Air gapping is a security measure that involves isolating a computer or network and preventing it from establishing an external connection. Continued…
Quote of the Day
“One of the most effective defenses against large scale cyberattacks on critical infrastructure is to establish separate, air-gapped networks that provide a physical line of defense.” – Ken Spinner
Dragonfly 2.0 hacker group seen targeting U.S. power grid
Security researchers tracked the Dragonfly 2.0 hacker group as it used social engineering attacks in order to set up persistent infections on ICS networks.
Using a software-defined perimeter to create an air-gapped network
Learn how the Cloud Security Alliance’s software-defined perimeter can help enterprises build a dynamic, air-gapped network using the cloud.
Best practices for implementing an enterprise network air gap system
Brad Casey discusses how to implement the network air gap system security concept in order to improve protection against advanced attacks in the enterprise.
Protection against ransomware requires strong backup
One of the keys in protection against ransomware is implementing a solid data protection strategy that includes having data spread across different media.
Separate but equal: Mitigating the risk of Web-borne malware infections
Web-borne malware infections are a key threat to systems, but systems have to be running to be harmed. Separation is an effective method to reduce the potential damage of a malware attack.
This is a type of malware designed to obtain administrator-level access to the victim’s system.
b. Trojan horse
Consignment inventory is a supply chain model in which a product is sold by a retailer, but ownership is retained by the supplier until the product has been sold. Continued…
Quote of the Day
“Tackling the inventory challenge requires investment, but it can be attained quickly via real-time connectivity and sophisticated orchestration across different systems.” – Oliver Guy
What can a materials planner do to better manage inventory?
A materials planner is in the tricky position of ensuring the right balance of inventory. Here’s some advice on striking the balance of enough, but not too much.
Three ways IoT is transforming inventory management
The connectivity and real-time analytics inherent in the internet of things could be the game changer for retailers’ inventory woes.
The essential guide to supply chain management best practices
Supply chain management best practices include collaboration, strategy and technology. This guide provides essentials on all three.
Top four supply chain strategies to create the omnichannel experience
Transforming your supply chain to deliver an omnichannel experience is key to gaining a competitive edge. Here are four ways to make that happen.
Eight keys to supply chain sustainability
Supply chain sustainability is critical to businesses looking to build a competitive edge and brand image. Here’s some guidance you need to know.
__________ management is primarily about specifying the quantity and placement of stocked goods.
On-demand computing is a delivery model in which computing resources are made available to the user as needed. Continued…
Quote of the Day
“Cloud computing has shifted the technology model, giving customers on-demand computing services over the Internet…” – Nicole Lewis
Curb on-demand self-service risks with cloud inventory management
Cloud’s on-demand self-service model can lead to shadow IT risks. Fortunately, admins can use cloud inventory management to regain control.
Autonomic computing may pave the way to software-defined data centers
With larger IT shops under increasing pressure to deliver competitive applications and services, many see autonomic computing as a solution.
The true definition of cloud computing is still lost on some IT pros
The true definition of cloud computing, in many cases, has been lost on businesses and even some IT teams. Expert Mark May clears up the confusion.
Cloud BI projects: Partners finding BI work, but not profits
Cloud BI work is growing for channel partners, who find ample consulting opportunities. But they must make do without traditional BI income sources, such as servers and storage.
Which cloud model is best for your big data project?
While public, private and hybrid cloud can all play a role in your big data project, public cloud is emerging as the most popular option. But that doesn’t mean it’s right for you.
Cloud ___________ is the exercise of administrative control over public, private and hybrid clouds.
An Internet meme is a cultural artifact that spreads rapidly, reaching a very large digital audience within a short period of time. Continued…
Quote of the Day
“The task of finding out how well companies perform on social media and how much attention they attract is important to a company’s marketing strategy. Many organizations engaged in social media marketing have difficulty measuring performance.” – Nicole Lewis
Social media tools and applications: Channel execs sharpen strategies
Social media tools and applications can help channel partners promote their brands, but companies must carefully devise strategies to get results.
