The 3-2-1 backup is a reliable recovery methodology for ensuring that data is protected adequately and backup copies of the data are available when needed. Continued…
Quote of the Day
“Off-site backup has always been a key piece of the 3-2-1 Rule of Backup: three copies of data, on two different media, with one of the copies off-site.” – Nick Cavalancia
Protect backups from ransomware and other security risks
Backups are an excellent way to return enterprises to a known good state. That’s why it’s essential to secure and protect backups from ransomware and other security risks, whether man-made or natural. Learn how to align your backup and security strategies for better protection and recovery.
Veeam backup software preps for NAS, more ransomware protection
Veeam backup software takes on NAS and ransomware. The data protection and management provider has also shifted to a subscription-focused licensing model.
Does multi-cloud backup have a future, or is it hype?
Is multi-cloud backup worth the hype? Many businesses see its value, but it may not be a major concern for yours. Looking at it from a few different perspectives could help you decide.
5 biggest data backup mistakes — and how to avoid them
Data backup mistakes can be ruinous. For example, what if you have only one backup copy and ransomware gets in? Explore how to avoid common errors to protect your business.
What is the difference between cloud backup and off-site backup?
We delve into the cloud backup vs. off-site backup argument, and outline the four areas you need to consider when creating a strategy that will enable you to recover your data if a disaster strikes.
Continuous data protection offers recovery options _______ are simply not possible with a traditional backup system.
Service-oriented architecture (SOA) is a software development model for distributed application components that incorporates discovery, access control, data mapping and security features. Continued…
Quote of the Day
“SOA and microservices often differ more on implementation than on principle.” – Tom Nolle
API workflow design patterns for microservices scenarios
Workflow orchestration is fundamental for multicomponent applications. Often, the first step in designing a microservice application is to decide from a number of API workflow design patterns.
5 basic SOA principles that still apply to microservices
Microservices represent a shift in application development and management practices, but the old SOA principles haven’t gone far. While the particulars of implementation may have changed, the fundamental goals of microservices and SOA remain the same.
The fundamental differences between microservices and SOA
While many basic principles carry over, there are still many nuances between microservices and SOA. Find out what SOA developers should know about working with microservices and how to seamlessly make a transition from the monolith.
How integration platform as a service stacks up against PaaS and SaaS
Integration platform as a service is similar to its more well-known counterparts, SaaS and PaaS, but software teams must make an important distinction around how they intend to use these services.
Microservices vs. SOA: Quiz yourself on the great debate
How much do you know when it comes to the microservices vs. SOA debate? Take this quiz and test your knowledge on the architectural approaches.
If you’re not _______ well-versed in microservices and containers, you’re behind the pack.
B. all ready
RFID (radio frequency identification) is a form of wireless communication that incorporates the use of electromagnetic or electrostatic coupling in the radio frequency portion of the electromagnetic spectrum to uniquely identify an object, animal or person. Continued…
Quote of the Day
“With the rise of smart retail and high competition among companies, RFID technology plays an increasingly important role in improving the competitiveness of modern retail enterprises.” – Morris Qiu
Use cases of RFID in retail
RFID technology is bringing new opportunities for retailers, says Chainway’s Morris Qiu, helping them improve supply chain efficiency, collect and analyze data, and improve customer experience.
How IoT is changing the future of the retail industry
The retail landscape is getting a makeover thanks to the internet of things. Mindinventory’s Mehul Rajput discusses six benefits of IoT in retail.
Use cases and benefits of smart sensors for IoT
Learn the ways in which smart sensors for IoT are transforming how various verticals, from manufacturing to logistics, collect and analyze data to improve processes and decision-making.
Keycard vulnerability threatens millions of hotel rooms
A keycard vulnerability enabled researchers to create a master key to access every room in a targeted hotel, potentially putting millions of rooms at risk of a break-in.
Which supply chain visibility tools help improve logistics?
Today, six technologies — new and older — are functioning together to create more effective supply chain visibility tools. Here’s a look.
An enhanced driver’s license contains _______ that allows authorities to pull up your data.
a. a RFID tag
b. an RFID tag
Network-attached storage (NAS) is dedicated file storage that enables multiple users and heterogeneous client devices to retrieve data from centralized disk capacity. Continued…
Quote of the Day
“NAS is general-purpose storage: It’s a great choice for some cases, but it may not be the best option in other instances.” – Brien Posey
Discover the best NAS products for your organization
There are multiple NAS devices on the market, including products from Dell EMC, HPE and NetGear. In this product roundup, discover the best NAS products for your business.
