About DCIAdmin

This author has not yet filled in any details.
So far DCIAdmin has created 152 blog entries.

How to Convert from Cisco Mobility Express to Lightweight

Step 1 Login to mobility express CLI, type in username and password Type Ciscoapshell and give the password   Step 2 Type Enable to go to privileged execution mode.   Step 3 Enter ap#ap-type capwap and confirm to switch to the CAPWAP type. NOTE: To convert multiple 1800 series access points running Mobility Express image

IoT-What is It?

  Internet of Things, you’ve heard of it. But what do you really know about it? It’s defined as a system of interrelated devices, mechanical and digital machines, objects or people that have the ability to transfer data over a network without requiring human-to-human or human-to-computer interaction.   IoT is becoming an increasingly growing topic

Staff’s Picks for Best Apps

Need some new apps that might help you on a daily basis? Check out the list below and see what our Phoenix IT engineers recommended!     Wifi Analyzer- This is a great app that shows the Wi-Fi signals around you. It helps you find a less crowded channel for your wireless router.   Putty-

Great Password Tips

Did you know that 63% of small business hackers take advantage of weak passwords? It’s a troubling statistic that you don’t want to be a part of. Here are some tips to keep in mind to protect yourself. Don’t make it personal- Never use a family member’s name or birthday that could easily be hacked

Backups and Restore

My attention on this blog has been shifted to a recent incident regarding Backups and Restores. We had a recent event where a client due to a hardware failure lost the storage where all their Virtual Machines are stored. There was a good backup that we could roll back to so no problem there. What

5 Simple Ways to Protect Your Online Identity

Keep a Second PC Keep your banking and payment details safe by designating a second computer – perhaps an old laptop – as your “secure” device and do your gaming, email and web browsing elsewhere. Switch it off when not in use, so even if an opportunist hacker does manage to get on to your

Back to School Security Tips

It’s back to school time for many students around here. One thing many college kids must be aware of when they leave home and venture off into new surroundings is the threat of being hacked. Hackers are always targeting school computer networks to commit their crimes. Verizon’s 2015 Data Breach Investigations Report noted that the

Install SQL 2016 Step-by-Step: Installation

In this Blog, I will show you how to Install SQL 2016 Step-by-Step: Ok let us get started… SQL 2016 is a database system developed by Microsoft. Its application is diverse and is present in various business applications. The innovations of this version is that it was designed to work in the cloud with Microsoft Azure

Don’t Be a Victim of Phishing

        Phishing email messages, websites, and phone calls are designed to steal money. Cyber-criminals can do this by installing malicious software on your computer or stealing personal information off of your computer. There are technologies out there that help reduce the amount of phishing emails, but one of the best methods of defense against

Access Points Going Down and Fixing It

  Problem: Recent customers were having issues with AP's going down. And those APs were plugged in to port 3&4.   Solution: I checked wlc logs, I rebooted those AP's nothing worked. I called Cisco and they said it's not recommended to use port 3 & 4 in wlc because those ports are for lab