Igen, ez a változás természetesen érinti az esküvődet is, de ha az esküvőipar is szinte percenként fejlődik, ha napról napra újabb ötletek és megvalósítások látnak napvilágot, akkor miért szerveznéd az esküvődet most is úgy, azon az elven, ahogyan tette azt a barátnőd 2 éve vagy tették a szüleid néhány tíz évvel ezelőtt?
Az esküvő szervezést is hozzá kell igazítani a változáshoz!
Nem engedheted meg magadnak, hogy ne legyen tökéletes az esküvőd. De mi kell ehhez? Hogyan érhetsz el fergeteges hangulatot? Esküvő szolgáltatók interjúi között számtalan meglátás olvasható:
"Nagyon sok múlik a zenekaron, a vőfélyen valamint a társaságon. De leginkább a zenekaron."
"Lehet hogy furcsán hangzik, de nem elsősorban a vőfélytől. Sokat hozzátehet, sokat segíthet, sok múlik a zenén, de legtöbb a násznépen. Ha „nem veszik a lapot”, akár meg is szakadhat a vőfély. Persze ilyenkor is meg kell oldani a dolgokat."
"Főleg a zene és a vőfély összhangja a násznéppel."
Olvasd el Popsecret esküvői zenekar hogyan vélekedik erről.
Thursday, July 23, 2009
Saturday, May 12, 2007
IT (information technology) covers all aspects of managing and processing information. With IT Certification, you can develop, design, support, and manage networks, hardware and computer software. Most computer training programs offer some type of e-mail support and sometimes phone support. The IT field of training is getting more and more competitive and crowded each year. Yesterday’s skills don’t cut it in todays more advanced technological world. You can show your commitment to your career as well as expertise by becoming certified. IT training validates your commitment to being the best.
Employers value an IT certification because it brings to the organization better quality of work for the whole of the company. When it comes to choosing the best certification training, there are many choices available to you. Every computer professional out there today understands the value of IT certification and IT training. The computer field is always progressing and always improving. In most high ranking jobs you can’t just walk in with your current skills and expect to be hired. You must continue to strive in your field with new skills; this means you are constantly seeking to improve your education. CBT or Computer Based Training is available at your finger tips. There are so many programs out there that can help you with this task.
Computer based training is not just a benefit to IT techs. Office personal are more and more involved in the uses of computers, and the more understanding they have of the systems that they operate, the more efficient they will be in performing their work. They will also be less of a bother to the busy IT help desk.
Training and knowledge have always been the keys that unlock the doors of opportunity. The advantage that IT techs have today is that training is offered in such a large variety of methods. You can study online without leaving your home. You can have onsite training at a large number of training centers in most areas of the country. Study manuals and guides are available for independent work. It is possible for large employers to have in house programs to help their employees prepare for IT certification training and to guide them toward the proper choices.
There are so many options available today that there is no excuse not to jump onto the Certification bandwagon, and get your employee file or resume filled out with IT certifications that will reflect your skill and your level of knowledge.
Friday, April 20, 2007
It is important to the career development of an IT tech to have proper certification. It is getting more important everyday as the IT field continues to grow. Computer based training is not something that is optional any longer. So, the question is no longer if you should pursue it or not, but rather where can you get it. There are several options.
It does not come as a surprise that IT training is available on the internet. There are quite a few sites offering computer based training, and preparations for Certification training. Online training, or distance training as it is often called, is a viable option in many different circumstances. Not everyone is in a position to abandon their jobs and take time off to attend onsite type of training. The major advantage of distance training is that you can work at your own pace. What is important is your own personal learning profile. Some people learn better in a hands on environment with the guidance of a trainer. Other people thrive on independent study and have the self discipline to make their own schedule and to adhere to it.
Onsite training is another option, and for many people it works better. Classes that use computer training videos and study guides can make the learning less stressful, and questions and confusion can be cleared up quickly. Many of the onsite learning centers are equipped with the most up to the date computers and software. Some of the software is designed specifically for training and troubleshooting. Many students benefit from this opportunity. Of course, onsite training involves being in a class at a certain time, as well as travel back and forth from the training site. The expense is usually much greater, and the loss time from work for training could create hardship.
For some students a balance of onsite and online training works best, and helps control the expense to some degree. Many employers are not supporting certification training to the point of paying for the classes and expenses, and allowing attendance during normal working hours. There are many options to get Certification training and to add IT certificates to your resume. Each of them should be carefully studied, and the proper match found to complete this important training. The best source of information for your training options is the internet. Most sites that offer training give very complete and accurate information on the options that they offer.
