Sunday, 31 January 2016
Openbravo achieves three-digit bookings growth in its Retail business in 2015
from
via CERTIVIEW
Hansa Cequity bolsters its senior management with key appointments
from
via CERTIVIEW
Riverbed appoints Nagendra Venkaswamy as vice president for India and Saarc
from
via CERTIVIEW
Suburban Diagnostics selects IBM to scale up business operations
from
via CERTIVIEW
GPX: AWS comes to India
from
via CERTIVIEW
Friday, 29 January 2016
Microsoft Releases Azure Stack Technical Preview 1
from Tom's IT Pro
via CERTIVIEW
The Week In Storage: If We Are Running Out Of Storage, Why Can't They Sell It?
from Tom's IT Pro
via CERTIVIEW
How To Send Files Over WinRM With PowerShell
from Tom's IT Pro
via CERTIVIEW
CCNA Security Question of the Week: Global Configuration Command
What global configuration command secures the startup configuration from being erased from non-volatile random-access memory (NVRAM)?
A. No Service Erase Startup
B. SafeMode
C. Secure Boot-config
D. Boot-config
E. There is no way to stop the startup file from being erased
Answer: C.
To take a snapshot of the router running configuration and securely archive it in persistent storage, use the secure boot-config command in global configuration mode. Like the image, the configuration archive is hidden and cannot be viewed or removed directly from the command-line interface (CLI) prompt. It is recommended that you run this command after the router has been fully configured to reach a steady state of operation and the running configuration is considered complete for a restoration, if required.
Related Course
IINS 2.0 — Implementing Cisco IOS Network Security
Related Certifications
CCNA Security
CCNP Security
Related Resources
Cisco White Papers
CCNA Security Question of the Week Series
- CCNA Security Question of the Week: Synchronize Clocks
- CCNA Security Question of the Week: CLI Command
- CCNA Security Question of the Week: Global Configuration Command
from
CERTIVIEW
Thursday, 28 January 2016
Memblaze PBlaze4 Enterprise NVMe SSD Review
from Tom's IT Pro
via CERTIVIEW
Flash And HCI Collide, Pivot3 Purchasing NexGen Storage
from Tom's IT Pro
via CERTIVIEW
Information Rights Management: The Missing Piece In Enterprise File Sharing
from Tom's IT Pro
via CERTIVIEW
Wednesday, 27 January 2016
IBM offers new hybrid cloud capabilities for LinuxONE
from
via CERTIVIEW
Winners in the Digital Economy Will Place People First, Forecasts Accenture Technology Vision 2016
from
via CERTIVIEW
NEC ups its ante in cyber security; launches cyber security factory in Singapore
from
via CERTIVIEW
EnterpriseDB Releases Postgres Advanced Server 9.5
from Tom's IT Pro
via CERTIVIEW
ForgeRock Identity Platform Offers Advances In Data Access Management
from Tom's IT Pro
via CERTIVIEW
CISSP Question of the Week: Relational Database
CISSP Question of the Week courtesy of Transcender Labs.
Your organization uses a relational database to store customer contact information. You need to modify the schema of the relational database.
Which component identifies this information?
A. Query language (QL)
B. Data control language (DCL)
C. Data definition language (DDL)
D. Data manipulation language (DML)
The correct answer is C.
The data definition language (DDL) identifies the schema of the database. The schema of a database defines the type of data that the database can store and manipulate. The schema is the description of a relational database. The schema also defines the properties of the type of data that a database can store as valid data objects. DDL is also used to create and delete views and relations between tables.
The query language (QL) is used to generate a request for information from a user in the form of query statements to obtain relevant output.
The data control language (DCL) manages access control to records in a database. DCL defines the granular user permissions to various data objects and implements database security. Examples of DCL commands are grant, deny, revoke, delete, update, and read.
The data manipulation language (DML) refers to a suite of computer languages used by database users to retrieve, insert, delete, and update data in a database. DML provides users the ability to store, retrieve, and manipulate the data according to the relevant instructions issued.
