A SIPOC (suppliers, inputs, process, outputs, customers) diagram is a visual tool for documenting a business process from beginning to end prior to implementation. Continued…
Quote of the Day
“Two tools are useful when doing a value stream map: a SIPOC (suppliers, inputs, process, outputs, customers) diagram, or a visual representation of the business process from start to finish, and a voice-of-the-customer (VOC) document.” – Gary Case
Value stream mapping vs. process mapping to drive process innovation
Figuring out how an existing business process actually works is the first and most important step toward improving it. Here, experts explain how using value stream mapping vs. process mapping can help.
IT service automation: A global CIO learns from a millennial
In this first of a series on IT service automation, a global CIO has an ‘uberization’ about how he needs to change enterprise services.
Digital transformation framework: Bridging legacy apps to new tech
One facet of a digital transformation framework involves finding a way to expose legacy app data and functionality within a new environment. Find out how.
How to use value stream mapping tools, CSI to improve business processes
Value stream mapping tools and CSI models examine key performance indicators and metrics to set objectives to improve business processes. The aim: Reduce total lead time and boost productivity.
MIT Sloan: Finding your digital business model
What is your company’s digital business model? Stephanie Woerner, a research scientist at MIT Sloan, lays out four distinct types and the challenges associated with each.
As change is constant, you should have a process for ______ improvement of your controls and compliance efforts.
Blockchain is a type of distributed ledger for maintaining a permanent and tamper-proof record of transactional data. Continued…
Quote of the Day
“While the underlying technology and architecture are important, these are changing rapidly and most blockchain solutions are likely to undergo a change in their technology before they become mainstream.” – Jeff Stollman
4 key blockchain in supply chain use cases and examples
The list of potential blockchain in supply chain use cases is long. Learn about some real-life examples where companies are putting that speculation to the test.
7 steps to implementing blockchain in the supply chain
As experts hype the promise of using blockchain in the supply chain, organizations must approach the technology strategically. Learn the seven key steps to getting an implementation right.
Blockchain terminology: 7 key blockchain storage terms
Although blockchain storage is based on some basic technology, blockchain terminology can be confusing. Find out what distributed ledger technology, shards and farmers are as we explore the lexicon of blockchain storage.
5 potential benefits of blockchain in supply chain logistics
Blockchain in supply chain logistics may offer increased transparency and quality assurance, among other benefits. Here’s what suppliers, manufacturers, distributors and retailers need to know.
6 potential blockchain limitations for enterprise use
Blockchain is framed as an exciting, even revolutionary technology. And in many ways, it is. But to appreciate its use for the enterprise, it is important to understand its shortcomings. Here are six blockchain limitations.
The new regulation could cost employers _________ in compliance-related costs.
a. $12 billion
b. twelve billion dollars
Multiprotocol Label Switching (MPLS) is a protocol-agnostic routing technique designed to speed up and shape traffic flows across enterprise wide area and service provider networks. Continued…
Quote of the Day
“As you consider whether to renew your existing MPLS service contract — and for how long — you need to have your eyes on everything from price to speed of deployment.” – John Burke
How SD-WAN architectures improve network flexibility and efficiency
With SD-WAN architectures, organizations can simplify WAN management and optimize WAN connections. Take a look at some basic SD-WAN configuration options and how they can improve network flexibility.
MPLS fabric is natural fit for ISP backbone overlays
The prevalence of multiprotocol label switching makes MPLS fabric an obvious choice for ISPs implementing network overlays in their backbone networks.
8 steps to a successful MPLS migration
To ensure a successful MPLS migration, it’s important to understand what your new service provider will be able to offer.
What you need to set a global MPLS network architecture
Designing a robust global MPLS network architecture takes careful planning, writes Robert Sturt. Here is part one of a three-part series.
SD-WAN market growth sparks new channel services
As the SD-WAN market heats up, channel partners are launching specialized services to win over customers. Find out what’s driving the market’s growth and learn more about partner offerings in this dynamic technology sector.
In information technology, an ___________ specifies the overall structure, logical components, and the logical interrelationships of an information system.
SQL (Structured Query Language) is a standardized programming language for relational databases. Continued…
Quote of the Day
“The Presto SQL query engine has found a home in many big data applications. It originated at Facebook, got some help along the way from Teradata, and now is the object of the new Presto Software Foundation.” – Jack Vaughan
SQL Server vs. MySQL: Learn the differences
MySQL and Microsoft SQL Server relational databases have pros and cons. Brian Posey discusses both sides of the SQL Server vs. MySQL debate.
Amazon’s PartiQL query language eyes all data sources
Customers with complex data landscapes may benefit from the Amazon-developed PartiQL, a SQL-like query language that can tap multiple types of data stores in a unified manner, but performance and adoption beyond AWS customers will be crucial.
SQL Server in Azure database choices and what they offer users
Microsoft offers three options for running SQL Server in Azure cloud systems: SQL Server on an Azure virtual machine, Azure SQL Database and a managed instance version of the latter. Learn about their features to help you decide which SQL Server cloud option works best for your business.
