Wednesday 30 September 2015

How 3D printing techniques are helping surgeons carve new ears

When surgical residents need to practice a complicated procedure to fashion a new ear for children without one, they typically..

from
via CERTIVIEW

What Is National Cyber Security Awareness Month?

Growing up I was obsessed with gadgets and technology. When I was preparing to start my first job after graduating college, my sister gave me an electronic address book. I remember tearing open the packaging and instantly entering every address and phone number I knew. The next week I proudly took my data-engorged electronic address book into work, only to have it stolen a few days later.NCSAM2015Blog

I’ll never forget how violated I felt as I realized the repercussions of this heinous crime. All the addresses, phone numbers and birthdays of my closest friends – and most of my family members – were now in the hands of a stranger. I hoped this thief just wanted a free electronic address book and not a pile of personal information. Still, because of my carelessness, the personal information of people I care about had been exposed.

Although it was decades before the huge corporate data breaches that now occur almost weekly, that day taught me an important lesson about cybersecurity and data theft. While not an online cybercrime, my loss of personal data – especially data about those closest to me – taught me that protecting your personal information and being proactive about cybersecurity is not just the responsibility of your IT department. Cybersecurity is the responsibility of each and every one of us.

So what is National Cyber Security Awareness Month?

National Cyber Security Awareness Month, also known as NCSAM, is promoted by IT security professionals and organizations across the country every October. A joint effort between businesses and government, the purpose of NCSAM is to ensure that every American has the resources needed to stay safer and more secure online.

Living in a world that is more connected than ever, the Internet is essential to almost every part of our lives. Data breaches are increasing in occurrence, magnitude and reach, threatening data from your Gmail and Netflix accounts to your banking and medical records. Just ask the 18 million military and federal employees whose personal data records, some including detailed background security clearance information, were stolen when the U.S. Office of Personnel Management was hacked in the spring of 2015.

You can see why NCSAM is important to businesses and government agencies alike. Designed to educate public and private sector organizations through events and initiatives, NCSAM’s goal is to raise cybersecurity awareness and increase the resiliency of the nation in the event of a cyber incident.

To raise awareness of core NCSAM issues, each week during October has a different cybersecurity theme. We encourage you to share and act on these cybersecurity messages throughout the month:

Week 1 – October 1–2 – General Cybersecurity Awareness
This year marks the fifth anniversary of NCSAM’s “Stop. Think. Connect.” campaign. Providing simple, actionable cybersecurity advice that anyone can understand and follow is NCSAM’s goal this week.

 Week 2 – October 5–9 – Create a Culture of Cybersecurity at Work
This week NCSAM focuses on the workplace and the common threats that businesses and employees are continually exposed to every day. Businesses and government agencies are encouraged to take a fresh look at their existing security plans and make them more secure and efficient.

Week 3 – October 12–16 – Connected Communities: Staying Protected While Always Connected
It can be a struggle to stay protected in our interconnected world. From social networking and downloading the hot new apps to shopping and banking, we live more of our lives online than ever before. How we access that digital world, especially when on the go, is more important to our cyber safety as well.

Week 4 – October 19–23 – Your Evolving Digital Life
Back in 1995, cybersecurity was more about how we connect as individuals to the Internet. In 2015 and beyond, cybersecurity will also be about how everything is connected to the Internet. From our cars to our refrigerators, the Internet of Things (IoT) is not just in our future. It is our present, and securing all the connected devices in your life will be a challenge.

Week 5 – October 26–30 – Building the Next Generation of Cyber Professionals
With all the headlines about cybersecurity, you would think there would be plenty of cybersecurity professionals around, but nothing could be further from the truth. Nearly one million cybersecurity jobs in the private and public sector are unfilled. The future will surely be bright for anyone entering the workforce who has studied cybersecurity, as in-demand IT security professionals demand the higher pay accompanying any under-filled job role.

As a designated NCSAM champion organization, Global Knowledge, along with our learning partners IBM, Cisco Systems, CompTIA, ISACA, Dell and Juniper Networks, will promote cybersecurity during the month of October with blog posts, white papers and webinars. During October, follow us on Twitter @GKonITSecurity and the #CyberAware hashtag for daily NCSAM updates.

Related Training
Cybersecurity



from
CERTIVIEW

SoftNAS CloudFabric Software Defined NAS Manages Data Everywhere

SoftNAS CloudFabric comprises a new data migration, replication and integration (DMRI) platform that helps companies deal with diverse datasets housed outside of the data center.

from Tom's IT Pro
via CERTIVIEW

Vera Secures Enterprise Documents Through Extended Box Relationship

Vera, a new entrant in the digital rights management (DRM) space, announced an integration with Box’s platform to provide content security and controls to documents that exit the confines of a public cloud storage system.

from Tom's IT Pro
via CERTIVIEW

Flash In The Cloud: Is Performance Worth The Extra Cost?

Flash storage in the cloud is still an expensive proposition for most enterprises. Those who are looking at flash as an option are wondering if performance benefits of flash are worth the extra cost. The answer, as with most things is: it depends.

from Tom's IT Pro
via CERTIVIEW

Talon Storage Unveils CloudFAST Global File Sharing For Azure

Talon unveiled CloudFAST, its newest weapon in the company's file-sharing arsenal, at Microsoft's AzureCon.

from Tom's IT Pro
via CERTIVIEW

Security+ Question of the Week: Increase in Email Hoaxes

SecurityQOW07An increase in email hoaxes to employees is likely to result in which of the following?

A. An increase in tech support calls and overloading of email servers and their related storage devices.
B. An increase in available bandwidth and reduction in lost productivity due to personal communications.
C. A violation of privacy and a need to make bit-stream backups of all storage devices.
D. An increase in tech support calls and users making detrimental modifications to their workstations.