Friday, April 13, 2007
An OSPF adjacency can be authenticated with MD5 (Message Digest 5) or with a clear-text password. I’m not much on clear-text passwords, and hopefully you aren’t either! Whether you’re working in the real world or the certification exam room, though, it’s always a good idea to know more than one way to do things. Let’s take a look at how to configure clear-text authentication of an OSPF neighbor relationship.
The commands we’ll use are “ip ospf authentication-key” and “ip ospf authentication”. In this example, we have preexisting adjacencies between three routers in an OSPF NBMA network. The hub router (R1) has an adjacency with two spoke routers, R2 and R3.
The password is set by the interface-level command ip ospf authentication-key. While Cisco routers will usually tell you when you’re about to try to do something that you can’t do, this password is a rare exception to the rule. Let’s set a password of passbscitest and then check the router config.
R1(config-if)#ip ospf authentication-key ?
<0-7> Encryption type (0 for not yet encrypted, 7 for proprietary)
LINE The OSPF password (key)
R1(config-if)#ip ospf authentication-key passbscitest
R1#show config
interface Serial0
ip address 172.12.123.1 255.255.255.0
encapsulation frame-relay
ip ospf authentication-key passbsci
I entered a 12-character password, but only the first eight are showing in the router configuration. The router failed to warn us that this particular password has a limit of eight characters. As of IOS 12.4, the router now warns the admin about this, but there are plenty of routers out there that aren’t running that recent a release!
Clear-text authentication is enabled with the ip ospf authentication command. IOS Help shows there is no specific command for clear-text authentication. (Null and clear-text authentication are not the same thing.)
R1(config)#int serial0
R1(config-if)#ip ospf authentication ?
message-digest Use message-digest authentication
null Use no authentication
< cr >
To set clear-text authentication, just use the basic command with no options.
R1(config-if)#ip ospf authentication
About two minutes after entering that configuration, the preexisting adjacencies go down:
R1#
00:25:38: %OSPF-5-ADJCHG: Process 1, Nbr 172.12.123.2 on Serial0 from FULL to DOWN, Neighbor Down: Dead timer expired
R1#
00:25:58: %OSPF-5-ADJCHG: Process 1, Nbr 172.12.123.3 on Serial0 from FULL to DOWN, Neighbor Down: Dead timer expired
R1#
Until we configure the spoke routers with the same config, the adjacencies will stay down – so let’s get those spokes configured!
R2(config)#interface serial0
R2(config-if)#ip ospf authentication-key passbsci
R2(config-if)#ip ospf authentication
R3(config)#interface serial0
R3(config-if)#ip ospf authentication-key passbsci
R3(config-if)#ip ospf authentication
On R1, show ip ospf neighbor verifies that the adjacencies are back up.
R1#show ip ospf neighbor
Neighbor ID Pri State Dead Time Address Interface
172.12.123.3 0 FULL/DROTHER 00:01:58 172.12.123.3 Serial0
172.12.123.2 0 FULL/DROTHER 00:01:37 172.12.123.2 Serial0
Now that you know how to configure OSPF neighbor authentication in clear text, you need to learn how to use MD5 authentication, and that just happens to be the subject of my next CCNP BSCI 642-901 exam tutorial! See you then!
Monday, March 19, 2007
EIGRP is a major topic for your CCNA and CCNP studies, and one basic skill you’ll need to pass your Cisco certification exams is to identify situations where you need to enable or disable split horizon. EIGRP commands tend to be a little different than those used with other protocols, so let’s take a look at how EIGRP and split horizon interoperate.
R1 is our hub router, with R2 and R3 as the spokes. There are no subinterfaces, and each router is advertising a single loopback network using its router number for each octet. R1 will see both R2 and R3’s loopback network, but the spokes will not have a route to the other spoke’s loopback. “show ip route eigrp” verifies this.
