Loading...

Tech Talk Live Blog

The Blind Shall See – Part 2

Roy Hoover


In my last post about visibility I talked about looking at information from your network gear in order to see what is happening or to better manage your network. In this post, we will look at the implications of breaking encryption on user data passing through your network in order to manage it. Sometimes you […]

The Blind Shall See

Roy Hoover


Visibility – Look at the advertisement for any network monitoring product and you will find visibility as a feature of the product. Dictionary.com defines visibility as “the state or fact of being visible.” They define visible as “that can be seen; perceptible to the eye.” If you are responsible for operating a network into which you have no visibility, stop reading right here […]

Get Out of the Office

Mike Williams


Get away from your desk. Get out of your office. Go see your customers. I remember the days back when I worked in desktop support. I would start the day by checking the ticket system, then grab some tools and replacement parts, and head out the door. Maybe I would come back to the office […]

Setting Up Cisco Meraki Access Points

Frank Olshansky


Meraki access points (APs) have a number of options that can be set, and sometimes it is hard to find the right setting in their documentation. The goal of this post is to walk step-by-step through the process to set up a Meraki wireless network. First, you will need to set up the APs is […]

Link Layer Discovery Protocol and Hostnames

Roy Hoover


Link Layer Discovery Protocol (LLDP) is a protocol designed to be used by network devices for advertising their identity, capabilities, and neighbors. This is an open standard version of vendor specific protocols like Cisco Discovery Protocol (CDP).  These protocols are very useful when deploying voice over internet protocol (VOIP) telephones. Typically, a network that includes VOIP telephones […]

All About Trust

Mike Williams


Everyone in IT is consigned a certain level of trust. Some more than others. “Snowden” opened over the weekend. This movie is the account of Edward Snowden, the cybersecurity worker who copied and disclosed classified information acquired during his work as a U.S. government contractor. Among the information released were details of government surveillance programs […]

Quality of Service – Part 2 – Differentiated Services

Frank Olshansky


This is the second of several posts that will address Quality of Service. To read the first post in this series, click on Part 1.​ In the last blog post discussing Quality of Service (QoS), I stated that there are three main parts of the Differentiated Services (DiffServ) model, which are classification and marking, policing, […]

EPIC FAIL

Roy Hoover


The E-Rate program was created as a result of the Telecommunications Act of 1996 and, according to Wikipedia, has provided discounts on services to over 100,000 schools that have participated in this program. With a 2.25 billion dollar (plus inflation) annual funding cap, this program has provided significant funding to schools over the last 20 […]

Apple, the FBI, and AUPs

Mike Williams


The battle between Apple and the FBI has been plastered all over the news and social media these past few days. Following the shootings in San Bernardino, CA, the FBI retrieved an iPhone belonging to one of the shooters. They believe there may be information on that phone which could lead to other co-conspirators. However, […]

Quality of Service

Frank Olshansky


Quality of Service, also known as QoS, is a very important topic to know and understand when working with modern networks. Networks are generally designed so that all traffic is treated in the same manner. However, this model does not work when voice, video, or other real-time traffic share the same network as data, because […]

CONTACT

Tech Talk Live is the only conference of its kind in the region specifically designed for IT pros in education.


techtalklive@iu13.org
1020 New Holland Avenue, Lancaster, PA 17601

(717) 606-1770