Related Courses
Security+ Prep Course (SY0-401)
Security+ Certification Boot Camp (SY0-401)

Security+ Question of the Week (SY0-401) Series



from
CERTIVIEW

HP simplifies end user experience with new IT service broker products

HP announced significant updates to HP Propel and HP Service Anywhere, two products designed to transform how businesses enable, deliver,..

from
via CERTIVIEW

MapR introduces industry’s first In-Hadoop Document Database

MapR Technologies,  provider of the distribution for Apache Hadoop that integrates web-scale enterprise storage and real-time database capabilities, today announced..

from
via CERTIVIEW

Cisco India: Attempting to double revenues

Despite facing stiff competition from its Chinese counterparts, Cisco Systems India managed to clock a 9% growth in FY15. Its..

from
via CERTIVIEW

Tuesday 29 September 2015

Cisco India: Attempting to double revenues

Despite facing stiff competition from its Chinese counterparts, Cisco Systems India managed to clock a 9% growth in FY15. Its..

from
via CERTIVIEW

IT Security: ‘Are we leaving the main door open?’

WinMagic, a data security company, organised a roundtable on IT Security: ‘Are we leaving the main door open?’. The Round..

from
via CERTIVIEW

Is Twitter Planning to Kill its 140 Character Limit?

  Twitter's frugal 140-character limit seems to be on the threshold of demise. According to a latest report in Re-Code, it..

from
via CERTIVIEW

AMD Reveals New AMD Pro Lineup: Carrizo, ARM TrustZone Onboard

AMD just released minty-fresh 6th generation Carrizo-based AMD Pro A-Series APUs, and we have the full specs for the new commercial offerings.

from Tom's IT Pro
via CERTIVIEW

Microsoft Azure To Be Accelerated By Nvidia GRID 2.0

Microsoft announced a partnership with Nvidia to bring GRID 2.0 acceleration to Azure cloud based applications. Companies will have access to supercomputing-level computational power, without the significant investment of purchasing the hardware.

from Tom's IT Pro
via CERTIVIEW

Best IT Governance Certifications For 2016

These IT governance certifications are in demand in 2016. Find the most valuable certification for your career path on Tom’s IT Pro.

from Tom's IT Pro
via CERTIVIEW

AMD Connects: New APUs, Partners, Opportunity

AMD Connects was an opportunity to see that AMD isn't going quietly into that dark night, and it has plenty of innovation cooking in the form of Carrizo-based AMD PRO APUs and some new unique partnerships that step up AMD's performance and security game.

from Tom's IT Pro
via CERTIVIEW

Lenovo brings its ‘Start up with Lenovo’ to Karnataka

Lenovo has announced the launch of its ‘Start up with Lenovo’ initiative to increase PC usage in Karnataka. This is..

from
via CERTIVIEW

Oracle Academy advances Computer Science education with new global offerings

Oracle Academy, Oracle’s flagship philanthropic program that delivers a complete portfolio of computer science learning resources to educational institutions, kicks..

from
via CERTIVIEW

Lenovo brings its ‘Start up with Lenovo’ to Karnataka

Lenovo has announced the launch of its ‘Start up with Lenovo’ initiative to increase PC usage in Karnataka. This is..

from
via CERTIVIEW

MapR Announces JSON Support For MapR-DB Hadoop

MapR announced that it has added native JSON support to MapR-DB, bringing the scalability and analytical features of Hadoop and Spark to the high velocity and scalability found in document database systems.

from Tom's IT Pro
via CERTIVIEW

Where to Begin With ITIL® Implementation (Part II): Conducting a Process Assessment

ITILWhereToBegin66292063GreenBlogYour company has made the decision to implement ITIL. Now what? Hopefully, your company has put a good communication plan in place with a well-defined project scope, objectives and training program as discussed in Part I of this series.

The next step in the ITIL Implementation process will be to evaluate existing policies and systems that affect the design, development, transition, operation, and improvement of your IT department. The recommended approach is to perform a formal evaluation called a process assessment. Process assessments can be completed by internal staff or by using a consultant. There are pros and cons to both methods, but the goal is the same: to determine where to focus your efforts.

A process assessment can help you understand both the maturity and capability of your processes, and provides insight into where there are gaps that should be filled. You can choose to look only at a defined set of IT processes or delve further with reviewing your people, process and technology systems or instead select to do a full assessment.

  • People, Process, and Technology—In this scenario, the people, or functions required to carry out operations would be assessed for efficiency and effectiveness. The underlying technology would also be reviewed.
  • Full Assessment—A full assessment includes all of the activities of a people, process, and technology assessment, but goes further and would also include an assessment of the vision, mission, goals, and objectives of the organization along with its strategy and culture.

The results of the assessment can be used to benchmark your processes against industry standards in order to help you understand how well your organization compares with other organizations of the same size, type, and industry. It also gives insight into where there are gaps.

Rating Your Policies and Systems

Once you select which of your internal processes you wish to review, you must then figure out what system to use to rate their performance. There are several rating models to choose from:

  • The Capability Maturity Model Integrated (CMMI)—Uses five defined levels to evaluate how a process is being carried out and how closely is it being followed. It begins at Level 1-Initial which means a process is unpredictable and reactive to Level 3-Defined, which means an organization and proactive, all the way up to Level 5-Optimizing.
  • ISO 15504—This is a recognized standard to help you spot areas of capability that need improvement. This ISO standard defines six levels of process maturity from 0-Incomplete to 5-Optimized Processes. Its measures include process deployment, process control, process innovation and work product management. For each of these areas, ISO 15504 also evaluates the level to which each process attribute is achieved from 0 to 100 percent.

There are many frameworks, including COBIT and TIPA, which utilize the ISO 15504 model for capability assessments. As you can see, although very similar, ISO 15504 defines each level very similarly but not quite the same as CMMI.

