Saturday, 2 May 2015

Packet Tracer Videos

Bonjour et bienvenu
In this tutorial you gonna learn on how you can apply cisco ios command by using packet tracer. we gonna focus on this point :
  1. Cisco packet tracer presentation
  2. Configuration d'un switch
  3. Configuration d'un switch (attribution d'un IP)
  4. Configuration d'un vlan part 1
  5. Cofniguration d'un vlan part 2
  6. Configuration d'un vlan part 3
  7. Configuration d'un routeur
  8. Configuration du routage statique
  9. Configuration du dhcp
  10. Configuration du routage dynamique (rip version 2)
  11. Configuration du routage dynamique (eigrp)
  12. Configuration du routage dynamique (ospf)

information about IT videos


hi to all
in this blog you will find all the details about the videos and how you can obtain all of them.
before starting showing how and where you gonna find those videos i would like to introduce myself, well i am a master in information technology  at Infrastructure University in Kuala Lumpur (IUKL) field network design.
My research field are on cloud computing security and virtualization, i decided a couple of weeks ago to make some videos for people who does not have the skills or knowledge in some particular IT subject.
those videos will be in french because of the location where i am living and also because i want to help french people to know something they should know.
we gonna have a lot of videos such as :
  • Cisco ios by using packet tracer
  • GNS3
  • Virtualization
  • Gns3 with wireshark 
  • Juniper configuration 
  • Linux command 
  • Linux administrator
  • others  
So stay on touch with this blog to see what videos will be online and where and how to find them
If you want to get all the videos just contact me by using my email address or my phone number
contact : ebedonmufind@gmail.com
               +2430854474944

Thursday, 21 February 2013

Go for paravirtualization or full virtualization technology? : A study on Vmware and Xen 

Summary : Today technology bring confusion between enterprise and people in the way of choosing a good technology for their need or a good product, because of so many different product in the market which as the some functionality but a little bit difference, that way people go to the blog or read some manual before paying or adopting one technology rather then others. 

In this blog we will just give you a clear view of what we mean by our research and the meaning of the title of our research but for further reading go to our paper by clicking here go for paravirtualization or full virtualization technology? : A study on Vmware and Xen

We mean by go for paravirtualization or full virtualization technology, it is just some virtualization technology which differ in the way of using resources (HDD, Ram, etc). Full virtualization use all the physical resources, it looks like the physical machine and paravirtualization use less resources that means is not equal to the physical machine.
This research will help you to know the difference between paravirtualization and full virtualization and we talk about how to choose one rather the the other.
As i say earlier i will not explain in details  here, read my paper and post your question in my blog.
For those who want to send me an e -mail, here are my e-mail address: ebedonmufind@yahoo.fr

Others paper and bulletin:
 


    



Wednesday, 26 December 2012

Seminar on Current Trends in Information Communication Technology

Welcome to our page

We would like to inform you about our Seminar.
We are organizing a IT seminar in PWTC in Kuala Lumpur, all attendee have to pay RM100, fill out this form https://adobeformscentral.com/?f=2QQ0eiuF-%2A9tJmxe4EU8mw

we are also calling for paper for those who want to present they research, here are what is the theme of the seminar

The seminar theme is focusing on security in information technology, this theme emphasizes the strong foundation on own security is important in different aspect of life by the use of technology equipment and IT software, Operation System and so on.
This seminar will give you a better understanding in security, depend on your interested field (Mobile,PC, software, etc) security by offering you a parallel session.
 

Important dates:

call for paper 1st January
Paper acceptance notification 5th January
paper sub deadline 15th January
early bird sud deadline 18th January
paper deadline 20th January
paper acceptance, reject notification 23th January 
conference 28th - 30 January

All deadlines occur at 11:00 p.m. on the days listed. There are no exceptions or extensions.

 Paper submission format

Please submit your papers as email attachments in MS-Word  or pdf format. Title: Times New Roman 16 pts, centered, bold. Author’s names typed under the title: Times New Roman, 14 pts, centered, bold. Department name, affiliation and address of the author typed under the author’s names section: Times New Roman 14 pts, centered. The abstract should not exceed 4 paragraph and the body and conclusion should not exceed 6 pages, it should fit into one regular A4 page together with the figure: Times New Roman, 12 pts, justified. You are allowed to include 3 figures. Figure caption is given without a figure number.
Submitted papers should not be under review or submitted for publication elsewhere during the review period. Papers to be submitted via e-mail to ebedonmufind@gmail.com

The Call for Papers closes on 20th January 2013.

I would like to thank you in advance for your scientific contribution to the SORTICT2013 seminar in security in information technology and we look forward to having the opportunity to show  your research.

If you have any query regarding the call for papers and other queries, please call 0182660156, 0178806479,0123993524, 0163623753.

Yours sincerely