• Most Topular Stories

  • How To Create A Risk 'Pain Chart'

    Dark Reading:
    Brian Prince
    29 Aug 2014 | 9:31 am
    Consultant John Pironti outlines how to execute a risk-based approach to defending corporate assets.
  • CIOs Need To Start To Create The New Face Of IT

    The Accidental Successful CIO
    27 Aug 2014 | 2:00 am
    CIOs need to prepare for the day that traditional IT comes to the end of the lineImage Credit The era of IT as we’ve come to know it is coming to an end. The IT department functions that have gotten us this far are now coming to an end. Keeping the company’s email systems up and running, implementing an big ERP project, and securing the corporate network from the bad guys is no longer what the company needs us to do for them. Will you and your IT department be ready for the new world? What Is Happening to IT? Times are changing and CIOs need to wake up and realize what is going…
  • Is Agile a Cult?

    MarkjOwen's Blog
    Mark Owen
    31 Aug 2014 | 6:16 pm
    Agile: a set of software development methodology principles in which requirements and solutions evolve through collaboration between self-organizing, cross-functional teams. Agile software development is very popular at the moment. It offers a responsive way of developing, and companies are adopting it at … Continue reading →
  • 7 Things You Must Know About Big Data Before Adoption

    The Latest Content -
    28 Aug 2014 | 11:00 pm
    There is absolutely no doubt that the right use of big data helps businesses become more profitable. But for this to happen, there are things businesses must know.
  • Cloud Apps Management: The Power Of The Crowd

    Network Computing:
    Patrick Carey
    2 Sep 2014 | 5:00 am
    Maintaining application service levels for shared services is tough. Look to crowd sourcing, real-time collaboration, and big data analytics for help.
  • add this feed to my.Alltop

    Network Computing:

  • Cloud Apps Management: The Power Of The Crowd

    Patrick Carey
    2 Sep 2014 | 5:00 am
    Maintaining application service levels for shared services is tough. Look to crowd sourcing, real-time collaboration, and big data analytics for help.
  • Ethernet Disk Drives: Will They Catch On?

    Jim O'Reilly
    2 Sep 2014 | 4:00 am
    Seagate and HGST have designed Ethernet drives, but can these products change the storage status quo?
  • What To Do If Your Cloud Provider Is Acquired

    Andrew Froehlich
    29 Aug 2014 | 4:00 am
    With consolidation on the rise in the cloud computing market, you could end up dealing with a new cloud provider. Here are the key steps to take and questions to ask.
  • How To Survive In Networking

    Susan Fogarty
    28 Aug 2014 | 2:20 pm
    Jeremy Schulman shares his secrets for navigating the transition in network operations by leveraging lessons learned from DevOps.
  • VMware NSX Banks On Security

    Marcia Savage
    28 Aug 2014 | 9:30 am
    A year after launching NSX with much fanfare, VMware is targeting its network virtualization platform at customers with ample security budgets in the wake of high-profile security breaches.
  • add this feed to my.Alltop


  • Microsoft Accidentally Tips Windows 9

    Michael Endler
    2 Sep 2014 | 1:55 pm
    With Windows 8 adoption still limping along and a quickly removed blog reference to "Windows 9," is Microsoft about to launch its next operating system?
  • Google Enterprise Rebranded 'Google For Work'

    Thomas Claburn
    2 Sep 2014 | 11:51 am
    Name change aims to better reflect Google's business customers and shift focus from the term 'enterprise.'
  • Hillary Clinton Talks Tech: 9 Facts

    Michael Endler
    2 Sep 2014 | 10:55 am
    Hillary Clinton explained how she sees technology fitting into the recovering US economy, at Nexenta OpenSDx conference. Here are nine things we learned.
  • Welcome To IT Life

    Laurianne McLaughlin
    2 Sep 2014 | 10:31 am
    Tech's lighter side. Nostalgia. Parody. The agony and ecstasy of IT careers. You'll find all this and more in InformationWeek's new IT Life section.
  • Seattle Children's Hospital CIO: Don't Call Me Superman

    Alison Diana
    2 Sep 2014 | 9:53 am
    Seattle Children's SVP/CIO Wes Wright says IT needs more Clark Kents and fewer Supermans to get real work done.
  • add this feed to my.Alltop

    InfoWorld News

  • Industry groups: FCC shouldn't overturn state laws against municipal broadband

    2 Sep 2014 | 3:49 pm
    The U.S. Federal Communications Commission should stay out of the way of states that have passed laws prohibiting or limiting city-funded broadband networks that compete with private services, several groups have told the agency.
  • Home Depot investigates payment data breach

    2 Sep 2014 | 3:20 pm
    Home Depot said Tuesday it was investigating a possible breach of its systems holding customer payment information tied to credit and debit cards. "We're looking into some unusual activity and we are working with our banking partners and law enforcement to investigate," Home Depot spokeswoman Paula Drake said via email.
  • Why Google just rebranded Google Enterprise to Google at Work

    2 Sep 2014 | 12:36 pm
    The enterprise ain't what it used to be.  That's the message from Google today as it changes the branding of its business products from Google Enterprise to Google At Work. The new brand will be applied to the business version of Google Apps (including Gmail), the Google Cloud Platform, and the Google Search Appliance, among other products.
  • Canonical partners with IBM on a pain-free OpenStack

    2 Sep 2014 | 12:13 pm
    Canonical has a new stack -- a managed version of OpenStack, that is, with plans for on-premise and remotely hosted incarnations.
  • Microsoft begins dropping OneDrive's 2GB file size limit

    2 Sep 2014 | 7:31 am
    Cloud storage file size limits were a sad necessity back in the days when Internet speeds were low and storage prices were high. But now that those constraints are inverting, artificial file size barriers are crumbling. Case in point: This weekend, Microsoft began slowly and quietly dropping individual file size limits for OneDrive users, following in the footsteps of Dropbox and Google Drive.
  • add this feed to my.Alltop

    IT Management & Trends Blogs

  • Touch me, hold me, let me feel your vibrations.

    2 Sep 2014 | 2:17 am
    Humans just love to touch things. Especially when they are not supposed to touch things. I can pretty much guarantee that all of you have touched something specifically because it has a do not touch sign on it. Those of you who have, raise their hands (guiltily I raise my hand).   The skin, being the largest organ of our body, also has the most nerve endings. This allows us
  • Building Better Multi-Venue APIs

    1 Sep 2014 | 10:04 am
    With the growing boom of mobile apps and the consumer push for open access to their personal information through aggregation apps, there are a plethora of APIs (Application Programming Interfaces) available and being developed for every industry and ...
  • Gimmeee some sugar!

    31 Aug 2014 | 8:51 pm
    You know I want it! That sweet sweeeet sugaaarrr! Gimme some sugar cause my phone is out of juice!   Wait what? You heard me! My phone is out of juice so I need some sugar.   Orange juice? No you dumb cluck (in the interests of pg ratings this conversation has been modified Ed.), juice as in the electrons this phone runs on.   I don't
  • Don't be a Colonel Klink!

    29 Aug 2014 | 1:03 am
    If you are an old codger like me then you must remember the the show "Hogans Hero's". It is a fantastic, funny show about war time prisoners of war in a German camp. These prisoners are basically using the camp as a base of resistance operations and the German guards "know nothing! See nothing and hear nothing!".   The prison camp is run by an incompetent kommandant with the
  • The Surprising Future of CRM Systems

    27 Aug 2014 | 3:00 am
    We advise our clients on ERP systems on a daily basis, and many of those lessons learned are discussed in our 360 blog. Our blog doesn?t spend as much time discussing Customer Relationship Management software ? more commonly referred to as CRM software.
  • add this feed to my.Alltop

    Dark Reading:

  • Apple Not Hacked In Celebrity Nude Photo Breaches

    Kelly Jackson Higgins
    2 Sep 2014 | 2:00 pm
    'Very targeted attack' on celebrities' Apple usernames, passwords, security questions -- iCloud, Find My iPhone not breached, Apple says.
  • Home Depot The Latest Hack Victim?

    Kelly Jackson Higgins
    2 Sep 2014 | 10:35 am
    Home improvement chain--along with law enforcement and banks--are investigating 'unusual activity.'
  • Black Hat Europe 2014: Focus On Malware

    Black Hat Staff
    2 Sep 2014 | 10:00 am
    It wouldn't be a Black Hat event without a serious focus on malware, and we have some exciting malware and anti-malware programming to share with you this year. Without further ado, here are a few of the most intriguing malware-related Briefings that will be at Black Hat Europe 2014.
  • "Contactless" HCE Payments Promise Simplicity But Is It Secure?

    Pat Carroll
    2 Sep 2014 | 9:00 am
    Host Card Emulation is a powerful and flexible technology, but like most software-dependent solutions, it can be hacked and exploited.
  • How To Create A Risk 'Pain Chart'

    Brian Prince
    29 Aug 2014 | 9:31 am
    Consultant John Pironti outlines how to execute a risk-based approach to defending corporate assets.
  • add this feed to my.Alltop

    Computer Security News

  • 5 Things about the celeb nude photo scandal

    2 Sep 2014 | 10:50 pm
    A hacker's invasion of dozens of celebrity iCloud accounts, leading to the embarrassing leaking of nude photos, has lessons for us all.
  • Apple: Some nude shots taken from starsa accounts

    2 Sep 2014 | 7:44 pm
    Apple said Tuesday that hackers obtained nude photos of Jennifer Lawrence and other female celebrities by pilfering images from individual accounts rather than through a broader attack on the company's services.
  • Stars angry over hacked nude photos

    2 Sep 2014 | 3:39 pm
    Celebrities including Emma Watson have hit out at hackers suspected of leaking hundreds of naked pictures and explicit videos of some of Hollywood's most famous female stars.
  • Apple acknowledges some celebrity info compromised

    2 Sep 2014 | 3:39 pm
    Apple is acknowledging that computer hackers broke into the accounts of several celebrities to steal personal photos that have been posted online, a security breakdown that the iPhone maker blamed on the intruders' ability to figure out passwords and bypass other safeguards.
  • Top South America hackers rattle Peru's Cabinet

    2 Sep 2014 | 3:39 pm
    This screenshot shows a July 3, 2014 tweet by the hacking group LulzSecPeru after it claimed to have hacked Peru's government's CERT network emergency center.
  • add this feed to my.Alltop

    Oracle Bloggers

  • Extending Oracle Sales Cloud with Oracle Platform-as-a-Service

    Michaela Seika-Oracle
    2 Sep 2014 | 8:00 pm
    October 6th - 9th 2014 - Amsterdam, Netherlands Oracle is pleased to inform you and your organization of the 4-day workshop on Extending Oracle Sales Cloud with Oracle Platform-as-a-Service (PaaS). This Invite-Only hands-on workshop will be delivered by Oracle Development at No-Fee to Partners.  The training consists of live Webex presentations, live demo, and hands-on laboratory exercises. Your consultants can particpate in this workshop in person or remotely, which will save travel costs and time.  IMPORTANT: This training is only available to Oracle Partners with a current…
  • オラクルの新しいモバイルソリューション、Mobile Application Frameworkについて

    2 Sep 2014 | 7:29 pm
    去る8/6に、オラクルの新しいモバイルソリューションのラウンチイベントとして「エンタープライズ・モバイル・サミット」が開催されました。その中では、富士通様からのご講演があり、多種多様化するモバイルデバイス上のエンタープライズアプリケーションの開発の苦労と、それを解決するオラクルのソリューション、オラクルの新しいモバイルソリューション、Mobile Application…
  • 日本オラクル、モバイル・アプリケーション開発と運用を支援する統合基盤「Oracle Mobile Suite」を提供開始

    2 Sep 2014 | 6:49 pm
    8月5日、モバイル・アプリケーションをシンプルに開発し、既存アプリケーションの迅速なモバイル展開を可能にする統合基盤「Oracle Mobile Suite」を提供開始したことを発表しました。 「Oracle Mobile Suite」は、Javaベースの開発フレームワークによりモバイル・アプリ ケーション開発の全工程を網羅すると同時に、一度の開発でさまざまなデバイスに展開…
  • Easy IoT Sensor On-Boarding Using Jini Auto-Discovery and Java SE Embedded (Part 2)

    2 Sep 2014 | 5:54 pm
    To start us off auto-discovering IoT sensors and devices for quick on-boarding, we'll first take a look at the basics of Jini technology. There are two main concepts: Discovery: boot-strap sensor/device Look-Up: directory of services For the purposes of IoT easy on-boarding, both concepts are important. We want the sensor or device to boot-strap itself (with proper authentication and authorization) onto the IoT network. Then, we want the sensor or device to look-up the proper Jini proxy to use for communication. Those are the basic steps behind Jini and will be what makes on-boarding to an…
  • Java SE 8 update 20が提供開始、JavaアプレットやJava Web Startアプリのデプロイ管理機能を強化

    2 Sep 2014 | 5:41 pm
    8月18日(米国19日)にJava SE 8の最新アップデート版であるupdate20の提供が開始されました。 今回のアップデートでは、クライアント上で実行されるJavaアプレットやJava Web StartアプリケーションなどをDRS(Deployment Rule Set)に基づいて管理・運用できるようにし、新たに提供された"Advanced Management Console"によって組織内のクライアント上のJavaアプリをまとめて運用することを可能にしています。 この新ツールはJava SE Advanced、Java SE Advanced…
  • add this feed to my.Alltop

    MySQL Performance Blog

  • Using sysbench 0.5 for performing MySQL benchmarks

    Michael Coburn
    2 Sep 2014 | 8:03 am
    Given the recent excitement & interest around OpenStack I wanted to make sure I was ready to conduct appropriate evaluations of system performance.  I generally turn to sysbench since it comes with a variety of different tests (accessed via –test= option interface), including:fileio – File I/O testcpu – CPU performance testmemory – Memory functions speed testthreads – Threads subsystem performance testmutex – Mutex performance testAs you can see, sysbench lets you stress many of the fundamental components of your hardware and infrastructure, such as…
  • Percona XtraDB Cluster 5.6.20-25.7 is now available

    Hrvoje Matijakovic
    1 Sep 2014 | 12:32 pm
    Percona is glad to announce the new release of Percona XtraDB Cluster 5.6 on September 1st 2014. Binaries are available from downloads area or from our software repositories.Based on Percona Server 5.6.20-68.0 including all the bug fixes in it, Galera Replicator 3.7, and on Codership wsrep API 25.7, Percona XtraDB Cluster 5.6.20-25.7 is now the current General Availability release. All of Percona‘s software is open-source and free, and all the details of the release can be found in the 5.6.20-25.7 milestone at Launchpad.New Features:New session variable wsrep_sync_wait has been implemented…
  • Galera replication – how to recover a PXC cluster

    Przemysław Malkowski
    1 Sep 2014 | 12:00 am
    Galera replication for MySQL brings not only the new, great features to our ecosystem, but also introduces completely new maintenance techniques. Are you concerned about adding such new complexity to your MySQL environment? Perhaps that concern is unnecessarily.I am going to present here some simple tips that hopefully will let fresh Galera users prevent headaches when there is the need to recover part or a whole cluster in certain situations. I used Percona XtraDB Cluster (project based on Percona Server and Galera library + MySQL extensions from Codership) to prepare this post, but most if…
  • Galera data on Percona Cloud Tools (and other MySQL monitoring tools)

    Fernando Laudares
    29 Aug 2014 | 2:58 pm
    I was talking with a Percona Support customer earlier this week who was looking for Galera data on Percona Cloud Tools. (Percona Cloud Tools, now in free beta, is a hosted service providing access to query performance insights for all MySQL uses.)The customer mentioned they were already keeping track of some Galera stats on Cacti, and given they were inclined to use Percona Cloud Tools more and more, they wanted to know if it was already supporting Percona XtraDB Cluster. My answer was: “No, not yet: you can install agents in each node (the regular way in the first node, then…
  • Percona Server 5.6.20-68.0 is now available