Related Course
CISSP Certification Prep Course
CISSP Question of the Week Series
- CISSP Question of the Week: Pillar of Basel II
- CISSP Question of the Week: Implement Redundant Servers
- CISSP Question of the Week: Terrorist Attacks
- CISSP Question of the Week: Customer Credit Card Information
- CISSP Question of the Week: Complex Instruction Set Computers
- CISSP Question of the Week: Asymmetric Encryption
- CISSP Question of the Week: OSI Layer for Formatting Data
- CISSP Question of the Week: Secure Communications
- CISSP Question of the Week: Biometric System and Fingerprinting Technology
- CISSP Question of the Week: Security Management Life Cycle
- CISSP Question of the Week: Anomaly-based Monitoring
- CISSP Question of the Week: Forensic Investigation
- CISSP Question of the Week: File Backup
- CISSP Question of the Week: Relational Database
from
CERTIVIEW
API Testing – A rising trend in 2016
from
via CERTIVIEW
Tuesday, 26 January 2016
Aimed at ‘Make in India’ initiative, Ricoh eyes manufacturing to accelerate business growth
from
via CERTIVIEW
Chumbak Selects IBM Cloud to Accelerate Business
from
via CERTIVIEW
Vodafone Boosts Customer Experience with Cisco’s SON Solution
from
via CERTIVIEW
HCL Bags Global IT Transformational Deal from Alstom
from
via CERTIVIEW
How Will Startup India Help You?
from
via CERTIVIEW
Flash And 3D XPoint Are Better Together, Plexistor Launches Software Defined Memory
from Tom's IT Pro
via CERTIVIEW
How To Maximize Your IT Training Budget
from Tom's IT Pro
via CERTIVIEW
nGenx nWorkspace Application Catalog Grows To 1,800
from Tom's IT Pro
via CERTIVIEW
Monday, 25 January 2016
IBM Announces Advances In IBM LinuxONE
from Tom's IT Pro
via CERTIVIEW
3 Tips To Attract And Keep Qualified IT Staff
from Tom's IT Pro
via CERTIVIEW
Sudish Kumar joins Perpetuuiti as VP, Sales, APAC Region
from
via CERTIVIEW
Can Analytics Save $300,000?
Bridgei2i is an analytics solutions and platforms company with offices in the United States and Bengaluru. The firms currently..
from
via CERTIVIEW
Sunday, 24 January 2016
ISACA’s cybersecurity Nexus launches tools to help cyber pros
- Cybersecurity Career Road Map
- Threats..
from
via CERTIVIEW
Citrix appoints Kirill Tatarinov as President and CEO
from
via CERTIVIEW
Friday, 22 January 2016
The Week In Storage: Reliability Still A Thing, Cloud Massacre Gets Bloody, The NVDIMM Stars Align
from Tom's IT Pro
via CERTIVIEW
Feeling Secure With Kingston's DataTraveler 2000 USB Flash Drive, Hands On
from Tom's IT Pro
via CERTIVIEW
Intro To String Formatting In PowerShell
from Tom's IT Pro
via CERTIVIEW
CCNP Security Question of the Week: SSH Login
Which two configurations are needed to enable SSH login without a password on an IOS router? (Choose two.)
A. Enter a copy of the administrator’s public key within the SSH key-chain.
B. Enter a copy of the administrator’s private key within the SSH key-chain.
C. Generate a 512-bit RSA key to enable SSH on the router.
D. Generate an RSA key of at least 768 bits to enable SSH on the router.
E. Generate a 512-bit ECDSA key to enable SSH on the router.
F. Generate a ECDSA key of at least 768 bits to enable SSH on the router.
Answer: A and D.
This is using a feature that uses a Public Key for authentication, rather than a preconfigured password. See Cisco’s website for more detail.
