Saturday, September 30, 2017

Bitpipe.com Download Confirmation

Thank You for Downloading:
TechTarget
Complete Guide to Disaster Recovery
TechTarget
You Might Also Be Interested In:
How to improve backups and data protection with an IT recovery plan
Sponsored by QuorumLabs Inc.
Testing your backups and your IT disaster recovery plan on a regular basis is important to maintain best practices and comply with data protection standards. Access this white paper to learn how to create a well-defined IT disaster recovery plan that will help you assess, test, and improve your backups and data protection.
How to improve DR/backup quality, reliability with continuous testing
Sponsored by QuorumLabs Inc.
Whatever the reason, most businesses will experience at least one instance of system downtime a year. To deal with this contingency, this paper makes the case for an "Always Be Testing" (ABT) approach to DR. Find out how you can realistically implement weekly testing to ensure that your backup and data protection strategy is sound and reliable.
Find out how cloud helps automate DR, cuts costs
Sponsored by CloudVelox
Speed, safety, and cost are all central concerns surrounding disaster recovery (DR). This is where cloud comes into play. Access this data sheet to learn about the key functions that cloud-based DR for AWS delivers and how they'll impact your business.
Top 5 mistakes in architecting a BDR solution
Sponsored by QuorumLabs Inc.
This white paper describes the top 5 mistakes that are made when architecting a BDR solution. Also included are 8 traits of powerful BDR.
How the US Navy influenced today's BDR market
Sponsored by QuorumLabs Inc.
This white paper explains how the US Navy helped transform today's BDR market. Discover an agnostic solution that fits into any environment to provide backup and disaster recovery capabilities that now offers the fastest recovery in the market, as well as the easiest backups.
This newsletter is published by Bitpipe.com, part of the TechTarget network.

TechTarget, Member Services, 275 Grove Street, Newton, MA 02466.
Contact: webmaster@techtarget.com

Copyright 2017 TechTarget. All rights reserved. Designated trademarks and brands are the property of their respective owners.

When you access content from this newsletter, your information may be shared with the sponsors or future sponsors of that content as described in our Privacy Policy.

Privacy Policy | Unsubscribe

Bitpipe.com Download Confirmation

Thank You for Downloading:
TechTarget
Put your DR initiatives to the test with these key strategies
TechTarget
You Might Also Be Interested In:
How to improve backups and data protection with an IT recovery plan
Sponsored by QuorumLabs Inc.
Testing your backups and your IT disaster recovery plan on a regular basis is important to maintain best practices and comply with data protection standards. Access this white paper to learn how to create a well-defined IT disaster recovery plan that will help you assess, test, and improve your backups and data protection.
How to improve DR/backup quality, reliability with continuous testing
Sponsored by QuorumLabs Inc.
Whatever the reason, most businesses will experience at least one instance of system downtime a year. To deal with this contingency, this paper makes the case for an "Always Be Testing" (ABT) approach to DR. Find out how you can realistically implement weekly testing to ensure that your backup and data protection strategy is sound and reliable.
How to create a complete cloud data protection strategy
Sponsored by QuorumLabs Inc.
This white paper explores how to implement a complete, cloud-integrated data protection strategy. Discover what 3 factors you should consider when taking this hybrid approach that incorporates cloud backup, instant recovery, and high availability appliances.
5 tips to bulk up your cloud disaster recovery strategy
Sponsored by Commvault
As more companies look to the cloud to handle the onslaught of data, current cloud-based data recovery strategies are leaving a lot to be desired. Cloud-based DR may look like a monstrous dragon to some, but this white paper offers five control tips to a more fully enveloped cloud DR strategy. Read on here. .
Accelerate your BDR: 7 ways to turn your turtle into a cheetah
Sponsored by QuorumLabs Inc.
Discover 7 ways you can accelerate your backup and disaster recovery and stay ahead of your competitors.
This newsletter is published by Bitpipe.com, part of the TechTarget network.

TechTarget, Member Services, 275 Grove Street, Newton, MA 02466.
Contact: webmaster@techtarget.com

Copyright 2017 TechTarget. All rights reserved. Designated trademarks and brands are the property of their respective owners.

