|“Too many companies rely on the computer-based security training courses that each employee must complete once a year to meet compliance requirements.” — Bob Rudis|
Today’s Whatis.com Word of the Day is security awareness training, a formal process for educating employees about corporate policies and procedures for working with information technology (IT).
With all the pressures a busy security manager has to deal with, documenting end user security awareness is often low on the list. That’s why computer-based training (CBT) is so popular.
Unfortunately, CBT can be boring. It’s SO boring, in fact, that in education it’s often referred to as “drill and kill.”
At last, it seems as if security end user awareness trainers are taking a look at how elementary school educators keep drills interesting — they turn them into games and personalize them.
For instance, if you were an elementary teacher and had to get your students through a daunting amount of word problems to prepare students for standardized testing, you might substitute the names the textbook uses in the word problems for that of your own students and insert students photos or drawing next to the problem.
Or you might turn a drill into a game of Pictionary or Jeopardy or Wheel of Fortune. The bottom line is that anything you can do to make learning fun is as important for adult learners as it is for young ones.
|“Recruiters aren’t yet specifically looking for candidates who are certified in BPM. In fact, of 67 BPM job descriptions the Gartner researchers examined, not one included a requirement for BPM certification. Instead, most were seeking hard skills such as Business Process Modeling Notation (BPMN) and Six Sigma, and soft skills such as change management.” — Anne Stuart|
Today’s WhatIs.com Word of the Day is business process professional. The Association of Business Process Management Professionals is offering a new certification for business process pros which is renewable every three years.
|“There are techniques that can determine the context of access — the type of device, where it’s accessing from, who the user is, [whether it’s] legitimate access to this data or application — and use those techniques to begin to build a policy around what is and what is not appropriate for these devices, which are usually not managed, period.” — Scott Crawford|
Today’s WhatIs.com Word of the Day is context-aware network access control (CANAC), an approach to managing the security by granting access to network resources according to contextual-based security policies. The endpoint device is granted access, quarantined or blocked from the network depending on the device’s type, location, identity and the operating system or applications running on it.
|If you ask different people in the data center world what ‘infrastructure’ means, you will get diverse answers. The same holds true for the current crop of DCIM offerings by various vendors. — Julius Neudorfer|
Today’s WhatIs.com Word of the Day is data center infrastructure management (DCIM), the convergence of IT and data center facilities functions within an organization. When properly implemented, DCIM can provide a holistic view of the facility and facilitate energy conservation to reduce data center operating expenses.
|“After years of talk and previews and betas, Microsoft finally released its RemoteFX enhancements for Remote Desktop Protocol… So, Windows 7 only, Windows running in a VM only, Hyper-V only, LAN only and expensive, large, power-hungry graphics cards. Does RemoteFX sound like something you want to use today?” — Brian Madden|
Today’s WhatIs.com Word of the Day is RemoteFX, a set of protocols for Microsoft’s Remote Desktop Protocol (RDP). A virtual desktop delivered through RemoteFX allows the end user to work remotely in a Windows Aero desktop environment, watch videos and run 3-D applications with performance that is close to a native desktop experience.
|“Arc flash has become such a major concern that legally much of the electrical distribution equipment in a data center should now carry “Arc Flash Hazard” labels. For data center operators, this means you may be told to shut down power when maintenance is required or when a new circuit needs to be installed.” — Robert McFarlane|
|“While predictive analytics helps you model and forecast what might happen in the future, prescriptive analytics helps you decide the best course of action to take given your objectives, requirements and constraints.” — Brett Stupakevich|
|Nowadays we use those terms, app and mobile app, almost synonymously. More often than not, when you’re reading or talking about an app, it’s mobile, because that’s really where all the activity is right now. — Michael Le Du|
When is the last time you heard someone talking about a killer app, 1999? Am wondering if there’s a mobile app equivalent.
|Showback was once considered the first step toward implementing chargeback — often hailed as one of the most valuable features of cloud storage. But organizations today are putting showback to great use on its own as a resource analysis tool, and are holding off using the more complex chargeback process. — Sonia Lelii|
Today’s WhatIs.com Word of the Day is IT showback, a usage metric that can be handy for identifying business units that use resources appropriately and flagging those that don’t. At the very least, using showback as the metric-of-choice sidesteps the very human temptation to turn a conversation about appropriate usage into a circular argument about pricing and budget.
See also: IT chargeback
|“The Federal Reserve’s attempt to clarify the ‘Volcker rule’ is only creating more confusion. At issue is whether the Fed is requiring banks to start scaling back on making bets with their own money almost immediately, or whether they can continue until the ban on such activities goes into effect in two years.” —Scott Patterson|
Today’s WhatIs.com Word of the Day is the Volcker Rule, a section of the Dodd–Frank Wall Street Reform and Consumer Protection Act that restricts U.S. banks from making speculative, high-risk investments that do not benefit customers.
From the get-go, bankers have expressed concern that the Volcker Rule would hurt the ability of U.S. businesses to be competitive in a global arena. SearchCompliance.com has more information about how the Volcker Ruling will affect IT departments.