Control Objects for Information and Related Technology (COBIT): COBIT focuses on the capability of a process, or whether or not it achieves is defined objective. The model used for COBIT is based upon the ISO 15504 Standard and it also has five levels.

Tudor IT Process Assessment (TIPA): This model was developed by the Public Research Centre Henri Tudor in Luxembourg and combines the ISO 15504 process assessment model with the ITIL best practices, so it is specifically designed with ITIL in mind. It is quickly becoming the de facto standard for performing an ITIL Process Assessment.

Carrying Out the Assessment

There some common activities that should be undertaken when performing an assessment, including a document review and employee interviews to gain an overall understanding the various aspects of your internal systems. Some documents you should review are:

  • Process roles (owner, manager and practitioners)
  • Process stakeholders
  • What triggers the process
  • Process inputs
  • Activities and their flow
  • Tools and automation
  • Common procedures and models
  • Process outputs
  • Information gathering requirements
  • Process feedback mechanisms including customer survey results
  • Measurements, including critical success factors (CSFs) and key performance indicators (KPIs)

Your assessment team should perform interviews of the key players who are accountable and responsible for your processes. These interviews can be one-on-one, or in a group setting. The goal is to understand each stakeholder’s perspective and gain insight into their views about how the process or processes work, where they see issues, how they view process compliance, and the benefits they think are being realized from the processes.

Now, that you’ve figured out what internal practices to review, selected your performance rating model, reviewed documentation and interviewed stakeholders, you are ready for the next step: acting on your assessment. To find out more check out Part III of the “ITIL® Implementation Where to Begin” white paper.

Related Courses
ITIL® Foundation
ITIL® Awareness
ITIL® for Executives



from
CERTIVIEW

Gartner Says Worldwide shipments of 3D Printers to reach more than 490,000 in 2016

Worldwide shipments of 3D printers will reach 496,475 units in 2016, up 103 percent from the predicted 244,533 units in..

from
via CERTIVIEW

Microsoft Launches Commercial Cloud Services from Local Datacenters in India

Demonstrating its commitment to delivering trusted cloud services that enable people and organizations around the world to achieve more, Microsoft..

from
via CERTIVIEW

Videocon Mobiles launches rich-featured smartphones; Z51 Punch and Z51Q Star, priced at Rs 5,999 and Rs 5, 490 respectively

With an aim to reach out new-age mobile consumers and empower them with affordable smartphone technology, Videocon Mobile Phones, from..

from
via CERTIVIEW

Dell introduces new campus and datacenter networking solutions for the future-ready enterprise

Dell announced expansions to its networking portfolio to address growing complexities in campus networking and skyrocketing bandwidth demands in the..

from
via CERTIVIEW

Quikr empowers common man across India with QuikrJobs

Quikr, an Indian cross category classifieds business announced its newly launched vertical, QuikrJobs will focus on Blue Collar, Grey Collar..

from
via CERTIVIEW

Synechron acquires Crossbridge – strengthens consulting expertise

Synechron, an independent pure-play technology consulting and outsourcing provider for the financial services industry, announced the acquisition of Crossbridge, a..

from
via CERTIVIEW

Monday 28 September 2015

State of logistics outsourcing study shows major changes ahead for Supply Chain

Capgemini Consulting, the global strategy and transformation consulting brand of the Capgemini Group; Penn State University; the preeminent authority on..

from
via CERTIVIEW

Windows 8.1 Exams Retiring, Windows 10 Exams Coming Soon

Windows 10 certification exams are so much like the Windows 8.1 exams that Microsoft plans to retire the older exams rather than run them in parallel.

from Tom's IT Pro
via CERTIVIEW

Vapor IO To Use AppliedMicro HeliX 2 Processor To Power Vapor Edge Controller

Vapor IO and AppliedMicro have announced a partnership in which Vapor IO will use the AppliedMicro HeliX 2 quad-core 64-bit ARM processor to power the Vapor Edge Controller.

from Tom's IT Pro
via CERTIVIEW

HashiCorp Releases Otto And Nomad, Two New Open Source DevOps Tools

HashiCorp's two new open source DevOps tools complement and complete the company's ecosystem of products to offer a complete application delivery system for VMs, containers and hybrid environments.

from Tom's IT Pro
via CERTIVIEW

Startups are key to India’s transformation: Prime Minister Narendra Modi

Here is the full text of his speech: It is a great pleasure to be here. For me, this is a..

from
via CERTIVIEW

Acer India opens new exclusive brand stores at Delhi and Karnataka

Acer India announced the launch of its exclusive Acer Malls at Nehru Place in Delhi and Hubli in Karnataka. The..

from
via CERTIVIEW

Oracle Academy advances Computer Science education with new global offerings

Oracle Academy, Oracle’s flagship philanthropic program that delivers a complete portfolio of computer science learning resources to educational institutions, kicks..

from
via CERTIVIEW

IBM expands portfolio of cloud business solutions with the launch of industry platforms

IBM announced plans to globally expand its business solutions capabilities with new, cloud-based Industry Platforms to simplify and accelerate clients' digital..

from
via CERTIVIEW

Vivo Unveils Y Series Models in India

Vivo introduced its signature smartphone models Y27L, Y31 and Y15S by rolling out its Y series. These impressive models packed..

from
via CERTIVIEW

PMP Formula of the Week: Fixed-Price Incentive Fee Contract

PMPFormulaOTW475166460As the seller, you are completing a project under a fixed-price incentive fee contract, with a fixed price of $130,000. The incentive (or penalty) is set at $2,000 per week for each week that the project is under (or over) schedule. When you deliver the project two weeks late, how much money will you receive?