When you access content from this newsletter, your information may be shared with the sponsors or future sponsors of that content as described in our Privacy Policy.

Privacy Policy | Unsubscribe

Compliance in 2017 revealed

 
Compliance in Full Throttle in 2017
This resource is brought to you by our sponsors
With the Trump administration rolling back regulations and the EU doubling down on them with the likes of the GDPR, the compliance landscape is changing like never before.

According to the TechTarget IT Priorities 2017 survey, nearly two-thirds of respondents reported that their organizations plan to implement compliance initiatives this year. Inside this e-guide uncover:
  • Survey results revealing why regulatory compliance is top of mind in 2017
  • Q&A with Jeffery Ritter on the benefits of compliance and information governance process alignment
  • And more
VIEW NOW

ABOUT THIS EMAIL

This email is published by the TechTarget CIO Media Group.

Copyright 2017 TechTarget, Inc. All rights reserved. Designated trademarks and brands are the property of their respective owners.

To unsubscribe from all TechTarget CIO Media Group,
Go to unsubscribe.

TechTarget CIO Media Group, 275 Grove Street, Newton, MA 02466
Contact: webmaster@techtarget.com

When you access content from this newsletter, your information may be shared with the sponsors of that content as described in our Privacy Policy.

How to put the cloud to work wrangling big data

 
How to put the cloud to work wrangling big data
Sponsored by: Oracle Corporation
By 2019, the Internet of Things alone will have created over 500 Zettabytes of data. Harnessing the power of this data could give your organization a serious leg-up over the competition. But how do you get there?

Where legacy systems fail, it’s time to consider cloud storage, but just any old cloud won’t cut it either.

Inside, learn about a cloud database that lets you create dedicated on-demand test environments, provision your integrated app environment and infrastructure instantly, allow others to build apps with fast preinstalled tools, and more.
VIEW NOW

ABOUT THIS EMAIL

This email is published by the TechTarget Storage Media Group.

Copyright 2017 TechTarget, Inc. All rights reserved. Designated trademarks and brands are the property of their respective owners.

To unsubscribe from all TechTarget Storage Media Group,
Go to unsubscribe.

TechTarget Storage Media Group, 275 Grove Street, Newton, MA 02466
Contact: webmaster@techtarget.com

When you access content from this newsletter, your information may be shared with the sponsors of that content as described in our Privacy Policy.

Kaminario vs Dell vs Tintri vs the rest: 24 SSD vendors ranked

 
Kaminario vs Dell vs Tintri vs the rest: 24 SSD vendors ranked
When talking about their all-flash offerings, many vendors will highlight - first and foremost - the cost savings as compared to traditional systems. The truth, however, is that this isn’t the biggest advantage of flash array adoption.

The real benefit comes in the app flexibility you can gain by adopting an AFA. But of course, this all hinges upon choosing the right system for your business.

Use this exhaustive buyer’s guide to help you sift through 24 SMB AFAs from 11 vendors, ranked based by a rigorous 8-step process, to find the best vendor for your enterprise.
VIEW NOW

ABOUT THIS EMAIL

This email is published by the TechTarget Storage Media Group.

Copyright 2017 TechTarget, Inc. All rights reserved. Designated trademarks and brands are the property of their respective owners.

To unsubscribe from all TechTarget Storage Media Group,
Go to unsubscribe.

TechTarget Storage Media Group, 275 Grove Street, Newton, MA 02466
Contact: webmaster@techtarget.com

When you access content from this newsletter, your information may be shared with the sponsors of that content as described in our Privacy Policy.

How effective is your cybersecurity framework?

 
How effective is your cybersecurity framework?
Sponsored by: Rsam
A recent survey revealed that 87% of InfoSec leaders said they plan to incorporate NIST Cybersecurity Framework (CSF) into their risk and compliance strategy.

Read this white paper to discover how a NIST CSF platform provides users like you with strong security and threat protection.

Discover how to implement NIST CSF with 4 levels, including:
  • Linking risks to NISDT CSF categories
  • Organizing level risk assessments
  • And 2 more
VIEW NOW

ABOUT THIS EMAIL

This email is published by the TechTarget Security Media Group.

