114 Results Found
Should an organization that is the victim of an intentional nefarious hacking activity resort to retaliation? It’s a question that has been gathering a lot of attention. Retaliating against bad actors might seem appealing, but what are the legal ramifications? In this article, find out if there is a legal precedent to "hacking back."
Cloud computing has risen from relative obscurity to the No. 1 tech area of interest in the world, according to the 2017 Global Knowledge IT Skills and Salary Report.
How do you measure the experience and knowledge of an IT professional? One way is through certifications. Earning any certification is a notable achievement, though not all certifications carry the same perceived worth.
Cloud adoption continues to soar. In fact, worldwide Infrastructure-as-a-Service (IaaS) public cloud services grew by 29.5 percent in 2017, according to Gartner. If it’s not in a company’s current plans to utilize cloud technology, it most certainly will be (or should be) in the next couple of years.
Technology trends such as these show no signs of abating, and IT administrators need to be prepared. Having a well-rounded and versatile team of IT practitioners is becoming increasingly necessary. In the following article, we examine five key skills that every IT department should have covered, regardless of the size of the company.
Have you been afraid to implement PowerShell in your environment because of security fears? The reality of PowerShell security doesn’t always match the perception. When compared to other scripting languages, PowerShell is actually more secure by default.
Despite a growing awareness and preparation for distributed denial-of-service (DDoS) attacks, the overall arc of DDoS attacks is not weakening, but actually gaining more attention from the companies and personnel who have experienced these threats first-hand.
Behind various Google services lies the powerful Cloud AI, a neural net-based, machine learning technology that Google has perfected for use with services like image search and voice recognition. Here are five ways you could use Cloud AI to improve your business.
A longtime leader in data analytics, Google continues to earn their position by continually improving their data analytics offerings. Now, with Google Cloud Platform (GCP), you can capture, process, store, and analyze your data in one place, allowing you to change your focus from infrastructure to analytics that informs business decisions. However, you can also use GCP Big Data tools in combination with other cloud-native and open-source solutions to meet your needs. Below is an overview of GCP Big Data Tools and how you might utilize them to improve analytics.
Google takes security to a whole new level thanks to their years of experience as one of the most popular targets on the internet for would-be hackers and denial of service bots. This led Google to build a sophisticated security infrastructure the likes of which few companies or organizations can claim. Google approaches security holistically and involves everything from the physical data centers, to the data pipelines between them, down to the training of each employee that is responsible for managing the infrastructure.
Consider how many financial transactions are performed on the Internet everyday. Protecting all this data is of upmost importance. Cryptography can be defined as the process of concealing the contents of a message from all except those who know the key. Cryptography can be used for many purposes, but there are two types of cryptographic algorithms you need to understand, symmetric and asymmetric. Symmetric uses a single key, whereas asymmetric uses two keys. What else is required to have a good understanding of cryptography? It’s important to start with an understanding of how cryptography relates to the basic foundations of security: authentication, integrity, confidentiality, and non-repudiation.
Moving capabilities to a cloud provider such as Microsoft Azure is pretty straightforward. However, given the depth and breadth of service offerings provided by Azure, it’s easy to miss the product’s less obvious capabilities. If you're implementing a Microsoft Azure cloud platform, you'll want to consider these five services to save time, money, and your sanity.
Quality, as we know it today, is an accumulation of several concepts that together create a comprehensive approach to quality. The views of quality, as described in A Guide to the Project Management Body of Knowledge (PMBOK® Guide) and tested on the PMP® exam, focus primarily on the work of three major contributors: W. Edwards Deming, Joseph M. Juran and Philip B. Crosby.
If you’re looking for serious change, why not focus on your IT professional career? How much can you really learn from a five-point “Hack” list that speaks to everyone, yet no one? Not much. Too many articles rattle off a quick hit list. After reading this goal-setting guide you’ll be able to develop a game plan to bring successful change in your professional life.
Each year as the data from the Global Knowledge IT Skills and Salary Survey is put through the analysis process, certain trends become clearer. One of those is the prevalence of IT professionals who pursue certifications across multiple categories.
Data center return on investment – which is measured by time to cost savings, time to revenue, time to break even, etc. – has proven more elusive than expected. But that doesn’t mean it isn’t attainable. To understand the genesis of the bad and ugly parts of data center ROI, we need to recognize the good parts and appreciate why so many companies are putting their faith in new and unfamiliar technologies.
You might already know what cloud computing is, and you might already be implementing it into your business, but are you able to have a conversation about it? The lingo surrounding this newer technology can be a bit, well, cloudy. Here are just some of the terms we keep hearing as cloud computing spreads from organization to organization.
There is a wide-range of services available in GCP ranging from Infrastructure-as-a-Service (IaaS), Platform-as-a-Service (PaaS) to completely managed Software-as-a-Service (SaaS). In the first part of this series, we will discuss the available infrastructure components and how they provide a powerful and flexible foundation on which to build your applications.