A. $130,000
B. $134,000
C. $126,000
D. $138,000

Related Resources
PMP Exam Prep Mobile App
Project Management White Papers

Related Courses
IT Project Management
Project Management Fundamentals
Project Management, Leadership, and Communication
PMP Exam Prep Boot Camp



from
CERTIVIEW

Sunday 27 September 2015

Saturday 26 September 2015

Narendra Modi at Silicon Valley: Full text of the Prime Minister’s speech

If there was ever a gathering under one roof that could claim to be shaping the world, it is this...

from
via CERTIVIEW

Shoto, a private photo sharing mobile app acts like a location tracker for photos

Shoto is a free mobile app that lets one request photos from times spent with friends, all while organizing them..

from
via CERTIVIEW

Micromax launches new 4G smartphones: Canvas Blaze 4G, Canvas Fire 4G and Canvas Play 4G

Micromax is trying to carve its foothold in the emerging 4G market by launching three new 4G smartphones.While the Micromax..

from
via CERTIVIEW

Internet.org renamed to Free Basics by Facebook; more than 60 new services available

To clearly differentiate the broader Internet.org initiative from the programs and services that Facebook has been providing, Facebook has taken..

from
via CERTIVIEW

After Ola Cabs, Uber too introduces number masking to protect identity of Indian passengers

Just a week back, Ola Cabs had announced an initiative, wherein drivers calling from their Ola mobile devices would not..

from
via CERTIVIEW

Friday 25 September 2015

Find out 6 amazing reasons to like WhatsApp even more

Gone are those days when food, clothing and shelter were the only necessities of life. According to a survey, the..

from
via CERTIVIEW

8 innovative ways WhatsApp is being used in India

WhatsApp is extremely popular among the youth as a popular messaging platform.  Dataquest brings you some innovative examples of organizations..

from
via CERTIVIEW

How To Build An Interactive Menu Inside Of A PowerShell Script

Learn how to design and build your own interactive menus inside of your PowerShell scripts to help non-PowerShell users more easily navigate and use them.

from Tom's IT Pro
via CERTIVIEW

Helpchat agrees to acquire hyperlocal discovery platform, Niffler to improve chat based personal assistant’s capabilities

Helpchat, a chat-based personal assistant app that helps you get more things done, has agreed to acquire Mumbai-based start-up Niffler..

from
via CERTIVIEW

Giada Introduces Fanless Intel Braswell-Based F103D Thin Client

Giada USA is no stranger to the IT marketplace for offering low-cost servers and thin clients that operate at low power ceilings, and it's back again with its new F103D mini PC, which is designed for digital signage and thin client deployments.

from Tom's IT Pro
via CERTIVIEW

CCNP Security Question of the Week: Bogus IPv6 Addresses

ccnpQoW04What two features block traffic that are sourced from bogus IPv6 addresses? (Choose two.)

A. DHCPv6 Guard
B. IPv6 Prefix Guard
C. IPv6 RA Guard
D. IPv6 Source Guard

Related Resources
Cisco White Papers

Related Course
CCNP Security e-Camp



from
CERTIVIEW

VoxWeb’s ‘Speaking Picture’ app all set to reinvent Photograph

With the objective of reinventing photographs and radically changing online communication and social networking, VoxWeb’s ‘Speaking Picture’ app now goes..

from
via CERTIVIEW

Thursday 24 September 2015

IBM Is Morphing Into A Software Company

IBM continues to invest in long-term opportunities in key growth markets around the world—China, India, and countries within Southeast Asia,..

from
via CERTIVIEW

IBM Extends Watson Cognitive Computing Platform, Introduces New APIs

IBM has expanded the reach of the Watson cognitive computing platform by opening access to the Watson APIs, making them available to developers and businesses around the world.

from Tom's IT Pro
via CERTIVIEW

Best Enterprise Architect Certifications For 2016

These enterprise architect certifications are in demand in 2016. Find the most valuable IT architect certification for your career path on Tom's IT Pro.

from Tom's IT Pro
via CERTIVIEW

HCL launches a Digital Service Exchange Platform

HCL Technologies has announced the launch of a new Digital Service Exchange platform enabled by ServiceNow software. This platform provides..

from
via CERTIVIEW

5 mobile wallets in India that do more than just bill payments

Despite being at a nascent stage, Mobile wallets have managed to maintain a large user base in India because..

from
via CERTIVIEW

SAP Labs collaborates with Srishti to absorb early talent through scholarships

SAP Labs India announced the signing of a Memorandum of Understanding (MoU) with Bangalore-based Srishti Institute of Art, Design & Technology,..

from
via CERTIVIEW

Preparing for an Unknown Cyber Threat

Preparing-for-an-Unknown-Cyber-Threat87698528BlogIt seems that the cyber security conversation is never-ending. Topics, ideas, insights or just about any other constructive thinking inside your organization, has cyber security sprinkled into it. As they should, security teams are watching the warning networks, requesting tools to better secure data, patching and praying, as well as trying to imagine what’s next.

Unfortunately all of the confidence scores around stopping the next cyber attack or closing the next security breech assume the next one will be of the same type or kind as prior attacks. But what if it is not? What if the next security attack is of a totally different kind? What if the prior 37 attacks and cleanups have all left little pieces of code in places you may not think of, such as router cache, and the next attack will assemble those 37 bits of code into a completely new thing? Is your organization ready for that? How do you know? If not, how do you prepare?

The Unacceptable Answer

A multitude of questions, including those above, cannot all have fully formed answers. Some are unanswerable until an attack has been mitigated, studied and understood, and new defenses created. Perhaps an acceptable answer for many of the questions is, “I do not know.” But, in the world of IT and security professionals, these words are unacceptable. The reality is that no one knows for sure what the next cyber attack will be, when it will happen or how much damage will occur. However, we can learn to prepare for and limit the scope of the next attack.

