Tuesday, January 21, 2020

Tabula Rosa Systems Technical Term - ireless access point




ireless access point
Posted by: Margaret Rouse
A wireless access point (wireless AP) is a network device that transmits and receives data over a wireless local area network (WLAN). The wireless access point serves as the interconnection point between the WLAN and a fixed wire network. Conceptually, an AP is like an Ethernet hub, but instead of relaying LAN frames only to other 802.3 stations, an AP relays 802.11 frames to all other 802.11 or 802.3 stations in the same subnet. When a wireless device moves beyond the range of one AP,  it is handed over to the next AP.
Wireless access point vs. wireless router
Typically, wireless routers are used in homes and small businesses where all users can be supported by one combined AP and router. Wireless APs are used in larger businesses and venues where many APs are required to provide service to support thousands of users. The number of access points needed will increase as a function of the number of network users and the physical size of the network.
Purchasing a wireless access point
It's important to note that not all APs are alike, and not all products offer the same features and performance. Here are a few must-have features and capabilities that are of particular interest to enterprises:
Nondisruptive scalability - APs should be supported transparently and be backwards-compatible.
Dual Gigabit-Ethernet ports - Every dual-radio AP should have two GbE ports.
Support for dense deployments - Dense deployments require additional APs.
Enhanced management functions - Management functions should improve productivity and total cost of ownership, as well as throughput and reliability.
802.11ax access points
802.11ax access points provide 802.11ac capabilities, but can also tell an Internet of Things (IoT) client how long to sleep before reconnecting to the network. For example, it might tell a smart thermostat that doesn't generate a lot of traffic to shut off its radio for 23 hours, 59 minutes and 40 seconds, waking up just once daily to send a temperature and humidity update, before going back to sleep.
When comparing 802.11ax vs. 802.11ac, other significant developments include:
The use of orthogonal frequency-division multiple access, which lets an AP service multiple wireless clients at different bandwidth requirements simultaneously.
Bidirectional improvements in multiuser multiple input, multiple output radio processes.
A feature called basic service set (BSS) coloring, which deals with co-channel interference by adding a field to the wireless frame that overcomes issues associated with same-frequency cell coexistence.
items for which January is the official month


January 1st:                     New Year’s Day
January 1st:                     World Day of Peace
January 9th:                     National Law Enforcement Appreciation Day  (Thin Blue Line)
January 11th:                   National Human Trafficking Awareness Day  (Blue)
January 12th:                   National Pharmacist Day
January 19th:                   World Religion Day
January 20th:                   Martin Luther King Jr. Day
January 25th:                   Chinese New Year  (Year of the Rat)
January 26- February 1:                 Catholic School Week
Cervical Cancer Awareness Month  (Teal)
Glaucoma Awareness Month  (Green)
Thyroid Awareness Month  (Pink-Purple-Teal)
Blood Donor Month  (Red)
Birth Defects Awareness Month  (Pink-Blue)
National Slavery and Human Trafficking Prevention Month  (Blue)







========================================  
For a great satire on email, please see the following:
https://www.youtube.com/watch?v=HTgYHHKs0Zwscoop_post=bcaa0440-2548-11e5-c1bd-90b11c3d2b20&__scoop_topic=2455618
=============================================== 
Good Netiquette And A Green Internet To All! 



++++++++++++++++++++++++++++++++++++++++++++++++++++


Every year millions of Americans find themselves unable to vote because they miss a registration deadline, don’t update their registration, or aren’t sure how to register.

Our partners at Vote Forward have made it easy to contact historically under-represented, not-yet-registered voters living in key 2020 swing states to provide them with everything they need to register to vote.

Click the link to set up an account or sign in, then scroll down to the second row of options and choose one of the campaigns that includes voter registration forms.


