Tuesday, 29 December 2015

Apple's iPhones and iPads will work better with Cisco enterprise networks

Apple and Cisco have, through a joint statement, announced a partnership which will see Apple’s apps and devices become more productive in enterprise networks.

The goal of the partnership is to optimize Cisco’s networks for iOS devices and apps and integrate the iPhone with Cisco enterprise environments. That will create a "fast lane" for iOS business users, Apple has said in a press release.

Cisco will provide services specially optimized for iOS devices across mobile, cloud, and on premises-based collaboration tools such as Cisco Spark, Cisco Telepresence and Cisco WebEx.

"iOS is the world’s best mobile platform, and nearly every Fortune 500 and Global 500 company today has put iOS at the centre of their mobile strategy", said Tim Cook, Apple’s CEO. "iPhone and iPad have become essential tools for the modern workforce and are changing the way work gets done. Together with Cisco, we believe we can give businesses the tools to maximize the potential of iOS and help employees become even more productive using the devices they already love".

Apple and Cisco are also working together to make iPhone an even better business collaboration tool in Cisco voice and video environments, with the goal of providing employees with a seamless experience between iPhone and their desk phone.

"Ninety-five percent of companies in the Fortune 500 count on Cisco Collaboration and Cisco networks to help their teams be more productive", said Cisco Executive Chairman John Chambers. "Through this engineering and go-to-market partnership, we’re offering our joint customers the ability to seamlessly extend that awesome Cisco environment to their favorite iOS devices. Together, we’re going to help teams achieve higher levels of productivity and effectiveness".
Certkingdom 20% Discount Promotion Coupon Code: 45K2D47FW4

Thursday, 10 December 2015

210-065 Implementing Cisco Video Network Devices v1.0


QUESTION 1
Refer to the exhibit.



Which configuration item shown in the exhibit should be used to assign the internal and external video communication server address for this group of users?

A. User Settings > Video Address pattern
B. Administrative Tools > User Settings
C. Configuration Template > Edit Template
D. User Import > Configuration

Answer: C


QUESTION 2
Which three features are supported by Cisco TMSPE? (Choose three.)

A. Simplified provisioning
B. LDAP user import
C. Scheduling via Microsoft Outlook
D. FindMe
E. Jabber for Windows
F. Automatic endpoint upgrades

Answer: A,B,D


QUESTION 3
Which four features are provided by Cisco TelePresence Management Suite? (Choose four.)

A. Scheduling of video conference calls
B. Built-in-bridge functionality for multiparty video conferences
C. SIP-H.323 protocol interworking
D. Centralized management of conference resources
E. SMTP email event notification
F. Endpoint configuration backup and restore
G. Cisco TelePresence endpoint automated redundancy
H. Automated resource optimization

Answer: A,D,E,F


QUESTION 4
Management wants to modify Cisco TMS to allow users to configure the call behavior with their associated devices and dial from a single ID. Which feature needs to be enabled and configured?

A. Smart Scheduler
B. Low-touch Provisioning
C. FindMe
D. CMR Provisioning

Answer: C


QUESTION 5
A network engineer wants to automate the monitoring of Cisco TelePresence TX systems. Which step should the engineer take first?

A. Configure Cisco TMS on the codec.
B. Configure Medianet on the codec.
C. Configure NTP on the codec.
D. Configure Multiway on the codec.
E. Configure SNMP on the codec.

Answer: E


Friday, 4 December 2015

Cisco SDN user plans OpenStack integration

Cloud provider merging ACI's network fabric with open source storage and compute framework

At last count, only 15% of the now 2,000 combined customers for Cisco System’s Application Centric Infrastructure (ACI) and VMware’s NSX SDN products were using them in production mode.

One such Cisco customer, cloud provider Key Information Systems of Agoura Hills, CA, is using ACI to provide cloud-enabled data center services to organizations in Southern California. KeyInfo is looking for ACI to provide it with multi-tenancy security, automated application-based network provisioning, and scalability of virtualized and non-virtualized workloads.

Over time, KeyInfo will combine ACI with an OpenStack managed hosting offering to provide an application policy-based networking component to OpenStack’s compute and storage-centric cloud fabric, says Clayton Weise, director of cloud services at KeyInfo. But for now, ACI and Cisco’s Nexus 9000 switches are replacing an aged Catalyst 6500 infrastructure with a higher performance fabric, and setting the foundation for new network-as-a-service offerings from the KeyInfo cloud.

“We did some fairly limited deployments of it early on,” Weise said, describing KeyInfo’s current ACI deployment as 12 leaf switches, four spines and three APIC controllers clustered together. “We were using it to replace Cat 6500 chassis. It was a migration in terms of moving the cabling and everything over. The next phase for us is we’re really going to use some of the functionality more heavily in our environment.”

That next phase is a bit more of a transition, Weise says, because KeyInfo also has an existing investment of Cisco Nexus 5000s to be migrated to the Nexus 9000s. It will take a bit more time because KeyInfo has to do a lot more design work to take advantage of more ACI functionality, he says.

After evaluating Cisco ACI, Juniper Networks’ Contrail and Arista Networks’ Software Defined Cloud Networking, KeyInfo selected ACI because of Cisco’s incumbency with the cloud provider, but also to instill some switch-based policy management of a hybrid, multivendor environment of server colocation, virtual infrastructure and legacy IBM AS/400 and AIX systems that need to participate in VXLANs.

“Having that type of encapsulation and de-encapsulation of what they’re doing in the VXLAN, doing that at the switch made a lot more sense for us,” Weise says. “It allowed us to merge those environments without a whole lot of difficulty.”

KeyInfo is also looking at extending the ACI fabric out across its DWDM optical network and into the customer premises. So longer term, ACI will be offered as a service from KeyInfo in addition to supporting the cloud provider’s own infrastructure.

And that service will ostensibly be application policy-based networking integrated with OpenStack’s compute and storage capabilities.

“OpenStack is pretty modular when it comes to compute and storage,” Weise says. “But when it comes to networking it’s a little bit more monolithic. ACI is the direction we’re going to go because it gives us the best flexibility.”

It will also ease implementation of firewalls and other security services that go beyond OpenStack’s “namespaces on a Linux box” security, he says.

“For a lot of our client base, that is totally unacceptable,” Weise says. "Plus, some might have specific reasons for why they want to use Palo Alto Networks (firewalls) or (Cisco) ASA with intrusion protection. That kind of capability doesn’t come easy with the way OpenStack is now so we have to use ACI to add network security-as-a-service on top of the services that are already there.”

Weise says a mix of different technologies will be used in conjunction with OpenStack group-based policy and ACI group-based policy to meet the “stringent requirements” of KeyInfo’s customers.

KeyInfo is not using the OpFlex policy protocol, developed by Cisco, Microsoft, IBM, Citrix and Sungard, to push group-based policies out to the infrastructure, though it is an option, Weise says. Another is middleware from a third-party vendor to do that through ACI API calls, he says.

“We’re trying to stay away from being too much of a middleman” for translating and instantiating policies, Weise says.

The biggest challenge in implementing ACI was leaving the old CLI routines behind when defining, configuring and administering group-based policy, Weise says. The biggest benefit is the automation of configuring end point groups vs. manually touching each device in that group.

Sunday, 29 November 2015

210-060 Implementing Cisco Collaboration Devices (CICD)


QUESTION 1
Which two services define cloud networks? (Choose two.)

A. Infrastructure as a Service
B. Platform as a Service
C. Security as a Service
D. Compute as a Service
E. Tenancy as a Service

Answer: A,B

Explanation:


QUESTION 2
In which two situations should you use out-of-band management? (Choose two.)

A. when a network device fails to forward packets
B. when you require ROMMON access
C. when management applications need concurrent access to the device
D. when you require administrator access from multiple locations
E. when the control plane fails to respond

Answer: A,B

Explanation:


QUESTION 3
In which three ways does the TACACS protocol differ from RADIUS? (Choose three.)

A. TACACS uses TCP to communicate with the NAS.
B. TACACS can encrypt the entire packet that is sent to the NAS.
C. TACACS supports per-command authorization.
D. TACACS authenticates and authorizes simultaneously, causing fewer packets to be transmitted.
E. TACACS uses UDP to communicate with the NAS.
F. TACACS encrypts only the password field in an authentication packet.

Answer: A,B,C

Explanation:


QUESTION 4
According to Cisco best practices, which three protocols should the default ACL allow on an
access port to enable wired BYOD devices to supply valid credentials and connect to the network?
(Choose three.)

