Wednesday, 30 December 2015
Making inroads in the sales enablement space
from
via CERTIVIEW
How To Find And Download Desired State Configuration (DSC) Resources
from Tom's IT Pro
via CERTIVIEW
CISSP Question of the Week: Security Management Life Cycle
CISSP Question of the Week courtesy of Transcender Labs.
As your organization’s security administrator, you are reviewing the audit results to assess if your organization’s security baselines are maintained. In which phase of the security management life cycle are you engaged?
A. Plan and Organize
B. Implement
C. Operate and Maintain
D. Monitor and Evaluate
The correct answer is D.
You are engaged in the Monitor and Evaluate phase of the security management life cycle. This phase includes the following components:
- Review logs, audit results, metrics, and service level agreements.
- Assess accomplishments.
- Complete quarterly steering committee meetings.
- Develop improvement steps for integration into Plan and Organize phase.
- Reviewing audits is not part of any of the other phases.
Related Course
CISSP Certification Prep Course
CISSP Question of the Week Series
- CISSP Question of the Week: Pillar of Basel II
- CISSP Question of the Week: Implement Redundant Servers
- CISSP Question of the Week: Terrorist Attacks
- CISSP Question of the Week: Customer Credit Card Information
- CISSP Question of the Week: Complex Instruction Set Computers
- CISSP Question of the Week: Asymmetric Encryption
- CISSP Question of the Week: OSI Layer for Formatting Data
- CISSP Question of the Week: Secure Communications
- CISSP Question of the Week: Biometric System and Fingerprinting Technology
- CISSP Question of the Week: Security Management Life Cycle
from
CERTIVIEW
Looking Forward: The 2016 Security Landscape
from
via CERTIVIEW
Tuesday, 29 December 2015
We’re focused on adding more value to the existing IT infrastructure: Alok Ohrie, MD, Dell India
from
via CERTIVIEW
Getting Your Money's Worth Out Of Unified Communications
from Tom's IT Pro
via CERTIVIEW
FireEye reveals new, evolving threats to iOS users
from
via CERTIVIEW
In2IT Technologies brings Microsoft cloud to Bhubaneswar to help local businesses surge ahead and grow faster
from
via CERTIVIEW
Monday, 28 December 2015
IT Help Desk Employment Looking Up For 2016
from Tom's IT Pro
via CERTIVIEW
IT University and PwC India enter into a strategic partnership to develop talent for the cyber security industry
from
via CERTIVIEW
Future Lifestyle signs up with Cloudcherry to create a delightful customer experience
from
via CERTIVIEW
PMP Formula of the Week: Three-point Estimate
You are determining activity duration estimates and one of your colleagues suggests using a three-point estimate. What is the primary advantage of this method?
A. Three points, rather than one, improve the accuracy of the activity duration estimate.
B. It is always preferable to consider three opinions instead of just one.
C. The best case and worst case scenarios are factored into the estimate.
D. Team members will provide the most accurate estimates.
The correct answer is A.
Both answer C and D are components of the three-point estimate, but not the primary advantage of the method. Answer B is incorrect because three opinions may not result in three different estimates.
Related Resources
PMP Exam Prep Mobile App
Project Management White Papers
Related Courses
IT Project Management
Project Management Fundamentals
Project Management, Leadership, and Communication
PMP Exam Prep Boot Camp
PMP Formula of the Week Series
- PMP Formula of the Week: Forecasting a Necessary CPI
- PMP Formula of the Week: Forecasting a Necessary CPI Based on an ETC
- PMP Formula of the Week: Ahead or Behind Schedule
- PMP Formula of the Week: Point of Total Assumption
- PMP Formula of the Week: Rent, Lease or Buy?
- PMP Formula of the Week: Risky Task
- PMP Formula of the Week: Earned Value Management Methodology
- PMP Formula of the Week: Schedule Performance Index of 1
- PMP Formula of the Week: TCPI
- PMP Formula of the Week: Fixed-Price Incentive Fee Contract
- PMP Formula of the Week: S-Curve
- PMP Formula of the Week: Current Project Status
- PMP Formula of the Week: Project Schedule Information
- PMP Formula of the Week: Random Defective Article
- PMP Formula of the Week: Confidence Level
- PMP Formula of the Week: EV?
- PMP Formula of the Week: What is BAC?
- PMP Formula of the Week: CPI of 1.0
- PMP Formula of the Week: Product Manufacturing Choice
- PMP Formula of the Week: SV of 338
- PMP Formula of the Week: Three-point Estimate
from
CERTIVIEW
How startups are taking the concept of IoT forward
from
via CERTIVIEW
Sunday, 27 December 2015
Top Transformative Technology Trends in Networking for 2016
The cloud will gain even greater traction: According to IDC, more than half of all IT spending is..
from
via CERTIVIEW
How a satellite-based Internet learning is helping doctors in remote areas to set standard education
from
via CERTIVIEW
Friday, 25 December 2015
CCNP Security Question of the Week: NAT Control on Cisco ASA Version 8.3
What is the default behavior of Network Address Translation (NAT) control on Cisco ASA Version 8.3?
