Monday 30 November 2015

What makes these 7 workplaces the best to work

The Great Place To Work Institute is dedicated to building a better society by helping organizations transform their workplace culture...

from
via CERTIVIEW

Clavister Announces New Clavister E20

Clavister, a Swedish network security appliance company, announced the new Clavister E20 and Clavister E20 Pro.

from Tom's IT Pro
via CERTIVIEW

The Enduring Appeal Of Information Security For IT Professionals

Information Security remains at the forefront of the IT profession, with more and more opportunities for IT professionals.

from Tom's IT Pro
via CERTIVIEW

SansDigital EliteSTOR ES424X12 JBOD Review

We amassed a 144TB arsenal of Seagate 12Gb/s HDDs to put the SansDigital EliteSTOR ES424X12 JBOD (with expander) through its paces in several configurations.

from Tom's IT Pro
via CERTIVIEW

72 per cent of Indian companies faced cyberattacks in 2015, says KPMG

As the threat of cybercrime looms large over businesses and the general public, KPMG has carried out a cybercrime survey..

from
via CERTIVIEW

Facebook hurts mental well-being, says research report

A new study by Sauder School of Business Professor Izak Benbasat and his collaborators shows that envy is a key..

from
via CERTIVIEW

Videocon Mobiles introduces Z55 Delite, Videocon Z45 Dazzle and Videocon Z45 Amaze, priced at Rs 6,999, Rs 4899 & 4599 each respectively

With an aim to reach out new-age mobile consumers and empower them with affordable smartphone technology, Videocon Mobile Phones, introduces..

from
via CERTIVIEW

PMP Formula of the Week: Product Manufacturing Choice

PMPFormulaOTW475166460

The ToyzWeMake Company is considering the risk of producing two new toys. Equipment and resources are limited and they must choose only one product to produce at this time. Based only on the information provided below, which product offers less manufacturing risk?

Product A is manufactured by revising and updating an existing toy. The initial costs are expected to cost $150,000. There is a 40 percent chance that the existing equipment will work without modifications for manufacturing the new toy and a 60 percent probability that the company will need to spend another $100,000 to modify the equipment to manufacture the new toy.

Product B is a brand new toy idea with an estimated cost of $250,000. There is a 70 percent probability of using the existing equipment without modifications and a 30 percent probability that the equipment will need modifications at an additional cost of $100,000.

A. Neither product
B. Not enough information to make determination
C. Product A
D. Product B

Related Resources
PMP Exam Prep Mobile App
Project Management White Papers

Related Courses
IT Project Management
Project Management Fundamentals
Project Management, Leadership, and Communication
PMP Exam Prep Boot Camp



from
CERTIVIEW

A wrong hire is more expensive for a startup than a large enterprise

 
Pravin Agarwala
The Indian eCommerce is on a different..

from
via CERTIVIEW

Friday 27 November 2015

QiKU Q Terra with 3GB Ram and 13MP camera launched in India at Rs 19,999

QiKU, which has within eleven months grown to number four position in the online smartphone market in China, today announced..

from
via CERTIVIEW

Samsung Begins Production Of 128 GB DDR4 Modules

Samsung has begun mass-production of its first "through silicon via" (TSV) DDR4 memory, with 128 GB modules designed for use in enterprise servers and data centers.

from Tom's IT Pro
via CERTIVIEW

CCNP Security Question of the Week: DHCP Server Service

ccnpQoW04

A network printer has a DHCP server service that cannot disable. How can you configure a layer 2 switch to block the printer from causing any issues on the network?

A. Remove the ip helper-address
B. Configure an ACL to block outbound TCP port 68
C. Configure DHCP snooping
D. Configure port-security

Related Resources
Cisco White Papers

Related Course
CCNP Security e-Camp



from
CERTIVIEW

Letv to build a full-scale sports ecosystem in India

Letv, a multinational Internet and technology corporation, is expanding its reach to the Indian market with the Letv..

from
via CERTIVIEW

How To Commit Code To TFS With PowerShell

Microsoft’s Team Foundation Server (TFS) is a great source code control system from the user’s perspective. Once code is being tracked by TFS it’s a pretty easy process to commit changes.

from Tom's IT Pro
via CERTIVIEW

Thursday 26 November 2015

New GSMA study highlights role of mobile in delivering a Digital India

India is on track to surpass half a billion mobile subscribers by the end of the year, according to a..

from
via CERTIVIEW

Aqua Mobiles launches 3G 512 dual SIM smartphone at just Rs 2,699

With an assurance that "This Phone won't hang when you're hanging out!"  Aqua Mobiles introduced ‘Aqua 3G 512’, a dual..

from
via CERTIVIEW

India Electronics & Semiconductor Association (IESA) announces “Outlook 2016”

India Electronics & Semiconductor Association (IESA), is the premier trade body representing the Indian Electronic System Design and Manufacturing (ESDM)..

from
via CERTIVIEW

India’s cheapest local calling service at 19 paise per min launched by Ringo

After breaking ground in the international calling space, Ringo, the low-cost calling app has introduced local calling in India. With..

from
via CERTIVIEW

Cybage claims Recognition from Zinnov for its enterprise and consumer software product development

Cybage, a global leader in outsourced product engineering, has been adjudged in the leadership zone in enterprise and consumer..

from
via CERTIVIEW

APT Attacks Can End the World

The recent terror attack on Paris has suddenly woken up the west to..

from
via CERTIVIEW

Mobile industry accounts for 6.1 percent of India’s GDP, says GSMA

India is on track to surpass half a billion mobile subscribers by the end of the year, according to a..

from
via CERTIVIEW

78.5% growth in Cross Border commerce estimated for 2016; PayPal emerges as a preferred payment option for cross border shoppers

PayPal and IPSOS released the Global Cross Border Consumer Research 2015. The research maps the evolution of cross border online..

from
via CERTIVIEW

Venkat Krishnapur named head of operations for Intel Security Group’s India engineering centre

Intel Security Group (ISecG), has announced the appointment of Venkat Krishnapur as Head of Operations for its India Engineering Centre. Venkat..

from
via CERTIVIEW

ObiWorldphone enters India with the flagship smartphone SF1

Obi Worldphone launched the ‘Obi Worldphone SF1’ in the Indian market after hugely successful entries in high-growth markets like the..

from
via CERTIVIEW

Wednesday 25 November 2015

Measuring customer lifetime value keeps companies on track for success in the digital economy

Avaya released new research and calculator tool developed with industry analysts, Frost & Sullivan that helps companies determine how they..

from
via CERTIVIEW

Tanla’s A2P messaging hub touches record monthly high of 5 billion messages

Tanla Solutions today announced that its A2P (application to Person) messaging hub, Fastrack, processed more than 5 billion messages in the..

from
via CERTIVIEW

Citrix partners with government on Digital India initiative

Citrix announced the empanelment of its mobile workspace and virtualization solutions with the Directorate General of Supplies & Disposals (DGS&D),..

from
via CERTIVIEW

Best Business Continuity And Disaster Recovery Certifications For 2015

These business continuity and disaster recovery certifications are in demand in 2016. Find the most valuable BCP/DRP certification for your career path on Tom's IT Pro.

from Tom's IT Pro
via CERTIVIEW

Security+ Question of the Week: Suspicious Location-Based Messages

securityQOW01

On your commute to work each day, you notice that you receive several suspicious messages to your phone. The messages are very similar, appearing on your phone when you drive by a certain building on your regular route to work. In order to test a theory, you place your phone in airplane mode then re‐enable just the 3G/4G feature. After several days of driving past the same location, you do not receive any additional messages. What is the likely cause of these messages?

