Are you embarking on an IT career? Are you maybe a few years in and looking to make a big move in your career if you can find the right opportunity?
What are your expectations for your next IT job? Perhaps you expect the following:
- To be treated by management with respect.
- To have invigorating, exciting work and to feel your work is appreciated.
- To have co-workers you admire and who admire you.
- To be compensated well—because you’re worth it!
What you might want to do right now is write these expectations down.
Then, go out in the backyard and LIGHT THEM ON FIRE.
Congratulations! You have just liberated yourself from job disillusionment and career self-sabotage.
In the aftermath of the 2008 global financial crisis, postmortems were convened in countries around the world to identify what went wrong. A unanimous conclusion was that Boards of Directors of public companies in general, and financial institutions in particular, need to do more to oversee “management’s risk appetite and tolerance” if future crises are to be avoided.
This finding represents a significant paradigm shift in role expectations while introducing a new concept the Financial Stability Board (FSB) has coined effective “Risk Appetite Frameworks” (RAFs). Regulators around the world are now moving at varying speeds to implement these conclusions by enacting new laws and regulations. What regulators appear to be seriously underestimating is the amount of change necessary to make this laudable goal a reality.
Adaptavist, the leading global Atlassian Expert, has announced the launch of ScriptRunner for Stash adding valuable extensions and automations to Stash, Atlassian’s Enterprise Git repository management system. ScriptRunner for Stash has been created to take Git further into the Enterprise by focusing on control, assurance and security.
ScriptRunner for Stash builds on the success of the near-ubiquitous ScriptRunner for JIRA which is used in over 11,000 JIRA instances worldwide. Created by Jamie Echlin in 2007, it allows users to customise JIRA with pre-written ‘recipes’ or their own scripts.
Having joined Adaptavist in December 2014, Echlin led the development team that created the new product.
Users of ScriptRunner for Stash can choose from a library of recipes that add control, automation and workflow features to their source code management. Alternatively, they can create their customisations by writing their own scripts.
As an implementation of the Git distributed version control system, Stash enables Enterprises to develop software at scale across a diverse user base. ScriptRunner for Stash allows Enterprise users to add the control and visibility they need to keep track of thousands of repositories and to define and enforce corporate policies within Stash.
“ScriptRunner for JIRA has become the essential tool for JIRA admins and power users,” said Adaptavist CEO, Simon Haighton-Williams. “ScriptRunner for Stash is the essential tool for organisations that want to embrace Git in an Enterprise context.”
ScriptRunner for Stash is already receiving positive reviews from users and the Atlassian community.
“It’s much more than just enabling scripts. It’s a regular Swiss army knife of good features,” said Dave Thomas of FIS Global.
“Adaptavist regularly enhance the reach and scope of Atlassian products - this time with a scripting interface that offers easy access to workflow automation and customization not seen in any other code management tool,” said Eric Wittman, General Manager, Developer Tools at Atlassian.
Dali Wireless to provide the design, installation and maintenance of an all-digital distributed antenna system as part of DFW airport's Critical Communications Infrastructure
MENLO PARK, Calif. - Dali Wireless, Inc., a global provider of the advanced all-digital RF Router®, has been selected by DFW Airport to provide in-building public safety coverage for first responders to handle mission-critical communications quickly and efficiently. The project, covering all five terminals of the airport, is part of the Dallas Fort Worth (DFW) Airport's Critical Communications Infrastructure to support public safety and homeland security.
As one of the busiest airports in the world, DFW Airport requires a solution that not only provides public safety coverage and access at all times, but also has the flexibility and scalability to meet the airport's existing and future requirements. Dali Wireless was chosen to design and install an all-digital distributed antenna system (DAS) to provide coverage and access throughout the DFW terminals for public safety. This is to provide first responders and other emergency services personnel clear, secure, uninterrupted communications critical during emergency situations.
