<?xml version="1.0"?>
<?xml-stylesheet type="text/css" href="https://pm.haifa.ac.il/skins/common/feed.css?207"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
		<id>https://pm.haifa.ac.il/index.php?feed=atom&amp;target=MargueriteLongoria398&amp;title=Special%3AContributions</id>
		<title>P-MART wiki - User contributions [en]</title>
		<link rel="self" type="application/atom+xml" href="https://pm.haifa.ac.il/index.php?feed=atom&amp;target=MargueriteLongoria398&amp;title=Special%3AContributions"/>
		<link rel="alternate" type="text/html" href="https://pm.haifa.ac.il/index.php?title=Special:Contributions/MargueriteLongoria398"/>
		<updated>2026-04-18T08:25:32Z</updated>
		<subtitle>From P-MART wiki</subtitle>
		<generator>MediaWiki 1.15.1</generator>

	<entry>
		<id>https://pm.haifa.ac.il/index.php?title=User:MargueriteLongoria398</id>
		<title>User:MargueriteLongoria398</title>
		<link rel="alternate" type="text/html" href="https://pm.haifa.ac.il/index.php?title=User:MargueriteLongoria398"/>
				<updated>2012-07-03T09:16:59Z</updated>
		
		<summary type="html">&lt;p&gt;MargueriteLongoria398:&amp;#32;Created page with 'Cisco's newest Carrier Quality Web Protocol Edition six (CGv6) Answer accelerates the migration of wireline and wireless clients to Internet Protocol version 6 (IPv6), manages th…'&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Cisco's newest Carrier Quality Web Protocol Edition six (CGv6) Answer accelerates the migration of wireline and wireless clients to Internet Protocol version 6 (IPv6), manages the continuing proliferation in IP-enabled gadgets, and prepares service provider networks for services expansion.&lt;br /&gt;
&lt;br /&gt;
With assist from IPv6 fast deployment technology, also recognized as 6rd, the Cisco IP Next-Era Internet (IP NGI) solution deployed by ATT is based on the Cisco Carrier-Quality Services Engine (CGSE) for the Cisco Carrier Routing Method (CRS) family members. Cisco's solutions have been helpful in managing the transition from an all IPv4 community to availability of IPv6 support. ATT can simultaneously serve new and existing clients with IPv4 or IPv6 services. In addition, ATT can support tens of gigabits of throughput and hundreds of 1000's of clients whilst growing incrementally, as required, for new revenue-producing solutions. To deal with the fast growth of IP visitors and gadgets, ATT is effectively controlling the impending exhaustion of IPv4 deal with.&lt;br /&gt;
&lt;br /&gt;
According to the Cisco Visual Networking Index: Forecast and Methodology, 2011-2016, there will be nearly 19 billion devices connected to the network in 2016  an average of more than 2.five networked gadgets for each capita for every individual on earth.&lt;br /&gt;
&lt;br /&gt;
The Cisco Carrier-Quality IPv6 (CGv6) answer outlines a methodical blueprint for service providers creating the changeover to IPv6. The Cisco CGv6 answer functions technology improvements in the CRS family and Cisco Aggregation Services Router (ASR) Collection, widespread IPv6 assistance throughout the entire portfolio and customizable migration services to relieve the changeover.&lt;br /&gt;
Powered by a multi-core central processing unit, each Cisco CGSE scales to tens of hundreds of thousands of address translations and gateway functionality with tens of gigabits of throughput for hundreds of thousands of customers or usersoffering an built-in solution with the industry's greatest overall performance and scale.&lt;br /&gt;
IPv6 was developed by the Web Engineering Job Power (IETF) to deal with this long-anticipated IPv4 deal with exhaustion, which is most likely to occur in North The united states someday in 2013 according to RIPE.&lt;br /&gt;
&lt;br /&gt;
Surya Panditi, Senior Vice President and General Manager, Service Provider Networking Group, Cisco&lt;br /&gt;
We are pleased to work with ATT on Cisco's Internet Protocol Subsequent-Era Community options, which have been instrumental in the Web build-out since its inception. The implementation of this technology complements our IPv6 solution portfolio, assisting services providers deal with immediate issues as they preserve and put together their networks for long-term achievement, prosperity and business development.&lt;br /&gt;
