Network-attached storage (NAS) is dedicated file storage that enables multiple users and heterogeneous client devices to retrieve data from centralized disk capacity. Continued…
Quote of the Day
“NAS is general-purpose storage: It’s a great choice for some cases, but it may not be the best option in other instances.” – Brien Posey
Discover the best NAS products for your organization
There are multiple NAS devices on the market, including products from Dell EMC, HPE and NetGear. In this product roundup, discover the best NAS products for your business.
SAN vs. NAS: A diagram of the differences
In the SAN vs. NAS debate, you might not be sure which option is best for your organization. Here, we cover the differences between SAN and NAS, discuss the benefits of each and provide some simple diagrams.
Top 4 NAS backup strategies for your data protection
NAS backup strategies have evolved, and now the cloud is a prominent player in network-attached storage protection. Explore general methods, as well as specific products you can use for NAS backup.
Pure Storage buys Compuverde, expands file storage
Pure Storage digs deeper into unstructured data with the acquisition of Swedish startup Compuverde, which sells software to cluster nodes on premises and in clouds.
SAN vs. NAS architecture: How do the two storage systems compare?
Learn more about the SAN vs. NAS battle and how the two architectures compare and contrast, as well as the advantages and disadvantages of each. Also, explore where SAN and NAS are headed in the future.
This isn’t a problem for most organizations today, but potential storage limits should ________ be considered when planning a new gateway deployment.
B. all ways
Smoke testing, also called build verification testing or build acceptance testing, is nonexhaustive software analysis that ascertains that the most crucial functions of a program work but does not delve into finer details. Continued…
Quote of the Day
“The combination of early smoke tests and later full regression tests lets organization cost-effectively speed application development.” – Lubos Parobek
How to meet QA responsibilities during a software tester shortage
Don’t abandon QA responsibilities when in the middle of a software tester shortage. Here’s when it makes sense to seek out a testing-as-a-service provider or shift QA tasks to developers.
3 ways to test in production promptly and productively
The proliferation of app dev advances, like automation, Agile and DevOps, prompted QA professionals to increasingly test in production. Use these three methods to perform timely and efficient QA in applications’ live environments.
Move into better QA with shift left and shift right testing
Traditional QA causes traditional problems — namely, bottlenecks and long bug resolution times. Shift left and shift right testing aim to solve those problems, as these approaches make developers more accountable for code quality and incorporate user feedback.
Software tester roles must embrace code focus
As IT works together on QA and continuous testing takes hold, software tester roles must adapt to understand code and catch bugs early in the process. However, some worry that an overemphasis on code will erode traditional QA expertise.
Why DevOps development depends on continuous testing
Continuous testing isn’t the sole responsibility of QA and IT ops professionals. If DevOps teams really want to operate at peak efficiency, then development must evolve and absorb some of the testing load.
Treating testing as a ________ rather than something that should be done continuously throughout software development is a recipe for defective software.
Deep packet inspection (DPI) is an advanced method of examining and managing network traffic. Continued…
Quote of the Day
“DPI enables IT administrators and security officials to set policies and enforce them at all layers, including the application and user layer, to help combat malware and other threats.” – Lee Doyle
How can organizations address VoIP security threats?
VoIP security threats can cost an organization time and money, but the right tools can prevent fraud, stolen credentials and intercepted traffic. Learn what security provisions organizations can put in place to better protect against VoIP threats.
How to deploy deep packet inspection in the cloud
Deep packet inspection in the cloud can help improve enterprises’ network security, but it also raises some privacy concerns. Learn about potential problems with DPI and how to get around them.
How best to secure cloud computing in this critical era
Secure cloud computing first requires an understanding of the nature of the risk and, then, how to apply the best tools and practices to minimize it. This guide collects our recent must-reads to help you outsmart the threats.
Deep packet inspection tools: Proxy vs. stream-based
Deep packet inspection tools were once used mostly by service providers. Now that enterprise network managers are considering DPI tools, they’ll have to determine the strategy that works best for their environments.
Where SDN and DPI technology meet: Centralized control and automation
When SDN and DPI technology meet, network engineers have the means to apply monitoring and management policy to the overall network instead of to individual components.
A botnet is a group of computers organized to distribute spam or malware — _________ the owners are typically unaware of the fact.
c. even though
Passwordless authentication is a verification process where a user confirms his or her identity without the requirement of manually entering a string of characters. Continued…
Quote of the Day
“Passwordless authentication isn’t automatically secure, and its security depends on its implementation.” – Kevin Beaver
Despite Windows 10 issues, customers remain confident in OS
Windows 10 issues continue to generate headlines and appear to be giving the operating system a bad name. But that’s more appearance than reality for Microsoft customers, according to one analyst.
