Saturday, December 30, 2017

Checklist: Is your security team doing their job?

 
Checklist: Is your security team doing their job?
According to the experts at Forrester, the expectations that organizations have of their chief information security officers (CISOs) and their security teams are changing. So what does it mean to be a superstar security leader?

In this Forrester report, uncover a checklist of nine best practices that the most successful security pros need to be doing – including:
  • Communicating with the board 
  • Getting involved with product development 
  • Mapping their digital ecosystem 
  • And 6 more
VIEW NOW

ABOUT THIS EMAIL

This email is published by the TechTarget Security Media Group.

Copyright 2017 TechTarget, Inc. All rights reserved. Designated trademarks and brands are the property of their respective owners.

To unsubscribe from all TechTarget
Security Media Group.
Go to unsubscribe.

TechTarget Security Media Group, 275 Grove Street, Newton, MA 02466
Contact: webmaster@techtarget.com

When you access content from this newsletter, your information may be shared with the sponsors of that content as described in our Privacy Policy.

5 security critical measures for 2018

 
5 security critical measures for 2018
Google operates seven services (Google Search, Gmail, Maps, and more) with over one billion active users each. So how is Google able to…
  • Prevent 10 million spam messages from reaching Gmail customers 
  • Scan 694,000 indexed web pages for harmful software 
  • Spot and stop 7,000 deceitful URLs, executables, and browser extensions 
…every single minute?

In today’s featured resource, the pros at Google count down five practical security measures that every company should take right now to ensure effective protection. Read on to get started.
VIEW NOW

ABOUT THIS EMAIL

This email is published by the TechTarget Data Center and Virtualization Media Group.

Copyright 2017 TechTarget, Inc. All rights reserved. Designated trademarks and brands are the property of their respective owners.

To unsubscribe from all TechTarget
Data Center and Virtualization Media Group.
Go to unsubscribe.

TechTarget Data Center and Virtualization Media Group, 275 Grove Street, Newton, MA 02466
Contact: webmaster@techtarget.com

When you access content from this newsletter, your information may be shared with the sponsors of that content as described in our Privacy Policy.

Friday, December 29, 2017

Why today’s IT approaches fail

 
Why today’s IT approaches fail
When Facebook went down for just 40 minutes in September 2015, it cost the social media giant $500,000 – and wiped 4% off their stock price.

The impact of service outages is colossal, but today’s organizations are largely ill-equipped to handle downtime. How can you keep from becoming the next statistic?

Today’s featured resource offers a practical solution, detailing:
  • Service availability situation overview 
  • Why today’s approaches and tools fail 
  • How to effectively manage service availability 
  • And more
VIEW NOW

ABOUT THIS EMAIL

This email is published by the Data Center and Virtualization Media Group.

Copyright 2017 TechTarget, Inc. All rights reserved. Designated trademarks and brands are the property of their respective owners.

To unsubscribe from all TechTarget
Data Center and Virtualization Media Group.
Go to unsubscribe.

TechTarget Data Center and Virtualization Media Group, 275 Grove Street, Newton, MA 02466
Contact: webmaster@techtarget.com

When you access content from this newsletter, your information may be shared with the sponsors of that content as described in our Privacy Policy.

Word of the Day: Kubernetes

Word of the Day WhatIs.com
Daily updates on the latest technology terms |December 29, 2017
Kubernetes

Kubernetes is Google's open source system for managing Linux containers across private, public and hybrid cloud environments.

Kubernetes automates the deployment, scaling, maintenance, scheduling and operation of multiple application containers across clusters of nodes. Kubernetes contains tools for orchestration, service discovery and load balancing that can be used with Docker and Rocket containers. As needs change, a developer can move container workloads in Kubernetes to another cloud provider without changing the code.

With Kubernetes, containers run in pods. A pod is a basic unit that hosts one or multiple containers, which share resources and are located on the same physical or virtual machine. For each pod, Kubernetes finds a machine with enough compute capacity and launches the associated containers. A node agent, called a Kubelet, manages pods, their containers and their images. Kubelets also automatically restart a container if it fails.

Other core components of Kubernetes include:

  • Master: Runs the Kuberenetes API and controls the cluster.
  • Label: A key/value pair used for service discovery. A label tags the containers and links them together into groups.
  • Replication Controller: Ensures that the requested numbers of pods are running to user's specifications. This is what scales containers horizontally, ensuring there are more or fewer containers to meet the overall application's computing needs.
  • Service: An automatically configured load balancer and integrator that runs across the cluster.

Containerization is an approach to virtualization in which the virtualization layer runs as an application on top of a common, shared operating system (OS). As an alternative, containers can also run on an OS that's installed into a conventional virtual machine (VM) running on a hypervisor.