A. BOOTP
B. TFTP
C. DNS
D. MAB
E. HTTP
F. 802.1x

Answer: A,B,C

Explanation:


QUESTION 5
Which two next-generation encryption algorithms does Cisco recommend? (Choose two.)

A. AES
B. 3DES
C. DES
D. MD5
E. DH-1024
F. SHA-384

Answer: A,F

Explanation:

Wednesday, 25 November 2015

200-601 IMINS2 Managing Industrial Networks for Manufacturing with Cisco Technologies

200-601 IMINS2
Managing Industrial Networks for Manufacturing with Cisco Technologies


Exam Number 200-601 IMINS2
Associated Certifications CCNA Industrial
Duration 90 Minutes (65 - 75 questions)

This exam tests concepts and technology commonly found in the automated manufacturing environment. This exam tests candidates on the Common Industrial Protocol (CIP) and ProfiNET industrial protocols and the underlying support network infrastructure design to maximize efficiency within Industrial Ethernet.

Exam Description
The exam Managing Industrial Networks for Manufacturing with Cisco Technologies (CCNA IMINS2) certification exam (200-601) is a 90 minute, 65 – 75 question assessment. This exam tests concepts and technology commonly found in the automated manufacturing environment. This exam tests candidates on the Common Industrial Protocol (CIP) and ProfiNET industrial protocols and the underlying support network infrastructure design to maximize efficiency within Industrial Ethernet.

The following topics are general guidelines for the content likely to be included on the exam. However, other related topics may also appear on any specific delivery of the exam. In order to better reflect the contents of the exam and for clarity purposes, the guidelines below may change at any time without notice.

1.0 IP Networking 20%
1.1 Describe the difference between enterprise environments and industrial environments
1.2 Describe the components for making the data flow highly available and predictable in an industrial environment (QoS, IP addressing, protocol, and hardware resiliency)
1.3 Interpret and diagnose problems that are related to QoS
1.4 Describe the differences between redundancy and resiliency requirements / approaches between the Enterprise and the plant floor
1.5 Differentiate the capabilities of switch types
1.6 Describe the life cycle of a multicast group
1.7 Describe and configure the operation and use cases for NAT
1.8 Describe and configure the operation and use cases for static routing
1.9 Describe and configure VLAN trunking to a virtual switch
1.10 Describe and configure Layer 2 resiliency protocols (Spanning Tree, REP, Flex Links, and Etherchannels)
1.11 Configure switch ports ( macros, threshold alarms)

2.0 Common Industrial Protocol (CIP) Knowledge and Configuration 19%
2.1 Explain the CIP connection establishment process
2.2 Explain producer/consumer models and implicit/explicit message models
2.3 Recognize communication abilities and capacities in different hardware/hardware generations (revisions)
2.4 Identify and describe the technologies that enable CIP Motion and CIP Safety
2.5 Identify the applicability, limitations, and components of a DLR implementation
2.6 Implement multicast features for CIP within a LAN
2.7 Optimize RPI on a CIP connection given a set of parameters
2.8 Enable and configure IEEE 1588 PTP at the system level
2.9 Configure the Stratix using the Add On Profile (AOP) in Studio 5000

3.0 ProfiNET Knowledge and Configuration 19%
3.1 Describe the differences in ProfiNET support between Cisco catalyst and Cisco Industrial Ethernet (IE) switches
3.1.a Support for VLAN 0
3.1.b Support for ProfiNET LLDP
3.1.c Support for GSDs (integration into SIMATIC STEP 7)

3.2 Describe the operation and purpose of ProfiSAFE
3.3 Describe the three basic ProfiNET devices and conformanceclasses
3.4 Describe the ProfiNET application classes and communication channels
3.5 Describe DHCP and how it can be used for IP addressing of devices and configuration pushes
3.6 Describe ring network requirements for ProfiNET
3.7 Enable ProfiNET on the switch
3.8 Enable Layer 2 QoS to ensure ProfiNET is prioritized
3.9 Integrate the Cisco Industrial Ethernet Switch in SIMATIC STEP 7
3.10 Configure and monitor ProfiNET alarm profiles on IE switches

4.0 Security 12%
4.1 Describe the defense in-depth approach to securing the industrial zone
4.2 Identify how a security component (hardware/software) applies to a network device to meet the network security definition of defense in depth
4.3 Describe network device hardening
4.4 Describe the concept and mechanisms of implementing logical segmentation
4.5 Identify possible options to control traffic between zones (ACLs, firewalls, VLANs)

5.0 Wireless 10%
5.1 Describe the differences between 802.11a/b/g/n/ac
5.2 Describe the components that you need to build multiple wireless networks on a single access point
5.3 Describe the difference between autonomous and controller-based access points and wireless workgroup bridges
5.4 Demonstrate a typical switchport configuration for autonomous and controller-based access points
5.5 Describe the limitations of using a workgroup bridge with a control communication

6.0 Troubleshooting 20%
6.1 Troubleshoot advanced Layer 1 problems such as mechanical deterioration, electromagnetic noise issues, and infrastructure mismatches
6.2 Troubleshoot VLAN trunking
6.3 Troubleshoot an error disabled port
6.4 Troubleshoot basic spanning tree port state and root priority problems
6.5 Troubleshoot Layer 3 problems by inspecting route tables and NAT tables
6.6 Troubleshoot Layer 3 problems in a VRF-lite enabled environment
6.7 Demonstrate the ability to find the location of a device within a multi-switch network given an IP address
6.8 Identify methods for troubleshooting a communication problem in a CIP environment
6.9 Troubleshoot CIP using an Ethernet/IP browse tool, command line, and a web browser
6.10 Troubleshoot device communications performance
6.11 Identify the source of cable and device faults in a DLR
6.12 Identify methods for troubleshooting a communication problem in a ProfiNET environment
6.13 Troubleshoot ProfiNET using SIMATIC STEP 7 to view network topology, use the switch command line


Tuesday, 3 November 2015

5 dead operating systems, and what their ghosts can tell us

We conduct a séance of sorts to call forth the souls of operating systems past—not so we can gaze upon their ghastly interfaces, but to learn from their tragic demises.

Tremble, mortals! Halloween is upon us. Ghosts, ghouls, and other undesirable creatures are prepared to slink out of their domains and into ours—it’s said that even the dead can rise on Halloween.

In that spirit, let us light some candles, cover the mirrors, and conduct a séance of sorts to call forth the souls of operating systems past. Not so we can gaze upon their ghastly interfaces, but to see if we can learn anything from their digital carcasses and signs of a life well-lived—or not. Who knows, perhaps they bring secrets from beyond the grave.

Windows XP
Windows XP proved to be a hit since its inception. Sure, it took Service Pack 2 to create the operating system we call XP today, but at the operating system’s launch in 2001 the basics were already there. It’s a good thing too, as Windows XP was destined to live long past its shelf life.

Windows XP’s extended life started with Microsoft’s Sisyphean effort on project ‘Longhorn,’ which included ambitious hopes for new features. As due date after due date slipped for Longhorn, more people became invested in the familiar and near-universal XP, and to disdain change of any kind.

When Longhorn finally emerged from its 5.5 year development in 2007 as Windows Vista, users were shocked and appalled by Microsoft's proposed XP replacement. It took another two years of development and the release of Windows 7 before Windows XP would finally begin to lose ground. Yet it was another four to five years (depending on whom you ask) before Windows 7 would replace XP as the most widely used operating system in the world.

Today, four iterations of Windows after XP, the 14 year-old OS still claims more than 12 percent of online PC usage worldwide, according to Net Applications. This is despite the fact that Microsoft ceased delivering security updates for XP in April 2014—a year and a half ago.

Lesson learned: Don’t let your software live on too long, or it will grow up to be a dangerous zombie.

Windows RT

When Microsoft announced Windows RT, originally known as Windows on ARM, people were excited about the possibility. Finally, the energy-efficient ARM processor architecture—ubiquitous on mobile devices—would earn its own version of Windows.

What became Windows RT, however, was a terrible joke of an OS. Like Windows 8, RT offered a dual-identity desktop interface and modern UI. The desktop was hobbled, because it couldn’t run any other traditional Windows software—just Internet Explorer and Microsoft Office. Windows RT users didn’t have much to do on the touch-friendly side of Windows either, due to Microsoft’s poor efforts to convince developers to build Modern apps for the Windows Store.

