One item I’ve done repeatedly while doing network consulting services is configuring high availability (HA) networks. The recommended way is Virtual Router Redundancy Protocol (VRRP). This requires that you have two firewalls for every location and they run in...
Month: March 2011
How to Authenticate Linux Users using Active Directory
In my previous post regarding wireless security, I mentioned that a single source of authentication for users is the most ideal in a corporate environment. The advantages of using one source for authentication are vast. One of the biggest advantages is that users only...
Computer System Validation: A Closer Look at 21 C.F.R. §820.70(i) and FDA Warning Letters
Avoiding 21 C.F.R. §820.70(i) FDA Warning Letters
Using the New ClearQuest Eclipse Client
Have you noticed that Rational ClearQuest 7.0 now comes with a new default Eclipse client? Wonder what is happening to the old Windows client and what the difference between the two is? Then this post is for you! Download the attached PDF file below to get the...
Network Storage – Getting the most from your filesystem
In my last blog entry, I mentioned that I would discuss how to roll your own network attached storage device. At first, this might sound trivial. Take any commodity PC hardware, throw a large disk in there, install linux, configure NFS, done. Not so fast, there are...
3 Options for Network Installation and Application Management
It seems like every week there’s another article about “Network Installation Services” – even if we don’t realize it. I believe Apple really hit the nail on the head with their iPhone App Store, as evidenced by the copy-cat implementations in the WebOS App Catalog,...