Multifactor authentication (MFA) is a security system that requires more than one method of authentication from independent categories of credentials to verify the user’s identity for a login or other transaction. Continued…
Quote of the Day
“Although not foolproof, the use of multi-factor authentication schemes can greatly reduce the chances of account compromise.” – Craig Young
State Department data breach exposes employee info
A State Department data breach compromised the agency’s unclassified email system and led to the exposure of employee data and one expert said the issue may have been a lack of multi-factor authentication.
Pros and cons of a multi-factor authentication mobile app
A multi-factor authentication mobile app is more secure than an app that relies solely on passwords. Determine the pros and cons before an implementation.
What are some useful multifactor authentication examples?
Our expert explains multifactor authentication examples in healthcare settings and looks at why this technology is useful for protecting patient data.
How to manage multi-factor authentication for Office 365
MFA is a layered approach to security that exceeds the traditional username/password method. Here’s how to manage multi-factor authentication for Office 365.
Explore two major user authentication methods
Biometric and multifactor authentication may be better than traditional user authentication methods, but neither approach to identity management is perfect. Review the benefits and pitfalls to discover which option works for your organization.
The credit union website uses two-factor authentication to protect _____ members.
Alpha testing is the initial phase of validating whether a new product will perform as expected. Continued…
Quote of the Day
“Modern testing is good news for QA teams, because it provides an opportunity to grow and expand skill sets, while moving at a much faster pace with leaner practices.” – Amy Reichert
Words to go: QA testing methodologies
To be an effective tester, you must know a vast — if not unwieldy — number of QA testing methodologies and terms. To give testers some context, this list outlines how several test steps, types and levels fit into the development process.
A QA team finds continuous testing benefits worth the effort
Find out which continuous testing benefits CloudBees utilizes internally to speed feedback and reduce defects in production. The process can benefit QA teams if they work effectively with the other parts of their organization.
What are the top software testing methods?
Choose software testing methods that are right for your workflow and that can match the fast pace imposed on development by business requirements. Here are major types to consider.
Blue/green deployment on the cloud makes updates easier
The blue/green deployment model isn’t the only one that works on the cloud, but it might be the easiest. Quickly switch between code versions, and maintain the highest availability level possible.
Need to know: Is demand for software QA jobs increasing?
Are employers filling more software QA jobs? They might be, and expert Amy Reichert walks us through what the change in demand really means.
The purpose of regression testing is to ______ that the software continues to function as expected under specific conditions.
A multichannel contact center is a call center that allows agents to interact with customers over several communication channels, but each channel operates in isolation. Continued…
Quote of the Day
“A multi-channel system allows a contact center to provide improve customer care by providing quality service through any medium, including: voice, text-SMS, Fax or Web.” – Paul Lang
Avaya adds real-time speech analytics to contact centers
Avaya has added tools including real-time speech analytics to its workforce optimization suite. The upgrades are expected to help Avaya’s customers increase sales and boost customer satisfaction.
Is your call center multichannel or cross-channel?
Indentify the difference between a multichannel and cross-channel contact center.
The omnichannel contact center is now mandatory
The omnichannel contact center is becoming increasingly important. But voice communications is still the preferred channel for many consumers.
With cloud-based contact centers, one size does not fit all
Cloud-based contact centers are one of the fastest-growing market segments when it comes to software as a service. Learn what’s driving this shift to the cloud and how enterprises need to respond to this trend.
Polycom acquisition helps Plantronics against Cisco, Logitech
Plantronics’ Polycom acquisition should strengthen the headset provider’s portfolio and open doors to the conference room, according to Wainhouse Research.
The question on everyone’s _____ is how to improve customer experience and cut costs at the same time.
IT service management (ITSM) is a general term that describes a strategic approach to designing, delivering, managing and improving the way businesses use information technology services. Continued…
Quote of the Day
“ITSM addresses people, processes, technology and suppliers, as these all are part of the end-to-end value stream.” – Gary Case
A fine-tuned change request template minimizes user discontent
Follow this example to make a useful, direct and simple change request template for everything from device requests to application upgrades.
An ITSM program evolves from subpar to superb
Lone Star College CIO Link Alander, using software from ServiceNow, has developed a first-class ITSM program that’s driving a service approach across college departments, from legal and finance to HR.
