211 Results Found
For several years, most news articles about a computer, network, or Internet-based compromise have mentioned the phrase "zero day exploit" or "zero day attack," but rarely do these articles define what this is. A zero day exploit is any attack that was previously unknown to the target or security experts in general. Many believe that the term refers to attacks that were just released into the wild or developed by hackers in the current calendar day. This is generally not the case. The "zero day" component of the term refers to the lack of prior knowledge about the attack, highlighting the idea that the victim has zero day's notice of an attack. The main feature of a zero day attack is that since it is an unknown attack, there are no specific defenses or filters for it. Thus, a wide number of targets are vulnerable to the exploit.
Shortly after being awarded an ITIL® Foundation certification, a recipient’s natural inclination is to ask: “Now what? How do I take the best practices I’ve learned and apply them to my organization?”
Your company has finally migrated to Windows 7. Congratulations! And now you have your first support call. This Microsoft white paper will tell you all you need to know about the new troubleshooting tools that are bundled with Windows 7 and provide you with the knowledge to quickly figure out what's happening "under the hood" on a Windows 7 computer. The selected tools described in this Microsoft white paper are a subset of the tools available on Windows 7. The focus of this white paper is on timely troubleshooting of the operating system and software applications.
Examine the evolution from physical servers to VMs to containers and the driving factors behind this change. Also review the available container management solutions on AWS, Google Cloud Platform and Microsoft Azure.
The technologies examined reduce operational expenses (OpEx), not capital expenses (CapEx) that has traditionally been the focus of virtualization. Many companies implemented virtualization with the goal of saving money in the form of fewer servers to buy with a side benefit of reducing the footprint of the servers and lowering the required power and cooling. Most of the savings were in capital, but do not expect the same with many of the technologies listed here, because some may even require some additional capital expenditures, at least for software, in order to save on the day-to-day operations of IT. The bigger cost in running an IT department is in the OpEx category anyway, so savings there are recurring.
vSphere 5.5 is now available with myriad small improvements such as a faster Web Client, LACP, Autoscale and higher configuration maximums. In addition, there are changes coming such as VSAN, which may be ground-breaking in regard to VM storage of the future. Since the release of vSphere 5.5, they have not yet announced a change to the blueprint for the test. That being the case, I will say, for now, that the VCP-510 test should remain unchanged as well. My goal here is not to reeducate you on everything that you need to know for the test; instead, it is to point out the few changes that might apply in your company or organization.
CompTIA has raised the bar for Network+ candidates. The new certification exam has significant changes to the five "domains" or knowledge areas with new content related to security, cloud, data-center and operational concerns and troubleshooting. There is also a greater emphasis on wireless networking and VoIP. Use this white paper to help you gain an overview of what's new and what's different.
Avaya introduced IP Office Manager Release 9.1 on December 22, 2014. As we all know from working with IP Office Manager, every new release brings changes to its GUI. Use this white paper to help you prepare to install and administer IP Office Manager 9.1.
The advantage—and disadvantage—of IaaS cloud computing is complete control. The user is responsible for sizing, installing, and maintaining operating systems and applications, backing up the systems, etc. This enables the user to configure everything in an optimal way for the workloads that need to be accomplished, but it requires time and effort to determine how it should be set up, secured, etc. With the goal of providing a good place for you to start your IaaS implementation and highlighting some areas that you should plan for and design for, Global Knowledge instructor John Hales provides a review of IaaS, as well as insight into what you need to know before implementing IaaS. He also shares a laundry list of things to consider when implementing IaaS, including questions to ask yourself, your company and your potential cloud provider.
There are many considerations in deciding on whether to provide Software as a Service (SaaS) to others or whether to become a consumer. This white paper will explore what questions and factors you should keep in mind as you seek to implement SaaS. Considerations include deciding how your application will be accessed, implementing disaster recovery, scheduling platform maintenance and upgrades, handling service outages and creating a security plan. This knowledge can be useful whether you are provider of SaaS applications or are planning to be a consumer using software for activities like accounting or project management.