I recently had a failure of an HDD and Power Supply on an aged Nimble Storage CS260G Storage Array [12x 3TB HDD, 4x 600GB SSD], 10Gb SFP+. This system is outside of the warranty and now at the end of life by Nimble, now part of HPE. So that has me replacing parts on my […]
Author: jermsmit
Office 365: Increase Mailbox Size
Like most things, there is a predefined default, and at some point in time, there will be a need to deviate from this. Office 365 Admins should have an understanding of those and setup procedures to increase the size for individuals or the organization when the need arises To increase the Office 365 Mailbox size […]
International Men’s Day 2019
International Men’s Day is an opportunity to share positive contributions and raise awareness for issues related to men around the world. We don’t like to talk about it much, but suicide is one of the leading causes of death, disease, and injury among men globally – in fact (per the article) suicide is the top […]
Cross-Origin Resource Sharing (CORS)
Cross-origin resource sharing is a mechanism that allows restricted resources on a web page to be requested from another domain outside the domain from which the first resource was served. A web page may freely embed cross-origin images, stylesheets, scripts, iframes, and videos Cross-Origin Resource Sharing (CORS) is a mechanism that uses additional HTTP headers to tell […]
What is CoreXL & SecureXL
CoreXL: Technology that makes use of multiple processor cores SecureXL: Connection acceleration technology (both throughput and connection establishment) SecureXL is an acceleration solution that maximizes the performance of the Checkpoint Firewall. When SecureXL is enabled on a Security Gateway, some CPU intensive operations are processed by virtualized software instead of the Firewall kernel. This is […]
What you should know about ‘Public WiFi’
You should know that open, unsecured public WiFi networks can be dangerous. Criminals can set up routers to provide WiFi service in public places that are labeled as “Free”. Once you connect, they can intercept, capture, and divert all your communications. What this means is that criminals can access everything from your logins and company […]