SAN vs. NAS: A diagram of the differences
In the SAN vs. NAS debate, you might not be sure which option is best for your organization. Here, we cover the differences between SAN and NAS, discuss the benefits of each and provide some simple diagrams.
Top 4 NAS backup strategies for your data protection
NAS backup strategies have evolved, and now the cloud is a prominent player in network-attached storage protection. Explore general methods, as well as specific products you can use for NAS backup.
Pure Storage buys Compuverde, expands file storage
Pure Storage digs deeper into unstructured data with the acquisition of Swedish startup Compuverde, which sells software to cluster nodes on premises and in clouds.
SAN vs. NAS architecture: How do the two storage systems compare?
Learn more about the SAN vs. NAS battle and how the two architectures compare and contrast, as well as the advantages and disadvantages of each. Also, explore where SAN and NAS are headed in the future.
This isn’t a problem for most organizations today, but potential storage limits should ________ be considered when planning a new gateway deployment.
B. all ways
Smoke testing, also called build verification testing or build acceptance testing, is nonexhaustive software analysis that ascertains that the most crucial functions of a program work but does not delve into finer details. Continued…
Quote of the Day
“The combination of early smoke tests and later full regression tests lets organization cost-effectively speed application development.” – Lubos Parobek
How to meet QA responsibilities during a software tester shortage
Don’t abandon QA responsibilities when in the middle of a software tester shortage. Here’s when it makes sense to seek out a testing-as-a-service provider or shift QA tasks to developers.
3 ways to test in production promptly and productively
The proliferation of app dev advances, like automation, Agile and DevOps, prompted QA professionals to increasingly test in production. Use these three methods to perform timely and efficient QA in applications’ live environments.
Move into better QA with shift left and shift right testing
Traditional QA causes traditional problems — namely, bottlenecks and long bug resolution times. Shift left and shift right testing aim to solve those problems, as these approaches make developers more accountable for code quality and incorporate user feedback.
Software tester roles must embrace code focus
As IT works together on QA and continuous testing takes hold, software tester roles must adapt to understand code and catch bugs early in the process. However, some worry that an overemphasis on code will erode traditional QA expertise.
Why DevOps development depends on continuous testing
Continuous testing isn’t the sole responsibility of QA and IT ops professionals. If DevOps teams really want to operate at peak efficiency, then development must evolve and absorb some of the testing load.
Treating testing as a ________ rather than something that should be done continuously throughout software development is a recipe for defective software.
Deep packet inspection (DPI) is an advanced method of examining and managing network traffic. Continued…
Quote of the Day
“DPI enables IT administrators and security officials to set policies and enforce them at all layers, including the application and user layer, to help combat malware and other threats.” – Lee Doyle
How can organizations address VoIP security threats?
VoIP security threats can cost an organization time and money, but the right tools can prevent fraud, stolen credentials and intercepted traffic. Learn what security provisions organizations can put in place to better protect against VoIP threats.
How to deploy deep packet inspection in the cloud
Deep packet inspection in the cloud can help improve enterprises’ network security, but it also raises some privacy concerns. Learn about potential problems with DPI and how to get around them.
How best to secure cloud computing in this critical era
Secure cloud computing first requires an understanding of the nature of the risk and, then, how to apply the best tools and practices to minimize it. This guide collects our recent must-reads to help you outsmart the threats.
Deep packet inspection tools: Proxy vs. stream-based
Deep packet inspection tools were once used mostly by service providers. Now that enterprise network managers are considering DPI tools, they’ll have to determine the strategy that works best for their environments.
Where SDN and DPI technology meet: Centralized control and automation
When SDN and DPI technology meet, network engineers have the means to apply monitoring and management policy to the overall network instead of to individual components.
A botnet is a group of computers organized to distribute spam or malware — _________ the owners are typically unaware of the fact.
c. even though
Passwordless authentication is a verification process where a user confirms his or her identity without the requirement of manually entering a string of characters. Continued…
Quote of the Day
“Passwordless authentication isn’t automatically secure, and its security depends on its implementation.” – Kevin Beaver
Despite Windows 10 issues, customers remain confident in OS
Windows 10 issues continue to generate headlines and appear to be giving the operating system a bad name. But that’s more appearance than reality for Microsoft customers, according to one analyst.
Benefits of mobile passwordless authentication
With passwordless authentication for mobile devices, IT ensures that its organization isn’t one guessed password away from a major breach. This technology relies on authentication factors such as trusted email accounts and devices.
Microsoft wants to eliminate passwords — and there’s an app for that
Microsoft bolstered its plan to eliminate passwords with an update to its Microsoft Authenticator app, which will extend passwordless logins for Azure AD-connected apps.