Containers are portable across different on-premises and cloud platforms, making them suitable for applications that need to run across various computing environments.

Kubernetes is mainly used by application developers and IT system administrators. A comparable tool to Kubernetes is Docker Swarm, which offers native clustering capabilities.

Quote of the Day

"We leverage a broad spectrum of operating systems for our application workloads. This is a testament to the inclusive and open nature of the Kubernetes ecosystem." - Justin Erenkrantz

 

Trending Terms

Google Container Engine
container management software
Docker Swarm
cluster
rolling deployment

 
Learning Center

Kubernetes multicloud orchestration pushes Docker portability forward
Kubernetes and Docker are more than just production-ready at one fintech company -- Docker portability across clouds is closer to reality.

Q&A: Former Googlers' startup nurtures enterprise Kubernetes
Enterprise Kubernetes in production will take a step closer to reality if former Google engineer and Heptio CEO Craig McLuckie has his way.

Enterprises get first glimpse into Kubernetes for Windows
With the public preview of Kubernetes 1.5, introduced in December 2016, enterprises get Kubernetes for Windows servers.

Containers and Kubernetes ease OpenStack lifecycle management pain
Kubernetes orchestration for the Mirantis lifecycle management tool is just one way Docker containers are being used to simplify OpenStack operations.

Tech firms roll out Kubernetes in production
Putting Google's Kubernetes in production requires some technical elbow grease, but it has DevOps benefits for companies such as Concur and Barkly.

Writing for Business

In Kubernetes, a replication controller scales containers horizontally, ensuring there are more or ________ containers to meet the overall application's computing needs.
A. less
B. fewer

Answer

 

 

 

Stay In Touch
For feedback about any of our definitions or to suggest a new definition, please contact me at: mrouse@techtarget.com

 

Visit the Word of the Day Archives and catch up on what you've missed!

 

FOLLOW US

TwitterRSS
About This E-Newsletter
This e-newsletter is published by the TechTarget network. To unsubscribe from Whatis.com, click here. Please note, this will not affect any other subscriptions you have signed up for.
TechTarget

TechTarget, Whatis, 275 Grove Street, Newton, MA 02466. Contact: webmaster@techtarget.com

Copyright 2016 TechTarget. All rights reserved.

3 KPIs you must establish to determine success

 
3 KPIs you must establish to determine success
Imagine a highly available business services environment.

Highly available business services rely on modern IT operations management (ITOM). What does that look like?
  • You have an availability dashboard structured around business services.
  • You also have consolidated event monitoring, so you can quickly identify the most serious issues that may impact service performance before they turn into outages.
  • These high-priority issues are then automatically routed and assigned to the right person.
New IT Operations Management best practices pioneered by ServiceNow customers have been proven to increase service availability. By developing a service availability strategy, you can address IT issues before they become business problems. This ebook can help you identify where availability challenges exist and improve your ability to analyze, prevent, and address problems before they occur.
VIEW NOW

ABOUT THIS EMAIL

This email is published by the TechTarget Data Center and Virtualization Media Group.

Copyright 2017 TechTarget, Inc. All rights reserved. Designated trademarks and brands are the property of their respective owners.

To unsubscribe from all TechTarget
Data Center and Virtualization Media Group.
Go to unsubscribe.

TechTarget Data Center and Virtualization Media Group, 275 Grove Street, Newton, MA 02466
Contact: webmaster@techtarget.com

When you access content from this newsletter, your information may be shared with the sponsors of that content as described in our Privacy Policy.

2018 predictions for end-user computing

End-User Computing Digest
The latest desktop and mobile coverage from TechTarget's network | Dec. 29, 2017
TechTarget
FEATURED STORY
End-user computing trends to know for 2018
by Kelly Stewart, Assistant Site Editor
Organizations need to pay attention to shifts in the trends around end-user computing to stay one step ahead. One expert predicts what those next steps should be. (SearchEnterpriseDesktop.com)
Advertisement
NEWS
 
Five Windows 10 resolutions to follow in 2018

IT pros who emphasize these resolutions, including a focus on the easy-to-overlook security holes in Windows 10, will have a great year ahead. (SearchEnterpriseDesktop.com)

 
Four bad VDI habits to kick in 2018

Bad habits with VDI can kill a deployment. In 2018 it's critical to keep storage, graphics processing, thin client savings and security monitoring in mind. (SearchVirtualDesktop.com)

EXPERT ADVICE
 
Windows 10 upgrade readiness quiz

A full upgrade to Windows 10 is easier said than done. Use this quiz to determine how ready you are to lead the migration charge. (SearchEnterpriseDesktop.com)

 
How to find success with DaaS

There is a lot more than cost that goes into planning a DaaS deployment. Know the missteps to avoid and top vendors that will best fit an organization's needs. (SearchVirtualDesktop.com)

 
Weigh the costs vs. benefits to build a mobile app

Is it too expensive to build an enterprise mobile app? To make the decision for your organization, find out how to break down the costs and the benefits. (SearchMobileComputing.com)

 
Customize the software on your Windows 10 image
Walk through the process of adding custom software, apps and assets to your Windows 10 image in audit mode. (SearchEnterpriseDesktop.com)
About This E-Newsletter
This e-newsletter is published by the TechTarget network. To unsubscribe from End-User Computing Digest, click here. Please note, this will not affect any other subscriptions you have signed up for.