A. Bluejacking
B. Bluebugging
C. Ad‐hoc wireless network connections
D. Geotagging

Related Courses
Security+ Prep Course (SY0-401)
Security+ Certification Boot Camp (SY0-401)

Security+ Question of the Week (SY0-401) Series



from
CERTIVIEW

Tuesday 24 November 2015

Samsung PM863 3D TLC V-NAND Enterprise SSD Review

The SM863 is the first 3D TLC V-NAND SSD for the datacenter, enabling up to 3.84TB in the 2.5" form factor, all with an average price of $0.57/GB.

from Tom's IT Pro
via CERTIVIEW

Microsemi Wins $2.5 Billion Bidding War For PMC-Sierra, Skyworks Withdraws

Microsemi emerges as the $2.5 billion victor in a bidding war with Skyworks for PMC-Sierra.

from Tom's IT Pro
via CERTIVIEW

Benefits of an “Agile” Mindset

AgileMindsetProjects are a social endeavor. Traditional project management approaches have shied away from the social advantages a more agile project environment brings. By nature, we are storytelling, pattern seeking and social people. We need colocation to shine truly in a project environment. Agile is about creating and fostering a culture that has:

  • responsible stewardship
  • individual empowerment
  • open and transparent communication
  • self-organizing, self-determining, collocated groups
  • knowledge sharing
  • consistent face-to-face interaction with customers and each other

In a waterfall environment, resource management is always an issue in any project. Especially when the stakeholders have operational duties to perform. If our requirements team was 100 percent at our disposal, always completed activities on target and worked a full eight-hour day without distraction or a loss of productivity, then estimating time would be simple. This is never the case, however.

Command and Control Organizational Structures

Many business analysts, project managers and other project team members such as subject matter experts(SMEs), customers, users and other stakeholders classically work in a functionally organized environment. Functional settings tend to bring project team members together from other areas within the organization. Figure one illustrates a command and control organizational structure and how its project team is set up.AgileFigure1

This organizational paradigm causes many issues such as competing for resources, self-interested management behavior, poor coordination between projects, over the commitment of resources and a fundamental disregard for best practice project planning techniques.

In the case of opportunistic management behavior: many functional organizations allocate resources based on project priority. In such cases, there is an incentive for project sponsors and senior managers to keep priorities high, by any means possible. On the other hand, those who already have resources assigned to their projects would want to protect them from being poached.

Determining Real Project Costs

As we may expect, this poor time management behavior has a very negative effect on project accounting practices. Organizations often account for costs based on hours spent by team members on projects. In contrast, time devoted to internal activities, such as meetings, are viewed as non-project expenses. In such situations, there is a built-in incentive for management to keep as many people as possible working on projects. A side effect of this is the lack of availability of resources for new projects. Moreover, real project costs are never identified and meetings not tracked. Adding to this predicament, project resources is tied to the operational duties they were originally hired to perform. In an agile environment, we just do not see this behaviour—it takes a village to be agile.AgileFigure2

Organizations that are attempting to adopt a more agile approach often misunderstand the “point of Agile”. Scrum, RAD, and Extreme are all examples of process-based agile approaches. Agile, in of itself is not—it is a mindset.

Project Initiation with Agile

Using project initiation as an example, we see that project opening in an agile project is remarkably similar to traditional approaches. The main difference in rapid project initiation lies in the level of detail explored. Because the agile approach is designed to be tolerant of change, the lean principles of “just enough” and “just in time” are applied to project planning. Agile projects draw the “just enough” line at a relatively high level, leaving significant ambiguity at this phase of the project.

This ambiguity is most obvious in the lack of requirements detail and the rough preliminary project plan produced. A Guide to the Project Management Body of Knowledge (PMBOK® Guide) Fifth Edition, Project Management Institute, Inc., 2013, does not specify the level of detail needed for project initiation.

While project initiation is prominent on agile projects, its outputs are considerably different from those of a traditional project. This mindset of “just enough” and “just in time” are throughout Agile and its principles. A cultural acceptance of Agile requires courage and discipline from everyone from the leadership team all the way to the Scrum team itself.

Consider athletes who train for hours a day, every day to achieve their goals. The same applies to an organization’s culture hoping to “go agile.” They should not expect to get it right the first time or the second or perhaps even the third time. Like an athlete, those organizations, leaders, teams who have discipline, courage and stick with it, will be successful in adopting a true agile culture.



from
CERTIVIEW

It’s Time To Change Your Company’s Security Culture to Reduce Unnecessary Costs and Departmental Silos

SonyHackBlogA year ago today, we were hearing about how Sony, the proverbial punching bag, was being targeted yet again. This time it was a hacker group trying to stop the release of the movie “The Interview”. While the Ashley Madison hack is the most prominent hack of 2015 so far, Sony is truly a case study for how a poor cybersecurity culture affects all facets of a business.

For example, when the security culture of your company enables a folder titled ‘Password’ to exist, like Sony, you’re at risk. If you’ve been continuously hacked and haven’t made any drastic changes, you’re at risk. If you’re part of the 60 percent of companies that do not have a clear and documented strategy to handle a data breach, according to an AFP Risk Survey, you’re at risk.

In the ruthless market we live in today, giving customers even the slightest chance to find fault with your product, service or company can be costly. Consumers can easily switch over to another brand.

The good news? You don’t have to be like Sony.

Remove Silos and Document Your Policies

When crisis strikes, emotions and objective thinking can go right out the window. That can lead to making an already bad situation even worse. So, how can you reduce the chances of adding even more fuel to the fire? How can you minimize the unknowns?

First, discuss with the appropriate employees any potential cybersecurity and business risks. If you don’t know who the IT person is, it’s a great opportunity to meet your co-workers. If you’re in the IT department managing security, you need to ensure that companywide, employees understand the importance of protecting your data.

In a study involving public companies, 87 percent of board members are briefed once a year, 33 percent briefed as least quarterly, and 13 percent are not briefed at all. The previous year, 29 percent said they were never briefed. With the speed in which technology changes, frequency is important. However, the decrease from 29 percent to 13 percent “not discussing security” is a sign for optimism.

Now that you’re discussing security with your boss or your employees, you can create an organized document detailing your security guidelines and best practices. This includes not just IT, but executives, accounting, marketing, human resources, and sales. Everyone is affected. This way when, not if, a crisis strikes, it’s handled with a clear course of action.

