the subject of “Natural and Artificial Intelligence“, became aware of advances made in the recent decade towards a new paradigm of network traffic engineering that was being researched. This new … Continue reading

Posted in Data, Futureology, LAN, LAN Routing, Network Management, Tech Tips, WAN | Leave a comment

Rapid Spanning Tree Protocol

The IEEE 802.1D Spanning Tree Protocol was designed to keep a switched or bridged network loop free, with adjustments made to the network topology dynamically. A topology change typically takes 30 seconds, with a port moving from the Blocking state … Continue reading

Posted in Cisco, Data, LAN, LAN Switching, Tech Tips | Leave a comment

Web Security – The Problem

Web security has changed a lot in the past few years. It is no longer good enough to take a desktop antivirus scan engine and scan web content. URL filtering isn’t enough. It is not enough to put HTTP security … Continue reading

Posted in Cloud Computing, Home Networking, Home Security, Larger Enterprise, Network Security, Operational Efficiency, public cloud, Security, Small Business, Small Business Secure, Software (SAAS), Web Security | Leave a comment

Guide to Rural Scottish Broadband Rollout

The availability of easily affordable high speed broadband in Scotland has become widespread in recent years, much as it has across the rest of the UK. However, with around 99 per cent of Scotland’s population connected, it was discovered that … Continue reading

Posted in Data, Home Networking, IP MPLS, Mushroom Networks, Radio Solutions, Small Business, Small Business Connect, WAN, WAN Ethernet, Working From Home, xDSL Technology | Leave a comment

Managed Security Services – Good or Bad?

The buzz word “Managed Security Services” sparks off a religious debate among the staunch believers and critics of this rapidly emerging phenomenon in the world of information security. The supporters vehemently profess that Managed Security Services should be considered as … Continue reading

Posted in Access Control, Cryptography, Infrastructure Security, Innovation, Larger Enterprise, Manage, Network Management, Network Security, Reporting, Security, Small Business, Small Business Secure, Web Security | Leave a comment

Home Security Cameras & How to choose them

If you have ever thought about installing some security cameras around you home there’s no better time than now. Home security cameras are becoming more and more popular since they can help identify thieves, vandals or just who’s at your … Continue reading

Posted in Home Networking, Home Security, Home Security, Monitor, Physical Security, Security, Small Business, Small Business Secure, Video, Video Surveillance | Leave a comment