Recently Updated Pages
ICX Spanning Tree Commands
Introduction Best practice switch port configuration for trunk and access ports. Method ...
Recovering from a Lost Password
Introduction If a password has been configured for the device but the password has been lost, ...
Recovering Software Image
Introduction This section explains how to recover ICX devices from image installation failure ...
Clouding an ICX Switch
Introduction SmartZone management and monitoring of ICX switches. The initial release (v.08.0....
Upgrading ICX Firmware via TFTP
Introduction Following best practices and for some features to work the firmware of the ICX sw...
Upgrading ICX Firmware via USB
Introduction Following best practices and for some features to work the firmware of the ICX sw...
Initial/Basic Setup of an ICX Switch
Introduction Direct management of ICX switches can be performed either via a command-line inte...
Upgrade Ruckus AP via SSH/FTP
Introduction Should you have an issue upgrading a Ruckus AP's firmware via Web GUI, you can up...
Enhancing WiFi Performance for Remote Work
https://www.linkedin.com/pulse/enhancing-wifi-performance-remote-work-jarryd-de-oliveira-xkoje ...
Articles written for Renovotec Ltd
Below are a list of articles that i was involved with writing for Renovotec Ltd https://renovote...
WiFi 6E and the 6 GHz Spectrum: Key Insights
https://www.linkedin.com/pulse/wifi-6e-6-ghz-spectrum-key-insights-jarryd-de-oliveira-rnrme In...
π‘ WiFi Transmit Power Calculations Made Simple: A Guide to Keeping Your Regulatory Domain Happy and Being a Good Neighbor π
https://www.linkedin.com/pulse/wifi-transmit-power-calculations-made-simple-guide-your-de-olive...
The Critical Need for Cybersecurity in the Modern Corporate Landscape
https://www.linkedin.com/pulse/critical-need-cybersecurity-modern-corporate-jarryd-de-oliveira-tv...
The Critical Need for Cybersecurity in the Modern Corporate Landscape
https://www.linkedin.com/pulse/critical-need-cybersecurity-modern-corporate-jarryd-de-oliveira-tv...
Best Practices for Setting Up a Secure and Efficient Wireless Network: The Role of VLANs and Firewalls
https://www.linkedin.com/pulse/best-practices-setting-up-secure-efficient-wireless-role-de-olivei...
The Security Fortifications of WiFi 6: A Shield Against Cyber Threats
https://www.linkedin.com/pulse/security-fortifications-wifi-6-shield-against-cyber-de-oliveira/?t...
Ransomware in Business: Understanding the Threat, Mitigating the Risk, and Recognizing the Signs
https://www.linkedin.com/pulse/ransomware-business-understanding-threat-mitigating-risk-de-olivei...
Unsecured Wi-Fi: A Silent Threat to Your Data
Wi-Fi is great for letting guests and employees connect with their own devices, but if you donβ...
Enhancing Network Security: Exploring the Benefits of WPA3, WPA3 Enterprise, and OWE
https://www.linkedin.com/pulse/enhancing-network-security-exploring-benefits-wpa3-owe-de-olivei...
π°οΈ Unveiling the Functions of the 802.11 PHY Layer: A Deep Dive into Wi-Fi Standards from 802.11 Prime to 802.11be
https://www.linkedin.com/pulse/unveiling-functions-80211-phy-layer-deep-dive-wi-fi-from-de-olivei...