A. NAT control has been deprecated on Cisco ASA Software Version 8.3.
B. It will prevent traffic from passing from one enclave to the next without proper access configuration.
C. It will allow traffic to pass from one enclave to the next without proper access configuration.
D. It will deny all traffic.
Answer: A.
As of version 8.3 of the ASA, NAT control is no longer supported.
Related Resources
Cisco White Papers
Related Course
CCNP Security e-Camp
CCNP Security Question of the Week Series
- CCNP Security Question of the Week: Cisco ASA Security Context
- CCNP Security Question of the Week: Authenticating ASDM Users
- CCNP Security Question of the Week: Layer 5–7 Policy Maps
- CCNP Security Question of the Week: 802.1X
- CCNP Security Question of the Week: IPS Updates
- CCNP Security Question of the Week: IPsec VPN Tunnels
- CCNP Security Question of the Week: AnyConnect VPN Client
- CCNP Security Question of the Week: ASA AIP-SSM and ASA AIP-SSC
- CCNP Security Question of the Week: Disable DHCP Server Service
- CCNP Security Question of the Week: Cisco ASA Security Appliance Access List
- CCNP Security Question of the Week: Network Address Translation
- CCNP Security Question of the Week: Harden a Switch
- CCNP Security Question of the Week: SSH Login
- CCNP Security Question of the Week: Packet-Tracer Command
- CCNP Security Question of the Week: SSL Ciphers
- CCNP Security Question of the Week: VLAN Hopping
- CCNP Security Question of the Week: DHCP Server Service
- CCNP Security Question of the Week: Default Behavior of an Access List
- CCNP Security Question of the Week: NAT Control on Cisco ASA Version 8.3
- CCNP Security Question of the Week: IPS Anomaly Detection Features
- CCNP Security Question of the Week: Bogus IPv6 Addresses
from
CERTIVIEW
Thursday, 24 December 2015
MobiKwik updates Android app for visually challenged users
from
via CERTIVIEW
Commvault opens new research and innovation center in Bengaluru
from
via CERTIVIEW
Wednesday, 23 December 2015
Data science and predictive analytics enabling better hiring mechanisms for enterprises
from
via CERTIVIEW
Object-Oriented PowerShell Module Design
from Tom's IT Pro
via CERTIVIEW
Best IT Certifications For 2016
from Tom's IT Pro
via CERTIVIEW
Nutanix Files For $200 Million IPO
from Tom's IT Pro
via CERTIVIEW
Security+ Question of the Week: Definition of a Threat
What is the definition of a threat in the context of risk management?
A. Any aspect of the environment which could be exploited
B. Any circumstance or event which could harm an asset
C. The probability of an unwanted event occurring within a specific time period
D. The amount of loss that could occur should an asset be harmed
The correct answer is B.
A threat is any circumstance or event which could harm an asset.
A vulnerability is any aspect of the environment which could be exploited. The annualized rate of occurrence (ARO) is the probability of an unwanted event occurring within a specific time period. The single loss expectancy (SLE) is the amount of loss that could occur should an asset be harmed.
Related Courses
Security+ Prep Course (SY0-401)
Security+ Certification Boot Camp (SY0-401)
Security+ Question of the Week (SY0-401) Series
- Security+ Question of the Week: Deploying a Firewall
- Security+ Question of the Week: Flood Guard
- Security+ Question of the Week: iSCSI
- Security+ Question of the Week: Wireless MAC Filtering
- Security+ Question of the Week: Quantitative Analysis
- Security+ Question of the Week: Contracts
- Security+ Question of the Week: System Clock
- Security+ Question of the Week: Security Breach Incident Response
- Security+ Question of the Week: Reduce Electrostatic Discharge
- Security+ Question of the Week: Planting Malware
- Security+ Question of the Week: Network Hardening
- Security+ Question of the Week: Fuzzing
- Security+ Question of the Week: Single Sign‐On
- Security+ Question of the Week: Digital Envelope
- Security+ Question of the Week: Confining Communications to a Subnet
- Security+ Question of the Week: DoS Tool
- Security+ Question of the Week: Intranet Defense
- Security+ Question of the Week: War Driving
- Security+ Question of the Week: User Rights and Permissions Checks
- Security+ Question of the Week: Third Party Partnerships
- Security+ Question of the Week: Indicator of Integrity
- Security+ Question of the Week: Incident Response Procedure
- Security+ Question of the Week: Good Password Behavior
- Security+ Question of the Week: Tailgating
- Security+ Question of the Week: Differential Backup
- Security+ Question of the Week: Government and Military
- Security+ Question of the Week: Backdoor
- Security+ Question of the Week: Wrong Name or Address
- Security+ Question of the Week: Increase in Email Hoaxes
- Security+ Question of the Week: Suspicious Location-Based Messages
- Security+ Question of the Week: Session Hijack
- Security+ Question of the Week: Definition of a Threat
from
CERTIVIEW
Schneider Electric seeks to transform Indian business landscape with Internet of Things solutions
from
via CERTIVIEW
Wipro to acquire Viteos group
from
via CERTIVIEW
Tuesday, 22 December 2015
Technology and trends for 2016 by Axis Communications
from
via CERTIVIEW
Letv Superphones boasts mirror-surfaced fingerprint recognition technology
