Tuesday 31 January 2017

EC-Council Certification Guide: Overview And Career Paths

EC-Council offers some of the best-known ethical hacking and penetration testing certifications. This guide will help you get started with EC-Council's popular CEH and LPT credentials as well as other information security certs and career paths.

from Tom's IT Pro
via CERTIVIEW

How to Build Composite DSC Resources

You're not constrained by the resources Microsoft builds in to desired state configuration technology. You can build your own.

from Tom's IT Pro
via CERTIVIEW

Monday 30 January 2017

Best System Administrator Certifications For 2017

Every IT shop needs a competent System Administrator. Those who occupy or aspire to this position should look into one or more of these best system administrator certifications for 2017.

from Tom's IT Pro
via CERTIVIEW

Best Cloud Backup for Business 2017

Before settling on a cloud backup option for your business, check out our buying advice and top picks, which include Amazon S3, Code 42 CrashPlan, OpenDrive, Microsoft Azure and more.

from Tom's IT Pro
via CERTIVIEW

How to Stop Windows 10 from Rebooting After Updates

Don't lose your work by changing some settings in Windows 10 that will prevent your machine from automatically rebooting after loading an update.

from Tom's IT Pro
via CERTIVIEW

The Best Digital Asset Management Software for 2017

We reviewed the top four digital asset management applications to recommend the best software for your company. Read our recommendations here.

from Tom's IT Pro
via CERTIVIEW

Thursday 26 January 2017

Data Privacy Day: Why to Care and What to Do

On January 27, 2014, when the United States Congress adopted S. Res. 337, a nonbinding resolution expressing support for the designation of a “National Data Privacy Day” to be observed on January 28, there wasn’t a lot of time to get the word out, even though the event had been around awhile.

But that’s the date on which I first became aware of Data Privacy Day, and in the years since the bill’s passage, I’ve been a champion of personal data privacy as well as data privacy at work.

The choice of January 28 was no fluke. On that date in 1981, the Council of Europe held the Convention for the Protection of Individuals with Regard to Automatic Processing of Personal Data. Luckily, they shortened the name a bit for the event and signed Convention 108, the first legally binding international treaty dealing with privacy and data protection.

Data Privacy Day began in the U.S. and Canada on January 2008 as an extension of the Data Protection Day celebration in Europe. The international event promotes awareness of privacy and data protection best practices. Recognized in the U.S., Canada and 27 European countries, Data Privacy Day’s educational initiative is to focus on raising awareness among users and businesses of the importance of protecting the privacy of their data online. This has become even more important as social networking has increased in popularity over the years as have security breaches.

Data Privacy Day’s goal is to educate and empower businesses, consumers and families with the knowledge and best practices to better protect themselves from hackers, viruses and malware that can put their information as risk. Data Privacy Day brings together not only technology folks but also government officials, educators, those involved with nonprofits and leaders across industry sectors.

So what can you do about data privacy? If the security of your data and privacy matters to you, Data Privacy Day is a great time to start actively protecting your info. Target, Sony and Yahoo all learned the hard way. It’s in the best interest of every business to practice good data stewardship or they’ll be the next lead story on CNN or the next big headline in The New York Times. Whether it’s your bank, doctor, pharmacy or even workplace, encourage them to protect your data sufficiently. Don’t ever assume your data is protected. Be your own data privacy advocate.

The National Cyber Security Alliance coordinates the promotion of Data Privacy Day activities. Here are some of the things they encourage us to do to promote Data Privacy Day:

  • Socialize it. To protect your personal data, you don’t have to be afraid of social media. Tweet privacy tips. Post messages on your Facebook and LinkedIn accounts. You can use the official Data Privacy Day hashtag #PrivacyAware and follow @DataPrivacyDay to stay up to date on all of the latest Data Privacy Day tips to share with your connections and followers.
  • Make it official. You can suggest your organization show its support of Data Privacy Day by becoming an official Data Privacy Day Champion. Last year, more than 450 organizations enrolled as Data Privacy Day Champions. It’s quick and easy to sign up.
  • Make it personal. Data privacy starts at home, so make sure your loved ones know the risks to their personal information, especially children and teenagers who may be more likely to overshare on social media channels. Secure your information if you have a shared accounts on your PC, tablets or smart TVs that are connected to multimedia outlets like Netflix, Hulu, Amazon Prime and iTunes.