Benefits of mobile passwordless authentication
With passwordless authentication for mobile devices, IT ensures that its organization isn’t one guessed password away from a major breach. This technology relies on authentication factors such as trusted email accounts and devices.
Microsoft wants to eliminate passwords — and there’s an app for that
Microsoft bolstered its plan to eliminate passwords with an update to its Microsoft Authenticator app, which will extend passwordless logins for Azure AD-connected apps.
Identity management strategy starts with people, not technology
In this Q&A, Gartner analyst Kevin Kampman discusses how an organization’s identity management strategy has transformed and the way organizations should incorporate identity management into their business process.
Ponemon study: Poor password practices remain rampant
A Ponemon Institute report, sponsored by Yubico, revealed that despite concerns over privacy and data protection and a greater understanding of security practices, poor password practices are still rampant.
The phishing email warned that unless I updated my contact information, my eBay account would be ______________.
A social robot is an artificial intelligence (AI) system that is designed to interact with humans and other robots. Continued…
Quote of the Day
“There are lots of people who have come out and taken a dystopian view that computers are going to ultimately take over the world and wipe us out. Then, there’s a more hopeful view, which is that we still – at least for the foreseeable future – call the shots and engage where we choose to and AI acts on our behalf.” – Anthony Scriffignano
AI in the legal industry focuses on augmenting research
Robot lawyers are here. Well, not exactly, but lawyers are augmenting their work with content discovery, organization and predictive analytics. AI applications can even offer self-help legal aid that bypasses the need for initial consultations or legal services. Read how AI in the legal industry is transforming legal processes.
Debate over AI in the workforce requires a broad view
From total AI labor domination to simple automated process implementation, gauging the employment impacts of AI in the workforce has never been harder. Every think-piece on the future of work revolves around finding an answer that avoids job loss. But what if we’re asking the wrong question?
The steady evolution of RPA to intelligent automation
The evolution of RPA is a long journey, one that started more than two decades ago. While the core function of automation remains the same, the complexity and use cases of RPA have expanded over the years and will likely continue to grow.
How AI process automation helps simplify enterprise workflows
AI process automation tools are helping enterprises make their workflows more intelligent and speed up processes that today are drowning in paper and inefficiency.
Robot social engineering works because people personify robots
Robot social engineering could be a viable attack vector in the future, according to Brittany ‘Straithe’ Postnikoff, both because of the various social abilities that robots can use and because robot manufacturers don’t focus on security.
Although some parts of the consumer industry are adept at using artificial intelligence apps practically and profitably, most businesses are slow to ________ and implement AI.
Metadata management is the administration of data that describes other data. Continued…
Quote of the Day
“Big data often comes with big data management problems. Clean, well-defined metadata can make the difference in analyzing big data and delivering actionable business intelligence.” – Scott Robinson
Get to know data governance tools for the enterprise
Data governance tools can help businesses address a number of content management issues. Learn more about some of those platforms and the problems they solve.
IBM Spectrum storage refresh targets object, AI metadata
Discover, part of IBM Spectrum storage software, improves metadata management for AI and big data analytics on large-scale file and object storage. IBM boosted Spectrum data protection and Cloud Object Storage capacity. VersaStack with FlashSystem 9100 NVMe flash is in preview.
Solix archiving takes files, databases, email to the cloud
Solix archiving goes SaaS. Labeled ‘archiving as a service’ by the vendor, SolixCloud Enterprise Archiving offers file, database and email archives in Microsoft Azure.
A strong metadata management process eases big data woes
A well-organized metadata management process can make all the difference in analyzing big data and delivering actionable business intelligence results.
How metadata management relates to data governance and MDM
Without effective metadata management processes, an organization couldn’t have a successful data governance or master data management program, says consultant Anne Marie Smith.
Although big data is getting bigger all the time, much of the data being collected ___ useless.
VM automation is the ability for a virtual machine (VM) to perform basic functions and optimize performance on its own or with minimal manual input. Continued…
Quote of the Day
“Admins looking to automate VM tasks should consider whether or not their workloads are large enough to benefit from automation.” – Stefani Muñoz
VM automation strategies and benefits for sizable workloads
VM automation can provide several benefits, such as speed and consistency, but not all workloads are suited for this process. IT administrators must be aware of their own workloads, common mistakes and tools offered before incorporating automation into their environments.
What VM automation tools are available?
Learn about the various types of VM automation tools you can choose from to enable rapid and predictable resource provisioning. Automation is rarely a discrete product, but is part of a larger tool set, so careful evaluation is necessary.