The key is to make sure everyone within the company adheres to the security policy. That’s not easy. Using examples and analogies like Sony helps put things into perspective. Thus, when that day comes, your IT team will know what to do, your marketing or communications team will know how to handle any media or customer inquiries, and the rest of your staff will know what each department is doing. Take a unified approach and make sure your employees and peers aren’t kept in the dark.

Create the Culture of IT Being a Strategic Internal Partner, Not a Cost Center

It’s still a tough sell for some businesses to view IT as a strategic internal partner. Executives, sales and other departments sometimes see endless amounts of cash flowing into their IT departments. Yes, technology and cybersecurity aren’t cheap. But, when you think about it, IT has the ability to make every day business operations easier, faster and resilient. IT should be helping sales to close more deals, protect employees’ records, streamline internal processes, and of course, ensure the network is running.

So, if you’re an executive and your IT director or manager has been bugging you about proactively designing a security strategy, you should listen or you risk opening yourself up to trouble. If you’re an IT director or manager and an employee is bugging you about implementing a security strategy, you should. Otherwise, when disaster strikes, he or she will have your job—that is if your company eventually recovers.

According to BDO, an assurance, tax, financial advisory and consulting services firm, 69 percent of corporate directors report that their board is more involved with cybersecurity than it was 12 months ago. In 2014, is was 59 percent. However, it’s not voluntarily. From the same report, 22 percent said their company experienced a cyber breach during the past two years, double from the previous year’s 11 percent.

Let’s Talk About Costs

In Sony’s case when its network went down, “employees were forced to communicate by paper memos, texts, phone calls from their personal cell phones, and temporary e-mail addresses.” Talk about a loss in productivity.

Here are some questions to consider:

  • What would your business do in this situation?
  • How much money do you think you’d lose?
  • Sony’s lost hundreds of millions of dollars. Were employees reimbursed for cell phone usage? Was any private data compromised using non-corporate email?
  • Have you thought about what would happen if your network is hacked and your employee/customer information is stolen?
  • Have you thought about the associated costs?
  • How would you manage your brand?

I can speak from personal experience. At one of my previous jobs a human resources employee’s laptop containing sensitive employee data was compromised. I was one of the affected people. My employer explained the situation, what was being done and what safeguards were in place. Due to their policies, they were absolutely confident there were no concerns, but the company provided one year of free credit reporting and identity theft in the event there was something suspicious. That costs money.

For the sake of this post, let’s use Experian’s Identity Theft Protection service. It costs $15.95 a month for individuals. That’s $191.40 a year. Now, make it a few thousand people (we’ll say 2,000). Even if Experian gave a bulk discount and it wound up running you $12 per person, it would still cost you $288,000 a year. That’s an unexpected cost. And, that’s just to cover internal employees. What if the data breach had been with customers? Oy vey – now it’s a public image issue as well. One of those images is trust.

Companies invest vast amounts of resources into marketing, sales and customer experiences in hopes to earn customers’ trust. However, when those same companies fail to protect your private information and it’s compromised, trust is gone.

 Brand Equity vs. Customer Apathy

Despite all of Sony’s blunders, it’s abundantly clear, that they’ve remained immune to the brand damage experienced by other companies that have been hacked. After Sony’s PlayStation game system was hacked in 2011 and users’ credit card numbers was put at risk, almost half, 46 percent of almost 10,000 Sony customers surveyed said their opinion of the brand didn’t change.

The gamers and in-home entertainment crowd remain loyal. Digital World Research was “surprised at how quickly user numbers spiked back online” for Sony’s network. The PlayStation 4 unit sales continued to dominate Microsoft and Nintendo.

Which brings me to ask this question: Are people becoming desensitized to hacks like this? Are you? Do we expect data breaches to happen and for companies to take care of us with free credit tracking, a discount on service, or wait for our bank to issue new cards? Do you think it will happen to someone else before it happens to you? We’re continuing to push the envelope into what information we put into the digital world. The consequences are only increasing.

But while Sony may appear to have successfully overcome the bad press that comes with a data breach, not all companies are that lucky. Overall, the public trust in companies’ security practices is low, according to a 2014 AdWeek article about how hacking can undo years of brand equity. Seventy-three percent of 2,000 respondents believe companies don’t care about keeping private data secure.

I understand nothing is ever 100 percent secure. Sooner or later, a company’s data could be breached. The exponential growth of big data makes it a given. As long as businesses step up to the plate, work to resolve and correct the situation and explain how they will work to prevent it from happening again, it’s not fair to hold it against them. However, the moment negligence is discovered, the measures a company must take to attempt to earn my forgiveness are quite extensive.

To make situations like this more complicated, companies aren’t incentivized to be on the offensive side of cybersecurity spending. One argument is the moral hazard. This means that the breaches themselves may cost less than preventing them. Why? According to a great TechRepublic article, “Data breaches may cost less than the security to prevent them”.

In plain English, companies like Sony don’t need to invest heavily in prevention because they don’t bear the brunt of the costs. When an attack occurs other organizations and people bear the expenses. Banks have to issue to new cards, insurance companies are paying claims, tax reductions are taken, and customer inconvenience is even figured into being a cost. So, the company makes enough sales and revenue they can survive and move on, but what about the smaller companies?

One answer to solving the moral hazard is increased penalties, but that requires government intervention. That is something that will only muddy the waters and probably make things worse.

The real solution is that we, as consumers, have to rise up and hold companies accountable.

As I bring this to a close, here are the three main action items:

  • Document your cybersecurity strategy. Share it with all of your employees and let them know where they can find it. There are links below that can help.
  • Eliminate the silos in your company. Departments should be talking. Even if it’s one hour every couple weeks to briefly discuss issues, it’s a start.
  • Talk to your employees about security policies and best practices. Make them feel included.

To repeat what I asked above, I’d love to hear your thoughts:

  • Are people becoming desensitized to hacks like this?
  • Do we “expect” them to happen and just wait for our bank to issue new cards?
  • Do you think it will happen to someone else before it happens to you?

Visit our Cybersecurity Champion hub to learn more protecting your business.

Related Blog Posts
A Look Back at 2014 Security Breaches
Risk Manager and Cyber Tips for Business
New Year, Simple Advice: Lower Cyber Risk and Reduce Liability

Related White Papers
Cybercrime 101
10 Things Security Experts Wish End Users Knew



from
CERTIVIEW

Letv to enter the Indian Market with disruptive pricing for the super phone

Letv the internet conglomerate is progressing steadfast in its expansion plans and is said to be ready to give the..

from
via CERTIVIEW

Letv launches LeMall.com to set foot in India

Letv, a Chinese internet company, is expanding its e-commerce business to India through the launch of LeMall.com India on 15 November,..

from
via CERTIVIEW

mCarbon boosts global footprints, expands its business in Middle east and Africa

mCarbon announced the appointment of Sabri Amireh as the new Senior Vice President and the market unit head for Middle..

from
via CERTIVIEW

95% of Android devices were affected in Q3, 2015, reports Trend Micro

The interconnectivity of technology has led to a point where many devices are potentially vulnerable, and in the third quarter,..

from
via CERTIVIEW

foodpanda to enter into a partnership with IRCTC

foodpanda, India’s largest online food ordering platform proposes to associate with Indian Railway Catering and Tourism Corporation (IRCTC), a subsidiary..