Related Courses
Cybersecurity Foundations
Legal Issues in Information Security
Certified Information Privacy Professional US Private-Sector (CIPP/US) Prep Course



from
CERTIVIEW

Microsoft Outlines Training and Certification for Big Data

There's a data-driven infrastructure behind Cortana that Microsoft opened to high-end customers for development and data analytics capability. That infrastructure is big and complicated, so Microsoft is backing it up with beaucoups of training.

from Tom's IT Pro
via CERTIVIEW

How to Save File Permissions for Transfer

A small script can save you some major headaches when it comes time to transfer files.

from Tom's IT Pro
via CERTIVIEW

Wednesday 25 January 2017

HP Recalls 101,000 Laptop Batteries

HP is expanding a recall on laptop batteries that can overheat and cause computer damage or even fire.

from Tom's IT Pro
via CERTIVIEW

Microsoft's Intune for Education Makes Admin Job Easier

Microsoft isn't content to let Google own the education market for laptops. The software giant just took the wraps off its new Intune for Education platform that should make it easier for IT administrators to set up, configure and manage groups of Windows

from Tom's IT Pro
via CERTIVIEW

Glassdoor Announces Best Jobs for 2017 Include Tech

Technology jobs dominate the 2017 report on the Best Jobs in America from Glassdoor. Data Scientists, in fact, top the list.

from Tom's IT Pro
via CERTIVIEW

Tuesday 24 January 2017

Amazon's Alexa May be the Next Essential Business Tool

FinancialForce thinks Amazon's Alexa smart digital assistant could be your next desk companion at work, helping you complete tasks via voice command.

from Tom's IT Pro
via CERTIVIEW

Google's New Chromebooks Add Functionality for Schools

New Acer and Asus Chromebooks will let students use the camera as a microscope and a Wacom stylus for taking notes.

from Tom's IT Pro
via CERTIVIEW

Apple Tops RescueCom's Computer Reliability Report

Apple, Samsung and LG score well on RescueCom's annual Computer Reliablity Report, while Toshiba falls flat.

from Tom's IT Pro
via CERTIVIEW

ISACA Certification Guide: Overview And Career Paths

ISACA offers certifications in systems auditing, security management and IT governance and risk. This certification guide covers ISACA's CISA, CISM, CGEIT and CRISC certifications, the CSX program for cybersecurity, and related career paths.

from Tom's IT Pro
via CERTIVIEW

A Guide to Web Hosting Options

Before you decide on a type of web hosting, there are some things you should consider.

from Tom's IT Pro
via CERTIVIEW

Monday 23 January 2017

Google Chrome OS for Work: What You Need to Know

The Chrome operating system could be the solution to your company's next hardware upgrades. However, there are a few facts you should have before you decide.

from Tom's IT Pro
via CERTIVIEW

What Businesses Need to Know About Virtual Reality

The tech world is wild about Virtual Reality (VR). But like other potentially world-changing technologies, you need to understand a few VR basics before taking the leap.

from Tom's IT Pro
via CERTIVIEW

Getting Started with Ansible on Windows

Now that Microsoft embraces open source, you can use Ansible DevOps tools on Windows, if you know how.

from Tom's IT Pro
via CERTIVIEW

Sunday 22 January 2017

Why TOGAF is the Framework to Unite IT and the Business

Business transformation is driving a change in the relationship between IT and the business. Internal and external forces are requiring organizations to be more responsive to customer needs and achieve operational and technological efficiencies. IT professionals traditionally only had to focus on the technology architecture. Now, the overall enterprise architecture must be considered in order to eliminate barriers between technology capabilities and business strategy.

What is TOGAF®?

The Open Group’s Architecture Framework, TOGAF, is a globally recognized standard for developing enterprise architecture. The comprehensive framework includes techniques and a set of supporting tools to provide organizations with the capability to ensure all architectural components are aligned to the strategic direction of the business.

