So your new SSD drive is thin and you can’t align it in your hard drive dock to clone the drive. What do you do? Make it work.
Dawn Babian, System Analyst is the representative for NCWIT. “NCWIT works to correct the imbalance of gender diversity in technology and computing because gender diversity positively correlates with a larger workforce, better innovation, and increased business performance. Increasing the number of women in technology and computing also has the potential to improve the design of products and services to better serve a more diverse population, and increase economic and social well-being by providing more women with stable and lucrative careers.”
“The National Center for Women & Information Technology is a non-profit community of more than 300 prominent corporations, academic institutions, government agencies, and non-profits working to increase women’s participation in technology and computing. NCWIT helps organizations recruit, retain, and advance women from K-12 and higher education through industry and entrepreneurial careers by providing community, evidence, and action.” (Read more)
Looking for statistics on technical women?
Read on for a wealth of interesting facts on the demographics of women in technology
An Example of Successful Women in IT
A great example of how successful women in IT can be comes from one of our own students, Donna Richardson. Keeping up with Donna for more than 11 years now; I was surprised to miss her article in Computerworld magazine. Seems fitting since later that year we won the Computerworld Honors program for education. I still remember the long distance call as Donna called the school for a motivational speech as she was on her way to a Microsoft certification in South Carolina.
Donna (Pierce) Richardson completed the CIT program in 2001 at Tennessee Technology Center in Shelbyville, TN. She started her Information Technology career at a middle Tennessee manufacturer while working to complete the CIT program.
Upon her completion, she went on to work for a contractor as a Level 2 Help Desk Technician for a large corporation in Greenwood, South Carolina. While working there, she completed her Bachelors in Computer Science in 2006 from Limestone College.
She later worked at a global healthcare industry where she worked as a Help Desk Coordinator. While working there she completed her Masters in Information Technology, with a Management of Information Systems emphasis from Strayer University in 2008. Additionally she became certified in ITIL Level 3 and also became a member of the Help Desk Institute.
She currently works at Self Regional Healthcare System as Client Analyst III where she coordinates Technology and Software rollout projects. She teaches Computer Technology courses at Piedmont Technical College. She has been married for nine years and is the mother of two lovely children ages 2 and 8. Donna and her husband were featured in Computerworld’s article “Geek Love” in the February 2011.
Another example? Dawn Babian our systems analyst who works at TTC Shelbyville and is the coordinator of the NCWIT program at our institution. Dawn Babian is a part-time Instructor at the Tennessee Technology Center at Shelbyville , assistant to CIT and Systems Analyst. Certified by CompTIA, Microsoft and the SANS Institute, Dawn acts as an assistant Network Administrator. Over the past three years, Dawn has implemented and helped to manage a majority of the online LMS. She is credited with helping to win the 2011 Computerworld Honors and 2012 TechTarget Customer Service and Integration Awards.
We have dozens of examples of successful ladies in IT. Check out the National Center for Women and Information Technology.
Back in 2007 we published an article on ‘The Challenge of Teaching Information Technology‘. Recently we were also asked to write and article for TricomTS’s blog The Right fIT (Their Corporate Website is here) on Educating Tomorrow’s IT Professional Today.
So why do I write these articles? Because Information Technology is growing. Boot camps are only or should be only for seasoned IT Professionals. It takes time. With technology growing, to educate a student and to transfer the amount of information from every resource available – it is not only challenging for the instructor, it is a challenge even to the best students. IT Professionals cannot take four years to start a career, technology will change so much within a year and the curriculum (accredited) has to be dynamic and change as technology changes. IT personnel wanting to move up the corporate ladder should go to college later in order to advance. Many IT pros are specialized career field but a majority of them have to be versatile and their skills have to be diversified.
And with a global economy, IT Professionals have to be lean and they have to learn quicker than ever.
We recently were interviewed by ComputerWorld and provided our look at how the economy and how a global economy changes the way IT thinks, works and reacts to this. So truly we offer all of this advice to those who want to become an IT professional. Be ready for change…everyday. In today’s world, employers do expect a lot out of young IT personnel. Remember it is the best career in the world to those who have a heart and passion for the industry.
Secure your devices. Bottom-line, there are malicious users on the web that can find your device (webcams, IP cameras, routers, SCADA and other devices). Change the default passwords and update software/firmware when it is available. Disable UPNP and look for vulnerabilities that may affect your device.
