Skip to main content

Posts

Showing posts from December, 2020

IT (Information Technology) Skill Gap

  In human resource management, an information technology (IT) skills gap is a mismatch between the technical knowledge an employer needs to meet business objectives and the capabilities of the organization's employees. Closing the IT skills gap by aligning the current state of workforce IT knowledge with forecasted future needs is a complicated proposition for C-level executives. Today, employers often struggle to locate and retain qualified tech talent, especially individuals with application development, security and data analysis skills. Common approaches to closing an IT skills gap include recruitment process outsourcing, social recruiting, off-site training, employee mentor incentives, mentoring services, in-house turnkey training and partnerships with universities. In many instances, an IT job will remain unfilled for an extended period of time when an employer needs to hire someone who has a very specific set of skills. In recruiting lingo, su...

Load balancing

  Load balancing is a technique used to distribute workloads uniformly across  servers or other compute resources to optimize network efficiency, reliability and capacity. Load balancing is performed by an appliance -- either physical or virtual -- that identifies in real time which server in a pool can best meet a given client request, while ensuring heavy network traffic doesn't unduly overwhelm a single server. In addition to maximizing network capacity and performance, load balancing provides failover. If one server fails, a load balancer immediately redirects its workloads to a backup server, thus mitigating the impact on end users. Load balancing is usually categorized as supporting either Layer 4 or Layer 7. Layer 4 load balancers distribute traffic based on transport data, such as IP addresses and Transmission Control Protocol (TCP) port numbers. Layer 7 load-balancing devices make routing decisions based on applica...

Maturity Model

  A maturity grid, also called a maturity model, is an assessment tool for evaluating an organization's level of progress towards a goal. The grid, which is a matrix laid out in rows and columns, typically lists the criteria that will be evaluated in the left-hand column. Each column's corresponding row has cells that describe, in a few words, the typical behaviour exhibited by an organization at each level of development. Typically, a maturity model has ten rows or less, with the first row defining entry level and the last row defining fully-developed  best practice. Maturity grids can be used to provide an organization with an initial benchmark for how close to 'fully developed' an organization is in regards to the criteria being assessed. They are also useful tools for leading discussions and providing management with roadmap for next steps. Sample maturity matrix Here is an example of a maturity grid for disaster recovery. Level 0 Naught ...

Virtual Storage Area Network (VSAN)

A virtual storage area network (VSAN) is a logical partition in a physical storage area network (SAN). VSANs enable traffic to be isolated within specific portions of a storage area network, so if a problem occurs in one logical partition, it can be handled with a minimum of disruption to the rest of the network. The use of multiple, isolated VSANs can also make a storage system easier to configure and scale out. Subscribers can be added or relocated without needing to change the physical layout. How VSAN works A virtual SAN appliance enables unused storage capacity on virtual servers to be pooled and accessed by virtual servers as needed. A virtual SAN appliance is most often downloaded as a software program that runs on a virtual machine, but some storage hardware vendors are beginning to incorporate virtual SAN appliances into their firmware. Depending on the vendor, a virtual SAN appliance might also be called a software-defined storage (SDS) appliance or, ...

Red team-Blue team

Red team-blue team is a simulation and training exercise where members of an organization are divided into teams to compete in combative exercises. In information security (infosec), the exercise is designed to identify vulnerabilities and find security holes in a company's infrastructure. The war games are also used to test and train security staff. Generally, members of the security team split into two groups: a red team and a blue team. The red team plays the role of a hostile force and the blue team plays defense as the organization. The red team's goal is to find and exploit weaknesses in the organization's security as the blue team works to defend the organization by finding and patching vulnerabilities and responding to successful breaches. The terms red team and blue team are often used to refer to cyberwarfare in contrast to conventional warfare. War games function as a means of testing for the worst-case scenarios...

Prescriptive analytics

Prescriptive analytics  is the area of business analytics (BA) dedicated to finding the best course of action for a given situation. Prescriptive analytics is related to both descriptive and predictive analytics. While descriptive analytics aims to provide insight into what has happened and predictive analytics helps model and forecast what might happen, prescriptive analytics seeks to determine the best solution or outcome among various choices, given the known parameters. Prescriptive analytics can also suggest decision options for how to take advantage of a future opportunity or mitigate a future risk, and illustrate the implications of each decision option. In practice, prescriptive analytics can continually and automatically process new data to improve the accuracy of predictions and provide better decision options. A process-intensive task, the prescriptive approach analyzes potential decisions, the interactions between decisions, the influences that bear...