Texas college CIO pushes into enterprise service management
In part two of this ITSM case study, CIO Link Alander describes how he has extended his mature ITSM program to get a real-time grip on big IT projects and launch an enterprise service management approach for automating business processes in other departments.
3 stages of ITSM and 5 ways to enhance your ITSM strategy
Dennis Drogseth of Enterprise Service Management Associates explains the three stages of a typical ITSM program, from help desk to service desk to business-aligned ITSM. In this expert tip, he also offers five ways to change your ITSM strategy from a reactive help desk to business driver.
What are the benefits of ITSM for fast-moving businesses?
‘Better, faster, cheaper’ is what companies should expect from a well-run ITSM program, according to ITIL expert Gary Case. But for many organizations, it will take resources and training to get there. Here are six benefits of ITSM that will help CIOs make the case.
Digital transformation is tied to the broader trend of business transformation and takes ______ to take hold.
b. a while
Storage at the edge is the collective methods and technologies that capture and retain digital information at the periphery of the network, as close to the originating source as possible. Continued…
Quote of the Day
“Storage at the edge continues to grow in a lot of ways, both for video surveillance, telemetry and actual applications that are being pushed to the edge, such as clickstream analytics happening in near real time.” – Greg Schulz
7 key questions IoT storage designers must answer
Don’t skip these considerations when planning your organization’s IoT storage. Get a complete understanding of your data and how it’s collected, processed, analyzed, managed and secured to determine the right kind of storage.
Managing storage for IoT data at the enterprise edge
Managing data storage for IoT applications has businesses and vendors rethinking all the aspects of edge computing in this new age of enormous and endless data generation.
Edge computing technology can ease bandwidth pressure points
Storage professionals weigh in on the benefits of edge computing technology, where it works best and when it should take a back seat. IoT data is one prime use case for storage at the edge.
Fog computing brings new business opportunities and disruptions
As fog computing has to play a role in an IoT world, we need to start talking about the business opportunities and disruptions fog computing will bring.
IoT initiatives and other emerging workloads force data center change
Digital economy trends, such as IoT initiatives and other emerging workloads, are linked to software-defined storage and cloud use that’s changing the nature of IT.
If you don’t _______ your data effectively, you risk losing it.
b. back up
Supervised learning, in the context of artificial intelligence (AI) and machine learning, is a type of system in which both input and desired output data are provided. Continued…
Quote of the Day
“Software developers in organizations that pursue an ML/AI strategy must know what is involved in supervised machine learning to become part of the process.” – Torsten Volk
How to make a wise machine learning platforms comparison
Making an effective machine learning platforms comparison begins with identifying important machine learning platform features, including data, automation, integration and ease of use. Organizations should also examine algorithm and model support.
What developers must know about supervised machine learning
An ML/AI process can only get so far teaching itself. Expert Torsten Volk outlines how developers perform supervised machine learning.
What do businesses do with the top machine learning platforms?
It sounds like the stuff of sci-fi, but machine learning is everywhere. The top machine learning platforms enable everyday technologies like recommendation engines, chatbots, email spam filters and even self-driving cars.
Machine learning in networking: What’s the next step?
The benefits of machine learning in networking are multifold, but often networks themselves must change to enjoy the advantages.
How to win in the AI era? For now, it’s all about the data
In today’s AI era, data is what will separate winners from losers in the race to exploit artificial intelligence, according to deep learning pioneer Andrew Ng.
Some employees fear that computers will take over their jobs with the _______ of machine learning, but that is not the case.
Google Duplex is an artificial intelligence (AI) chat agent that can carry out specific verbal tasks, such as making a reservation or appointment, over the phone. Continued…
Quote of the Day
“By relegating synthesized digital-assistant voices to history’s dustbin, Duplex has leapt over that uncanny valley clear to the other side.” – James Kobielus
Bot security through AI openness
As the use of AI systems increases and worries about AI and bot security mount, some organizations are looking to boost AI openness to handle potential security problems.
Vendors race to adopt Google Contact Center AI
Leading contact center vendors, including Cisco and Genesys, were quick to adopt the Google Contact Center AI platform, which was released this week.
Addressing the ethical issues of AI is key to effective use
Ethical issues of AI loom large as enterprises roll out new technologies that have the potential to trick people into thinking they’re human and to function with greater autonomy.