Toward the end of its life, RT was no better than a glorified web browser with a smattering of ho-hum apps. Meanwhile, Intel’s Atom chips quickly closed the gap with ARM’s energy efficiency, leaving little reason to opt for Windows on ARM.

Microsoft was never clear enough on what it wanted to do with Windows RT. The result was a poorly thought-out ecosystem that led to death by indifference. Windows RT tablets aren’t being upgraded to Windows 10, and even Microsoft’s own budget Surface line ditched Windows RT for Windows proper in its third iteration.

Lesson learned: Ghosts of Windows RT linger on in Windows 10’s universal apps and Windows Phone compatibility, but Windows RT was nothing short of a disaster with consumers—understandably so, given its radical new interface and limited software capabilities. Even if you’re trying to move an ecosystem forward, don’t throw out the baby with the bathwater.

Mac OS in all its graphical interface glory.
One of Apple’s founding principles is that PCs—and technology in general—should be a delightful, even magical, experience. That vision came to the fore with the original Macintosh operating system. The first Mac OS was a revelation that popularized the visual PC interface and mouse navigation for home users.

The downside, however, is that a lot of what made Mac OS so magical required technological trickery and clever solutions to help a constrained system perform beyond what was expected. Original Macintosh users were forced to constantly swap out disks constantly because of RAM restrictions.

It was a pain to do—sometimes literally—but many people didn’t mind because the user experience on the screen was simply so much better than anything else out there.

os2box
During the early days of computing, IBM was a dominating force with its line of personal computers. When the company began producing the operating system OS/2 with Microsoft, the plan was to use the new OS to push even more sales of IBM hardware. That worked for a while, but the end of the line for OS/2 took shape once Microsoft produced Windows 3.0. After that, Microsoft ceased co-development of OS/2 to focus on Windows, and IBM was chasing Microsoft ever after. Pundits still argue over whether early Windows or OS/2 was better.

Regardless, OS/2’s undoing was that Microsoft outflanked IBM at every turn.
Microsoft bundled Windows with all kinds of hardware, as it does today, while OS/2 was sold separately and designed to push IBM machines. That approach just didn’t work when faced with the juggernaut that was Microsoft—it also didn’t help that Microsoft cheated. Once Windows 95 came out, OS/2 was all but done. IBM’s operating system faded out by 2000, but just like with Windows XP, you can probably find the odd ATM or small business inventory system still running on OS/2.

Lesson learned: Even juggernauts can fall. Adapt—which is exactly what Microsoft’s trying to do with Windows 8 and 10—or die.
The ghosts of Linux past

In 2015, we officially bid goodbye to Mandriva, a once-popular Linux distribution. This version of Linux started out life as Mandrake until the company running the distro merged with Conectiva in 2005 to become Mandriva. Many veteran Linux users cut their teeth on Mandrake or Mandriva, including PCWorld’s own Linux watcher, Chris Hoffman.

Get it? A penguin skeleton?
Mandriva lost its spot as the “easy Linux” distro after Canonical’s Ubuntu appeared in 2004. Seven years later, development ceased. Mandriva is just one of the many Linux distributions that have faded into oblivion—CrunchBang, supported by a single developer, is another one we recently covered.

Linux may be a force in the server world, but it has never succeeded at winning over masses of desktop users. Its openness encourages many developers to create their own Linux distributions and then fight with the hundreds of other distros for a slice of a tiny user base. Unsurprisingly, there’s a healthy amount of churn among distributions, even the popular ones.

Lesson learned: Like your Linux distro, but don’t fall in love. You may wind up leaving the party sooner than you think.

That’s the end of our ghoulish walk through the graves of operating systems past. Now we close the PC crypt for yet another year…until the ghouls of dead PCs past rise again.


Monday, 31 August 2015

How emerging technology is changing K-12 classrooms

While students in K-12 classrooms are building robots in their makerspaces, IT professionals are building the infrastructure needed to keep up with the latest technologies in the 21st century classroom.

Though implementing one-to-one initiatives such as having a laptop for every student continues to be a primary focus for many school systems across the country, those who have already a 1:1 program are discovering new ways to shape student learning. Impressive technology trends are transforming traditional classrooms for students at every grade level.

Robotics, makerspaces and wearables will be a few of the trends that join the ranks alongside teachers and students in the fall. “Research shows that this group of kids learns very differently from past generations,” says GB Cazes, vice president at Cyber Innovation Center recognized, Cazes says.

“The use of cyber as a way to provide a context for the content is rapidly growing. We are putting them on a cyber-highway and providing them with on and off ramps,” says Cazes, who added that this is especially true in science and math. One exciting new tool, the Boe Bot robot, allows students to build a robot with a microcontroller. “There are no textbooks for the Boe Bot. The Boe Bot is the textbook, so you provide teachers with all they need and the students are learning programming and coding as they build,” Cazes says.

Some schools may have the ability to provide a Boe Bot for every classroom, but for those who can’t, makerspaces – high-end craft rooms with access to 3D printers – are a trend that make technology available for students to learn and create all on their own.

Jason Valade, customer success manager at TechSmith described the makerspace as “a place where students need very little direction. It’s trying to give students space to be creative and let them explore and develop.”

Eileen Lento, Intel Education’s director of strategy and marketing says, “Microscopes and databased software,” are new technologies that will give 21st century learners more authentic educational experiences.

“There are holographic technologies, coding is becoming a valuable skillset in the world we live in. There are goggles for virtual reality and wearables for physical education classes that are more usable and kids can analyze their own data more easily,” Lento says.
Improvements have to happen at both ends

Changes need to happen at both the front end and the back end, Lento says. “We don’t want devices to be expensive typewriters.” The tools need to do more than exist, which means there needs to be matching improvements when it comes to infrastructure.

“The role of the CIO as enabler comes into play,” says Lento. “The job has grown from supporting services to enabling learning. They need to be asking, ‘How do I set up the infrastructure?’ and ‘How do I protect the students’ privacy?’”

The role of the IT professionals has become even more demanding because, “There needs to be innovations on the backend from servers to storage. All of the edge devices on the front-end need to exist within a secured fabric,” says Lento.

The role of the IT professional has also grown to include mediator, and even educator. Procuring the funds to build the infrastructure, especially in public schools, can be a formidable obstacle, and Valade recommends a multi-tiered approach. It’s important to consider where the desire for technology and devices falls in line with the greater priorities of a school’s mission.

Moving too fast might slow things down

Knowing how to effectively communicate the value of investing in technology will help a school system develop a comprehensive plan for continued success. Schools need to think about if they want to delay tech improvements for a year or two, or, as Valade cautions, “get devices in hands now but end up with a poor experience.”

Even if finding funding for technology isn’t an issue, the physical structure of the school can create complications. Many schools were built in the 1940s–1970s, and they were not designed to run new Cat 5 cables.

From the students to parents, school boards, teachers, administrations and IT professionals, there are a lot of players to consider, and a lot of stakeholders who want to see the success that educational technologies are promising.

It’s important not to be driven by ego in the race to bring more technology into the classroom. While all of these tools and gadgets are intended to meet today’s students where they are and prepare them for the work force, rushing in too quickly can backfire.

“Technology is leaping and bounding itself so fast. How do you keep up? How do you plan for replacement costs?,” Cazes says, It’s the nature of the beast to get excited, so it’s easy to raise more for the initial investment, but how do you get support for strategically sustaining and replacing the technology?”

Investing in technology is not a single line item in a budget. IT professionals need to communicate with school boards and the community to change the mindsets of people who remember the classroom as one thing and are challenged by conceiving the ways in which technology is reshaping schools.

Lento agrees that schools need to “start at a focus of improved student outcomes. What does student success look like? Most parents are still in the space of, ‘I went to K-12 and this is what it looked like, and it worked.’”

Consider the integration of technology not as a race but a journey. “Through the journey, the leadership team needs to evaluate what they said student success will look like, how they said they would measure it, and then look at the data they are using to measure it,” Lento says.

Tuesday, 25 August 2015

Top 10 technology schools

Interested in going to one of the best colleges or universities to study technology? Here are the top 10 schools known for their computer science and engineering programs.

Top technology schools
Every year, Money releases its rankings of every college and university in the U.S., and not surprisingly, a number of those top schools are leaders in the tech space. Here are the top 10 technology schools, according to Money's most recent survey of the best colleges in America.