Copyright 2017 TechTarget, Inc. All rights reserved. Designated trademarks and brands are the property of their respective owners.

To unsubscribe from all TechTarget Security Media Group,
Go to unsubscribe.

TechTarget Security Media Group, 275 Grove Street, Newton, MA 02466
Contact: webmaster@techtarget.com

When you access content from this newsletter, your information may be shared with the sponsors of that content as described in our Privacy Policy.

Ransomware for dummies

 
Ransomware for dummies
Within hours of the outbreak of WannaCry, it had infected more than 230,000 computers in over 150 countries.

Gain a deeper understanding of ransomware attacks, how they work, who is targeted, and what you can do to stop them.

Uncover 6 best practices for ransomware detection, including:
  • Perform asset discovery and vulnerability scans 
  • Implement intrusion detection 
  • Enable file integrity monitoring 
  • And 3 more
VIEW NOW

ABOUT THIS EMAIL

This email is published by the TechTarget Security Media Group.

Copyright 2017 TechTarget, Inc. All rights reserved. Designated trademarks and brands are the property of their respective owners.

To unsubscribe from all TechTarget Security Media Group,
Go to unsubscribe.

TechTarget Security Media Group, 275 Grove Street, Newton, MA 02466
Contact: webmaster@techtarget.com

When you access content from this newsletter, your information may be shared with the sponsors of that content as described in our Privacy Policy.

David's roadmap to hybrid cloud deployment

 
David's roadmap to hybrid cloud deployment
Your data center is undergoing some significant changes to shift roles from supporting internal processes to driving business growth. In order to meet demands to become more versatile and efficient, look to the hybrid cloud.

60% of enterprise IT organizations are testing or planning to implement a hybrid cloud strategy within two years. Access this white paper to see why so many are investing in hybrid clouds and how they help future-proof your data center.
VIEW NOW

ABOUT THIS EMAIL

This email is published by the Data Center and Virtualization Media Group.

Copyright 2017 TechTarget, Inc. All rights reserved. Designated trademarks and brands are the property of their respective owners.

To unsubscribe from all TechTarget
Data Center and Virtualization Media Group.
Go to unsubscribe.

TechTarget Storage Media Group, 275 Grove Street, Newton, MA 02466
Contact: webmaster@techtarget.com

When you access content from this newsletter, your information may be shared with the sponsors of that content as described in our Privacy Policy.

How to tighten up application login security

 
How to tighten up application login security
This resource is brought to you by our sponsors
With apps like Facebook that serve over 1.2 billion monthly active users, don’t rely solely on standard password requirements for your login.

Learn techniques to improve security for your mobile login information and messaging applications to help stop unauthorized users from accessing your personal data.
VIEW NOW

ABOUT THIS EMAIL

This email is published by the TechTarget Security Media Group.

Copyright 2017 TechTarget, Inc. All rights reserved. Designated trademarks and brands are the property of their respective owners.

To unsubscribe from all TechTarget Security Media Group,
Go to unsubscribe.

TechTarget Security Media Group, 275 Grove Street, Newton, MA 02466
Contact: webmaster@techtarget.com

When you access content from this newsletter, your information may be shared with the sponsors of that content as described in our Privacy Policy.

Machine data and business transformation: Connecting the dots

 
Machine data and business transformation: Connecting the dots
Sponsored by: Splunk
The ability to collect, analyze, and leverage machine data is a new competitive differentiator for companies undergoing digital business transformation.

But to be successful, you need to understand the process of taking a data-driven approach to business transformation.

In this market pulse report, learn:
  • How machine data makes a difference
  • Progress with and the current state of digital business transformation
  • Top objectives for leveraging machine data
  • Data priorities and benefits
  • Top drivers of digital business transformation
VIEW NOW

ABOUT THIS EMAIL

This email is published by the TechTarget Business Applications and Architecture Media Group.

Copyright 2017 TechTarget, Inc. All rights reserved. Designated trademarks and brands are the property of their respective owners.

To unsubscribe from all TechTarget Business Applications and Architecture Media Group.
Go to unsubscribe.