    Hrvoje Matijakovic
    29 Aug 2014 | 8:29 am
    Percona is glad to announce the release of Percona Server 5.6.20-68.0 on August 29, 2014. Download the latest version from the Percona web site or from the Percona Software Repositories.Based on MySQL 5.6.20, including all the bug fixes in it, Percona Server 5.6.20-68.0 is the current GA release in the Percona Server 5.6 series. All of Percona’s software is open-source and free. Complete details of this release can be found in the 5.6.20-68.0 milestone on Launchpad.New Features:Percona Server has implemented the MySQL 5.7 SHOW SLAVE STATUS NONBLOCKING syntax for Lock-Free SHOW…
  • add this feed to my.Alltop

    DaniWeb IT Discussion Community

  • Color Code

    2 Sep 2014 | 9:48 pm
    Dear concerns, I ever think about the networking cables color codes, why these twisted pair cables are having two similar colors, such as (Example), Blue and white blue, there are several colores, which 1st cables color code setting person could use.
  • vb .net application

    2 Sep 2014 | 9:39 pm
    hello sir,good morning am creating one pos software ,i have done all my designing and coding its working fine in my system ,i kept my db in inside debug-->bin section but after created as a software application and when am using any other system it is showing the db path error ,last three months am searching for this pls do some needfull thank u.
  • How can I get started on this assembly language program?

    andrew mendonca
    2 Sep 2014 | 9:09 pm
    For this programming exercise, you may use ONLY these instructions: and nor or ori sll srl xor Run the programs by verifying the value of the PC is 0x00400000 (right-click the field and use Change Register Contents to set it) and then single stepping (pushing F10) and observing the results in the QtSpim register display window. Start a program with the instruction that puts a single one-bit into the low order bit of register eight ($8 or $t0): ori $t0, $0, 0x01 Now, by using only shift logical instructions and register to register logic instructions…
  • VB and Instagram Login

    2 Sep 2014 | 8:15 pm
    Hey Guys, I Need your help please Now instagram updated, and the login page which is : htp:// have JS and the Webbrowser doesn't run JS, which means that the page never loads. So I Need to login to instagram and I don't know how. If anyone can help me loging in to instagram without using the login page or having a solution for loading the page in webbrowser. Please Reply :S I'm using visual studio 2012 windows 8.1
  • Windows 7 Stop Charging While Playing

    2 Sep 2014 | 7:11 pm
    Hi, i'm in a pickle. I'm on a Samsung Notebook with Windows 7 installed about 2 years ago. A couple of days a go my power adaptor stoped working, so I replaced and it all goes well. One day later, I tried to play CS GO and I noticed that Windows disconnect the charger when the game is open. If I minimize the game (alt+tab) the battery icon says that there's no charger and that it's consuming battery. But if I wait a couple of seconds and hover the mouse again, it's says that it's charging. So, if the game in on the screen it's stop charging and start consuming…
  • add this feed to my.Alltop

    Phil Windley's Technometria

  • The Dangers of Internet Voting

    25 Aug 2014 | 2:07 pm
    Summary: I am serving on Lt. Governor Cox's iVote panel, which is looking at whether Internet voting might be used in Utah. I presented the following statement to the panel this morning: Current computer operating systems, Internet protocols, and standard computing practices are inherently insecure. Recent news stories about break-ins at Target, UPS, Community Health Systems, and the Nuclear Regulatory Commission point out all too well both the weaknesses in the system and the power of hackers to take advantage of those weaknesses. Groups mounting attacks include both state and criminal…
  • Fuse Version 1 Candidate Release for 20140815

    18 Aug 2014 | 10:40 am
    Summary: This blog post gives some highlights from the recent release candidate for Fuse version 1. On Friday I released new code that serves as the latest candidate for Fuse version 1. Here are some of the things that were included: Maintenance API — the maintenance API was completed. The maintenance API contains queries and services for managing reminders, alerts, and maintenance history. Fix Refresh Token Refreshing — Refresh token refreshing is more robust now and integrated with the "fleet as repository for OAuth tokens" model of linking Fuse to Carvoyant. Refactor Weekly…
  • Extending and Using Fuse

    13 Aug 2014 | 10:26 am
    Summary: Fuse is the most open, extensible connected-car system available. Extensibility is the key to Fuse giving people better control over their data, being interoperable with a wide variety of services and things, and being able to adapt to future changes. Fuse is a connected car system. You might have noticed that there are a bunch of connected-car products on the market. There are several things that set Fuse apart from other connected-car products, but there's one that's especially important: Fuse is extensible. When I say "extensible" I don't just mean that Fuse has an API, although…
  • Blockchain and Bearer Tokens

    16 Jul 2014 | 5:26 pm
    Summary: We can use the blockchain to create a class of bearer tokens that act more like keys in the physical world: they can only be used by one entity at a time and take effort to transfer. This post describes why that might be interesting. I'm interested in your feedback. One of the problems with most substitutes for email is that they fail to implement a concept that Marc Stiegler of HP writes about in his technical report Rich Sharing for the Web. Narc outlines six features of rich sharing that are captured in this short scenario: Alice, in a race to her next meeting, turns…
  • What Happens to the Data

    16 Jul 2014 | 2:56 pm
    Summary: Metromile offers per-mile car insurance based on an OBD II device that plugs into the car and reports data about how the vehicle is used to the insurance company. This raises questions about where the data goes, how it's used, and who owns it. Even more important, it's a business model that promotes the creation of data silos. Nathan Schor pointed me at an article about Metromile that appeared in TechCrunch recently. Metromile is a per-mile insurance company that uses a OBD II device that you plug in your car. It tracks your vehicle stats, similar to Fuse, Automatic, and other…
  • add this feed to my.Alltop

    Free Information Technology Magazines and Downloads from

  • Measuring the Value of Advocate Marketing

    2 Sep 2014 | 12:00 am
    But how do you actually measure the value of customer advocacy?This eBook demonstrates how forward-thinking companies are mobilizing their best customers to deliver results through every stage of the revenue cycle:Revenue generation:Act-On Software's pipeline-filling referral programCeridian's high-quality sales referencesDocuSign's domination of product review sitesCustomer engagement:Demandbase celebrates customer successEktron's customer-generated event contentSocial media buzz:Xactly's prestigious social award winsBomgar's explosion in social impressions and mentionsBrainshark's boost in…
  • ITIL® 2015 and Beyond: Six Trends Driving the Increased Importance of the Service Desk

    2 Sep 2014 | 12:00 am
    IT service managers are now required to rethink the way they deliver and support services. This white paper provides a snapshot of challenges for IT service and support and explains why the Service Desk is now more critical than ever.Request Free!
  • SuccessFactors Headlines: Get Instant Workforce Insights in Plain Language

    2 Sep 2014 | 12:00 am
    Many managers just don't have the time or skills to find the needles of insight in the haystack of data. In today's real-time business world, speed and simplicity are vital.Managers need more guidance, not more data, and that's where SuccessFactors Headlines can help.Request Free!
  • Is Network Functions Virtualization (NFV) Moving Closer to Reality?

    2 Sep 2014 | 12:00 am
    Network Functions Virtualization (NFV) is gaining momentum along with Software-Defined Networking (SDN). This paper examines the history of NFV and explores the prospects for networking to gradually evolve from a hardware-centric approach to a software-driven model. It concludes with an examination of future market implications and how NFV can help organizations to achieve their goals.Request Free!
  • IaaS Public Clouds and the Perceived Security Threat

    2 Sep 2014 | 12:00 am
    Present concerns about cloud security are reminiscent of the fears in the 1980s of LANs and a highly distributed IT infrastructure, and they also echo the efforts in the 1990s to stop Internet usage at work. But the issue really isn't security; it's governance to ensure interoperability and portability. We will review these concerns and discuss how the industry dealt with them, and then explore how these same concerns can be mitigated with a proper cloud strategy.Request Free!
  • add this feed to my.Alltop

    Free IT - Data Management Magazines and Downloads from

  • Virtualization and Cloud Computing: Does One Require the Other?

    2 Sep 2014 | 12:00 am
    Many people believe that cloud computing requires server (or desktop) virtualization. But does it? We will look at using virtualization without cloud computing, cloud computing without virtualization, and then look at using both together. In each case, we'll look at where each deployment might be most useful, some use cases for it, and some limitations.Request Free!
  • Context-Aware Collaboration: Turning Field Service Workers into Knowledge Workers

    27 Aug 2014 | 12:00 am
    Many enterprises, however, have yet to use these services to improve internal operations, such as field service, and other elements of their workforce management solutions. Integrating context-aware services with modern collaboration capabilities can help organizations improve the way they share ideas, resolve issues and improve customer service.Request Free!
  • The Cost of Inertia: Insight from Data Protection Predictors

    22 Aug 2014 | 12:00 am
    This comprehensive study report follows the observations of IT professionals across several fields of industry as they consider the current state of data management. The study examines the roadblocks that many organizations will face in the coming years as data continues to expand, but also helps readers map their way toward a more secure, more efficient data protection plan. Topics discussed in the study include:Assessing the problems of implementing and maintaining a data safety plan Creating safeguards against lawsuits, damages to reputation, and other disasters Fortifying the…
  • Survey Highlights: Data Backup and Recovery Benchmark Report

    22 Aug 2014 | 12:00 am
    Where does your data management plan stand in relationship to other systems in the industry? Is there room for improvement? Iron Mountain sets out to help you answer these questions with an in-depth review of practices used by 1,200 IT professionals. Discover the trials and triumphs of data management personnel and find out where your organization fits in on the information governance spectrum. Topics discussed include: Time-sensitive backup planning Onsite vs. offsite storage A triaged list of the most important data management issues faced by IT professionals Safe, effective, compliant data…
  • When Time Isn't on Your Side: Options for Tackling Event Based Retention Rules

    20 Aug 2014 | 12:00 am
    If you are like most organizations, you continue to struggle with an effective way to flip the switch that begins the destruction eligibility count down.Download this paper and discover some potential options for tackling the event-based retention conundrum. As you read through them, you will need to consider your organizations:risk profileability to commit resourcesand attitude towards “keeping everything”This will help determine which options are most applicable to you.© 2014 Iron Mountain Incorporated. All rights reserved. Iron Mountain and the design of the mountain are registered…
  • add this feed to my.Alltop

    Free IT - Software & Development Magazines and Downloads from

  • Forrester Market Overview: Hosted Collaboration Services Providers

    25 Aug 2014 | 12:00 am
    Sixty-five percent of IT leaders Forrester recently surveyed said they are interested in or already using software-as-a-service (SaaS) for some portion of their collaboration technology portfolio. But many IT leaders — particularly those at very large organizations — are unsure whether standardized SaaS offerings from Google and Microsoft provide the flexibility they need. These concerns shouldn't prevent CIOs from moving collaboration tools off-premises. We find a burgeoning services sector that can deliver highly customized messaging, teaming, and real-time communication services for…
  • How the Cloud is Reshaping Virtual Desktops

    25 Aug 2014 | 12:00 am
    Discover the benefits of independence from your physical desktop computer infrastructure.Desktop computing has become an increased cost burden for IT, and a source of frustration for tech-savvy users who expect more flexibility. Cloud-hosted desktops enable companies to mitigate the complexity placed on IT while reducing the risks associated with lost or stolen devices, all at a reduced TCO.Request Free!
  • Stop Password Sprawl with SaaS Single Sign-On via Active Directory

    15 Aug 2014 | 12:00 am
    As mobile devices have pushed their way into the enterprise, they have brought cloud apps along with them. This app explosion means account passwords are multiplying, which exposes corporate data and leads to help desk calls from frustrated users.Download this white paper to learn: How you can leverage your existing AD to manage app access. Key capabilities to consider when implementing Single Sign-On (SSO). How SSO can boost IT satisfaction and improve security.Request Free!
  • The Essentials of Agile

    12 Aug 2014 | 1:50 pm
    The Essentials of Agile, brings together the latest in information, coverage of important developments, and expert commentary to help with your Agile related decisions.The following kit contents will help you get the most out of your Agile research:Surviving the Transition to Agile: A Project Manager's GuideBuild Your Agile Business - The Sourcebook: Agile at the Team LevelBecome An Agile OrganizationRequest Free!
  • Dreamweaver CS6 Mobile and Web Development with HTML5, CSS3, and jQuery Mobile--Free 26 Page Excerpt

    6 Aug 2014 | 11:50 am
    These technologies have radically reconfigured the process of designing web content and function in the widest possible range of browsing environments, ranging from desktops to mobile devices. "Dreamweaver CS6 Mobile and Web Development with HTML5, CSS3, and jQuery Mobile" is essentially three books in one: an introduction to building websites; Dreamweaver CS6: HTML5, CSS3, Responsive Design; and an in-depth explanation of how to build inviting, accessible mobile sites with Dreamweaver CS6, responsive design, and jQuery Mobile. This book serves both as the essential reference for…
  • add this feed to my.Alltop

    Free IT - Storage Magazines and Downloads from

  • Virtualization and Cloud Computing: Does One Require the Other?

    2 Sep 2014 | 12:00 am
    Many people believe that cloud computing requires server (or desktop) virtualization. But does it? We will look at using virtualization without cloud computing, cloud computing without virtualization, and then look at using both together. In each case, we'll look at where each deployment might be most useful, some use cases for it, and some limitations.Request Free!
  • Is Network Functions Virtualization (NFV) Moving Closer to Reality?