+++++++++++++++++++++++++++++++++++++++++++++++++






air gapping
Air gapping is a security measure that involves physically isolating a computer or network to prevent it from connecting directly or wirelessly to other systems that can connect to the Internet. Air gapping is used to protect many types of critical systems, including those that support the stock market, the military, the government and industrial power industries.
To prevent unauthorized data extrusion through electromagnetic or electronic exploits, there must be a specified amount of space between the air-gapped system and outside walls and between its wires and the wires for other technical equipment. In the United States, the U.S. National Security Agency TEMPEST project provides best practices for using air gaps as a security measure.

For a system with extremely sensitive data, a Faraday cage can be used to prevent electromagnetic radiation (EMR) escaping from the air-gapped equipment. Although such measures may seem extreme, van Eck phreaking can be used to intercept data such as key strokes or screen images from demodulated EMR waves, using special equipment from some distance away. Other proof-of-concept (POC) attacks for air- gapped systems have shown that electromagnetic emanations from infected sound cards on isolated computers can be exploited and continuous wave irradiation can be used to reflect and gather information from isolated screens, keyboards and other computer components.

As of this writing, the Defense Advanced Research Projects Agency (DARPA) is awarding grants for prototype hardware and software designs that will keep sensitive data physically isolated. The grants are made possible under the Guaranteed Architecture for Physical Security (GAPS) program.

Enhancing air-gapped security measures

The problem with physical separation as a security technique is that, as complexity increases in some system or network to be isolated, so does the likelihood that some unknown or unauthorized external connection will arise.

Perhaps the most important way to protect a computing device or network from an air gap attack is through end user security awareness training. The infamous Stuxnet worm, which was designed to attack air-gapped industrial control systems, is thought to have been introduced by infected thumb drives found by employees or obtained as free giveaways.
The software-defined perimeter (SDP) framework is another tool network engineers can use to create a type of "virtual air gapping" through policy enforcement. SDP requires external endpoints that want to access internal infrastructure to comply with authentication policies and ensures that only authenticated systems can see internal IP addresses.


In my books, noted below, I often lament about the lack of civility, deterioration of written communication and abuse of the power of the Internet. Electronic communication, in my opinion, breeds negativity and behavior which does not exist in direct communication. 

The following is an except from my first book which addresses angry email replies.

Enjoy the article and check out the website!
================================================== 

======================    
 For a great satire on email, please see the following:
https://www.youtube.com/watch?v=HTgYHHKs0Zwscoop_post=bcaa0440-2548-11e5-c1bd-90b11c3d2b20&__scoop_topic=2455618
=============================================== 
Good Netiquette And A Green Internet To All! 

Special Bulletin - My just released book

"You're Hired. Super Charge our Email Skills in 60 Minutes! (And Get That Job...) 

is now on sales at Amazon.com 

Great Reasons for Purchasing Netiquette IQ
·         Get more email opens.  Improve 100% or more.
·         Receive more responses, interviews, appointments, prospects and sales.
·         Be better understood.
·         Eliminate indecision.
·         Avoid being spammed 100% or more.
·         Have recipient finish reading your email content. 
·         Save time by reducing questions.
·         Increase your level of clarity.
·         Improve you time management with your email.
·        Have quick access to a wealth of relevant email information.
Enjoy most of what you need for email in a single book.

 =================================

**Important note** - contact our company for very powerful solutions for IP
 management (IPv4 and IPv6, security, firewall and APT solutions:
www.tabularosa.net
==================================================

Another Special Announcement - Tune in to my radio interview,  on Rider University's station, www.1077thebronc.com I discuss my recent book, above on "Your Career Is Calling", hosted by Wanda Ellett.   

In addition to this blog, Netiquette IQ has a website with great assets which are being added to on a regular basis. I have authored the premiere book on Netiquette, “Netiquette IQ - A Comprehensive Guide to Improve, Enhance and Add Power to Your Email". My new book, “You’re Hired! Super Charge Your Email Skills in 60 Minutes. . . And Get That Job!” has just been published and will be followed by a trilogy of books on Netiquette for young people. You can view my profile, reviews of the book and content excerpts at:

 www.amazon.com/author/paulbabicki

In addition to this blog, I maintain a radio show on BlogtalkRadio  and an online newsletter via paper.li.I have established Netiquette discussion groups with Linkedin and  Yahoo I am also a member of the International Business Etiquette and Protocol Group and Minding Manners among others. I regularly consult for the Gerson Lehrman Group, a worldwide network of subject matter experts and I have been contributing to the blogs Everything Email and emailmonday . My work has appeared in numerous publications and I have presented to groups such as The Breakfast Club of NJ and  PSG of Mercer County, NJ.


