The Microsoft Connectivity Analyzer Tool is a downloadable client program that is used to identify connectivity issues that occur between email clients and a server that is running Microsoft Exchange Server. The tool can also be used to identify connectivity issues between email clients and Office 365. The tool can be used both by email users, to identify common problems, and by IT Administrators, to troubleshoot issues that are affecting their Exchange Server deployments.
The Microsoft Connectivity Analyzer Tool simulates several client logon and mail flow scenarios. When a test fails, many of the errors message provide troubleshooting tips to help the user or IT Administrator to resolve the problem.
This tool is a companion tool to the Remote Connectivity Analyzer website. Whereas the Remote Connectivity Analyzer website enables IT Administrators to pinpoint connectivity issues by simulating connectivity from a location outside the customer environment, the Microsoft Connectivity Analyzer Tool lets both email users and IT administrators run the same tests within the user’s environment.
You must be running one of the following operating systems:
- Windows 8
- Windows 7
- Windows Server 2008
- 64-bit edition of Windows Vista
Download the client tool (Microsoft Connectivity Analyzer (Beta) here.
Connectivity check as follows
Select one of the option below to continue to next screen
Enter the credential you want to check for connectivity issues
SensoScientific, Inc. is fast becoming an industry leader in pushing the boundaries of detection technology. With the release of our newest WIFI product line we are introducing not only a State of the Art Web-embedded WIFI platform technology, that provides for precise measurement and data logging of temperature and humidity, plus we have raised the bar to allow our clients to measure ANY process or condition with a highly accurate WIFI transmitter. This allows access to your data from any web browser in the world, all without the need for costly stand-alone computers and proprietary software and virus protection updates. With its advance notification services it automatically, and immediately, sends SMS, Voice & Data, Email or Text message alerts to any number of necessary personnel in the case of a temperature failure, and fully documents the user through the corrective action necessary to meet regulatory and audit requirements.
- 100% web/wireless embedded technology
- Digital sensors
- Any user, with a valid ID and password, equipped with a web browser can access any device
- Current temperature readings
- Equipment performance reports(monthly/yearly)
- Monthly, weekly and daily reports
- Graphical temperature trend analysis
- Alert and corrective action history
- Automatic temperature reports by email
- Allows for automatic and scheduled backup
- Ensures regulatory compliance for Joint Commission, HACCP, AABB, and CAP, and is 21 CFR Part 11 complaint
To know more, Click here
What is IP-Surveillance? IP-Surveillance is a term for a security system that gives users the ability to monitor and record video and/or audio over an IP (Internet Protocol-based) computer network such as a local area network (LAN) or the Internet. In a simple IP-Surveillance system, this involves the use of a network camera (or an analog camera with a video encoder/video server), a network switch, a PC for viewing, managing and storing video, and video management software.
Indoor or outdoor. Outdoor network cameras must have an auto iris lens to regulate how much light is received. Many outdoor cameras require a protective housing. Others may already be designed with a protective enclosure. Housings are also available for indoor cameras that require protection from harsh environments such as dust and humidity, and from vandalism or tampering. A network camera with built-in wireless support is a consideration when running a cable between a LAN and a network camera is impractical, difficult or expensive. Wireless network cameras are suitable for use in outdoor situations, in environments such as historic buildings where the installation of cables would damage the interior, or in cases where there is a need to move cameras to new locations on a regular basis, such as in a supermarket. Ensure that the wireless network camera supports security protocols such as IEEE 802.1X and WPA/WPA2 (Wi-Fi Protected Access), which will help secure the wireless communication.
A megapixel network camera (i.e. one that delivers an image comprised of 1 million or more pixels) can also offer resolutions greater than what an analog camera can offer, which means that more detail or larger areas can be covered. High image quality is essential in a security surveillance application. You want to be able to clearly capture an incident in progress and identify persons or objects involved. In a network video system, the quality of images produced can be more easily retained than in an analog surveillance system. A network camera that uses progressive scan technology provides clearer images of moving objects because the whole image is presented at one time. With an analog video signal, two consecutive interlaced fields of lines are presented to form an image, and when displayed on a PC monitor, blurriness occurs when objects move between the image capture of the two interlaced fields.