SQL Server database design best practices and tips for DBAs
If your SQL Server database design process misses the mark, your organization won’t be able to use Microsoft’s database management system to its fullest potential. Get advice on SQL Server development and design best practices to help make the most of your database deployments.
Google database portfolio to include 3 new additions
Three enhancements, including Cloud SQL for Microsoft SQL Server in alpha, federated queries from BigQuery to Cloud SQL and expansion of Elastic Cloud to Japan and Sydney, have been added to the Google database portfolio.
There’s ___ SQL Server tool available to help DBAs with almost any performance issue they may face.
A virtual private network (VPN) is programming that creates a safe, encrypted connection over a less secure network, such as the public internet. Continued…
Quote of the Day
“The future of VPN services reflects the industry’s trend toward software networking, evident in developments like SD-WAN and public cloud. The need for flexible technology is a main driver.” – Robert Sturt
The future of VPN will reflect the need for flexibility
The growth of SD-WAN and public cloud are shaping the future of VPN technology, highlighting the demand for flexibility and usability. Learn how changes in software and security capabilities will affect VPN services.
SD-WAN vs. VPN: How do they compare?
While software-defined WAN and internet VPN services share similarities, enterprises need to look at SD-WAN vs. VPN to determine which technology might prove more beneficial and align with business requirements.
What VPN alternatives should enterprises consider using?
VPN alternatives are being considered as serious VPNs vulnerabilities are discovered in popular products. Learn the risks and how companies can benefit.
Are there security benefits to using a site-to-site VPN?
A site-to-site VPN can offer some security benefits to organizations that may not need a traditional VPN. Here’s what enterprises should know.
Site-to-site VPN vs. remote-access VPNs: What’s the difference?
Learn about the protocols supporting site-to-site VPN vs. remote-access VPNs. Both serve important roles, so enterprises should consider the factors most important to them before selecting the approach they may want to use.
When we learned that our relaxed approach to VoIP security made us more vulnerable to corporate espionage, we decided it was time to take a different ____.
A low-code/no-code (LCNC) development platform is a visual integrated development environment (IDE) that allows citizen developers to drag-and-drop application components, connect them together and create a mobile or web app. Continued…
Quote of the Day
“Low-code app developers must adhere to policies that govern data and resource usage. Lacking governance puts budgets, security and compliance at risk.” – Tom Nolle
Evaluate low-code app development strategies, tools and practices
Low-code app development is here to stay. The market for low-code platforms is primed for growth as more businesses turn to tools that enable fast development, inside and outside of IT. Read our expert advice to compile a low-code strategy and address the challenges of these platforms.
Mendix tweaks low-code, no-code platform with AI, mobile
Mendix’s Summer ’19 release of its low-code, no-code platform brings enhanced no-code capabilities to support citizen developers. The release also features enhancements to the Mendix AI-powered tool that directs developers on which next step to take in coding.
Assess the pros and cons of citizen developers in the enterprise
As organizations look for ways to drive efficiency and keep costs low, some use citizen developers to build internal apps, rather than seasoned pros. Low-code/no-code development platforms enable this shift, but just because they can doesn’t mean they always should.
No-code app development vendor Crowd Machine bets on channel
Crowd Machine, a no-code app development platform, is cultivating channel partnerships in a recently launched four-tier program that offers recurring revenue streams. Learn more about this vendor’s partner initiative.
How low-code governance helps IT protect data, limit sprawl
As citizen developers create applications at a faster pace and with less technological heavy lifting than ever before, IT should empower an oversight team to handle low-code governance. Apply some discipline to data security and resource usage in low-code apps before it’s too late.
None of you _________ responsibility for this spaghetti code fiasco?
Ransomware is a subset of malware in which the data on a victim’s computer is locked, typically by encryption, and payment is demanded before the ransomed data is decrypted and access is returned to the victim. Continued…
Quote of the Day
“The catastrophic capabilities of ransomware attacks on public institutions are astounding. If an attack on a major city is successfully carried out, it would likely qualify as a national emergency.” – Peter Martini
Texas ransomware attack hits 22 municipalities, demands $2.5M
Officials confirmed that a Texas ransomware attack has affected 22 municipalities across the state, however only three victims are known and the investigation is ongoing.
Prevent ransomware attacks on cities in perimeterless networks
Ransomware attacks on cities can be expensive, frustrating or downright deadly. Learn what makes municipalities vulnerable to attack, as well as how shifting the security mindset can keep cities and their citizens safe.
Protect backups from ransomware and other security risks
Backups are an excellent way to return enterprises to a known good state. That’s why it’s essential to secure and protect backups from ransomware and other security risks, whether man-made or natural. Learn how to align your backup and security strategies for better protection and recovery.
What’s the difference between extortionware and ransomware?
Learn the difference between extortionware and ransomware as well as how to defend against them.
