colinardo 4 days ago Comment in: Elon Musk acquires Twitter 3 comments
Different cocaine levels sometimes lead to different opinions 💊😉.
firefly 4 days ago Comment in: Elon Musk acquires Twitter 3 comments
Elon is putting on the brakes for the time being. Was he possibly not serious about the takeover after all?

Twitter deal temporarily on hold pending details supporting calculation that spam/fake accounts do indeed represent less than 5% of users
glsunmall 12 days ago Smart Optical Line Protection for Optical Transmission NetworkShowcase
With the deepening of networking, information and data, the guarantee of optical transmission network has gradually become the core work of operators. However, the stability of the transmission network is seriously affected by the damage of optical fiber, line interruption, power failure of equipment and board failure in the current network.

A smart optical line protection system olp provides all-round protection of the stability of optical transmission network, by solving problems of instability caused by construction damage, man-made sabotage, natural disasters, power outage, board failure, etc.

Solution - OLP 1:1
There are two lines between site A site B, the optical transmission system selects one of the transmission lines as the mainline the other as the backup line to transmit the primary signal not transmit signal.

When the mainline an optical fiber/cable of the mainline fails, resulting in the decreasing of communication quality, the receiving terminal of the mainline monitors the power drop of the signal automatically switches the transmission signal route from the mainline to the backup line. The OLP equipment on the other side will synchronously switch the local line to the backup line.
olp 1:1

Solution - OLP 1+1
The optical signal from site A is beamed by a 50:50 coupler transmitted to site B through the main backup lines at the same time. At the receiving terminal, the receiver of site B chooses to receive one signal according to the power of the two signals received. Insertion loss is 5dB.
olp 1+1

Solution - OLP-PON
It features transparent transmission, high stability, high reliability. Real-time monitor optical power of main and backup fibers is in place, which can improve the reliability of transmission network, realize automatic recovery of communication in a very short period of time.
olp pon

Solution - OBP (Bypass)
It features bypass protection of no optical signal, bypass protection of power down, with low insertion loss fast switching. It supports serial port, network management, management via panel button, with built-in heartbeat intelligent detection.

Solution - OLP BIDI
This solution is applicable when lacking optical core resources in urgent need to protect the important line. It supports backup fiber monitoring, as well as serial port, network management, management via panel button. It features double transmitter receiver selectively, transmitter simultaneously receiver selectively, lock without optical signal, has low insertion loss fast switching.
olp bidi

Solution - OCP (N+1:N)
It features one backup line which can be shared by multi-line, with low insertion loss, fast switching, high stability, reliability. Transparent transmission signal.

Solution - EDFA, DCM
It is applicable areas include fiber backbone network long-distance transmission amplification, optical signal power amplification before optical signal split flow, optical signal power amplification before the optical receiver equipment receives it. Working mode: APC, AGC, ACC, etc. It supports serial port, network management, management via panel button, featuring high gain, low noise, low gain flatness, adjus gain.
edfa dcm
colinardo 14 days ago Knowledge: Exchange Online - Standard Authentication will be permanently disabled starting 01. October
Hello everyone!

All admins who still use the Standard-Authentication Method in Exchange Online (M365) in production are strongly advised to change this as soon as possible because this feature will be deactivated permanently at the end of the year. The deactivation will be carried out in stages from 01 October 2022 in all tenants. From this date on, you should expect the permanent deactivation at any time.
There will be no exceptions for tenants this time.

For details see
Basic Authentication Deprecation in Exchange Online - May 2022 Update

Disabling Basic Authentication in Exchange Online

Regards @colinardo
factmrreports 16 days ago Rise in Financial Transaction Volumes to Spur the Demand for Financial Analytics MarketShowcase
The financial analytics market is expected to grow a Y-o-Y expansion rate of nearly 11%. Rising financial transaction volumes across key verticals has led to increased uptake of efficient financial analytics tools.

Forecast of Financial Analytics Market
Broad digitization, complicating nature of various financial transactions, increasing requirement to safeguard sensitive financial exchanges and heavy reliance on big data have all contributed enormously to the uptake of financial analytics throughout the 2015-2021 period of assessment.
With the industries experiencing the increase in scale of operations, it is no surprise that they are seeking approaches to ease financial operations. The requirement to efficiently manage and streamline financial dealings has become the need of the hour. With virtually every vertical shifting business online in certain areas, courtesy the pandemic, implementation of high-grade financial analytics platforms is sure to incline.

