Tuesday 31 May 2016

Monday 30 May 2016

Open Source Job Opportunities: DevOps & Cloud Lead The Pack

According to a recent survey, demand for open source professionals is on the rise, with plenty of job opportunities for IT pros with the right skills, including DevOps and open source cloud computing platforms like OpenStack and CloudStack.

from Tom's IT Pro
via CERTIVIEW

Friday 27 May 2016

Citrix Synergy 2016 Highlights: Back From The Brink

At Citrix's Synergy user conference this week, the consistent message from company executives was that Citrix has emerged stronger from a period of uncertainty. Here are the highlights.

from Tom's IT Pro
via CERTIVIEW

Citrix ShareFile EFSS Extends Market Leadership With New Features

New functionality announced this week at Citrix Synergy includes ShareFile Drive Mapper, key management for Cloud StorageZones, and connections to legacy ECM tools.

from Tom's IT Pro
via CERTIVIEW

Thecus Launches New NAS Devices With Haswell Processors

Thecus updates its W12000 and W16000, 12- and 16-bay NAS devices, with the new Haswell processors and renames them W12850 and W16850.

from Tom's IT Pro
via CERTIVIEW

How To Customize The Desired State Configuration (DSC) Local Configuration Manager (LCM)

In this article, we're going to cover what makes up the LCM and how you can tweak it to behave in a way that matches your organization's goal of how to apply configurations with DSC. In the examples provided, we'll be using PowerShell v5.

from Tom's IT Pro
via CERTIVIEW

CCNP R&S Question of the Week: Directly Connected CDP Devices

ccnpQoW03In a multi-vendors switch implementation, a network engineer notices that directly connected devices that use CDP are not visible.  Which standard protocol could be used to resolve this issue?

A. Local Area Mobility
B. Link Layer Discovery Protocol
C. NetFlow
D. Logical Link Discovery Protocol

 

Related Courses
ROUTE – Implementing Cisco IP Routing v2.0
SWITCH – Implementing Cisco IP Switched Networks v2.0
TSHOOT – Troubleshooting and Maintaining Cisco IP Networks v2.0

Related Certification
CCNP Routing and Switching



from
CERTIVIEW

Thursday 26 May 2016

Dell Refreshes Virtual Solutions With Additional Support For Citrix And Windows Thin Client



from Tom's IT Pro
via CERTIVIEW

Enterprise Mobility Management: Trends And Solutions

Learn about the latest enterprise mobility trends and find the best mobility management solutions including MDM, MAM and MCM.

from Tom's IT Pro
via CERTIVIEW

Dropbox Expands Further Into The Enterprise With New Partnerships

Dropbox announced this week that it is extending its solution to include direct support for enterprise mobility management (EMM) suites from IBM, Inventit, Softbank and Matrix42.

from Tom's IT Pro
via CERTIVIEW

Natero's New Customer Success Management Platform Targets SaaS Providers

Natero released a new platform for monitoring SaaS customers.

from Tom's IT Pro
via CERTIVIEW

Enterprise Mobility Management (EMM) 101

The mobility management landscape is constantly changing, and the need for EMM solutions that are able to balance productivity with security is on the rise. Here's how enterprise mobility management has evolved and what it is today.

from Tom's IT Pro
via CERTIVIEW

Wednesday 25 May 2016

MuleSoft's Anypoint Platform Creates Application Networks On-Prem And In The Cloud

MuleSoft improves its API-based network platform offering, Anypoint.

from Tom's IT Pro
via CERTIVIEW

Best Enterprise SSDs

After putting many of the top-rated enterprise SSDs through our rigorous tests, here are our best picks and links to full reviews and test results of the leading-edge enterprise SSDs available today.

from Tom's IT Pro
via CERTIVIEW

Red Hat's Ansible 2.1 Offers Azure Support, Network Automation

Red Hat adds Windows and Azure support, along with expanded network and container support in the latest version of Ansible.

from Tom's IT Pro
via CERTIVIEW

Salesforce Certification Guide: Overview And Career Paths

Salesforce is one of the premier customer relationship management (CRM) companies. It offers several different certifications in support of its robust product portfolio with numerous options for Salesforce professionals engaged in multiple job roles.

from Tom's IT Pro
via CERTIVIEW

CEH v9 Question of the Week: Prevent Future DoS Attacks

CEH-v9-QOWBlueSmith is an IT security consultant who has been hired on by an ISP that has recently been plagued by numerous DoS attacks. The ISP did not have the internal resources to prevent future attacks, so they hired Smith for his expertise. Smith looks through the company’s firewall logs and can see from the patterns that the attackers were using reflected DoS attacks. What measures can Smith take to help prevent future reflective DoS attacks against the ISP’s network?

