| INSIDER Alert | Your guide to the top content posted this week for Insider members | | Computerworld Sometimes we need someone to have our back. Applications, believe it or not, are the same way. Applications don't always behave as we expect them to, and though Windows has built-in protections for program misbehavior and exploitation, it can sometimes be difficult to tell if those protections are active and what exactly they are defending. Enter EMET. Here's what it is, how it works and what's new in version 5. The Enhanced Mitigation Experience Toolkit, or EMET, is basically a shield or a shell that runs over Windows applications and forces them, regardless of how those applications were coded by their original developer, to take advantage of security defenses that are built into the Windows operating system.To read this article in full or to leave a comment, please click here(Insider Story) | Computerworld Want to speed up your Wi-Fi network, find the fastest hot spot when on the road, troubleshoot connectivity strength and more? I've got help. Check out five of my favorite Wi-Fi tips and tools, including plenty of free downloads.Use a free VPNWhen you're away from your home or office and use Wi-Fi, your Internet life can be an open book when you connect to an open Wi-Fi network. So protect yourself with a free VPN. There are plenty of them. If you're a Chrome user, check out the free ZenMate, which works as a Chrome extension. Firefox users might want to opt for Hola Unblocker, which works as a Firefox add-on.To read this article in full or to leave a comment, please click here(Insider Story) READ MORE | InfoWorld Michael Heil remembers when network convergence began to make sense to him. A few years ago, the manager of infrastructure engineering for Cone Health, a regional health care provider in central North Carolina, was asked to stand up a large virtualized SQL environment running Microsoft Amalga in 90 days with no additional resources. About the same time, he was also asked to implement a new document management system — again, with no extra hands on deck. READ MORE | Computerworld Every day, the many screens connecting me to the planetwide human hive mind are inundated with provocative headlines lamenting the end of IT. A host of not wholly disinterested parties armed with surveys, infographics, white papers and carefully crafted rhetoric assure me that IT has lost control. Perhaps, but control isn't what it used to be. I say this having just completed a series of research engagements looking into the historical evolution of leadership and management control. And I'll add this: Control keeping users in line never should have been applied as a metric for judging IT performance. Controlling users is not the logical end point of high-value IT. Control is a quaint and cartoonish managerial fantasy dating from the Victorian era in England and the Gilded Age in America. Control as a concept should be banished from the leadership lexicon.To read this article in full or to leave a comment, please click here(Insider Story) READ MORE | Computerworld There are good reasons to hire consultants. You can pull them in to add their objectivity, specialized expertise or the additional capacity you need to meet a deadline. But some of the reasons that consultants are hired are just wrong. Here are six:To offload the dirty work. Some executives want to bring in a hired gun when they're uncomfortable with the task at hand. One common version of this is hiring a layoff specialist to terminate staff. But good executives — good leaders — aren't afraid to get their hands dirty.If a staff reduction were imminent, they wouldn't shirk their duty to explain the situation, and they would lead the layoffs personally. That doesn't mean there aren't good reasons for hiring HR consultants. They can help coach the layoff team and ensure that labor law is followed. But the executive himself needs to do the dirty work.To read this article in full or to leave a comment, please click here(Insider Story) READ MORE | InfoWorld Docker has revolutionized application virtualization. This open source project enables users to package any application in a lightweight, portable container so that installing a server-side Linux app almost as easy as installing a mobile app -- from the command line, no less. Docker has caught on in record time, garnering support from Red Hat, Google, Microsoft, and more shortly after it burst onto the scene. In this Deep Dive, InfoWorld offers a dose of Docker wisdom: READ MORE | InfoWorld IDC estimates that enterprise data doubles every 18 months. That's an astounding statistic, but somewhat difficult to wrap your head around. A simple analogy may help. READ MORE | | | | |
No comments:
Post a Comment