Wednesday, April 13, 2016

7 Top Herbs for Energy

ginko leaves
The 7 top herbs for energy can give you that extra boost you need to get through your day. More than just a pick-me-up when your energy lags, these herbal energy fixes help improve your health and balance your system.

You can energize yourself without the worry of dangerous stimulants. Here are several of the best herbs to give you an extra boost when you need it. 

Image result for siberian ginseng pic

Siberian Ginseng

Siberian ginseng is popular among athletes, but you don't have to be an athlete to enjoy the benefits of this herb. According to WebMD, it works by increasing stamina, reducing fatigue and minimizing the effects of stress.
You can enjoy Siberian ginseng as a tea, in capsules or in pills. Be sure the supplements you purchase contain real Siberian ginseng, Eleutherococcus senticosus. Do not take this herb if you have lupus, rheumatoid arthritis or uncontrolled high blood pressure.
Image result for ginkoba pic

Ginkgo

Ginkgo improves energy flow at a cellular level by increasing the production of adenosine triphosphate (ATP) in your body. ATP aids the brain in metabolizing glucose for energy, which improves mental function. When you feel mentally drained, ginkgo is the herb for you.

Green Tea

Green tea contains caffeine, and as such, works as a mild stimulant. Instead of reaching for a cola mid-day, try brewing a cup of green tea. It gives an extra shot of energy to finish your day and also provides health benefits. Green tea is known for being an antioxidant, anti-carcinogenic, and antibiotic thanks to high levels of polyphenols.
Image result for Ashwagandha pic

Ashwaganda

Ashwagandha is commonly used in Ayurvedic medicine and is known for easing fatigue and nervous exhaustion. According to The Chopra Center, it can also build your resistance to stress, which may improve your energy level. Avoid ashwagandha if you take medications for anxiety, seizures or insomnia.
Image result for Astragalus pic

Astragalus

Astragalus increases the metabolism and is an excellent remedy for fatigue. You can purchase it in the form of a tincture, tea or capsules. It is extremely safe, but you should not take it if you have an infection or high fever because it may strengthen the virus instead of you. You should also avoid it if you take blood thinning medications or beta-blockers. It is commonly used with other herbs, likeginseng, and has been shown to reduce fatigue in athletes.

Stinging Nettle

Stinging nettle as a tea (infusion) can give you more energy than a cup of coffee, without the negative stimulant effects. It's no wonder; nettles are jam-packed withvitamins and minerals. Create an infusion using a quart of boiled water and an ounce of dried nettles and allow it to brew overnight. Strain out the herbs and refrigerate. Drink it within a few days and enjoy it often for the full benefits.
Image result for Reishi pics

Reishi

Reishi is a rare mushroom that is called "the elixir of life" in China. According toNatural News, it is used for increasing energy, boosting the immune system and reducing stress. You can ingest it as a tea, tablet, syrup or tincture. It works so well to increase energy levels that many people drink Reishi tea in place of coffee.

Dangers of Stimulants

Often, people will turn to stimulants when they feel that afternoon slump. Most experts agree, the over use of stimulants can actually do more harm than good. They can increase your blood pressure as well as your heart rate which can lead to a stroke or heart attack. Stimulants can also cause irritability, nervousness, sleep problems, headaches and stomach problems.
Several herbs can act as stimulants. Think about ephedra or guarana, which have been criticized for being unsafe. Ephedra was even banned by the FDA in 2004, though most herbalists agree that the problem was with the abuse of this powerful herb, not the herb itself.

Use Only Occasionally

Using these 7 top herbs for energy occasionally is not harmful, but if you seem to be constantly fatigued, you should speak to your medical practitioner. Your fatigue may be caused by an underlying illness. Consider, too, that your diet can be zapping your energy. Eliminate caffeine, sugar and additives from your diet, and you will be surprised at how your energy levels improve.

Network Monitoring Best Practices


1. Overview:

The fact that monitoring is one of the most important components of a network has been reiterated multiple times throughout this document. It is only with continuous monitoring that a network admin can maintain a high performance IT infrastructure for an organization.
Like the common practices which we discussed earlier, there are also best practices that are applicable to network monitoring. While common practices define the basic components that are essential for network monitoring and are applicable to every network, best practices for monitoring is a guideline to implement a good network monitoring strategy. Adopting the best practices can help the network admin streamline their network monitoring to identify and resolve issues much faster with very less MTTR (Mean Time To Resolve). Let us look at a few network monitoring best practices that are followed in many enterprises world-wide to help create a high performing network.

