Amazon Simple Notification Service (SNS) is a cloud service for coordinating the delivery of push messages from software applications to subscribing endpoints and clients. Continued…
Quote of the Day
“Push architectures can reduce CPU and network usage and bring greater energy efficiency to mobile devices.” – George Lawton
Compare Amazon SNS to other push notification services
These push notification services from the big three cloud providers enable mobile app messaging and let developers focus on coding application logic.
Can AWS push notifications improve service performance?
AWS push notifications can be harbingers of bad news, but they provide a necessary service for IT teams operating in the AWS cloud.
Amazon cloud services: What’s new?
Expert Chris Moyer discusses whether Amazon cloud services are new or simply updates of older services.
Find an AWS messaging service to fit your needs
AWS messaging services meet different enterprise needs. Choose carefully between Amazon SQS and SNS to ensure you’re using the right system for the job.
Real-time app development helps minimize delays
AWS provides several services for real-time app development, but developers must be careful to reduce delays throughout the development pipeline.
_______ notfications are CPU-intensive because they must continually poll a remote server.
Content marketing is the publication of material designed to promote a brand, usually through a more oblique and subtle approach than that of traditional push advertising. Continued…
Quote of the Day
“If we come up with a great idea today, but can’t execute it until next month, it’s worthless in real-time content marketing.” – Blair Hammond
The dos and don’ts of brand content marketing
As consumers get savvier about avoiding traditional advertising, companies are turning to brand content marketing to become trusted providers of information.
Thought leadership content marketing: How the IT channel can benefit
Learn how thought leadership content marketing can help IT channel firms build their businesses’ reputations in the industry and generate new leads.
Five common pitfalls in content marketing strategies
While it may seem hard to believe, companies aren’t yet convinced that they need content marketing strategies to be successful.
Creating an effective content marketing strategy
A content marketing strategy starts with homing in on customer experience and aligning technology and processes with it.
Content marketing strategies can soar — or fall flat
Too often, companies’ content marketing strategies lack insight into what content resonates with target audiences and prompts action like sales.
______ marketing often uses traditional offline advertising methods like flyers, magazines, television, radio and billboards.
A storage snapshot is a set of reference markers for data at a particular point in time. Continued…
Quote of the Day
“Storage snapshots act almost like a rewind feature for admins, enabling them to roll back to uncorrupted versions of data. Unfortunately, they aren’t as simple as hitting a button.” – Jim O’Reilly
Implement cloud storage snapshots to protect critical data
Cloud storage snapshots let admins roll back to uncorrupted versions of data. Learn how often to take them, and prepare for these potential issues.
Snapshot management tool adds intelligent data management
Copy data management innovator Catalogic updates ECX snapshot management tool to version 2.6, supporting a broader number of databases and file systems.
When does storage snapshot technology work best?
Learn why storage snapshot technology is best equipped for certain rollbacks, and when to use it for application server protection.
Everything you need to know about snapshotting
Jason Buffington looks at how snapshotting works, why storage snapshots matter, different snapshot mechanisms and how to get more from them.
How to choose the right snapshot method
Snapshots and replication are popular data protection tools, but they present challenges. Learn how to find the right snapshot method for your data center.
Data _____ is used for long-term data retention of information not needed for everyday operations.
Natural language processing (NLP) is the ability of a computer program to understand human speech as it is spoken. Continued…
Quote of the Day
“The new wave of enterprise interfaces will rely on natural language processing and generation, visual analytics and gesture interpretation — technologies powered by AI.” – Nicole Laskowski
Three trends to keep top of mind when crafting an AI strategy
When developing an AI strategy, CIOs should consider three trends, according to Gartner analyst Whit Andrews.
NLP technology inspires customer interaction projects in key verticals
NLP technology is starting to generate projects for IT service companies as businesses look to improve customer experience through chatbots and other apps.
Call center automation advances, but only as far as NLP can take it
Call center automation is changing customer service and enriching survey efforts, but strides forward hinge on natural language processing improvements.
Health IT experts discuss how they’re using NLP in healthcare
NLP in healthcare will become increasingly important. Two health IT experts discuss how they’re using NLP in their healthcare organizations.
The relationship between population health and NLP in healthcare
Two health IT experts discuss NLP in healthcare and the role it plays in achieving population health.
_____ learning algorithms are stacked in a hierarchy of increasing complexity and abstraction.
Bayesian statistics is a mathematical approach to calculating probability in which conclusions are subjective and updated as additional data is collected. Continued…
Quote of the Day
“If we’re going to live in a world where things are going to be driven by algorithms, we have to be able to convey their ambiguity.” – Donald Farmer
AI analytics expected to rise, along with management complexity
The use of AI analytics applications and the complexity of managing them are both likely to grow, according to predictions by consultants and vendor execs.
Security looks to machine learning technology for a cognitive leg up
Machine learning technology has proven to work well for some information security tasks, acting as a cognitive leg up for security managers and analysts.
Right data mining data sets are a must for proper predictive modeling
To help avoid analytics errors, data scientists need to be careful when choosing the data mining data sets they use to build predictive models.
Analytics VP: AI projects must be built on a good data foundation
The less-hyped aspects of AI projects, which include data governance, can’t be rushed if companies want to take advantage of the technology.
Think different: Cognitive computing systems will bring data-led change
Cognitive computing systems will replace old programming models and devise applications based on data.