The deployment at DFW Airport will cover an area of over 12,000,000 square feet, and consist of the Dali t-Series® PS solution. The t-Series® PS consist of the headend, tHost® PS, and the medium and high power remote units, t37TM PS and t43TM PS. The t-Series PS is an end-to-end digital platform which enables a greater reach without signal degradation and noise interference, ensuring superior signal performance. In addition, the deployment configuration can cater to any topology - star, daisy-chained and hybrid, and with Dali's ability to support long fiber runs over a single fiber between the headend and the remotes, the base station resources can be centralized. This flexibility, scalability and long reach enables easy management and cost-savings.
Additionally, with an all-digital platform that is software configurable, the t-Series PS solution enables DFW Airport to easily adapt to changing requirements, including FirstNet, P25 Phase I & II, narrowband and broadband public safety.
"We are pleased to be selected by DFW Airport," said Lance Craft, Vice President of Sales, Dali Wireless. "By integrating our state-of-the-art public safety solution with DFW's Critical Communications Infrastructure, the first responders and other emergency personnel will have tomorrow's radio communications system today."
About Dali Wireless
Founded in 2006, Dali Wireless is a global provider of digital-over-fiber wireless distribution systems that provide significant advantages over traditional passive and active distributed antenna systems. It is the most versatile, cost-effective, best performing solution for extending the coverage and capacity of wireless carriers indoors and outdoors.
For more information, visit www.daliwireless.com, or contact us at firstname.lastname@example.org, or (604) 420-7760. To stay up-to-date with the latest industry trends and Dali Wireless news, follow us on Twitter @DaliWireless.
NAKIVO Backup & Replication v5.6 provides the ability to instantly verify VMware VM backups by instantly recovering VMs from the compressed and deduplicated backup repository and sending a screenshot of the booted VMs as a proof of recoverability.
CAMPBELL, Calif. — NAKIVO Inc., the fastest-growing virtualization data protection company, has released NAKIVO Backup & Replication v5.6 today. The new version provides the ability instantly verify VMware VM backups by instantly recovering VMs from the compressed and deduplicated backup repository and sending a screenshot of the booted VMs as a proof of recoverability. For more details and free trial please visit www.nakivo.com/en/VMware-Backup-Free-Trial.htm.
Tweet This: NAKIVO releases v5.6 with Screenshot Verification for VMware VM backups
After a VM backup is completed, the NAKIVO Backup & Replication recovers the VM with Flash VM Boot, makes a screenshot of the booted OS, discards the recovered VM, and sends a report with the screenshot via email. This way VMware administrators ensure that VM backups are good and recoverable, and can provide screenshots as a proof to their management. Screenshot Verification can also be run ad hoc or scheduled to run on a particular day.
“We are excited to introduce NAKIVO Backup & Replication v5.6 with the new screenshot verification feature,” said Bruce Talley, CEO and co-founder of NAKIVO. "Screenshot verification provides an effortless way to ensure that business-critical VMs are protected and can be recovered in case of a disaster.”
Named one of the “Top 10 Virtualization Startups you'll Hear about in 2015” by TechTarget, and one of the “Top 20 Coolest Cloud Computing Vendors of 2015” by CRN Magazine, NAKIVO enables protecting VMware environments more reliably, efficiently, and cost effectively. NAKIVO Backup & Replication is VMware-certified, purely agentless, and can be deployed on both Linux and Windows. Featuring a simple and intuitive Web UI, the product can back up and replicate VMware VMs onsite, offsite, and to private/public clouds. NAKIVO Backup & Replication supports live applications and databases, instantly recovers VMs, files, and application objects directly from compressed and de-duplicated VM backups, speeds up data transfer with network acceleration, and reduces data size with global deduplication and compression.