    2 Sep 2014 | 12:00 am
    Network Functions Virtualization (NFV) is gaining momentum along with Software-Defined Networking (SDN). This paper examines the history of NFV and explores the prospects for networking to gradually evolve from a hardware-centric approach to a software-driven model. It concludes with an examination of future market implications and how NFV can help organizations to achieve their goals.Request Free!
  • Cloud Computing and Solvency II

    28 Aug 2014 | 12:00 am
    IBM survey shows how cloud is forming a part of insurers' Solvency II strategy.Request Free!
  • Spotlight on Cloud Security

    25 Aug 2014 | 12:00 am
    While the cloud is becoming an underlying assumption of computing, often public cloud services present problems for IT that business managers fail to think through, especially security implications. This paper covers: Cloud security liabilities Identity management Data encryption Today, nearly all businesses have one foot in the cloud whether they realize it or not. This paper will enable IT to assess their organization's exposure and reap the benefit of public cloud services without creating worry or unnecessary risk.Request Free!
  • The Cost of Inertia: Insight from Data Protection Predictors

    22 Aug 2014 | 12:00 am
    This comprehensive study report follows the observations of IT professionals across several fields of industry as they consider the current state of data management. The study examines the roadblocks that many organizations will face in the coming years as data continues to expand, but also helps readers map their way toward a more secure, more efficient data protection plan. Topics discussed in the study include:Assessing the problems of implementing and maintaining a data safety plan Creating safeguards against lawsuits, damages to reputation, and other disasters Fortifying the…
  • add this feed to my.Alltop

    Business Technology Roundtable

  • The Evolving Role of Savvy Business Technology Leaders

    David Deans
    1 Sep 2014 | 5:00 am
    As the chief executive at your company, if you discovered that you had some major financial standards compliance issues within your organization, would you be concerned about the risks associated with that exposure?If your designated outside auditor had bypassed your internal finance department and chose instead to work directly with your individual Line of Business leaders, would you want to know why? Moreover, would you intervene?Yes, it's a rhetorical series of questions. And I think we all know the answers.Did you know there's a movement that's already in progress that could impact your…
  • Worldwide IT Spending will Reach $2.1 Trillion in 2014

    David Deans
    20 Aug 2014 | 3:28 pm
    So far, 2014 has turned into a banner year for CIOs that have invested the time and effort to plan for hybrid cloud services, while building strong strategic relationships with their Line of Business leadership. Their approved capital investment budget spend is on-track and operational expenses are contained, as planned.Savvy senior executives across the globe continue to make selective investments in new business technology. In fact, there could be a moderate IT infrastructure spend over the next 12-18 months, which will likely increase the demand for open source software and professional…
  • Business Technology Literacy in the Cloud Computing Era

    David Deans
    5 Aug 2014 | 12:14 pm
    What if you could deploy a new IT service shortly after you defined the requirements? And, just imagine the bliss, if your IT spend could directly translate into a competitive advantage. Predicting the ROI would be relatively easy. You would be the envy of your peer group.Unfortunately, as most senior executives already know, it's never that simple.Typically, you perform the technology assessment due diligence up-front, you place your bets based upon the most compelling guidance, and then you closely monitor the results. It's an iterative process, where confidence builds over time. Maybe…
  • Cloud Enables a Big Competitive Advantage for UK Firms

    David Deans
    23 Jul 2014 | 5:26 am
    Recovery from the financial crisis in Europe continues across the whole region. Granted, there are structural reasons for the eurozone economy's slow recovery. Regardless, savvy senior executives in leading nations are actively seeks ways to grow their business. For some that means a shift to cloud computing services -- thereby lowering operational costs and boosting productivity.As an example, forward-looking UK businesses are becoming more competitive as a direct result of their adoption of cloud services, that's according to the latest market study findings from the Cloud Industry Forum…
  • How to Win Big When Cloud Computing is Pervasive

    David Deans
    16 Jul 2014 | 11:16 am
    Some people are never satisfied. These fearless agents of change are everywhere. They're informed, confident and willing to experiment. They seek out the best business technology solution for the job at hand. They act on instinct. Yes, you could say that they're driven.However, they're also at risk of being labeled as "rogue employees" because they ordered a software-as-a-service (SaaS) offering and perhaps expensed it without prior approval. Sometimes they're the champion of progressive projects that are referred to as Shadow IT -- intentionally bypassing their company's formal evaluation…
  • add this feed to my.Alltop


  • 5 Fascinating Tech-Centric Kickstarter Campaigns

    29 Aug 2014 | 9:11 am
    The magic of crowdfunding is empowering lots of creatives and inventors to test out their ideas, then bring them to fruition without risking financial life and limb before they’re certain their concepts are proven wins. On Kickstarter, tech projects and electro geekery are huge draws among the thousands of assorted campaigns that are live at […] 5 Fascinating Tech-Centric Kickstarter Campaigns is a post from: Modis The post 5 Fascinating Tech-Centric Kickstarter Campaigns appeared first on Modis.
  • How Mrs. Nebraska Keeps Her Cool in Competitive Environments

    28 Aug 2014 | 6:48 am
    We’re welcoming back Modis Colleague and Mrs. Nebraska 2014, Amanda Reinert, to the Modis blog. Last week, she detailed the importance of preparation both in the office and on the stage. Today she’s sharing her insight on how she keeps cool in an competitive environment. This week, she’s competing for the title of Mrs. America at […] How Mrs. Nebraska Keeps Her Cool in Competitive Environments is a post from: Modis The post How Mrs. Nebraska Keeps Her Cool in Competitive Environments appeared first on Modis.
  • Tough Interview Questions: “What Can You Offer Me That Another Person Can’t?”

    27 Aug 2014 | 9:00 am
    Creating an exceptional connection during an interview is a key step in getting hired for a position. Often times in the job hunting process, you’ll find yourself answering some of the same questions in each interview. In this week’s edition of our series on tackling tough interview questions, Modis President Jack Cullen explains how you can […] Tough Interview Questions: “What Can You Offer Me That Another Person Can’t?” is a post from: Modis The post Tough Interview Questions: “What Can You Offer Me That Another Person Can’t?” appeared first on…
  • Mrs. Nebraska’s Insights on the Importance of Preparation

    21 Aug 2014 | 8:49 am
    At Modis, we’re proud to have a dynamic group of colleagues within our company. Amanda Reinert is a Resource Development Manager in our Omaha branch, and she’s also Mrs. Nebraska 2014. Next week, she’ll be traveling to the Loews Ventana Canyon Resort in Tuscon, Arizona, to compete for the title of Mrs . America.  As she […] Mrs. Nebraska’s Insights on the Importance of Preparation is a post from: Modis The post Mrs. Nebraska’s Insights on the Importance of Preparation appeared first on Modis.
  • Tough Interview Questions: Conflict with a Co-worker

    20 Aug 2014 | 12:39 pm
    In part one of our series about tackling tough interview questions, Modis President Jack Cullen provided his insight on discussing your biggest weakness. In today’s installment, he’s shedding light on when an interviewer asks you to discuss a time you had a conflict with a co-worker. Interviewers ask this question to gauge interpersonal skills as […] Tough Interview Questions: Conflict with a Co-worker is a post from: Modis The post Tough Interview Questions: Conflict with a Co-worker appeared first on Modis.
  • add this feed to my.Alltop

    Converge Blog

  • Customer Service in Operations? Converge in APAC

    12 Aug 2014 | 8:54 am
    Great customer service can come from many different areas of a business. For a company to stay ahead of the competition and keep customers coming back, it becomes critical to deliver on a customer’s expectation the very first time. This can be a challenge for an independent distributor, especially when there could be increased demand due to new technology, supplier/production shutdowns, or seasonal demands. Supplier lead times, numbers of orders, and special customer requests can have a substantial impact on meeting delivery expectations and overall customer service.Yes, it is true that…
  • Five Reasons to Partner with Converge in EMEA

    5 Jun 2014 | 7:05 am
    Over the past 15 years, EMEA has quickly become one of the more important innovative technology centers outside the United States. Converge, seeing what an impact the European market was having worldwide, became one of the first independent distributors to establish a European-based network of offices in this important region. Fast-forward to today, Converge now has a wide network of offices from Amsterdam to Tel Aviv, and many places in between, which has allowed us to capitalize on emerging/expanding markets and stay competitive while meeting the demands of customers…
  • Customers Are Still Talking About Converge...

    8 May 2014 | 9:22 am
    In a previous blog post, we discussed customer responses to some of the questions asked during our annual customer satisfaction survey. In this blog post we dig a little deeper into what our customers are saying about Converge and how invaluable their feedback is to us. A customer satisfaction survey is an important tool we utilize in listening to the voice of our customers, because it covers many aspects of our business and focuses on customers’ experiences throughout the entire sales process (from initial contact to quote to product delivery).Breaking the survey into four key areas helps…
  • What Are Customers Saying About Converge?

    13 Mar 2014 | 7:33 am
    As part of our continuous improvement efforts, Converge annually conducts a customer satisfaction survey to listen to the voice of our customers and learn what people are saying about us. This valuable information helps us improve not only all areas of our operations and sales, but also our quality inspection and validation programs.Our blog readers recognize, from our previous blog posts on the adoption of 5S, a hosted Kaizen event, and our quality inspection process, that we are truly committed to providing our customers with the best products and services in the industry and to making…
  • Is There Anyone Listening?

    12 Feb 2014 | 11:17 am
    Converge is your independent distributor?For over 33 years, Converge has been establishing strong relationships in the electronics components distribution marketplace. With thousands of customers worldwide, we provide the very best supply chain solutions, an accomplishment of which we are very proud.But how have we been able to accomplish this at such a high level?Because of our longevity and tenure in this industry, we not only have established market knowledge and experience in comparison to other independents, but we also have learned to ask the right questions. Most…
  • add this feed to my.Alltop

    RES Software Blog

  • My Top 5 FeatuRES of VMworld 2014

    Tyria Saul, Marketing Community Manager
    2 Sep 2014 | 12:20 pm
    Last week I had the privilege to attend my very first VMworld in San Francisco and I didn’t know what to expect. Especially after hearing about VMworld’s of the past. I spend much of my time behind a keyboard sharing the excitement that others have with the world, it was nice to experience it all […] The post My Top 5 FeatuRES of VMworld 2014 appeared first on RES Software Blog.
  • VDI – Its Cost, Its Purpose and Its Potential for More

    Patrik Zander, Director of Product Marketing
    25 Aug 2014 | 10:12 am
    Here I am at VMworld and this is the year of Virtual Desktop Infrastructure (VDI). Heard it before? Over the years, we’ve seen a lot of buzz around desktop virtualization and that it would eventually replace the traditional desktop because of a lower total cost of ownership, improved user experience, and increased security. But if […] The post VDI – Its Cost, Its Purpose and Its Potential for More appeared first on RES Software Blog.
  • Enabling Our Partners Through Education and Outreach

    Kristin Escobar, Senior Director of Channels - Americas
    20 Aug 2014 | 11:49 am
    A player is only as good as his team – and to us that includes our global community of partners. We are committed to improving how we enable our partners, from the top down; and gaining feedback and insights directly from them will greatly influence the future of our partner programs. It’s in this light […] The post Enabling Our Partners Through Education and Outreach appeared first on RES Software Blog.
  • Strong Partnership and Technology Enables VDI for Hyundai

    Diana Wong
    18 Aug 2014 | 12:14 pm
    When I say desktop virtualization, mobility, and innovation, what comes to mind? For auto manufacturer Hyundai, those words presented an opportunity to supercharge their IT environment across their Australian operations. Earlier this year, Hyundai enlisted Sydney integrator BEarena with the challenge to deliver flexibility in their VDI implementation without adding substantial complexity. The choice was […] The post Strong Partnership and Technology Enables VDI for Hyundai appeared first on RES Software Blog.
  • Updated: DB Cleanup Tool 2.0

    RES Software
    17 Aug 2014 | 10:37 pm
    By: Max Ranzau From the Tools-R-Us Dept. You may recall a while back in February, I reported on a cool utility to address the issue with clearing individual log files in RES Workspace Manager. There’s now a new version 2.0 out from one of our community heroes (=someone who contributes and shares stuff), Patrick […] The post Updated: DB Cleanup Tool 2.0 appeared first on RES Software Blog.
  • add this feed to my.Alltop

    The IJIS Factor

  • Building on the Zeitgeist of Sharing

    Guest Blogger
    2 Sep 2014 | 5:38 am
    It appears that the sharing of assets has become a primary and quite common strategy for filling our daily living needs. What was once the province of more affluent people who chose to invest in time-sharing vacation homes has now been extended far beyond this lifestyle to everyday actions. It has become evident to many [...]
  • Improving IT Procurement Series Part 8: Contract Oversight and Management

    Guest Blogger
    20 Aug 2014 | 4:43 am
    This is the last of an eight-part series on procurement practices in information technology. This series is authored by Bob Shumate, a Member Emeritus of the IJIS Institute and the chair of the IJIS Institute’s Procurement Innovation Task Force. The material in these articles covers the findings of the Procurement Innovation Task Force and offers [...]
  • Improving IT Procurement Series Part 7: Negotiating a Contractual Agreement with the Selected Supplier

    Guest Blogger
    5 Aug 2014 | 8:01 am
    This is the seventh of an eight-part series on procurement practices in information technology. This series is authored by Bob Shumate, a Member Emeritus of the IJIS Institute and the chair of the IJIS Institute’s Procurement Innovation Task Force. The material in these articles covers the findings of the Procurement Innovation Advisory Committee and offers [...]
  • Improving IT Procurement Series 6: Evaluating Responses to the RFP and Selecting a Supplier

    Guest Blogger
    22 Jul 2014 | 6:37 am
    This is the sixth of an eight-part series on procurement practices in information technology. This series is authored by Bob Shumate, a Member Emeritus of the IJIS Institute and the chair of the IJIS Institute’s Procurement Innovation Task Force. The material in these articles covers the findings of the Procurement Innovation Task Force and offers [...]
  • Improving IT Procurement Series Part 5: Preparing and Disseminating the Formal RFP

    Guest Blogger
    8 Jul 2014 | 5:44 am
    This is the fifth of an eight-part series on procurement practices in information technology. This series is authored by Bob Shumate, a Member Emeritus of the IJIS Institute and the chair of the IJIS Institute’s Procurement Innovation Task Force. The material in these articles covers the findings of the Procurement Innovation Task Force and offers [...]
  • add this feed to my.Alltop

    The Data Center Journal

  • Big Paring

    David Beer
    2 Sep 2014 | 9:13 am
    I think a lot about big data and the challenges it proposes. I guess I started thinking about big data a long time before I ever heard the term. I began to think about it when I heard and read one of the conclusions of the postmortem for the events on and around September 11, 2001: that we had the information to realize that this attack was coming, but we simply didn’t analyze the data fast enough. This conclusion has always stuck with me and kept the problem on my mind, quite a while before I was aware of the term big data. One of the more well-known challenges for big data is that you…
  • Microsoft Fights Data Warrant

    Jeff Clark
    2 Sep 2014 | 6:01 am
    A court order requiring Microsoft to give U.S. prosecutors email data from its Dublin, Ireland, data center had been under a stay until a U.S. district judge reiterated the order last week. This case raises a number of questions, from the matter of data privacy to the responsibilities of corporations with regard to customer information, particularly when stored overseas. According to ZDNet, “But on Saturday, Microsoft confirmed that it would not comply with the order, potentially landing the company in contempt of court.” The company has painted its resistance as a matter of protecting…
  • Fibre Channel and FCoE continues to evolve with FC-BB-6

    Greg Schulz
    2 Sep 2014 | 4:23 am
    Despite being declared dead, Fibre Channel continues to evolve with FC-BB-6 Like many technologies that have been around for more than a decade or two, they often get declared dead when something new appears and Fibre Channel (FC) for networking with your servers and storage falls into that category. It seems like just yesterday when iSCSI was appearing on the storage networking scene in the early 2000s that FC was declared dead yet it remains and continues to evolve including moving over Ethernet with FC over Ethernet (FCoE). Recently the Fibre Channel Industry Association (FCIA) made an…
  • Tackling Today’s Security Threats

    Paul Burns
    29 Aug 2014 | 9:34 am
    As high-profile security breaches involving major household names continue to make headlines, the challenge for businesses, and SMBs in particular, is to understand the threats and determine how best to protect their data and respond in the event of a security breach. Feedly and Evernote have both fallen victim to DDoS (distributed denial of service) attacks recently, and Dominos Pizzas was threatened for ransom with publication of more than 600,000 customer records in France and Belgium. Thankfully, no credit-card details or other financial data was stolen in this case, but the theft of…
  • Internet of Things (IoT): Too Much Hype?

