On-demand computing is a delivery model in which computing resources are made available to the user as needed. Continued…
Quote of the Day
“Cloud computing has shifted the technology model, giving customers on-demand computing services over the Internet…” – Nicole Lewis
Curb on-demand self-service risks with cloud inventory management
Cloud’s on-demand self-service model can lead to shadow IT risks. Fortunately, admins can use cloud inventory management to regain control.
Autonomic computing may pave the way to software-defined data centers
With larger IT shops under increasing pressure to deliver competitive applications and services, many see autonomic computing as a solution.
The true definition of cloud computing is still lost on some IT pros
The true definition of cloud computing, in many cases, has been lost on businesses and even some IT teams. Expert Mark May clears up the confusion.
Cloud BI projects: Partners finding BI work, but not profits
Cloud BI work is growing for channel partners, who find ample consulting opportunities. But they must make do without traditional BI income sources, such as servers and storage.
Which cloud model is best for your big data project?
While public, private and hybrid cloud can all play a role in your big data project, public cloud is emerging as the most popular option. But that doesn’t mean it’s right for you.
Cloud ___________ is the exercise of administrative control over public, private and hybrid clouds.
An Internet meme is a cultural artifact that spreads rapidly, reaching a very large digital audience within a short period of time. Continued…
Quote of the Day
“The task of finding out how well companies perform on social media and how much attention they attract is important to a company’s marketing strategy. Many organizations engaged in social media marketing have difficulty measuring performance.” – Nicole Lewis
Social media tools and applications: Channel execs sharpen strategies
Social media tools and applications can help channel partners promote their brands, but companies must carefully devise strategies to get results.
How important are social media backup methods?
Be proactive about your organization’s social media backup, as each social networking site has its own way of storing data.
Your business communication plan should include impact of social media
A business communication plan should contain social media risk analysis. In this social media-centric world, it’s crucial to track employee behavior.
Marketing’s next movement: Social media sentiment analysis tools
AI, BI and big data coupled with social media sentiment analysis tools show potential for marketing automation and next-generation sales.
Social monitoring tool add-ons to measure engagement
Many companies now look for social monitoring tool add-ons to measure audience engagement. Here are a few options.
________ marketing is any marketing technique that induces websites or users to pass on a marketing message to other sites or users.
A DSC pull server (desired state configuration pull server) is an automation server that allows configurations to be maintained on many servers, computer workstations and devices across a network. Continued…
Quote of the Day
“The DSC push/pull model adds flexibility to environments that require a particular mode to maintain proper configurations.” – Tim Warner
Windows Server 2016 changes prompt a new look at management
Some server admins prefer traditional GUI management, but certain Windows Server 2016 changes steer users toward automation — and the cloud.
Windows PowerShell DSC book trains IT to lock down systems
This Windows PowerShell DSC book explains the fundamentals of the configuration management platform and shows admins how to set it up for their organization.
These Windows configuration management tools can prevent mishaps
Windows configuration management tools can ensure that organizations remain compliant — even if undocumented changes are made to systems.
Getting acquainted with PowerShell Desired State Configuration
PowerShell Desired State Configuration has a few advantages over other systems management tools. Here are some of its benefits.
Learn the basics of PowerShell Desired State Configuration
PowerShell Desired State Configuration is a configuration management feature in Windows PowerShell. Learn the fundamentals and where it can help.
_________ management allows a system administrator to monitor and manage servers by remote control.
A capital expenditure (Capex) is money invested by a company to acquire or upgrade fixed, physical, non-consumable assets, such as a building, a computer or a new business. Continued…
Quote of the Day
“In the simplest sense, capital expenditures are single payments in exchange for goods or services, while operational expenditures are ongoing expenses paid to maintain a service.” – Meredith Courtemanche
Capital budgeting software helps manage complex investments
Read how capital budgeting software can help you plan and maintain assets, invest in new assets and get Capex under control.
Define CapEx and OpEx as making sense of dollars
Reframe the OpEx versus CapEx debate to understand how CapEx and OpEx best work together. Not every IT service is best served in data centers, and not everything is easier in cloud.