The Benefits of TOGAF

  • Ensure that everyone speaks the same language.
  • Avoid lock-in to proprietary solutions by standardizing on open methods for enterprise architecture.
  • Save time and money, and utilize resources more effectively.
  • Achieve demonstrable return on investment (ROI).

TOGAF Summary

The TOGAF framework can best be illustrated by the following five layers, as defined by The Open Group:

  1. Architecture Principles, Vision and Requirements: This layer describes the initial phase of an architecture development cycle. It includes information about defining the scope, identifying the stakeholders, creating the architecture vision, and obtaining approvals.
  2. Business Architecture: Describes the development of a business architecture to support an agreed architecture vision.
  3. Information Systems Architecture: This layer describes the development of information systems architectures for an architecture project including the development of data and application architectures.
  4. Technology Architecture: This layer describes the development of the technology architecture for an architecture project.
  5. Architecture Realization: This layer is the realization of the architectural components that are necessary for driving business value.

Traditionally, IT professionals have been focused on just the Technology Architecture layer, as well as specific technologies and technology solutions. Limiting the focus to a single layer is equivalent to working in a silo—making it nearly impossible to achieve a holistic view of the business. Attention needs to be devoted to all layers to ensure proper alignment with business principles, vision, requirements and architecture.

Organizations increasingly require IT professionals to gain a more thorough understanding of the business to ensure that technology solutions adequately support business requirements, vision and strategy. Incorporating TOGAF methods facilitates an understanding of the business and achieves IT results that help drive business value.

For a more detailed look at how organizations can ensure technology is aligned with business strategies, see my white paper, The Power of Linking Business Analysis and TOGAF® to Achieve IT Results.

Related Courses
TOGAF 9.1 Level 1 and 2



from
CERTIVIEW

Friday 20 January 2017

Microsoft Giving Away Windows 10 Upgrades to CSP Subscribers

Small-to-medium businesses who want enterprise-level security can now upgrade Windows 7 and 8.1 machines for free if they sign up for a Cloud Solution Provider subscription.

from Tom's IT Pro
via CERTIVIEW

13 Best IT Training and Certification Resources 2017

Are you ready to move on or move up but can't find the right opportunity? Maybe it's time for you to invest in yourself. Check out our list of the 13 best IT certification and training resources and get started today.

from Tom's IT Pro
via CERTIVIEW

Cisco Learning Revamps Data Center Certifications and Adds Training

CCNA and CCNP exams jump from v1 to v6 status, indicating it's time to rework the entire Data Center certification path at Cisco. The company is also offering training on Big Data and Analytics with focus on how data centers, Big Data clusters, and Data V

from Tom's IT Pro
via CERTIVIEW

Thursday 19 January 2017

Apple Certification Guide: Overview And Career Paths

Apple offers certifications for both IT professionals working in OS X environments, as well as creative professionals, who work with Apple's creative suites including Final Cut Pro X and Logic Pro X.

from Tom's IT Pro
via CERTIVIEW

Data Privacy Day a Perfect Time to Improve Security Policies

Use the upcoming January 28 as an excuse to educate employees and improve procedures to protect your privacy and security.

from Tom's IT Pro
via CERTIVIEW

Wednesday 18 January 2017

Report: IT Security Demands Outpace Available Talent

The majority of IT security professionals report that finding and hiring qualified people is rough, which leaves companies open to data breaches, malware and other big threats.

from Tom's IT Pro
via CERTIVIEW

Best All-in-One Business Printers

We tested five small business printers from large manufacturers such as Brother, Epson, HP and Xerox, which all scan, fax, print and copy. Read more here.

from Tom's IT Pro
via CERTIVIEW

Xerox WorkCentre 6027 Laser Printer Review

The Xerox WorkCentre 6027 produces the brightest and clearest color prints we’ve seen. See how its speed and quality compares with other office printers.

from Tom's IT Pro
via CERTIVIEW

HP LaserJet Pro MFP M130fw Printer Review

The $219.99 HP LaserJet Pro MFP M130fw is an affordable, fast black-and-white laser printer, but the ink cartridges will cost you. Read our full review here.

