April 24, 2014

Key Considerations in Choosing an IT Monitoring Solution
Small organizations have limited resources, but still require enterprise class IT monitoring capabilities to grow and be more agile. We spoke to Abhilash Purushothaman, Head - Service Assurance Business, India & SAARC, CA Technologies, to understand the importance of such solutions and key considerations while choosing one - See more at: http://www.pcquest.com/pcquest/interview/213560/key-considerations-choosing-it-monitoring-solution#sthash.w9qZVgfy.dpuf


How to Limit the Damage from a Data Breach by Planning Ahead
Let’s take a break from talking prevention and go where nobody likes to go: how to prepare for the time when what you don’t want to happen does happen. It pays to do some planning in this regard as evidenced by Snapchat, for instance, who has taken a bad situation and made it worse by their handling of it. Data breaches are not just a public relations burden but can cause negative impact on your company’s value and reputation. All eyes are going to be on you, the infosec pro, to provide clear answers quickly. In fact that’s one of the things we’ll deal with in this webinar – the top 5 questions in a data breach:


10 Great Android Apps for IT Pros
In the 18 months since, the 2013 Nexus 7 has proved amazing, and the Moto X is a great smartphone -- both of which are reasonably pricedand unlocked.  This isn’t to say other Android phones and tablets aren’t also good, but the Nexus 7 with LTE from T-Mobile gives me the power and connectivity to fix just about any minor IT problem remotely, earning it a permanent place in my cargo pocket -- and on my list of essential “MacGyver IT” troubleshooting tools. Here are the apps every Android-wielding IT pro should know about.


Improving SQL Server Performance by Looking at the Plan Cache
The SQL Server plan cache stores details on statements that are being executed over time. Each time a statement executes SQL Server will look inside the plan cache first to see if a plan already exists. If a plan exists SQL Server will use that plan instead of spending time compiling a new plan. This ensures the engine operates efficiently. The plan cache holds a great deal of information about the overall health of your database instance. You can use the plan cache to investigate current performance issues as well as proactively look for opportunities to improve performance.


T5 Lands Financial Customer in Atlanta Data Center
“T5 continues to attract discerning customers such as financial services companies and healthcare firms that need to maintain sensitive data, and address security as part of their own compliance requirements,” said Tim Bright, Senior Vice President, of T5 Data Centers. “They come to T5 because of our reputation for reliable service, operational stability across our national portfolio, our willingness to customize our security, and power redundancy and resiliency. With backgrounds in Enterprise Data Center development, operations, and consulting, T5 approaches data center design differently by designing the kind of data center our clients would build themselves, even before we start customization.”


Internet of Things: Changing the Insurance Value Chain
The rise of the Internet of things could change every link in the insurance value chain, according to “The Internet of Things and the Insurance Value Chain,” from Celent, creating new business opportunities for early adopters and saddling late adopters with adverse selection. Donald Light, director of Celent's Americas P&C insurance practice, explains that the Internet of things (IoT) consists of three interdependent components: things with networked sensors, such as automobiles, machines, buildings and people; data stores, whether they are local or in the cloud; and analytics engines.


A 'cloud first' strategy calls for strong security: Five tips to get there
Security is still a major obstacle for IT when it comes to cloud adoption. That was made crystal clear at the Massachusetts Technology Leadership Council seminar on securing data, availability and reputation in the cloud, which attracted a mix of security, IT, entrepreneurs and business folks. As one attendee succinctly put it, "Why should we trustAWS [Amazon Web Services] when we have no visibility into their other side?" Still, there are plenty of organizations thinking in terms of a "cloud first" strategy, including the federal government. For readers who are looking for guidance on cloud security, here are five quick tips from the seminar's expert panelists on how to minimize security risks before partnering with AWS or any number of Anything as a Service providers.


How to create a solid, healthy company culture
It doesn’t matter what size organization you are working or running — culture is key to achieving success. One of the easiest examples of how a weak corporate culture can topple a company was AOL/Time Warner. There was the buttoned-down corporate culture of Time Warner on the one hand, and the entrepreneurial spirit of AOL on the other. It was one of the key factors that led to the demise of the largest merger in the history of U.S. business. So how does one create a healthy culture? There are four basic ingredients


How GE Applies Lean Startup Practices
GE Appliance’s first attempt to apply FastWorks has been to create a refrigerator with French doors (doors that open from the middle) for their high end “Monogram” line. In January 2013, Chip Blankenship, CEO of GE Appliances issued a challenge to the newly formed team: “You’re going to change every part the customer sees. You won’t have a lot of money. There will be a very small team. There will be a working product in 3 months. And you will have a production product in 11 or 12 months.” The cross-functional team was thrown into a room together. They became a tight group as they went down to the factory floor and built products together and looked at market research together.


FCC will seek comments about its latest net neutrality proposal
Under the proposal, "broadband providers would be required to offer a baseline level of service to their subscribers, along with the ability to enter into individual negotiations with content providers," the official said by email. "In all instances, broadbandA providers would need to act in a commercially reasonable manner subject to [FCC] review on a case-by-case basis." The FCC will seek comment on "exactly what the baseline level of service would be, the construction of a 'commercially reasonable' standard, and the manner in which disputes would be resolved," the official added.



Quote for the day:

"Regardless of the changes in technology, the market for well-crafted messages will always have an audience." -- Steve Burnett

No comments:

Post a Comment