CNN’s Money on “Hacking anything connected to the internet“
We were interviewed about Mac Malware with PCWorld and now the details about the attack from Naked Security.
(April 13, 2012)
“Flashback Malware Puts Apple in Security Spotlight: Experts Weigh In” - PCWorld
The Computer Information Technology class continues to receive advanced training on the Ubiquiti AF24 Airfiber. The Ubiquiti AF24 Airfiber is a hi-power, linear 2X2 MIMO radio with enhanced receiver performance and reliability. The AF24 has a breakthrough speed of 1.4+ Gbps real data throughput.
These devices are specifically designed for outdoor Point to Point bridging between buildings and provide hi-performance network backhauls. These dual-independent 2×2 MIMO 24GHz hi-gain reflector antenna systems, can operate in FDD and HDD modes providing speed and spectral efficiency in the 24GHz band.
Students learn how to configure advanced wireless devices for real world information technology and hands-on experience.
Students also participate in a wireless shoot-off. This contest challenges the students to design an antenna that will make an association between a standard access point and a laptop that will connect at extreme distances. The contest will start the second week of April.
(L-R) Jay Matlock, Jonathan Laine, Scott Hess (designer of a parabolic dish with a helical transceiver), Tyler Clift and Kenny Cooper.
Great details about building the Airfiber below (from 03:17 forward)
Photos above (D. Babian)
Photo Credit: (Wil McKamey)
Mickey found a great site that gives the approximate time it will take to break your password. The site, howsecureismypassword.net gives the approximate time and a background color that indicates how secure your password is. There are other things to worry about. One of the things people don’t realize is that the code in your website may reveal even the most complex passwords. It is up to the webmaster of your site to keep you secure.
In its Beta release, FancyCache offers a simplex program that uses unused memory to boost the speed of your hard drive. But does it work? Yes. My Dell Inspirion is already fast, but with FancyCache, programs do open quicker and the computer is even more responsive. With the ability to tweak how I wanted to cache, I used 2gb of the 6gb of RAM on board in the settings.
The default settings alone were convincing enough to show how my computer sped up after a few minutes of use. Although my computer is a 64bit laptop, the caching methods used and the read/write cache algorithms did boost performance.
FancyCache is certainly beneficial for 32 bit users who are locked in at 3gb of RAM. FancyCache can take advantage of memory above this limit to speed up your computer. And whether you do or don’t elect to install FancyCache, at least tweak your settings in a 32 bit computer to tweak your memory. (See our Link)
The only problem I had was once I downloaded the software, it said it was expired. A quick check on their website and keys can be obtained here. The latest key is valid until July 2013.
Will I buy this product? I’m not sure yet, time and use of Fancycache will tell.
How you find the optimal MTU settings is truly a matter of opinion. Here is what we do…remember setting firewalls, routers and your computer will truly tweak out your connection. Start on the outside and change your router or firewall first and then each computer (Use TCPOptimzer for computers). Don’t forget access points and other devices.
- Find an ISP or a website you can ping.
- Ping the website from the command prompt (Windows) using the following command
- ping -f -l 1472 http://www.yourwebsiteaddress.com (the -l is an “L” that is a lowercase and there is a space between each command and switch)
- Hit the enter key
- If you receive the message of fragmentation, reduce by 10 or 20 until you get responses. Increase the number by 1 until you are 1 less away from getting a fragmentation message (midpoint – between high and low)
- Now add 28 to this number. (Why? This is because you specified the ping packet size – and did not include the header which is 28bytes)
- This will give you your MaxMTU size. (Enter this into your devices and into your OS)
Other Operating Systems
ping -s 1472 www.yourwebsiteaddress.com
ping -D -s 1472 www.yourwebsiteaddress.com
Linux and Apple commands are case sensitive.
Here’s a quick example where I ran all the way down to 1400. Therefore I would add 28bytes and the MaxMTU would be 1428.
C:\Users\x2370>ping -f -l 1450 http://www.somewhereoverthere (use your ISP here)
Pinging http://www.somewhereoverthere [ IP Address] with 1450 bytes of data:
Reply from 192.168.1.1: Packet needs to be fragmented but DF set.