Identity management strategy starts with people, not technology
In this Q&A, Gartner analyst Kevin Kampman discusses how an organization’s identity management strategy has transformed and the way organizations should incorporate identity management into their business process.
Ponemon study: Poor password practices remain rampant
A Ponemon Institute report, sponsored by Yubico, revealed that despite concerns over privacy and data protection and a greater understanding of security practices, poor password practices are still rampant.
The phishing email warned that unless I updated my contact information, my eBay account would be ______________.
A social robot is an artificial intelligence (AI) system that is designed to interact with humans and other robots. Continued…
Quote of the Day
“There are lots of people who have come out and taken a dystopian view that computers are going to ultimately take over the world and wipe us out. Then, there’s a more hopeful view, which is that we still – at least for the foreseeable future – call the shots and engage where we choose to and AI acts on our behalf.” – Anthony Scriffignano
AI in the legal industry focuses on augmenting research
Robot lawyers are here. Well, not exactly, but lawyers are augmenting their work with content discovery, organization and predictive analytics. AI applications can even offer self-help legal aid that bypasses the need for initial consultations or legal services. Read how AI in the legal industry is transforming legal processes.
Debate over AI in the workforce requires a broad view
From total AI labor domination to simple automated process implementation, gauging the employment impacts of AI in the workforce has never been harder. Every think-piece on the future of work revolves around finding an answer that avoids job loss. But what if we’re asking the wrong question?
The steady evolution of RPA to intelligent automation
The evolution of RPA is a long journey, one that started more than two decades ago. While the core function of automation remains the same, the complexity and use cases of RPA have expanded over the years and will likely continue to grow.
How AI process automation helps simplify enterprise workflows
AI process automation tools are helping enterprises make their workflows more intelligent and speed up processes that today are drowning in paper and inefficiency.
Robot social engineering works because people personify robots
Robot social engineering could be a viable attack vector in the future, according to Brittany ‘Straithe’ Postnikoff, both because of the various social abilities that robots can use and because robot manufacturers don’t focus on security.
Although some parts of the consumer industry are adept at using artificial intelligence apps practically and profitably, most businesses are slow to ________ and implement AI.
Metadata management is the administration of data that describes other data. Continued…
Quote of the Day
“Big data often comes with big data management problems. Clean, well-defined metadata can make the difference in analyzing big data and delivering actionable business intelligence.” – Scott Robinson
Get to know data governance tools for the enterprise
Data governance tools can help businesses address a number of content management issues. Learn more about some of those platforms and the problems they solve.
IBM Spectrum storage refresh targets object, AI metadata
Discover, part of IBM Spectrum storage software, improves metadata management for AI and big data analytics on large-scale file and object storage. IBM boosted Spectrum data protection and Cloud Object Storage capacity. VersaStack with FlashSystem 9100 NVMe flash is in preview.
Solix archiving takes files, databases, email to the cloud
Solix archiving goes SaaS. Labeled ‘archiving as a service’ by the vendor, SolixCloud Enterprise Archiving offers file, database and email archives in Microsoft Azure.
A strong metadata management process eases big data woes
A well-organized metadata management process can make all the difference in analyzing big data and delivering actionable business intelligence results.
How metadata management relates to data governance and MDM
Without effective metadata management processes, an organization couldn’t have a successful data governance or master data management program, says consultant Anne Marie Smith.
Although big data is getting bigger all the time, much of the data being collected ___ useless.
VM automation is the ability for a virtual machine (VM) to perform basic functions and optimize performance on its own or with minimal manual input. Continued…
Quote of the Day
“Admins looking to automate VM tasks should consider whether or not their workloads are large enough to benefit from automation.” – Stefani Muñoz
VM automation strategies and benefits for sizable workloads
VM automation can provide several benefits, such as speed and consistency, but not all workloads are suited for this process. IT administrators must be aware of their own workloads, common mistakes and tools offered before incorporating automation into their environments.
What VM automation tools are available?
Learn about the various types of VM automation tools you can choose from to enable rapid and predictable resource provisioning. Automation is rarely a discrete product, but is part of a larger tool set, so careful evaluation is necessary.
VMware Workstation 15’s built-in REST API eases VM automation
VMware’s Workstation 15 has several new features — notably, a built-in REST API you can use for automation. Easily power machines off and on, and save time using this helpful tool.
What are the most common virtualization automation mistakes?
There are three primary mistakes you might make when implementing virtualization automation. Avoid them by examining your business policy, double-checking VM configuration and accommodating changing business needs.
How can automation help with VM creation and maintenance?
Automation can help ease VM creation and maintenance, allowing administrators to quickly provision and patch large numbers of virtual servers.
Application streaming and virtualization can help you _______ greater network efficiency.