Stanford University
First on the list for not only technology colleges, but all colleges, Stanford University has an impressive 96 percent graduation rate. The average price for a degree is $178,731 and students earn, on average, $64,400 per year upon graduation. Stanford's global engineering program allows its 4,850 students to travel around the globe while studying engineering. There are nine departments in the engineering program: aeronautics and astronautics, bioengineering, chemical engineering, civil and environmental engineering, computer science, electrical engineering, management science and engineering, materials science and engineering, and mechanical engineering.

Massachusetts Institute of Technology
The Massachusetts Institute of Technology, located in Cambridge, Mass., is the second best technology school in the country, with a 93 percent graduation rate. The average net price of a degree comes in at a $166,855, but students can expect an average starting salary of $72,500 per year after graduating. As one of the top engineering schools, it's ranked number 1 for chemical, aerospace/aeronautical, computer and electrical engineering. The top employers for the 57 percent of graduates that enter the workforce immediately include companies like Google, Amazon, Goldman Sachs and ExxonMobil. Another 32 percent of students, however, go on to pursue a higher degree.

California Institute of Technology
Located in Pasadena, Calif., the California Institute of Technology has a graduation rate of 93 percent. The average cost of a degree is $186,122, and students earn an average starting salary of $72,300. CalTech, as it's often called, has departments in aerospace, applied physics and materials studies, computing and mathematical sciences, electrical engineering, environmental science and engineering, mechanical and civil engineering, and medical engineering. The prestigious college is also home to 31 recipients of the Nobel Peace Prize.

Harvey Mudd College
Harvey Mudd College in Claremont, Calif. has a strong technology program, putting it at number 4 on the list of top technology schools. The cost of tuition is also one of the highest on this list, at $196,551 for a degree. Graduates of Harvey Mudd earn an average of $76,400 early on in their careers and the graduation rate is 91 percent. The engineering program at Harvey Mudd College focuses on helping students apply their skills to real world situations. Students can also get professional experience and help solve design problems outside of the classroom through an engineering clinic.

Harvard University
Harvard University, located in Cambridge, Mass., technically ties with Harvey Mudd for top technology schools, and top overall colleges. The graduation rate is 97 percent and the average price of a degree is $187, 763 while graduates earn an average annual salary of $60,000 when starting their careers. At Harvard's Jon A. Paulson School of Engineering and Applied Sciences, which goes back as far as 1847, undergraduate students can study applied mathematics, biomedical engineering, computer science, electrical engineering, engineering sciences and mechanical engineering.

University of California at Berkeley
The University of California at Berkeley has a graduation rate of 91 percent, and students can get a degree for around $133,549. After graduation, the average salary for students starting out their careers is $58,300 per year. The electrical engineering and computer science division of the University of California at Berkeley has around 2,000 undergraduate students and is the largest department within the university.

University of Pennsylvania
The University of Pennsylvania, located in Philadelphia, Penn., has a graduation rate of 96 percent and the average cost of a degree is $194,148. Students graduating from UPenn and beginning out their careers earn an average annual starting salary of $59,200. The UPenn engineering department focuses on computer and information science. Students can study computer science, computer engineering, digital media design, networked and social systems engineering, computational biology as well as computer and cognitive science.

Rice University
Located in Houston, Rice University has a graduation rate of 91 percent and the average cost of a degree is $157,824. Upon graduation, the average starting salary for students comes in at $61,200 per year. Rice University has a Department of Computer Science where students can work in faculty research programs and describes the perfect computer science student as a "mathematician seeking adventurer," a quote from system architect Bob Barton. In the electrical and computer engineering department, students can prepare for a career in oil and gas, wearables, entertainment, renewable energy, gaming, healthcare, space industry, security and aviation.

Brigham Young University-Provo
Brigham Young University-Provo, located in Provo, Utah, has a graduation rate of 78 percent, but students won't have as many loans as other colleges on this list. The average price of a degree is a moderate $80,988 and the average starting salary for graduates is around $51,600 per year. Brigham Young University-Provo offers degrees in electrical engineering, computer engineering and computer science. With a wide array of programs to choose from in each degree, Brigham Young University-Provo boasts a rigorous course load with an emphasis on gaining practical skills for the workforce.

Texas A&M University
College Station, Texas is home to Texas A&M University where 79 percent of students graduate and the average cost of a degree is $84,732. Students can expect to earn an average starting salary of $54,000 per year after graduation. The Texas A&M computer science and engineering program boasts an "open, accepting, and compassionate community that encourages the exploration of ideas." Students should expect to leave the program prepared to help solve real-world challenges in the technology industry through applied research.



Wednesday, 19 August 2015

Back to school on a budget: Choosing a cheap laptop to fit your needs

We reviewed eight mainstream budget laptops—because "cheap" doesn't have to mean "awful."

Bargain back-to-school laptops exist for a reason: Not everybody can afford a $2,000 laptop. Honestly, most people don't even need a $2,000 laptop.

For this set of reviews, we're looking at the other end of the spectrum—basic laptops that let you work and browse without crippling your budget. We asked a number of the biggest PC manufacturers (HP, Lenovo, Acer, Dell and Toshiba) to send over their best laptops costing $500 and lower. There's no need to point out that we're pitting an Atom-based machine against one with a Core i5. This is about price point, not conformity. If we missed your personal favorite in this tier, let us know and we can try to take a look at it.

Some people spend more on a single computer than the total cost of these eight budget laptops.

1) If you can spring for a $750 laptop, do so. We took a look at some laptops in that range also, and the difference is palpable. A $500 laptop is all about trading off one important feature for another. You tend to get one standout feature amidst a bunch of compromises. We've found that $750 laptops are generally more well-rounded.

2) On the other hand, you can get a surprisingly competent laptop for $500. These machines aren’t going to make a power user swoon. For basic web browsing, office work, and movie streaming, however, a $500 machine nowadays is a much better proposition than it was ten years ago.

The range of laptops on display here is also pretty interesting. On the high end we've got a handful of fairly traditional (albeit low-end) full-sized laptops with Core i5 processors:
The HP Pavilion x360 11t features a Core M and SSD.

The bloatware is free

We also examined what third-party software/bloatware came with each laptop. One way manufacturers push down costs on these low-end machines is by laying out deals with software companies: "We'll put your software on our machine so you get more customers, and in return you subsidize part of the cost of the laptop itself." It's a purely profit-driven practice, and as Lenovo learned last year it can get you in quite a bit of trouble if you're not careful.

Another thing to keep in mind: You may or may not be better off buying a refurbished unit if you're in this price range—though that depends on how the previous owner treated the machine.

As for methodology, we analyzed these laptops the same way we'd take a look at any other set. Our primary benchmarking tools were PCMark 8 and 3DMark—and yes, we took a look at gaming performance on budget $500 laptops. Spoiler: None of the machines did a particularly great job. Don't buy any of these machines and expect it to run anything more intensive than a 2D indie game or (if you're lucky) something like League of Legends. On low.

We also took a look at disk speeds with CrystalDisk Mark—important because some of these laptops are running standard (and slow) mechanical hard drives, while others are packing speedier storage options.
05 toshiba 2
Rob Schultz

This Toshiba offers a surprising amount of performance for its price.

And finally, we did a more specialized test—a Handbrake transcode of a 30GB Master and Commander file down to a 1GB-ish Android Tablet size.

That's in addition, of course, to looking at the laptops themselves—the build quality, screen quality, keyboard, and trackpad are just as important as the specs. This is a device you'll most likely use every day, and for a while. Even if you only paid $500, we want to make sure you're getting a machine that feels like a quality laptop, not two sheets of veneered plywood held together with a rusty door hinge.

And believe me: It can be done. I've seen it. In fact, let's start with one of the most impressive of the bunch as far as case quality goes—the Dell Inspiron 5000.


for more info on CCNA Training and CCNA Certification and more Cisco exams log in to Certkingdom.com



Wednesday, 12 August 2015

FREE COURSE: Learn basic Cisco networking

In partnership with tech training provider Pluralsight, Network World offers a free online course on CCNA routing and VLANs

In partnership with Pluralsight, Network World presents a free course on CCNA routing and VLANs. In this course, the student will learn the fundamental concepts of networking, and then immediately apply this knowledge to the configuration of a router and switch.

By the end of the course, the student will have enough knowledge to set up a network environment that has multiple subnets over multiple virtual LANs (VLANs), use network address translation (NAT) to connect to the Internet, and hand out IP addresses automatically. Additionally, the student will take a deep dive into IP addressing, using binary, to really gain a fundamental understanding of how endpoints are addressed. All you need as a prerequisite is a willingness to learn and basic computer skills.