from
via CERTIVIEW
Avaya supports India’s digital transformation with university outreach programme
from
via CERTIVIEW
Snapdeal and Microsoft jointly hold a two-day hackathon
from
via CERTIVIEW
Jayantha Prabhu is now CIO-Essar
from
via CERTIVIEW
L&T leading the way to make Jaipur India’s first Smart City
from
via CERTIVIEW
We are going to build the world’s IT infrastructure: Michael Dell, CEO, Dell
from
via CERTIVIEW
NetApp Acquires SolidFire For $870 Million
from Tom's IT Pro
via CERTIVIEW
Quintype join hands with Swarajya to enhance its digital platform
from
via CERTIVIEW
Monday, 21 December 2015
Top technology trends to watch out for in 2016 in the server space
from
via CERTIVIEW
Internet grows to 299 mn domain names in the third quarter of 2015
from
via CERTIVIEW
Work-from-home is a preferred option for most: Wisdomjobs.com
from
via CERTIVIEW
Lean planning for disproportionate outcomes – Anil Nair, Managing Director & CEO at AGC Networks
from
via CERTIVIEW
The Perpetual Cycle Of Self- And Career-Development
from Tom's IT Pro
via CERTIVIEW
Autos just a click away in Noida as Jugnoo forays into the region
from
via CERTIVIEW
TCS develops mobile, digital inventory platform for Mumbai Mobile Crèches
from
via CERTIVIEW
IBM Certification of the Week: IBM Certified Analyst — i2 Analyst’s Notebook V8.9
An intelligence analyst wants to import telephone record data to look for patterns of activity. Particularly the dates and times of telephone calls between two key suspects. Which is the best import design for the analyst to use?
A. Sequence of transactions
B. Network of telephone calls
C. Sequence of telephone calls
D. More complex association chart
The correct answer is D.
Related Certification
IBM Certified Analyst — i2 Analyst’s Notebook V8.9
Related Certification Courses
i2 Analyst’s Notebook Essentials
i2 Analyst’s Notebook Importing and Analysis
IBM i2 Analyst’s Notebook Customizing and Semantics
IBM i2 Analyst’s Notebook Premium Essentials
IBM Certification of the Week Series
- IBM Certification of the Week: IBM Certified Administrator — Tivoli Storage Manager V7.1.1
- IBM Certification of the Week: IBM Certified Analyst — i2 Analyst’s Notebook V8.9
from
CERTIVIEW
Surat Diamond Association and Microsoft Aim to Enable 20,000 MSMEs in Gujarat to adopt cloud in 12 months
from
via CERTIVIEW
Top 5 Apps to keep handy this Christmas and New Year season
from
via CERTIVIEW
Sunday, 20 December 2015
Allied Telesis Unveils Industry Trends and Predictions for 2016
from
via CERTIVIEW
How Pradhan Mantri Jan Dhan Yojana pans out
from
via CERTIVIEW
Friday, 18 December 2015
IIA and Microsoft aim to enable 20,000 MSMEs in Uttar Pradesh with cloud
from
via CERTIVIEW
GoPaisa offers first ever instant cashback on online orders this Christmas week
from
via CERTIVIEW
YES bank signs agreement with iSPIRT to tap the financial technology space
from
via CERTIVIEW
Dell launches highest-End Dell storage arrays and industry-Leading All-flash cost-per-gigabyte
from
via CERTIVIEW
Top 8 security predictions for 2016
from
via CERTIVIEW
How To Use Regex Groups In PowerShell
from Tom's IT Pro
via CERTIVIEW
CCNA R&S Question of the Week: Calculate OSPF Cost
Which parameter or parameters are used to calculate OSPF cost on a Cisco IOS routers?
A. Bandwidth
B. Bandwidth and Delay
C. Bandwidth, Delay and MTU
D. Bandwidth, MTU, Reliability, Delay and Load
Answer: A.
Nowhere in the RFC for OSPF does it define how to calculate cost, just that there is a cost on every interface. If you add up all the costs and cheapest cost wins for best path. Many moons ago it was decided to automate the process and use an auto cost bandwidth reference (a constant) divided by the bandwidth. The default on Cisco IOS routers is 100,000,000 (100 meg) divided by the bandwidth. The lowest possible value is 1, therefore any link speed of 100Megabits per second or fast will have the cost of 1.
Related Resources
Cisco White Papers
Related Course
CCNAX v2.0 — CCNA Routing and Switching Boot Camp
ICND1 v2.0 — Interconnecting Cisco Networking Devices, Part 1
ICND2 v2.0 — Interconnecting Cisco Networking Devices, Part 2
CCNA R&S Question of the Week Series
- CCNA R&S Question of the Week: Full-Duplex Ethernet Network
- CCNA R&S Question of the Week: OSI Model Layer
- CCNA R&S Question of the Week: Connection-Oriented Service
- CCNA R&S Question of the Week: No Acknowledgment of Receipt
- CCNA R&S Question of the Week: Switch vs. Hub
- CCNA R&S Question of the Week: Rapid STP States
- CCNA R&S Question of the Week: Rapid STP
- CCNA R&S Question of the Week: Secure Virtual Terminal Sessions
- CCNA R&S Question of the Week: Calculate OSPF Cost
from
CERTIVIEW
Videocon Mobile launches first 4G smartphone priced at Rs 7,999/-
from
via CERTIVIEW
An International Robotics Competition to be held on December 19th, 2015
from
via CERTIVIEW
We are exploring Beacon technology to make patient navigation easier- Rajesh Batra, VP-IT, Kokilaben Dhirubai Ambani Hospital
from
via CERTIVIEW
Thursday, 17 December 2015
AskmeBazaar’s ‘Santa-The Price Slayer’ is here this Christmas and New Year
from
via CERTIVIEW
Indians use mobile internet up to 8 hours daily
from
via CERTIVIEW
Netlist Versus SanDisk Legal Fracas Continues; Where Does WD Fit In?