&lt;br /&gt;
A 20-individual oil and gas exploration business recently faced a problem when a senior-level executive left, using his individual Blackberry with him. &amp;quot;He experienced photos of his kids, alongside with email messages about offers they had been renegotiating and all sorts of corporate contacts,&amp;quot; states Smith LWC, who runs Genuine-Time Pc Solutions [http://www.linkwaves.com Buy Cisco] in Ardsley, NY, and labored with the firm.&lt;br /&gt;
&lt;br /&gt;
But, the business had only recently started allowing workers to use their personal mobile devices for work and had little expertise dealing with the matter. Ought to they wipe out everything on the gadget, such as pictures of holidays and weddings, or let it all stay with an assurance from the executive that he would delete corporate data on his personal?&lt;br /&gt;
&lt;br /&gt;
In the finish, according to Rosenbaum, the business made the decision not to wipe out the data. Rather, the proprietors would take the executive, a lengthy-time and trusted worker, at his word that he would get rid of sensitive corporate date from his Blackberry.&lt;br /&gt;
&lt;br /&gt;
BYOD: It's an inexorable wave you can't disregard. An acronym for Bring Your Personal Gadget, the term, of program, refers to the expanding pattern for employees to use their personal, personal iPhones, Androids, iPads or other gear rather of business-owned and provided gizmos.&lt;br /&gt;
&lt;br /&gt;
It's also by no indicates just a big company phenomenon. In fact, 70% of little businesses lately surveyed said that BYOD was inevitability at their companies, simply because so numerous employees were demanding it, in accordance to Austin-based market study firm iGR.&lt;br /&gt;
&lt;br /&gt;
But, as Rosenbaum's consumer discovered, turning your small company into a BYOD workplace isn't as easy as it may seem at initial glance. There's a wide variety of safety and management problems you need to think about. And, for small businesses that might lack the resources or staff to oversee and support all these various devices, it can be a particularly sensitive matter.  &amp;quot;BYOD can bring huge productiveness gains,&amp;quot; states Herve Danzelaud, vice president of company improvement for Great Technology, [http://www.linkwaves.com Purchase Cisco], a cellular security consulting firm in Sunnyvale, Cal. &amp;quot;But it is not always simple to implement.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
The answer is to think through all the potential problems beforehand and, when suitable, consist of them in a written company policy. With that in thoughts, here's a look at 4 major considerations and the best way to method them.&lt;br /&gt;
&lt;br /&gt;
When employees lose their deviceor depart the business&lt;br /&gt;
&lt;br /&gt;
One big problem is the one that faced Rosenbaum's client: what to do if, say, an employee forgets an Iphone in the airportor just plain quits? Since the gadget undoubtedly was connected to your server, you have the ability to wipe out all those emails about, for instance, confidential plans. But that also indicates eradicating the individual photos, songs and other programs most likely sitting down on the gadget, as nicely.   &lt;br /&gt;
&lt;br /&gt;
Your very best transfer: This is an issue exactly where having a written policy is of utmost importance. The central matter: Who owns the data residing on employees' gadgets? With that in mind, your policy ought to include that, when employees depart your company, the information on their devices will be wiped out. Exact same thing goes for, say, an iPad neglected on a suburban commuter train. An additional approach: separate corporate and personal data, requiring different passwords to get in. &amp;quot;Employees would require a extremely strong password to access business data and a various one for personal information,&amp;quot; states Danzelaud. In addition, you ought to inform employees to the need to back again up their personal pictures, contacts and the like, and, perhaps, offer advice on how to do that.&lt;br /&gt;