Friday, 7 August 2015

8 most in-demand IT security certifications

High-profile security breaches (such as this week’s hack of Ashley Madison) have highlighted the need for skilled security professionals. The most recent IT Skills and Certifications Pay Index from research and analysis firm Foote Partners confirms that IT pros holding security certifications can expect premium pay.

In-demand IT security certifications
As high-profile security breaches (e.g., Target, Sony, Adobe and most recently, Ashley Madison) continue to dominate headlines, companies are doubling down on pay to hire the best and the brightest IT security professionals. The most recent IT Skills and Certifications Pay Index (ITSCPI) from research and analysis firm Foote Partners confirms that IT pros holding security certifications can expect premium pay. Market values for 69 information security and cybersecurity certifications in the ITSCPI have been on a slow and steady upward path for two years, up 8 percent in average market value during this time, states co-founder, chief analyst and research officer David Foote in the report.

"It's been a long time coming, but 2015 will be a year when discretionary spending for security -- that is, everything not related to compliance spending -- will start to reflect the fact that …virtually every industry is formulating a cybersecurity strategy and searching for people with skills in this area. There is ample evidence of a global gap in cybersecurity skills. But with a lack of consistency in jobs and career paths for security professionals, we can expect organizations to have difficulty attracting and retaining cybersecurity talent in the foreseeable future," said Foote.

The information being reported is part of Foote Partner's IT Skills and Certifications Pay Index for Q1 2015. The Index tracks premium pay for 749 IT certifications and noncertified skills on a quarterly basis. The latest edition data was collected through April 1, 2015, and includes information from 54,899 validated IT professionals receiving premium pay for their skills and/or certifications. Here are the top eight most valuable security certifications based on changes in market value/premium pay.

Information Systems Security Engineering Professional (ISSEP/CISSP)
Developed in conjunction with the U.S. National Security Agency (NSA), the Information Systems Security Engineering Professional (ISSEP) certification covers integration of security methodologies and best practices into any and all information systems, including projects, applications and business practices. ISSEP/CISSP certifications showed a market value percent change of 36.4 percent in Q1 2015 over the previous quarter.

EC-Council Licensed Penetration Tester
The LPT certification demonstrates a professional's ability to audit network security, perform penetration testing and recommend corrective action for any weaknesses found. The two-part EC-Council Certified Security Analyst/Licensed Penetration Tester (CSA/LPT) program is a comprehensive, standards-based, methodology intensive training program that teaches information security professionals to conduct real life penetration tests by utilizing EC-Council's published penetration testing methodology. Professionals with this certification reported a 28.6 percent market value percent change in Q1 2015 over the previous quarter.

GIAC Certified Penetration Tester
The GPEN certification is for security personnel who assess target networks and systems to find security vulnerabilities. Certified pros know the ins-and-outs of penetration-testing methodologies, the legal issues surrounding penetration testing and how to properly conduct a penetration test as well as technical and nontechnical techniques specific to penetration testing and best practices. This certification reported a 28.6 percent market value percent change in Q1 2015 over the previous quarter.

GIAC Security Essentials
The GSEC certification is for security professionals that want to demonstrate they are qualified for hands-on application of security tasks related to a broad range of IT systems. Candidates are required to demonstrate an understanding of information security beyond simple terminology and concepts, and must prove they can put theory into practice. The certification reported a 20 percent market value percent change in Q1 2015 over the previous quarter.

Cybersecurity Forensic Analyst
The Cybersecurity Forensic Analyst certification (CSFA) proves that certification holders can conduct a comprehensive analysis of computer and electronic systems, properly interpret the evidence and deliver the investigation results to business stakeholders effectively and efficiently. The certification also demonstrates that professionals can perform these analyses within a limited time frame. Requirements and testing scenarios are based on real-world examples and are continuously updated to reflect the latest threats. The certification has experienced a 15.4 percent market value percent change in Q1 2015 over the previous quarter.

EC-Council Certified Secure Programmer
Most software vulnerabilities are due to programming errors; EC-council Certified Secure Programmers (ECSP) have proven that they can develop high-quality code that makes use of best practices and sound programming techniques to protect against vulnerabilities. There are ECSP certifications available for .Net and for Java. The certification has experienced a 12.5 percent market value percent change in Q1 2015 over the previous quarter.

Check Point Certified Security Expert
The Check Point Certified Security Expert (CCSE) certification teaches security professionals how to build, modify, deploy and troubleshoot Check Point Security Systems on the Gaia operating system. Hands-on lab exercises teach how to debug firewall processes, optimize VPN performance and upgrade management servers for optimal security. The certification has seen an 11.1 percent market value percent change in Q1 2015 over the previous quarter.

Certified Secure Software Lifecycle Professional
The Certified Secure Software Lifecycle Professional (CSSLP) certification validates a professional's ability to develop application and software security protocols within their organizations and to reduce vulnerabilities and lock down potential breach points throughout the software development lifecycle (SDLC). The certification has seen a 7.1 percent market value percent change in Q1 2015 over the previous quarter.


Saturday, 25 July 2015

The cloud is complex, so Intel's launched a sweeping project to fix it

The first step is a project with Rackspace to make OpenStack easier to deploy and manage

Intel has kicked off a broad effort to speed the adoption of the modern cloud infrastructure, which it says has been slow to take off because the software is complex and takes too long to deploy.

"Most people look at the market and say 'The cloud is on fire'," Jason Waxman, head of Intel's cloud infrastructure group, told reporters Thursday. "We're in a position to say, 'You know what? It's not moving fast enough.'"

To speed its growth, Intel has kicked off a multi-pronged effort, called the Cloud for All initiative, that includes hiring hundreds of additional engineers to work on open-source cloud software, setting up two massive compute clusters where companies can test and validate applications, and making further investments and acquisitions itself.

Its first move is a partnership with Rackspace to make the popular OpenStack cloud platform enterprise-ready and easier to use. Intel and Rackspace will hire hundreds of engineers at a development center near San Antonio, Texas, to work on OpenStack components such as its scheduling software, network capabilities and container services.

The goal is not to create "yet another OpenStack distribution," Waxman said, but to improve "the overall health of the project." The companies will also make OpenStack easier to scale.

"Today at best, the most successful OpenStack deployments scale to a few hundred nodes," he said. "Our goal is to enable enterprise class features at scale for thousands of nodes,"

Within six months, Rackspace and Intel will provide developers with free access to two 1,000-node compute clusters where they can test their applications, and Rackspace will offer training programs around the software. Intel picked Rackspace to work with because it's an original developer of OpenStack and runs one of the largest OpenStack public clouds.

The cloud is a fuzzy term but Intel is referring generally to an architecture in which applications are virtualized, or running in software containers, and can be set up and pulled down with high levels of automation.

The architecture is said to help IT departments cut costs and respond to business needs more quickly. But while large companies like Amazon and Google have turned it into a science, most businesses are struggling to get there.

The problem, as Intel sees it, is that choosing and deploying the software to build a cloud is too complex for most companies to handle. There's an abundance of hypervisors, orchestration software and developer environments, and within those options there are further configuration choices to be made.

"That makes it hard to build a fully functional, reliable cloud stack. It takes a lot of expertise," said Diane Bryant, the senior vice president in charge of Intel's data center group.

Deployments take months to complete and customers end up with systems that are "like snowflakes," she said -- "unique and a bit fragile."

The work with Rackspace is only the first step in the Cloud for All initiative, in which Intel will work with other partners to simplify and build out components for a "software defined infrastructure."

Intel's goal is to enable "tens of thousands" of new public and private clouds to be built, and to enable a typical enterprise to build a "full functioning, self service cloud portal" in a single day, Bryant said.

The initiative also includes further investments by Intel, and work with standards bodies and other stakeholders. Intel isn't talking about those other investments and partnerships today, but Bryant said to expect "20 major announcements" from Intel over the coming year.


Best CCNA Training and CCNA Certification and more Cisco exams log in to Certkingdom.com


Monday, 13 July 2015

How 7 companies bring power to Hadoop big data applications

How 7 companies bring power to Hadoop big data applications

Intel and Cloudera joined forces just a year ago to accelerate enterprise Hadoop adoption. Here’s how seven companies have taken advantage of new technology to drive big data.