from Tom's IT Pro
via CERTIVIEW
Puppet Labs Releases Kubernetes Module To Manage Containers At Scale
from Tom's IT Pro
via CERTIVIEW
SK Hynix SE3010 Enterprise SSD Review
from Tom's IT Pro
via CERTIVIEW
WDC/HGST Broadens Storage System Initiative By Joining Active Archive Alliance
from Tom's IT Pro
via CERTIVIEW
MyOperator helps upgrade employee facilities for Canon India
from
via CERTIVIEW
Quikr Goes Vernacular, Breaks the Language Barrier
from
via CERTIVIEW
How IT spends Its time on asset management
from
via CERTIVIEW
4 cases depicting the ‘real’ healthcare world
from
via CERTIVIEW
Wednesday, 16 December 2015
Tenda Introduces Nine-Port Desktop Switch With Four PoE Ports
from Tom's IT Pro
via CERTIVIEW
Barracuda Announces Cloud Archive Service
from Tom's IT Pro
via CERTIVIEW
SailPoint Releases IdentityIQ 7.0
from Tom's IT Pro
via CERTIVIEW
Box And Salesforce Release New Developer Tools
from Tom's IT Pro
via CERTIVIEW
Exablox Battles Cloud Vendors With $0.03-per-GB On-Prem Price Point
from Tom's IT Pro
via CERTIVIEW
Best Mobile App Development Certifications For 2016
from Tom's IT Pro
via CERTIVIEW
CISSP Question of the Week: Biometric System and Fingerprinting Technology
CISSP Question of the Week courtesy of Transcender Labs.
Why should an organization not deploy a biometric system based on fingerprinting technology?
A. The CER value of the biometric system is very low.
B. The system demands immense overhead maintenance.
C. Authentication results are not always accurate and reliable.
D. Employees are reluctant to use a biometric system that scans their fingerprints.
The correct answer is D.
A biometric system based on fingerprinting has a low user-acceptance level. While enrolling for future authentication attempts, employees in an organization are often reluctant to provide their fingerprints as credentials. One reason for this is the possibility of law enforcement officials using corporate records during a criminal investigation. Therefore, the organization may not prefer to deploy a biometric system based on the fingerprint scan technology. The most commonly deployed biometric systems are based on iris scan and retina scan technologies.
When the crossover error rate (CER) value is low, a biometric system is a good choice and should be deployed. The CER is the point at which the false rejection rate (FRR) equals the false acceptance rate (FAR). The CER is used to compare different biometric devices. A biometric device with a low CER value is considered better than one with a high CER value. A low CER value indicates a high level of accuracy. For example, a CER value of 5 is better than a CER value of 10 because it indicates a lower number of errors.
High overhead maintenance is a secondary consideration while deploying the biometric solution.
Biometric systems are the most expensive authentication mechanisms. Depending on the security needs of the organization, an organization might prefer to deploy a biometric system that meets the security requirements of maintaining the confidentiality, integrity, and availability of critical resources.
A biometric system, such as a fingerprint scan, is a complex and highly sensitive authentication system that provides a high level of accuracy and reliability because it verifies a unique personal attribute of a user. Attributes are unique for different individuals. A biometric system can provide a higher level of accuracy than other authentication mechanisms, such as passwords.