Occasionally cyber security is referred to as a marathon rather than a race, and the analogy is directionally correct in that cyber security is not a one-time thing you decide to do today. Rather, your effective cyber security practices are long-term policy and habit-driven actions that deliver expected outcomes against historical needs. But what if your cyber security marathon were followed by an attack pentathlon leading to a breech triathlon? Would you manage security differently?

The Best Cyber Defense

Preparing for and managing this combination of connected but different security needs requires the levels of training and practice one might find in Olympic athletes. Ongoing preparation, knowledge gathering and skills development, are among the best cyber defenses available today. Training your teams to respond to the unexpected in ways that confuse or distract cyber attackers is one clear advantage you have today. Doing this requires ongoing investments in learning and understanding how the cyber threat landscape changes from day to day. This is how you prepare for the unknown.

“I do not know” can be an unpopular phrase in IT and cyber security. However, it can also be the starting point for improving your cyber self through new knowledge, new habits, and a new view of the cyber security threats yet to come. One thing you do know is that the cyber threat tomorrow will be different from the cyber threat today, and that means you must be doing something different today if you are to be ready for tomorrow.

Related Training
Cybersecurity



from
CERTIVIEW

Wednesday 23 September 2015

Meizu Technology launched its high-end flagship phone PRO 5

Government IT spending in India to reach $6.88 billion in 2015, says Gartner

The government in India will spend $6.88 billion US Dollars (USD) on IT products and services in 2015, an increase..

from
via CERTIVIEW

Global IT spending across vertical industries to decline 3.5 percent in 2015, says Gartner

Worldwide IT spending across vertical industries is forecast to total $2.69 trillion in 2015, a 3.5 percent decrease from 2014,..

from
via CERTIVIEW

BlueData Announces EPIC 2.0

The EPIC 2.0 platform offers a way to simplify infrastructure and provide a turnkey solution for enterprises working with Big Data.

from Tom's IT Pro
via CERTIVIEW

Intel Launches DC P3608 Series SSDs

Intel announced the release of its new dual-controller Intel SSD DC P3608 Series.

from Tom's IT Pro
via CERTIVIEW

Border Router Security 101

This introductory article provides an overview of border router security as well as the typical configuration recommendations for small, medium and large organizations.

from Tom's IT Pro
via CERTIVIEW

QNAP Scales Up With Qtier, Scales Out With Databolt 12 Gb/s

QNAP launched four new rackmount models in the new TVS-ECx80U-SAS-RP series that deliver first-to-market features for this price class.

from Tom's IT Pro
via CERTIVIEW

Now, you can use your FreeCharge mobile wallet to shop at Shoppers Stop retail outlets

FreeCharge announced its exclusive partnership with retailer, Shoppers Stop. As part of the exclusive tie-up, Shoppers Stop's customers will have..

from
via CERTIVIEW

Dr Agarwal’s Eye Hospital adopts cloud-based healthcare solution from Dell

Dell Services has been selected by Dr Agarwal’s Eye Hospital, India’s leading eye-care specialty hospital chain with more than 50..

from
via CERTIVIEW

Dell Services selected as strategic technology partner for Dr. Agarwal’s Eye Hospital

Dell Services has been selected by Dr. Agarwal’s Eye Hospital, India’s leading eye-care specialty hospital chain with more than 50..

from
via CERTIVIEW

Oracle sees traction for Cloud customer experience (CX) solutions in India

Oracle has announced that the company is observing strong momentum for its Customer Experience Solutions in India with recent customer..

from
via CERTIVIEW

Security+ Question of the Week: Wrong Name or Address

SecurityQOW06What type of questionable or potentially unethical activity captures traffic when the users enter the wrong name or address for an Internet site or service?

A. Pharming
B. Watering hole attack
C. Rainbow tables
D. Typosquatting

Related Courses
Security+ Prep Course (SY0-401)
Security+ Certification Boot Camp (SY0-401)



from
CERTIVIEW

Government withdraws controversial national encryption policy; blames junior officer for confusing wording of document

After a huge backlash on social media, the government now has totally withdrawn the controversial draft for the national encryption..

from
via CERTIVIEW

Tuesday 22 September 2015

IBM Cloud Security Enforcer Protects Companies From Cloud-Based Threats

IBM Cloud Security Enforcer allows IT security administrators to monitor and regulate the use of cloud-based apps in an organization.

from Tom's IT Pro
via CERTIVIEW

Dell Venue 8 Pro, Venue 10 Pro About Services More Than Hardware

Dell announced two new full-featured, professional-grade tablets – the Venue 8 Pro and Venue 10 Pro – equipped with Windows 10 and built specifically for vertical organizations and related applications.

from Tom's IT Pro
via CERTIVIEW

Best System Administrator Certifications for 2016

These system administrator certifications are in demand in 2016. Find the most valuable certification for your career path on Tom's IT Pro.

from Tom's IT Pro
via CERTIVIEW

Microsoft Office 2016 Focused On Collaboration And Cloud

Today marks the release of the latest 2016 version of Microsoft's second most important software product after Windows: Office.

from Tom's IT Pro
via CERTIVIEW

AirWatch Continues Evolution In Mobile Device Management Leadership

At AirWatch Connect, the company made a number of announcements to strengthen its leadership position in the enterprise mobility management (EMM) market.

from Tom's IT Pro
via CERTIVIEW

Where to Begin With ITIL® Implementation (Part I): Pre-Initiative Preparation and Assessment

ITILWhereToBegin66292063BlueBlogGenerally, organizations look at implementing ITIL because they want to improve IT service levels, save money, find efficiencies or enhance customer service. But, ITIL has dozens of best practices and finding a place to start can be overwhelming.