Growth Drivers of the Financial Analytics Industry
Every industry is at an end of revolution, with digitization and Industry 4.0 attaining operations. As the volume of digital financial transactions prosper, the requirement for designing robust security and workflow optimization platforms has developed.
Throughout the pandemic’s life cycle, there were extraordinary changes in human behavior. Working models changed dramatically, with key industries promised to switch permanently to the virtual space. Mobile transactions increased, with personal trading apps recording voluminous transaction frequencies. It was reported that in the United States alone, over a third of consumers increased the usage of online banking during the pandemic.
While the industry has managed to control the fall, it has become clear that the winds of change are not transient. Digital adoption rates are getting higher, a cookie less future looms large, and data governance has taken center stage.
Furthermore, financial institutions will need to rethink data architecture, data collection strategies, measurement models, and how they can responsibly benefit the data to target the right people, advertise their products, and personalize experiences across their digital properties. So, investments in advanced financial analytics platforms is becoming evident. This is expected to propel the demand for financial analytics.

Financial Analytics Market benefits the E-Commerce Industry?
The e-commerce industry is stepping into a new era. After the primary phase wherein, companies concentrated highly on making their products and services available to potential customers via the internet, users are now trying to take a more comprehensive look at their implementations, one that correlates each sale to their entire operation. Eventually, a new breed of financial analytics tools is emerging.
Financial analytics tools allowing the businesses to interact such items as software depreciation or sales leads are becoming highly important. In fact, analytics has become a top management concern in many enterprises due to e-commerce advances mean that virtually every market segment faces more competition now than ever before.
The internet has declined many of the traditional geographical barriers that companies used to cover off competitors, so firms can market their goods and services across the globe.
To support the ever-increasing transaction volumes, prominent e-commerce giants are expected to take advantage of the available financial analytics tools in the market and streamline workflows, identify anomalies and frauds and ensure financial security.

Financial Analytics Usage in Wealth Management
Wealth management is an important key aspect for multiple industries, which is why the requirement to incorporate advanced financial analytics is rising. Frequently, the wealth management industry has been demonstrating accurate values and offering tailor-made services.
Coupled with stiff market competition, digitizing financial and wealth management services is generating better results for businesses. Wealth managers are expected to be able to serve modern clients effectively without a digitized operating model. This will enhance the advisory and non-advisory activities and service ever changing investment preferences

The existence of an enormous number of service providers delivers the global financial analytics market highly competitive. Key players are providing largely innovative software solutions, associated to rapid digitization of the global financial landscape. Additionally, major growth strategies such as mergers & acquisitions, collaborations and partnerships are also depending on the financial analytics.
factmrreports 16 days ago factmrreports has registered
Focus: Internet in general - User group: Consultant.
colinardo 17 days ago Comment in: NAT explained 2 comments
:-) face-smile.

rawatnimisha 18 days ago Phishing and The New Age of Email Security and TrustShowcase
We usually hear the term ‘phishing’ but don't fully comprehend its implications. This word refers to a larger category that includes a variety of targeted email attacks. Cybercriminals emphasize simple, low-cost assaults with a high likelihood of entangling victims. The economics must make sense, whether it's phishing (low cost, wide net) or spear-phishing (higher cost, high-value target). Phishing through email throws up a whole new can of worms in cyberspace.

Phishing and its types
When massive phishing assaults impair networks, energy systems, or other infrastructure, most Americans become aware of them. But it's not the ‘Big One’ that's the problem; it's the billions of phishing emails sent every day, which account for more than 90% of all attacks.