    Jeff Clark
    29 Aug 2014 | 6:52 am
    The Internet of Things (IoT) sounds like a great idea for both companies and consumers, but it faces a number of problems. Although the potential for an explosion in Internet-connected devices tempts product vendors and data center operators, who see dollar signs, the IoT raises all manner of security concerns, in addition to questions regarding about having sufficient infrastructure to address the flood of data. Andrew Binstock, editor-in-chief of Dr.Dobb’s, notes, “Security violations will no longer mean just the simple, but now accepted, bother of waiting for new credit cards and…
  • add this feed to my.Alltop


  • RFID system lets New York City keep better tabs on firefighters' whereabouts

    Stephanie Kanowitz
    2 Sep 2014 | 6:49 am
    Invented by the U.S. Naval Research Laboratory's and others in partnership with the New York City Fire Department, the system is based on an active RFID tag that firefighters carry and works much like how E-Z Pass tracks inventory.
  • HHS rule change lets more providers meet e-health records goals

    Stephanie Kanowitz
    2 Sep 2014 | 6:31 am
    More health care providers will now be able to meet goals with certified electronic health record technology, or CEHRT, because of a new rule allowing for more flexibility in how they use it.
  • DOJ: Former HHS cybersecurity head convicted on child porn charges

    Dibya Sarkar
    28 Aug 2014 | 9:26 am
    The former acting cybersecurity head of the Health and Human Services Department is facing sentencing after being convicted Aug. 26 by a federal jury on child pornography charges, the Justice Department said.
  • FAA resets plane separation standards based on new findings

    Stephanie Kanowitz
    28 Aug 2014 | 7:14 am
    Volpe, the Transportation Department's National Transportation Systems Center, has been working with the Federal Aviation Administration on the recategorization, or RECAT, of wake turbulence – turbulence created by a plane rather than air conditions. It's studying data points of several aircraft design characteristics, rather than only aircraft certificated takeoff weight, to set new safety standards.
  • DARPA seeks tiny implantable devices to regulate nervous system, treat diseases

    Stephanie Kanowitz
    28 Aug 2014 | 7:12 am
    DARPA's Electrical Prescriptions, or ElectRx, program is working on new, implantable, high-precision and minimally invasive technologies for adjusting nerve circuits to restore and maintain human health.
  • add this feed to my.Alltop

    Enterprise Network Security Blog from ISDecisions

  • Mitigating Credentials-based-attacks from Social Engineering

    Chris Bunn
    27 Aug 2014 | 9:38 am
    Following the recent CERT research on unintentional insider threats from social engineering, IS Decisions share their experience on how organisations are helping prevent security breaches that stem from credentials-based-attacks. Unintentional Insider Threats from Social Engineering The CERT Insider Threat Center recently published its research on unintentional insider threats focusing on the use of phishing and/or social engineering as a means to implement malware or gain access to credentials. They determined that many incidents initiated through phishing and other social engineering are…
  • Windows Security Authenticated Users: How to start taking internal security more seriously

    François Amigorena
    14 Aug 2014 | 8:21 am
    On average, a total of about 1,200 internal security breaches occur in UK businesses every single day. In the US, the figure is over 2,500. These figures are based on recent research in which 500 IT decision makers whether they had had an internal security breach in the last year. Yet despite this huge prolificacy, they also told us that insider threats are not top of their list of security priorities. In fact they come a fairly distant fourth, after viruses, data loss and hacking. So for IT managers, internal security is a lesser priority than data loss, despite the fact that the most common…
  • How to make your school network secure from the inside

    François Amigorena
    7 Aug 2014 | 3:52 am
    IT infrastructure is the backbone of a modern educational institution. From the largest secondary boasting thousands of pupils to the smallest primary with a mere hundred pupils, accessing the network is as much a regular a part of a student life as school dinners. Every day, pupils up and down the country log on to upload course work, download reading material and chart their academic progress. And it is not just the pupils that rely on the IT infrastructure. Staff members, including teachers and administrative teams, all use the network to store vital resources, share classroom material and…
  • A Third of Ex-Employees Accessing Company Data

    Chris Bunn
    23 Jul 2014 | 1:52 am
    Our latest research which surveyed 2,000 desk-based workers in the UK and US reveals at least one in three ex-employees are left with access to systems or data after leaving a company. This finding explored in the report, ‘From Brutus to Snowden: a study of insider threat personas‘ highlights how employees in two of the world’s largest markets are being left with open access to confidential data long after departing. Understanding your employees attitudes and behavior. One of the most important steps of tackling internal security is understanding your own users, and their…
  • From Brutus to Snowden. A Study of Insider Threat Personas

    Chris Bunn
    26 Jun 2014 | 6:08 am
    Today IS Decisions reveal a new study on the attitudes and behaviors of users with regards to internal security. From Brutus to Snowden: A study of Insider Threat Personas Following on from the ‘Insider Threat Manifesto‘ launched earlier this year which highlighted attitudes of IT Professionals, we now turn our spotlight on the users themselves. Learn who the most potentially dangerous users are in your organization and industry, and what you can do to alter behavior and mitigate the risk. Who is most likely to be sharing passwords and why? Why the majority of desk-based…
  • add this feed to my.Alltop

    MarkjOwen's Blog

  • Is Agile a Cult?

    Mark Owen
    31 Aug 2014 | 6:16 pm
    Agile: a set of software development methodology principles in which requirements and solutions evolve through collaboration between self-organizing, cross-functional teams. Agile software development is very popular at the moment. It offers a responsive way of developing, and companies are adopting it at … Continue reading →
  • Back from the Darkness

    Mark Owen
    25 Aug 2014 | 3:40 pm
    Time: Friday evening, 23 August 2014 Place: Here I clicked on the link to my blog to discover ... Aarghh … Wordpress had suspended my blog due to a breach of their Terms of Service. I went through the terms with … Continue reading →
  • Asking the question: GOOD; asking it over and over: BAD – where social engagement in the workplace fails.

    Mark Owen
    21 Aug 2014 | 3:56 pm
    Using social tools within the enterprise is a valuable thing. It lets people ask questions to a bigger audience than just those sitting within hearing distance of their desk. I’ve discussed this in earlier posts (ESS (Enterprise Social Software) – user … Continue reading →
  • Now this is the right way to do it – webinar times in a big world

    Mark Owen
    17 Aug 2014 | 1:34 pm
    Kudos to ProjectTimes. The Internet is a global thing. This means that anything that you publish on it could be read by pretty much anyone in the world. As a result, it is incredibly valuable to offer times, dates, et … Continue reading →
  • Introducing…the Internet SuperHeroes

    Mark Owen
    11 Aug 2014 | 4:57 pm
    Thanks to CollegeHumor Filed under: Fun Tagged: Amazon, Facebook, Google, Huffington Post, Reddit, Social media
  • add this feed to my.Alltop

    Mindtree Blogs

  • Small Steps with Analytics Can Lead to a Giant Leap

    Debjyoti Paul
    31 Aug 2014 | 11:08 pm
    In their excellent Shumpeter column, The Economist recently wrote about something that we at Mindtree have been championing for a while, and what they called “the unspoken secret of big data”*:the fact that small insights gained from data analytics can lead to significant returns either over time or when applied exponentially. Incremental improvements based on […]
  • How Holiday Readiness Testing is different?

    Abhishek Raj
    20 Aug 2014 | 3:35 am
    Unlike other industries where performance testing is often an after-thought, the retail industry cannot afford to have this approach. After all, Black Friday was last holiday season’s first billion-dollar-plus online shopping day – up a hefty 15% over the year before. We are often asked by our customers as to how holiday readiness testing is […]
  • Public Cloud or Private Cloud – more than just the cost…

    Giridhar LV
    14 Aug 2014 | 3:27 am
    I read this blog post by Brad Feld, it discusses among other things the point at which the cost of the Public Cloud no longer makes sense, and the number mentioned is $200K / month. Many of our prospects are engineering teams within Enterprises. These teams are in the process of setting up environments that […]
  • The Human Element: Not to Be Forgotten Amid Technological Innovation

    Vijay Balakrishnan
    13 Aug 2014 | 10:37 pm
    As an IT solutions company, it’s natural for Mindtree to follow (and blog about) tech trends that affect the industries we serve. But it would be disingenuous of us to ignore major trends or findings that focus on human rather than technical matters. One such finding came out when RSR recently released their report, What’s […]
  • Beacon of Hope: Serving Growth and Customer Satisfaction

    Debjyoti Paul
    5 Aug 2014 | 2:16 am
    In my last blog I spoke about the promise and peril of indoor positioning system (IPS) technologies like iBeacon – that it could be a game changer for retailers, but only if approached in a way that does not anger, frighten or alienate already-skeptical consumers. Convincing customers to opt-in to a program that tracks their […]
  • add this feed to my.Alltop

    The Accidental Successful CIO

  • CIOs Need To Start To Create The New Face Of IT

    27 Aug 2014 | 2:00 am
    CIOs need to prepare for the day that traditional IT comes to the end of the lineImage Credit The era of IT as we’ve come to know it is coming to an end. The IT department functions that have gotten us this far are now coming to an end. Keeping the company’s email systems up and running, implementing an big ERP project, and securing the corporate network from the bad guys is no longer what the company needs us to do for them. Will you and your IT department be ready for the new world? What Is Happening to IT? Times are changing and CIOs need to wake up and realize what is going…
  • Avon’s US$125M IT Software Project Mistake

    20 Aug 2014 | 2:00 am
    Avon made a big mistake when they designed their new softwareImage Credit As CIO we have a number of different tasks that the company is expecting us to do. However, there is one task that takes priority over all of these other takes: implementing large software projects. Over at Avon they just did one of these big projects and it has ended in failure. What did the Avon CIO, Donagh Herlihy do wrong? The Project Avon knew that they had a problem. Their order management software system was old and out-of-date. Avon is a company that is built on a direct sales model. This means that its…
  • 4 Steps For Hiring The Right People – Every Time

    13 Aug 2014 | 2:00 am
    When you are hiring, make sure that you hire the right people…Image Credit As the person with the CIO job, one of your most important jobs is to hire the right team to help you run the IT department. The importance of information technology is understood by CIOs, but the importance of the hiring process all too often is not. CIOs will often try to perform this job based on their “gut feel”. What we all need to understand is that hiring the right people is a process. If we follow the right process, then we’ll get the right people – every time. The Hiring Process All too…
  • 5 Ways That CIOs Can Do A Better Job Of Communicating In The Office

    6 Aug 2014 | 2:00 am
    The office is where a CIO must do the best job of communicatingImage Credit In the 21st Century, all business seems to be done globally. However, in order for the person with the CIO job to be effective, you are going to have to be able to communicate in the old fashion way – face to face. What this means is that you will need to master the art of office communications as yet another way to capture the importance of information technology. It’s not impossible, but you do need to know what you are doing. 5 Tips For Communicating Well In The Office There is no one way for you to improve…
  • 5 Tips For Creating Effective Business Partnerships

    30 Jul 2014 | 2:00 am
    CIOs can use business partnerships to achieve moreImage Credit As the person with the CIO job you are faced with a double challenge: despite the importance of information technology you have a limited budget and you have limited resources. This means that in order to get everything done that the rest of the company is expecting you to do, you are going to have to get creative. One way to do this is to get some outside help in the form of partnering with other businesses. The secret lies in knowing how to do this. 5 Tips For Establishing Business Partnerships One of your jobs as CIO is to…
  • add this feed to my.Alltop

    Informatica Perspectives

  • Integrating Structured Data Into the E-Discovery Process

    Josh Alpern
    29 Aug 2014 | 4:58 pm
      This blog post initially appeared on Exterro and is reblogged here with their consent. As data volumes increase and become more complex, having an integrated e-discovery environment where systems and data sources are automatically synching information and exchanging data with e-discovery … Continue reading »
  • Is the Internet of Things relevant for the government?

    Kimberley Williams
    28 Aug 2014 | 2:38 pm
    Get connected. Be connected. Make connections. Find connections. The Internet of Things (IoT) is all about connecting people, processes, data and, as the name suggests, things. The recent social media frenzy surrounding the ALS Ice Bucket Challenge has certainly reminded … Continue reading »
  • The Catalog is Dead – Long Live the Catalog?

    Ben Rund
    28 Aug 2014 | 9:04 am
    The Catalog is Dead. Print solution provider Werk II came up with a provocative marketing campaign in 2012. Their ads have been designed like the obituary notice for the “Main Catalog” which is “no longer with us”… According to the Multi … Continue reading »
  • In a Data First World, IT must Empower Business Change!

    Marge Breya
    25 Aug 2014 | 10:01 am
    You probably know this already, but I’m going to say it anyway: It’s time you changed your infrastructure. I say this because most companies are still running infrastructure optimized for ERP, CRM and other transactional systems. That’s all well and … Continue reading »
  • What’s In A Name?

    Stephan Zoder
    22 Aug 2014 | 3:01 pm
    Sometimes, the choice of a name has unexpected consequences. Often these consequences aren’t fair. But they exist, nonetheless. For an example of this, consider the well-known study by the National Bureau of Economic Research study that compares the hiring prospects … Continue reading »
  • add this feed to my.Alltop

    IT Certification Master

  • How To Become Oracle Certified Master For Fun And Profit – with Kamil Stawiarski

    Mirek Burnejko
    25 Aug 2014 | 12:31 am
    This is an interview with Kamil Stawiarski. Kamil is the youngest Oracle Certified Master (OCM) in Poland and one of the youngest in the world. He’s a consultant. His skills are known in Poland and abroad. He works with dozens of companies who use Oracle databases. He’s also an amazing teacher, great performer and phenomenal person whom I truly admire. In this interview you will find: How IT Certification Master helped Kamil? What are Kamil’s goals? How YOU can do your first step with Oracle certifications? Miroslaw Burnejko: Kamil, it’s an honor to speak with you.
  • Top 10 IT Certifications for 2014 – I Need Them All – Especially #6

    Mirek Burnejko
    12 May 2014 | 9:23 pm
    This year our list of the best IT certifications for 2014 is different. You won’t find here the best expert-level certifications, the hardest certifications on the planet to get, or the coolest ones. You will find here certifications that will help you to prove your knowledge about new technologies like Cloud, SDN, Big Data, IPv6 and virtualization. I trully believe these certification will help you to find great job offers in 2014-2015. I hope you will find it useful. I’m looking forward to hear your opinion in the comment section below. Some of these certifications were created…
  • How To Achieve REAL Success With Or Without Certification – with Darby Weaver

    Mirek Burnejko
    16 Dec 2013 | 12:01 am
    This is an interview with Darby Weaver. Darby Weaver is a Global Network Architect who serves as a Systems Integration Consultant and Network Planning/Design Engineer for National and International private, public, and government entities. Darby specializes in Network Design (LAN/WAN/Data Center/WLAN) Routing and Switching, Security, and Wireless Technologies. Darby is certified as a CCNP, CCDP, CCSP, CCNP Voice/Wireless, MCSE+I, MCSA/E + Security/Messaging, Sniffer Certified Master, ITILv2, and a number of other certifications. He has also passed the CCIE Routing and Switching and the CCIE…
  • SAP Certification: What It Is and Why Should You Care

    Mirek Burnejko
    24 Nov 2013 | 11:00 pm
    This is a guest post written by Cleo Isco who currently works as customer relations manager at ERP Certifications. Prior to joining ERP Certifications, Cleo worked as an SAP MM/SD consultant for 10+ years. His professional interests include SAP and online education. In this article you will find information, why SAP certifications are so important and where you can find more information about them. Enter Cleo. About SAP SAP has become the largest provider in the market of enterprise resource planning systems (ERP systems); it is the leading suit of business software covering almost every need…
  • Are You Backup Academy Certified Professional – New Videos

    Mirek Burnejko
    11 Nov 2013 | 7:12 am
    Are you Backup Academy Certified Professional? I am. I can tell you one thing: this certification and the training process is fantastic. Did I mention it’s 100% free. I spent several hours watching video trainings from one of the best experts in the industry: Rick Vanover, David Davis, Eric Siebert, Andrea Mauro and much more. Today I have a pleasure to watch and recommend you two new amazing videos that help you with your professional career: Keeping Hyper-V Healthy – by Brien Posey (MVP) What’s New In Windows Server 2012 R2 – by Mike Resseler (MVP) So don’t waste…
  • add this feed to my.Alltop