Related Course
CISSP Certification Prep Course
CISSP Question of the Week Series
- CISSP Question of the Week: Pillar of Basel II
- CISSP Question of the Week: Implement Redundant Servers
- CISSP Question of the Week: Terrorist Attacks
- CISSP Question of the Week: Customer Credit Card Information
- CISSP Question of the Week: Complex Instruction Set Computers
- CISSP Question of the Week: Asymmetric Encryption
- CISSP Question of the Week: OSI Layer for Formatting Data
- CISSP Question of the Week: Secure Communications
- CISSP Question of the Week: Biometric System and Fingerprinting Technology
from
CERTIVIEW
Govt. to launch scheme for e-education, health & skilling within next 3 months
from
via CERTIVIEW
Cambridge Technology Enterprises launches Cambridge Innovations for early stage entrepreneurs
from
via CERTIVIEW
Davinder Singh Brar elected as Chairman of Mphasis Board
from
via CERTIVIEW
IDFC Bank implements Intellect’s global transaction banking solutions
from
via CERTIVIEW
Google lays out vision and product updates in its long-term commitment to bringing Indians online
from
via CERTIVIEW
LeadSquared integrates with Facebook lead ads
from
via CERTIVIEW
Knowlarity and Freshdesk join hands to accelerate seamless integration
from
via CERTIVIEW
State of cloud analytics research shows category poised for considerable growth
from
via CERTIVIEW
How a digitally connected set up helped Asian Hospital improve its RoI by 7-10%
from
via CERTIVIEW
Tuesday, 15 December 2015
Savvius Announces 802.11ac Adapter Solution for WLAN Packet Capture And Analysis
from Tom's IT Pro
via CERTIVIEW
Micron Acquires Remainder Of Inotera For $3.2 Billion
from Tom's IT Pro
via CERTIVIEW
Data Center Infrastructure Management (DCIM) Tools
from Tom's IT Pro
via CERTIVIEW
Management Capabilities of System Center Service Manager
Many people who are new to Microsoft System Center 2012 R2 Service Manager are surprised to learn that there is more than one management interface, namely the Service Manager Console. Some more experienced people would tell you that there are three management interfaces to Microsoft System Center 2012 R2 Service Manager. We’ll discuss those shortly. In reality, there are more than three management interfaces. But many people don’t know about more than one or three.
If you were to ask someone who uses Service Manager what the capabilities and services are that are offered by Service Manager, you would likely get different answers depending on their perspective and familiarity with Service Manager. Their recommendations and advice for best practices with using Service Manager — something as fundamental as the rules of the game of Service Manager — would be influenced by their awareness of the different management interfaces. Even, something so basic as how many management interfaces Service Manager offers.
In order to have a winning strategy with Service Manager, you should know that there isn’t just one Service Manager management interface. To make well-educated purchasing, design and implementation decisions with respect to Service Manager, you should know that there are more than the three obvious management interfaces. Consider an analogy depicted in a conversation I had with a friend.
“Rock!” I cried.
She glared at me and said flatly, “Paper wraps rocks. I win.”
“Another round?” I implored.
She agreed.
“Lizard! Lizard eats paper. I win,” I exclaimed.
Her tone was scathing. “What are you talking about?”
“Rock, paper, scissors, lizard, Spock,” I said matter-of-factly.
With vehemence dripping from her lips, she insisted, “It’s just rock, paper, scissors. There are only three!”
Sure, my friend was yelling about the rules of a classic children’s game while I was having fun with a twist on the game you might have seen on CBS’ “Big Bang Theory” called Rock, Paper, Scissors, Lizard, Spock — but her insistence on tradition made me recognize how limiting it can be when someone is not aware of some of the more powerful capabilities of a technology.
Microsoft System Center 2012 R2 Service Manager’s has three management interfaces besides the email and phone interfaces used to submit tickets. The Service Manager interface triumvirate includes the Service Manager Console, Portal and Shell.
These three interfaces existed before R2 in the SP1 and original 2012 version, and even earlier. But, many people aren’t very familiar with them all and think there is just the console. Here’s a brief overview of the three integrated aspects of the Service Manager system.
Service Manager Console
At first, most administrators typically use the Service Manager Console, a graphical interface. It has the customary System Center three-pane interface with the navigation pane on the left, the work pane in the middle and the task pane on the right.
Like most other components in the System Center suite, the Service Manager Console’s navigation pane provides several workspaces to organize the functionality of Service Manager. This lets administrators focus on the tools they need for a particular task at hand. The Work Items workspace provides day-to-day access to:
- Activity Management
- Change Management
- Incident Management
- Problem Management
- Release Management
- Service Request Fulfillment
One of the many configuration elements in the library workspace is the service catalog, which includes request and service offerings. Both kinds of offerings can be configured to allow users of the Service Manager Portal to interact with the platform without needing to install or access the Service Manager Console.
Service Manager Portal
The second Service Manager interface is the SharePoint-based Service Manager Portal. This web-based portal can be accessed from any Web browser. Users simply need to go to a URL such as http://ift.tt/1IS6Zo5. The URLs may be part the browser favorites for every user in the organization and could also be a link in the organization’s regular SharePoint portal(s).
This Service Manager Self-Service Portal allows end users to log new service requests, change requests and incident reports. Help desk personnel can follow up through the Service Manager Console and end users can track the progress and resolution on their tickets through the same Service Manager Portal from which they were initiated. With careful design of request and service offerings, the Service Manager Portal can provide an effective platform for most users to interact with the help desk and other IT support personnel.
The SharePoint platform on which the Service Manager Portal is based allows rich opportunities for customization, including organizational branding. For the ambitious, that portal can be customized to include additional interactivity. There are also third-party add-ons to System Center Service Manager that can further enhance the Service Manager Portal experience. There is a third-party product called the Cireson Platform that can be used by analysts and administrators as well. Cireson offers several free apps in its free community stream such as Service Desk Ticker, Auto Close (of tickets after a certain number of days), Action Log Notify, Time Tracker, Remote Manage, Notify Analyst Free and Advanced Send Email.
Service Manager Shell
Besides the Service Manager console and Web portal, there is a third management interface, the Service Manager Shell. Based on Windows PowerShell, the Service Manager Shell includes over 100 commands (1 function, 31 aliases and 90 cmdlets) that are specific to Service Manager administration.
