Embedded system security is a strategic approach to protecting software running on embedded systems from attack. Continued…
Quote of the Day
“Every minute you plan in advance for the resiliency of your embedded systems, you’ll see payoffs of often five- or tenfold. Take your time and do it properly.” – Kevin Beaver
Browser OS could turn the browser into the new desktop
In this Q&A, VDC Research’s Eric Klein talks about how a browser OS can address security needs and provide a modern UX while automating some of the mundane tasks IT admins have to juggle.
Embedded application security: Inside OWASP’s best practices
The new OWASP Embedded Application Security project aims to enhance security for connected devices. Learn some of the best practices and pitfalls to avoid.
Embedded systems security a growing concern amid rise of IoT
The Internet of Things is expanding the definition of what is an embedded system device, but security isn’t keeping up with the evolution.
10 types of security incidents and how to handle them
Security incidents are on the rise, coming from a multitude of directions and in many guises. This in-depth look at the nature of the threat and the best ways to respond to it now is essential reading for any security professional.
Why security is the key to emerging technology – and vice versa
Securing emerging tech, such as IoT, drones and smart city deployments, is critical yet not always easy. Tata Communications’ Srinivasan CR explains how adding new security tech, including blockchain and AI, can help.
Each of the appliances in the model kitchen _________________________.
a. have embedded systems
b. has an embedded system
Apache CloudStack is an open source infrastructure as a service (IaaS) platform that allows IT service providers to offer public cloud services and individual companies to provide their own private cloud and hybrid-cloud services on-premises. Continued…
Quote of the Day
“Deploying an open source cloud infrastructure platform and integrating different front- and back-end components requires significant knowledge of hardware and software.” – Stephen J. Bigelow
Kubernetes policy project takes enterprise IT by storm
A Kubernetes policy open source project, Open Policy Agent, has risen to almost overnight popularity among large enterprises for IT compliance as code, particularly in Kubernetes environments.
OpenStack vs. CloudStack: What’s the best approach?
In choosing between OpenStack and CloudStack, IT managers need to understand the difference between the two open source cloud-computing management architectures.
Five challenges with open source cloud infrastructure tools
Offering flexibility and other benefits, open source cloud infrastructure is a good fit for many enterprises. But IT needs to tackle security, integration and other issues first.
What are the two types of hybrid cloud infrastructure?
A hybrid cloud infrastructure is a mix of public and private clouds. Enterprises typically used different vendors for each environment, but that’s changing as public cloud providers move into the data center with the emergence of services like Azure Stack and AWS Outposts.
Five open source tools for building and managing clouds
Open source cloud computing tools like KVM and Eucalyptus will pose a serious challenge to vendors maintaining expensive cloud licensing models, such as Microsoft and Oracle.
In a hybrid cloud, sensitive data and computing resources may be maintained in two _________ environments.
Network-attached storage (NAS) is dedicated file storage that enables multiple users and heterogeneous client devices to retrieve data from centralized disk capacity. Continued…
Quote of the Day
“NAS is general-purpose storage: It’s a great choice for some cases, but it may not be the best option in other instances.” – Brien Posey
Discover the best NAS products for your organization
There are multiple NAS devices on the market, including products from Dell EMC, HPE and NetGear. In this product roundup, discover the best NAS products for your business.
SAN vs. NAS: A diagram of the differences
In the SAN vs. NAS debate, you might not be sure which option is best for your organization. Here, we cover the differences between SAN and NAS, discuss the benefits of each and provide some simple diagrams.
Top 4 NAS backup strategies for your data protection
NAS backup strategies have evolved, and now the cloud is a prominent player in network-attached storage protection. Explore general methods, as well as specific products you can use for NAS backup.
Pure Storage buys Compuverde, expands file storage
Pure Storage digs deeper into unstructured data with the acquisition of Swedish startup Compuverde, which sells software to cluster nodes on premises and in clouds.
SAN vs. NAS architecture: How do the two storage systems compare?
Learn more about the SAN vs. NAS battle and how the two architectures compare and contrast, as well as the advantages and disadvantages of each. Also, explore where SAN and NAS are headed in the future.
This isn’t a problem for most organizations today, but potential storage limits should ________ be considered when planning a new gateway deployment.
B. all ways
Smoke testing, also called build verification testing or build acceptance testing, is nonexhaustive software analysis that ascertains that the most crucial functions of a program work but does not delve into finer details. Continued…
Quote of the Day
“The combination of early smoke tests and later full regression tests lets organization cost-effectively speed application development.” – Lubos Parobek
How to meet QA responsibilities during a software tester shortage
Don’t abandon QA responsibilities when in the middle of a software tester shortage. Here’s when it makes sense to seek out a testing-as-a-service provider or shift QA tasks to developers.