from Tom's IT Pro
via CERTIVIEW

HP OfficeJet Pro 8720 All-in-One Printer Review

The HP OfficeJet Pro 8720 produces bright, bold black-and-white prints. See how its speed and quality compare with other low-cost office printers.

from Tom's IT Pro
via CERTIVIEW

Epson WorkForce Pro WF-5690 InkJet Printer with PCL/Adobe PS Review

The reasonably priced Epson WorkForce Pro WF-5690 creates quality color prints and can handle a heavy workload. See how it compares with other office printers we tested.

from Tom's IT Pro
via CERTIVIEW

Brother MFC-J5830DW Business Smart Plus Color InkJet All-in-One Printer Review

For the price, the Brother MFC-J5830DW Business Smart Plus inkjet printer works well, and it includes a generous two-year warranty.

from Tom's IT Pro
via CERTIVIEW

Tuesday 17 January 2017

Microsoft: Windows 7 Can't Keep Your Business Secure

Microsoft is warning businesses to upgrade to Windows 10 because 7 is too outdated to keep up with security patches.

from Tom's IT Pro
via CERTIVIEW

PMI Certification Guide: Overview And Career Paths

The Project Management Institute offers project management certifications for individuals at all career levels. This certification guide will help you get started with PMI's most popular PMP credential as well as other certs and career paths.

from Tom's IT Pro
via CERTIVIEW

Best and Worst Hacking in Movies

Hollywood loves depictions of computer hacking on film. Some are pure gold. Others are head-spinning dreck.

from Tom's IT Pro
via CERTIVIEW

Monday 16 January 2017

3 Essentials to Avoid IT Project Failure

Projects are often complex, made up of a large number of moving pieces and bring numerous challenges to those involved. The reality is projects don’t always go the way we want them to. We often find ourselves being asked to do more with less and at a faster pace than we’re comfortable with. On occasion, we are successful in our efforts despite these restrictions.

Many key factors contribute to project success, but three of the fundamentals stand out—stakeholder identification and analysis, effective communication, and identifying project requirements, managing stakeholder expectations and scope of work.

Stakeholders

Stakeholders may affect or be affected by the project—through a project decision, activity or outcome—or they may simply perceive themselves to be affected. The impact or perceived impact can be either positive or negative in nature.

Most projects have a large number of stakeholders. Identifying all stakeholders increases the chance of project success. You must secure and document relevant information about their interests, interdependencies, influences, potential involvement, and probable impact on the project definition, execution and final results. After obtaining this information, classify the stakeholders according to their characteristics. This will make it easier to develop a strategy to manage each stakeholder. An increased focus on key relationships is critical to project success.

Communication

How do you manage expectations? Through communication. It’s vitally important that there is a well-defined communication plan tailored to fit the project and stakeholders.

One component of critical thinking is to learn by questioning. The Project Management Institute (PMI®) indicates that 90 percent of a project manager’s job is communication, however, it is not limited to just talking. Proper communication involves listening, reading reports, generating reports, filtering information from one group to another, etc. To do this effectively, you need a well-defined communication management plan. The creation of any plan like this can be broken down into six questions that need to be asked continually: Who, What, When, Where, How and Why?

For example:

  • Who needs to be communicated to?
  • What needs to be communicated?
  • When does that need to take place?
  • Where does it need to happen?
  • How is it going to happen?
  • Why does it need to happen?

Project Requirements, Stakeholder Expectations and Scope of Work

Before beginning your project, make sure you have clarified all goals, objectives and requirements. Obtaining clarity on what is required and ultimately gaining buy-in from the major stakeholders are crucial. These requirements, along with related goals, objectives and deliverables, become the scope of work that must be completed and will be refined over the life of your project. But if you do not start with a solid understanding of what you’re trying to achieve, you might as well not begin at all.

It will be difficult, if not impossible, to achieve success from a stakeholders’ point of view if there is a lack of clarity concerning their project perception and expectations. This is why stakeholders must be identified and their expectations analyzed as early in the project lifecycle as possible.

Keeping the three key steps—identification and analysis of project stakeholders, the creation and use of an effective communication plan, and proper identification of project requirements, stakeholder expectations and accurate decomposition of the scope of work—at the forefront during project planning and execution greatly enhances the ability to achieve success.