Determine IT operating costs to show the value of cloud migration
A cloud migration plan requires that admins calculate IT operating costs. Opex isn’t as stable a figure as Capex, but it’s more comprehensive for the cloud.
A CTO’s IT spending strategy for a fast-growing platform startup
Brian Morgan, CTO at fast-growing platform startup, Catalant, says his IT spending strategy is built on AWS, open source software — and business goals.
ROI template helps calculate UCaaS costs, benefits
Total cost of ownership is just one component of a UCaaS ROI template. Companies should also calculate the positive impact to business processes.
In the general ledger, accounts _______ shows money owed to a business by customers who have made purchases on credit.
The Melbourne shuffle algorithm is a sequence of actions intended to obscure the patterns by which cloud-based data is accessed. Continued…
Quote of the Day
“The Melbourne Shuffle is an algorithm that its authors believe will improve existing oblivious storage options as it’s computationally more efficient than previous models.” – Michael Cobb
To manage cloud-based healthcare applications, focus on security
Cloud-based healthcare applications are popular among hospital end users, but IT should prioritize security and set policies to protect health information.
How does the Melbourne Shuffle prevent data access pattern recognition?
Expert Michael Cobb explains how the Melbourne Shuffle can help prevent hackers from being able to complete data access pattern recognition.
Challenges with data protection in the cloud
Learn about data protection in the cloud. There are many challenges with data protection in the cloud since capabilities such as encryption and DLP can be complicated.
Architectural firm explains move to cloud-based data storage
Cloud-based data storage speeds file performance and eliminates the problems when multiple versions of files are used simultaneously by workers.
Skills and temperament drive success in cloud-based data science
Despite the need for more talent in cloud-based data science, not everyone has the right combination of tech skills and temperament to succeed as a data scientist.
In this service model, a large company might rent space in their storage infrastructure to a smaller company or individual.
a. utility storage
b. virtual storage
A blue/green deployment is a change management strategy for releasing software code. Continued…
Quote of the Day
“Application rollout planning requires IT operations teams to strike a precarious balance between development’s demands, user expectations and the realities of everyday business.” – Stephen J. Bigelow
A deployment pipeline keeps infrastructure ducks in their rows
A scripted deployment pipeline allows infrastructure developers to do more work, in less time and with less effort, to greater success.
Improve application rollout planning with advanced options
The right application deployment plan makes all the difference. Consider these three techniques during rollout planning.
When a new software deployment strategy means continuous adjustment
DevOps means that software constantly updates. To support this software deployment strategy, IT departments need to change and evolve.
ALM best practices for advanced DevOps organizations
This guide on ALM best practices compiles the important considerations for organizations transitioning from Agile to DevOps.
How important is ALM process automation in a modern DevOps approach?
ALM process automation is a crucial part of a modern DevOps approach. Discover techniques and tools for implementing automation in your development phases.
_________ deployment shortens the time between test and release by automatically pushing out code that has passed automated testing.
A cloud orchestrator is programming that manages the interconnections and interactions among cloud-based and on-premises business units. Continued…
Quote of the Day
“Cloud orchestration directly relates to cloud automation, as it arranges, sequences and coordinates automated tasks.” – David Linthicum
Break down the difference between cloud automation and orchestration
Cloud automation and orchestration are different technologies that depend heavily on each other. Explore their key differences and how they work together.
Advance multicloud management with orchestration, cost optimization tools
To reduce the complexity around multicloud management, admins need to hone their skills around orchestration, automation and cloud cost management.
Cloud orchestration tools become a must-have for hybrid IT
When choosing cloud orchestration tools, consider that some are built to span multiple cloud environments, while others are dedicated to a single platform.
Why orchestration services are important in the DevOps age
Modern organizations are under pressure to produce big results with short deadlines. Orchestration services can help IT to stay on track and thrive.
Learn the benefits of a container orchestration engine in hybrid cloud
A container orchestration engine, such as Kubernetes, allows for more app portability between public and private clouds, but challenges remain.