TechTarget Networking Media Group, 275 Grove Street, Newton, MA 02466. Contact: webmaster@techtarget.com

Copyright 2017 TechTarget. All rights reserved.
TechTarget

Bitpipe.com Download Confirmation

Thank You for Downloading:
TechTarget
Unlocking differentiation with IoT requires a new comm. approach
TechTarget
You Might Also Be Interested In:
Communications vendors: 5 key considerations
Sponsored by Mitel Networks Limited
Not all unified communications and collaboration products (UCC) are equally effective in delivering the flexibility and integration your employees need to thrive. Uncover the 5 questions you should be asking when evaluating UCC vendors to ensure that you achieve the best ROI possible.
The Masiello Group propels connectivity with UCaaS – A case study
Sponsored by Windstream Communications
Find out how The Masiello Group was able to leverage UCaaS to improve communication with their agents, and most importantly, with their customers.
5 experts share insights on unifying your collaboration environment
Sponsored by AVI-SPL
In this Expert Q&A, experts from Cisco, Crestron, Biamp, NEC, and AVI-SPL share their insights and advice to help you create a unified collaborative enterprise.
Zurich Insurance Group applies collaboration technology to improve the work place
Sponsored by AVI-SPL
This case study explores how Zurich Insurance Group improved their work place to encourage a collaborative, creative space for employees to engage with.
Understand, manage & optimize your UC environment
Sponsored by Vyopta
The rise of multi-vendor, hybrid unified communication (UC) environments has become an unstoppable wave. By 2021, the hybrid market is estimated to grow to a $91.74 billion industry. Learn how to understand, manage, and optimize your own multi-vendor, hybrid UC environment effectively.
This newsletter is published by Bitpipe.com, part of the TechTarget network.

TechTarget, Member Services, 275 Grove Street, Newton, MA 02466.
Contact: webmaster@techtarget.com

Copyright 2017 TechTarget. All rights reserved. Designated trademarks and brands are the property of their respective owners.

When you access content from this newsletter, your information may be shared with the sponsors or future sponsors of that content as described in our Privacy Policy.

Privacy Policy | Unsubscribe

Looking back: 2017's top development trends

Application Development Digest
A roundup of application development content from TechTarget's network | December 29, 2017
TechTarget
FEATURED STORY
From bitcoin to deprecated Java, a look at 2017's top opinions
By Cameron McKenzie, Editor-in-chief

What were the most contested technology topics of 2017? On TheServerSide, issues such as bitcoin blockchains and deprecated Java methods generated the most comments and page views.

(TheServerSide.com)

Advertisement
NEWS
 
DevSecOps is a must-have in enterprise app development

DevSecOps, the practice of addressing security early in the application lifecycle, has caught on in the enterprise as developers must now also become security engineers.

(SearchSoftwareQuality.com)

 
What thought leaders were saying about Java SE 9 in 2017

Understandably, Java SE 9 was a popular topic of discussion in 2017, but so were DevOps and cloud native, according to this list of the 10 most popular podcasts of 2017.

(TheServerSide.com)

EXPERT ADVICE
 
New distributed tracing API completes the feedback loop

As apps get moved to the cloud and software has no fixed address, tracing and troubleshooting are challenges. However, a new distributed tracing API may help.
(TheServerSide.com)

 
Get a head start with IBM Bluemix tutorial

Take the time to properly configure your environment with help from this IBM Bluemix tutorial in order to properly get started with cloud frameworks and application services.

(SearchCloudApplications.com)

 
 
It's time to focus on DevOps database release management

Databases tend to be the last thing companies think about when going down the DevOps path. But that oversight can be costly. Here's what you need to think about.

(DevOpsAgenda.com)

 
Looking for a DevOps career path? Here's how to get started

With few certification or degree programs, getting started in DevOps can be tricky. Expert Chris Tozzi outlines options to help jump-start your DevOps career.

(DevOpsAgenda.com)

 
About This E-Newsletter
This e-newsletter is published by the TechTarget network. To unsubscribe from Application Development Digest, click here. Please note, this will not affect any other subscriptions you have signed up for.