For a deeper dive into how to guarantee project achievement, view my white paper, Three Steps to Ensure the Success of Your IT Projects.

Related Courses
IT Project Management
Project Management Fundamentals
Project Management, Leadership, and Communication
Requirements Development, Documentation and Management



from
CERTIVIEW

Panasonic Rugged Tablets Ready for the Jobsite

The FZ-A2 is a fully rugged, 10.1-inch Android tablet, while the FZ-Q2 is a semi-rugged 2-in-1 Windows tablet.

from Tom's IT Pro
via CERTIVIEW

Friday 13 January 2017

8 Best Microsoft Office 365 Productivity Add-Ons

Add-ons can supercharge your Office 365 productivity. Here are the seven you shouldn't try to live without.

from Tom's IT Pro
via CERTIVIEW

How to Integrate Ansible and DSC

Using Ansible as the orchestration engine to deliver DSC configurations to servers is an excellent way to take advantage of both technologies.

from Tom's IT Pro
via CERTIVIEW

Report Outlines Best and Worst Cities for STEM Jobs in 2017

WalletHub recently released its top 10 best and 10 worst metropolitan areas for STEM professionals to find work.

from Tom's IT Pro
via CERTIVIEW

Thursday 12 January 2017

Wednesday 11 January 2017

Apple, Google Greening the IT Sector

The new Greenpeace Click Clean report says Apple, Google, Facebook and Switch are leading the charge to green the IT sector.

from Tom's IT Pro
via CERTIVIEW

Best App Maker Software for Business 2017

Looking for the best app maker software for your company? We evaluated AppMachine, BuildFire, GoodBarber and ShoutEm, among others.

from Tom's IT Pro
via CERTIVIEW

How to Best Lead a Multigenerational IT Team

Baby boomers, millennials, gen Xers, silents and gen zers all pose different challenges to managers in the workplace. Here's how to align your team.

from Tom's IT Pro
via CERTIVIEW

Tuesday 10 January 2017

Want a Strong ITIL Strategy? Start with the Right People

Many ITIL® training alums may wonder, “Now that I’ve learned these best practices, how do I actually implement them in my workplace?”

An effective ITIL strategy is the product of a concerted focus on people, process and technology, as well as an ongoing, cost effective and valuable IT service management (ITSM) practice.

While processes and technology play key roles in ITSM, the role of people resources and capabilities cannot be understated. When entering an organization, people start out as a resource (raw material). Training and skills development help your people mature into capable teams that have the ability to carry out your ITIL initiative, execute your processes and deliver value to customers and users. Without an ongoing training program, your ITIL initiative is at risk.

Poorly trained managers and staff:

  • Lack the understanding and motivation to drive the ITIL initiative forward, which puts the success of IT Service Management at risk.
  • Lack the skills and knowledge to implement the processes and build functional teams.

With a concerted training program and a training plan for each role, your team will become a unified powerhouse that will propel your ITSM initiative to long-term success. Service and process owners will carry out their roles effectively, ensuring that quality robust services are defined while supporting processes guarantee a quality delivery. Practitioners—the individuals and teams carrying out the various steps of your processes—will have the skills and understanding to execute the processes consistently and efficiently, delivering high availability and performance of your services.

Your staff may have completed the first step—ITIL Foundation training—but that only establishes ITIL groundwork. You still need the skilled people capabilities to truly be successful with your ITIL initiative. In order to equip people assets, your staff’s foundational knowledge must be enhanced with ITIL Intermediate training.

For more tips on how to implement ITIL’s best practices into your organization, see the white paper, You’ve Completed ITIL® Foundation: Now How to Implement It.

Related Training
ITIL Foundation
ITIL Intermediate courses



from
CERTIVIEW

How To Become A Mobile App Developer

It requires dedication and time to learn all the facets of mobile app development, but it's a growing area in IT.

from Tom's IT Pro
via CERTIVIEW

How to Become a Mobile App Developer

It requires dedication and time to learn all the facets of mobile app development, but it's a growing area in IT.

from Tom's IT Pro
via CERTIVIEW