October 07, 2014

Rebooting Deduplication in Your Next-Generation Data Center
There are a number of considerations to determine how deduplication should fit into an organization’s modern data center and workflows. However, there is no silver bullet technology to rein-in data center complexity. The type of data, content, and frequency of access required all need to be evaluated in order to find the best deduplication solution. Virtual machines (VMs), for example, require many backup applications to work within more dynamic and virtual workflows, which they are ill-equipped to handle. This data type must be managed differently from traditional data.


Microsoft CEO Nadella: Windows 10 is an IoT play too
The key for Windows in the future will be offering user experience consistency where ever it will run. "The Internet of Things end points will need an operating system that's manageable and secure. I feel Windows will be a fantastic operating system to run on the edge," said Nadella. Another key point will be taking that OS and the data end point and offloading into Azure for predictive analytics. "That's really our IoT strategy," said Nadella. "We're in IoT today. Listening to you today makes me want to go back and put my marketing department on it."


Gartner: Top 10 strategic predictions for businesses to watch out for
For a session that is high-tech oriented, this year’s Gartner strategic predictions were decidedly human. That is to say many were related to increasing the customer’s experience with technology and systems rather than the usual techno-calculations. “Machines are taking an active role in enhancing human endeavors,” said Daryl Plummer is a managing vice president, chief of Research and chief Gartner Fellow. “Our predictions this year maybe not be directly tied to the IT or CIO function but they will affect what you do.”


IBM, Pentaho make the case for a big data refinery
It's that push-pull between access and governance that seems to be helping bubble up another marketing term du jour: the data refinery. In IBM's vision, it enables businesses to keep data in the close-to-raw format, refining it to a properly integrated, aggregated and governed state "automatically, on demand when the business user is asking for it," Corrigan said. ... Hortonworks was on to this back in 2012, which Shaun Connolly, vice president of corporate strategy, described as "a new system capable of storing, aggregating and transforming a wide range of multi-structured raw data sources into usable formats that help fuel new insights for the business."


CIOs Face Digital Leadership Problem: Gartner
One of the problems CIOs face is that inspiring people and developing strategic vision requires time. Aron suggested that CIOs appoint an "IT COO" to be in charge of operational issues within the division. He pointed out that CIOs who had such a person on their team gained at least a day each month that they could use for other, more critical tasks. The change in leadership is critical if a CIO is going to lead a change in IT culture, he said. The change in culture is critical if IT is going to respond to the changes facing businesses. Aron leaned on Peter Drucker for this action item, repeating Drucker's quote, "Culture eats strategy for breakfast."



Hacking: How Ready Is Your Enterprise?
For the first, it is important that you then ask what percentage of IT services and programs are covered by a risk assessment and what percentage of security incidents taking place were not identified in the risk assessment. The first question tells you how actively your IT is managing security and the second tells you whether there a gaps and risks. Your goal here should be to ensure that “IT-related enterprise risk does not exceed your risk appetite and your risk tolerance”. With regards to the security plan, you should be asking your IT leadership (your CIO or CISO) about the number of key security roles that have been clearly defined and about the number of security related incidents over time.


5 Steps to Take When a Data Breach Hits
The IT industry has an answer to almost every security problem. Need to lock down an app server to ward off hackers? There's likely a product available for that. Same goes for making sure a stolen Android phone uses strong authentication to keep a hacker from stealing data. However, if the worst does happen – say, the hackers manage to break into a server and steal credit card numbers from a database – it can be hard to know what to do next (other than panic). CIO.com spoke to several security and legal experts to find out what to do after a leak occurs. Here are their five steps for how to survive a data breach, in chronological order.


10 things you need to know before hiring penetration testers
Penetration testing is a crucial part of fortifying and maintaining network, IP and physical security, but as we discovered through numerous interviews, it's not a simple task to hire for. Pentesting involves giving professional pentesters permission to test and verify that new and existing systems, networks, applications and safeguards don't provide unauthorized access to malicious hackers — but pentest individuals and companies range from razor-sharp, thorough and helpful, all the way to oversold, irresponsible and negligent. Today's attackers are devious, creative, and not held back by anything. Here are the ten most critical things you need to know in order to hire the right pentesters.


Protection & Decompiling Software
The most common software crack is the modification of an application's binary to cause or prevent a execution specific part of the program. This is accomplished by reverse engineering the program code using a debugger until the software cracker reaches the subroutine that contains the primary method of protecting the software or by disassembling or decompiling an executable file with a program. Cracking some time done by monitoring the registry or file system changes done by the installation and 1st run of the application.


Ricoh's plans for transformation
Ricoh is in the midst of transformation, actively streamlining its company structure to accelerate growth across a number of markets. Like many traditional print hardware companies, it is shifting its focus to services. Its primary focus is on what it calls "workstyle innovation". Over the past few years, Ricoh has repositioned the company as a services-led organisation - and has greatly enhanced its marketing communications and web presence to shift perception of Ricoh as a company that can support a business' transformation in today's evolving and mobile workplace.



Quote for the day:

"There are only two types of darknesses. One that harvest the shadows..and one that leads the light" --Warda Patel

No comments:

Post a Comment