from
via CERTIVIEW

Monday 23 November 2015

The top 3 technology predictions from Gartner

Gartner made three  technology predictions: By 2019, Organizations Will Deliver Twice as Many Applications Remotely Compared With 2015. "Organizations will centralize a..

from
via CERTIVIEW

Gartner Says Migration to Windows 10 Will Be the Fastest Yet

Windows 10 is poised to become the most widely installed version of Windows ever, following on the path of Windows..

from
via CERTIVIEW

Sophos appoints Kuldeep Raina as Country Manager (ESG Business), India and Saarc

Sophos announced appointment of Kuldeep Raina as Country Manager (ESG Business) for its India and Saarc region. Managing all aspects..

from
via CERTIVIEW

Why online education is the cure for raising the bar for education in India

India boasts of being the youngest nation but it is also among the top five nations with 1.4 million kids..

from
via CERTIVIEW

SAP Goes “All In” in Vegas with BI Cloud Software

SAPTechEdBlogImageThe company that gave us HANA is at it again with a pair of new business intelligence product offerings that could reshape how business data is analyzed. Over the last few years SAP showed us what could be analyzed (millions of rows of big data) and when it could be analyzed (at speeds measured in seconds and milliseconds).

All that remains is a business intelligence platform built exclusively for connecting to SAP HANA data to handle the how. That time is nigh with the all new, SAP Cloud for Analytics platform introduced at the SAP TechEd conference in Las Vegas this fall.

The new platform extends SAP HANA’s cloud footprint and is designed to provide a user-friendly, centralized interface for visualizing data trends. Data is shared in real-time providing speedy discovery, insights and prediction. All three are key features for users that have an SAP HANA deployment and are looking for a cloud-based data visualization platform. Traditional on-premise implementations can be more difficult to maintain as opposed to the simplicity of cloud-based platforms.

Judging from the popularity of the numerous HANA technical sessions and hands-on workshops at this year’s SAP TechEd conference, there will be quite a few companies and developers waiting on the edge of their seats to get their hands on SAP Cloud for Analytics once it’s released.

The other new BI and data visualization product that debuted at the TechEd conference is the SAP Digital Boardroom. The live demonstration of the software during one of the morning keynotes was impressive, to say the least. It combines crisp graphics, ultra-high speed performance and access to SAP HANA data for instant insights.

From what we know so far, the SAP Digital Boardroom appears to be a hybrid of the SAP HANA Cloud platform and new SAP Cloud for Analytics platform. Early indications are that both of the new cloud-based data visualization offerings will be the perfect marriage for customers looking to get more out of their SAP HANA investments.

Another hot topic at the SAP TechEd conference was the next iteration of the hugely popular SAP BusinessObjects platform due out before the end of 2015, SAP BusinessObjects BI 4.2. As predicted, Web Intelligence — the company’s flagship query, reporting and analysis tool — will allow direct connectivity to SAP HANA views and will finally come with a mapping component for location analysis.

Competition is fierce in the world of enterprise business intelligence and business analytics software. With the announcement of the two new BI cloud platforms, a new version of SAP BusinessObjects on the horizon and continuous improvements to SAP Lumira, SAP is poised for growth. There’s no doubt they’ll remain relevant among the growing list of BI software vendors in the crowded software-as-a-service (SaaS) space of cloud BI.

General availability of both BI software platforms should be announced very soon so keep your eyes peeled.

Related Training
SAP Training



from
CERTIVIEW

PMP Formula of the Week: CPI of 1.0

PMPFormulaOTW475166460

On a performance report, what is the meaning of a CPI (Cost Performance Index) of 1.0?

A. The project is on schedule
B. Schedule variance is zero
C. Cost variance is zero
D. ETC = BAC

Related Resources
PMP Exam Prep Mobile App
Project Management White Papers

Related Courses
IT Project Management
Project Management Fundamentals
Project Management, Leadership, and Communication
PMP Exam Prep Boot Camp



from
CERTIVIEW

Sunday 22 November 2015

Booking.com and Concur announce partnership to enhance business travel worldwide

Concur and Booking.com announced a new partnership to enhance business travel worldwide.  Through the partnership, Booking.com’s 800,000+ accommodations properties worldwide..

from
via CERTIVIEW

Smartlink bets big on ‘Make in India’ vision

Designed to completely transform India into a global design and manufacturing hub, the ‘Make in India’ initiative aims to increase..

from
via CERTIVIEW

The era of the high tech terrorist

During the investigation of the recent Paris terrorist attack, one finding totally surprised the investigators. The analysis revealed that terrorists..

from
via CERTIVIEW

The era of the high tech terrorist

During the investigation of the recent Paris terrorist attack, one finding totally surprised the investigators. The analysis revealed that terrorists..

from
via CERTIVIEW

Saturday 21 November 2015

Swachh Delhi App launched today for Delhiites

The Swachata Abhiyan initiative has taken a front seat these days in every political party's agenda. Walking on the same line,..

from
via CERTIVIEW

Friday 20 November 2015

Web Application Firewall Guide

As I have noted in other articles, there are a number of different products that are available to secure the various parts of a network.

from Tom's IT Pro
via CERTIVIEW

Bidding War For PMC-Sierra Continues, Microsemi Ups Ante Again

The slow motion bidding war between Skyworks and Microsemi for PMC-Sierra continues, as Microsemi announces another unsolicited bid.

from Tom's IT Pro
via CERTIVIEW

CCNA R&S Question of the Week: Characteristics of VLANs

CCNAQuestionWeek12

Which three statements are typical characteristics of VLANs? (Choose three.)

A. A new switch has no VLANs configured.
B. Inter-VLANs communication requires a Layer 3 device.
C. VLANs typically decrease the number of collision domains.
D. Each VLAN is a different broadcast domain.
E. A switch has to identify the VLAN an address belongs to in the forwarding table.
F. VLANs cannot cross multiple switches.

Related Resources
Cisco White Papers

Related Course
CCNAX v2.0 — CCNA Routing and Switching Boot Camp
ICND1 v2.0 — Interconnecting Cisco Networking Devices, Part 1
ICND2 v2.0 — Interconnecting Cisco Networking Devices, Part 2



from
CERTIVIEW

TechProcess’ Paynimo continues its surge momentum with Keys Hotels implementation

TechProcess Payment Services announced a successful implementation of its mobile-first payment platform, Paynimo for Berggruen Group owned Keys Chain of..

from
via CERTIVIEW

Six building blocks for creating a digital enterprise

By: Driek Desmet, Ewan Duncan, Jay Scanlan, and Marc Singer Courtesy: McKinsey Few companies need to be sold on the benefits..

from
via CERTIVIEW

Pantel Technologies unveils India’s First Windows 10-based Tablet Penta WS802X, Exclusively Available on HomeShop18 at Rs 5499

Pantel Technologies in partnership with Intel & Microsoft has launched India's first Windows 10 tablet with 8-inch IPS display called..