A. Smith needs to tell the ISP to block all UDP traffic coming in on port 1001 to prevent future reflective DoS attacks against their network.
B. Smith should configure the ISP’s firewall so that it blocks FIN packets that are sent to the broadcast address of the company’s internal IP range.
C. Smith should have them configure their network equipment to recognize SYN source IP addresses that never complete their connections.
D. Smith should have the ISP block port 443 on their firewall to stop these DoS attacks.

 

Related Course
Certified Ethical Hacker v9



from
CERTIVIEW

Tuesday 24 May 2016

3 Things You Can Do Now To Prevent Shadow IT

What can you do to stop unauthorized use of cloud-technologies by your end-users? Here are three quick things you can do today to prevent shadow IT in your organization.

from Tom's IT Pro
via CERTIVIEW

Samsung Brings Two New All-In-One Thin Client Displays To Market

Samsung's new TC222L and TC242L monitors are capable of connecting to thin client providers such as Citrix, VMware and Microsoft to deliver a secure desktop computing experience at a much lower cost than traditional PCs.

from Tom's IT Pro
via CERTIVIEW

Nutanix' Xpress Hyperconverged Platform Targets SMBs

Nutanix Xpress is an all-in-one solution that includes all of the infrastructure required to power as much as 500 virtual machines, the hardware and software installed and licensed to enable the virtual infrastructure and backup data to public clouds.

from Tom's IT Pro
via CERTIVIEW

Monday 23 May 2016

The Other Windows 10 Shoe Drops For MCSA

A new Windows 10 exam for the Microsoft Certified Solutions Associate (MCSA) credential is now in development. Here's more details on the upcoming exam 70-698: Installing and Configuring Windows 10.

from Tom's IT Pro
via CERTIVIEW

River Logic Launches Prescriptive Analytics Cloud Platform Built On Azure

Long known for its business optimizer software packages, River Logic announced the release of its prescriptive analytics cloud platform, built on Azure.

from Tom's IT Pro
via CERTIVIEW

JFrog Security Product Xray To Join Artifactory Family

JFrog Xray gives teams a view into the big picture of the security of software components, including container images, software packages and binary artifacts.

from Tom's IT Pro
via CERTIVIEW

CCNA Data Center Question of the Week: Layer 3 Switching

CCNAQuestionWeek16

Which two Cisco Nexus switches are capable of Layer 3 switching? (Choose two.)

A. Cisco Nexus 7010
B. Cisco Nexus 5020
C. Cisco Nexus 5548
D. Cisco Nexus 2248
E. Cisco Nexus 2232

 

Related Resources
Cisco White Papers

Related Course
CCNA-DC – CCNA Data Center Boot Camp



from
CERTIVIEW

Friday 20 May 2016

CCNP R&S Question of the Week: Interface FastEthernet0/1

ccnpQoW04

Interface FastEthernet0/1 is configured as a trunk that permits all VLANs. The following command is configured:  monitor session 2 filter vlan 1 – 8, 39, 52

What is the result of the implemented command?

A. All VLAN traffic is sent to the SPAN destination interface.
B. Traffic from all VLANs, except 1 to 8, 39 and 52 are sent to the SPAN destination interface.
C. Filtering a trunked SPAN port is not supported.
D. The trunk’s native VLAN must be changed from its default VLAN 1.
E. Traffic from VLANs 1 to 8, 39, and 52 are sent to the SPAN destination port.

 

Related Courses
ROUTE – Implementing Cisco IP Routing v2.0
SWITCH – Implementing Cisco IP Switched Networks v2.0
TSHOOT – Troubleshooting and Maintaining Cisco IP Networks v2.0

Related Certification
CCNP Routing and Switching



from
CERTIVIEW

Thursday 19 May 2016

Dell Releases SCOS 7 For SC Storage Arrays

Dell's SCOS 7 provides major advances that, for the most part, fall into four key areas: efficiency, control, flexibility and ecosystem.

from Tom's IT Pro
via CERTIVIEW

Wednesday 18 May 2016

Surviving A Department Of Defense (DoD) Audit: Tips For The IT Pro

After serving as a subject matter expert for a company being audited by the DoD, I learned a lot about the process and the auditors doing their analysis. Here are some lessons learned from my experience that other IT Pros can use to their advantage.

from Tom's IT Pro
via CERTIVIEW

DDN's Flashscale Hyperconverged AFA Targets Big Data Analytics, HPC

DataDirect Networks (DDN) announced the upcoming release of its Flashscale Hyberconverged Al-Flash Array capable of scaling up and out.

from Tom's IT Pro
via CERTIVIEW

CEH v9 Question of the Week: Block Cipher

CEH-v9-QOWBlack

Which of the following encryptions are not based on a block cipher?