    IT Manager Daily

  • What the iCloud hacks mean for your users

    David King
    2 Sep 2014 | 12:54 pm
    An alarming gap in security seems to be to blame for private photos of celebrities leaking online. Apple’s claiming the problem has been fixed, but many remain skeptical and are wondering how it was allowed to happen in the first place.  There are still plenty of unknowns in the attack that revealed sensitive information thought to be secure on iCloud. And no one has of yet taken credit for the hack which revealed naked pictures of celebrities. The information that is available so far: The attack seems to be the result of a flaw in Find My iPhone, a service that locates lost phones and…
  • Companies are just plain bad at predicting cost overruns

    David King
    2 Sep 2014 | 11:42 am
    Anyone who’s rolled out software or application only to find their wallets lighter than expected, take heart in knowing that you’re not alone. A new study confirms that cost projections are wildly inaccurate in many cases.  Magne Jørgensen, a researcher for Simula Research Laboratory, reviewed several studies on software estimation costs. His conclusions are disheartening, but probably not too surprising for most IT pros: cost overruns are rampant in software projects, with the average overrun amounting to about 30% despite knowing more about estimation accuracy than we used to,…
  • VoIP: Real Savings for Your Business and Free Quotes to Get You Started

    27 Aug 2014 | 9:00 am
    Nothing stretches a business budget more than communication. Runaway long-distance, roaming and monthly phone rates can seriously hurt the bottom line, and many companies are looking at VoIP phone systems for potential savings. If you have tried to research the best business VoIP provider, you probably have discovered it is a very time consuming (and sometimes confusing) process. Let 360Connect take the frustration out of your search. Simply fill out a short form detailing your phone and service needs. They’ll cut through the clutter and match you with up to 5 qualified VoIP system vendors…
  • iPad CTO Kit – including the iPad Tips and Tricks Guide for IT Executives and Managers

    27 Aug 2014 | 8:00 am
    Download this kit to learn everything you need to know about IT Management. The iPad CTO Kit brings together the latest in information, coverage of important developments, and expert commentary to help with your IT Management related decisions. Click here to learn more!   The post iPad CTO Kit – including the iPad Tips and Tricks Guide for IT Executives and Managers appeared first on IT Manager Daily.
  • Most IT pros are now firm cloud believers

    David King
    26 Aug 2014 | 11:01 am
    You’d be hard-pressed to find anyone who still thinks of the cloud as a passing trend. But there are still IT pros who have some reservations – and with good reasons, too.  Overall, the cloud is considered a safe bet to be the biggest driver of IT in coming years. A survey of 1,200 -plus companies by Evolve IP finds that 88% of respondents believe cloud computing is the future model of IT. Broken down, 67% consider themselves personal believers in it whereas only 19% are unconvinced. And many have already had good reason to be optimistic. Disaster recovery and prevention top cloud…
  • add this feed to my.Alltop

    mrc's Cup of Joe Blog

  • The BI Roadmap (part II): 4 initial steps you can’t ignore

    Joe Stangarone
    2 Sep 2014 | 8:00 am
    Summary: Why do most BI projects fail? Many organizations still ignore the foundational questions and rush through the initial steps. They jump straight into implementation, and then wonder what went wrong. If you want your BI project to succeed, here are 4 initial steps you can’t ignore. In the first part of our BI Roadmap Series, we explored 5 “foundational questions” of successful BI. These are questions you must ask before starting your BI journey. While the questions may seem basic, they lie at the foundation of any successful BI project. The problem is, many organizations…
  • 3 signs of good Business Intelligence software

    Joe Stangarone
    1 Sep 2014 | 11:53 am
    Summary: Over the past few years, we’ve seen an explosion in BI tools. But, with all of these available BI solutions to choose from, how do you know which options are any good? Here are 3 ways to separate the good from the bad. Business Intelligence (BI) solutions come in all shapes and sizes. Some emphasize architecture, while others tout their flashy interface. Some cost hundreds of thousands of dollars, while others cost hundreds. With all of these options, how do you separate the good from the bad? It boils down to a few key areas. Here are 3 signs to look for: 1. Evolution photo…
  • 9 signs that your business applications need replacing

    Joe Stangarone
    26 Aug 2014 | 8:00 am
    Summary: Many businesses still run on outdated applications. Is your business one of them? If so, how do you know when it’s time to replace your legacy apps? At what point do your legacy applications do more harm than good? Here are 9 sure-fire signs to watch for. Let me ask you a question: At what point are business applications “too old?” At what point should you replace or overhaul your legacy business applications? photo credit: Helga Weber via photopin ccIt’s a question that organizations struggle with every day. You see, many businesses run their operations on outdated…
  • Modernization methods explained

    Joe Stangarone
    22 Aug 2014 | 1:08 pm
    Summary: Are you stuck with legacy applications? Do you view application modernization as risky, expensive, or potentially disruptive to your business? It doesn’t have to be, if you choose the right modernization method. Learn which modernization approach works best for you. Confusion surrounds legacy application modernization. Some think modernization is risky. Others think it will disrupt their business. Still others think it’s not worth the expense. Are any of these assumptions correct? Yes and no. It all depends on which modernization method you choose. Sure, modernization CAN be…
  • Weekly Recap: 9 common BI mistakes, mobile development myths, and more…

    Joe Stangarone
    22 Aug 2014 | 12:34 pm
    Summary: In this week’s article roundup, we learn how smart developers adapt to mobile disruption, how to choose software you won’t regret later, how to avoid the most common BI mistakes, and more. 9 Common BI Software Mistakes (and How to Avoid Them) As the number of BI solutions grow, so does the possibility of failure. The problem: BI implementations are costly and time consuming. Failure isn’t cheap. This article lists some of the most common BI software mistakes companies make, and offers some ways to avoid them. ‘Mobile Disruption’ Leading to More Strategic…
  • add this feed to my.Alltop

    Information Space

  • Support the ProLiteracy Hackathon: Sept. 13, 14

    Billy Ceskavich
    2 Sep 2014 | 1:05 pm
    This article was originally posted on the Hack Upstate Blog. In just under two weeks, Hack Upstate invites you to join Central New York’s best developers and designers as they come together to fight global adult illiteracy. Recognizing the civic-minded spirit and potential for innovation among CNY’s technology community, Syracuse-based non-profit ProLiteracy claims host to its first hackathon at its headquarters in the Near West Side of Syracuse. The hackathon will run from September 13-14th. Join us at the first ProLiteracy Hackathon // Source – ProLiteracy The two-day hackathon,…
  • Data Roundup: Data Science’s Future and its Effect on Football

    Sam Edelstein
    2 Sep 2014 | 6:44 am
    This week in Data Science and Big Data news (a regular feature in Information Space), we read about data’s present and future, and how it is already impacting football. Future of Data Science The Association for Computing Machinery held its annual conference this week The New York Times reported from the Association for Computing Machinery annual conference,  and the keynote addresses focused on where the field of data science should go and its current limits. Today, data science allows us to see which hospitals are most at risk for having patients get readmitted, thanks to analysis…
  • To Pivot or To Persevere: 3 Student Sandbox Teams Decide

    Aravind Gopalakrishnan
    28 Aug 2014 | 9:36 am
    Earlier this month, student entrepreneurs showcased the products and services that they developed over the summer as part of the Syracuse Student Sandbox’s Demo day. Demo Day is the culmination of the Sandbox’s 12-week summer program showcasing student innovation. Each student startup pitched their venture to investors and set up booths to show their products to the public. The student-created products included smart turn signals to aid in bike safety, smart litter boxes to detect feline diabetes, and a pop-up dining experience. The grit and sweat that went into all…
  • 5 To Try: Your Weekly App Discovery Guide

    Kelly Lux
    27 Aug 2014 | 6:37 am
    This week, since my iPhone is not cooperating (the home button fell off!), I’m concentrating on Web tools.  Let’s get started! The Canva design interface. Image via Canva (Desktop + Chrome App Store) Canva is one of my absolute favorite tools! Truly a design app for the non-designer, Canva has captured the attention (and investment dollars) of many influential people since its launch last year. Former Apple Chief Evangelist, Guy Kawasaki, now serves as Canva’s Chief Evangelist, so that tells you something about the design chops here. No need to be a coder or a…
  • LinkedIn’s Field of Study Explorer: Career Options Illuminated

    Kelly Lux
    25 Aug 2014 | 7:07 am
    I learned a lesson several years ago when running Syracuse University’s alumni networking program. Field of study usually has little correlation to what you eventually end up doing for a living–at least on the surface. Unless you pursue a high level professional degree, in law, medicine, engineering and the like, there is a great likelihood that what you end up doing with your major will depend more on your interests and the job market, than being explicitly matched to the degree that you earn. LinkedIn has created a very simple way for college students, high school students,…
  • add this feed to my.Alltop


  • Rolls Out Mobile App

    2 Sep 2014 | 9:20 pm
    Adding to its recent string of successful initiatives, Pakistan’s leading real estate portal has launched its mobile app for iPhone users to explore its extensive property database on the go. “ is proud to present the Zameen App, which is available for download from the App Store. We are always looking for new and […]
  • PakWheels brings the Biggest Autoshow in Karachi

    2 Sep 2014 | 9:10 pm
    PakWheels and Warid Telecom are organizing the biggest ever Automobile Show in Karachi, featuring a wide range of automobiles in the; Classic, Vintage, Exotic, Luxury, 4X4 and SUV categories. Besides celebrating the latest breakthroughs in Automobile technology, speed, design, elegance, horsepower, travel-comfort, Leather upholstery and beauty, this show will also offer many other exciting and […]
  • Zong Gives Reward to 266 Lucky Winners of Lakh Pati Offer

    2 Sep 2014 | 9:00 pm
    Zong, Pakistan’s first and only Super 3G & 4G telecom network in Pakistan, recently concluded its Mega ‘Zong Lakh Pati’ offer. The campaign has been one of Zong’s most successful VAS campaigns till date as more than 1.1 million Zong customers took part. Till its conclusion, more than 266 lucky customers received prizes. The ‘ZonG […]
  • Warid Launches Crore Nagar Offer to Make You Crore Pati with Recharge of Rs. 50

    1 Sep 2014 | 9:20 pm
    Warid lauches Crore Nagar Offer which makes a Warid customer Crore Pati only with recharge of Rs. 50. According to details, on every load of Rs. 50, you get a guaranteed prize of either 20 free on-net minutes, 100 free SMS, 10MB free Internet or unlimited free calls on Warid Friends and Family numbers. Not […]
  • Huawei Reveals Pakistani Winners of Regional LIGA BBVA Football Campaign

    1 Sep 2014 | 9:10 pm
    Following a regional campaign to showcase its partnership with Liga de Futbol Profesional (LFP), Huawei, a leading global information and communications technology (ICT) solutions provider has announced Imran Rassaq, 27; Adnan Ibrahim, 23 and Aamir Khan, 26as the three Pakistani winner of its competition. After beating out hundreds of other football fans,the three winners will […]
  • add this feed to my.Alltop

    Complete IT Professional

  • 10 Things That Should Not Go On Your IT Resume

    Ben Brumm
    1 Sep 2014 | 4:30 am
    When you create or update your IT resume, there are some things that should go on it, and a few things that you shouldn’t put on it. I’ve listed ten different things that should not go on your IT resume in this article.Your PhotoPhotos are not needed on resumes. While it might seem like a good idea to add a photo, so that people know what you look like and can see how professional you look, it’s not a good thing to do. It can leave you open to discrimination by the employer, which can be either negative or positive.Employers can also feel uncomfortable with it, as they think…
  • What Are The Different Types of Software Testing?

    Ben Brumm
    28 Aug 2014 | 4:30 am
    Software testing is a major part of the software development process. As part of the testing phase, there are a lot of tests that are run against a change or a new piece of software, each with different names and purposes. Let’s take a look at each of the types of software testing and what they are used for.Two Main Categories of TestingIf you’ve spoken to any testers, they may have mentioned there are two different categories of testing – black box and white box.Black box testing means that tests are run without knowing or even ignoring the internal code structure of what…
  • What Is The ISTQB Certification And Should I Get It?

    Ben Brumm
    25 Aug 2014 | 4:30 am
    You might have heard about these certifications from the ISTQB. What are they? Are they good for IT professionals to get? Who are they for? Learn more about them in this article.What is the ISTQB and Who Are They For?ISTQB stands for International Software Testing Qualifications Board, and they are an organisation that has defined a series of certifications for software testers.There are many other vendors out there who provide certifications for the development side of the application, such as Microsoft and Oracle, but ISTQB provides certifications for software testing.If you’re a…
  • Announcing the Launch of IT Resume Results

    Ben Brumm
    24 Aug 2014 | 4:00 am
    The ultimate resource for creating your own IT resume is now available.What Is This Resource?I’ve spent the last few months doing research, asking my readers, and putting together a new online video course. This course aims to answer a lot of the questions that IT professionals have when looking to create their own resume.I found that there was a lot of conflicting advice out there, and I thought it would be useful to have one location, one resource, one guide, for all IT professionals to use when creating their own IT resume. IT Resume ResultsThis course is called IT Resume…
  • What Is The SDLC Life Cycle And Who Is Involved?

    Ben Brumm
    21 Aug 2014 | 4:30 am
    The SDLC Life Cycle, or just the SDLC as it’s known, is the process of developing software to meet a need or solve a problem. This life cycle involves quite a few steps. Learn about what they are in this article.The steps in the SDLC can vary depending on a few factors, such as the project methodology or even where you read the material. The steps I’ve highlighted below are general and apply to most projects. Other sources may expand or collapse some of these sections, but overall, they should be pretty similar. I’m also referring to it as the SDLC life cycle as well as the…
  • add this feed to my.Alltop


  • How I upgraded my Dell Vostro 1015 laptop instead of buying a new one!

    Alireza Mortazavi
    24 Aug 2014 | 4:02 am
    Recently I made some modifications to my Dell Vostro 1015 laptop to enhance it’s speed a little bit, cause when I look at the current price lists, the only advantage I see is in the prices ! The hardwares are almost the same as few years ago without any breakthrough or something to look forward to. So, I decided to upgrade my existing laptop and use it for another 2-3 years and wait for the market’s better days ! So, first of all, you need a laptop repair shop in your area, cause most of the parts in your vostro are old and they are not shipped anymore, but the repair shops…
  • Your wordpress is as insecure as your most vulnerable plugin !!!