from
via CERTIVIEW

Six building blocks for creating a digital enterprise

By: Driek Desmet, Ewan Duncan, Jay Scanlan, and Marc Singer Courtesy: McKinsey Few companies need to be sold on the benefits..

from
via CERTIVIEW

Thursday 19 November 2015

Samsung Partners With Netlist, Fires Its First NVDIMM Shot at 3D XPoint

Samsung partners with Netlist to develop NVDIMMs that leverage existing low-cost DRAM and NAND to provide similar performance, but lower cost, than 3D XPoint and other emerging memories.

from Tom's IT Pro
via CERTIVIEW

One Stop Systems Displays HPC Solutions At SC15

One Stop Systems has its new High Density Compute Accelerator, in various configurations, on display at Supercomputing 2015.

from Tom's IT Pro
via CERTIVIEW

Condusiv V-locity Makes The Most Of Storage With Improved File System Management

Their latest analysis of the performance across more than 3,400 VMs at 100 customer sites reveals the true depths that Windows disk performance can be improved by the software.

from Tom's IT Pro
via CERTIVIEW

Best Data Center Certifications For 2016

These data center certifications are in demand in 2016. Find the most valuable data center certification for your career path on Tom’s IT Pro.

from Tom's IT Pro
via CERTIVIEW

Red Hat Announced Release Of Red Hat Enterprise Linux 7.2

Red Hat, a leading provider of open source technology, today announced the newest version of Red Hat Enterprise Linux 7.2.

from Tom's IT Pro
via CERTIVIEW

Data Privacy Blog Series Part 2: Tips for Becoming Your Own Privacy Warrior

DataPrivacyWarriorWIDETechnology is a wonderful thing, but it comes with a price. Much of the data collected about us is done so for advertising purposes. We may not like it, but if we continue to expect services for free it is only logical that providers make money one way or another.

What’s important is to know what information about you is collected, who has access and what they do with it.

Here are some tips and techniques you can use to minimize the data that is collected and to protect your privacy online:

1. Turn off the location services on your phone or mobile device.

If you need it at some point, for instance for maps or GPS directions, you can always turn it back on. Many of the apps that are preloaded or that we load onto our smartphones utilize location services to track our habits.

2. Remove geo tags.

When taking photos, ensure there are no latitude and longitude or geo tags in the photos. When you post these photos to social media you are essentially advertising to others where the photo was taken.

3. Freeze your credit or have it monitored.

Identity theft due to credit card and other data breaches has become a huge problem for the consumer. Simply go to the three credit bureaus—Experian, TransUnion, and Equifax—and submit the required information to freeze your credit. This will prevent others, for the most part, from viewing your credit and opening accounts or taking out loans in your name. If you need to take out a loan or someone needs to review your credit you can always unlock it.

4. When using social media read and implement all privacy features.

Most social media services, which are free and make money from the sale of advertising, provide privacy features. Be cautious though since some social media providers like Facebook will change these features frequently, disabling your privacy, so you need to constantly check these settings.

5. Use an anonymizer when browsing.

There are many free add-ons you can use on your browsers, such as OpenDNS, Hotspot Shield, Hide My Ass, and others that can help to make your activity on the Internet untraceable.

6. Don’t use public Wi-Fi.

Public Wi-Fi at airports, hotels, coffee shops and other places is easily monitored by hackers and those seeking to steal information. A better option is to tether your phone to your computer or create a secure hotspot with your phone to which only you have access.

7. If necessary, use a VPN.

A virtual private network, or VPN, is like a tunnel for communications. If you are sending messages via email or other means and need to keep them secure, a VPN will allow you to do this.

8. Don’t put sensitive data in the cloud unencrypted.

Unless you are aware or receive a guarantee from whomever manages the cloud service that they have never and will never be breached, make sure you use encryption. Additionally, read all of the agreements before signing and make sure you know what the provider is responsible and liable for and what security they provide.

9. Use two-factor authentication.

Many providers, such as Google, offer this service. For example, as you log on and enter your username and password, a one-time code or pin is texted to your mobile device. Once you enter this code you are provided access. This provides another layer of security since a hacker or identity thief will not usually have access to your phone and receive the one-time pin texted to you.

10. Block third-party cookies.

Third-party cookies, similar to cookies, are placed on your browser by a website to track your browsing history and location to target you with ads. For instance, if a website you are viewing has a Facebook button, Facebook may attempt to install a third-party cookie. In order to disable third-party cookies and other unwanted services, review the settings on your browser. There are many options for you to customize.

11. Use a proxy or VPN to block your IP address and avoid location tracking from your browser.

As mentioned above, there are various apps, add-ons, and software you can use that will mask your IP address. Even though your IP address, in most cases, can only indicate what city you are in, blocking it will help avoid tracking and ads targeted for your location.

12. Use the “Do Not Track” (DNT) function available in some browsers.

Some browsers have disabled “DNT” as the default setting, but you can enable it. This does not mean websites cannot track you, but it tells them you do not wish to be tracked.

For 12 more tips on how to protect your privacy online and control data collection read the “Technology Offers Convenience, Privacy Pays the Price” white paper.

Related Post
Data Privacy Blog Series Part 1: Hello Tech, Good-Bye Privacy 

Related Courses
Legal Issues in Information Security
Cybersecurity Foundations
CyberSAFE (Securing Assets for End-Users)



from
CERTIVIEW

113 million Indians lost an average of Rs 16000 due to cybercrime, says Norton report

Norton by Symantec today released its India findings from the Norton Cybersecurity Insights Report, which sheds light on the truths..

from
via CERTIVIEW

Wednesday 18 November 2015

Google Maps now available in offline mode in India

Understanding that Internet access can be slow or not available in many parts of India, Google has made 'Google Maps' ..

from
via CERTIVIEW

Researchers show how Wi-Fi routers can be used to power IoT devices

University of Washington engineers have developed a novel technology that uses a Wi-Fi router -- a source of ubiquitous but..

from
via CERTIVIEW

LTO 7 Gains Steam With Sony, Fujifilm Verification

The LTO Program Technology Provider Companies announced that both Sony and Fujifilm have successfully passed LTO 7 interchange testing and are now eligible to license the LTO Ultrium generation 7 format on their magnetic tape storage products.

from Tom's IT Pro
via CERTIVIEW

Building A Business Case For Network Access Control

I’ve been asked to do the business case for a network security feature. I might be the first.

from Tom's IT Pro
via CERTIVIEW

Seagate Launches Three-Pronged HPC Attack With A200, L300 and G200 Systems

Seagate bolsters its line of HPC products with three new offerings that target key HPC market segments.

from Tom's IT Pro
via CERTIVIEW

Free Software Tool Launched To Manage Trendnet Access Points

Trendnet released a free software tool that customers can use to centrally manage access points from its line of outdoor networking products.

from Tom's IT Pro
via CERTIVIEW

Vapor IO Announces General Availability Of OpenDCRE

The Data Center Runtime Environment is an API developed to help maintain control and provide monitoring of data center resources and operations.

from Tom's IT Pro
via CERTIVIEW

Extreme Networks To Release 'Industry’s First' Flow-Based 802.11ac Wave 2 Wireless Solution

Armed with Extreme Network's flow-based technology, the company's latest indoor and outdoor Wi-Fi access points also include MU-MIMO, and improved security and resource control.

from Tom's IT Pro
via CERTIVIEW

Cisco’s Lancope Acquisition Creates Security Power House

CiscoLancopeAcquisitionCreatesSecurityPowerHouse134937746On October 27, Cisco announced plans to acquire Lancope for a little over $450 million. This is the most recent purchase in their security buying spree and a very strong addition to an increasingly formidable security portfolio.