I am the president of Tabula Rosa Systems, a “best of breed” reseller of products for communications, email, network management software, security products and professional services.  Also, I am the president of Netiquette IQ. We are currently developing an email IQ rating system, Netiquette IQ, which promotes the fundamentals outlined in my book.

Over the past twenty-five years, I have enjoyed a dynamic and successful career and have attained an extensive background in IT and electronic communications by selling and marketing within the information technology marketplace.Anyone who would like to review the book and have it posted on my blog or website, please contact me paul@netiquetteiq.com.
=============================================================


Sunday, January 19, 2020

From Tabula Rosa Systems - Celebrate MLK Day & What Is Deja Vu?


Let's Honor Martin Luther Jr. Day





From Thoughtco.com


Updated September 21, 2018 

The science of deja vu

If you’ve ever had the feeling that a situation feels very familiar even though you know it shouldn’t feel familiar at all, like if you’re traveling in a city for the very first time, then you’ve probably experienced déjà vu. Déjà vu, which means “already seen” in French, combines objective unfamiliarity – that you know, based on ample evidence, that something shouldn’t be familiar – with subjective familiarity – that feeling that it’s familiar anyway.
Déjà vu is common. According to a paper published in 2004, more than 50 surveys on déjà vu suggested that about two-thirds of individuals have experienced it at least once in their lifetime, with many reporting multiple experiences. This reported number also appears to be growing as people become more aware of what déjà vu is.
Most often, déjà vu is described in terms of what you see, but it’s not specific to vision and even people who were born blind can experience it.
Measuring Déjà Vu
Déjà vu is difficult to study in the laboratory because it is a fleeting experience, and also because there is no clearly identifiable trigger for it. Nevertheless, researchers have used several tools to study the phenomenon, based on the hypotheses they’ve put forward. Researchers may survey participants; study possibly related processes, especially those involved in memory; or design other experiments to probe déjà vu.
Because déjà vu is hard to measure, researchers have postulated many explanations for how it works. Below are several of the more prominent hypotheses.
Memory Explanations
Memory explanations of déjà vu are based on the idea that you have previously experienced a situation, or something very much like it, but you don’t consciously remember that you have. Instead, you remember it unconsciously, which is why it feels familiar even though you don’t know why.
Single element familiarity
The single element familiarity hypothesis suggests you experience déjà vu if one element of the scene is familiar to you but you don’t consciously recognize it because it’s in a different setting, like if you see your barber out on the street.
Your brain still finds your barber familiar even if you don’t recognize them, and generalizes that feeling of familiarity to the entire scene. Other researchers have extended this hypothesis to multiple elements as well.
Gestalt familiarity
The gestalt familiarity hypothesis focuses on how items are organized in a scene and how déjà vu occurs when you experience something with a similar layout. For example, you may not have seen your friend’s painting in their living room before, but maybe you’ve seen a room that’s laid out like your friend’s living room – a painting hanging over the sofa, across from a bookcase. Since you can’t recall the other room, you experience déjà vu.
One advantage to the gestalt similarity hypothesis is that it can be more directly tested. In one study, participants looked at rooms in virtual reality, then were asked how familiar a new room was and whether they felt they were experiencing déjà vu.
The researchers found that study participants who couldn’t recall the old rooms tended to think a new room was familiar, and that they were experiencing déjà vu, if the new room resembled old ones. Furthermore, the more similar the new room was to an old room, the higher these ratings were.
Neurological Explanations
Spontaneous brain activity
Some explanations posit that déjà vu is experienced when there is spontaneous brain activity unrelated to what you’re currently experiencing. When that happens in the part of your brain dealing with memory, you can have a false feeling of familiarity.
Some evidence comes from individuals with temporal lobe epilepsy, when abnormal electrical activity occurs in the part of the brain dealing with memory. When the brains of these patients are electrically stimulated as part of a pre-surgery evaluation, they may experience déjà vu.
One researcher suggests that you experience déjà vu when the parahippocampal system, which helps identify something as familiar, randomly misfires and makes you think something is familiar when it shouldn’t. 
Others have said that déjà vu can’t be isolated to a single familiarity system, but rather involves multiple structures involved in memory and the connections between them.
Neural transmission speed
Other hypotheses are based on how fast information travels through your brain. Different areas of your brain transmit information to “higher order” areas that combine the information together to help you make sense of the world. If this complex process is disrupted in any way – perhaps one part sends something more slowly or more quickly than it usually does – then your brain interprets your surroundings incorrectly.
Which Explanation is Correct?
An explanation for déjà vu remains elusive, though the hypotheses above appear to have one common thread: a temporary error in cognitive processing. For now, scientists can continue to design experiments that more directly probe the nature of déjà vu, to be more certain of the correct explanation.
Sources