A. AES (Rijndael)
B. DES
C. Blowfish
D. RC4

 

Related Course
Certified Ethical Hacker v9



from
CERTIVIEW

Tuesday 17 May 2016

Swiftpage's New Act! Outlook Add-In Streamlines CRM Use

Act!, creator Swiftpage, announced a new Outlook add-in to integrate Act! with Outlook.

from Tom's IT Pro
via CERTIVIEW

How To Fill In PDF Forms Using PowerShell

Using a .NET library and a PowerShell module, you can automate filling in the information on multiple PDF forms. Trust me, this will come in handy when you least expect it!

from Tom's IT Pro
via CERTIVIEW

LogicWorks For AWS Releases Cloud Patrol Automation And Security Solution

Cloud Patrol, released today for LogicWorks and Amazon Web Services (AWS) customers, aims to bridge the gaps between developers, operations and security roles.

from Tom's IT Pro
via CERTIVIEW

Monday 16 May 2016

Can You Get A Computer Science Degree Without Gen-Ed Requirements?

Are there options available for those who want to get a computer science degree that don't involve other course requirements outside the major? Alas, no there aren't, and for some very good reasons.

from Tom's IT Pro
via CERTIVIEW

CCNA Data Center Question of the Week: Features of OTV

CCNAQuestionWeek18

Which three are features of Cisco OTV? (Choose three.)

A. Control plane-based MAC learning
B. Dynamic encapsulation
C. MAC address learning based on flooding
D. Pseudo wires and tunnels
E. Complex dual-homing
F. Native automated multihoming

 

Related Resources
Cisco White Papers

Related Course
CCNA-DC – CCNA Data Center Boot Camp



from
CERTIVIEW

Friday 13 May 2016

CCNP R&S Question of the Week: EtherChannel

ccnpQoW05Which set of configurations will result in the member ports on switch 1 and 2 to bundling into an EtherChannel?

A. Switch1(inf-range)# channel-group 1 mode active
Switch2(inf-range)# channel-group 1 mode auto

B. Switch1(inf-range)# channel-group 1 mode desirable
Switch2(inf-range)# channel-group 1 mode passive

C. Switch1(inf-range)# channel-group 1 mode on
Switch2(inf-range)# channel-group 1 mode auto

D. Switch1(inf-range)# channel-group 1 mode desirable
Switch2(inf-range)# channel-group 1 mode auto

 

Related Courses
ROUTE – Implementing Cisco IP Routing v2.0
SWITCH – Implementing Cisco IP Switched Networks v2.0
TSHOOT – Troubleshooting and Maintaining Cisco IP Networks v2.0

Related Certification
CCNP Routing and Switching



from
CERTIVIEW

Thursday 12 May 2016

TwistLock Announces Runtime Security Solution For Docker Containers

Twistlock Runtime is able to analyze the container images by building lists of expected behaviors for the images, then scans the containers as they are running, analyzing them and comparing them against expected behavior patterns.

from Tom's IT Pro
via CERTIVIEW

Wednesday 11 May 2016

ZeroStack Platform Launches Partner Program

ZeroStack is a relatively new offering in the hybrid and private cloud space. Bundling hardware appliances with a complete cloud software suite, ZeroStack partners will be positioned to deliver cloud services to their customers in hours instead of months.

from Tom's IT Pro
via CERTIVIEW

Windows 10 For IT Pros: Tutorials, Tips & Tricks

Here is a compilation of tips, tricks and solutions for IT professionals administering Windows 10 machines and networks.

from Tom's IT Pro
via CERTIVIEW

CEH v9 Question of the Week: SMB Over TCP/IP

CEH-v9-QOWGoldNetBIOS over TCP/IP allows files and/or printers to be shared over the network. You are trying to intercept the traffic from a victim machine to a corporate network printer. You are attempting to hijack the printer network connection from your laptop by sniffing the wire.

Which port does SMB over TCP/IP use?

A. 443
B. 179
C. 445
D. 139

 

Related Course
Certified Ethical Hacker v9



from
CERTIVIEW

Tuesday 10 May 2016

Biscom Secure File Transfer Update Brings UI Improvements And More

The latest version highlights an improved UI that includes HTML formatting and the ability to use logos in the email signature. But it’s not just a pretty face. Under the hood is an updated encryption engine.

from Tom's IT Pro
via CERTIVIEW

Docker Includes Container Scanning And Benchmarking In Latest Security Releases

As containers continue to be one of the most disruptive new technologies, and Docker continues to gain ground as the leader in containers, many users have asked about how to best handle security operations for their containerized applications

from Tom's IT Pro
via CERTIVIEW

Dell Announces Major Release To Database Replication Tool SharePlex

The database replication software originally replicated data only between Oracle databases, but improvements in recent versions extend support for replicating databases between vendors. This latest release continues that trend.

from Tom's IT Pro
via CERTIVIEW

7 Obvious Security Precautions Companies Forget to Take

hackersecurity460207313It seems that even with all the examples of breaches and compromises caused by the lack of company security across the last two decades, organizations continue to move forward with a “same as it ever was” mentality. Organizations aren’t learning from others’ mistakes.