TechTarget Business Applications and Architecture Media Group, 275 Grove Street, Newton, MA 02466
Contact: webmaster@techtarget.com

When you access content from this newsletter, your information may be shared with the sponsors of that content as described in our Privacy Policy.

Machine Learning 101

 
Machine Learning 101
The ability to collect, analyze, and leverage machine data is a new competitive differentiator for companies undergoing digital business transformation.

But to be successful, you need to understand the process of taking a data-driven approach to business transformation.

In this market pulse report, learn:
  • How machine data makes a difference
  • Progress with and the current state of digital business transformation
  • Top objectives for leveraging machine data
  • Data priorities and benefits
  • Top drivers of digital business transformation
.
VIEW NOW

ABOUT THIS EMAIL

This email is published by the Data Center and Virtualization Media Group.

Copyright 2017 TechTarget, Inc. All rights reserved. Designated trademarks and brands are the property of their respective owners.

To unsubscribe from all TechTarget
Data Center and Virtualization Media Group.
Go to unsubscribe.

TechTarget Storage Media Group, 275 Grove Street, Newton, MA 02466
Contact: webmaster@techtarget.com

When you access content from this newsletter, your information may be shared with the sponsors of that content as described in our Privacy Policy.

Top 8 steps for effective mobile security

 
Top 8 steps for effective mobile security
This resource is brought to you by our sponsors
For both Android and Apple users, the mobile app market is growing rapidly and users can choose from over 2 million applications.

How do you know what apps are suitable for your business environment?

In this expert e-guide, discover ways to boost mobile application security by performing regular assessments to help eliminate an enterprise’s vulnerability to data breaches and attacks.

IBM Privacy Statement    TechTarget Privacy Policy
VIEW NOW

ABOUT THIS EMAIL

This email is published by the TechTarget Security Media Group.

Copyright 2017 TechTarget, Inc. All rights reserved. Designated trademarks and brands are the property of their respective owners.

To unsubscribe from all TechTarget Security Media Group,
Go to unsubscribe.

TechTarget Security Media Group, 275 Grove Street, Newton, MA 02466
Contact: webmaster@techtarget.com

When you access content from this newsletter, your information may be shared with the sponsors of that content as described in our Privacy Policy.

Machine data: 4 key use cases to achieve high value

 
Machine data: 4 key use cases to achieve high value
Sponsored by: Splunk
This resource provides a high-level overview of the value you can get from the machine data created by your virtual and physical infrastructure as part of normal operations.

This data can support a variety of use cases, ranging from monitoring your cloud deployments to identifying breach attempts and plugging vulnerabilities.
VIEW NOW

ABOUT THIS EMAIL

This email is published by the TechTarget Business Applications and Architecture Media Group.

Copyright 2017 TechTarget, Inc. All rights reserved. Designated trademarks and brands are the property of their respective owners.

To unsubscribe from all TechTarget Business Applications and Architecture Media Group.
Go to unsubscribe.

TechTarget Business Applications and Architecture Media Group, 275 Grove Street, Newton, MA 02466
Contact: webmaster@techtarget.com

When you access content from this newsletter, your information may be shared with the sponsors of that content as described in our Privacy Policy.

Friday, September 29, 2017

Word of the Day: ping strangeness

Word of the Day WhatIs.com
Daily updates on the latest technology terms |September 29, 2017
ping strangeness

Ping strangeness is a term used in troubleshooting to describe the incidence of an unusual pattern of ICMP ECHO_REQUEST packets being sent to a specific network node or an unusual number of error messages returning.

Ping (Packet Internet Groper) is a utility program that allows a user or program to verify that a particular IP address exists and can accept requests. Ping can be used as an alternative to the traceroute utility to troubleshoot network connectivity and latency issues. It is faster than traceroute and generates less network traffic.

 

When a user issues a ping request, the program formats an ICMP ECHO_REQUEST packet and sends it to a designated target address. If the remote IP address is active, it responds with an ICMP ECHO_REPLY packet. Ping then uses the timestamp of the Echo Reply to calculate a round-trip time and gauge response time.

 

If the target address is unavailable or something else is not working normally, Ping will report an error. Common errors include Destination Unreachable, Unknown Host and Request Timed Out.