items for which January is the official month


January 1st:                     New Year’s Day
January 1st:                     World Day of Peace
January 9th:                     National Law Enforcement Appreciation Day  (Thin Blue Line)
January 11th:                   National Human Trafficking Awareness Day  (Blue)
January 12th:                   National Pharmacist Day
January 19th:                   World Religion Day
January 20th:                   Martin Luther King Jr. Day
January 25th:                   Chinese New Year  (Year of the Rat)
January 26- February 1:                 Catholic School Week
Cervical Cancer Awareness Month  (Teal)
Glaucoma Awareness Month  (Green)
Thyroid Awareness Month  (Pink-Purple-Teal)
Blood Donor Month  (Red)
Birth Defects Awareness Month  (Pink-Blue)
National Slavery and Human Trafficking Prevention Month  (Blue)







========================================  
For a great satire on email, please see the following:
https://www.youtube.com/watch?v=HTgYHHKs0Zwscoop_post=bcaa0440-2548-11e5-c1bd-90b11c3d2b20&__scoop_topic=2455618
=============================================== 
Good Netiquette And A Green Internet To All! 



++++++++++++++++++++++++++++++++++++++++++++++++++++


Every year millions of Americans find themselves unable to vote because they miss a registration deadline, don’t update their registration, or aren’t sure how to register.

Our partners at Vote Forward have made it easy to contact historically under-represented, not-yet-registered voters living in key 2020 swing states to provide them with everything they need to register to vote.

Click the link to set up an account or sign in, then scroll down to the second row of options and choose one of the campaigns that includes voter registration forms.


+++++++++++++++++++++++++++++++++++++++++++++++++






air gapping
Air gapping is a security measure that involves physically isolating a computer or network to prevent it from connecting directly or wirelessly to other systems that can connect to the Internet. Air gapping is used to protect many types of critical systems, including those that support the stock market, the military, the government and industrial power industries.
To prevent unauthorized data extrusion through electromagnetic or electronic exploits, there must be a specified amount of space between the air-gapped system and outside walls and between its wires and the wires for other technical equipment. In the United States, the U.S. National Security Agency TEMPEST project provides best practices for using air gaps as a security measure.

For a system with extremely sensitive data, a Faraday cage can be used to prevent electromagnetic radiation (EMR) escaping from the air-gapped equipment. Although such measures may seem extreme, van Eck phreaking can be used to intercept data such as key strokes or screen images from demodulated EMR waves, using special equipment from some distance away. Other proof-of-concept (POC) attacks for air- gapped systems have shown that electromagnetic emanations from infected sound cards on isolated computers can be exploited and continuous wave irradiation can be used to reflect and gather information from isolated screens, keyboards and other computer components.