&lt;br /&gt;
Or, you can consider an additional tack. State you won't wipe out information but, at the exact same time, workers are obligated not to use confidential information as soon as they depart the business.&lt;br /&gt;
&lt;br /&gt;
One exception might be if you're in an industry, like health care, exactly where you deal with highly regulated, sensitive information. In that situation, according to Rosenbaum, you might not want to opportunity it at all. He recalls 1 consumer, a doctor's workplace, that lately decided not to permit BYOD because of to issues about affected person data confidentiality,&lt;br /&gt;
&lt;br /&gt;
How to support all those devices&lt;br /&gt;
&lt;br /&gt;
Most most likely, you have a small IT employees, or maybe none at all. How, then, can you support the additional devices your employees will be utilizing without hiring much more individuals or including to your already more than-labored employees?&lt;br /&gt;
&lt;br /&gt;
Your best move: It all depends on your sources. The less you have, the less responsibility you will be able to presume. Rosenbaum factors to a client, a 14-person accounting firm that lately allowed employees to use their iPhones. With just an workplace manager dealing with assistance, company proprietors produced it clear that workers had been accountable for handling technical problems. &amp;quot;I took care of connecting the telephone to the server, but after that, it wasn't part of the workplace manager's responsibilities,&amp;quot; says Rosenbaum.&lt;br /&gt;
&lt;br /&gt;
One useful move is to restrict the gadgets you permit. An additional is to create a checklist of steps workers should take, something from turning on spell check to utilizing a standard signature block at the finish of each email.&lt;br /&gt;
&lt;br /&gt;
[http://www.linkwaves.com Buy Cisco]&lt;br /&gt;
[http://www.linkwaves.com Sell Cisco]&lt;br /&gt;
[http://www.linkwaves.com/cisco-routers.html Cisco Routers]&lt;br /&gt;
[http://www.linkwaves.com/cisco-switches.html Cisco Switches]&lt;br /&gt;
[http://www.linkwaves.com/cisco-security.html Cisco Security]&lt;br /&gt;
[http://www.linkwaves.com/cisco-wireless.html Cisco Wireless]&lt;br /&gt;
[http://www.linkwaves.com/asset-recovery.html Cisco Asset Recovery]&lt;/div&gt;</summary>
		<author><name>MargueriteLongoria398</name></author>	</entry>

	<entry>
		<id>https://pm.haifa.ac.il/index.php?title=MargueriteLongoria398</id>
		<title>MargueriteLongoria398</title>
		<link rel="alternate" type="text/html" href="https://pm.haifa.ac.il/index.php?title=MargueriteLongoria398"/>
				<updated>2012-07-03T09:16:46Z</updated>
		
		<summary type="html">&lt;p&gt;MargueriteLongoria398:&amp;#32;Created page with 'Cisco's newest Carrier Quality Web Protocol Edition six (CGv6) Answer accelerates the migration of wireline and wireless clients to Internet Protocol version 6 (IPv6), manages th…'&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Cisco's newest Carrier Quality Web Protocol Edition six (CGv6) Answer accelerates the migration of wireline and wireless clients to Internet Protocol version 6 (IPv6), manages the continuing proliferation in IP-enabled gadgets, and prepares service provider networks for services expansion.&lt;br /&gt;
&lt;br /&gt;
With assist from IPv6 fast deployment technology, also recognized as 6rd, the Cisco IP Next-Era Internet (IP NGI) solution deployed by ATT is based on the Cisco Carrier-Quality Services Engine (CGSE) for the Cisco Carrier Routing Method (CRS) family members. Cisco's solutions have been helpful in managing the transition from an all IPv4 community to availability of IPv6 support. ATT can simultaneously serve new and existing clients with IPv4 or IPv6 services. In addition, ATT can support tens of gigabits of throughput and hundreds of 1000's of clients whilst growing incrementally, as required, for new revenue-producing solutions. To deal with the fast growth of IP visitors and gadgets, ATT is effectively controlling the impending exhaustion of IPv4 deal with.&lt;br /&gt;