Related Resources
Cisco White Papers
Related Course
CCNP Security e-Camp
CCNP Security Question of the Week Series
- CCNP Security Question of the Week: Cisco ASA Security Context
- CCNP Security Question of the Week: Authenticating ASDM Users
- CCNP Security Question of the Week: Layer 5-7 Policy Maps
- CCNP Security Question of the Week: 802.1X
- CCNP Security Question of the Week: IPS Updates
- CCNP Security Question of the Week: IPsec VPN Tunnels
- CCNP Security Question of the Week: AnyConnect VPN Client
- CCNP Security Question of the Week: ASA AIP-SSM and ASA AIP-SSC
- CCNP Security Question of the Week: Disable DHCP Server Service
- CCNP Security Question of the Week: Cisco ASA Security Appliance Access List
- CCNP Security Question of the Week: Network Address Translation
- CCNP Security Question of the Week: Harden a Switch
- CCNP Security Question of the Week: SSH Login
- CCNP Security Question of the Week: Packet-Tracer Command
- CCNP Security Question of the Week: SSL Ciphers
- CCNP Security Question of the Week: VLAN Hopping
- CCNP Security Question of the Week: DHCP Server Service
- CCNP Security Question of the Week: Default Behavior of an Access List
- CCNP Security Question of the Week: NAT Control on Cisco ASA Version 8.3
- CCNP Security Question of the Week: IPS Anomaly Detection Features
- CCNP Security Question of the Week: Bogus IPv6 Addresses
- CCNP Security Question of the Week: Harden a Switch
- CCNA Security Question of the Week: CLI Command
- CCNP Security Question of the Week: SSH Login
from
CERTIVIEW
Cisco annual security report reveals a decline in defender confidence and the increased impact of industrialized attackers
from
via CERTIVIEW
Ericsson partners with Sterlite Technologies to drive smart sustainable city initiatives in India
from
via CERTIVIEW
Obi Worldphone SF1 to expand to Amazon.in
from
via CERTIVIEW
This is how Bausch & Lomb fixed up its business continuity issues
from
via CERTIVIEW
Thursday, 21 January 2016
Swipe Technologies launches luxurious metal frame smartphone – Virtue
from
via CERTIVIEW
Beawel launches an App that promotes Beauty and Wellness
from
via CERTIVIEW
Oracle Certification Guide: Overview And Career Paths
from Tom's IT Pro
via CERTIVIEW
HGST Ultrastar NVMe SN150 Enterprise SSD Review
from Tom's IT Pro
via CERTIVIEW
Wednesday, 20 January 2016
ZyXEL Expands Its 11AC Series With Two New Access Points
from Tom's IT Pro
via CERTIVIEW
HDS Unveils New HFS A-Series All-Flash Arrays
from Tom's IT Pro
via CERTIVIEW
JFrog Leaps Ahead With Massive Round Of Funding
from Tom's IT Pro
via CERTIVIEW
Cisco Certification Guide: Overview And Career Paths
from Tom's IT Pro
via CERTIVIEW
Build your brand online with personal domains from GoDaddy
from
via CERTIVIEW
Genpact announces appointment of Meena Wilson as executive director, Genpact centre for women’s leadership
from
via CERTIVIEW
CISSP Question of the Week: File Backup
CISSP Question of the Week courtesy of Transcender Labs.
Your organization implements a full/differential backup scheme. A full backup was completed two days ago. Yesterday, a differential backup was completed.
Which files were backed up yesterday?
A. Files in a backup set
B. Files in a backup set that were changed or created since the last full backup
C. Files in a backup set that were changed or created since the last differential backup
D. Files in a backup set that were changed or created since the last incremental backup
The correct answer is B.
A differential backup backs up the files in a backup set that were added or changed since the last full backup. A differential backup type grows as the week progresses and no new full backups have been performed. To restore data in a full/differential backup scheme, you need to restore the most recent full backup and the most recent differential backup that occurred since the last full backup.
A full backup, sometimes referred to as an archive backup, backs up all files in a backup set.
An incremental backup backs up all files in a backup set that were created or changed since the last backup of any type. To restore data in a full/incremental backup scheme, you need to restore the most recent full backup and then restore in order all incremental backups that have occurred since the most recent backup.
Administrators should consider regularly backing up information on network computers to protect against data loss, which can be caused by misuse of equipment, hacker infiltration, or equipment failure.