For those not familiar with the products from this Alpharetta, Georgia based company, Lancope’s StealthWatch technologies are the jewel of their offerings. Their network tools allow organizations to gain visibility and real-time situational awareness of all users, devices and traffic on the enterprise network. For organizations that means thwarting potential attacks and addressing risks at the earliest possible moment. This acquisition strengthens Cisco’s “network as a sensor” capability and is in line with their security everywhere strategy.

Cisco is now poised to leverage Lancope’s assets to provide enterprises with comprehensive network security that is adaptable and scalable as enterprises change or mature. With Lancope’s product suite organizations can to use behavior anomaly detection and analytics to help safeguard their network. Administrators can collect and analyze audit trails, provide faster root cause analysis and perform more thorough forensic investigations.

“As enterprises digitize, security challenges rapidly evolve. Real-time visibility and understanding the behavior of every machine or device on the network becomes critical in adapting the ability of enterprises to identify and respond to the next wave of cyber threats,” said Rob Salvagno, vice president, Cisco Corporate Development, in a corporate statement.

For those of you with a background in Cisco security, you likely know that Cisco has had a good relationship with Lancope for some time. Lancope has been central to their strategy of using a network as a security threat sensor. Many enterprises have used the combination of Lancope’s StealthWatch System and Cisco routers and switches to detect sophisticated cyberattacks from anywhere on the network. It’s proven to be much more cost effective than deploying probes.

To date, Cisco’s concept of a network as a sensor has relied on leveraging Cisco infrastructure devices as a telemetry source in order to create a comprehensive and cost-effective solution. By combining Lancope’s StealthWatch with the Cisco Identity Services Engine (ISE) and TrustSec, organizations can transform the network into an enforcer. Using software-defined segmentation, TrustSec can enforce access control policies based on user identities as well as security group tags. This combination ensures users are only permitted access to the appropriate network resources independent of network topology or mobility of the user or device.

The acquisition is expected to close in the second quarter of fiscal year 2016. With Lancope, Cisco will further enhance their security everywhere strategy. Along with their SourceFire products and their core security capabilities, Cisco will be able to provide advanced threat protection across the full attack continuum — before, during and after an attack.

In comments about the significance of this acquisition, Rob Salvagno further stated, “Cisco is committed to helping organizations defend their networks and devices. Together with Lancope, our combined solutions can help turn a customer’s entire network into a security sensor.”

Certainly this most recent acquisition will strengthen Cisco’s security portfolio through the addition of network behavior analytics. It will extend Cisco’s ability to aid organizations in defending against cyber attacks further across the network. More importantly, the acquisition is going to allow you and your team to operate more efficiently, prevent or locate any unauthorized access points and free up time to work on strategic projects.

Related Training
Cisco Security Training

ABOUT THE AUTHOR
Michael Watkins (PMP, CCSI, CCNA, CCNP – Routing & Switching, Security, Voice) has nearly 20 years of IT instructional, training and product design experience. He holds over 30 industry certifications and is currently a senior product director with Global Knowledge. Michael has directly helped hundreds of thousands of professionals achieve success through his lectures, books,workshops and learning products. He has worked with companies such as KnowledgeNet, Thomson NETg, SkillSoft, and Toolwire to create and deliver a broad range of learning solutions. He has also consulted with organizations such as Kraft Foods, Johnson & Johnson, Raytheon and the U.S. Air Force to help them implement state-of-the-art learning technologies. In 2011 Michael was recognized as the Institute of IT Training’s Instructional Designer of the Year and the learning product he created was recognized as the Learning Technologies Solution of the Year.



from
CERTIVIEW

Prepping For A Connected Future, Broadcom Delivers Two Enterprise-Grade Wireless AC Wave 2 Switch Chipsets

Broadcom announced the BCM56060 and the BCM56160, two new enterprise-grade Ethernet switch chipsets aimed at providing faster data rates using Wireless AC’s Wave 2 standard.

from Tom's IT Pro
via CERTIVIEW

CISSP Question of the Week: OSI Layer for Formatting Data

CISSPQOWGreenCISSP Question of the Week courtesy of Transcender Labs.

Which OSI layer is responsible for formatting data?

A. Network
B. Data Link
C. Application
D. Presentation

Related Course
CISSP Certification Prep Course



from
CERTIVIEW

How Deltin group automated its marketing & lead generation process

Owned by Delta Corporation, the Deltin group offers luxury hotels and casino. Right from ads in magazines to hoardings, gantries,..

from
via CERTIVIEW

AppsFlyer hires Sanjay Trisal as India country manager

AppsFlyer, a mobile marketing attribution analytics platform, announced that the company has recently appointed Sanjay Trisal as Country Manager, India...

from
via CERTIVIEW

Synechron appoints Shashi Nirale to lead growth in the UK

Synechron, one of the fastest growing global consulting, technology and outsourcing firms, has announced the appointment of Shashi Nirale as..

from
via CERTIVIEW

Google launches cloud credits for startups in India

Aiming to equip Indian enterprises and startups with the power of Google Apps and Cloud services, Google today announced the..

from
via CERTIVIEW

Tuesday 17 November 2015

Red Hat Announces General Availability Of Software Collections 2.1

Red Hat, Inc. announced the general availability of Red Hat Software Collections 2.1.

from Tom's IT Pro
via CERTIVIEW

Phicomm launches the stylish Energy 653 4G smartphone, India’s most affordable 4G smart phone, in partnership with Snapdeal

High on cutting edge features, low on cost. Meet the 4G smartphone everyone’s been waiting for - Phicomm Energy 653. Snapdeal,..

from
via CERTIVIEW

Persistent Systems partners with Akumina, strengthening partner ecosystem for digital transformation

Persistent Systems announced the acquisition of the digital content management solutions business of Akumina, maker of InterChange, an innovative software..

from
via CERTIVIEW

Five emerging career paths for future IT aspirants

By: Siddarth Bharwani, Director at JetkingInfotrain With the rapid pace of Internet and smart phones becoming available to the masses, IT..

from
via CERTIVIEW

Gigabyte Shows Off Two NVMe-Ready Server Models

Gigabyte, the Taiwan based hardware company, announced two new servers that support NVMe drives at the Supercomputing 2015 show in Austin, Texas.

from Tom's IT Pro
via CERTIVIEW

Aerohive Network's New Connected Experience Platform Simplifies BYOD Self-Service

The Connected Experience Platform from Aerohive Networks adds Guest Access and Personal Device Access to help organizations streamline and automate burdensome BYOD management workflows.