ITIL is a methodology that takes a Service Lifecycle approach to the design, development, transition, operation, and improvement of an IT organization’s services and processes. In order to implement ITIL you have to assess your existing IT systems and processes, and you may need to make adjustments to your corporate culture in order for the initiative to work.

Each company has its own culture and dynamics that also play a part in how that particular company operates, so there is no single best way to institute ITIL best practices. Organizations have a great deal of flexibility to utilize the best practices that make the most sense for their particular situation.

Over the course of this three-part series we will help you figure out which assessment process you should use, along with how to gain employee buy-in, and quickly show the value of ITIL in your organization. We will also look at how to determine measures of success.

First, let’s look at the preparation you need to do for a successful ITIL initiative.

Internal Communication is Key

The best place to begin is with internal communication and training. Start by communicating the intention to embark on an ITIL journey via your company newsletter. Outline the reasons why ITIL implementation is underway and the expectations for the initiative. The newsletter should also outline the plan for training throughout the organization.

Use the newsletter as a regular communication vehicle throughout the initiative to communicate upcoming tasks and implementations, accomplishments, and benefits being realized from the effort. It should also be used to recognize staff members and teams who have provided significant contributions. Make sure to use the company bulletin boards and online resources to post updates, successes, and recognition.

It extremely important that the IT staff, IT management (including executives), and select business representatives attend ITIL training. It’s best if all employees attend ITIL Foundation training. This ensures that everyone understands the basic concepts, learns the common terminology, and that no one feels left out. It’s a great way to make your staff feel included in the initiative in order to gain buy-in and support.

The core team should be the first to attend the foundational training. Next, the staff targeted to become process owners and managers should take the intermediate level courses that teach the concepts around their area(s) of responsibility. For the core team that will be responsible for the processes, advanced knowledge is critical. Two to three people should become ITIL Experts. They will be the go-to people in the organization, so make sure these people are on the core implementation team.

Find Your Areas of Weakness

Attempting to implement or improve too much at one time will ultimately result in a failed initiative. Begin by defining a reasonable scope for the project. To do this, you need to assess your existing operations and capabilities.

Most companies have a process to handle Incidents that occur in the environment and to respond to requests for assistance from users. However, these processes are not always as efficient or effective as they should be, and they aren’t providing the value that is possible if best practices were used.

One way many companies find their areas of weakness is to evaluate and examine the three major internal processes that have the biggest impact on customer satisfaction and service reliability:

  • Incident Management: a process that is used to resolve issues that occur in the IT environment as quickly as possible to minimize the impact on the business. This process is owned and managed by the service desk, which is the single point of contact for users from an operational perspective.
  • Request Fulfillment: also owned by the service desk, is meant to deal with requests from users. Requests can range from a question, to a password reset, to installation of standard software, or even for access to a service or set of services.
  • Change Management: modifications to the IT environment can include new services, changes to existing services, the removal or retirement of a service, or the transfer of a service to/from an external service provider.

Another way to assess your internal process is to look at your current pain points, or areas where you are having the most issues. Take the time to understand the root cause of your challenges. Are the incidents a sign of a larger issue, a staffing shortage, communication gaps, or missing processes? Make sure to take everything into consideration before jumping in and fixing something that may not be an issue.

A third method organizations can use to review their current policies and procedures is to conduct a process assessment. This approach is the most recommended because it can help you to understand both the maturity and capability of your processes, and provide insight into where there are gaps that should be filled. Maturity refers to how a process is being carried out and how closely is it being followed. Capability refers to how well the process is accomplishing its defined outcome. In other words, is it accomplishing its desired goals or objectives?

To find out more about how to do a process assessment check out Part II of this series or the “ITIL® Implementation Where to Begin” white paper.

Related Courses
ITIL® Foundation
ITIL® Awareness
ITIL® for Executives

Where To Begin ITIL Implementation Series

  • Where to Begin With ITIL® Implementation (Part I): Pre-Initiative Preparation and Assessment


from
CERTIVIEW

YatraGenie launches services in 8 cities in Karnataka

YatraGenie Services, one of the leading bus ticketing and cab booking platform has launched its services across 8 cities in..

from
via CERTIVIEW

Monday 21 September 2015

Aircel, BSNL and Many Indian Firms Provide Mediocre Customer Experiences: Forrester

In a damning revelation by Forrester, majority of Indian firms deliver mediocre customer experiences;and if that is not enough..

from
via CERTIVIEW

After furore over national encryption policy, Government exempts WhatsApp and social media messages from purview

Hours after proposing a draft policy that makes deleting of WhatsApp messages illegal in the country, the Government seems to..

from
via CERTIVIEW

Dell Intros Support Services For VDI Focused On Productivity

Dell's new Deployment, Accidental Damage and ProSupport services help organizations focus on maintaining productive work environments.

from Tom's IT Pro
via CERTIVIEW

5 Free IT Training Courses Available On edX

Massive Open Online Courses -- or MOOCs for short -- are a great source of free, high-quality training. Check out these five IT courses from edX.

from Tom's IT Pro
via CERTIVIEW

India-based IT companies support more than 411,000 jobs in the US, says Nasscom

To showcase the contributions of the Indian IT industry to the US economy, The National Association of Software and Services..

from
via CERTIVIEW

Preserve your WhatsApp messages for 90 days, says India’s new Draft National Encryption Policy

The draft National Encryption Policy prepared by an expert group formed by the DeitY, under Section 84A of the Information..

from
via CERTIVIEW

Indian IT companies among the 10 worst paymasters in the world; Switzerland pays the best IT salaries

Indian IT companies are among the 10 worst paymasters in the world, says a survey — a mid-level IT manager..

from
via CERTIVIEW

Aircel announces network expansion intent; plans to add 13,000 sites by December 2015

With an aim to offer seamless connectivity to its customers, Aircel, one of India’s leading innovative mobile service providers, today..

from
via CERTIVIEW

PMP Formula of the Week: TCPI

PMPFormulaOTW475166460What formula is used to determine To-Complete Performance Index (TCPI)?