As with all technologies transforming the way organizations operate, it’s expected that roles will also evolve. Cloud computing already has and will continue to change traditional IT roles and functions for years to come. We'll begin our overview of the transformation of cloud job roles with a look at some of the top cloud computing roles and responsibilities for architects, engineers and developers.
We spoke with Doug Cutting about his role with Cloudera and learned more about Big Data, training options for IT professionals interested in Big Data, and how Cloudera compares to Red Hat.
Whether you are just getting started in business analysis or want to gain a better understanding of certain aspects of business analysis, we have compiled a list of frequently used terms to help you get started.
Having a breadth and depth of skills -- especially on new and emerging technologies -- can only weigh in your favor.
Get an insider’s take on 2017 cloud computing, DevOps, and Internet of Things (IoT) trends from an industry expert.
Modern quality management and project management are complementary. They both emphasize customer satisfaction and the underlying belief that quality leads to customer satisfaction. The main objective in quality management is making sure that the project meets the needs it was originally created to meet—nothing more, nothing less. In other words, to ensure quality, you must meet the needs of the stakeholder.
The question of how a project manager working in a functional or matrix organizational structure gets team members to perform is asked in almost every project management class I have taught.
Are you prepping for the PMP exam? What should you know about the impending new edition of A Guide to the Project Management Body of Knowledge PMBOK® Guide before scheduling your examination?
The VMware NSX platform combines networking and security functionality directly in the hypervisor and it interoperable with a vast majority of VMware’s products. The platform provides a set of logical networking elements and services, using logical switching, routing, load balancing, VPN, firewall, etc. This product decouples network functionality from the physical devices.
Projects are a social endeavor. Traditional project management approaches have shied away from the social advantages a more agile project environment brings. By nature, we are storytelling, pattern seeking and social people. We need colocation to shine truly in a project environment.
You are estimating the total project cost using three points for cost estimates with a 95 percent confidence level. What is the cost estimate range if the estimated project cost is $120,000 and the standard deviation is $2,500?
You are the project manager on a construction project where you are deliberating between renting, leasing or purchasing a large piece of equipment. Equipment pricing: Rent at a cost of $2,500 per day; Lease for a 60 day period at $2,500 per day, with a 10% discount; Purchase at a price of $100,000. By looking at your project schedule, you have estimated that you will use the equipment about 50 to 60 days. Based only on price, which decision would you recommend?
Your organization and a seller have just agreed to a contract with a total cost of $150,000, an estimated profit of $10,000, buyer/seller sharing of 70/30 and a ceiling price of $170,000. What is the PTA (point of total assumption)? A. $170,000 B. $160,000 C. $164,2...
In this blog series, we'll get you up to speed on using the key tools listed in the PMBOK® Guide, including Decision Tree Diagrams.
Accessing cloud-based resources, whether they be IaaS/PaaS/SaaS-based, is very convenient. With a browser and Internet connection, you are up and running. No driving to your work office, no need to log into the corporate network. Just open up your web browser and go. This convenience, however, comes with a security risk. All of your business work is conducted over an insecure communication network. Unlike your office network, where the network link between you and the data center is under corporate control and is physically secure, the cloud access link is over the Internet.
In this blog series, we'll get you up to speed on using the key tools listed in the PMBOK® Guide. First up, Work Breakdown Structure (WBS).
Young adults unable to find work, employers unable to fill jobs, a recent GAO study that reported substantial declines in telecommunication expertise — there has been a lot of news about the pervasiveness of skills gaps, their causes, the actual impacts and what to do about them. It’s rather confusing, because the term “skills gaps” has been hijacked to politicize an extremely wide range of issues.
Business Continuity and Disaster Recovery (BC/DR) planning is the process of developing the plans, processes and procedures to respond to the range of incidents. We start with understanding the essential functions of an organization, called Business Impact Analysis (BIA). In life, we set the same priorities: protection of family and friends, shelter, food and water and other life-giving essentials.
One of the main weapons of organized crime on the Internet is the use of junk email, also called spam. Hackers use spam for a number of purposes such as selling counterfeit products (medicines, particularly) to steal your personal or financial information, or to infect your computer with spyware and malware. This malicious software can then hijack your computer and your Internet connection to help propagate itself.
Pen testers beware. Whether you believe you know and understand all the potential legal issues, read on. First of all, a penetration test or “pen test” is a method that’s used to evaluate the security and/or vulnerabilities in a network. This test is normally conducted externally wherein the tester is attempting to hack a network or computer. Breaking into computers and networks is illegal under the Computer Fraud and Abuse Act (CFAA), and depending on your activities and other factors, other federal laws and state laws may be broken.
In this series, we are looking at six things that can trip up project managers. We’ve covered the hazards of overcommitting, how to provide feedback, the importance of taking responsibility, staying focused, and what leading from the front can actually look like. Finally, we’ll take a look at handling team input.
Have you ever Googled yourself to see how much of your personal information is online? In many cases it can be pretty scary and include things like your home address, phone number, likes, dislikes, etc. One young man searched for himself and found all of his banking information online. In that case it turned out to be a mistake by a bank employee, exposing the banking information of 86,000 customers.