• Overview: www.nakivo.com/VMware-VM-backup-replication-recovery-software.htm
• Datasheet: www.nakivo.com/Resources/NBR-DS.pdf
• Backup to Cloud: www.nakivo.com/vmware-cloud-backup-as-a-service.htm
• Success Stories: www.nakivo.com/success-stories.htm
• Trial Download: www.nakivo.com/en/VMware-Backup-Free-Trial.htm
Headquartered in Silicon Valley, NAKIVO is a privately-held software company that has been profitable since founding in 2012. With more than 5,500 customers - including many Fortune 1,000 companies - and over 800 channel partners across 102 countries worldwide, NAKIVO develops and markets a line of next generation data protection products for clouds and VMware virtualized environments. NAKIVO provides a fast, reliable, and affordable VM backup and replication solution for enabling SMBs and enterprises to protect and recover VM data onsite, offsite, and to the cloud. NAKIVO has also enabled over 50 hosting, managed, and cloud services providers to create and offer VM Backup-as-a-Service, Replication-as-a-Service, and DR-as-a-Service to their customers. NAKIVO was the first virtualization backup specialist to offer SMBs cloud backup to public clouds such as Amazon and multi-tenancy to cloud service providers and enterprise customers. For more information, please visit www.nakivo.com.
Follow us on Twitter: @NAKIVO
Connect on Facebook: www.facebook.com/NakivoInc
Join us on LinkedIn: www.linkedin.com/company/nakivo
Contact us: Yana Petrenko, MarCom Manager / email@example.com / +1 408 916 5955
LONDON – Computacenter, Europe's preferred IT provider to enable users and their businesses, today announces that it has climbed from third to second place in overall customer satisfaction amongst top IT spending organisations in the UK, as found by the newly released Whitelane IT Outsourcing Study 2015.
The report revealed that 71% of Computacenter customers are either satisfied or very satisfied with the company's customer service. This rose to 78% when asked purely about the quality of service delivery.
In addition, 38% of customers stated that they will almost certainly renew contracts with Computacenter.
The company's ranking was boosted by high scoring in areas such as reporting quality, escalation effectiveness, and proactivity, driven principally by end user services, and datacentre and application hosting.
"We are delighted to have been recognised as one of the top companies in customer satisfaction amongst IT spending organisations in the UK," says Kevin James, Country Unit Director UK at Computacenter. "It is a great recognition of the investment Computacenter has made in delivering top service to our customers. More so, we are pleased about our rise in the standings as it is testament to the work that we are doing to constantly improve how we work and relate to our customers."
The survey looked at over 260 participants of the top IT spending organisations in the UK that have evaluated over 800 of the largest IT outsourcing contracts with a combined annual contract value of more than £15 billion.
Computacenter is Europe's leading independent provider of IT infrastructure services, enabling users and their business. We advise organisations on IT strategy, implement the most appropriate technology, optimise its performance, and manage our customers' infrastructures. In doing this we help CIOs and IT departments in enterprise and corporate organisations maximise productivity and the business value of IT for internal and external users.
Rooted in core European countries Computacenter combines global reach with local expertise.
Complex enterprise storage environments call for more thorough backup protocols and investment in technology safeguards
EPSOM – Kroll Ontrack today released its most recent list of common IT administrator errors that can lead to data loss and network downtime. The findings indicate that the complexity in storage environments and sheer growth in data volume can result in serious data loss when human error strikes, leaving many organisations vulnerable to security risks and financial implications if they do not properly invest in and adhere to technology risk management policies.
"The complexity involved in managing today's virtual IT environments combined with the growing amount of data that streams through corporate networks requires diligent IT administration and effective data management policies," said Paul Le Messurier, Programme and Operations Manager at Kroll Ontrack.
"Nevertheless, humans are not infallible, and accidental deletion or a failed backup can result in unknowingly losing customer or proprietary information, or the inability to access important evidence required to diagnose a security event."
A recent EMC survey found that companies lose more than $1 million annually because of data loss and that 26 per cent of data loss instances are the result of accidental user error. In the event of a security breach, human error resulting in failed data backups could mean a company is without vital event log information to articulate where the attack or malware originated. Additionally, for organisations facing stringent regulatory requirements, a vulnerable information security landscape combined with inadvertent server deletion could lead to loss of audit evidence, leaving organisations open to incurring unnecessary and expensive penalties or litigation.
"Many organisations simply do not invest sufficient resources into understanding or developing policies based on threats and risk. Add to the mix common IT oversights, and you've got a compelling story for security vulnerability and data loss," said Dr. Richard Scott, Director of Information Security, Kroll Ontrack. "Prioritising hardware upgrades, rigorously testing and validating IT network processes, investing in skilled and experienced professionals, and enlisting the support of a data recovery expert are fundamental precautions every business decision maker must consider."