These Service Manager Shell commands allow for the management of the work items of Service Manager and the functionality equivalent to that offered in the Service Manager console’s administration, library, and configuration items workspaces. There are additional shell commands available for managing the Service Manager Data Warehouse and Reporting. The Service Manager Shell allows automation of any of the work item, configuration item, and Service Manager infrastructure administration.
Although, the installation of the System Center administration tools includes a shortcut to the Service Manager Shell with Service Manager console installation, there are other ways to access the tremendous power and versatility of the Service Manager Shell. The Windows PowerShell Integrated Scripting Environment (ISE) can include the Service Manager Shell tools by issuing the command:
Import-Module ‘C:\Program Files\Microsoft System Center 2012 R2\Service Manager\PowerShell\System.Center.Service.Manager.psd1’
Rather than running this command interactively, this import command could be included in a PowerShell profile so that the System Center Service Manager shell commands are always available. Another recommendation is to use a PowerShell remoting session to connect from the convenience of a help desk, analyst, or administrator workstation into one of the Service Manager servers, import the aforementioned module, and then import that module from the remote session so that the Service Manager Shell commands can be initiated from the administrative workstation. PowerShell Web Access could be used to extend the reach of these commands to an analyst’s phone or tablet. No matter what way these tools are accessed, as long as they have been imported into the current PowerShell session, the following command can be used to list the 122 commands:
Get-Command -Module System.Center.Service.Manager
Show-Command, Get-Help, and Get-Help –ShowWindow can all be used to provide additional information on the use of these commands. Additional details are available on online via Microsoft TechNet. Scripts of commonly used command sequences could be composed and saved for quick interactive use. Such scripts could also be included in Microsoft Azure Automation workflows. Scripts can also be wrapped in System Center Orchestrator runbooks so that they can be included in Service Manager workflows. Such runbooks could be synchronized via a Service Manager connector with Orchestrator, included in the Activity Management section of Service Manager, then wrapped into work item templates or bundled into the service offerings published to the Service Manager Portal.
With the three management interfaces — Console, Portal and Shell — Microsoft’s System Center Service Manager can provide customizable and effective opportunities for the service management of on-premises, private cloud, and public cloud (e.g. Azure) computing and software resources and systems.
As with Rock, Paper, Scissors, Lizard, Spock, your own PowerShell scripts, Orchestrator runbooks, and third-party products like those from Cireson, can be used to extend the management capabilities of System Center Service Manager.
Related Courses
Administering System Center 2012 Configuration Manager (M10747)
Deploying System Center 2012 Configuration Manager (M10748)
IT Service Management with System Center Service Manager (M10965)
from
CERTIVIEW
Virtusa signs agreement with Volvo Group Treasury for global, advanced incident management support
from
via CERTIVIEW
By 2018, 50% of consumers in mature markets will use smartphones or wearables for mobile payments: Gartner
from
via CERTIVIEW
FORTI and Microsoft aim to enable 30,000 SMBs in Rajasthan to adopt cloud by early 2017
from
via CERTIVIEW
20,000 Indian hotels on Goibibo have been rated and reviewed by real travelers
from
via CERTIVIEW
Monday, 14 December 2015
NIIT Technologies appoints Amit Kumar Garg as Chief financial officer
from
via CERTIVIEW
GoPaisa.com partners with PayU facilitating transfer of earnings to the consumer’s mobile wallet
from
via CERTIVIEW
7 ways IoT-based ERP implementation is fine-tuning the manufacturing sector
from
via CERTIVIEW
Huawei’s Agile Distributed Wi-Fi Solution May Cover Up To 48 Rooms
from Tom's IT Pro
via CERTIVIEW
MCSA: Windows 10 Certification -- Available Today
from Tom's IT Pro
via CERTIVIEW
EMC 'Go-Shop' Period Expires, Clearing Way For Dell/EMC Merger
from Tom's IT Pro
via CERTIVIEW
Apple features doctor consultation app Lybrate in ‘The App Store Best of 2015’
from
via CERTIVIEW
Openbravo and TCG Digital team up to deliver truly customized solutions to help their clients compete more effectively in today’s challenging markets
from
via CERTIVIEW
PMP Formula of the Week: SV of 338
If your project has an SV of 338. What does that indicate?
A. You are 338 percent ahead of schedule
B. You are 338 percent behind schedule
C. You are ahead of schedule
D. You are behind schedule
The correct answer is C.
The SV (schedule variance) indicates whether the project is ahead or behind schedule, with a positive value indicating ahead and a negative value indicating behind. Remember it as positive equals good.
The SPI is expressed as a percentage.
Related Resources
PMP Exam Prep Mobile App
Project Management White Papers
Related Courses
IT Project Management
Project Management Fundamentals
Project Management, Leadership, and Communication
PMP Exam Prep Boot Camp
PMP Formula of the Week Series
- PMP Formula of the Week: Forecasting a Necessary CPI
- PMP Formula of the Week: Forecasting a Necessary CPI Based on an ETC
- PMP Formula of the Week: Ahead or Behind Schedule
- PMP Formula of the Week: Point of Total Assumption
- PMP Formula of the Week: Rent, Lease or Buy?
