There are countless IT certifications today. One of the best for IT Security professionals is the Certified Information Systems Security Professional (CISSP), sponsored by the International Information Systems Security Certification Consortium, or (ISC)2.
At its simplest level, cloud computing means using someone else’s computer. This gives you rapid access to computing power, storage, and network services that can help you scale your operation up or down, depending on your requirements.
Cloud is a technology buzzword with many meanings. Dropbox is cloud. Microsoft Office 365 is cloud. Salesforce is cloud. Any software that you access via the Web is technically cloud. ‘Cloud’ is so prominent in today’s technology industry lexicon, that it is hard to remember a time without it.
BLE (originally introduced as Bluetooth Smart) is an extension to the Bluetooth 4 standard. It is important to understand that BLE does not replace Bluetooth, but instead it enhances Bluetooth. Bluetooth was defined under the IEEE 802.15 specification. 802.15 defines personal area networks for users and their devices.
Before the existence of the cloud, all of an organization’s data resided inside the enterprise perimeter which was relatively easy and straightforward to secure. Along comes the cloud and all of a sudden, the data has moved beyond the four walls of an enterprise making securing that data significantly more difficult.
As the use of Hyper-Convergence technology spreads throughout the industry, desktop virtualization has followed in this lead because HCI is a great platform for execution. Three of the main VDI players at this time would be Citrix, VMWare, and Microsoft. What is great about VDI, is that you are not necessarily tied to one specific vendor. For Example, your broker could be provided by Citrix, while the backend infrastructure could be provided by Microsoft, or VMWare. One thing to know about VDI is what it is not. It is not just the virtualization of desktops. It’s essentially a whole infrastructure based on supplying the desktop experience to the end user without necessarily having a desktop.
BYOD, which stands for bring-your-own-device, is an important concept. With its supporting technologies it is accelerating telecommuting and collaboration in the workplace at a rapid pace. When selecting a BYOD strategy it is important to focus on some key areas. Understand your users’ needs. Establish clear policies. Define the discovery and enrollment process. Customize the…
IT organizations have kept development and operations teams as separate units for years. Even with the similar business goals, these parallel functioning teams usually remain at odds with each other. Now, the organizations have realized the need to develop an integrated functioning model which leads to the development of the DevOps methodology.
The privacy of our data is a topic we should all continually become more familiar and with January 28 being Data Privacy Day, there’s no better time to start then now. First off, there’s a difference between the security of your data and its privacy. Both of these topics play within the same arena and…
For as long as I have been a network engineer (almost twenty years), all networks were hierarchical. Most models were three layers deep, but there were four layer networks and collapsed two-layer networks eventually as well. Just like everything else in the data center the network has also evolved. Nowadays the model has evolved to Leaf-Spine.