A. (BAC – EV) / (BAC – AC)
B. EV / AC
C. EV / PV
D. CPI / SPI

Related Resources
PMP Exam Prep Mobile App
Project Management White Papers

Related Courses
IT Project Management
Project Management Fundamentals
Project Management, Leadership, and Communication
PMP Exam Prep Boot Camp



from
CERTIVIEW

Google joins hands with Tata Trusts to announce Android Nanodegree scholarships in India in partnership with Udacity

With a vision to transform India into a hub of high-quality mobile developers for global and local apps, Google today..

from
via CERTIVIEW

Qlik launches online self-service analytics learning classroom

Qlik today announced Qlik Continuous Classroom, a new 24/7 subscription-based, self-service learning platform for Qlik Sense. With this supplemental offering..

from
via CERTIVIEW

IoT trends and job opportunities

The ‘Internet of Things’ (IoT) is relatively an uncharted territory in India. All the emerging technology revolving around the buzz..

from
via CERTIVIEW

Friday 18 September 2015

How 3D printing can help in regrowing complex nerves after injury

A national team of researchers has developed a first-of-its-kind, 3D-printed guide that helps regrow both the sensory and motor functions..

from
via CERTIVIEW

Top 3 PowerShell Best Practices

PowerShell is an extremely flexible scripting language, which is why it's so appealing to IT professionals. To ensure your code can be read and executed correctly, follow these three PowerShell best practices.

from Tom's IT Pro
via CERTIVIEW

CCNP Security Question of the Week: VLAN Hopping

ccnpQoW05According to Cisco best practices, which two commands help prevent VLAN hopping? (Choose two.)

A. switchport mode access
B. switchport access vlan 2
C. switchport mode trunk
D. switchport access vlan 1
E. switchport trunk native vlan 1
F. switchport protected

Related Resources
Cisco White Papers

Related Course
CCNP Security e-Camp

-



from
CERTIVIEW

Brocade extends leadership in open source software-defined networking

Brocade announced the Brocade SDN Controller 2.0, a commercial distribution of the OpenDaylight (ODL) controller based on the Lithium ODL..

from
via CERTIVIEW

Oracle launches new cloud-based services for targeting higher education space in India

The higher education system in India is facing an unprecedented transformation, driven by economic and demographic change. Experts believe by..

from
via CERTIVIEW

Ricoh India doubles revenue in Q1 2015

Ricoh India has achieved revenue of Rs 442 crores, which is almost double of Rs 226 crores in Q1 last..

from
via CERTIVIEW

8K Miles acquires US-based NexAge Technologies for 3 million USD

8K Miles Software Services today announced the acquisition of a US-based NexAge Technologies, a leading regulatory compliance and technology solutions..

from
via CERTIVIEW

Thursday 17 September 2015

Xerox plans to use printed electronics to fight counterfeiting in the pharmaceutical industry

Thin Film Electronics ASA, a leading player in printed electronics and smart systems, recently announced that Xerox will launch two..

from
via CERTIVIEW

Amazon takes aim at low cost tablet market; launches new tablet priced at Rs 3300

Amazon recently introduced a groundbreaking new tablet for under $50 (approximately Rs 3300 at current exchange rates). The new Fire..

from
via CERTIVIEW

Arcadia Data Offers Enterprise Alternative To Traditional BI Tools

Arcadia Data announced the release of Arcadia Enterprise, a big data visual analytics and BI solution running natively on Hadoop clusters.

from Tom's IT Pro
via CERTIVIEW

Best Computer Networking Certifications for 2016

These networking certifications are in demand in 2016. Find the most valuable certification for your career path on Tom's IT Pro.

from Tom's IT Pro
via CERTIVIEW

Meizu’s flagship phone MX5 gets a great response on Snapdeal; Sales begin tomorrow

Meizu, one of the leading smartphone brands in China, announced the re-opening of sales for its flagship phone MX5 on..

from
via CERTIVIEW

Teamchat aims to become the WhatsApp of the IoT and enterprise space

While WhatsApp is extremely popular among individuals, its usage in the enterprise needs a rethink. For instance, in large projects,..

from
via CERTIVIEW

Teamchat aims to become the WhatsApp of the IoT and enterprise space

While WhatsApp is extremely popular among individuals, its usage in the enterprise needs a rethink. For instance, in large projects,..

from
via CERTIVIEW

Preparing Your Universe Design Staff for SAP’s Information Design Tool

With product support for earlier versions of SAP BusinessObjects ending on December 31, 2015, many organizations are upgrading to the latest version, SAP BusinessObjects Business Intelligence (BO BI) platform 4.1. As part of any BI upgrade plan, project managers should budget and schedule training for both end users and the IT personnel who support the BI system. With the Bi 4.1 upgrade in particular, it’s important that key personnel receive classroom training for the Information Design Tool.
SAP-Universe54051886Blog
What makes SAP BI tools particularly powerful is their use of a “semantic layer,” or intelligent layer, that provides an easy-to-use “plain-English” drag-and-drop user interface suitable for users comfortable with Microsoft Office. SAP Business Warehouse (BW) and SAP HANA each have their own semantic layers. But for non-SAP relational database sources, SAP provides a semantic layer known as the “universe.” The universe should be a key weapon in the self-service BI arsenal for any organization that uses SAP BI platform.

Historically, universes were created with a tool called the Universe Design Tool, known as Designer in earlier editions. But beginning with its BO BI Suite 4.0, SAP introduced a new tool called the Information Design Tool. While it also creates universes, this tool introduces a new user interface and a new file format that can prove challenging to even highly experienced designers.