As of this writing, the Defense Advanced Research Projects Agency (DARPA) is awarding grants for prototype hardware and software designs that will keep sensitive data physically isolated. The grants are made possible under the Guaranteed Architecture for Physical Security (GAPS) program.

Enhancing air-gapped security measures

The problem with physical separation as a security technique is that, as complexity increases in some system or network to be isolated, so does the likelihood that some unknown or unauthorized external connection will arise.

Perhaps the most important way to protect a computing device or network from an air gap attack is through end user security awareness training. The infamous Stuxnet worm, which was designed to attack air-gapped industrial control systems, is thought to have been introduced by infected thumb drives found by employees or obtained as free giveaways.
The software-defined perimeter (SDP) framework is another tool network engineers can use to create a type of "virtual air gapping" through policy enforcement. SDP requires external endpoints that want to access internal infrastructure to comply with authentication policies and ensures that only authenticated systems can see internal IP addresses.


In my books, noted below, I often lament about the lack of civility, deterioration of written communication and abuse of the power of the Internet. Electronic communication, in my opinion, breeds negativity and behavior which does not exist in direct communication. 

The following is an except from my first book which addresses angry email replies.

Enjoy the article and check out the website!
================================================== 

======================    
 For a great satire on email, please see the following:
https://www.youtube.com/watch?v=HTgYHHKs0Zwscoop_post=bcaa0440-2548-11e5-c1bd-90b11c3d2b20&__scoop_topic=2455618
=============================================== 
Good Netiquette And A Green Internet To All! 

Special Bulletin - My just released book

"You're Hired. Super Charge our Email Skills in 60 Minutes! (And Get That Job...) 

is now on sales at Amazon.com 

Great Reasons for Purchasing Netiquette IQ
·         Get more email opens.  Improve 100% or more.
·         Receive more responses, interviews, appointments, prospects and sales.
·         Be better understood.
·         Eliminate indecision.
·         Avoid being spammed 100% or more.
·         Have recipient finish reading your email content. 
·         Save time by reducing questions.
·         Increase your level of clarity.
·         Improve you time management with your email.
·        Have quick access to a wealth of relevant email information.
Enjoy most of what you need for email in a single book.

 =================================

**Important note** - contact our company for very powerful solutions for IP
 management (IPv4 and IPv6, security, firewall and APT solutions:
www.tabularosa.net
==================================================

Another Special Announcement - Tune in to my radio interview,  on Rider University's station, www.1077thebronc.com I discuss my recent book, above on "Your Career Is Calling", hosted by Wanda Ellett.   

In addition to this blog, Netiquette IQ has a website with great assets which are being added to on a regular basis. I have authored the premiere book on Netiquette, “Netiquette IQ - A Comprehensive Guide to Improve, Enhance and Add Power to Your Email". My new book, “You’re Hired! Super Charge Your Email Skills in 60 Minutes. . . And Get That Job!” has just been published and will be followed by a trilogy of books on Netiquette for young people. You can view my profile, reviews of the book and content excerpts at:

 www.amazon.com/author/paulbabicki

In addition to this blog, I maintain a radio show on BlogtalkRadio  and an online newsletter via paper.li.I have established Netiquette discussion groups with Linkedin and  Yahoo I am also a member of the International Business Etiquette and Protocol Group and Minding Manners among others. I regularly consult for the Gerson Lehrman Group, a worldwide network of subject matter experts and I have been contributing to the blogs Everything Email and emailmonday . My work has appeared in numerous publications and I have presented to groups such as The Breakfast Club of NJ and  PSG of Mercer County, NJ.


I am the president of Tabula Rosa Systems, a “best of breed” reseller of products for communications, email, network management software, security products and professional services.  Also, I am the president of Netiquette IQ. We are currently developing an email IQ rating system, Netiquette IQ, which promotes the fundamentals outlined in my book.

Over the past twenty-five years, I have enjoyed a dynamic and successful career and have attained an extensive background in IT and electronic communications by selling and marketing within the information technology marketplace.Anyone who would like to review the book and have it posted on my blog or website, please contact me paul@netiquetteiq.com.
=============================================================