 

When there is an unusual pattern of ICMP ECHO_REPLY packets being sent to the same server in the same time period, or there is an unusual number of error messages, this "strange" pattern is worth investigating. It could be that Ping is being used to carry out a denial of service attack (DoS) or look for attack vectors.

Quote of the Day

"While most every network professional has learned how to use traceroute, many may not understand its true power as one of the most vital network troubleshooting tools." - Michael Gregg

 

Trending Terms

ping

troubleshooting

traceroute
time-to-live
ICMP

 
Learning Center

How to use traceroute to troubleshoot network problems
See how to use traceroute to detect potential redirects of traffic.

How can I troubleshoot AWS connectivity problems?
When AWS connectivity becomes faulty, businesses can use ping and other utilities to determine the problem. It's important to also check AWS availability.

Network fault management in today's complex data centers
Network fault management takes new forms as new technologies and designs change the face of today's modern networks. Here's what you need to know to identify and troubleshoot faults in network designs and technologies.

Troubleshooting network issues in an era of reduced visibility
Troubleshooting network issues is never easy, particularly as networks become more distributed. But help is on the way.

Planning for enterprise network testing
Enterprise network testing is about achieving a deeper understanding of an organization's network to provide service and quality for end users.

Quiz Yourself

An _______ provides controlled access to authorized customers, vendors and partners outside the company.
a. Extranet
b. Intranet
Answer

 

Stay In Touch
For feedback about any of our definitions or to suggest a new definition, please contact me at: mrouse@techtarget.com

 

Visit the Word of the Day Archives and catch up on what you've missed!

 

FOLLOW US

TwitterRSS
About This E-Newsletter
This e-newsletter is published by the TechTarget network. To unsubscribe from Whatis.com, click here. Please note, this will not affect any other subscriptions you have signed up for.
TechTarget

TechTarget, Whatis, 275 Grove Street, Newton, MA 02466. Contact: webmaster@techtarget.com

Copyright 2016 TechTarget. All rights reserved.

Bitpipe.com Download Confirmation

Thank You for Downloading:
TechTarget
Digital transformation guide: Planning and implementation
TechTarget
You Might Also Be Interested In:
Advice from a leading expert on digital transformation
Sponsored by Equinix
Your company needs to perform in the digital economy or succumb to new digital threats. If you're like most companies, no matter where the digital threat comes from, you aren't sure how to respond to it. Access this e-guide to get advice from a CIO dedicated to helping businesses survive their digital transformations.
Why 41% say digital transformation has increased market share
Sponsored by Commvault
What is driving the era of digital transformation and how will it impact you? How are the experts defining the term? Access this infographic to learn about the key factors that CIOs are looking for in their transformation efforts.
Which stage of digital transformation are you in?
Sponsored by Hewlett Packard Enterprise
CIOs and other leaders are tasked with taking their organizations to the next level in digital transformation; delivering the agility to stay competitive in a dynamic global market. Access this IDC report to see how CIOs and business leaders should approach assessing their organization's maturity and the next step in their digital transformations.
Have innovative ideas? Here's how to monetize them with digital transformation
Sponsored by Mendix
We are currently in an age of disruption. Leading organizations everywhere are digitizing, and using their newfound digital capabilities to out-class their competitors. In this keynote presentation from Mendix World 2016, Geoffrey Moore, author of the best-seller "Zone to Win", discusses what it takes to become a disrupter in your space.
What is digital transformation? And how can you prepare for it?
Sponsored by Red Hat
This IDC InfoBrief examines the drivers, value, challenges, and potential solutions of digital transformation.
This newsletter is published by Bitpipe.com, part of the TechTarget network.

TechTarget, Member Services, 275 Grove Street, Newton, MA 02466.
Contact: webmaster@techtarget.com

Copyright 2017 TechTarget. All rights reserved. Designated trademarks and brands are the property of their respective owners.

When you access content from this newsletter, your information may be shared with the sponsors or future sponsors of that content as described in our Privacy Policy.