PoE enables networked devices to receive power from a PoE-enabled switch or midspan through the same standard cable that transmits data (video). Power over Ethernet (PoE) (IEEE 802.3af) When a network camera supports this feature, it means that the camera can receive power through the same cable as for data. Hiring a certified electrician and installing a separate power line are not needed—a big advantage, particularly in difficult-to-reach areas. With PoE, network cameras/video encoders will also be able to receive centralized backup power from a server room with an Uninterruptible Power Supply; so in the event of a power failure, the cameras/video encoders will still be able to operate.
Network management features: They include support for Quality of Service (QoS), which can prioritize and reserve network capacity for mission-critical surveillance in a QoS aware network, and support for Internet Protocol version 6 (IPv6) in addition to IPv4 addresses. Network switches allow devices such as network cameras, servers and PCs to communicate with each other to share information and, in some cases, a common Internet connection. Network designs can take many forms and may vary in terms of performance and security. First, determine what your company is using the network for and how congested your local area network (LAN) or wide area network (WAN) is. If you are implementing a smaller surveillance system involving 8 to 10 cameras, you should be able to use a basic 100-megabit (Mbit) network switch (Now a days gigabit switches are more cheaper to buy) without having to consider bandwidth limitations. With more than 12 to 15 cameras, you should consider using a switch with a gigabit (Gbit) backbone. If a gigabit-supporting switch is used, the server that runs the video management software should have a gigabit network adapter installed on the running machine. When running wireless camera, make sure the AP supports gigabit, inorder to avoid slow frames.
Remote accessibility: You can access live and recorded video at any time and from virtually any networked location in the world. Multiple, authorized users at different locations may be able to access live or recorded video. This is advantageous if your company wants a third-party, such as a security firm, to benefit from and have access to the video.
Hardware (server, softwareand storage): The hardware requirements of an IP-Surveillance system are not complex. Simply use standard components found in the IT industry. Today’s PC, with a Pentium processor and Windows operating system, is able to run a video management software, and record and store video from up to 50 cameras. If the hard disk on the actual server running the recording application is not enough, there are solutions that enable you to increase storage space and achieve increased flexibility and recoverability. As larger hard drives are produced at lower costs, it is becoming less expensive to store large amounts of video. A wide range of software is available to help you in the preparation, installation and management of an IP-Surveillance system Eg: Axis Camera Management, if you buy Axis cameras, Video Insight etc.
H.264 Storeage calculation:
Bit rate / 8(bits in a byte) x 3600s = Kilobyte (KB) per hour / 1000 = Megabyte (MB) per hour
MB per hour x hours of operation per day / 1000 = Gigabyte (GB) per day
GB per day x requested period of storage = Storage need
Bit rate / 8(bits in a byte) x 3600s = KB per hour / 1000 = MB per hour
MB per hour x hours of operation per day / 1000 = GB per day
- GB per day x requested period of storage = Storage need
Motion JPEG calculation:
Image size x frames per second x 3600s = KB per hour/1000 = MB per hour
MB per hour x hours of operation per day / 1000 = GB per day
- GB per day x requested period of storage = Storage need
Legal considerations: Video surveillance can be restricted or prohibited by laws that vary from country to country. It is advisable to check the laws in your local region before installing a video surveillance system. You may need to register or get a license from an authority to conduct video surveillance, particularly in public areas. You may have to place signs to warn the public that they are entering a zone covered by surveillance equipment and there may be rules regarding the signage. Video recordings, for instance, may be required to have time and date stamped.
PTZ network cameras: The camera’s view can be remotely controlled, either manually or automatically, for panning from side to side, tilting up and down, and zooming in and out of an area or object. There are now mechanical as well as non-mechanical PTZ cameras.
Automatic day/night functionality: This feature is incorporated into some outdoor cameras and enables the automatic removal of the infrared (IR) cut filter that is incorporated into all color cameras to prevent color distortion from near-infrared light. When there is light, the IR-cut filter is on and the camera delivers color video. In dark conditions, the camera removes the filter to make use of near-infrared light to deliver infrared-sensitive black and white video. Infrared or day/night cameras are particularly useful in outdoor environments or situations that restrict the use of artificial light. These situations include discreet and covert surveillance applications.