3 ways to test in production promptly and productively
The proliferation of app dev advances, like automation, Agile and DevOps, prompted QA professionals to increasingly test in production. Use these three methods to perform timely and efficient QA in applications’ live environments.
Move into better QA with shift left and shift right testing
Traditional QA causes traditional problems — namely, bottlenecks and long bug resolution times. Shift left and shift right testing aim to solve those problems, as these approaches make developers more accountable for code quality and incorporate user feedback.
Software tester roles must embrace code focus
As IT works together on QA and continuous testing takes hold, software tester roles must adapt to understand code and catch bugs early in the process. However, some worry that an overemphasis on code will erode traditional QA expertise.
Why DevOps development depends on continuous testing
Continuous testing isn’t the sole responsibility of QA and IT ops professionals. If DevOps teams really want to operate at peak efficiency, then development must evolve and absorb some of the testing load.
Treating testing as a ________ rather than something that should be done continuously throughout software development is a recipe for defective software.
Deep packet inspection (DPI) is an advanced method of examining and managing network traffic. Continued…
Quote of the Day
“DPI enables IT administrators and security officials to set policies and enforce them at all layers, including the application and user layer, to help combat malware and other threats.” – Lee Doyle
How can organizations address VoIP security threats?
VoIP security threats can cost an organization time and money, but the right tools can prevent fraud, stolen credentials and intercepted traffic. Learn what security provisions organizations can put in place to better protect against VoIP threats.
How to deploy deep packet inspection in the cloud
Deep packet inspection in the cloud can help improve enterprises’ network security, but it also raises some privacy concerns. Learn about potential problems with DPI and how to get around them.
How best to secure cloud computing in this critical era
Secure cloud computing first requires an understanding of the nature of the risk and, then, how to apply the best tools and practices to minimize it. This guide collects our recent must-reads to help you outsmart the threats.
Deep packet inspection tools: Proxy vs. stream-based
Deep packet inspection tools were once used mostly by service providers. Now that enterprise network managers are considering DPI tools, they’ll have to determine the strategy that works best for their environments.
Where SDN and DPI technology meet: Centralized control and automation
When SDN and DPI technology meet, network engineers have the means to apply monitoring and management policy to the overall network instead of to individual components.
A botnet is a group of computers organized to distribute spam or malware — _________ the owners are typically unaware of the fact.
c. even though
Passwordless authentication is a verification process where a user confirms his or her identity without the requirement of manually entering a string of characters. Continued…
Quote of the Day
“Passwordless authentication isn’t automatically secure, and its security depends on its implementation.” – Kevin Beaver
Despite Windows 10 issues, customers remain confident in OS
Windows 10 issues continue to generate headlines and appear to be giving the operating system a bad name. But that’s more appearance than reality for Microsoft customers, according to one analyst.
Benefits of mobile passwordless authentication
With passwordless authentication for mobile devices, IT ensures that its organization isn’t one guessed password away from a major breach. This technology relies on authentication factors such as trusted email accounts and devices.
Microsoft wants to eliminate passwords — and there’s an app for that
Microsoft bolstered its plan to eliminate passwords with an update to its Microsoft Authenticator app, which will extend passwordless logins for Azure AD-connected apps.
Identity management strategy starts with people, not technology
In this Q&A, Gartner analyst Kevin Kampman discusses how an organization’s identity management strategy has transformed and the way organizations should incorporate identity management into their business process.
Ponemon study: Poor password practices remain rampant
A Ponemon Institute report, sponsored by Yubico, revealed that despite concerns over privacy and data protection and a greater understanding of security practices, poor password practices are still rampant.
The phishing email warned that unless I updated my contact information, my eBay account would be ______________.
A social robot is an artificial intelligence (AI) system that is designed to interact with humans and other robots. Continued…
Quote of the Day
“There are lots of people who have come out and taken a dystopian view that computers are going to ultimately take over the world and wipe us out. Then, there’s a more hopeful view, which is that we still – at least for the foreseeable future – call the shots and engage where we choose to and AI acts on our behalf.” – Anthony Scriffignano
AI in the legal industry focuses on augmenting research
Robot lawyers are here. Well, not exactly, but lawyers are augmenting their work with content discovery, organization and predictive analytics. AI applications can even offer self-help legal aid that bypasses the need for initial consultations or legal services. Read how AI in the legal industry is transforming legal processes.
Debate over AI in the workforce requires a broad view
From total AI labor domination to simple automated process implementation, gauging the employment impacts of AI in the workforce has never been harder. Every think-piece on the future of work revolves around finding an answer that avoids job loss. But what if we’re asking the wrong question?