The following are the most common IT mistakes or oversights that could lead to data loss and security vulnerability, according to Kroll Ontrack:
- Failure to document and execute established IT, retention and backup procedures. A test server moves into production, but no one informs IT that it is now capturing valuable data, and the data is not being backed up. In another scenario, the departure of a key knowledge holder for the environment creates confusion or an undocumented pool of unknown detail about the configuration and use of the system.
- Failure to backup effectively. In a recent survey of Kroll Ontrack data recovery customers, 61 per cent had a backup in place at the time of data loss - either the backup was not functioning properly, the desired storage device was not included in the backup or the backup was not current. Testing backup policies, identifying correct storage and validating backup integrity is critical.
- Delay in infrastructure or security investments. Many cases of data loss are a result of companies failing to invest in infrastructure updates or security.
- Failure to adhere to and maintain relevant security policies and/or keep OS and security controls up to date. Even the smallest failure in IT security can lead to devastating results, including data loss and expense. Administrators need to leverage elevated privileges appropriately, restrict passwords only to required users, and change them when an IT administrator leaves the company. Adequately update OS security patches and malware protection controls to guard against cyber-attacks and malicious agents.
- Deleting data that is still in active use. Kroll Ontrack routinely performs data recovery on tapes or server networks that are thought to be out of use, but still contain active data.
Kroll Ontrack recommends IT departments follow these best practices in light of data loss, to ensure the best chance of an effective resolution:
- Avoid panicking and rushing to action. If data loss happens, companies should not restore data to the source volume from backup because this is where the data loss occurred in the first place. They should also not create new data on the source volume, as it could be corrupt or damaged.
- Be confident in skills and knowledge. IT staff must help leadership avoid making decisions that do more harm than good. When specifically faced with a possible data loss event, the volume should quickly be taken off line. Data is being overwritten at a rapid pace, and the volume should not be formatted to resolve corruption.
- Have a plan. Staff should follow established ITIL processes and ensure data centre documentation is complete and revisited often to ensure it is up to date. In particular, IT staff should not run volume utilities (CHKDSK/FSCK) or update firmware during a data loss event.
- Know the environment (and the data). IT staff must understand what their storage environment can handle and how quickly it can recover. Knowing what data is critical or irreplaceable, whether it can be re-entered or replaced, and the costs for getting that data up and running to a point of satisfaction is important. Staff must weigh up the costs and risks when determining what is most urgent - getting their systems up and running quickly or protecting the data that is there.
- When in doubt, call a data recovery company. While the manufacturer or vendor may be a good starting point, the value of data and the potential for data loss when getting a system back up and running may not be top of mind. Staff should be sure to consult a reputable data recovery company if concerns over data loss arise.
About Kroll Ontrack Ltd.
Kroll Ontrack provides technology-driven services and software to help legal, corporate and government entities as well as consumers manage, recover, search, analyse, and produce data efficiently and cost-effectively. In addition to its award-winning suite of software, Kroll Ontrack provides data recovery, data destruction, electronic discovery and document review services. For more information about Kroll Ontrack and its offerings please visit: Krollontrack.co.uk follow @KrollOntrackUK on Twitter or subscribe to the Kroll Ontrack Data Blog.
I was leafing through a pile of old BCI documents when I stumbled across a paper detailing a presentation, entitled “Resilience isn’t the future of business continuity” given by Charlotte Newnham at the BCM World Conference and Exhibition in November 2012.
In the presentation a number of facts and figures were provided which explain a great deal about “actual” resilience capabilities. The figures provided, included the facts that, of the existing resilience departments approximately 50% were in the public sector and that 76% of organisations extend their remit to incident/emergency management. Whilst, these figures seem positive for the resilience function, only 30% oversaw security or risk management and just 7% had any involvement in IT continuity.
AUSTIN, Texas – Recovery specialists have some sound advice for Texans whose homes and property took on floodwaters: Protect your family’s health and your own by treating or discarding mold- and mildew-infected items.