    Alireza Mortazavi
    23 Aug 2014 | 1:45 pm
    Recently I noticed huge amount of mails going out of my server from one specific wordpress website and almost all of them were spammy ! I checked my server’s IP and it was blocked in some spam blacklist databases. At first I thought the pop3 account of the website should have been compromised, so I changed the password, but still so many mails were in the queue ! I changed all the passwords and nothing changed. So my thoughts were on Exim and Spamassasin and the other security softwares on the server. I deleted the mail queue which were near 50k mails in it! and updated everything, but…
  • How to send email from your localhost web server Xampp without getting spamed using your Gmail account

    Alireza Mortazavi
    23 Aug 2014 | 12:44 pm
    Had tried to make php mail() work on my localhost Xampp web server using Mercury for relaying messages to external mail servers. I made a lot of configurations, but sometimes it work and sometimes it won’t!  I’ve found a better way of doing it with the help of my Gmail account ! A lot of google searching and some simple steps, I could make it work. So here sharing my experience with you. Your Xampp installation comes with the sendmail package. If not or you are not using xampp, you can get the latest package at Extract the zip file and copy the files…
  • Feel the power and torque with the Herringbone Gear

    Alireza Mortazavi
    30 May 2014 | 4:50 am
    Herringbone Gears have the advantage of transferring power smoothly because more than two teeth will be in mesh at any moment in time. Their advantage over the helical gears is that the side-thrust of one half is balanced by that of the other half. This means that herringbone gears can be used in torque gearboxes without requiring a substantial thrust bearing. Because of this herringbone gears were an important step in the introduction of the steam turbine to marine propulsion. The logo of the car maker Citroen is a graphic representation of a herringbone gear, reflecting André…
  • LED Glowing power cord turns green when phone is fully charged

    Alireza Mortazavi
    30 May 2014 | 4:36 am
    Incoming search terms:concept illuminated power cordconcept illuminated power chordconcept illuminated power cord turns green when fully chargedConcept illuminated power cord turns green when phone is fullConcept illuminated power cord turns green when phone is fully chargedglowing power cordled power cordpowercord turns green when charged
  • add this feed to my.Alltop


  • 20 Best Laptops for Students (2014)

    The IT Bros Team
    18 Aug 2014 | 5:41 pm
    With school season just around the corner, we decided to do a post on a good set of laptops for students. We’ve broken them down into various needs. Below you’ll find a solid list of current laptops with some brief information to make your decision easier. This list is current as of August, 2014 so depending on when you are reading this be aware that the prices and / or specs may have changed on some of them. We will try to keep this list updated every so often. When seeking to buy the ideal computer for a student, most seek to strike a perfect balance between staying within…
  • How to Turn Off Candy Crush Notifications

    The IT Bros Team
    4 Aug 2014 | 2:35 pm
    Here are two ways you can turn off candy crush notifications. The first way will block notifications but still allow you to play Candy Crush. The second will completely block notifications and prevent the app from being able to access your information in which case you will no longer be able to play the game without first unblocking it. Turn Off Candy Crush Notifications (and still be able to play) When you get a Candy crush notification hover over the little x in the top right with your mouse and click to turn off any future notifications. You should no longer be receiving any Candy Crush…
  • New Ownership and Looking for Writers

    The IT Bros Team
    7 Jul 2014 | 12:07 pm
    Hello fellow readers! is under new ownership. As you can see the website hasn’t been updated with fresh content in a while and we are looking to change that. We hope to make this your favorite place for tech related content. Whether you need a tutorial or the latest tech news we want you to be able to find it here. It will take some time to get the wheels turning so please be patient with us We are also looking for writers. If you would like to write for us please send an email to and briefly describe what your area of expertise is and…
  • Developing Games using Kii Game Cloud

    Brian Jackson
    17 Feb 2014 | 5:00 am
    Mobile gaming is one of the fast growing markets. According to industry analysts, mobile and online game sectors could grow at a compound annual growth rate of 23% to $60 billion by 2017. This means that game developers have a huge opportunity. However, only a small percent of total games actually become successful. Based on our experience working with many game developers, we have found that practically all successful games have some common elements: they start with a great idea, have an awesome user experience, and, they have a scalable backend to support any spikes in growth and ongoing…
  • Active Directory auditing: No simple road to success

    Steve S
    29 Nov 2013 | 4:48 am
    Auditing Active Directory almost always finds place at the top of the administrator’s to-do list. There are a number of pressing needs that make auditing indispensable. For instance, a single unwanted change such as user deletion or access right modification may have monumental effect on the health of the network and may lead to long downtime and system unavailability ultimately resulting in business loss. If not for the security issues and vulnerability to rogue users with malicious intent, government regulations and compliance standards definitely call for an elaborate and well defined…
  • add this feed to my.Alltop

    About G2 Crowd

  • Business Software Review Highlights: August 29, 2014

    Daniel Honigman
    29 Aug 2014 | 10:18 am
    Once again, we received a plethora of great software reviews on G2 Crowd this week. Here are some of the best. To be considered for an upcoming highlights post, write a review + fill out your software review completely, with helpful product observations and feedback. For more frequent updates from G2 Crowd, you can follow us on our LinkedIn company page, or from Twitter and Google Plus. Read the reviews after the jump. •    “X-Cart is a very stable and easily customizable eCommerce platform,” writes Melissa Porter, e-commerce manager at FFA, in her X-Cart review.
  • HubSpot files $100 million IPO, cites G2 Crowd rankings as validation

    Tim Handorf
    28 Aug 2014 | 2:27 pm
    Earlier this week, HubSpot, Inc., a rival to Pardot, Marketo, Eloqua and others, filed an initial public offering (IPO) for $100 million. (You can read the full S-1 filing here.) In the document, HubSpot claims it had 2013 revenue of $77.6 million on 50% year-to-year revenue growth, and works with more than 11,500 customers. Our data supports this positive growth; our recent GridSM report of the best marketing automation platforms not only named HubSpot a Leader, but ranked them #1 in customer satisfaction, based on more than 800 user reviews. Furthermore, in the S-1 document,…
  • Stuart Foster: G2 Crowd Member Q&A #1

    Daniel Honigman
    28 Aug 2014 | 11:19 am
    One of our more recent ideas is to feature our site users through Q&As, highlighting the business software they use each day. Our first review is of Stuart Foster (pictured), a freelance brand strategist based in Chicago, Ill. Read the Q&A after the jump. Name: Stuart Foster Website: Hometown: Chicago, Ill. Occupation: Freelance brand planner Twitter handle: @Stuartfoster LinkedIn profile ID: What Stuart likes most about G2 Crowd: G2 Crowd provides me quick, down and dirty research on a variety of different tools that I would consider…
  • G2 Crowd President Tim Handorf to appear on Social Media Week Chicago panel

    Daniel Honigman
    25 Aug 2014 | 8:45 am
      Social Media Week is coming back to Chicago, and G2 Crowd is part of it! G2 Crowd Co-Founder and President Tim Handorf will be speaking on a panel, titled “How Social Media Have Disrupted B2B Buying (And What To Do About It).” The panel will delve into how social media is affecting the B2B buying process, examples of how it’s playing out online and what successful companies are doing to adapt. Appearing with Tim on the panel are: •    Mike Pilarz, VP and Account Director, Zocalo Group •    Edward Vesely, EVP and CMO, SilkRoad •    Ed Brill, VP Social…
  • Business Software Review Highlights: August 22, 2014

    Daniel Honigman
    22 Aug 2014 | 12:47 pm
    There were a lot of great business software reviews posted on G2 Crowd this week. Here are some of the best that we saw. To be considered for an upcoming business software review highlights post, be sure to fill out your software review completely, with helpful product observations and feedback. For more frequent updates from G2 Crowd, you can follow us on our LinkedIn company page, or from Twitter and Google Plus. Read the reviews after the jump. ____________________ •    “Time is money in sales,” writes Jason Olsen, a director of strategic accounts at Integrate, in one…
  • add this feed to my.Alltop

    Accellion blogs

  • Only You Can Prevent Data Leaks

    Nina Seth
    29 Aug 2014 | 10:08 am
    Blog Image:  A staggering 822 million records were exposed by data breaches in 2013, according to research firm Risk Based Security. Data breaches compel organizations to look at their network infrastructure and security processes, and shore up areas where inadvertent data leaks are taking place.The use of free online file sharing and syncing solutions is an overlooked area that leaves organizations vulnerable to unintentional data leaks. While most employees would not consider using a non-corporate sponsored email system, those same employees often readily collaborate through a free…
  • Bringing More Transparency to our Industry

    Yorgen Edholm
    26 Aug 2014 | 8:50 am
    Blog Image:  As anyone who follows the EFSS market can tell you, it's an insanely crowded and competitive space to operate within. In order to stay ahead, you need to make sure potential customers understand exactly what benefits they're getting from your solution.More and more often IT departments need to go past the "operationally desirable" statements from vendors, and quantitatively prove the ROI of potential investments their team is making in hardware or software. After hearing this from our customers, we wanted to step up and provide the type of transparency they're…
  • Gartner Predicts Rise of the Digital Risk Officer

    Michael Piramoon
    22 Aug 2014 | 11:12 am
    Blog Image:  The number of devices connected to enterprise networks is skyrocketing. One reason is mobile computing. Mobile workers in the US now carry on average 3 mobile devices, according to a recent survey by Sophos. Fifteen years ago, each of those workers would have connected to the network through a single desktop computer. The number of devices storing business data and connected to the network per employee has tripled (or quadrupled for those employees who still have desktop computers in addition to their mobile devices). And unlike the devices of a decade or more ago, many of…
  • The Lesson from Shadow IT? Workers Want Easy-to-Use Services for Getting Work Done

    Hormazd Romer
    19 Aug 2014 | 10:22 am
    Blog Image:  The phrase “Shadow IT” refers to products and services used by employees without the knowledge or approval of the IT department.Shadow IT is everywhere: it can be found in just about any department of any organization. When Frost & Sullivan surveyed line of business (LOB) and IT managers, they found that 80% of respondents admitted using non-approved SaaS applications for their work. Moreover, the survey found:Non-approved applications represent a sizable proportion of all SaaS apps used in a company. According to respondents, the average company utilizes around 20…
  • In-house Counsel Should Take BYOD Risks Seriously

    Nina Seth
    14 Aug 2014 | 8:50 am
    Blog Image:  In many organizations, decisions about mobile technology are made primarily or exclusively by the IT and IT security departments working together.All too often, there’s one department that’s left out of these discussions:the organization’s own legal team, and In-house Counsel. This omission is unfortunate. Legal counsel is familiar with laws, including the latest rulings about electronic discovery and data privacy, and others issues pertaining to liability and risks. Enterprises would be wise to consult in-house counsel when establishing employee policies about data…
  • add this feed to my.Alltop

    Marketplace News

  • Back to School for Marketplaces and Simple Connectivity, Part Two

    Mary Stanhope
    2 Sep 2014 | 10:00 am
    Last week, we offered a little refresher course—in honor of the beginning of the school year—on the marketplace model.  Simply put, a marketplace disrupts “business as usual” offloading transactional processes done by people to simplify the connection of buyers and sellers and delivering services.  This week’s part two segment covers the ABCs of Global Capacity’s One Marketplace and how this award winning marketplace of networks addresses the inherent challenge of simplifying the buying of network connectivity services.  Connectivity buyers and sellers alike are…
  • Going Back to School for Marketplaces and Simple Connectivity

    Mary Stanhope
    26 Aug 2014 | 5:15 am
    It’s hard to believe, but summer is winding down, and the school year is starting up. It is a time for teachers to review; go over concepts from the previous year to re-establish a foundation for building new knowledge and experience. The perfect time of year to cover the ABCs of Global Capacity’s One Marketplace and how this award winning marketplace of networks addresses the inherent challenge of simplifying the buying of connectivity services.  To truly understand how Global Capacity delivers on the promise of simple connectivity, you must first understand the marketplace model.
  • 3 Benefits MSPs Reap from a Connectivity Pricing Application

    Ben Edmond
    19 Aug 2014 | 6:15 am
    In today’s fast-paced business world, Managed Service Providers (MSPs) cannot afford to leave valued customers disconnected. Though many service providers may be hesitant to expand their service offerings  outside of  their existing service area due to concerns of lower margins and longer time to turn up services, network marketplaces like Global Capacity’s One Marketplace ensure that MSPs—and by extensions their customers—will have access to competitive accurate market rates. A network marketplace enabled with a cloud based connectivity pricing application streamlines the…
  • Connectivity is a Game Changer for IaaS Providers

    Mary Stanhope
    12 Aug 2014 | 6:30 am
    In a recent article, by Mike Kavis, on the topic of Rackspace’s Exit from the IaaS Market, it became clear that the race for public cloud workloads is quickly settling into a three horse race between tech giants Amazon, Microsoft and Google. And let’s not forget the likes of IBM who with it’s Softlayer acquisition would now show up on the chart.  Companies like Amazon and Google create a huge ecosystem where independent service providers can step in and provide a suite of services within a large marketplace. It was hard enough for the other IaaS providers to compete with Amazon…
  • Study Shows Network Connectivity Still Chief Among Data Center Concerns

    Mary Stanhope
    5 Aug 2014 | 6:00 am
    Driven by cloud computing, increased amounts of critical business data and other bandwidth requirements that must somehow be accommodated, data centers continue to list connectivity at the top of their list of business concerns. In fact, a new study conducted by Forrester for Digital Realty revealed that 82 percent of companies consider carrier availability and density their most urgent data center issues.   Coming in a close second, with 80 percent of respondents calling it a “primary cause of concern,” was availability of the data center itself. Rounding out the paramount concerns…
  • add this feed to my.Alltop


  • On building teams: experience or talent?

    2 Sep 2014 | 3:00 am
    Obviously when you hire, you want to find a good mix of experience and talent. But a perfectly balanced straddle between the two is impossible. So when forced to choose between them, which do you choose: experience or talent? The case for experience The primary case for experience is risk mitigation. If you want to make sure that someone is capable of performing a task, the only real way to know is if she can demonstrate that she has completed the task before. In cases like this, you are looking for the person to achieve the same basic objective that she has demonstrated in the past. This…
  • Plexxi Pulse – This Week at VMworld

    Mat Mathews
    29 Aug 2014 | 10:56 am
    Another fun and informative week at VMworld has come to an end. By all reports, the conference was a huge success. If you’ve been keeping up with us on Twitter, you’ll know that we were busy staffing our “conversations” booth and we handed out enough #SocksofPlexxi to outfit an army. We also got a lot of work done, demoing our new big data fabric and datacenter transport fabric. Below is a Storify thread recapping the week– enjoy! This week we have two videos of the week, brought to you by our very own Dan Backman right from the VMworld conference floor. In the first video, Dan…
  • [Plexxi Rewind] ECMP: It’s not all equal, or even normal

    Marten Terpstra
    28 Aug 2014 | 3:00 am
    For folks accustomed to the original blogs we post daily, our industry is in the throes of VMworld bliss, so we will be running the Best of Plexxi this week. Of course, if you haven’t read this one yet, it’s new for you! Stop by Booth 747 if you are in San Francisco this week, and say hello! Over the past few years, Equal Cost Multi Path (ECMP) has seen a very significant increase in popularity. More importantly, the movement to spine and leaf based designs in the data center relies heavily on ECMP functionality for increased bandwidth. @mbushong earlier discussed the problem…
  • [Plexxi Rewind] The future of networking: Freaky deeky math

    27 Aug 2014 | 3:00 am
    For folks accustomed to the original blogs we post daily, our industry is in the throes of VMworld bliss, so we will be running the Best of Plexxi this week. Of course, if you haven’t read this one yet, it’s new for you! Stop by Booth 747 if you are in San Francisco this week, and say hello! The SDN dialogue remains fairly focused on automation. This is actually a good thing; the manual nature of networking combined with an increasingly complex solution space means that networking is in dire need of some help on the automation front. There has been a meteoric rise in the number of…
  • [Plexxi Rewind] Don’t be the “We already” guy

    26 Aug 2014 | 3:23 am
    For folks accustomed to the original blogs we post daily, our industry is in the throes of VMworld bliss, so we will be running the Best of Plexxi this week. Of course, if you haven’t read this one yet, it’s new for you! Stop by Booth 747 if you are in San Francisco this week, and say hello! I have argued in several posts that switching has been a well-served market, and that well-served markets will move more for price and convenience than performance and features. This explains why there is so much emphasis on automation and reducing OpEx these days. One of the more subtle…
  • add this feed to my.Alltop

    GlobalDots - CDN, Security and Performance Solutions

  • New Private Cloud in Germany, DropBox Slashes its Prices and more news

    Goran Čandrlić
    1 Sep 2014 | 4:50 am
    LeaseWeb Introduces CloudStack Private Cloud in Germany LeaseWeb, the provider of web hosting services and CDN solutions announced the expansion of it’s LeaseWeb Private Cloud offering that is powered by Apache CloudStack. The new extension  is built for tech-savvy cloud users including system integrators, MSPS, VARs, Internet media and application developers, allowing them to flexibly create and manage multiple instances . The solutions enables users  to assign dedicated cloud resources, and thus giving them the liberty to customize their virtual infrastructure according to their…
  • US Video Entertainment Spend to Peak at $123 billion, Wearable Industry Infographic and more news