A ________ cloud has a single tenant architecture.
Inbox Zero is a rigorous approach to email management aimed at keeping the inbox empty — or almost empty — at all times. Continued…
Quote of the Day
“IT professionals seem to have changed their tune, especially as more and more emails flood inboxes and end users try to achieve the holy grail of Inbox Zero.” – Diana Hwang
The Top 5 Disadvantages of Not Implementing an Exception Inbox Zero Policy
How and why should you apply an inbox zero policy when it comes to your exceptions.
Microsoft’s email Clutter tool helps to attain Inbox Zero
IT pros look at Office 365’s email Clutter with a less skeptical eye, noting its ability to personalize end users’ inboxes with only relevant messages based on user behavior.
Fix outdated working practices to solve productivity puzzle
The Economist says the French could take Friday off and still produce more than Britons in a week. Can smarter use of technology fix this?
New technology competes to become email replacement
Collaboration services such as Slack seek to displace email where others have tried and failed. Is a viable email replacement on the horizon?
Email attacks that threaten networks and flood inboxes
Several types of email attacks plague user inboxes and the enterprise network. It’s up to the email admin to thwart intruder viruses and spam.
This is a way for organizations to dictate how email messaging is used in a corporate setting. It also addresses how to secure information that is exchanged via the email system.
A. email governance
B. email management
H-1B is a United States Immigration Service visa classification that permits employers to hire highly skilled foreign workers who possess theoretical and practical application of a body of specialized knowledge. Continued…
Quote of the Day
“The H-1B program is a good way of bringing talent into the United States. It gives an opportunity to those from other countries to come to the United States and contribute to the growth of our economy.” – John Moore
Employers pull back on hiring of tech talent for H-1B jobs
Hiring for H-1B jobs in tech is slowed by uncertainty over the visa program for skilled foreign workers, with the administration trying to tighten the program.
Trump’s order on H-1B program puts tech employers on notice
The long-awaited executive order on the H-1B program was issued this week. Take heed, experts said.
Automation vs. the H-1B visa program: Which matters to employees?
The H-1B visa program may face sweeping changes, or even elimination. But industry changes already underway, like automation, may lessen the impact.
Healthcare software developer jobs may be hit by Trump H-1B visa move
EHR vendors could be forced to pay more for healthcare software developer jobs in a Trump plan to reform the H-1B visa program for skilled guest workers.
Citrix CEO talks H-1B visas, other Trump proposals
Citrix CEO Kirill Tatarinov explains why technology companies are on the edge of their seats when it comes to potential changes to immigration and healthcare law.
This is an integrated set of software applications that human resource management (HR) professionals use to hire and retain employees.
A. talent management software
B. performance management software
Industrial control system (ICS) is a general term used to describe the integration of hardware and software with network connectivity in order to support critical infrastructure. Continued…
Quote of the Day
“Today, it is commonplace to find engineering workstations and servers on the ICS networks using Windows operating systems. These systems are susceptible to WannaCry and other attacks on the Wintel operating systems.” – Ernie Hayden
How does CrashOverride malware threaten industrial control systems?
CrashOverride malware shut down parts of Ukraine’s power grid, and it could threaten other industrial control systems. Here’s what to do about it.
Industroyer malware a turning point for ICS security
Security researchers at Black Hat 2017 tackle the Industroyer malware and the threats to energy grids and ICS security.
How WannaCry malware affects enterprises’ ICS networks
WannaCry malware can be a problem for enterprises’ ICS networks. Here’s a look at why, and what can be done to protect ICS from the ransomware.
A look at the development of an ICS security framework
The ICS security framework development was influenced by other cybersecurity frameworks. Expert Ernie Hayden gives an inside look to the industrial control systems process.
Industrial control systems a growing target for cyber attack
Attackers with increasing capabilities have strong financial motivation to go after critical infrastructure and manufacturing firms, says security industry expert.
This category of hardware and software monitors and controls how physical devices perform.
a. operational technology (OT)
b. information technology (IT)