How important are social media backup methods?
Be proactive about your organization’s social media backup, as each social networking site has its own way of storing data.
Your business communication plan should include impact of social media
A business communication plan should contain social media risk analysis. In this social media-centric world, it’s crucial to track employee behavior.
Marketing’s next movement: Social media sentiment analysis tools
AI, BI and big data coupled with social media sentiment analysis tools show potential for marketing automation and next-generation sales.
Social monitoring tool add-ons to measure engagement
Many companies now look for social monitoring tool add-ons to measure audience engagement. Here are a few options.
________ marketing is any marketing technique that induces websites or users to pass on a marketing message to other sites or users.
A DSC pull server (desired state configuration pull server) is an automation server that allows configurations to be maintained on many servers, computer workstations and devices across a network. Continued…
Quote of the Day
“The DSC push/pull model adds flexibility to environments that require a particular mode to maintain proper configurations.” – Tim Warner
Windows Server 2016 changes prompt a new look at management
Some server admins prefer traditional GUI management, but certain Windows Server 2016 changes steer users toward automation — and the cloud.
Windows PowerShell DSC book trains IT to lock down systems
This Windows PowerShell DSC book explains the fundamentals of the configuration management platform and shows admins how to set it up for their organization.
These Windows configuration management tools can prevent mishaps
Windows configuration management tools can ensure that organizations remain compliant — even if undocumented changes are made to systems.
Getting acquainted with PowerShell Desired State Configuration
PowerShell Desired State Configuration has a few advantages over other systems management tools. Here are some of its benefits.
Learn the basics of PowerShell Desired State Configuration
PowerShell Desired State Configuration is a configuration management feature in Windows PowerShell. Learn the fundamentals and where it can help.
_________ management allows a system administrator to monitor and manage servers by remote control.
A capital expenditure (Capex) is money invested by a company to acquire or upgrade fixed, physical, non-consumable assets, such as a building, a computer or a new business. Continued…
Quote of the Day
“In the simplest sense, capital expenditures are single payments in exchange for goods or services, while operational expenditures are ongoing expenses paid to maintain a service.” – Meredith Courtemanche
Capital budgeting software helps manage complex investments
Read how capital budgeting software can help you plan and maintain assets, invest in new assets and get Capex under control.
Define CapEx and OpEx as making sense of dollars
Reframe the OpEx versus CapEx debate to understand how CapEx and OpEx best work together. Not every IT service is best served in data centers, and not everything is easier in cloud.
Determine IT operating costs to show the value of cloud migration
A cloud migration plan requires that admins calculate IT operating costs. Opex isn’t as stable a figure as Capex, but it’s more comprehensive for the cloud.
A CTO’s IT spending strategy for a fast-growing platform startup
Brian Morgan, CTO at fast-growing platform startup, Catalant, says his IT spending strategy is built on AWS, open source software — and business goals.
ROI template helps calculate UCaaS costs, benefits
Total cost of ownership is just one component of a UCaaS ROI template. Companies should also calculate the positive impact to business processes.
In the general ledger, accounts _______ shows money owed to a business by customers who have made purchases on credit.
The Melbourne shuffle algorithm is a sequence of actions intended to obscure the patterns by which cloud-based data is accessed. Continued…
Quote of the Day
“The Melbourne Shuffle is an algorithm that its authors believe will improve existing oblivious storage options as it’s computationally more efficient than previous models.” – Michael Cobb
To manage cloud-based healthcare applications, focus on security
Cloud-based healthcare applications are popular among hospital end users, but IT should prioritize security and set policies to protect health information.
How does the Melbourne Shuffle prevent data access pattern recognition?
Expert Michael Cobb explains how the Melbourne Shuffle can help prevent hackers from being able to complete data access pattern recognition.
Challenges with data protection in the cloud
Learn about data protection in the cloud. There are many challenges with data protection in the cloud since capabilities such as encryption and DLP can be complicated.