from Tom's IT Pro
via CERTIVIEW

NVMe Over Fabrics Coming To Market As Mangstor Releases NX6320 AFA

Mangstor has a large presence at Supercomputing 2015, where it announced general availability of its NVMe-Over-Fabrics NX6320 AFA and is prominently displayed in several partners booths.

from Tom's IT Pro
via CERTIVIEW

Best Cloud IT Certifications For 2016

These cloud IT certifications are in demand in 2016. Find the most valuable cloud computing certification for your career path on Tom’s IT Pro.

from Tom's IT Pro
via CERTIVIEW

Huawei Announces NVMe-powered ES3000 V3 PCIe SSD At SC15

Huawei rolled out its latest NVMe PCIe SSDs at Supercomputing 2015.

from Tom's IT Pro
via CERTIVIEW

Biscom Verosync Update Adds Analytics To File Sharing Platform

In addition to having the dashboard available for troubleshooting, the analytics platform can be an important tool for discovering how users engage in file sharing throughout the organization.

from Tom's IT Pro
via CERTIVIEW

New 3D TLC NAND Enables $1.50 Per-Usable-GB Cost From Pure Storage

Pure Storage revamped its FlashArray//m series with 3D TLC NAND to enable a $1.50 per-usable-GB price point, along with other additions to its software and support services.

from Tom's IT Pro
via CERTIVIEW

5G mobile subscriptions to hit 150 million by 2021, predicts Ericsson

The latest edition of the Ericsson Mobility Report provides insight into the future of 5G networks, including a forecast of 150 million 5G mobile subscriptions by 2021. South Korea, Japan, China and the US are predicted to lead with the first, and fastest, 5G subscription uptake. 5G will connect new types of devices, enabling new use cases related to the Internet of Things (IoT); the transition will open up new industries and verticals to ICT transformation. The report, a comprehensive update on mobile trends, reveals a significant increase in mobile video consumption, which is driving around six times higher traffic volumes per smartphone in North America and Europe (2015 to 2021). North America data traffic per active smartphone will grow from 3.8 to 22 GB per month by 2021; in Western Europe, the increase is from 2 to 18 GB per month. Rima Qureshi, Sr VP & Chief Strategy Officer, Ericsson, says: “5G is about more than faster mobile service...

from
via CERTIVIEW

ITC Infotech forms strategic partnership with Ramco Systems

ITC Infotech, a leading global IT services & solutions company, and a fully owned subsidiary of ITC Ltd, today announced..

from
via CERTIVIEW

World’s largest developer confluence to be hosted by Hackerearth

HackerEarth, the largest engaged community of developers, is set to host the world’s largest developer confluence, IndiaHacks 2016. The confluence..

from
via CERTIVIEW

Apple targets Indian enterprise segment; signs up over 130 corporate resellers

Known for its iconic brands, Apple is now looking to beyond the consumer, and is aiming at tapping the Indian..

from
via CERTIVIEW

Monday 16 November 2015

Banks have a $380 Billion market opportunity in Financial Inclusion, Accenture and CARE International UK Study Find

Banks can address an additional US$380 billion market in annual revenues by targeting micro-enterprises and bringing unbanked and underbanked adults into..

from
via CERTIVIEW

How Indian eCommerce firms are using the power of SMAC to boost their competitiveness

India’s eCommerce industry, valued at $17 bn and growing at a CAGR of 35%, is one of the fastest growing..

from
via CERTIVIEW

Windows OS Hits the Big 3–0

WindowsHitsBig30BlogWhen I realized the Windows Operating System was turning 30, it made me reflect. For the better part of the past 20 years I’ve been a Microsoft certified trainer and Windows has been a big part of my life. So why not celebrate Windows OS’ birthday by recounting my personal history and thoughts on the OS’ major highs and lows?

1985 – Windows 1.0 is born

On November 20, 1985 Windows 1.0 was released to the public. I was just 15 years old and remember very little about Windows 1. But, I do remember the excitement of visiting an older cousin who had bought her first computer and her trying to teach me Reversi. I may not remember how to play Reversi, but that exciting feeling of using a computer for the first time is one I’ll never forget.

1992 – Windows 3.1

Between the release of Windows 1.0 and Windows 3.1 in 1992 I grew up, but I still had the same enthusiasm for computers. I attended college and earned my degree in computer systems. I remember going out and looking for a job, armed with my brand new diploma, and during my first job interview the owner asked me if I knew about Windows 3.11. The inquiry caught me off guard as we had mostly studied Novell in school, but I confidently asserted that if I was given the chance, “I would be his best Windows guy!” The stars must have aligned because he gave me the job on the spot and I spent the next couple of years building networks for small businesses using Windows for Workgroups 3.11. I remember how easy it was and how much my boss charged because everyone thought that networking was difficult. At the time, I was thanking Microsoft for making it so easy a kid out of college could do it.

1995 – Windows 95

August 24, 1995 was another big day because Windows 95 was released and the PC came of age. The Rolling Stones even endorsed it by allowing Microsoft to use their song “Start Me Up” in their ads. Windows 95 had built-in Internet support, dial-up networking and most importantly for a tech guy like me: Plug and Play. No more messing around with jumpers! The other thing I remember is that my PCs hard drive ran out of space and I had to buy a couple of boxes of diskettes that gave me just as much space as a new hard drive. Those were the days. Microsoft went on, largely because of Windows 95, to take over the desktop OS market and from that point forward has been the OS that businesses have commonly adopted. With few exceptions, Microsoft currently stands at roughly 90 percent of the market share and most experts would credit Windows 95 for this success.

The year after NT 4.0 was released, a buddy of mine convinced me that the future for guys like us was in getting certified and getting our Microsoft Certified Systems Engineer (MCSE) designation, which we did. I was lucky enough to land a job with the school I took my training with setting up the networks in their corporate offices and classrooms. That eventually led me to my present career as a certified trainer at Global Knowledge. As great a combination as Windows 95 and NT 4.0 was, time moved on and by the late ‘90s it was inadequate for what big businesses needed.

1999 – Windows 2000

In December 1999, Windows 2000 was released and Windows started to dominate the IT world. Windows 95 had given us a desktop OS that was easy for both personal and business use. The NT 4.0 server was taking big chunks of business from its main competitor Novell. Windows 2000 was Microsoft’s opportunity to keep the momentum going and with the introduction of Active Directory it did just that. Although the server edition was great, I remember being disappointed with the desktop version, Windows Professional. Don’t get me wrong it had issues, but overall it was a great product. The problem was that it looked and felt like the server, a very utilitarian UI that did nothing to get the end user excited. So you can imagine how happy I was when on August 24, 2001, Microsoft gave us something I will never forget: Windows XP.

2001—Windows XP

With Windows XP, what Microsoft did was to fix some underlying problems and tweak the user interface. That was enough to get everyone excited and everyone did. XP took over the home and business PC markets. At this point XP had no real competition, no one was making a product that could integrate with the server OS so seamlessly and take advantage of all it had to offer. XP was literally seen as the only game in town. As a matter of fact, it was such a huge success that when its predecessor Windows Vista came around in early 2007, its biggest competition was its predecessor and it lost badly. There were other factors of course, like the resurgence of Apple. But Vista bombed big time, partly because people just loved their XP.