Minimum illumination/light sensitivity: A network camera’s light sensitivity is often specified in terms of lux, which corresponds to a level of illuminance in which a camera produces an acceptable image.
Type of video compression: There are three main video compression standards in use today. Motion JPEG, MPEG-4 and H.264. H.264 is the latest standard that is expected to become the video standard of choice in the coming years. Without compromising image quality, H.264 can reduce bandwidth and storage requirements by more than 80 percent compared with Motion JPEG and as much as 50 percent more than with the MPEG-4 Part 2 standard.
I Really Love it!!!
The Nokia Lumia 800 with Windows Phone is the first Nokia smartphone to have Windows Phone 7.5. Its beautiful design is a head-turner. Simpler social networking keeps you connected to those who matter. Internet Explorer 9 gives you quicker browsing – plus the web like it is on your PC. And with a Carl Zeiss lens and 8-megapixel camera, you’ll shoot better photos and video.
Lumia 800 is a “refinement” of the N9 – Seamless design: Curved 3.7″ AMOLED ClearBlack glass touchscreen display seamlessly integrated into a smooth one-piece body…People Hub: Facebook, Twitter, LinkedIn, email, Chat, SMS…Browser: Bing, Internet Explorer 9, HTML5, Wi-Fi…Camera: 8 MP Auto Focus with Carl Zeiss Optics, 2x LED Flash and HD Video
- Micro SIM
- Nokia Maps
- Bing Maps
- Flight Mode
- Nokia Drive
- Nokia Music
- 2 Microphones
- 3D Accelerometer
- Proximity sensor
- Ambient light sensor
- Application Highlights
- Nokia Contacts Transfer
- Compass (Magnetometer Sensor
- GSM 850
- GSM 900
- GSM 1800
- GSM 1900
- WCDMA Band V (850)
- WCDMA Band I (2100)
- WCDMA Band II (1900)
- WCDMA Band VIII (900)
Reviews like it has a slightly smaller screen due to the intrusion of the Windows Phone Button, only 512 MB RAM, only 16GB onboard storage, No NFC etc etc etc
But rumours that Nokia is working on Windows Phone 8 – (aka Apollo)!!!
BEAST (Browser Exploit Against SSL/TLS) attack will rank among them because it compromises the SSL and TLS browser connections hundreds of millions of people rely on every day. Read more from InfoWorld Security Central..click here
Lot of new features going to get release with this platform and it is compatible with iPhone 3GS, iPhone 4, iPod touch (3rd generation and 4th generation), iPad and iPad 2…
New feature like….
- Notification Center: You get all kinds of notifications on your iOS device: new email, texts, friend requests, and more. With Notification Center, you can keep track of them all in one convenient location. Just swipe down from the top of any screen to enter Notification Center.
- iMessage: With this you can send unlimited test message throug Wi-Fi or 3G from your iPad, iPhone or iPod touch to anyone with one of those devices. This apps built into the messages app, so you can send text, photos, videos, locations and contactss
- Twitter: Integrated right into iOS 5… it even easier to tweet from your iPhone, iPad, or iPod touch. Sign in once in Settings, and suddenly you can tweet directly from Safari, Photos, Camera, YouTube, or Maps.
- Camera: Now in iOS5, it integrates right onto the Lock Screen and you can take snaps instantly using the volume-up buttom and say “click”
- PC free: New feature designed to be independence for all iOS devices. With iOS 5, you no longer need a computer to activate and set up your device…all you do is to connect your device wirelessly, right out of the box. Download free iOS software updates directly on your device. Do more with your apps — like editing your photos or adding new email folders — on your device, without the need for a Mac or PC. And back up and restore your device automatically using iCloud.