Related Course
CISSP Certification Prep Course
CISSP Question of the Week Series
- CISSP Question of the Week: Pillar of Basel II
- CISSP Question of the Week: Implement Redundant Servers
- CISSP Question of the Week: Terrorist Attacks
- CISSP Question of the Week: Customer Credit Card Information
- CISSP Question of the Week: Complex Instruction Set Computers
- CISSP Question of the Week: Asymmetric Encryption
- CISSP Question of the Week: OSI Layer for Formatting Data
- CISSP Question of the Week: Secure Communications
- CISSP Question of the Week: Biometric System and Fingerprinting Technology
- CISSP Question of the Week: Security Management Life Cycle
- CISSP Question of the Week: Anomaly-based Monitoring
- CISSP Question of the Week: Forensic Investigation
- CISSP Question of the Week: File Backup
from
CERTIVIEW
SHEROES join hands with ‘Girls in Tech’ India to provide career opportunities for growth
from
via CERTIVIEW
APUS launcher adds a unique feature – APUS Discovery
from
via CERTIVIEW
Retailers must provide ‘ME’aningful customer experiences: Wipro-Planet Retail Research
from
via CERTIVIEW
Mindtree unveils Flooresense platform for the retail industry
from
via CERTIVIEW
Flipkart continues to dominate mobile commerce in India
from
via CERTIVIEW
TO THE NEW Digital organized GR8Conf IN
from
via CERTIVIEW
How technology is boosting healthcare in India
from
via CERTIVIEW
Tuesday, 19 January 2016
SAS Is Alive And Kicking With Toshiba's PX04SL SSD
from Tom's IT Pro
via CERTIVIEW
Samsung Begins Mass Production Of HBM2 DRAM
from Tom's IT Pro
via CERTIVIEW
MAIT outlines reforms to improve ‘Ease of Doing Business’ in India
from
via CERTIVIEW
Informatica Names Chairman, Chief Executive Officer, Chief Marketing Officer and Chief Financial Officer
from
via CERTIVIEW
Lenovo launches ThinkServers aimed at Indian SMEs
from
via CERTIVIEW
CA Technologies study finds serious lag in organizations achieving full devOps maturity
from
via CERTIVIEW
Young workers optimistic about careers, positive about technology
from
via CERTIVIEW
Keeping data secure in the ‘24/7’ world
from
via CERTIVIEW
Monday, 18 January 2016
3 Tips For Balancing Work With IT Certification Preparation
from Tom's IT Pro
via CERTIVIEW
CCNA Security Question of the Week: CLI Command
Which CLI command is similar to the SDM One-Step Lockdown wizard?
A. Lockdown
B. Service secure
C. AutoSecure
D. AutoLockdown
E. AAA new-model
Answer: C.
You can easily secure the switch without understanding all the security capabilities of the switch by using the AutoSecure feature. AutoSecure is a simple security configuration process that disables nonessential system services and enables a basic set of recommended security policies to ensure secure networking services..
Related Course
IINS 2.0 — Implementing Cisco IOS Network Security
Related Certifications
CCNA Security
CCNP Security
Related Resources
Cisco White Papers
CCNP Security Question of the Week Series
- CCNP Security Question of the Week: Cisco ASA Security Context
- CCNP Security Question of the Week: Authenticating ASDM Users
- CCNP Security Question of the Week: Layer 5-7 Policy Maps
- CCNP Security Question of the Week: 802.1X
- CCNP Security Question of the Week: IPS Updates
- CCNP Security Question of the Week: IPsec VPN Tunnels
- CCNP Security Question of the Week: AnyConnect VPN Client
- CCNP Security Question of the Week: ASA AIP-SSM and ASA AIP-SSC
- CCNP Security Question of the Week: Disable DHCP Server Service
- CCNP Security Question of the Week: Cisco ASA Security Appliance Access List
- CCNP Security Question of the Week: Network Address Translation
- CCNP Security Question of the Week: Harden a Switch
- CCNP Security Question of the Week: SSH Login
- CCNP Security Question of the Week: Packet-Tracer Command
- CCNP Security Question of the Week: SSL Ciphers
- CCNP Security Question of the Week: VLAN Hopping
- CCNP Security Question of the Week: DHCP Server Service
- CCNP Security Question of the Week: Default Behavior of an Access List
- CCNP Security Question of the Week: NAT Control on Cisco ASA Version 8.3
- CCNP Security Question of the Week: IPS Anomaly Detection Features
- CCNP Security Question of the Week: Bogus IPv6 Addresses
- CCNP Security Question of the Week: Harden a Switch
- CCNA Security Question of the Week: CLI Command
from
CERTIVIEW
Sunday, 17 January 2016
Microsoft acquires management, reporting and analytics technology from Event Zero to enhance Skype for business online
from
via CERTIVIEW
India wakes up to digital security
from
via CERTIVIEW
Friday, 15 January 2016
The Week In Storage: Violin Continues Slide, Diablo Goes Up, IDC Goes Down
from Tom's IT Pro
via CERTIVIEW
How To Use PowerShell DSC To Build A Hyper-V Virtual Machine
from Tom's IT Pro
via CERTIVIEW
Thursday, 14 January 2016
HP Enterprise Claims a Fast and Safe Path to the All-Flash Data Center
from
via CERTIVIEW
MapR partners launch free test drives in collaboration with AWS
from
via CERTIVIEW
Analysts reveal five unexpected implications arising from the Internet of things
from
via CERTIVIEW
SLC SSDs Undergo MLC Makeover As Virtium, Transcend Release Duelling SSDs
from Tom's IT Pro
via CERTIVIEW
Raytheon|Websense becomes Forcepoint
from
via CERTIVIEW
Raytheon|Websense becomes Forcepoint
from
via CERTIVIEW
CompTIA Certification Guide: Overview And Career Paths
from Tom's IT Pro
via CERTIVIEW
Quarch XLC Programmable Power Module Review
from Tom's IT Pro
via CERTIVIEW
AMD Puts The Opteron A1100 ARM SoC Into Full Production
from Tom's IT Pro
via CERTIVIEW
What Developers Can Expect in 2016
The new year is here, and many of us in the software industry are wondering what 2016 will hold. Here is where I think software is heading in the coming year.