&lt;br /&gt;
According to the Cisco Visual Networking Index: Forecast and Methodology, 2011-2016, there will be nearly 19 billion devices connected to the network in 2016  an average of more than 2.five networked gadgets for each capita for every individual on earth.&lt;br /&gt;
&lt;br /&gt;
The Cisco Carrier-Quality IPv6 (CGv6) answer outlines a methodical blueprint for service providers creating the changeover to IPv6. The Cisco CGv6 answer functions technology improvements in the CRS family and Cisco Aggregation Services Router (ASR) Collection, widespread IPv6 assistance throughout the entire portfolio and customizable migration services to relieve the changeover.&lt;br /&gt;
Powered by a multi-core central processing unit, each Cisco CGSE scales to tens of hundreds of thousands of address translations and gateway functionality with tens of gigabits of throughput for hundreds of thousands of customers or usersoffering an built-in solution with the industry's greatest overall performance and scale.&lt;br /&gt;
IPv6 was developed by the Web Engineering Job Power (IETF) to deal with this long-anticipated IPv4 deal with exhaustion, which is most likely to occur in North The united states someday in 2013 according to RIPE.&lt;br /&gt;
&lt;br /&gt;
Surya Panditi, Senior Vice President and General Manager, Service Provider Networking Group, Cisco&lt;br /&gt;
We are pleased to work with ATT on Cisco's Internet Protocol Subsequent-Era Community options, which have been instrumental in the Web build-out since its inception. The implementation of this technology complements our IPv6 solution portfolio, assisting services providers deal with immediate issues as they preserve and put together their networks for long-term achievement, prosperity and business development.&lt;br /&gt;
&lt;br /&gt;
A 20-individual oil and gas exploration business recently faced a problem when a senior-level executive left, using his individual Blackberry with him. &amp;quot;He experienced photos of his kids, alongside with email messages about offers they had been renegotiating and all sorts of corporate contacts,&amp;quot; states Smith LWC, who runs Genuine-Time Pc Solutions [http://www.linkwaves.com Buy Cisco] in Ardsley, NY, and labored with the firm.&lt;br /&gt;
&lt;br /&gt;
But, the business had only recently started allowing workers to use their personal mobile devices for work and had little expertise dealing with the matter. Ought to they wipe out everything on the gadget, such as pictures of holidays and weddings, or let it all stay with an assurance from the executive that he would delete corporate data on his personal?&lt;br /&gt;
&lt;br /&gt;
In the finish, according to Rosenbaum, the business made the decision not to wipe out the data. Rather, the proprietors would take the executive, a lengthy-time and trusted worker, at his word that he would get rid of sensitive corporate date from his Blackberry.&lt;br /&gt;
&lt;br /&gt;
BYOD: It's an inexorable wave you can't disregard. An acronym for Bring Your Personal Gadget, the term, of program, refers to the expanding pattern for employees to use their personal, personal iPhones, Androids, iPads or other gear rather of business-owned and provided gizmos.&lt;br /&gt;
&lt;br /&gt;
It's also by no indicates just a big company phenomenon. In fact, 70% of little businesses lately surveyed said that BYOD was inevitability at their companies, simply because so numerous employees were demanding it, in accordance to Austin-based market study firm iGR.&lt;br /&gt;
&lt;br /&gt;
But, as Rosenbaum's consumer discovered, turning your small company into a BYOD workplace isn't as easy as it may seem at initial glance. There's a wide variety of safety and management problems you need to think about. And, for small businesses that might lack the resources or staff to oversee and support all these various devices, it can be a particularly sensitive matter.  &amp;quot;BYOD can bring huge productiveness gains,&amp;quot; states Herve Danzelaud, vice president of company improvement for Great Technology, [http://www.linkwaves.com Purchase Cisco], a cellular security consulting firm in Sunnyvale, Cal. &amp;quot;But it is not always simple to implement.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