The most common type of phishing is fraudulent phishing, which tosses and draws victims into a vast web. Although most throws do not yield lucrative fish, a net this large will almost certainly capture a few good ones. It frequently looks to come from respectable senders and steals information by impersonating a real company or brand. Cybercriminals utilize phishing emails to acquire personal information and credentials, and they employ a variety of deception techniques:

To fool Exchange Online Protection, harmful and non-malicious code is mixed together (EOP).
Integrate legal links to prevent email filters from detecting them (and sending them to spam folders).
Taking and altering the logos of other companies or organizations.
Sending emails with only a few lines of text.
After an email arrives in a user's inbox, using abbreviated URLs to fool Secure Email Gateways (SEGs) or logic bombs and time bombs to redirect users to phishing landing pages.

Spearfishing takes a more personal approach (think handmade decoy), in which fraudsters personalize phishing emails using recipients' personal information to make them believe they are connected to the sender. This method also deceives people into opening malicious attachments or visiting URLs that gather personal information. Spear phishing assaults utilize a variety of techniques, including:

Attempting to compromise API or session tokens to get access to business resources like SharePoint sites and employee email accounts.
Using social media to investigate organizational structures in order to identify potential targets for assaults.
Detecting (and replicating) internal email formats by sending bulk emails to gather out-of-office responses.

Another phishing technique that has devastating effects if successful is whaling. It involves Business Email Compromise (BEC), in which attackers fake CEO or high-level executive sender information and domains to conduct fraud. Whaling attacks are similar to spear-phishing assaults in that they employ the same strategies. Hackers, on the other hand, utilize a hacked executive's account to obtain access to a corporation for financial benefit.

The lying trails
A close examination of these recent phishing efforts will reveal a pattern: the sender is not who or what they claim to be. In fact, 89% of all current phishing assaults have one thing in common: the sender's identity. When the assault is predicated on the sender and targeted for impersonation, it is far more difficult to filter/detect the false emails—and much more likely to capture the victim. Hackers take advantage of the fact that email is not verified by default, which is a little-known fact. Anyone may compose an email as someone else if there is no email authentication.

DMARC and phishing
Every day, cybercriminals send approximately three billion fake emails. A phishing or spoofing assault occurs in one out of every 100 emails. These attacks are protected by DMARC (Domain-based Message Authentication, Reporting, and Conformance) enforcement.

Unfortunately, only a few individuals outside of the email geeks’ circles are aware of it. In the email community, this open standard, DMARC, has a lot of support. In the larger security and brand protection industries, it has just lately gained increased recognition and acceptance as a compliance/best practice. Adoption can also be influenced by awareness and compliance. All federal agencies were instructed to implement DMARC, resulting in 92% of government email DMARC records being put in place and enforced. Only 22% of leading retailers, 30% of Fortune 500 domains, and 36% of significant banks, on the other hand, have complete DMARC enforcement. But that's changing fast: DMARC will be adopted by 70,000 businesses within this year alone.

DMARC is a tried-and-true form of email authentication that, when combined with typical email security measures, provides significant protection against a common email phishing attack vector: the sender's identity. Only approved senders can use the domain in the ‘From’ field of their email messages since DMARC is properly applied in enforcement. DMARC operates in the background, and most users are oblivious to its presence—which is exactly how it should be.

DMARC protects companies from misuse, prevents consumers and partners from getting false emails, and offers the control and freedom needed to validate data protection laws like GDPR and CCPA.

In the end, leaving our major communication tool (email) vulnerable to phishing is no longer an option. DMARC gives all organizations a mechanism to eliminate phishing, one of the most common forms of email fraud, leading us into a new era in which we can trust our emails once more.
Windows10Gegner 20 days ago Comment in: NAT explained 2 comments
I'm kind of looking forward to NAT losing its importance and prevalence with IPv6. :-) face-smile
michi1983 20 days ago NAT explained 2 comments
Hi all,

I just found - for me - a really nice Meme which describes NAT in a very cute way 😂


Have fun and a nice weekend!

glsunmall 22 days ago OTS3000 Fiber Cable Monitoring Solutions for Data Center Interconnect and Optical NetworkingShowcase
OTS3000 series fiber optical cable monitoring system combines with OTDR, optical switch, and upper-level network management software to form a systematic and intelligent system integrating functions of testing, analysis, alarm, positioning, information management and worksheet. It features on high density integration, strong commonality, abundant product form, flexible upgrading and expansion.
ots3000 fiber cable monitoring system

Fiber In-Service Monitoring
Light sources of different wavelengths will not interfere with each other in the transmission process in optical fiber. Based on this principle, we combine the service light [wavelength 1550] and test light [wavelength 1650] for transmission, so that the quality of optical fiber can be monitored without interruption of service.