VMware Workstation 15’s built-in REST API eases VM automation
VMware’s Workstation 15 has several new features — notably, a built-in REST API you can use for automation. Easily power machines off and on, and save time using this helpful tool.
What are the most common virtualization automation mistakes?
There are three primary mistakes you might make when implementing virtualization automation. Avoid them by examining your business policy, double-checking VM configuration and accommodating changing business needs.
How can automation help with VM creation and maintenance?
Automation can help ease VM creation and maintenance, allowing administrators to quickly provision and patch large numbers of virtual servers.
Application streaming and virtualization can help you _______ greater network efficiency.
Business analytics (BA) is the iterative, methodical exploration of an organization’s data, with an emphasis on statistical analysis. Continued…
Quote of the Day
“Companies often report the highest analytics success when blending teams, so data scientists working alongside business analysts can produce operational benefits.” – Ed Burns
Guide to telling stories with data: How to share analytics insights
Using data visualizations to convey information can be a challenge. Learn more about telling stories with data in this guide to effective data storytelling.
Data scientist vs. business analyst: What’s the difference?
Many people confuse data scientists with business analysts, but the roles are distinct. One career expert explains data scientist vs. business analyst roles, how they are similar and where they differ.
The direction of business intelligence is changing to forward
As business intelligence is changing quickly, one of the key trends will be the ability for BI platforms to look forward and be predictive, rather than just detail what has already taken place.
Building leaner, meaner BI data sources
Now that business intelligence has broken free from traditional data warehousing, the data that feeds it has taken center stage. In this tip, get advice for building better BI data sources and getting the most out of BI analysis and reporting.
Make better business decisions with financial analytics
Your organization can take advantage of financial analytics to predict the future, make better business decisions and automate data reporting. Not only that, but by using predictive and advanced analytics tools, you can improve the overall performance of your finance department.
The use of a spreadsheet when a data warehouse was required created a situation _______ effective analysis was impossible.
b. in which
A cloud access security broker (CASB) is a software tool or service that sits between an organization’s on-premises infrastructure and a cloud provider’s infrastructure. Continued…
Quote of the Day
“While a cloud access security broker is certainly one of the more useful products available to help achieve a cyber-resilient organization, it’s of limited use without a team capable of understanding these use cases and responding to alerts generated by the system.” – Rob Shapland
Incident response tools: How, when and why to use them
There are several categories of dedicated incident response tools — including vulnerability management, SIEM, network traffic analysis and data loss prevention — that can provide information and analysis and create reports to help organizations prevent and respond appropriately to security attacks.
How cloud access security brokers have evolved
Cloud access security brokers made a big splash when they first entered the industry, but where are they now? Here’s a look at where they stand.
The CASB market is (nearly) gone but not forgotten
A series of acquisitions have drastically reduced the number of stand-alone cloud access security brokers and reshaped the CASB market for years to come.
CASB market poised for channel growth
The CASB market, while nascent, is opening up a significant opportunity for channel firms to address clients’ security concerns.
The pros and cons of proxy-based security in the cloud
Microsoft addressed the issue of proxy-based security for Office 365 and the associated benefits and drawbacks. Learn what Microsoft recommended and why.
Brokers must work closely with cloud providers, while also _________ their services to appeal to customers.
Unified endpoint management (UEM) is an approach to securing and controlling desktop computers, laptops, smartphones and tablets in a connected, cohesive manner from a single console. Continued…
Quote of the Day
“One effective option for organizations concerned about mobile threats is to combine the best features of UEM and mobile threat defense tools.” – Jack Gold
Go beyond UEM security to prevent mobile attacks
IT pros should look beyond UEM security utilities when they develop a mobile threat prevention strategy. Mobile threat defense tools can add crucial monitoring and threat detection functions to managed mobile devices.
Understand how UEM, EMM and MDM differ from one another
UEM, EMM and MDM tools offer varying levels of control over mobile devices, laptops and PCs. Read on to find out what exactly each type of management tool can do and how the tools differ.
Why UEM could overshadow the EMM market
EMM, MDM, MAM and UEM sound like the ingredients of alphabet soup, but it’s actually the progression of changing products in an ever-evolving competitive landscape. Here, one expert predicts the future of the EMM market.
How to navigate a sea of UEM vendors
UEM has evolved from a variety of products, including MDM and EMM. Discover what this new market has to offer and which UEM vendors are taking the lead.
Explore the features of unified endpoint management
Choosing and managing UEM software can be complicated. It’s important to understand how unified endpoint management can benefit your IT deployment and what features it brings to the table.
People who think mobile security is ______________ could be in for a rude awakening.
a. not that big a deal
b. not that big of a deal