The answer is to think through all the potential problems beforehand and, when suitable, consist of them in a written company policy. With that in thoughts, here's a look at 4 major considerations and the best way to method them.&lt;br /&gt;
&lt;br /&gt;
When employees lose their deviceor depart the business&lt;br /&gt;
&lt;br /&gt;
One big problem is the one that faced Rosenbaum's client: what to do if, say, an employee forgets an Iphone in the airportor just plain quits? Since the gadget undoubtedly was connected to your server, you have the ability to wipe out all those emails about, for instance, confidential plans. But that also indicates eradicating the individual photos, songs and other programs most likely sitting down on the gadget, as nicely.   &lt;br /&gt;
&lt;br /&gt;
Your very best transfer: This is an issue exactly where having a written policy is of utmost importance. The central matter: Who owns the data residing on employees' gadgets? With that in mind, your policy ought to include that, when employees depart your company, the information on their devices will be wiped out. Exact same thing goes for, say, an iPad neglected on a suburban commuter train. An additional approach: separate corporate and personal data, requiring different passwords to get in. &amp;quot;Employees would require a extremely strong password to access business data and a various one for personal information,&amp;quot; states Danzelaud. In addition, you ought to inform employees to the need to back again up their personal pictures, contacts and the like, and, perhaps, offer advice on how to do that.&lt;br /&gt;
&lt;br /&gt;
Or, you can consider an additional tack. State you won't wipe out information but, at the exact same time, workers are obligated not to use confidential information as soon as they depart the business.&lt;br /&gt;
&lt;br /&gt;
One exception might be if you're in an industry, like health care, exactly where you deal with highly regulated, sensitive information. In that situation, according to Rosenbaum, you might not want to opportunity it at all. He recalls 1 consumer, a doctor's workplace, that lately decided not to permit BYOD because of to issues about affected person data confidentiality,&lt;br /&gt;
&lt;br /&gt;
How to support all those devices&lt;br /&gt;
&lt;br /&gt;
Most most likely, you have a small IT employees, or maybe none at all. How, then, can you support the additional devices your employees will be utilizing without hiring much more individuals or including to your already more than-labored employees?&lt;br /&gt;
&lt;br /&gt;
Your best move: It all depends on your sources. The less you have, the less responsibility you will be able to presume. Rosenbaum factors to a client, a 14-person accounting firm that lately allowed employees to use their iPhones. With just an workplace manager dealing with assistance, company proprietors produced it clear that workers had been accountable for handling technical problems. &amp;quot;I took care of connecting the telephone to the server, but after that, it wasn't part of the workplace manager's responsibilities,&amp;quot; says Rosenbaum.&lt;br /&gt;
&lt;br /&gt;
One useful move is to restrict the gadgets you permit. An additional is to create a checklist of steps workers should take, something from turning on spell check to utilizing a standard signature block at the finish of each email.&lt;br /&gt;
&lt;br /&gt;
[http://www.linkwaves.com Buy Cisco]&lt;br /&gt;
[http://www.linkwaves.com Sell Cisco]&lt;br /&gt;
[http://www.linkwaves.com/cisco-routers.html Cisco Routers]&lt;br /&gt;
[http://www.linkwaves.com/cisco-switches.html Cisco Switches]&lt;br /&gt;
[http://www.linkwaves.com/cisco-security.html Cisco Security]&lt;br /&gt;
[http://www.linkwaves.com/cisco-wireless.html Cisco Wireless]&lt;br /&gt;
[http://www.linkwaves.com/asset-recovery.html Cisco Asset Recovery]&lt;/div&gt;</summary>
		<author><name>MargueriteLongoria398</name></author>	</entry>

	</feed>