    Goran Čandrlić
    26 Aug 2014 | 1:06 am
    US video entertainment Spend to peak at $123 billion next year The US video entertainment market continues to grown and is estimated to peak $123 billion in 2015. The overall US video entertainment market (subscription Pay-TV, box office, packaged home video, Pay-TV VoD and paid-for online video) continues to grow in low single digits, reaching $120 billion in 2013 – a 2% increase on 2012 – and is on track to peak at $123 billion in 2015, meaning that approximately $1000 will be spent on video entertainment by every US household. Pay-TV holds around 75% of total consumer spend.
  • Why Pairing Your CDN with Managed DNS is a Good Idea

    Goran Čandrlić
    15 Aug 2014 | 5:58 am
    The benefits of pairing DNS with CDN If you’re not familiar with that last classic pairing, you should be. Pairing a managed DNS solution with your CDN provides your website with extra performance, reliability, and flexibility. Image source: DynDNS The Domain Name System (DNS) is a hierarchical distributed naming system for computers, services, or any resource connected to the Internet or a private network. It associates various information with domain names assigned to each of the participating entities. It basically serves as the phone book for the Internet by translating human-friendly…
  • Website Speed as the Most Valuable Consumer Experience, HTTPS as a Ranking Factor, WordPress Security Fix and more news

    Goran Čandrlić
    11 Aug 2014 | 1:59 am
    The website experience that consumers value most 52% of the US consumers say high performance is the quality they value most in website experience, according to Limelight Networks’ recent report. Website performance is the most important digital eperience, meaning that no buffering streams and fast loads go ahead of fresh and updated content. These are some of the report’s key findings: 59% of respondents say they will wait no more than five seconds for a webpage to load before becoming frustrated and leaving the site. 37% say they will leave and buy a product from a competitor if…
  • Ecommerce Sites Getting Slower, Apple Unveils it’s CDN and more news

    Goran Čandrlić
    4 Aug 2014 | 3:31 am
    Why are the world’s top e-commerce sites getting slower instead of faster? WebPerformanceToday tested the load times of the most popular e-commerce sites, finding that the median page takes 49% longer to load than it took a year ago, with only 14% of retailers delivering an optimal user experience. Most sites are not even taking full advantage of performance optimization techniques. The biggest issue of the report is the fact that user expectations aren’t being met. The top 100 e-commerce sites’ home page takes 10.7 seconds to fully load. The fastest sites were…
  • add this feed to my.Alltop

    Insights in IT Security

  • The Four Rules Everyone Who Offers IT Security Need to Follow

    1 Sep 2014 | 7:00 am
    Four rules to ring them all. If you or your business is involved in IT, or IT security, then you know just how hectic and busy work can be. There are always new viruses and bugs, patches to install, and general break-fix work to do. After a certain point, unless you’re highly motivated, it becomes painfully easy to become apathetic to the entire process…
  • Throwback Thursday: “What is Multi-Factor Authentication” Aug 27 2013

    28 Aug 2014 | 7:30 am
     Above: Pop-Culture Circa 2013 It’s been almost a year now since I first explained Multi-Factor Authentication (MFA). This past year has seen some major changes in the world, and in honor of this past year I present to you a refined answer to that big question; what is multi-factor authentication?
  • CJIS Compliance Made Easy: Non-Compliance and Willful Negligence

    25 Aug 2014 | 7:30 am
    “Improper access, use or dissemination of … (CJIS) information is serious and may result in administrative sanctions including, but not limited to, termination of services, and state and federal criminal penalties. “ -CJIS Security Policy
  • How to Give Your IT Staff a Day Off Work

    21 Aug 2014 | 7:30 am
    It’s Senior Citizens’ Day, and I’m sure your IT staff would love to spend some time with their older family members. You could let them go spend time with their loved ones and family members...
  • [New eBook Release] CJIS Made Easy: A CJIS Checklist for AuthAnvil

    18 Aug 2014 | 7:30 am
    If you haven't seen it yet, we've written a new whitepaper called “CJIS Made Easy: A CJIS Checklist for AuthAnvil.” This whitepaper is all about policy areas in CJIS that AuthAnvil can help to address.
  • add this feed to my.Alltop

    PagerDuty Blog

  • BabyDuty: Being On-call is Similar to Being a Parent

    Vivian Au
    28 Aug 2014 | 9:43 am
    What did the parent say to the on-call engineer at 3am? “At least yours doesn’t smell.” Believe it or not, lack of sleep isn’t the only similarity between managing critical infrastructure and the wonderful adventure of new parenthood. One of our own, Dave Cliffe, recently delivered a talk at Velocity Santa Clara on this very topic, after experiencing the many joys and stresses of both on-call duty and parenting. Here are a few expert tips that he wanted to pass on. Redundancy Matters No, having twins or triplets doesn’t mean “redundancy” (they’re not replaceable)! Instead,…
  • DIY Arduino YUN Integration for PagerDuty Alerts

    Tony Albanese
    26 Aug 2014 | 9:18 am
    Using a little code inspiration from the Gmail Lamp, Daniel Gentleman of Thoughtfix (@Thoughtfix) built an awesome PagerDuty Arduino integration by combining an Arduino YUN, a 3D printed sphere and Adafruit’s Neopixel Ring to create visual status check of his PagerDuty dashboard. Check it out in the video of his device (and his cat) in action below: Using PagerDuty’s API, the device checks in with PagerDuty every 15 seconds to update it’s status. The device is configured to see both both acknowledged and triggered alerts. When it discovers acknowledged or triggered alerts, the globe…
  • A Disunity of Data: The Case For Alerting on What You See

    Vivian Au
    21 Aug 2014 | 8:59 am
    Guest blog post by Dave Josephsen, developer evangelist at Librato. Librato provides a complete solution for monitoring and understanding the metrics that impact your business at all levels of the stack. The assumption underlying all monitoring systems is the existence of an entity that we cannot fully control. A thing we have created, like an airplane, or even a thing that simply exists by means of miraculous biology, like the human body. A thing that would be perfect, but for its interaction with the dirty, analog reality of meatspace; the playground of entropy, and chaos where the best…
  • The 4 Operational Metrics You Should Be Tracking

    David Shackelford
    20 Aug 2014 | 9:21 am
    Living in a data-rich world is a blessing and a curse. Flexible monitoring systems, open APIs, and easy data visualization resources make it simple to graph anything you want, but too much data quickly becomes noisy and un-actionable. We’ve blogged, spoken, and thought hard about what you should monitor and why from a systems perspective, but what about monitoring data on your operations performance? We worked with with a large number of PagerDuty customers as we built out our new Advanced Reporting feature, including some of the most sophisticated operations teams out there. We’d like…
  • Finding a Scalable Way to Stop Attackers

    Tony Albanese
    15 Aug 2014 | 9:29 am
    Evan Gilman, operations engineer at PagerDuty, recently spoke at a meetup at PagerDuty HQ.  The first thing Evan noted, “Security is hard.” Whether you’re a small shop with a constantly evolving codebase or a huge enterprise with many thousands of employees, attackers will keep coming so you need to find a scalable way to stop them. Secure by default Evan emphasized the importance of being “secure by default” in relation to file permissions and security privileges. If you put security checks in place, make it a pain in the ass for others to work around it. What good are…
  • add this feed to my.Alltop

    Information Security Buzz

  • Data Breaches: Why the Costs Matter

    David Bisson
    2 Sep 2014 | 6:05 pm
    Our world is the world of the data breach. Every week, it seems that the news of an attack floods the media. Despite the frequency of these incidents, however, some companies refrain from creating a strong security program because they feel they are successfully protecting their information. This leaves many organizations with no remediation plan in the event of a breach. FREE Download: Five Costly Data Breaches And How YOU Can Prevent Being Next In today’s world it is important to be aware of the risks associated with a breach. Towards this end, the costs of a data breach are discussed in…
  • Mobile apps – Business Enabler or Security Disaster?

    David Bisson
    2 Sep 2014 | 6:04 pm
    The explosion in business apps in tandem with global BYOD strategies (‘Bring Your Own Device’) is transforming the way organisations can exploit and share information. This mobile revolution is not just about improving individual working practices with apps that provide financial dashboards, pull up travel itineraries, or work through thousands of e-mail attachments to find the right information. With the right apps, organisations can fundamentally transform key business functions – such as asset management.  Traditionally the annual asset audit was undertaken – often reluctantly …
  • Education, Encouragement, and Explanation: The Three “E’s” of Building a Positive Security Culture

    David Bisson
    2 Sep 2014 | 6:03 pm
    In your opinion, what are 3 key elements to succeed in a positive security culture and what tips can you provide to implement change, successfully? Security of any kind is often viewed with trepidation. There’s the fear of failing to comply – the consequences can be harsh – as well as a feeling of helplessness brought about by not knowing all the rules, especially where technology is concerned. Encouraging a positive security culture is really kind of hard given the circumstances under which those responsible are operating. One of the ways to move toward the “yay,…
  • iCloud Hack – Expert Comments

    David Bisson
    2 Sep 2014 | 6:02 pm
    Recently, hackers used Apple’s iCloud service to illegally access nude pictures of Jennifer Lawrence, Kate Upton, and other celebrities. They then posted the photos on 4chan, an anonymous image-sharing website. Apple and the FBI are currently investigating this incident. In the meantime, here to comment are a number of experts in the information security field. Prominent companies in the industry, including Kaspersky Lab, Netskope, and Proven Legal Technologies, are represented. Eduard Meelhuysen, VP EMEA, Netskope: “iCloud is an incredibly important cloud storage app due to…
  • Malware Still Generated at a Rate of 160,000 New Samples a Day in Q2 2014, Reports PandaLabs

    David Bisson
    1 Sep 2014 | 5:05 pm
    Panda Security, the cloud security company, has announced the latest findings of the PandaLabs quarterly report for Q2 2014. The main conclusions of the study include the fact that malware is still being created at the record levels reached in the previous quarter: 15 million new samples were generated at an average rate of 160,000 every day. FREE Ebook: Five Costly Data Breaches And How YOU Can Prevent Being Next While Trojans are still the most common type of malware, accounting for 58.20% of new malware, this figure is significantly lower than the previous quarter (71.85%). This is not so…
  • add this feed to my.Alltop


  • Much Ado About To-do

    The CommitCRM Team
    28 Aug 2014 | 6:24 am
    When you need to get things done, you can’t go wrong with a good old trusty to-do list which helps you organize what needs to be done and by showing what has been done so far, also helps keep you motivated. To-do lists can take many forms but fundamentally are pretty much the same, whether they be written on paper or on a computer, however when they integrate with other systems or functions they can become even more useful. So without further ado we present to you the all new To-do Lists feature in version 8 of CommitCRM! What do you do when you add a new Account to your CommitCRM database?
  • New CommitCRM v8 Released!

    The CommitCRM Team
    22 Aug 2014 | 5:44 am
    Hi Commiters, We are very excited to announce the release of the new version of our Professional Services Automation software. The all new CommitCRM 8 is ready and available for you to download right now! There are many big new features in this release which we believe you will find very useful in automating your business and improving efficiency. Of course as usual we are building these features based on your always valuable feedback which we certainly appreciate. Click Here for the full list of what’s new in 8 as well as upgrade instructions. We’ll also soon be publishing a series of…
  • You Can’t Stop the Signal – the Tickets and Techs Must Keep Moving!

    The CommitCRM Team
    6 Aug 2014 | 7:29 am
    When Tickets are arriving for all manner of issues, from multiple customers and you need to assign them to various technicians at differing times throughout the day or week, you need a way to manage all this efficiently and effectively. This is where the Dispatcher comes in to its own. With a simple drag & drop, a new Ticket can be sent to the Dispatcher or if that is a click too many for your liking you can choose to have all new Tickets appear in the Dispatcher by default. In CommitCRM the Dispatcher is where new appointments are scheduled after a Ticket is created, or in other words…
  • Sysadmin Day “Best of the Worst” Contest Winner

    The CommitCRM Team
    28 Jul 2014 | 6:18 am
    As you may already know if you have been following this blog, we recently announced a contest for Sysadmin Day which was on July 25th this year. We had a load of entries for the contest which were great fun to read, not to mention educational! However there can be only one winner this time and so after much deliberation we have chosen this epic story of sysadmin woe by “kaltag“… — Sorry for the novel. This tale starts last Tuesday. I got a call to go set up 2 new workstations and migrate their data from the systems to the new. I arrive onsite and discover the systems…
  • Sysadmin Day “Best of the Worst” Contest

    The CommitCRM Team
    24 Jul 2014 | 2:27 am
    In honour of the 15th annual System Administrator Appreciation Day on July 25th we at CommitCRM are having a little contest! No doubt just about everyone in the IT industry has had a bad day at some point, when everything seems to go wrong at the worst possible time in the worst possible way. Whether you are an MSP technician or a datacenter sysadmin, no matter what the platform, be it Linux or Windows or Mac or Unix or something else, you’ve been there and you’ve faced down that disaster and ultimately saved the day (hopefully). You may have come out with a few more wrinkles, a beard…
  • add this feed to my.Alltop

  • My Information Technology Career Story – Part 1

    24 Aug 2014 | 2:36 pm
    I recently was asked an interesting question via the Contact Me page. What is it that you do for a living and how did you get your start? This is not the first time this question has been asked, but it is the first time it has been communicated from a viewer on this site.... The post My Information Technology Career Story – Part 1 appeared first on .
  • Xentop and Long Server Names

    15 Jul 2014 | 1:01 am
    Oh Xenserver, how I love you.  Seriously, check out this list to see how awesome Xenserver  is: Amazing hypervisor with great hardware support Built on a solid Linux core Provides a tool like Xentop which cuts off long server names! Ok, maybe number three isn’t so great, but I aim to fix that. Xentop and... The post Xentop and Long Server Names appeared first on .
  • 2 Simple Ways to Keep a Happy IT Staff

    19 May 2014 | 8:29 am
    I have worked for a few companies over the years and have found that the importance of the IT department is often overlooked. While they may not be a revenue generating team for your company, it is important to remember that most companies simply can’t survive without them. Interested in keeping a happy IT staff?... The post 2 Simple Ways to Keep a Happy IT Staff appeared first on .
  • What is an explicit redirect in Grails?