R1#show ip route eigrp
2.0.0.0/32 is subnetted, 1 subnets
D 2.2.2.2 [90/2297856] via 172.12.123.2, 00:03:29, Serial0
3.0.0.0/32 is subnetted, 1 subnets
D 3.3.3.3 [90/2297856] via 172.12.123.3, 00:03:29, Serial0
R2#show ip route eigrp
1.0.0.0/32 is subnetted, 1 subnets
D 1.1.1.1 [90/2297856] via 172.12.123.1, 00:05:20, Serial0
R3#show ip route eigrp
1.0.0.0/32 is subnetted, 1 subnets
D 1.1.1.1 [90/2297856] via 172.12.123.1, 00:07:54, Serial0
EIGRP runs split horizon by default, making it impossible for R1 to forward an advertisement to R2 regarding R3’s loopback. Likewise, R1 cannot advertise R2’s loopback address to R3. We could configure two subinterfaces on R1 to resolve this issue, but here we’re going to disable split horizon instead.
R1(config)#int serial0
R1(config-if)#no ip split-horizon ?
eigrp Enhanced Interior Gateway Routing Protocol (EIGRP)
R1(config-if)#no ip split-horizon eigrp ?
<1-65535> Autonomous system number
R1(config-if)#no ip split-horizon eigrp 100
04:10:02: %DUAL-5-NBRCHANGE: IP-EIGRP 100: Neighbor 172.12.123.2 (Serial0) is down: split horizon changed
04:10:02: %DUAL-5-NBRCHANGE: IP-EIGRP 100: Neighbor 172.12.123.3 (Serial0) is down: split horizon changed
04:10:25: %DUAL-5-NBRCHANGE: IP-EIGRP 100: Neighbor 172.12.123.2 (Serial0) is up: new adjacency
04:10:37: %DUAL-5-NBRCHANGE: IP-EIGRP 100: Neighbor 172.12.123.3 (Serial0) is up: new adjacency
Note that disabling split horizon resulted in the EIGRP adjacencies being torn down. They came back up 20 – 35 seconds after being torn down according to the timestamps, but that’s a good detail to keep in mind!
The routing tables of each spoke should now show the loopback network configured on the remote spoke.
R2#show ip route eigrp
1.0.0.0/32 is subnetted, 1 subnets
D 1.1.1.1 [90/2297856] via 172.12.123.1, 00:00:02, Serial0
3.0.0.0/32 is subnetted, 1 subnets
D 3.3.3.3 [90/2809856] via 172.12.123.1, 00:00:02, Serial0
R3#show ip route eigrp
1.0.0.0/32 is subnetted, 1 subnets
D 1.1.1.1 [90/2297856] via 172.12.123.1, 00:00:02, Serial0
2.0.0.0/32 is subnetted, 1 subnets
D 2.2.2.2 [90/2809856] via 172.12.123.1, 00:00:02, Serial0
Be careful when disabling split horizon. In this scenario, R1 can and will advertise routes out Serial0 that were learned about on that interface in the first place, and that’s not always desirable. Split horizon is enabled by default for a reason, so be careful when disabling it!
One of the best methods of securing IT training, and preparing for your MCSE Certification examination is the boot camp. MCSE stands for Microsoft Certified System Engineer. The MSCE boot camp gives you the intensive training that you need to not only pass the examination, but also to handle the work afterwards. The boot camp concept takes its name from military basic training and although it does not resemble that in the discipline area, it certainly earns its name for its intensity.
A typical MCSE boot camp lasts around two weeks. The fee for the camp includes air transportation to the camp site, and lodging during the duration of the course. If air transportation and lodging are not needed, these expenses will be deducted from the cost. Meals are also included in these packages. Students will take up to seven certification examinations during the boot camp. The class room work will be directed toward preparation for each examination. Students will be working also on the actual hardware and software under the guidance of instructors who are experience in all Microsoft platforms. Most boot camps have 24/7 lab access available to the students.
There is a great deal of written material and computer training videos involved with the courses designed to prepare for the various Certification examinations. Many companies offer this material to students for home study. This is given as an alternative to the boot camp, and the advertising stresses the money savings for skipping the actual camp and doing the study and preparation at home. The costs of the boot camps are rather high, especially when they include transportation, lodging, and meals. Even though, in most cases, employers will pay for the cost of the camp, this is not always the case.
The Microsoft Certification boot camp has several benefits over home study and they justify the cost. Most camps offer success guarantees. If you fail an examination, the instructors are right there to correct any mistakes and identify the cause of failure. You will be prepared to retake the examination and get back on schedule. Since most boot camps have small classes and therefore a high instructor to student ratio, this individual attention is the key to successful completion of the Certification exams. Many of the camps have as high as 96% success rates, and many will allow credits to any student who does fail the complete the course. These credits may be used to retake the boot camp at a reduced rate at a later date.
Subscribe to:
Posts (Atom)