So what is this iCloud?? Its like a virtual Hard disk sitting on the cloud and when you sign up for iCloud, you get 5GB of free storage and it stores your content in the cloud. Your purchased music, apps, and books, as well as your photo stream, don’t count against your free storage. That leaves your mail, documents, Camera Roll, account information, settings, and other app data. With iCloud Photo Stream, when you take a photo on one device, it automatically appears on all your other devices. No syncing. No sending. Your photos are just there.
To get all these features, we have to patiently wait for this comming fall…if you want to get notified when iCloud is available, click here
Most of you guys must have experience the scenario when “Outlook connection lost….” even if you have Exchange server 2010 (with Edge, 2 clustered H&C and 2 DAG configured MB) and Outlook 2010 in place. The reason is that, when you are doing a maintenance on one of the H&C, and if the client is connected to that H&C, communication to the MB is lost. The reason for this is that the cluster load balancing on the H&C cluster handler is not in place, even if the cluster name is published in the DNS server.
In Exchange 2007, 5 server roles that performed distinct functions within the Exchange organization. One role in particular – the Client Access server role – introduced a variety of new Web services, including the Availability service, the Auto discover service and Calendar Concierge services.
In Exchange 2010, same 5 server roles exists. However, there are some significant architectural changes and some shift in responsibilities. The most significant change in Exchange 2010, two new services on CAS called the RPC Client Access and Address Book services establish the RPC (Repote Procedure Call) endpoint for MAPI(Messaging Application Programming Interface), NSPI(Name Service Provider Interface) and RFR (Request for Response) client access. This new functionality replaces the RPC endpoints in the Information Store. The RPC endpoint in the Information Store has not been removed in Exchange 2010, but it has been modified to only accept requests from CAS servers. The RPC endpoint for public folder database access remains on the Mailbox server, however, Outlook clients now communicate directly with the RPC Client Access service on the Mailbox Server for public folder database access, and not with the Information Store.
When CAS starts communicating with the Mailbox server, it makes sense to view it as the Client Access server communicating with the Mailbox database via the Mailbox server that hosts the database. This is especially evident in a load-balanced array of Client Access servers and/or where your environment is configured to use Database Availability Groups that are associated with a Client Access server or Client Access server array.
- In a non-load balanced environment, the mailbox database is associated with only a single Client Access server.
- In a load-balanced environment, the Mailbox database is associated with the load balanced array of multiple Client Access servers.
By default, before a Client Access array is configured,
- all databases are associated with a Client Access server in the environment
- the Outlook clients communicate directly with the Client Access server until the association with the database is updated to be the Client Access array.
In order for the clients to utilize a CAS array
- Create a Client Access array with an FQDN (Fully Qualified Domain Name).
- Load balance your CAS servers in a CAS array by whatever method you choose – Both Hardware LB or Windows Network LB are supported load balancers
- Add the Client Access servers within the AD site to a load balanced array and in DNS associate the unique FQDN to the Virtual IP of the load-balanced array.
- Configure your load balancing array to load balance the MAPI RPC ports – TCP 135, UDP/TCP 6005-65535; or set static ports
- Configure the databases to utilize the CAS array… Use the new-clientaccessarray cmdlet to create the CAS array object. Eg: New-ClientAccessArray –Name “Tromso CAS Array” –Fqdn tromso.site.com” –Site “SITEA”
How to Setup!!!..
Goto one of the CAS server where the NLB is ( to read more about New-ClientAccessArray cmdlet, click here )
 Check is there are any pre-created CAS Arrays. PS Command : Get-ClientAccessArray
 Create new Client Access Array. Run the Cmdlet in EMS New-ClientAccessArray -Fqdn server.contoso.com -Site “Redmond” -Name “server.contoso.com”
 Associate databases with this CAS Array –
Use this CMDLet to add mailbox database to CAS array. Add all mailbox databases at once – Get-MailboxDatabase | Set-MailboxDatabase -RPCClientAccessServer “CASNLB.contoso.com”
Now the best part –
Configuring Outlook 2010 using Auto Discover
If you already configured Outlook client, Close the outlook, then goto Control Panel->Mail and change the Server name to the new CAS NLB name
If you are going to use a new outlook configuration, Auto discover will return the new CAS NLB name.
Thats all folks!!! Enjoy!!!