    8 Apr 2014 | 6:46 pm
    Why am I writing about an Explicit Redirect? While working with composite and assigned keys in Grails, I kept running into the following error: “Cannot redirect for object [OcTesting.OcPreferences : (unsaved)] it is not a domain or has no identifier. Use an explicit redirect instead “ Notice the part about the explicit redirect? The default... The post What is an explicit redirect in Grails? appeared first on .
  • Grails Legacy Database Tips and Tricks

    3 Apr 2014 | 6:10 pm
    Grails Legacy Database Tips and Tricks Sometimes a legacy database is a necessary evil and requires extra configuration in Grails to get around previous schema choices. Luckily, Grails provides configuration options to make life in the past a little easier. As I learn more about working with Grails and legacy databases, I will update this... The post Grails Legacy Database Tips and Tricks appeared first on .
  • add this feed to my.Alltop

    Certification Magazine

  • Oracle’s SQL Expert exam slated for facelift Sept. 15

    Matthew Morris
    2 Sep 2014 | 5:50 pm
    Of the more than 200 certifications offered by Oracle, their SQL Expert credential ranks in the Top 10 most popular according to a blog post by Oracle University. This is no surprise to me — knowledge of SQL is an extremely valuable skill and the SQL Expert designation is useful to both DBAs and developers. That said, as I noted in an earlier CertMag article, The Case for an Updated Oracle SQL Expert Exam, this test was developed when 10g was Oracle’s flagship database. There have been a number of changes in subsequent releases and 1Z0-047 is starting to show its age. In the article, I…
  • Study finds networking, information security on leading edge of IT

    CertMag Staff
    29 Aug 2014 | 1:59 pm
    There is a fair-to-decent chance that most of us don’t still have the same job title that we did in 1999, whether that title was sales manager or burger flipper. Especially in the realm of IT — where advances in technology open up new areas of specialization with a regularity approaching that more typically attributed to the rising and setting of the sun — there’s always something new and different just around the corner. Even taking that into account, however, you may be surprised to learn what some of us didn’t do, at least not in name, just 15 years ago.A recent…
  • Microsoft Certified Professionals have mixed view of certification

    CertMag Staff
    28 Aug 2014 | 5:54 pm
    Here’s a non-IT tidbit that you probably didn’t know: The Carnation food brand originally famed for its evaporated milk from “contented cows,” was founded in 1899 in Washington state, in the same general vicinity where Microsoft now has its world headquarters. In a related vein, the most recent annual survey of Microsoft Certified Professionals revealed that many folks with Microsoft credentials are generally satisfied with their Microsoft certifications, but found some nits to pick regarding the program that produces them. You might say that those chosen (at…
  • Latest Salary Survey PLUS captures info about Cisco certifications

    CertMag Staff
    27 Aug 2014 | 5:10 pm
    Probably the foremost IT networking firm in the world, Cisco Systems, Inc., has been a leader in the IT landscape for decades. In addition to being a leading developer of networking products and technology, Cisco is also one of the premier entities in the realm of IT education and training — Cisco certifications are a bedrock layer in many high school and college IT programs.  And through its Cisco Learning Network and Cisco Networking Academy brands, the company provides training and education to IT professionals around the world.For these and other reasons, Cisco was a natural fit…
  • Pearson brings digital badging to Adobe certification

    CertMag Staff
    26 Aug 2014 | 5:06 pm
    Certification verification has been a hot topic in the industry for a while now, and digital badging has gained a lot of traction as a potential solution to the ongoing problem of sorting our who really is a CCNA, or CISSP, or MCSA, etc. Employers want a simple means of verifying that job candidates actually hold the certifications listed on their resumes. Job seekers want the convenience of adding a badge to their employment profile on a site like LinkedIn, to provide simple, one-click verification of their certification bonafides to potential employers. A few months back, CertMag…
  • add this feed to my.Alltop

    ALL4OS - News, tips, reviews, and more.

  • Initial Server Setup with CentOS 5.x, 6.x, or 7.x

    30 Aug 2014 | 8:22 pm
    This is a quick tutorial for building a CentOS based VPS/Dedicated server. CentOS server doesn't include GUI in default so the only way to access server is using Secure Shell (SSH). The following steps will be completed by using SSH. Step One: Login to your server as root. Have your server's IP address and root […]
  • WordPress Mobile Site SEO: Vary HTTP header

    18 Aug 2014 | 9:42 pm
    Google's recommendation for Smartphone-optimized Websites recommends use Vary HTTP header when using mobile site dynamically serving different HTML on the same URL. Google recommend that the server send a hint to request that Googlebot for smartphones should crawl the page, too, and thus discover the mobile content. This hint is implemented using the Vary HTTP […]
  • 4 Must-Have iPhone apps for college students

    17 Aug 2014 | 10:55 am
    When you correcting all your Back to School needs, don't forget your iPhone needs to be prepared to help set you up for a success and be more productive than ever. Here are some apps which make for a great companion for studying. 1. Your Personal Scheduling Assistant: iStudiez iStudiez is on the list of: […]
  • Easy fix for Java error: Oracle JInitiator version too low

    10 Aug 2014 | 4:31 pm
    After logging into application in any browser (Chrome, Firefox, or Internet Explorer), Windows produces an error indicating that the JInitiator version is too low, system pop up below error message: FRM-92095: Oracle JInitiator version too low. Please install version or higher Why: The cause is the JRE version is not incompatible. Oracle made an […]
  • Use Google Drive as Your Personal Free Website's Uptime Monitor

    31 Jul 2014 | 10:02 pm
    Most webmasters use "free" website monitoring services to track the downtime and uptime of their sites. These free service normally offer one domain monitoring service and often required to upgrade to the premium version for unlimited domain monitoring. Some feature like email or SMS alerts require premium version. Now, via Google Drive Spreadsheet, you can […]
  • add this feed to my.Alltop

    Secure Data Recovery Blog

  • Data Recovery: How to approach three common HDD failure scenarios

    Frank Lambright
    21 Aug 2014 | 12:00 pm
    Hard drive failure happens to the best of us. How we prepare for and react to this failure will define how quickly we can recovery from disaster. One way to prepare for the worst is to understand the types of hardware hard drive failure and your options for each. To help, we discuss three of the most common hard drive hardware failure scenarios. Read the Entire Article...The post Data Recovery: How to approach three common HDD failure scenarios appeared first on Secure Data Recovery Blog.
  • Data Recovery: Common factors and approaches

    Frank Lambright
    14 Aug 2014 | 12:27 pm
    Some of our worst days begin with the loss of data, especially when it is caused by a failed hard drive. What can you do when the inevitable happens at the most inopportune time? Here are a few factors that result in hard drive data loss and a software-based option for self-recovery.Read the Entire Article...The post Data Recovery: Common factors and approaches appeared first on Secure Data Recovery Blog.
  • Step up your password security

    Frank Lambright
    7 Aug 2014 | 12:09 pm
    Password security is once again in the news as the reported theft of nearly 1.2 billion passwords makes the rounds. While sometime the theft of a password is beyond a user’s control, there is no reason for not taking every step possible to secure your accounts with excellent passwords. Here are some tips for increasing the strength of your passwords and account security. Read the Entire Article...The post Step up your password security appeared first on Secure Data Recovery Blog.
  • Digital Storage: A History

    Frank Lambright
    31 Jul 2014 | 12:35 pm
    The history of computer storage systems is a long and winding road of emerging technologies and expanding capacities. From the first paper punched cards to the ephemeral cloud solutions of today, we follow the ever-changing digital solutions for the growing needs of our personal computers.Read the Entire Article...The post Digital Storage: A History appeared first on Secure Data Recovery Blog.
  • Best Cloud Storage Services for Businesses

    Anna Bauman
    30 Jul 2014 | 6:43 am
    Cloud storage services have become the defacto resource for companies in need of low-cost and secure storage solutions. Unfortunately, the specter of unauthorized governmental access has forced many companies to reconsider. Here are four companies that I believe are a worthwhile and reliable option for secure cloud storage services. Read the Entire Article...The post Best Cloud Storage Services for Businesses appeared first on Secure Data Recovery Blog.
  • add this feed to my.Alltop


  • Small Business IT Budgeting for Smarties

    28 Aug 2014 | 12:53 pm
    Business owners deal with budgets. A lot. They’re nothing new. But planning and budgeting for your company’s IT needs and support? That can make even the best budgeters look for a crystal ball. There are emergencies and the unexpected to plan for in IT budgeting. How in the world are you supposed to foresee (much less budget for) computer, network and server crashes? What about the occasional virus that brings business and productivity to a screeching halt? Then there is the long range IT investments for which to plan. How do you afford to replace computers and equipment when existing…
  • What’s Hiding Behind The Cloud?

    Jason Keeler
    24 Jul 2014 | 10:38 am
    The hidden costs of cloud-based IT service for businesses Cloud here. Cloud there. Cloud everywhere. As a Kansas City IT company, we’re seeing (and facilitating) a lot of our clients moving technology services to the cloud. Cloud-based solutions allow them to access and use shared resources, software and information via their computers and other devices over a network. Nothing has to be stored locally. Risks are minimized. Since the cloud is a service (like phone and Internet connections), companies must choose a cloud-based technology service provider. We’re noticing that many of these…
  • Wired or Wireless: Making The Right Choice For Your Network

    Jason Keeler
    16 Jun 2014 | 11:16 am
    Wireless seems to be a no-brainer choice when it comes to choosing a network for your small business. Wireless access has become so common that many of us find ourselves a bit miffed when we’re “left stranded” without Wi-Fi. But when you’re a small business owner just starting out or thinking about re-configuring your network, the decision to choose wired or wireless networking is far from obvious. Wireless is often the default recommendation of business technology consultants because it’s perceived to be cost effective compared to wiring an entire facility and its workstations.
  • 10 Common Small Business IT Security Mistakes

    Jason Keeler
    16 Jun 2014 | 10:44 am
    When a major corporation like Target or Neiman Marcus experiences a security breach, suddenly everyone begins paying a little more attention to their network security. For a small business, that might mean changing passwords and updating antivirus software. Overall, though, many small businesses don’t give network security the attention it deserves, due to inexperience, a false sense of security or sheer lack of time. The costs of such lax security are astronomical. According to a recent study by the Ponemon Institute as reported in Consumer Reports, in 2013 more than half of all of the…
  • Are Your Business IT Systems Current?

    Jason Keeler
    5 Jun 2014 | 6:03 am
    In a perfect world, you could update your computer systems one or two times over the course of their lifespans and be done with it. But that’s not reality with business technology today. Many companies are struggling to keep up with advancing systems. Some were caught unprepared when Microsoft ended its support and updates for Windows XP in April 2014. Using outdated technology isn’t only counterproductive, its also dangerous. Technology evolves fast and it’s in your best interest to keep IT systems current in order to take advantage of the latest advances and security features — not…
  • add this feed to my.Alltop

    Hi-Tech ITO » Hi-Tech ITO Blog

  • What Features Make An ERP System The Best For Your Business?

    Chirag Shivalker
    12 Aug 2014 | 7:51 am
    Enterprise Application Development and implementation of an ERP system is the most important IT decision for an organization. It has a substantial impact on the success of your business in the present and in future. The right approach for companies who want to implement ERP systems is to look for a supplier who can assure consistency, reliability and visibility. The implementation can be end-to-end in one go or in a phased manner, depending upon the business requirements.Responsive ERP SolutionsOne of the most important things to look for in an ERP solution is responsiveness to the ever…
  • CRM for Manufacturers Drives Business and Improves Sales

    Chirag Shivalker
    22 Jul 2014 | 9:47 pm
    Customer relationship management (CRM) is a system that involves initiating and managing interaction between a business and its existing and prospective customers. This involves the use of technology, whichsupports organizing, automating, marketing, synchronizing sales and extending technical support.How have manufacturing companies evolved and why do they need CRM?Manufacturing companies understand that in today’s competitive landscapes, it is very important to be responsive to the customers changing needs. This is why they are evolving and transitioning from the conventional product…
  • Mobility Becomes Imperative For Businesses across the Globe

    Chirag Shivalker
    22 Jul 2014 | 6:42 am
    Business Mobility – An Inescapable PropositionMobility, for businesses is no longer an option; it has become an essentially, rather than a prerequisite for any business. This is because of the growing market of Smartphone users, who want to stay active while on the go.Mobile devices are getting smarter, and their penetration rate across developed markets is to reach 100% shortly. The number of users, who are connected via their mobiles, has exceeded the number of people on this planet. Going by the demographics, one can infer that somewhere down the line, businesses have lagged behind.
  • Tips to Increase App Ranking in App Store

    Rahul Vyas
    30 May 2014 | 9:27 pm
    Nowadays it is has become necessary for businesses to use app store for enhancing the visibility of their app through higher app ranking. However; with more than 1000 apps launched daily it is a difficult task to rank them, appropriately & accurately.Lot of smaller or independent developers showcase their disappointments, as they cannot withstand the completion with bigger organizations that have large advertising budgets or pay-per-install campaigns.Pay per install is not the only way that enhances the app store ranking; let’s have a look at some of the tips to increase app ranking in…
  • Top Web Development Trends

    Rahul Vyas
    13 May 2014 | 5:48 am
    Each and Every day we are seeing a new transformation happening in the field of web development. Web development trends have now become talk of the town owing to this more and more brands are improving their websites and thinking from the customer’s perspective.In the year 2013; we saw the web development news surrounding the rise of Responsive Web Design (RWD) to attend multiple screens accessing the same website.Now with the evolution of web development and coding for mobile users in addition to PC users there is a thin line between mobile and desktop experiences. Hence; in comparison to…
  • add this feed to my.Alltop


  • How Mimicking Brain Function is Revolutionising NLP

    Eileen McNulty
    2 Sep 2014 | 4:00 am
    Since Microsoft began working with deep learning neural networks in 2009, we’ve seen huge improvements in the way algorithms can detect our language and dialogue. IBM have continued to pour money and resources into the development of Watson; Apple have moved the development of Siri in-house, to improve its NLP capabilities; we’ll soon see a version of Skype which can translate the spoken word on the fly. But Francisco Webber, co-founder of, noticed a grey area in the realm of natural language processing. Most of it is heavily based in statistical analysis. “The…
  • The Four Questions You Need To Ask To Get the Most Out of Your Data

    Dennis Clark
    2 Sep 2014 | 3:25 am
    Facebook is apparently flagging articles for satirical content. Of course, it can’t work: sarcasm is about cultural context and shared assumptions and a computer capable of understanding it would be very close to the almost-human AIs of science fiction. But fielding requests for magic is an experience familiar to anybody working with data for less technical managers, and while Facebook’s current model doesn’t seem to be doing much more than identifying Onion articles (take for instance), we can certainly come up…
  • Shrinking Nearables: Estimote’s New Bluetooth Beacons Are a Thing of Beauty

    Eileen McNulty
    2 Sep 2014 | 1:36 am
    Indulging the consumer eagerness for “tinier tech”, sensor-based analytics provider Estimote has just rolled out a super-slim version of their flagship wireless Bluetooth beacon. ‘Nearables’ are a frugal three millimeter-thick, with slightly shorter battery life and newer components encased in a flexible body, with an adhesive back; all with the purpose to keep it out of sight. The nearables are small wireless devices that broadcast radio signals at regular bursts which can be received by smartphones and tablets in the vicinity. When custom Mobile apps receive the signal, they trigger…
  • NASA Finalises Proposals for Earth Data Challenge Ideas

    Furhaad Shah
    2 Sep 2014 | 1:33 am
    NASA has zeroed in on four innovative concepts proposed by students and faculties of various institutes, regarding the ‘Innovative uses of climate projections and Earth-observing satellite data’. A follow up challenge asks participants to create an application or algorithm that communicates climate change impacts to the general public using the OpenNEX data, with awards of $50,000. Principal scientist at NASA’s Ames Research Center in Moffett Field, California, Ramakrishna Nemani spoke optimistically, “The ideas generated by this OpenNEX challenge demonstrate the value…
  • Hortonworks Deploys Apache Kafka in Preview Mode to Simulate Real-Time Event Stream

    Eileen McNulty
    2 Sep 2014 | 1:19 am
    Late last week, Leading enterprise Hadoop providers Hortonworks announced the availability of Apache Kafka as a technical preview on their Hortonworks Data Platform product. Kafka orginiated as a real-time messaging system developed at LinkedIn, and was incubated as an Apache project in 2011. “Apache Kafka is a fast, scalable, durable, and fault-tolerant publish-subscribe messaging system. Kafka is often used in place of traditional message brokers like JMS and AMQP because of its higher throughput, replication, and fault tolerance,” wrote Hortonworks developer Sriharsha Chintalapani on…
Log in