Spare Fiber Monitoring
Spare fiber monitoring is to inject the monitoring signal into the spare fiber and indirectly observe the loss of other fiber in the cable by monitoring the loss of the spare fiber. Since the monitoring signal goes through the spare optical fiber, passive device such as filter is not required, which can effectively reduce the installation process and cost of the system.

Fiber Out-of-Service Monitoring
Optical fiber out-of-service monitoring refers to monitoring the original communication optical fiber in the condition that communication equipment is interrupted. Therefore, passive devices such as filter are not required, which can effectively reduce the installation process and system cost of the system. The disadvantage is that communication equipment needs to be interrupted.
firefly 24 days ago Comment in: Its back: Mini version of the Amiga 500 is available 2 comments

I still have a working Amiga 1200 in original box with me. Here and there I unpack it and look forward to retro gaming. Unfortunately the disks with the games are failing.

My "highlights" were

  • Speedball 2,
  • Barbarian,
  • Giana Sisters,
  • Ikari Warriors,
  • Lemmings,
  • Populous,
  • R-Type,
  • Silk Worm,
  • Turrican
  • and of course Battle Chess

:-) face-smile

firefly 24 days ago Comment in: Elon Musk acquires Twitter 3 comments
I'm interested to see what changes.

What I always missed on Twitter is the subsequent editing of spelling mistakes. Not the whole text, because otherwise they might not make sense anymore, but at least small corrections should be possible. The way it is handled here on this site is great.

Also the max text length is suboptimal. Threads like 1/5, 2/5 etc. are created quickly.

Frank 25 days ago Knowledge: Elon Musk acquires Twitter 3 comments
Hi guys,

Elon Musk is acquiring Twitter after all! On 25.04.2002, the Twitter board of directors surprisingly approved the complete acquisition. For about 44 billion US dollars Twitter goes over the table (54.20 US dollars per share). Musk wants to take the service off the stock exchange later. ...

According to Musk, he wants to strengthen and preserve free expression as the backbone of democracy on Twitter, improve that product by introducing new features, disclose the source code for selecting posts in the Twitter feed to build trust, and ban spambots from the platform for good.

Since we also enjoy using the service, I'm curious to see what Musk ultimately makes of it. What is your opinion on this?

Frank 28 days ago Knowledge: MacOS Server app was discontinued
The macOS Server app can no longer be installed via the Apple App Store as of 04/21/2022. Back in 2018, Apple discontinued the full Apple Server and since then released an additional server app that could be loaded with any macOS, at an additional cost. This app is now history.

Since the app had lost more and more functions over the years, it hardly plays a role today. Services like Caching Server, File Sharing Server, or the Time Machine Server are now completely integrated into macOS. However, removing it means losing the Profile Manager as well as Apple's official Open Directory support. As a replacement for the Profile Manager, Apple recommends switching to the mobile-device-management-solution. Open source replacements exist today for most other services.

Here is Apple's official announcement on this.

The previous server page on Apple can still be reached:


glsunmall 29 days ago What is QSFP28 100G SR4 Optical Tranceiver ModuleShowcase
QSFP28 100G SR4 optical transceiver is a short range multi-mode 100G QSFP28 optical module offers offers 4 independent transmit and receive channels, each capable of 25Gb/s operation for an aggregate data rate of 100Gb/s. This module can reach up to reach up to 70m on OM3 or 100m on OM4 multi-mode fiber.

Cisco QSFP-100G-SR4-S Compatible QSFP28 fiber optical transceiver is an integrated transceiver module containing a micro-optic component and semiconductor material, and can implement optical-electrical conversion and electrical-optical conversion. And the operating wavelength is 850nm. The optical interface uses a 12-fiber MTP/MPO connector, and the electrical interface uses a 38 contact edge type connector. This product is compliant to 100GBASE-SR4 of IEEE802.3bm standard and SFF-8436 specification, and provides reliable long life, high performance, and consistent service.

100gbase-sr4 qsfp28 optical transceiver module2