- PMP Formula of the Week: Risky Task
- PMP Formula of the Week: Earned Value Management Methodology
- PMP Formula of the Week: Schedule Performance Index of 1
- PMP Formula of the Week: TCPI
- PMP Formula of the Week: Fixed-Price Incentive Fee Contract
- PMP Formula of the Week: S-Curve
- PMP Formula of the Week: Current Project Status
- PMP Formula of the Week: Project Schedule Information
- PMP Formula of the Week: Random Defective Article
- PMP Formula of the Week: Confidence Level
- PMP Formula of the Week: EV?
- PMP Formula of the Week: What is BAC?
- PMP Formula of the Week: CPI of 1.0
- PMP Formula of the Week: Product Manufacturing Choice
- PMP Formula of the Week: SV of 338
from
CERTIVIEW
Mi India launches Redmi Note Prime
from
via CERTIVIEW
Sunday, 13 December 2015
Companies accuse their competitors of staging DDoS attacks against them
from
via CERTIVIEW
Chillr: Must download app in Apple app store
from
via CERTIVIEW
Ricoh India launches Huddle Room solution – a collaboration solution for today’s offices
from
via CERTIVIEW
MAIT, Govt of Karnataka discuss reforms to attract investors
from
via CERTIVIEW
Ashoka University selects Juniper Networks to support wold-class liberal arts education in India
from
via CERTIVIEW
How Postal Life Insurance marches into future with technology
from
via CERTIVIEW
Friday, 11 December 2015
How To Manage IIS Websites With PowerShell
from Tom's IT Pro
via CERTIVIEW
CCNP Security Question of the Week: Default Behavior of an Access List
What is the default behavior of an access list on the Cisco ASA security appliance?
A. It will permit or deny traffic based on the access-list.
B. It will permit or deny all traffic on a specific interface.
C. An access group must be configured before the access list will take effect for traffic filtering.
D. It will allow all traffic to pass.
Answer: C.
Like an IOS router, an access list has no effect until it is applied. Use the access group command to reference the access list to apply it.
Related Resources
Cisco White Papers
Related Course
CCNP Security e-Camp
CCNP Security Question of the Week Series
- CCNP Security Question of the Week: Cisco ASA Security Context
- CCNP Security Question of the Week: Authenticating ASDM Users
- CCNP Security Question of the Week: Layer 5–7 Policy Maps
- CCNP Security Question of the Week: 802.1X
- CCNP Security Question of the Week: IPS Updates
- CCNP Security Question of the Week: IPsec VPN Tunnels
- CCNP Security Question of the Week: AnyConnect VPN Client
- CCNP Security Question of the Week: ASA AIP-SSM and ASA AIP-SSC
- CCNP Security Question of the Week: Disable DHCP Server Service
- CCNP Security Question of the Week: Cisco ASA Security Appliance Access List
- CCNP Security Question of the Week: Network Address Translation
- CCNP Security Question of the Week: Harden a Switch
- CCNP Security Question of the Week: SSH Login
- CCNP Security Question of the Week: Packet-Tracer Command
- CCNP Security Question of the Week: SSL Ciphers
- CCNP Security Question of the Week: VLAN Hopping
- CCNP Security Question of the Week: DHCP Server Service
- CCNP Security Question of the Week: Default Behavior of an Access List
from
CERTIVIEW
Thursday, 10 December 2015
2016 will be the year of hybrid cloud adoption in India
from
via CERTIVIEW
Global survey by Gemalto reveals impact of data breaches on customer loyalty
from
via CERTIVIEW
Make-in-India: Is optimism meeting realism?
India's economic growth relies on the manufacturing activity. Sadly this has been one of the weakest points in India's..
from
via CERTIVIEW
MapR Releases Streams, Turning Full Data Stacks Into Pub And Sub Feeds
from Tom's IT Pro
via CERTIVIEW
Best Enterprise File Sync And Share (EFSS)
from Tom's IT Pro
via CERTIVIEW
Now Work in a virtual team with Vidyo
from
via CERTIVIEW
NASSCOM announces cyber awareness month initiative in alliance with Mumbai police
from
via CERTIVIEW
FreeCharge appoints Anshul Kheterpal as chief financial officer
from
via CERTIVIEW
Sleeping Outside So Homeless Youth Won’t Have To
By Scott Williams, President, Global Knowledge Canada
On November 19, I joined 70 other business and community leaders in Toronto for Sleep Out: Executive Edition. We spent the night outside to raise awareness and funds for Covenant House, the international organization that supports homeless youth.
For us, the night wasn’t all that difficult: The streets were dry, the temperatures hovered around freezing and, most importantly, we knew we’d be safe and warm in our own beds the following night. That reassurance isn’t available to the 10,000 kids who spend time living on Toronto’s streets each year.
On any given night, as many as 2,000 young people will be forced to sleep outside in Toronto. These kids come from all over Canada, North America and elsewhere in the world. Most are on the street through no fault of their own, though some end up there through bad choices they’ve made.
As many as 70 percent of these kids are fleeing some form of abuse or neglect at home, and as many as 30 percent are living with a mental health issue. Many have been exploited sexually or are struggling with addictions. Every one of these kids has a heartbreaking story and every one of these kids deserves a chance for a better future.
