How to Remove Members from a vCenter Single Sign-On Group

July 7, 2014

Remove Members from a vCenter Single Sign-On Group : You can remove members from a vCenter Single Sign-On group from the vSphere Web Client. When you remove a member (user or group) from a local group, you do not delete […]

Read the full article →

How to gnome-fall back at ubuntu 14.04 LTS

July 7, 2014

How to gnome-fall back at ubuntu 14.04 LTS The Classic, now called Flashback session was quite popular in old Ubuntu versions .Many People like to use this same as like old gnome .   Here is the way how to Install […]

Read the full article →

E-Book :Introducing Microsoft SQL Server 2014

July 3, 2014

E-Book :Introducing Microsoft SQL Server 2014 ( Free ) In this book, the authors explain how SQL Server 2014 incorporates in-memory technology to boost performance in online transactional processing (OLTP) and data-warehouse solutions. They also describe how it eases the […]

Read the full article →

How To Log Off of Server 2012 on RDP Session

July 3, 2014

Open Powershell and type PS C:\> PS C:\> logoff        

Read the full article →

India to see robust hiring activities Soon

June 30, 2014

  NEW DELHI: Indian employers are likely to step up their hiring activities over the next three months, especially with IT & ITes segment expected to go on a robust recruitment drive, says a report. The Employment Outlook Survey by […]

Read the full article →

HACKING ATM MACHINES

June 1, 2014

Criminals will not let any way to cheat an ATM machine out of its cash, as it’s one of the easiest way for them to get the hands on cash. ATM skimmers have now discovered a new and high-tech approach […]

Read the full article →

All you need to know about 5G

June 1, 2014

WHAT IS 5G? 5G is the short for fifth generation, a mobile broadband technology that is in the early stages of works and likely to be in place six to seven years from now. A 5G network will be able […]

Read the full article →

Cybersecurity is new challenge for countries globally

May 31, 2014

    WASHINGTON: It started with hactivists defacing websites and a e-mails pointing users to links that stole data. Soon, Ragnar Rattas and his team of Estonian computer security experts were battling the heaviest and most sophisticated cyberattacks they had […]

Read the full article →

Iranian hackers using fake Facebook accounts to spy on US leaders

May 30, 2014

BOSTON: In an unprecedented, three-year cyberespionage campaign, Iranian hackers created false social networking accounts and a fake news website to spy on military and political leaders in the United States, Israel and other countries, a cyberintelligence firm said.  ISight Partners, […]

Read the full article →

Face recognition to boost surveillance

September 4, 2013

  The US government is making progress on developing a surveillance system that would pair computers with video cameras to scan crowds and automatically identify people by their faces, according to newly disclosed documents and interviews with researchers working on […]

Read the full article →