TechTarget Application Development Media Group, 275 Grove Street, Newton, MA 02466. Contact: webmaster@techtarget.com

Copyright 2016 TechTarget. All rights reserved.
TechTarget

Healthcare ransomware: When to fight and when to pay

TechTarget
Business Technology Research     December 29, 2017
TechTarget
IN THIS ISSUE
Healthcare ransomware: When to fight and when to pay
SPONSORED BY: Commvault
In this white paper, uncover information on when to pay the ransom and when not to pay. Learn how to evaluate your ransomware breach and follow the solution that fits the situation.
Enhance your big data analytics with master data
SPONSORED BY: Information Builders
Learn about how you can enhance your big data analytics with master data to ensure a successful big data project.
New model for professional visual apps: Virtual workstations
SPONSORED BY: NVIDIA
The virtual workstation is gaining good reputation for professionals that work with high-performance graphical computing. Access this white paper to learn about virtual workstations and how they'll be utilized over the next few years.
4 ways a decoupled CMS can help deliver faster digital experiences
SPONSORED BY: BrightSpot
The delivery of brand experiences needs to be re-imagined – companies are facing the challenge of delivering consistent digital experiences across multiple devices and channels. Learn how you can create better brand experiences by leveraging a decoupled content management system (CMS).
How to provide friction-free customer experiences
SPONSORED BY: Zendesk
Discover how your organization can provide friction-free customer service experiences, with technology that taps into 5 functional areas, as well as Forrester's Total Economic Impact framework to choose the best customer relationship platform for your business.
This newsletter is published by TechTarget.

TechTarget Member Services, 275 Grove Street, Newton, MA 02466.
Contact: webmaster@techtarget.com

Copyright 2017 TechTarget. All rights reserved. Designated trademarks and brands are the property of their respective owners.

When you access content from this newsletter, your information may be shared with the sponsors or future sponsors of that content as described in our Privacy Policy.

Privacy Policy | Unsubscribe
TechTarget

Intro to Chrome Enterprise

 
Intro to Chrome Enterprise
Enterprise-ready Chrome devices meet the needs of a mobile workforce while offering streamlined IT operations and lower TCO. Powered by Chrome OS, they're built for delivering secure and fast access to critical business applications. They are easy to use, improve performance over time and have security at every level, from bootup to shutdown. Read this eBook to learn why Chrome devices are delighting IT and end users.
VIEW NOW

ABOUT THIS EMAIL

This email is published by the TechTarget Data Center and Virtualization Media Group.

Copyright 2017 TechTarget, Inc. All rights reserved. Designated trademarks and brands are the property of their respective owners.

To unsubscribe from all TechTarget
Data Center and Virtualization Media Group.
Go to unsubscribe.

TechTarget Data Center and Virtualization Media Group, 275 Grove Street, Newton, MA 02466
Contact: webmaster@techtarget.com

When you access content from this newsletter, your information may be shared with the sponsors of that content as described in our Privacy Policy.

Healthcare professionals need to know about bitcoin

TechTarget
Business Technology Research     December 29, 2017
TechTarget
IN THIS ISSUE
Healthcare professionals need to know about bitcoin
SPONSORED BY: Commvault
It's important for healthcare organizations to do their preliminary research into bitcoin, so that if a ransomware breach occurs they are able to get back to work. Learn more about bitcoin in this resource and about trends in ransomware.
5 considerations for securing hybrid clouds
SPONSORED BY: McAfee, Inc.
Uncover a number of articles and videos giving advice to those looking to expand to the cloud and secure it in the most effective and efficient way possible.
Sizing guidance for vGPU and Microsoft Windows 10
SPONSORED BY: NVIDIA
There are many factors to consider when sizing a virtual desktop environment including CPU, RAM, storage, network, and more. Download this guide for to guidance on how to assign the appropriate amount of frame buffer for Windows 10 knowledge worker use cases in graphics accelerated virtual environments.
Upgrading your core BI systems? 4 worst practices to avoid
SPONSORED BY: Information Builders
Aging systems put you at risk, and many companies are investing in core system upgrades and replacements. But BI and analytics are often sidelined during the upgrade process – which can degrade your performance. Inside this research report, learn 4 worst practices to avoid during upgrades, and gain recommendations on how to fix common pitfalls.
How digital transformation brings IT to the forefront
SPONSORED BY: BrightSpot
With digital transformation, push your IT team towards the center stage of the business decision-making process.
This newsletter is published by TechTarget.

TechTarget Member Services, 275 Grove Street, Newton, MA 02466.
Contact: webmaster@techtarget.com

Copyright 2017 TechTarget. All rights reserved. Designated trademarks and brands are the property of their respective owners.

When you access content from this newsletter, your information may be shared with the sponsors or future sponsors of that content as described in our Privacy Policy.

Privacy Policy | Unsubscribe
TechTarget