2. Baseline network behavior:

To be able to identify potential problems even before users start complaining, the admin needs to be aware of what is normal in the network. Baselining network behavior over a couple of weeks or even months will help the network admin understand what normal behavior in the network is. Once normal or baseline behavior of the various elements and services in the network are understood, the information can be used by the admin to set threshold values for alerts.
When an element in the network is malfunctioning, some of the metrics associated with the node performance would display a deviation from their mean value. For example, the temperature of a core switch in the network may shoot-up. The increase in temperature can be due to an increase in CPU utilization on the switch. Understanding the normal temperature and CPU utilization of the device will help the network admin detect the deviation and take corrective actions before a malfunction occurs.
Knowledge of baseline behavior in regards to network elements helps an admin decide the thresholds at which an alert has to be triggered. This aids proactive troubleshooting and even prevents network downtime rather than being reactive after users in the network start complaining.

3. Escalation matrix:

One of the reasons why potential network issues become an actual network problem is because the alerts triggered based on a threshold are ignored or the right person is not alerted. In a large network, there are can be multiple administrators or people who take care of different aspects of the network. There can be the security admin who looks at firewall devices and Intrusion Prevention Systems, the systems admin, or even an admin responsible only for virtualization.
When setting up monitoring and reporting, the organization should have a policy on who has to be alerted when a malfunction occurs, or a potential problem is detected. Based on the policy, the right person who is administers the network aspect that is having an issue can be alerted. This in turn can reduce the time needed for analysis which further reduced the MTTR.
In addition to alerting the right admin, an escalation matrix is also necessary. An escalation plan ensures that issues are looked at and resolved on time. Specifically, when the person in charge of that element is not available or takes a long time to resolve the issue. The implementation of a well-thought out escalation matrix prevents small issues from growing into large scale organizational-wide problems.
Image result for osi 7 layer model pic

4. Reports at every layer:

Networks function based on the OSI layer and every communication in a network involves transfer of data from one system to another through various nodes, devices and links. Each element in the network that contributes to data transfer functions at one of the layers, such as cables at the physical layer, IP addresses at the network layer, transport protocols at the transport layer, and so on.
When a data connection fails, the failure can happen at any one of the layers or even at multiple points. Using a monitoring system that supports multiple technologies to monitor at all layers, as well as different types of devices in the network would make problem detection and troubleshooting easier. Thus, when an application delivery fails, the monitoring system can alert whether it is a server issue, a routing problem, a bandwidth problem, or a hardware malfunction.

5. Implement High Availability with failover options:

Most monitoring systems are set up in the network they monitor. This allows for quicker and better data collection from monitored devices. But if a problem occurs and the network goes down, the monitoring system can go down too, rendering all the collected monitoring data useless or inaccessible for analysis.
This is why it is recommended to implement a monitoring strategy with High-Availability through failover. High Availability (HA) ensures that the monitoring system does not have a single point of failure and so even when the entire network goes down, the monitoring system is accessible, providing data to the network engineer for issue detection and resolution. One method for HA is failover where the monitoring data collected by an NMS is replicated and stored in a remote site. In case of failure at the primary monitoring system, the failover system can be brought up (or automatically come up) and provide data needed for troubleshooting. And to avoid a single point of failure, it is recommended to set up the failover system at a remote DR site.

6. Configuration management:

Most network issues originate from incorrect configurations. There are several instances where even minor configuration mistakes have led to network downtime or loss of data. For example, when a new service is implemented in the network and firewall rules are being added, the person adding the new firewall rule may end blocking a business critical application, or allowing non-business traffic.
This is where configuration management is applicable. When configurations are changed on devices, which include network and security devices, like routers, switches, or firewalls—with the help of configuration management, the network administrator can verify that the changes being made do not break an already working feature. Configuration management can also be used for backing up working configurations, and to make bulk configuration changes, which otherwise could take a significant amount of time and prevent unauthorized changes. Unauthorized configuration changes to devices can lead to serious security lapses that include hacking and data theft. With configuration management, the admin can keep an eye on who is making a change, what change is being made, and even provide access control to configuration changes.
Configuration management is the proactive part of network monitoring. Furthermore, configuration management helps prevent issues from occurring in the network, rather than alerting about potential problems after they begin.
Image result for networking pic

7. Capacity planning and Growth:

This applies to both the network in general and network management. When an organization grows, the IT infrastructure associated with the organization also should grow. An increase in business or addition of employees for an organization has effects on the number of devices needed, network and WAN bandwidth, storage space, and many more factors.
Monitoring systems allows you to keep tabs on resources in the network and be it with free, open-source, or licensed monitoring tools—there is always a limit on the number of resources and elements that can be monitored with a specific configuration or installation. In some cases, the server on which the monitoring system is installed may need upgrades to processing power and memory. In other instances, it might be the need to add-on installations to increase functionality, or in some cases it can be an increase in the license needed for the monitoring system.
When setting up a monitoring system account for future growth, it can affect the server sizing for installation, and for licensing—which controls the number of resources that can be monitored. Separate purchases, upgrades, or even moving to a new monitoring system as the network grows is much more expensive than spending a bit more capex when setting up the monitoring system.