Although nearly anyone can use a universe, it takes some special skills to create a universe. The typical profile of a universe designer is somebody with an IT background that is experienced with Structured Query Language (SQL). But a great universe relies on more than just technical knowledge. The best universes are built by people who also understand the business domain of the data source and can create a query experience easily grasped by the intended user population. In contrast, poorly designed universes can suffer from faulty query performance, inaccurate results or a painfully complex universe that’s difficult to use. Any of these issues can turn a universe into shelfware, putting an organization’s self-service BI goals even further out of reach. It’s expensive and unnecessary, but also not uncommon to hire additional IT staff or look for alternate BI tools from other vendors.

You should profile your universe design staff for their experience and training. Unless they have prior experience with SAP’s BO BI platform 4.1 from outside the organization, nearly all of your existing staff will fit into one of these three categories:

  • Novice IT staff who have little or no practical experience designing universes
  • Experienced IT staff who have never received formal training for universe design
  • Experienced IT staff who are comfortable with the older Designer tool but who have never used the Information Design Tool

Classroom Training

Global Knowledge provides five-day intensive training for the Information Design Tool, SAP BusinessObjects Information Design Tool. Previously, the course was broken into a three-day introductory and two-day advanced course. Unlike most technical training that teaches what to do, this course also teaches what not to do, which will help you avoid common pitfalls that usually require expensive rework or outside consultants to remedy.

Training can be perceived as expensive. However, the price of not training, and potentially wasting your organization’s existing investment in SAP BI can be even more expensive, not just in dollars expended but in time wasted and business opportunities missed because BI didn’t exist to support new business initiatives.

Online Documentation

The “Information Design Tool Users Guide” is freely available on the SAP Help Portal. While it’s comprehensive, the material can be a bit overwhelming to new universe designers. The format is more of a reference guide and less of a step-by-step tutorial.

Related Training
SAP Training



from
CERTIVIEW

Avaya empowers India’s public sector with state-of-the-art video engagement solutions

Avaya, a global player in business communications software, systems and services, announced its partnership with the DGS&D (Directorate General Supplies..

from
via CERTIVIEW

HCL unveils strategic initiative to accelerate IoT adoption

HCL Technologies has announced that it is collaborating with IBM to jointly develop Internet of Things (IoT) solutions to help..

from
via CERTIVIEW

Wednesday 16 September 2015

Hybrid Caching Gets Read Performance Boost, Dot Hill Awarded Patent

Dot Hill has deep roots in the hybrid storage market, so it isn't entirely surprising to find the company continually expanding its caching capabilities, and it just earned its 106th patent along the way.

from Tom's IT Pro
via CERTIVIEW

QNAP Announces SMB-Class Network Attached Storage

QNAP Systems, Inc. announced a new line up of AMD-powered quad-core network attached storage (NAS) called the TS-x63U series, targeted at budget-conscious small- and medium-sized businesses.

from Tom's IT Pro
via CERTIVIEW

PMC-Sierra Flashtec NVRAM Drive Review

The PMC-Sierra Flashtec NVRAM Drive family offers up to 10 million IOPS in DMI mode and 1 million 4K random IOPS when utilized as a block device (appears as a standard drive) with the lightweight NVMe protocol.

from Tom's IT Pro
via CERTIVIEW

Connected Data Partners, ImmixGroup To Bring File Sync And Share (FSS) To Government Agencies

Connected Data has partnered with public sector technology products provider immixGroup to bring Connected Data's Transporter private cloud file sync and share platform to government agencies throughout North America.

from Tom's IT Pro
via CERTIVIEW

LogicMonitor's New Amazon Web Services Plug-In Simplifies AWS Performance Monitoring

LogicMonitor's automated end-to-end infrastructure performance monitoring solution is designed to provide administrators with unprecedented operational insight via aggregated performance monitoring of the entire ecosystem.

from Tom's IT Pro
via CERTIVIEW

TCS Digital Software & Solutions Group introduces ‘customer intelligence & insights’ for retail banks

Tata Consultancy Services announced its Digital Software & Solutions (DS&S) group has launched a new TCS ‘Customer Insights & Intelligence’..

from
via CERTIVIEW

Sanovi Technologies announces entry into European markets

Gartner “Cool Vendor” and pioneer of Application Defined Continuity technology, Sanovi TechnologiesCERTIVIEW

Security+ Question of the Week: Backdoor

SecurityQOW05If not by a hacker, how is a backdoor planted?

A. Disabled by a replay attack.
B. Connected to via a man‐in‐the‐middle attack.
C. Left in the code by a programmer.
D. Activated when providing legitimate credentials.

Related Courses
Security+ Prep Course (SY0-401)
Security+ Certification Boot Camp (SY0-401)



from
CERTIVIEW

Blackstone Group to acquire majority of Serco’s private sector BPO operations for Rs 2558 crores

Private equity funds managed by Blackstone today entered into a definitive agreement with Serco Group Plc to buy the majority..

from
via CERTIVIEW

Tuesday 15 September 2015

Oracle India: Cloud Business Begins to Pay Dividends

Ranked 12 in the DQ Top 20, Oracle had an exciting FY15. Although a late entrant in the cloud journey, Oracle has..

from
via CERTIVIEW

8 applications enabling a flawless Nashik Kumbh Mela

It has been more than a month since the pilgrim city of Nashik has seen a steady descent of humanity—eager..

from
via CERTIVIEW

Disney Research demonstrates how light can be used to create a network for the Internet of Things

The light that typically floods homes, offices and public buildings could provide something more than illumination. Scientists at Disney Research..

from
via CERTIVIEW

Containers Continue Invasion Of Software-Defined Storage, Nexenta Joins Fray

Nexenta is infusing its NexentaEdge SDS solution with numerous features to support containers.

from Tom's IT Pro
via CERTIVIEW