The steady evolution of RPA to intelligent automation
The evolution of RPA is a long journey, one that started more than two decades ago. While the core function of automation remains the same, the complexity and use cases of RPA have expanded over the years and will likely continue to grow.
How AI process automation helps simplify enterprise workflows
AI process automation tools are helping enterprises make their workflows more intelligent and speed up processes that today are drowning in paper and inefficiency.
Robot social engineering works because people personify robots
Robot social engineering could be a viable attack vector in the future, according to Brittany ‘Straithe’ Postnikoff, both because of the various social abilities that robots can use and because robot manufacturers don’t focus on security.
Although some parts of the consumer industry are adept at using artificial intelligence apps practically and profitably, most businesses are slow to ________ and implement AI.
Metadata management is the administration of data that describes other data. Continued…
Quote of the Day
“Big data often comes with big data management problems. Clean, well-defined metadata can make the difference in analyzing big data and delivering actionable business intelligence.” – Scott Robinson
Get to know data governance tools for the enterprise
Data governance tools can help businesses address a number of content management issues. Learn more about some of those platforms and the problems they solve.
IBM Spectrum storage refresh targets object, AI metadata
Discover, part of IBM Spectrum storage software, improves metadata management for AI and big data analytics on large-scale file and object storage. IBM boosted Spectrum data protection and Cloud Object Storage capacity. VersaStack with FlashSystem 9100 NVMe flash is in preview.
Solix archiving takes files, databases, email to the cloud
Solix archiving goes SaaS. Labeled ‘archiving as a service’ by the vendor, SolixCloud Enterprise Archiving offers file, database and email archives in Microsoft Azure.
A strong metadata management process eases big data woes
A well-organized metadata management process can make all the difference in analyzing big data and delivering actionable business intelligence results.
How metadata management relates to data governance and MDM
Without effective metadata management processes, an organization couldn’t have a successful data governance or master data management program, says consultant Anne Marie Smith.
Although big data is getting bigger all the time, much of the data being collected ___ useless.
VM automation is the ability for a virtual machine (VM) to perform basic functions and optimize performance on its own or with minimal manual input. Continued…
Quote of the Day
“Admins looking to automate VM tasks should consider whether or not their workloads are large enough to benefit from automation.” – Stefani Muñoz
VM automation strategies and benefits for sizable workloads
VM automation can provide several benefits, such as speed and consistency, but not all workloads are suited for this process. IT administrators must be aware of their own workloads, common mistakes and tools offered before incorporating automation into their environments.
What VM automation tools are available?
Learn about the various types of VM automation tools you can choose from to enable rapid and predictable resource provisioning. Automation is rarely a discrete product, but is part of a larger tool set, so careful evaluation is necessary.
VMware Workstation 15’s built-in REST API eases VM automation
VMware’s Workstation 15 has several new features — notably, a built-in REST API you can use for automation. Easily power machines off and on, and save time using this helpful tool.
What are the most common virtualization automation mistakes?
There are three primary mistakes you might make when implementing virtualization automation. Avoid them by examining your business policy, double-checking VM configuration and accommodating changing business needs.
How can automation help with VM creation and maintenance?
Automation can help ease VM creation and maintenance, allowing administrators to quickly provision and patch large numbers of virtual servers.
Application streaming and virtualization can help you _______ greater network efficiency.
Business analytics (BA) is the iterative, methodical exploration of an organization’s data, with an emphasis on statistical analysis. Continued…
Quote of the Day
“Companies often report the highest analytics success when blending teams, so data scientists working alongside business analysts can produce operational benefits.” – Ed Burns
Guide to telling stories with data: How to share analytics insights
Using data visualizations to convey information can be a challenge. Learn more about telling stories with data in this guide to effective data storytelling.
Data scientist vs. business analyst: What’s the difference?
Many people confuse data scientists with business analysts, but the roles are distinct. One career expert explains data scientist vs. business analyst roles, how they are similar and where they differ.
The direction of business intelligence is changing to forward
As business intelligence is changing quickly, one of the key trends will be the ability for BI platforms to look forward and be predictive, rather than just detail what has already taken place.
Building leaner, meaner BI data sources
Now that business intelligence has broken free from traditional data warehousing, the data that feeds it has taken center stage. In this tip, get advice for building better BI data sources and getting the most out of BI analysis and reporting.
Make better business decisions with financial analytics
Your organization can take advantage of financial analytics to predict the future, make better business decisions and automate data reporting. Not only that, but by using predictive and advanced analytics tools, you can improve the overall performance of your finance department.
The use of a spreadsheet when a data warehouse was required created a situation _______ effective analysis was impossible.
b. in which