Hot Topics
Competing Priorities – Scope Of Work -

Whether we like it or not, many of our days have been or will be spent working on projects that someone else scoped. 

3 hours ago | 0
The Evolution of the Smartphone -

Smartphones have been around in one form or another for over 20 years, and the technology has evolved tremendously. 

2 days ago | 0
Apple Watch and ApplePay redefining mobile payments -

Mobile payments have existed for some time now. MasterCard began issuing wireless PayPass cards in 2003. NFC (Near-Field. 

3 days ago | 0

Competing Priorities – Scope Of Work

By Aamir Lakhani | On Thu, May 28th, 2015 - No Comments »
scope creep

Whether we like it or not, many of our days have been or will be spent working on projects that someone else scoped and built out. Regularly it becomes obvious there is a sizable discrepancy between the plan and the reality. It is far easier to complain or wonder who fouled up; instead people should be tracking down the issue and making efforts to learn from the mistake. My buddy Travis. 

The Evolution of the Smartphone

By Blog | On Tue, May 26th, 2015 - No Comments »
evol of smartphone

Smartphones have been around in one form or another for over 20 years, and the technology has evolved tremendously in that time. The rapid evolution of smartphone technology in part comes from the worldwide demand for better, faster and more powerful phones. But before we can know where the future of smartphones is going, we have to understand their past. Here’s a look at the evolution. 

Apple Watch and ApplePay redefining mobile payments

By Aamir Lakhani | On Mon, May 25th, 2015 - No Comments »
appe_pay_iwatch

Mobile payments have existed for some time now. MasterCard began issuing wireless PayPass cards in 2003. NFC (Near-Field Communications), which provides tap and pay operations to consumers, has been used in many different countries around the globe for years. The biggest historical issue with wireless payment systems is that they have been extremely fragmented in the past, with few globally. 

Four Simple Ways to Protect Your PC from Hackers

By Blog | On Fri, May 22nd, 2015 - No Comments »
Serching for SA

In today’s world, computer threats are everywhere, hidden in programs that you download and the sites you visit, and oftentimes lurking in the background on your PC without your knowledge. If a hacker is able to infiltrate your computer’s file system or your internet network, they could then gain access to other devices on the network and/or crucial personal information, including. 

Installing Firefox on Kali Linux

firefox-logo

Kali Linux ships with the IceWeasel, which is the default Web browser. IceWeasel is a rebranded version of FireFox by the Debian Foundation. This was done so they could distribute the software without being bound by trademark requirements from The Mozilla Foundation. The Debian gurus didn’t like Mozilla’s license agreement and decided to use IceWeasel instead of Firefox. The story is. 

Comparing AnyConnect 3.1 to 4.0 and New AnyConnect 4.1

By Joey Muniz | On Wed, May 20th, 2015 - No Comments »

There has been a lot of questions around the new AnyConnect licensing introduced with the AnyConnect 4.0 release. In summary, the older version of AnyConnect had many license options (TOO MANY!). So Cisco has consolidated these into two options, which are Plus and Apex. Below is a comparison of how the AnyConnect 3.1 compares to AnyConnect 4.0. Hope it helps! Continue reading →  

Mad Max: Fury Road

By Aamir Lakhani | On Mon, May 18th, 2015 - No Comments »
Mad Max Fury Road

Warning: The following contains spoilers and major plot points for Mad Max: Fury Road. Mad Max: Fury Road seems to be getting some excellent reviews. I get why people would like it. In a time where big summer movies are over-the-top, ridiculous CGI slugfests, Mad Max provides logical and pyrotechnic effects that provide a welcome change. The post-apocalyptic future run by an evil despot. 

Is the cat is going up or down stairs?

By Aamir Lakhani | On Sun, May 17th, 2015 - No Comments »
cat

  The world seems to be divided. Is that cat going upstairs or downstairs? The cat image was first posted to 9Gag.com. It then hurtled into the world, with some believing that, quite clearly, the cat was descending and others thinking these people were three legs short of a tabby. Experts have weighed their opinion, providing feedback based on shadows, the ceiling (or floor), and the. 

2015 Verizon Breach Investigation Report (VBRI) – thoughts from a hacker

DBIR_snapshot

  The latest 2015 Verizon Breach Investigation Report (VBIR) is now out and can be downloaded HERE. Joseph Muniz, The Security Blogger wrote a great, in-depth, detailed analysis around the report. His original blog post can be found here.  For those that have not seen these reports, they survey a number of customers and gather information about different types of breaches. It is. 

Lock All Layers In Visio Workbook – VBA

By Aamir Lakhani | On Tue, May 12th, 2015 - Comments Off on Lock All Layers In Visio Workbook – VBA
Microsoft-Visio-logo

My buddy Travis Newshott over a TechFud posted an excellent article on Visio, an essential tool for anyone in networking. Everyone who has worked on Visio has likely encountered a multi-page workbook with each page having multiple layers. Layers are one of the more powerful concepts of Visio(something I will write about in another blog post), but they introduce more work load at times. I.