Architectural firm explains move to cloud-based data storage
Cloud-based data storage speeds file performance and eliminates the problems when multiple versions of files are used simultaneously by workers.
Skills and temperament drive success in cloud-based data science
Despite the need for more talent in cloud-based data science, not everyone has the right combination of tech skills and temperament to succeed as a data scientist.
In this service model, a large company might rent space in their storage infrastructure to a smaller company or individual.
a. utility storage
b. virtual storage
A blue/green deployment is a change management strategy for releasing software code. Continued…
Quote of the Day
“Application rollout planning requires IT operations teams to strike a precarious balance between development’s demands, user expectations and the realities of everyday business.” – Stephen J. Bigelow
A deployment pipeline keeps infrastructure ducks in their rows
A scripted deployment pipeline allows infrastructure developers to do more work, in less time and with less effort, to greater success.
Improve application rollout planning with advanced options
The right application deployment plan makes all the difference. Consider these three techniques during rollout planning.
When a new software deployment strategy means continuous adjustment
DevOps means that software constantly updates. To support this software deployment strategy, IT departments need to change and evolve.
ALM best practices for advanced DevOps organizations
This guide on ALM best practices compiles the important considerations for organizations transitioning from Agile to DevOps.
How important is ALM process automation in a modern DevOps approach?
ALM process automation is a crucial part of a modern DevOps approach. Discover techniques and tools for implementing automation in your development phases.
_________ deployment shortens the time between test and release by automatically pushing out code that has passed automated testing.
A cloud orchestrator is programming that manages the interconnections and interactions among cloud-based and on-premises business units. Continued…
Quote of the Day
“Cloud orchestration directly relates to cloud automation, as it arranges, sequences and coordinates automated tasks.” – David Linthicum
Break down the difference between cloud automation and orchestration
Cloud automation and orchestration are different technologies that depend heavily on each other. Explore their key differences and how they work together.
Advance multicloud management with orchestration, cost optimization tools
To reduce the complexity around multicloud management, admins need to hone their skills around orchestration, automation and cloud cost management.
Cloud orchestration tools become a must-have for hybrid IT
When choosing cloud orchestration tools, consider that some are built to span multiple cloud environments, while others are dedicated to a single platform.
Why orchestration services are important in the DevOps age
Modern organizations are under pressure to produce big results with short deadlines. Orchestration services can help IT to stay on track and thrive.
Learn the benefits of a container orchestration engine in hybrid cloud
A container orchestration engine, such as Kubernetes, allows for more app portability between public and private clouds, but challenges remain.
A ________ cloud has a single tenant architecture.
Inbox Zero is a rigorous approach to email management aimed at keeping the inbox empty — or almost empty — at all times. Continued…
Quote of the Day
“IT professionals seem to have changed their tune, especially as more and more emails flood inboxes and end users try to achieve the holy grail of Inbox Zero.” – Diana Hwang
The Top 5 Disadvantages of Not Implementing an Exception Inbox Zero Policy
How and why should you apply an inbox zero policy when it comes to your exceptions.
Microsoft’s email Clutter tool helps to attain Inbox Zero
IT pros look at Office 365’s email Clutter with a less skeptical eye, noting its ability to personalize end users’ inboxes with only relevant messages based on user behavior.
Fix outdated working practices to solve productivity puzzle
The Economist says the French could take Friday off and still produce more than Britons in a week. Can smarter use of technology fix this?
New technology competes to become email replacement
Collaboration services such as Slack seek to displace email where others have tried and failed. Is a viable email replacement on the horizon?
Email attacks that threaten networks and flood inboxes
Several types of email attacks plague user inboxes and the enterprise network. It’s up to the email admin to thwart intruder viruses and spam.
This is a way for organizations to dictate how email messaging is used in a corporate setting. It also addresses how to secure information that is exchanged via the email system.
A. email governance
B. email management