Packet needs to be fragmented but DF set.
Packet needs to be fragmented but DF set.
Packet needs to be fragmented but DF set.
Ping statistics for IP Address:
Packets: Sent = 4, Received = 1, Lost = 3 (75% loss),
C:\Users\x2370>ping -f -l 1400 www.somewhereoverthere (use your ISP here)
Pinging http://www.somewhereoverthere IP Address] with 1400 bytes of data:
Reply from IP Address: bytes=1400 time=161ms TTL=110
Reply from IP Address: bytes=1400 time=80ms TTL=110
Reply from IP Address: bytes=1400 time=60ms TTL=110
Reply from IP Address: bytes=1400 time=124ms TTL=110
Ping statistics for IP Address:
Packets: Sent = 4, Received = 4, Lost = 0 (0% loss),
Approximate round trip times in milli-seconds:
Minimum = 60ms, Maximum = 161ms, Average = 106ms
Always test your internet before and after. Use a true speed test such as Testmy.net
Testmy.net has been around since 1996 and uses real world speed test. Testmy.net also is NOT owned by an ISP so there isn’t a chance of inflated scores or speeds.
Give it a try and use the Download and Upload link from the menu.
Doing research on wireless settings of your access point can be confusing and very technical. Here’s a couple of settings you will find in your wireless AP -
- RTS- (Ready to Send) threshold specifies the packet size of RTS transmissions. You can use this to control traffic flow through your access point. This can help if you have a lot of computers or mobile devices connected. A lower threshold means that RTS packets are very frequently, consuming more bandwidth and reducing the throughput of the packet. Generally the default setting is OK (2347). Lower only 1 point at a time if you need to adjust this setting. (Connectivity problems)
- CTS (Clear to Send) Protect -With CTS enabled or in Protection Mode, CTS should assist 802.11B/G devices and help them to have a chance to transmit to the access point. If you have a very efficient network, and the error rate is low, disable CTS protection to gain better performance.
Fragmentation Threshold – The default fragmentation threshold is set to 2346 bytes, this disables packet fragmentation. If you suspect radio interference you can lower this 1 point at a time (always test by lower 1 at a time) . This will increase overhead on the network and can greatly reduce throughput so lower only 1 at a time and test.
DTIM is The delivery traffic indication message. It is an element included in beacon frames. Basically if data is buffered on the access point and needs to be picked up, this setting tells associated computers to check for buffered data. A setting of 1 tells associated computers to check at every beacon.
Beacon – A Beacon tells clients to check the access point. If you have a value of 10, clients check the access point on every tenth beacon. The default on many routers is two beacons. Most devices allow a setting from 1 to 255 beacons. A beacon is much like a lighthouse. The access point sends a beacon that tells devices that it exists. So therefore a beacon rate set to 10 sends 10 beacon frames per second.
Preamble – the preamble is a pause before data is sent. Short preamble pauses briefly and long gives a long pause before data is sent. None crowded networks may benefit from a short preamble. Long preambles can pause and may even help with connectivity on a crowded network.
Radio Mode – If you have laptops that are 802.11g only, it is best to select 802.11g in the radio (quicker connections and no slowing down). Mixed Mode can cause latency (pauses). You have to take into consideration any devices (guests) that may enter your network. These devices may have 802.11b. Setting to 802.11g can slow 802.11n devices. If you have devices that are g and n or even b, leave the device on Auto or Mixed Mode.
Having connection problems to certain websites or getting updates? Adjust your MTU from 1500 to 1492 or lower on both the AP and remember, you may need to adjust your MTU on your network card.
Rick over at Whats On My PC has found a website with an amazing amount of resources. (See Rick’s article here) To credit Mike over at GE Geek, this website is one of the best references I have ever seen. Visit Rick for a direct link to this amazing website.
There is also a Toolkit you can download at the top of the page.
(Approximately 1Gb! of information)
As this year comes to a close, take a look at Rick’s Bookmarks4Techs site. A comprehensive list of nearly 500 blogs. This list is a valuable resource for anyone in today’s world who enjoys technology.
Just a few of the blogs -
Bill Mullins Tech Thoughts Daily News – A great site that has the latest news, terminology and freeware along with how-to articles, reviews and other great information.
Whats On My PC – Reviews, articles, portable-cloud-software apps and tons more.