Health experts urge those who find mold to act fast. Cleaning mold quickly and properly is essential for a healthy home, especially for people who suffer from allergies and asthma, said the Federal Emergency Management Agency (FEMA).
Mold and mildew can start growing within 24 hours after a flood, and can lurk throughout a home, from the attic to the basement and crawl spaces. The best defense is to clean, dry or, as a last resort, discard moldy items.
Although it can be hard to get rid of a favorite chair, a child’s doll or any other precious treasure to safeguard the well-being of your loved ones, a top-to-bottom home cleanup is your best defense, according to the experts.
Many materials are prone to developing mold if they remain damp or wet for too long. Start a post-flood cleanup by sorting all items exposed to floodwaters:
- Wood and upholstered furniture, and other porous materials can trap mold and may need to be discarded.
- Carpeting presents a problem because drying it does not remove mold spores. Carpets with mold and mildew should be removed.
- However, glass, plastic and metal objects and other items made of hardened or nonporous materials can often be cleaned, disinfected and reused.
All flood-dampened surfaces should be cleaned, disinfected and dried as soon as possible. Follow these tips to ensure a safe and effective cleanup:
- Open windows for ventilation and wear rubber gloves and eye protection when cleaning. Consider using a mask rated N-95 or higher if heavy concentrations of mold are present.
- Use a non-ammonia soap or detergent to clean all areas and washable items that came in contact with floodwaters.
- Mix 1-1/2 cups of household bleach in one gallon of water and thoroughly rinse and disinfect the area. Never mix bleach with ammonia as the fumes are toxic.
- Cleaned areas can take several days to dry thoroughly. The use of heat, fans and dehumidifiers can speed up the drying process.
- Check out all odors. It’s possible for mold to hide in the walls or behind wall coverings. Find all mold sources and clean them properly.
- Remove and discard all materials that can’t be cleaned, such as wallboard, fiberglass and cellulose areas. Then clean the wall studs where wallboard has been removed, and allow the area to dry thoroughly before replacing the wallboard.
Disaster recovery assistance is available without regard to race, color, religion, nationality, sex, age, disability, English proficiency or economic status. If you or someone you know has been discriminated against, call FEMA toll-free at 800-621-FEMA (3362). For TTY call 800-462-7585.
FEMA’s mission is to support our citizens and first responders to ensure that as a nation we work together to build, sustain, and improve our capability to prepare for, protect against, respond to, recover from, and mitigate all hazards. Follow us on Twitter at https://twitter.com/femaregion6 and the FEMA Blog at http://blog.fema.gov.
The SBA is the federal government’s primary source of money for the long-term rebuilding of disaster-damaged private property. SBA helps businesses of all sizes, private non-profit organizations, homeowners and renters fund repairs or rebuilding efforts and cover the cost of replacing lost or disaster-damaged personal property. These disaster loans cover losses not fully compensated by insurance or other recoveries and do not duplicate benefits of other agencies or organizations. For more information, applicants may contact SBA’s Disaster Assistance Customer Service Center by calling (800) 659-2955, emailing firstname.lastname@example.org, or visiting SBA’s website at www.sba.gov/disaster. Deaf and hard-of-hearing individuals may call (800) 877-8339.
In communicating with the business and the board about the consequences of data breaches, IT is always going to be asked to place dollar figures, which can be difficult to do, even with increasing access to predictive analytics and historical data from any previous breaches in the organization. One of the most extensive benchmark studies that IT can use to help with this is the Ponemon Institute’s annual “Cost of Data Breach Study: Global Analysis.” In its 10th year, and sponsored by IBM, the recently released 2015 edition covers 11 countries, 350 companies, and detailed data about direct and indirect costs of data breaches.
Three major reasons are contributing to a rapid increase in the average cost of a data breach and the average cost per breached record – this last varying by industry – according to Chairman and Founder Dr. Larry Ponemon:
“First, cyber attacks are increasing both in frequency and the cost it requires to resolve these security incidents. Second, the financial consequences of losing customers in the aftermath of a breach are having a greater impact on the cost. Third, more companies are incurring higher costs in their forensic and investigative activities, assessments and crisis team management."