Privacy Policy | Unsubscribe

Bitpipe.com Download Confirmation

Thank You for Downloading:
TechTarget
Digital transformation guide: Planning and implementation
TechTarget
You Might Also Be Interested In:
Advice from a leading expert on digital transformation
Sponsored by Equinix
Your company needs to perform in the digital economy or succumb to new digital threats. If you're like most companies, no matter where the digital threat comes from, you aren't sure how to respond to it. Access this e-guide to get advice from a CIO dedicated to helping businesses survive their digital transformations.
Why 41% say digital transformation has increased market share
Sponsored by Commvault
What is driving the era of digital transformation and how will it impact you? How are the experts defining the term? Access this infographic to learn about the key factors that CIOs are looking for in their transformation efforts.
Which stage of digital transformation are you in?
Sponsored by Hewlett Packard Enterprise
CIOs and other leaders are tasked with taking their organizations to the next level in digital transformation; delivering the agility to stay competitive in a dynamic global market. Access this IDC report to see how CIOs and business leaders should approach assessing their organization's maturity and the next step in their digital transformations.
Have innovative ideas? Here's how to monetize them with digital transformation
Sponsored by Mendix
We are currently in an age of disruption. Leading organizations everywhere are digitizing, and using their newfound digital capabilities to out-class their competitors. In this keynote presentation from Mendix World 2016, Geoffrey Moore, author of the best-seller "Zone to Win", discusses what it takes to become a disrupter in your space.
What is digital transformation? And how can you prepare for it?
Sponsored by Red Hat
This IDC InfoBrief examines the drivers, value, challenges, and potential solutions of digital transformation.
This newsletter is published by Bitpipe.com, part of the TechTarget network.

TechTarget, Member Services, 275 Grove Street, Newton, MA 02466.
Contact: webmaster@techtarget.com

Copyright 2017 TechTarget. All rights reserved. Designated trademarks and brands are the property of their respective owners.

When you access content from this newsletter, your information may be shared with the sponsors or future sponsors of that content as described in our Privacy Policy.

Privacy Policy | Unsubscribe

What's trending at Java One?

Application Development Digest
A roundup of application development content from TechTarget's network | September 29, 2017
TechTarget
FEATURED STORY
JavaEE 8 and Java 9 trending large at JavaOne 2017
By Tom Nolle, Contributor

What are the big trends in the Java world today? Just look at the JavaOne 2017 schedule and you'll see it goes way beyond just JavaEE 8 and the new Java 9 release.

(TheServerSide.com)

Advertisement
NEWS
 
Artificial intelligence in software testing has arrived

Machine learning can make many software testing tasks easier, faster and more reliable. Here's how AI is going to change the testing landscape, and what it means for testers.

(SearchSoftwareQuality.com)

 
Twilio Studio brings low-code development to DevOps

Twilio has introduced Twilio Studio, a new, low-code visual development environment that enables developers and business users to collaborate using DevOps practices to build apps.

(SearchCloudApplications.com)

EXPERT ADVICE
 
Capital One's use cases for implementing microservices

Capital One has implemented microservices to improve DevOps teams and how containerization played a role. Senior Director of Technology Irakli Nadareishvili explains.
(SearchMicroservices.com)

 
Which PaaS platforms support production needs best?

Need a PaaS platform with strong production support? Explore production support and SLAs of AWS Elastic Beanstalk, IBM Bluemix, Google App Engine and Microsoft Azure.

(SearchCloudApplications.com)

 
 
Why private APIs are the hottest thing around and other news

We all know APIs are popular, but a new survey from Postman shows just how important they are. In other news, Sauce Labs offers more support for the latest iPhone.

(SearchMicroservices.com)

 
The benefits of MBaaS and a mobile app architecture

Many companies today are turning to MBaaS platforms that take the pain out of back-end management by enabling microservices and making API management the center of the system.

(SearchMicroservices.com)

 
About This E-Newsletter
This e-newsletter is published by the TechTarget network. To unsubscribe from Application Development Digest, click here. Please note, this will not affect any other subscriptions you have signed up for.

TechTarget Application Development Media Group, 275 Grove Street, Newton, MA 02466. Contact: webmaster@techtarget.com

Copyright 2016 TechTarget. All rights reserved.
TechTarget