This is the simulation of human thought processes in a computerized model.
a. cognitive computing
b. machine learning
Air gapping is a security measure that involves isolating a computer or network and preventing it from establishing an external connection. Continued…
Quote of the Day
“One of the most effective defenses against large scale cyberattacks on critical infrastructure is to establish separate, air-gapped networks that provide a physical line of defense.” – Ken Spinner
Dragonfly 2.0 hacker group seen targeting U.S. power grid
Security researchers tracked the Dragonfly 2.0 hacker group as it used social engineering attacks in order to set up persistent infections on ICS networks.
Using a software-defined perimeter to create an air-gapped network
Learn how the Cloud Security Alliance’s software-defined perimeter can help enterprises build a dynamic, air-gapped network using the cloud.
Best practices for implementing an enterprise network air gap system
Brad Casey discusses how to implement the network air gap system security concept in order to improve protection against advanced attacks in the enterprise.
Protection against ransomware requires strong backup
One of the keys in protection against ransomware is implementing a solid data protection strategy that includes having data spread across different media.
Separate but equal: Mitigating the risk of Web-borne malware infections
Web-borne malware infections are a key threat to systems, but systems have to be running to be harmed. Separation is an effective method to reduce the potential damage of a malware attack.
This is a type of malware designed to obtain administrator-level access to the victim’s system.
b. Trojan horse
Consignment inventory is a supply chain model in which a product is sold by a retailer, but ownership is retained by the supplier until the product has been sold. Continued…
Quote of the Day
“Tackling the inventory challenge requires investment, but it can be attained quickly via real-time connectivity and sophisticated orchestration across different systems.” – Oliver Guy
What can a materials planner do to better manage inventory?
A materials planner is in the tricky position of ensuring the right balance of inventory. Here’s some advice on striking the balance of enough, but not too much.
Three ways IoT is transforming inventory management
The connectivity and real-time analytics inherent in the internet of things could be the game changer for retailers’ inventory woes.
The essential guide to supply chain management best practices
Supply chain management best practices include collaboration, strategy and technology. This guide provides essentials on all three.
Top four supply chain strategies to create the omnichannel experience
Transforming your supply chain to deliver an omnichannel experience is key to gaining a competitive edge. Here are four ways to make that happen.
Eight keys to supply chain sustainability
Supply chain sustainability is critical to businesses looking to build a competitive edge and brand image. Here’s some guidance you need to know.
__________ management is primarily about specifying the quantity and placement of stocked goods.
On-demand computing is a delivery model in which computing resources are made available to the user as needed. Continued…
Quote of the Day
“Cloud computing has shifted the technology model, giving customers on-demand computing services over the Internet…” – Nicole Lewis
Curb on-demand self-service risks with cloud inventory management
Cloud’s on-demand self-service model can lead to shadow IT risks. Fortunately, admins can use cloud inventory management to regain control.
Autonomic computing may pave the way to software-defined data centers
With larger IT shops under increasing pressure to deliver competitive applications and services, many see autonomic computing as a solution.
The true definition of cloud computing is still lost on some IT pros
The true definition of cloud computing, in many cases, has been lost on businesses and even some IT teams. Expert Mark May clears up the confusion.
Cloud BI projects: Partners finding BI work, but not profits
Cloud BI work is growing for channel partners, who find ample consulting opportunities. But they must make do without traditional BI income sources, such as servers and storage.
Which cloud model is best for your big data project?
While public, private and hybrid cloud can all play a role in your big data project, public cloud is emerging as the most popular option. But that doesn’t mean it’s right for you.
Cloud ___________ is the exercise of administrative control over public, private and hybrid clouds.
An Internet meme is a cultural artifact that spreads rapidly, reaching a very large digital audience within a short period of time. Continued…
Quote of the Day
“The task of finding out how well companies perform on social media and how much attention they attract is important to a company’s marketing strategy. Many organizations engaged in social media marketing have difficulty measuring performance.” – Nicole Lewis
Social media tools and applications: Channel execs sharpen strategies
Social media tools and applications can help channel partners promote their brands, but companies must carefully devise strategies to get results.
How important are social media backup methods?
Be proactive about your organization’s social media backup, as each social networking site has its own way of storing data.
Your business communication plan should include impact of social media
A business communication plan should contain social media risk analysis. In this social media-centric world, it’s crucial to track employee behavior.
Marketing’s next movement: Social media sentiment analysis tools
AI, BI and big data coupled with social media sentiment analysis tools show potential for marketing automation and next-generation sales.
Social monitoring tool add-ons to measure engagement
Many companies now look for social monitoring tool add-ons to measure audience engagement. Here are a few options.
________ marketing is any marketing technique that induces websites or users to pass on a marketing message to other sites or users.
A DSC pull server (desired state configuration pull server) is an automation server that allows configurations to be maintained on many servers, computer workstations and devices across a network. Continued…
Quote of the Day
“The DSC push/pull model adds flexibility to environments that require a particular mode to maintain proper configurations.” – Tim Warner
Windows Server 2016 changes prompt a new look at management
Some server admins prefer traditional GUI management, but certain Windows Server 2016 changes steer users toward automation — and the cloud.
Windows PowerShell DSC book trains IT to lock down systems
This Windows PowerShell DSC book explains the fundamentals of the configuration management platform and shows admins how to set it up for their organization.
These Windows configuration management tools can prevent mishaps
Windows configuration management tools can ensure that organizations remain compliant — even if undocumented changes are made to systems.
Getting acquainted with PowerShell Desired State Configuration
PowerShell Desired State Configuration has a few advantages over other systems management tools. Here are some of its benefits.
Learn the basics of PowerShell Desired State Configuration
PowerShell Desired State Configuration is a configuration management feature in Windows PowerShell. Learn the fundamentals and where it can help.
_________ management allows a system administrator to monitor and manage servers by remote control.