I predict that in 2016, hackers will continue to compromise organizations’ systems in ways that could have been prevented with common sense security solutions or by stress-testing their own implementations.

Here are seven obvious, but often forgotten, security measures you should have in place:

  1. Don’t leave default configurations, settings, or other account credentials on your computer or other device.
  1. Update to the most current product versions and patches.

Testing should always be performed to ensure productivity and functionality, but staying on older versions is usually less secure.

  1. Separate different categories of data into different storage containers.

For example, a customer’s billing data should be separate from their login credentials, which should also be separate from their profile settings, preferences and activity history.

  1. Encrypt stored user data and provide communication encryption.
  1. Log all activity and events, including system events, software activities and user activities.
  1. Separate OS files from data storage on distinct storage devices.
  1. Secure your website against injection attacks, including Structured Query Language (SQL) injection.

To do this, filter input against length requirements while pattern matching against a known list of malicious signatures, and escaping metacharacters. Metacharacters are characters assigned a special meaning by a programming language or execution environment.

 These and other standard security concepts are well established, but not as widely adopted as they should be. As new organizations come online, expand their Internet presence, or roll out new products, they often make the same security mistakes as many others did before them.

As consumers, we’ve become created a lax security culture. We have established the trend that we will purchase new products in spite of flaws and failures. Often the early adopters of a new product are more like beta testers than typical consumers, willing to live with and work around problems just for the sake of getting the new thing in their hands. But that doesn’t mean we have to continue to be willing beta testers.

We should only purchase products and use services that have a strong proven track record when it comes to security. One way encourage better products on the market, and deter hackers, is to push for more transparency. Organizations should publish their security standards, thus allowing us to review their practices and make informed decisions about who is doing the better job at protecting our information. This idea is already established in the digital certificate marketplace through a certificate authority’s publication of its certificate practices statements (CPS). A similar strategy or publishing security practices should be applied across most or all of IT-related industries. Perhaps if we, as consumers, demand transparency and stronger security features from our vendors and suppliers, maybe 2016 will be the year that cybersecurity takes a huge leap forward.

Read more cybersecurity tips and precautions in the white paper Cybersecurity Predictions for 2016.



from
CERTIVIEW

Monday 9 May 2016

How To Make Windows 10 Look Like Other Windows Versions

With a free software download and a few minutes of setup time, you can have your entire Windows 10 OS (or just individual components) looking just like the familiar Windows 7 (or other version of Windows) interface.

from Tom's IT Pro
via CERTIVIEW

Microsoft Doubles Down On Cloud With New Career Center And Training

Microsoft is trying to fuel its push into the cloud with more human capital and has recently launched a cloud-oriented IT Career Center as well as free access to cloud services and related training to help interested IT pros get up to speed on cloud tech.

from Tom's IT Pro
via CERTIVIEW

CCNA Data Center Question of the Week: FabricPath

CCNAQuestionWeek12

Which two Cisco data center devices can support FabricPath? (Choose two.)

A. Cisco Nexus 5500 Series Switches
B. Cisco Nexus 1000V
C. Cisco Nexus 7000 Series Switches
D. Cisco Nexus 4900 Series Switches
E. Cisco MDS 9500 Series directors

 

Related Resources
Cisco White Papers

Related Course
CCNA-DC – CCNA Data Center Boot Camp



from
CERTIVIEW

Friday 6 May 2016

How To Install Remote Server Administration Tools (RSAT) In Windows 10

Remote Server Administration Tools (RSAT) allow you to manage multiple remote Windows servers from your local Windows 10 PC. This tutorial will show you how to install and setup RSAT in Windows 10.

from Tom's IT Pro
via CERTIVIEW

Alcatel-Lucent Enterprise Announces New Products At Interop

Alcatel-Lucent Enterprise runs its new offerings in a freezer at Interop.

from Tom's IT Pro
via CERTIVIEW

Open Source Keynote Panel At Interop

Is Open Source software destroying the value in existing industry companies, or is there something for everyone?

from Tom's IT Pro
via CERTIVIEW

Accelerated Launched HERO 9400-UA Network Appliance

Acclerated brings an easy to use, standalone, NFV ready network appliance to Interop.

from Tom's IT Pro
via CERTIVIEW