Skip to main content

Posts

Showing posts from July, 2019

Embedded System Security

Embedded system security is a strategic approach to protecting software running on embedded systems from attack. An embedded system is a programmable hardware component with a minimal operating system and software. Embedded systems are designed to perform a dedicated function or functions. Found in consumer electronics, process control systems, aircraft, in-car systems and many other applications, embedded systems need to be extremely reliable. Because of their small size and limited compute resources, however, they can present security challenges for designers and developers. The firmware in embedded systems can be difficult (or impossible) to update, so in the past, such systems were often designed to have a life cycle of 15 years or more. With the growth of the internet of things (IoT), however, the nature of embedded systems is changing and the number of possible attack vectors is growing exponentially. Today, an embedded system in a smart device can be hacked to take co...

CloudStack

Apache CloudStack is an open source infrastructure as a service (IaaS) platform that allows IT service providers to offer public cloud services and individual companies to provide their own private cloud and hybrid-cloud services on-premises. CloudStack includes a compute function that allocates virtual machines to individual servers, a network function that manages switches to create and manage virtual networks, object and block storage systems, an image management function and a cloud computing management interface that supports all of the software stack's components. CloudStack allows administrators to deploy and manage large networks of virtual machines running the following hypervisors: VMware KVM Citrix XenServer Xen Cloud Platform (XCP) Oracle VM server Microsoft Hyper-V Users can manage their cloud deployments through a command line tool, a RESTful API or Web interface. CloudStack also provides an API that's compatible with AWS EC2 an...

System Administrator (Sysadmin)

In information technology (IT), a system administrator (sysadmin) is a person who supports a multi-user computing environment and ensures continuous, optimal performance of IT services and support systems. System administrator job responsibilities vary greatly among employers. In a large enterprise, the title system administrator may be used to describe any administrator who is responsible for a specialized IT system such the one that supports servers. Depending upon the specialty, the systems administrator may also be known as a data center administrator, a network operations center (NOC) administrator, a virtualization administrator, a server administrator or a database administrator. Smaller IT departments generally give the system administrator position a wider scope of responsibilities, and in some organizations, a sysadmin may need to support everything from end user desktop computers, to the organization's local area network (LAN), wireless LAN (WLAN), voice ...

Automated Testing

Automated testing is a process to validate that software functions appropriately and meets requirements before it is released into production. This form of software testing uses scripted sequences that are executed by testing tools. An organization can apply automated checks to a broad range of test cases, such as unit, regression and API testing. Automated software testing's main benefit is that it simplifies as much of the manual effort as possible into a set of scripts. If unit testing consumes a large percentage of a quality assurance (QA) team's resources, for example, then this process should be evaluated as a candidate for automation. Automated testing tools execute tests, report outcomes and compare results with earlier test runs. Automated tests can run repeatedly at any time of day. This approach fits in with continuous testing as well as continuous integration and continuous delivery (CI/CD) software development practices, which aim to shuttle code changes...

Material requirement planing (MRP)

Material requirements planning (MRP) is a system for calculating the materials and components needed to manufacture a product. MRP is one of the most widely used systems for harnessing computer power to automate the manufacturing process. It consists of three primary steps: Taking inventory of the materials and components on hand Identifying which additional ones are needed Scheduling production or purchase. IBM engineer Joseph Orlicky developed MRP in 1964 after he studied the Toyota Production System, which was the model for the lean production methodology. Power tool maker Black & Decker built the first computerized MRP system that same year, according to several sources. It's important to note, however, that MRP and lean production are not the same and are considered by some practitioners to be antithetical, though some say MRP can help with lean production. MRP is considered a "push" system -- inventory needs are determined in advance, and ...

Snackable content

Snackable content is website content that is designed to be easy for readers to consume and to share. Companies with customer-facing websites often need to publish a constant supply of fresh content to drive site traffic and boost awareness of their brand. From a content marketing and brand awareness perspective, Web content must be snackable. With the overwhelming volume of information on the Web, if site visitors aren't intrigued enough by the content to read it and -- perhaps even more importantly -- share it with their social networks, then the content doesn't have much business value. Snackable content should help support the brand by sharing information about the industry or the company's story, not by pushing products. An important goal of snackable content is to tempt the reader to consume more content. Snackable content tries to capture the attention of website visitors who are browsing and don't have the time or patience to consume long, text-heavy ...

Time Management

One of the most effective skills you can have in life is powerful and effective  time management. If you're not managing your time well, there's no way you're going to reach your goals at work and the life outside of it.  Sure, t he truth is that time is the greatest equalizer in life. No matter who you are, your age, income, gender, race or religion, you have the same amount of time as the next person. Whether you're filthy rich or dirt poor, your time is the same. It's not about how much time you have. It's about how effectively you  manage your time. So, if you're serious about achieving your goals, not only do you need to set those goals the right way, but you also have to get serious about avoiding distractions and becoming too immersed in the  bad habits that you know you need to quit. Time-wasters need to fall by the wayside, and serious grit-and-bear-it hard work needs to take its place. Time management statistics show that 15 minute...

Network-Attached Storage (NAS)

Network-attached storage (NAS) is dedicated file storage that enables multiple users and heterogeneous client devices to retrieve data from centralized disk capacity. Users on a local area network (LAN) access the shared storage via a standard Ethernet connection. NAS devices typically do not have a keyboard or display and are configured and managed with a browser-based utility. Each NAS resides on the LAN as an independent network node, defined by its own unique Internet Protocol (IP) address. What most characterizes NAS is ease of access, high capacity and fairly low cost. NAS devices provide infrastructure to consolidate storage in one place and to support tasks, such as archiving and backup, and a cloud tier. NAS and storage area networks (SANs) are the two main types of networked storage. NAS handles unstructured data, such as audio, video, websites, text files and Microsoft Office documents. SANs are designed primarily for block storage inside databases, also know...