Powering big data applications to transform business
During Intel's Analytics Day in May, Diane Bryant, Intel senior vice president and general manager of the Data Center Group, and Tom O'Reilly, CEO of Hadoop distribution specialist Cloudera, celebrated the one-year anniversary of the partnership between Intel and Cloudera. That partnership is aimed at accelerating enterprise Hadoop adoption through new product enhancements and ecosystem collaborations. Here are seven examples companies using Intel processors and Cloudera's CDH to power big data applications that are transforming their businesses.

1 caesars
Caesars Entertainment tackles marketing
Casino-entertainment company Caesars Entertainment is using a new Hadoop environment built on Cloudera CDH running on the Intel Xeon processor E5 family to identify customer segments and create specific marketing campaigns tailored to each of those segments. The new environment has reduced processing time for key jobs from about six hours to 45 minutes. This allows Caesars to run faster and more accurate data analysis to enhance customer experiences and improve security for meeting Payment Card Industry (PCI) and other standards. Caesars can now process more than 3 million records per hour.

2 cerner
Cerner helps detect potentially fatal infections
Healthcare technology company Cerner has built an enterprise data hub powered by CDH on Intel Xeon processors to create a more comprehensive view of any patient, condition or trends. The technology is helping Cerner and its clients monitor more than one million patients daily. Among other things, it is helping determine the likelihood that a patient has the potentially fatal bloodstream infection, sepsis, with a much greater accuracy than what was previously possible.

3 eharmony
eHarmony creates more personalized matches
Relationship-minded online dating site eHarmony recently upgraded its cloud environment to use CDH and the Intel Xeon processor E5 family to analyze a massive volume and variety of data. The technology is helping eHarmony deliver new matches to millions of people every day, and the new cloud environment accommodates more complex analyses to create more personalized results and improve the chances of relationship success.

4 mastercard
MasterCard powers its professional services
MasterCard was the first company to implement Cloudera's CDH distribution of Hadoop after it received full PCI certification. The company has implemented CDH on Intel-based servers and has begun integrating Hadoop data sets with data from other environments that are already PCI-certified. MasterCard is pushing that system to its own clients via its MasterCard Advisors professional services arm.

5 farmlogs
FarmLogs helps farmers grow more
Farm management software company FarmLogs is using real-time analytics running on the Intel Xeon processor E5 family to provide 20 percent of U.S. farms with actionable data on harvest, growing conditions, vegetative health and more. It is using the technology to help farmers increase the productivity of every acre of farmland.

6 nippon paint
Nippon Paint optimizes its supply chain
Nippon Paint is one of the largest paint suppliers in Asia. It uses Intel Xeon E7 v2 processors running in SAP HANA in-memory analytics software to understand consumer behaviors, optimize its supply chain and improve its marketing campaigns. Nippon Paint is now testing the new Intel Xeon E7 v3 processor-based system to take advantage of higher performance and reliability features.

7 world wide tech
World Wide Technology powers data warehouse optimization
Systems integrator (SI) World Wide Technology has designed and integrated hardware, software and services into a single data warehouse optimization (DWO) solution intended to alleviate performance bottlenecks and allow organizations to take full advantage of their data sets. The pre-built, validated DWO appliances offloads data preparation and processing transactions to Cloudera and allows data to be captured and analyzed in its native unstructured format. The solution is built on the Intel Xeon processor E5, providing it with a validated architecture that unites compute, network, storage access and virtualization into one cohesive system.


Best CCNA Training and CCNA Certification and more Cisco exams log in to Certkingdom.com


Friday, 3 July 2015

Top 10 cities for IT pros looking to make a move

Top 10 cities for IT pros looking to make a move

Business is booming in 2015, and across the country IT organizations are loosening the purse strings and shelling out big bucks for critical IT talent. Here's a look at the 10 hottest cities for IT pay based on percent increase in salary, area home prices and median salary.

Top cities for IT pros
Relocation? If your answer is, "Yes, please," the timing is right. The Computerworld IT Salary Survey 2015 confirms that business is booming and salary increases are back in a big way. As budgets are loosened, organizations are shelling out big bucks to land top IT talent. This year 67 percent of respondents reported a raise, with only 4 percent reporting a pay cut, compared with 60 percent reporting a raise and 8 percent reporting a pay cut in 2014.

What's more, for the first time since the economic downturn, we're seeing significant year-over-year gains in IT compensation, according to the survey. Total average compensation (including salary and bonus) is up 3.6 percent in 2015, versus 2 percent in 2014. This year, average salaries increased 3.6 percent, and average bonuses increased 4.6 percent, according to the survey results.

Back to that relocation question: Some metro areas reported even stronger gains in pay. Here they are the top 10 metro regions that have seen the greatest jump in pay over the last year, as well as their median home price and median salary. What -- or perhaps where -- is your next move?

St. Louis
St. Louis has reinvented itself as a hub for healthcare, biotechnology and advanced engineering. It also offers opportunities in more traditional industries like manufacturing. Median home values are low, and the city is family-friendly and affordable.

New York City
The city that never sleeps is the perfect home base for an always-on, plugged-in IT professional -- and there are hundreds of thousands of them in the metro area. Though median home prices are above the half-million dollar mark, New York's other boroughs as well as nearby Long Island, Staten Island and New Jersey make great bedroom communities for IT pros who work in "The City."

Phoenix
IT is hot, hot, hot in the Valley of the Sun. The nation's 13-largest metro area is more than just a winter destination for snowbirds and a vacation spot for golfers -- the IT industry is growing because of a highly educated talent pool. Arizona consistently ranks among the top five U.S. states for employment growth.

Chicago
Chicago's thriving as an up-and-coming tech center, with many IT, research-and-development and green energy technology firms calling the Windy City home. And with home values relatively low, Chicago and its suburbs are a great option for IT pros to live and work.

Seattle
Seattle's legacy as an IT hub is almost as great as that of San Francisco. With Microsoft headquartered in Redmond and more than 850 other IT heavyweights in the area, it's no wonder Seattle's something of a destination for IT pros.

Atlanta
Atlanta's home to a number of IT giants; more than 75 percent of Fortune 1000 companies have a presence there. As of 2006, Atlanta has been one of the 10 largest high-tech center in the U.S. and home prices remain affordable.

Minneapolis/St. Paul
The Twin Cities are built around the intersection of the Mississippi, Minnesota and St. Croix rivers, and the region is an IT hub. Strong finance and biotech sectors, a cosmopolitan city and an affordable place to raise a family all make this a place worth considering.

San Francisco
San Francisco's been an IT mecca for decades, and Silicon Valley is still a great incubator for tech startups and elite talent. Even though IT salaries jumped by 4.6 percent, a median home value of $728,000 makes it pricey for all but the wealthiest of tech workers.

Detroit
Though Detroit's been in the news lately for all the wrong reasons, it's made a strong showing in this year's survey, with a 5 percent increase in average pay. And with an extremely low median home value, it's an affordable metro area in which to live and work.

Boston
Last year's number 2 metro areas jumps to the top of the list with the highest percent change in annual pay. The city is doubling down on its commitment to innovation; examples like the Cambridge Innovation Center and more academic research and development spending than anywhere else in the U.S. prove that point.

Methodology
Source for percent change in compensation: CW's IT Salary Survey 2015 Base: 4,863 respondents; metro regions with a base size of at least 50 respondents

Source for median IT salary: PayScale.com; 50th percentile value of total cash compensation (base annual salary, bonuses, profit sharing, other forms of cash earnings as applicable). The middle value for TCC across all workers with the same job titles. Half of workers will make more, half will make less.

Source for median home value by city/metro region: Zillow Home Value Index


Best CCNA Training and CCNA Certification and more Cisco exams log in to Certkingdom.com

Monday, 29 June 2015

Review: The best password managers for PCs, Macs, and mobile devices

10 local and cloud-based contenders make passwords stronger and online life easier for Windows, OS X, iOS, Android, BlackBerry, and Windows Phone users

Thanks to a continuous barrage of high-profile computer security scares and reports of cloud-scale government snooping, more of us Internet users are wising up about the security of our information. One of the smarter moves we can make to protect ourselves is to use a password manager. It's one of the easiest too.

A password manager won't shield you against Heartbleed or the NSA, but it's an excellent first step in securing your identity, helping you increase the strength of the passwords that protect your online accounts because it will remember those passwords for you. A password manager will even randomly generate strong passwords, without requiring you to memorize or write down these random strings of characters. These strong passwords help shield against traditional password attacks such as dictionary, rainbow tables, or brute-force attacks.