Developer Trend #1: DevOps
DevOps is a movement fueled by automation and driven by system administrators, developers, project managers and anyone involved in software applications from development to deployment.
DevOps is constantly evolving, and 2016 will see the refinement of the tools and practices used. Current front-runners for tools are Git, Jenkins and Docker. If you are not already familiar with these tools, then it is time to start becoming so! Whether you are a SysAdmin or a developer, you will need to understand how to use these tools—especially as more large enterprise companies adopt DevOps. As for DevOps itself, there still is not a formal manifesto or certification aside from DevOps Engineering on AWS, but look for a consensus on a formal manifesto for practices to emerge from the community.
Developer Trend #2: Docker
Docker is a tool that aids in the success of DevOps. It simplifies the use of containers, which removes the worry over setting up and maintaining different environments and language tooling for applications. Although UNIX and Linux have offered containers for a long time, Docker makes containers easy to use. We can also expect Microsoft to release their version of containers. During 2016, we will see the use of Docker in large enterprise companies grow significantly.
Developer Trend #3: Programming Languages
As professional developers, we should know more than one programming language. It helps us to approach problems and find solutions in a variety of ways. The question always remains, “Which language should I learn?”
For 2016, I would say to learn or brush up your skills on Python, Swift or C++ (depending on the project), as I anticipate all of these programming languages gaining popularity this coming year. With that said, you can also expect Java and C to remain the most widely used languages, primarily to maintain existing code bases instead of green field projects. Although Objective C will still be used quite a bit because of the amount of existing code out there, it will continue to decline as Swift will be the choice for new development on Apple devices.
Developer Trend #4: Wearables
Watches are one item stacking high in the wearables trend, and throughout 2016 we will see name-brand, high-end watches adding more smarts to the collection. But I expect the larger trend to be wearables as clothing becoming indistinguishable from nondevice clothing, making the market for these devices grow. There will be a need for many applications, not just on the devices themselves but also to process and present the data that is being generated.
Before I wrap up, I will leave you a final trend to think about. I expect to see this not only in 2016 but every year moving forward: artificial intelligence (AI). Major tech giants, such as Elon Musk and Bill Gates, have previously expressed their concerns about AI if we’re not considering and proactively minimizing the risks. Musk has pledged a billion dollars to fund the nonprofit, OpenAI, to research and “advance digital intelligence in a way to benefit humanity as a whole” by using huge data sets to build robots. As professionals in the software area, we should all be working to make sure we get it right.
So there we have what I believe will take the storm in the software industry for 2016 and years to come. The best way to prepare and remain on top of the game is to ensure that your skills are current.
What do you think we will experience as developers over the next year?
Related Training
DevOps
Programming Languages
Application Development
from
CERTIVIEW
Wednesday, 13 January 2016
ShopInSync partners with Lava to offer one stop shopping experience to users
from
via CERTIVIEW
Sanovi launches cloud migration manager
from
via CERTIVIEW
How real is IoT?
from
via CERTIVIEW
Best Antivirus Solutions For Windows 10
from Tom's IT Pro
via CERTIVIEW
Seagate Introduces Helium-Infused 10TB Enterprise Capcity HDDs
from Tom's IT Pro
via CERTIVIEW
Cisco Takes On Shadow IT With New SaaS Product
from Tom's IT Pro
via CERTIVIEW
Gigabyte Debuts Four New Mini-ITX Xeon D-1500 Motherboards
from Tom's IT Pro
via CERTIVIEW
CISSP Question of the Week: Forensic Investigation
CISSP Question of the Week courtesy of Transcender Labs.