Predictions on a silver platter: How AI Is creating more effective human interactions
Artificial intelligence can help service providers anticipate what customers need and want before the customer even knows. Sisense’s Guy Levy-Yurista examines how AI will offer high-value service.
Threats of AI include malicious use against enterprises
Businesses need to be aware of the potential threats of AI as the technology becomes more prevalent and the bar for effective use drops, enabling anyone with malicious intent to orchestrate sophisticated attacks.
Although some parts of the consumer industry are adept at using artificial intelligence apps practically and profitably, most businesses are slow to ________ and implement AI.
Virtual network functions (VNFs) are virtualized tasks formerly carried out by proprietary, dedicated hardware. Continued…
Quote of the Day
“A VNF refers to the implementation of a network function using software that is decoupled from the underlying hardware. This can lead to more agile networks, with significant Opex and Capex savings.” – Darien Hirotsu
AT&T Spark highlights big changes in networking market
At the AT&T Spark event, executive Amy Wheelus explained how AT&T has redefined the role of networking vendors, as it revamps its data centers to support future 5G applications.
Nuage Networks, Talari SD-WAN tack on multi-cloud connectivity
Support for multi-cloud connectivity is the name of the game these days for SD-WAN vendors, as proved by recent announcements from Nuage Networks and Talari.
Service providers use NFV open source to innovate the network
NFV open source deployments grow, as service providers implement it in new applications. But continued code contribution, governing and testing challenges remain.
NFV vs. VNF: What’s the difference?
NFV versus VNF: Is there a difference? The two networking approaches have related but distinct meanings, according to SDN engineer Darien Hirotsu.
Network configuration tools: A primer
Network configuration tools are more essential for engineers now than ever, as networks transition from manual configuration to new strategic approaches.
Application streaming and virtualization can help you _______ greater network efficiency.
Windows as a service is the approach Microsoft introduced with Windows 10 to deploy, update and service the operating system. Continued…
Quote of the Day
“To determine how they should schedule Windows 10 updates, IT professionals must understand a number of basic concepts related to Windows as a service.” – Robert Sheldon
Reduce update-related downtime after a Windows 10 OS upgrade
After a Windows 10 OS upgrade, IT pros and users must adjust to the Windows-as-a-service update cadence. Learn how to minimize the downtime associated with updates in Windows 10.
Microsoft subscriptions aren’t right for everyone
Microsoft subscriptions might be the new normal, as the software vendor makes a strong push toward cloud services. Learn what IT needs to know to prepare.
How to solve Windows 10 updates problems
This guide is an all-in-one resource for IT administrators struggling to handle Windows 10 updates problems. Learn how automatic updates work, what problems could crop up and what tools IT can use to solve them.
Configure a complete enterprise DaaS deployment
Planning and constructing a successful enterprise DaaS deployment takes work. Get to know the top vendors and considerations before launching a project.
How do the Windows 10 servicing channels work?
IT can use the features and functionalities of the Windows 10 servicing channels to configure updates for specific groups of devices. Learn about the use cases for each of these update configurations.
The complexity of replacing some legacy systems with new desktops depends on the antiquity of the systems that are still _______.
Buffer overflow is what happens when a program or process attempts to write too much data to the buffer, a segment of computer memory reserved for temporary data storage. Continued…
Quote of the Day
“We are still seeing a lot of the same techniques to hack applications as we have previously seen. For example, buffer overflows, along with poor coding still remain two of the biggest application security issues.” — David Smith
How do buffer overflow attacks work?
Home-grown apps are susceptible to buffer overflows, as are Windows and Linux apps. Part one of this two-part series shows how hackers can take control of your programs.
How can attackers exploit a buffer underflow vulnerability?
A vulnerability was recently discovered in the strong Swan open source VPN, and it caused a buffer underflow. Learn how attackers were able to exploit this vulnerability.
Spectre variant gives buffer overflow a new twist
New variants of the Spectre microprocessor bugs use buffer overflow-style attacks to run malicious code.
The unlikelihood of ‘IoT, secure by design,’ and what we can do about it
The ‘secure by design’ concept is a great idea in theory, but without automatic updates, IoT security will always be an issue. Minim’s Alec Rooney discusses.
Understanding the exploit market: How data breaches happen
Quickly upgrading software with the latest patches is essential when you understand how data breaches happen and how the exploit market can work against you when you have network and system vulnerabilities.
What type of security attack vector exploits the tendancy of people’s desire to be helpful?