8. Tips / Resources

  1. The Ultimate CPU Alert
  2. Monitoring Feature Function Matrix
  3. Network Management Tool

How to Update Router Firmware



Update the router firmware from the web interface. Locate the firmware upgrade option, typically listed under "Administration" as update or upgrade firmware. Once located, a dialogue box will prompt you to select the file from a location on your hard drive. Click the "Browse" button and locate the firmware update file you just downloaded. Once you have located the file, click upgrade or update firmware and wait for the firmware update process to complete. The router's firmware has been updated to the latest version.

Image titled Update Router Firmware Step 1


Determine the router's model and version number. Locate and write down the model and version numbers, typically located on the underside or backside of the router. The required information often is located near the manufacturer's logo.

Image titled Update Router Firmware Step 2

Download the latest firmware update. Using your Internet browser, navigate to the manufacturer's website. Navigate to the support or download section of the website and select your model from the list of products, or try entering the product information in the search field.
  • Select the link for the latest firmware upgrade and click "OK" to save the file when prompted. The download will be completed in a few minutes or less. The firmware update has been downloaded and saved to the system's hard drive.
Image titled Update Router Firmware Step 3

Locate the default gateway and IP address for your router on a PC running Windows. You will need to locate either the router's default gateway or IP address, depending on the router's manufacturer, in order to access the router's web interface. From the start menu enter "cmd" into the search field. With the command screen open, type "ip/config/all. The default gateway and IP addresses will be located under the IP configuration information.

Image titled Update Router Firmware Step 4

Locate the default gateway and IP address for your router on a Mac running any version of Mac OS X. Click the Apple icon on the far left of the menu bar and select the system preferences option from the pull-down menu. Then select "Internet and Wireless" from the network menu.
  • Click the "Advanced" button in the Network dialogue box and open the TCP/IP tab. The default gateway address will be listed under "Network." Write down the gate default gateway and IP address information, and exit the dialogue box.
  • Type "ip/config/all" with the command screen open. The default gateway and IP address will be listed among the IP configuration information.
Image titled Update Router Firmware Step 5

Access your router's web interface using the default gateway. Use the default gateway number or IP address, depending on your router's specifications, to access the web interface for your router. Type the default gateway or IP address into the address bar of your Internet browser. Press enter if you are not immediately directed to your router's web interface. The web interface will appear in your web browser window.

Image titled Update Router Firmware Step 6


Boko Haram Widely Deploying Female Suicide Bombers

Boko Haram has deployed 50 female suicide bombers according to a confession by an arrested teenage girl bomber, aiming to kill 100,000 by years end.
A casualty of an earlier suicide bombing by Boko Haram in a marketplace in the city of Jos (Photo: © Reuters)

The head of the Nigerian Air Force has said that his warplanes have been able to incapacitate Boko Haram with a concerted bombing campaign according to local newspaper The Sun. Chief of Air Staff, Air Mar­shal Adesola Amosu said that the air force had inflicted considerable damage to Boko Haram militants  in the north-east of the country.  

This does not seem in keeping with the recent information coming out of Nigeria. Despite advances in several areas, such as the recapture of the town of Mubi in Adawama State and the return of their Emir, Alhaji Abubakar Isa a few days ago, Boko Haram have continued their campaign of terror. Over the last 12 months, Boko Haram has killed 10,000 people, a comparable number to the Islamic State.

Sen. Ahmed Zanna, who represents Nigeria's violence-plagued Borno state told NBC News: "The violence has become so bad that people don't have lives anymore. They cannot go to their farms, they cannot go to their businesses. It dominates people's lives every single day. They have no help from the army, the people who are supposed to protect them. They are scared, and that fear is real."

Indeed, they are ramping up their assaults. Two female suicide bombers were arrested in Maiduguri, the capital of Borno State and a city that has seen a rash of attacks over the past few months.  One, arrested at the beginning of December, confessed to a Boko Haram plan that posted 50 female suicide bombers across Maiduguri ready to blow themselves up before the end of the year with the intention of killing 100,000 people.

Mia Bloom, of a Professor of the Center for Terrorism and Security Studies at the University of Massachusetts Lowell, told Vice news that the recent epidemic of female suicide bombings in Nigeria could have been carried out by the kidnapped schoolgirls of Chibok.


Speaking as to why the girls might be acting in this way, she said "either because of brain washing, or because Boko Haram has humiliated them sexually, like with rape, so that there's no option but to become a suicide bomber because of the honor code in place in traditional Nigerian societies" 

For more information about the Sunni Islamist group wreaking havoc across Nigeria, see Clarion Project's Factsheet: Boko Haram: Nigeria's Islamist Group.

RECENT ARTICLES

Featured Posts

Rental Properties for Sale, Santa Marianita, Ecuador

  Beautiful rental with beach access. Utilities and WiFi are included, just bring your food and move in. *Be sure to ask about our long-term...

Popular Posts