2009 – Windows 7

July 22, 2009 was another big milestone because it was the day Microsoft released Windows 7. Like I said before, its predecessor Windows Vista was not a success. A lot of people where happy with XP and saw Windows 7 as a money grab by Microsoft. But in reality what they tried to do was fix a lot of the security issues of an aging XP. There was a lot of talk at the time about Microsoft losing its grip on the OS market and competitors taking over. But, the truth is that businesses just stuck with XP. On the home side Apple had taken a small bite out of the bottom line and the feeling was that Microsoft had to get the next one right. With Windows 7 they gave us another smashing success, they took a page out of their own playbook. Similar to what they did with Windows 2000, they fixed the underlying issues and tweaked the UI making Windows 7 the same kind of success that XP was, Windows 7 is still the most used desktop OS in the world sitting at about 55 percent of market share.

2012 – Windows 8

Just like XP hindered the success of the OS, Windows 7 had much of the same effect on Windows 8. Windows 8 was radical in many ways when it hit the market in late 2012. But the thing that I believe really hurt it the most, was its revolutionary interface. The start menu was replaced with a start screen and the whole thing had a much simpler look, foregoing the slick glassy effects of its predecessors. All this so the OS could compete in the ever growing tablet market. Microsoft gambled and lost with this one. Once more they tried the same trick that worked so well with 2000 and Vista. They tweaked the UI and released it in August 2013. Although it worked to some extent, people didn’t respond well to the new interface.

2015 – Windows 10

This brings us to present day, Windows 10 was released July 29, 2015. Microsoft listened to its customers and gave us what we wanted – a modern OS that remembers its roots but also embraces the future. We got the start menu back but with new live tiles and we have modern applications, but they are windowed. All over the OS we find touches of the old but with a new modern twist.

Microsoft tells us that this is the last version of Windows with no new number or version changes every couple of years, just steady updates. When I first heard of this plan I was skeptical, I thought that they were trying to mimic what their competitors were doing. Maybe rightly so, but then again the industry has always fought the introduction of new desktop operating systems. Because to them it represents the added costs of testing and deployment and to the home user it usually meant buying a new PC. Maybe steady updates is the way to go?

I’ve been asked many times over the years if I’m tired of doing training and if I’ve ever thought of moving on to something other than Windows products. The truth is I train with Windows ’cause I love it. So although I’ve flirted with the idea of moving on, I’ve stuck with what I love. Windows in my opinion is still the way of the future. No other OS can even compete to be a viable solution for our business needs because of its integration with the backend, its familiarity and its features. I truly believe in the product and what it has to offer but maybe my decades-old relationship with Windows has me looking at it through rose-colored glasses? Only time will tell, but if we will be using any version of Windows for the next decade or so I’m happy it’s Windows 10.

Related Courses
Installing and Configuring Windows 10 (M20697-1A)
Deploying and Managing Windows 10 Using Enterprise Services (M20697-2A)
Supporting and Troubleshooting Windows 10 (M10982)



from
CERTIVIEW

Security Is As Security Does

When CompTIA scattered 200 unbranded flash drives around high-traffic public locations in Chicago, Cleveland, San Francisco and Washington DC, passers-by picked up and inserted those drives into a device of some kind about one time out of five.

from Tom's IT Pro
via CERTIVIEW

3D TLC NAND Takes Over AFAs As HPE Announces 3PAR StorServ Storage Solutions

HPE launched a wide variety of offerings as it increased the density and lowered the cost of its flash-based solutions by employing 3D TLC NAND.

from Tom's IT Pro
via CERTIVIEW

Hafele India embraces Qlik to charge up business growth and employee satisfaction

Qlik announced that Hafele, Europe’s leading international manufacturer and supplier of furniture fittings and architectural hardware, has selected QlikView® to..

from
via CERTIVIEW

PMP Formula of the Week: What is BAC?

PMPFormulaOTW475166460

What does BAC determine?

A. The funding limitation for the project
B. The sum of the original budget and approved changes
C. EAC
D. The acceptable range of budget variability

Related Resources
PMP Exam Prep Mobile App
Project Management White Papers

Related Courses
IT Project Management
Project Management Fundamentals
Project Management, Leadership, and Communication
PMP Exam Prep Boot Camp



from
CERTIVIEW

Canon adds premium PowerShot G series cameras and Connect Station CS100 to its India portfolio

Canon launched the two new models in the PowerShot G series line of premium digital compact cameras and the multimedia..

from
via CERTIVIEW

Technology Driving Disruption in Retail

The Indian retail industry, the fifth largest in the world, accounts for over 10% of the country’s GDP and around..

from
via CERTIVIEW

Sunday 15 November 2015

I pretended to be dead for over an hour: Paris terrorist attack woman survivor remembers the tragic night

Isobel Bowdery, who had gone to enjoy the 'Eagles of Death Metal' concert like many youngsters, recounts her terrifying experience..

from
via CERTIVIEW

MTNL to offer free roaming scheme and one month free broadband for landline customers

State owned telecom firm is following the footsteps of its peer, BSNL. The firm has announced an intent to offer..

from
via CERTIVIEW

I pretended to be dead for over an hour: Paris terrorist attack woman survivor remembers the tragic night

Isobel Bowdery, who had gone to enjoy the 'Eagles of Death Metal' concert like many youngsters, recounts her terrifying experience..

from
via CERTIVIEW

Security firm launches self defending mobile apps for public app stores

Bluebox Security has become the first company in the world to pioneer self-defending apps for BYOD employees and the extended..

from
via CERTIVIEW

India blocks Facebook content more than any other country

Facebook recently shared findings of its Global Government Requests Report as part of a broader effort to reform government surveillance..

from
via CERTIVIEW

Google celebrates Children’s day with ‘Create something for India’ doodle

Google celebrated children's day in a unique way by encouraging young Indians to create something for India, represented through a..

from
via CERTIVIEW

Automating data for the CFO

Dataquest interviews Jesper Vork, Vice-President of TimeXtender, and a renowned expert on BI. Tell us about TimeXtender and specifically your role..

from
via CERTIVIEW

Saturday 14 November 2015

India’s first smartphone for kids launched for Rs 5999 by Swipe Technologies

Swipe Technologies has launched India’s first kids smartphone, a android based kids smartphone with powerful Geo Tracking, Geo Fencing, expandable..

from
via CERTIVIEW

Friday 13 November 2015

Blogging For IT Pros: Starting Your First IT Blog

Blogging is a great way to show what you know and be a part of the IT community. It can even help advance your IT career! Here's why you should start your own IT blog and how you can get started today.

from Tom's IT Pro
via CERTIVIEW

A Deeper Look at the HP ZBook Studio

HP just revealed its new lineup of ZBook mobile workstations, and we got some time to take a closer look at the brand-new ZBook Studio, a quad-core ultrabook with workstation-level performance.

from Tom's IT Pro
via CERTIVIEW