Many password managers allow you to automatically populate your password vault by capturing your Web logins using a browser plug-in and allowing you to store these credentials. Other options for populating your password database include importing an Excel spreadsheet or manually entering your login information. Further, using these stored credentials is typically automated using a browser plug-in, which recognizes the website's username and password fields, then populates these fields with the appropriate login information.

Although several browsers offer similar functionality out of the box, many password managers offer several benefits over the built-in browser functionality -- including encryption, cross-platform and cross-browser synchronization, mobile device support, secure sharing of credentials, and support for multifactor authentication. In some cases, usernames and passwords must be copied from the password manager into the browser, reducing the ease of use but increasing the level of security by requiring entry of the master password before accessing stored login information.
6 simple tricks for protecting your passwords

Some password managers store your credentials locally, others rely on cloud services for storage and synchronization, and still others take a hybrid approach. Some of the options using local storage (such as KeePass and 1Password) still support synchronization through Dropbox or other storage services. Deciding which password manager is best for you will come down to features and ease of use, as well as to whether you're comfortable storing your passwords on the Internet.

If having your critical data stored in a cloud service worries you, then KeePass, 1Password, or SplashID Safe (sans SplashID's cloud service) offer the top options. If you trust cloud-based services with your passwords and believe they will protect your data using good security practices and encryption, then LastPass, Dashlane, or PasswordBox are your best bets.

In my judgment, KeePass is the best of the options using local storage. The fact that it's open source, free, and complemented by countless plug-ins adds up to a very flexible option. With the right combination of plug-ins, KeePass can be made to do almost anything you could require of a password manager. My favorite cloud option is LastPass, primarily due to its low cost and the consistent implementation of features across all of the clients. Each LastPass client I tested was easy to work with, stable, and remarkably uniform from a usability perspective. Additionally, the fact that a LastPass Premium account is all of $1 per month makes it an extremely compelling option.

But one of these other options might suit you better. Really, you can't go wrong with any of these password managers.
1Password

1Password is the brainchild of AgileBits, maker of the popular Knox encryption tool for OS X. Unlike Knox, 1Password offers support for multiple platforms, including Mac, Windows, iOS, and Android.

Like KeePass, 1Password uses a local file to store encrypted passwords. AgileBits does not provide a cloud service for synchronization with mobile devices, but 1Password does support synchronization of the password vault using Dropbox (all platforms) or iCloud (Mac and iOS only). 1Password also supports synchronization over Wi-Fi between Windows, Mac, and iOS clients. Because the 1Password vault is contained in a single file, you gain the convenience of a portable password vault without having to store your passwords on the Internet.

1Password clients allow you to create and maintain multiple password vaults. Multiple vaults can be used to share some of your passwords with another family member or co-worker. Secure sharing between 1Password clients is supported, giving you a method to transmit a login (or any sensitive information, such as a credit card number or the answer to a website's security question) to another licensed 1Password user over an encrypted channel. Emailing login information in plain text is also supported, but this information is only as secure as your email traffic.
1Password favorites

1Password stores your passwords in a local file, but supports synchronization across devices using Dropbox and iCloud.

1Password now provides a number of different tools that analyze your passwords and the services they secure in order to identify potential vulnerabilities. Though many websites have patched the Heartbleed vulnerability by now, 1Password takes the precaution of comparing your last password change for a site against the date the site’s server was patched. If your password hasn’t been changed since the patch, 1Password will encourage you to protect yourself through a password change. Potential areas of concern such as duplicate or weak passwords are also identified.

The cost of using 1Password is markedly different than cloud-based password lockers. Users must purchase clients for each platform they intend to use, costing more up front than a subscription service, but potentially saving money in the long term. 1Password for PC or Mac cost $49.99; the Mac-plus-PC bundle runs $69.99. Both the iOS app and Android apps are free with an in-app upgrade to the Pro feature set for $9.99.

My biggest concern with 1Password has to do with feature parity between the Mac and PC versions. Currently both platforms offer similar features, largely due to a massive update to the Windows version mere days before publication of this article. Previously, features such as secure sharing or Wi-Fi sync were nowhere to be found. AgileBits has made good on promises to bring these features to all platforms, but if you're primarily a PC user, the lag may be cause for concern. Regardless, 1Password is a strong password manager. With AgileBits' strong ties to the Apple community, this is particularly true for Mac and iOS users.

Dashlane

Dashlane toes the line between cloud service and local password manager in an attempt to answer every security concern. You can store your password database on Dashlane's servers and take advantage of synchronization across devices, or you can store your password vault locally and forgo synchronization. It's your choice.

If you store your password database in Dashlane's cloud, your master password remains with you only. Rather than storing a hash of the master password on its servers, Dashlane claims to use your password merely to encrypt and decrypt the data locally. For this reason your password database on the Web is read only, and changes can solely be made on a client.

Authentication is performed against devices that are registered with Dashlane through a two-step process, incorporating your master password and a device registration code sent via email. Two pricing tiers are offered for Dashlane users. A free account allows access to your passwords through a single device of your choice. Premium accounts, which cost $39.99 per year, let you synchronize your passwords across multiple devices, perform account backups, share more than five items, give you access to the read-only Web app, and entitle you to Dashlane's customer support.
Dashlane score

Dashlane will store your password database in the cloud, but your master password remains with you only. (Don't lose it!). Like other password managers, Dashlane will assess the strength of your password as you create it.

With Dashlane, retention of your master password is critical. The company states that it is unable to perform password recovery in the event of loss, a necessary side effect of its decision to not store a copy of your password in any form. Two-factor authentication is also supported through the use of Google Authenticator. Support for two-factor authentication must be enabled through the Windows or Mac client and can only be used on Internet-connected clients.

Dashlane’s team features allow you to securely share login information with other Dashlane users, providing them with an appropriate level of access to the information. Shared items can be provided with limited rights, which restrict the ability to change permissions or reshare an item, or with full rights to the data. Dashlane also offers the ability to designate emergency contacts, making it easy to allow family or co-workers access to critical accounts or information in the event of an emergency. The data shared with an emergency contact can be fine-tuned in order to only provide certain information to specific contacts.

Because Dashlane attempts to be a hybrid of a cloud-based and local password manager, it isn't as full featured as other cloud offerings, and it may not win over customers fearful of cloud services. However, Dashlane has been able to accomplish something truly remarkable through no small amount of ingenuity and attention to security precautions. Before you dismiss Dashlane because it's a cloud-based service, take a look at the company's security whitepaper, which details the concepts and security practices it has implemented.

KeePass

A mature open source project (GNU GPL version 2), KeePass is a free password management solution for Windows, OS X, or Linux, running natively on Windows and requiring Mono for the other platforms. Many of the benefits of open source software are prevalent in KeePass, including ports to other client operating systems and a robust plug-in ecosystem. With the extensibility offered by plug-ins for KeePass, you can change the encryption algorithm, automate logins through your browser, integrate an on-screen keyboard, or even create scripts you can run against KeePass.

KeePass was designed to store a local copy of the password vault. Cloud backup and support for synchronization across multiple devices are obtained through plug-ins that work with the likes of Dropbox, Google Docs, and Microsoft OneDrive. A side benefit of a local password database such as KeyPass is the ability for multiple users to share a database or for one user to keep multiple databases, sharing some and keeping others private.

KeePass master

With KeePass, you can lock your password vault using a combination of password, key file, and Windows authentication.

Mobile support for KeePass is a little more obtuse than some of the commercial options. Ports are available for iOS, Android, and Windows Phone, but the big question becomes synchronization support. Not all mobile ports support cloud synchronization, and those that do support only a subset of the cloud options. Some mobile KeePass clients carry a cost, though most are in the $1 to $2 range.

If you're more concerned about the security of your password vault than mobile clients and device synchronization, you'll be pleased to know that KeePass supports multiple authentication methods by default. KeePass database files can be locked by a combination of password, key file, and Windows user account. With a key file stored on removable media such as a USB thumb drive, two-factor authentication can be used to secure access to your critical passwords.

The biggest downside to KeePass is complexity. Getting all of the advanced functionality offered by the competition will require quite a bit of research, setup, and maintenance. While KeePass is a great solution for fans of open source, maximum flexibility, and free software, it is certainly not as straightforward as some of the cloud-based services listed here.

LastPass
LastPass may be the most popular password manager in this review, due to a rich set of features, support for a wide range of mobile platforms, and straightforward licensing, not to mention aggressive marketing. Unlike KeePass, LastPass is decidedly cloud-centric, using its own cloud service to store user information and synchronize data.