As a part of the incident response team, you have been given a procedures document that identifies the steps you must complete during a forensic investigation.
After which event should the evidence collection step be completed?
A. The incident has been identified only
B. The evidence has been preserved only
C. The incident has been identified and the evidence has been preserved
D. The incident has been identified, the evidence has been preserved, and the evidence has been analyzed
The correct answer is C.
You should complete the evidence collection step after the incident has been identified and the evidence has been preserved.
The proper steps in a forensic investigation are as follows:
- Identification – This step can include event/crime detection, signature resolution, profile detection, anomaly detection, complaint reception, system monitoring, and audit analysis.
- Preservation – This step can include imaging technologies, chain of custody standards, and time synchronization.
- Collection – This step can include approved collection methods, approved software, approved hardware, legal authority, sampling, data reduction, and recovery techniques.
- Examination – This step can include traceability, validation techniques, filtering techniques, pattern matching, hidden data discovery, and hidden data extraction.
- Analysis – This step can include traceability, statistical analysis, protocol analysis, data mining, and timeline determination.
- Presentation – This step can include documentation, expert testimony, clarification, mission impact statement, recommended countermeasures, and statistical interpretation.
- Decision – This step can include management reports, court decisions, and internal decisions.
Related Course
CISSP Certification Prep Course
CISSP Question of the Week Series
- CISSP Question of the Week: Pillar of Basel II
- CISSP Question of the Week: Implement Redundant Servers
- CISSP Question of the Week: Terrorist Attacks
- CISSP Question of the Week: Customer Credit Card Information
- CISSP Question of the Week: Complex Instruction Set Computers
- CISSP Question of the Week: Asymmetric Encryption
- CISSP Question of the Week: OSI Layer for Formatting Data
- CISSP Question of the Week: Secure Communications
- CISSP Question of the Week: Biometric System and Fingerprinting Technology
- CISSP Question of the Week: Security Management Life Cycle
- CISSP Question of the Week: Anomaly-based Monitoring
- CISSP Question of the Week: Forensic Investigation
from
CERTIVIEW
Ericsson announces the launch of Ericsson Innovation Awards India 2016
from
via CERTIVIEW
Worldwide PC Shipments Declined 8.3 Percent in Fourth Quarter of 2015
from
via CERTIVIEW
Akamai Identifies SEO Web Application Attack Campaign
from
via CERTIVIEW
Higher education institutions must grow the strategic role of IT
from
via CERTIVIEW
Track air quality in your locality with Helpchat app
from
via CERTIVIEW
Tuesday, 12 January 2016
UCWeb partners with Hungama Music
from
via CERTIVIEW
HackerRank identifies top challenges faced by Coders and recruiters while hiring
from
via CERTIVIEW
Object Storage Ecosystem Expands As HPE Invests In Scality
from Tom's IT Pro
via CERTIVIEW
What BI Architects and Admins Need to Know about SAP BusinessObjects BI4
In my previous two posts about training for SAP Business Intelligence (BI), I wrote about training universe designers and end users for SAP’s BusinessObjects BI4 platform. Today, as the final part of my training trilogy, I’d like to share some best practices for training BI administrators and architects in your organization. Because they will ultimately lead a major BI upgrade, administrators need training before a major project begins, not a few days or weeks before a go-live like other stakeholders. While there are many facets to upgrading your SAP BI system, I’m focusing on the need for BI architects and administrators to understand the BI4 platform’s new tools, new architecture and new monitoring capabilities.
New Tools
SAP BusinessObjects BI4 introduces new developer tools. BI architects do not necessarily have to be tool experts, but they do need to make the best recommendations for your organization’s BI roadmap, particularly as SAP’s roadmap is focused on reducing the number of tools in its BI portfolio. Xcelsius (known as Dashboard on the BI4 platform) is being phased out in favor of Design Studio. Traditional Crystal Reports is being phased out in favor of Crystal Reports for Enterprise. Organizations using SAP Business Warehouse (BW) should look into using Analysis for OLAP and Analysis for Microsoft Office as alternatives to BEx Analyzer. And Lumira, a relatively new BI tool, brings new data discovery capabilities to the BI4 platform. There’s no one-size-fits-all approach, so your BI architects will need to advise the rest of the organization if either a gradual or abrupt cutover to new tools is warranted. Your organization’s active tool portfolio will influence BI system design, which leads to my next point.