Before heading outside for the night, we met some of the staff and clients of Covenant House. The stories we heard were incredibly powerful and moving. These kids are just that – kids. Their stories were upsetting and uplifting at the same time. The things that some of them endured were hard to imagine and, frankly, hard to listen to. And yet, each kid’s story also showed resilience and strength. It showed how much good can happen when a kid knows someone cares.
This year’s Sleep Out united 15 different Covenant House locations across the U.S. and Canada. These places offer much more than shelter. Covenant House services include 24/7 crisis care, education, counseling, medical treatment, skills development, job training and assistance with employment. In Toronto alone, some 90,000 kids have been helped over the years.
Covenant House depends on donations for 80 percent of its funding. The annual Sleep Out makes a difference. This year alone, 920 sleepers across North America raised more than $5 million for the cause.
I think the Sleep Out accomplishes several things. First, it raises badly needed funds. But, it also raises awareness. Within my own circle of family and friends, my Global Knowledge family and my broader community, there is a greater awareness of the issues facing at-risk youth — homelessness, mental illness and human trafficking, to name just three. This event has allowed me to act in solidarity with these young people, and to achieve something that goes beyond fundraising. I don’t think I or anyone else involved in the Sleep Out will ever again see a street kid in a dirty hoodie in quite the same way.
from
CERTIVIEW
Wednesday, 9 December 2015
Asia Pacific businesses poised for major digital transformation according to Hitachi Data Systems CTO
from
via CERTIVIEW
How vehicle fleet management helped in boosting managing operations by 50%
from
via CERTIVIEW
Offline retail lags behind in customer side analytics: Amit Kinariwala, Founder and CEO, trakRYT
from
via CERTIVIEW
Wipro bets big on its Open Data Center strategy
from
via CERTIVIEW
Seagate Continues Push Into Systems Market With AssuredSAN RealStor Updates
from Tom's IT Pro
via CERTIVIEW
Best VoIP & Telephony Certifications For 2016
from Tom's IT Pro
via CERTIVIEW
WaveMaker Makes Waves In Enterprise Mobile App Development
from Tom's IT Pro
via CERTIVIEW
Vera Continues Momentum Into File-Level And Identity Management With Centrify Partnership
from Tom's IT Pro
via CERTIVIEW
PayUbiz redefines mobile payments with ‘One Tap’ technology
from
via CERTIVIEW
Prasanna Purple Mobility Solutions runs faster with Tally.ERP 9
from
via CERTIVIEW
Security+ Question of the Week: Session Hijack
Which of the following typically occurs just before a session is hijacked?
A. Password cracking
B. Social engineering
C. Planting a remote access Trojan
D. Sniffing
The correct answer is D.
A session hijack requires that the attacker initially sniff the traffic of the intended victim. Hijacking does not involve password cracking, social engineering or planting a remote access Trojan.
Related Courses
Security+ Prep Course (SY0-401)
Security+ Certification Boot Camp (SY0-401)
Security+ Question of the Week (SY0-401) Series
- Security+ Question of the Week: Deploying a Firewall
- Security+ Question of the Week: Flood Guard
- Security+ Question of the Week: iSCSI
- Security+ Question of the Week: Wireless MAC Filtering
- Security+ Question of the Week: Quantitative Analysis
- Security+ Question of the Week: Contracts
- Security+ Question of the Week: System Clock
- Security+ Question of the Week: Security Breach Incident Response
- Security+ Question of the Week: Reduce Electrostatic Discharge
- Security+ Question of the Week: Planting Malware
- Security+ Question of the Week: Network Hardening
- Security+ Question of the Week: Fuzzing
- Security+ Question of the Week: Single Sign‐On
- Security+ Question of the Week: Digital Envelope
- Security+ Question of the Week: Confining Communications to a Subnet
- Security+ Question of the Week: DoS Tool
- Security+ Question of the Week: Intranet Defense
- Security+ Question of the Week: War Driving
- Security+ Question of the Week: User Rights and Permissions Checks
- Security+ Question of the Week: Third Party Partnerships
- Security+ Question of the Week: Indicator of Integrity
- Security+ Question of the Week: Incident Response Procedure
- Security+ Question of the Week: Good Password Behavior
- Security+ Question of the Week: Tailgating
- Security+ Question of the Week: Differential Backup
- Security+ Question of the Week: Government and Military
- Security+ Question of the Week: Backdoor
- Security+ Question of the Week: Wrong Name or Address
- Security+ Question of the Week: Increase in Email Hoaxes
- Security+ Question of the Week: Suspicious Location-Based Messages
- Security+ Question of the Week: Session Hijack
from
CERTIVIEW
Tuesday, 8 December 2015
How sample testing machines can save lives
from
via CERTIVIEW
PMC Addreses Hyperscale SSD Performance Challenges With HBA 1000
from Tom's IT Pro
via CERTIVIEW
Enterprise File Sync And Share (EFSS) 101
from Tom's IT Pro
via CERTIVIEW
Artisan Infrastructure Announces Improvements To IT Continuity Engine
from Tom's IT Pro
via CERTIVIEW