How can enterprises mitigate ransomware as a service?
Cybercriminals are using ransomware as a service to increase ransomware attacks on enterprises. Here’s what you need to know about the threat.
A botnet is a group of computers organized to distribute spam or malware — _________ the owners are typically unaware of the fact.
c. even though
A generative adversarial network (GAN) is a machine learning (ML) model in which two neural networks compete with each other to become more accurate in their predictions. Continued…
Quote of the Day
“Since GANs are capable of analyzing and recognizing detailed data, these systems are a powerhouse for generating artificial content.” – Ronald Schmelzer
3 GAN use cases that showcase their positive potential
GANs have notoriously been used to start a conversation around privacy, transparency and threats that AI can bring. Image generation GANs tap into the deepest fears of internet users: trickery. But GANs can also be a force for good, and blossoming GAN use cases show its true potential.
Generative adversarial networks could be most powerful algorithm in AI
Among all the different algorithms in AI, generative adversarial networks are ‘the most interesting’ development and could provide a path to more natural AI applications.
New uses for GAN technology focus on optimizing existing tech
If you’re an internet user, you’ve likely seen GANs at work in the form of clipped-together videos of celebrities singing popular songs or delivering fake speeches. In more practical applications, GAN technology can safeguard robot learning and improve manufacturing processes.
Enterprises need to plan for deepfake technology
Deepfake technology can damage brands and compromise security. Combatting the threat won’t be easy. This tutorial spells out the dangers and some steps enterprises can take now to protect themselves against deepfakes.
How machine learning-powered password guessing impacts security
Password guessing could be an even bigger threat to enterprises now that hackers can use machine learning to automate it. Here’s what this means for security.
Some employees fear that computers will take over their jobs with the _______ of machine learning, but that is not the case.
The Cloud Native Computing Foundation (CNCF) is an open source software foundation that promotes the adoption of open source software, as well as technologies such as containers, microservices and service mesh. Continued…
Quote of the Day
“At its core, cloud-native means that developers design, develop and deliver a specific application with the scalability and ephemeral nature of the cloud in mind.” – Zachary Flower
Test your knowledge of CNCF projects and tools
CNCF projects cover many facets of cloud-native computing, from container orchestration to distributed tracing. Projects regularly transition from sandbox to incubating to graduated. Have you been keeping track? Take this quiz to find out.
Kubernetes storage projects dominate CNCF docket
The CNCF will host a Kubernetes storage project, called Rook, as it kicks off plans to improve the container orchestrator’s distributed storage features.
Linux Foundation drives VNF migration to cloud-native functions
At the 2018 Open Networking Summit, The Linux Foundation announced several project updates that are working toward VNF migration to cloud-native network functions. This transition would mean more containers, microservices and cloud environments.
Study tips to ace the CNCF’s CKA exam
The CKA exam from the Cloud Native Computing Foundation enables IT admins to prove their expertise with Kubernetes management and orchestration. IT expert Stuart Burns provides tips on what to study and practice for the best chance of success.
Cloud Foundry PaaS undergoes seismic shifts as IT evolves
Cloud Foundry PaaS now accommodates several infrastructure automation technologies not native to the platform. Is it a new beginning, or the beginning of the end?
In Kubernetes, a replication controller scales containers horizontally, ensuring there are more or ________ containers to meet the overall application’s computing needs.
Multifactor authentication (MFA) is a security system that requires more than one method of authentication from independent categories of credentials to verify the user’s identity for a login or other transaction. Continued…
Quote of the Day
“The goal of multifactor authentication methods is to increase the difficulty for an adversary to exploit the login process and roam freely around personal or corporate networks and compromise computers to steal confidential information — or worse.” – David Strom
Samsung-Microsoft partnership will benefit end users
Samsung debuted its new smartphone and touchscreen PC at its Unpacked event, but the main enterprise news focused on a new Samsung-Microsoft partnership and the possibilities it brings to the enterprise, according to analysts.
Purchasing multifactor authentication tools: What to consider
Purchasing multifactor authentication tools is complicated if an organization doesn’t understand its specific needs. Learn what enterprises need to know before investing to understand the risks of the technology, as well as the multifactor authentication benefits, including token options.
Multifactor authentication methods, use cases and products
Multifactor authentication protects businesses from cyberattacks by requiring two or more forms of authentication from the user before allowing access. In this buyer’s guide, explore multifactor authentication methods, use cases and market-leading products before making a final buying decision.
Quick steps to enable AWS multifactor authentication
Enterprises shouldn’t overlook account management and security. Use these AWS multifactor authentication methods, such as setting up AWS U2F security keys, to establish AWS account integrity in your organization.
How to set up and enforce Azure multifactor authentication
Azure multifactor authentication folds more
security into the enterprise by requiring additional means to verify a user’s credentials. To implement an authentication policy, administrators must understand how verification options differ and the steps to complete set up.
The credit union website uses two-factor authentication to protect _____ members.