New Architecture
SAP BusinessObjects BI4 introduces a new 64-bit architecture. While the tasks associated with administering users and content are largely unchanged, the old rules for sizing and scaling an SAP landscape frequently no longer apply. Organizations wishing to take advantage of new tools such as Lumira and Design Studio will need to understand the additional requirements those tools bring to BI4 sizing. Without adequate training, your BI architects may create a BI4 system that performs poorly in comparison to the one it replaces. Regardless of your BI architecture, you’ll want to monitor it carefully to identify performance issues before users do.
New Monitoring
SAP BusinessObjects BI4 introduces a new monitoring engine not present in previous versions. In smaller organizations, this engine can be used directly from the Central Management Console to notify BI personnel of potential issues. But larger organizations will want to use the built-in JMX interface to integrate with existing enterprise monitoring tools. Organizations using the SAP business suite will want to integrate the BI4 platform monitoring into Solution Manager. Your BI architects should understand how to leverage these monitoring capabilities, which can improve the level of support your entire IT team provides to your organization.
Final Thoughts
Mainstream support for SAP BusinessObjects Enterprise XI 3.1 ended on December 31, 2015. If your organization is not yet on the BI4 platform, you’ll want to make the upgrade a priority for 2016. SAP BusinessObjects BI 4.0 was introduced four years ago, and BI 4.1 was introduced two years later. SAP BusinessObjects BI 4.2 is currently in ramp-up and on schedule to be generally available sometime in early 2016.
A maturing product means that there are many new product training resources available beyond traditional classroom training. Consider allocating a portion of your training budget for a user conference where your BI architects can hear best practices and lessons learned from experienced voices who have already made the leap to BI4.
I hope these training guidelines enable your BI architects to lead the upgrade effort with confidence.
Related Courses
SAP BusinessObjects Business Intelligence Platform: Administration and Security (BOE310v15)
SAP BusinessObjects Business Intelligence Platform: Administering Servers (Windows) (BOE320v15)
SAP BusinessObjects Business Intelligence Platform: Designing and Deploying a Solution (BOE330v15)
from
CERTIVIEW
Atlantis Computing, Dell Bring All-Flash Hyperconverged Appliances To ROBO market
from Tom's IT Pro
via CERTIVIEW
Microsoft Certification Guide: Overview And Career Paths
from Tom's IT Pro
via CERTIVIEW
Huawei names William Zhao as chief operating officer of India R&D centre
from
via CERTIVIEW
63% of IT professionals are against governments having backdoor access to encrypted information systems
from
via CERTIVIEW
Monday, 11 January 2016
IT Certification Trends For 2016
from Tom's IT Pro
via CERTIVIEW
5 apps that can help you to keep your New Year resolutions on track
from
via CERTIVIEW
ShoreTel Strengthens Investment in India with Country Manager Appointment
from
via CERTIVIEW
Tata Docomo to Enable Business Transformation in India with Digital Technologies
from
via CERTIVIEW
IBM Certification of the Week: IBM Certified Deployment Professional – Security QRadar SIEM V7.2.4
Your QRadar SIEM creates the offense Clear Text Application Usage. You investigate the offense and find out that FTP traffic of a legacy application triggered the offense. This legacy application has management approval to use the unencrypted FTP protocol.
How do you prevent QRadar SIEM from creating an offense every time the legacy application uses FTP?
A. When closing the offense, select the option Never create an offense with these parameters again.
B. Ask a QRadar SIEM administrator to disable the flow source collecting the flows that triggered the offense.
C. Create a false positive to ignore all flows with DataTransfer.FTP with the Source IP address of the legacy application.
D. Create a new search that filters out all events from the legacy application, and configure this new search as the new default for the Network Activity tab.
The correct answer is C.
Related Certification
IBM Certified Deployment Professional – Security QRadar SIEM V7.2.4
Related Certification Courses
IBM Security QRadar SIEM Foundations
IBM Security QRadar SIEM 7.2 Administration and Configuration
IBM Certification of the Week Series
- IBM Certification of the Week: IBM Certified Administrator – Tivoli Storage Manager V7.1.1
- IBM Certification of the Week: IBM Certified Analyst – i2 Analyst’s Notebook V8.9
- IBM Certification of the Week: IBM Certified Deployment Professional – Security QRadar SIEM V7.2.4
- IBM Certification of the Week: IBM Certified Deployment Professional – Security QRadar SIEM V7.2.4
from
CERTIVIEW