A recent LastPass security notice underscores one drawback of a cloud-based password manager: It makes a tempting target for hackers. Although no user accounts were accessed and no vault data was taken, attackers did make away with account email addresses and other data that could be used in targeted attacks. Bottom line: LastPass users should change their master passwords. Brian Krebs' post on the LastPass breach provides a concise explanation of the risks.

LastPass offers a free and premium pricing tier for consumers, with the premium service costing $1 per month. Users of the free edition get many of the basics you'd expect from a cloud-based service, including plug-in support for multiple browsers, anywhere access, and even support for multifactor authentication using Google Authenticator on an Android or iOS device or Microsoft Authenticator on Windows Phone. Mobile device support requires a premium account but includes support for iOS, Android, BlackBerry, and Windows Phone. Even some mobile browsers such as Dolphin and Firefox Mobile work with LastPass Premium to automate username and password entry. Finally, premium users get access to the LastPass support team, rather than being relegated to the user forums.

LastPass vault
LastPass offers handy functionality for sharing accounts with friends and family. The free service allows you to selectively share account login information with other LastPass users, allowing them to authenticate to individual Web applications using your information, without giving them direct access to your passwords. Premium account subscribers get access to a Family Folder, a feature that lets you specify exactly which login information to share with up to five other LastPass users.

Desktop support for LastPass is somewhat confusing. Downloading the basic installer for Windows provides browser plug-ins, an import tool (for migrating from another password vault or spreadsheet), and a shortcut to the LastPass Web app. Premium subscribers also have access to LastPass for applications, which provides increased utility by allowing you to automatically log into desktop applications such as Skype or a corporate VPN client.

LastPass supports several forms of two-factor authentication. I've already mentioned that both Microsoft Authenticator and Google Authenticator are supported with free accounts, providing simple integration using a mobile device. Premium accounts gain support for Yubikey, a USB hardware authentication device, and Sesame, a software authentication tool run from a USB storage device.

If you need simple password management in a Web app, you can't go wrong with a free LastPass account. For more granular credential sharing and mobile device support, LastPass premium will be the best $1 you spend each month.

PasswordBox

PasswordBox bears a number of similarities to Dashlane. Master passwords are neither stored nor transmitted, meaning that password data is secured throughout the process, and password resets are technically impossible. PasswordBox even takes extra steps to ensure the security of your information in other ways, such as PCI-compliant data centers and providing the ability to send the company encrypted email using the PGP key published on its website.

PasswordBox is currently missing some of the features available in Dashlane, such as two-factor authentication, but both two-factor and fingerprint-based authentication are reportedly coming soon. You can read about the security measures PasswordBox uses to safeguard password data in the company's security whitepaper.

PasswordBox does not use stand-alone client programs on Windows and Mac, opting instead for browser plug-ins (Chrome, Firefox, and Internet Explorer), but mobile apps are available for both iOS and Android. Another minor oddity: PasswordBox doesn't offer a Web app to view or edit passwords or manage your account -- everything is handled via mobile app or browser plug-in.
PasswordBox

PasswordBox stores your passwords on its servers, but they're never decrypted there. Passwords can only be viewed and edited using the browser plug-in or mobile client.

PasswordBox is priced competitively with the other cloud-based password managers. Free accounts support up to 25 stored passwords, including synchronization and full sharing capabilities. Premium accounts cost $12 per year and give you unlimited password storage. Referring five friends nets you a premium account for life.

PasswordBox allows users (free or premium) to share saved login information seamlessly between accounts, even without the passwords being visible. Shared log-ins persist even through password changes, and they can be revoked at any time. An interesting and unique feature of PasswordBox is the Legacy Locker, which allows you to designate one or more responsible parties who get access to your account information in the event of your death. Account transfers using Legacy Locker are not performed until a death certificate is provided and validated.

PasswordBox is now part of the Intel Security Family, meaning its future is in a state of flux. For now Intel Security is offering free premium subscriptions to both new and existing users.

SplashID Safe

SplashID has been in the password manager business for years. Its product, SplashID Safe, has been particularly popular on mobile devices. Currently SplashID Safe supports access through the Web and client apps for Windows desktop, Windows, Mac, iOS, Android, BlackBerry 10, and Windows Phone.

Where other password managers are either local or cloud-based, SplashID Safe supports either option. SplashID has simplified its licensing structure somewhat in version 8. A basic SplashID account is free, but limits you to one device and doesn’t allow sharing or backup. A SpashID Pro account allows you to synchronize your password vault for $1.99 per month or $19.99 per year. SplashID Pro supports unlimited devices, synchronization over the Internet or Wi-Fi, sharing, and automated backup. It also comes with customer support.

For an additional $5 per user per month, families or businesses can leverage SplashID Safe Teams edition, which adds an admin panel that allows you to control who has access to each record, either by assigning a record to an individual user or a group of users.

SplashID Safe has at least one feature we wish all the cloud-based services would implement: the ability to configure a login as local only, giving you the ability to prevent your most sensitive data from being stored on the Internet. The idea is that if you have certain login information or other sensitive data you don't trust to the Internet, you can prevent this information from being uploaded to SplashID's servers.

SplashID Safe supports two methods of sharing login information. When sharing with a user who has a SplashID cloud account, the login information is imported directly into their account. Users without a SplashID cloud account will receive an email containing a link to securely retrieve the information. Links to shared information are secured with a password (which can be included in the email or shared using another method), are valid for only 24 hours, and expire after the first use.

Two-factor support in SplashID only provides an extra layer of security when registering a new device (not on each login), requiring you to enter a six-digit code sent via email. While a registered device paired with a password technically meets the definition of two-factor authentication (something you have and something you know), it's not quite up to par with services offering support for Google Authenticator or other two-factor methods. SplashID Safe offers a pattern unlock feature as an alternative to a master password, but I found this feature to be somewhat inconsistent.
Other contenders

It's always nice when a security product is backed by a brand synonymous with computer security, and Symantec's Norton Identity Safe certainly has that factor in its favor. Identity Safe has another plus: It's completely free. You can choose from a number of free password managers, but none are cloud services operated by a software vendor with a level of trust built up over decades. Norton Identity Safe used to be part of a Norton security suite, but it's now a stand-alone service with a Web front end and clients for Windows, iOS, and Android.

RoboForm is a popular password manager and form filler, but it falls short of the leading contenders on a few counts. Though it offers synchronization across multiple platforms, there is no Web app, two-factor authentication, or sharing capability. Individual RoboForm desktop licenses can be purchased outright for Mac or PC at a price of $29.95, and a Windows portable version for USB storage is available for $39.95. RoboForm also offers subscription-based licensing for $19.95 per year, which provides synchronization and access through mobile apps on iOS, Android, Windows 8, and Windows Phone.

KeePass isn't the only open source password manager. There's also Password Safe, currently available for Windows in both installable and portable versions, and for Linux in a beta version. Password Safe is not nearly as feature-rich or mature as KeePass, and I'd be hard-pressed to give you a reason to use it over its big brother. That said, Password Safe is a viable alternative, and if all you need is a local password manager, the decision may come down to which program you find easier to use. The result may be Password Safe.

My1Login has both a free version, supported through advertisements and affiliate links to partner sites, and a pro version, which eliminates the ads and affiliate links for $2 per month. My1Login offers features commonly found in the other contenders such as secure sharing and strong password generation. The problem with My1Login is that the entire service is Web-based, with mobile support coming through the mobile Web app only. While My1Login is enthusiastic about the minimal setup requirements due to the lack of client applications, I find this method to be more difficult to use in the long term.

Keeper Backup is full-featured password manager supporting multiple client platforms, including Mac, Windows, iOS, Android, and Windows Phone. Security features offered by Keeper Backup include two-factor authentication and secure sharing. Keeper offers three pricing tiers, starting with a free edition that supports one device, no sharing, and a limited amount of data. Keeper Backup provides unlimited storage, access to the Keeper Web app, secure sharing, and access to the support team for $9.99 per year. Backup Unlimited adds support for synchronization across devices for a heftier $29.99 per year.

Trend Micro's DirectPass has a free option that supports only five passwords. Trend Micro's subscription service, which costs $14.95 for one year or $24.95 for two years, supports an unlimited number of passwords and devices. Desktop clients are available for both PC and Mac, and mobile clients are available for iOS and Android. While there's nothing wrong with DirectPass, it doesn't match other competitors in features or polish.


Best CCNA Training and CCNA Certification and more Cisco exams log in to Certkingdom.com