The Big Cloud Skills Gap

A recent study by market intelligence firm IDC shows that about 1.7 million cloud computing jobs could not be filled due to lack of training and certification as well as experience. Businesses are moving to the cloud at an exponentially accelerating rate. Various surveys of IT executives shows that 50% consider cloud a ‘high’ to ‘very high’ priority, and 67% are either planning to or are already using cloud computing, and 75% are concerned about security, access and data control.

Read more

CCNP Exam Prep Tips and Must Knows

In January of 2010, Cisco announced they were updating their CCNP curriculum and their certification exams through what they described as “a comprehensive process involving customers and partners from around the globe.” The revisions focused “on the competencies that are needed to plan, implement, and troubleshoot the routed and switched networks of today and are designed to be more predictive of job readiness.”

As a result, the exams became more challenging and focused on core competencies for routing, switching, and troubleshooting an enterprise network. This paper is a detailed outline to help students understand what information would be required to pass the Route, Switch, and T-Shoot exams. This is not a substitute for training and/or knowledge required to pass these exams.

Read more

A Guide to Key Virtualization Terminology — Part 1

One of the most important steps in mastering a new technology is learning the associated terminology or vocabulary. In the Information Technology (IT) field, this can be a very challenging step, as much of the terminology is often used inconsistently. Here we will definite terms associated with IT virtualization. It is mainly vendor-agnostic, but it does provide some vendor-specific terms, product names, and feature names used by VMware, Citrix, and Microsoft.

Read more

Living Social was Hacked…What Should You Do?

Big news hit the online world over the weekend, over 50 million Living Social subscribers were notified of a major cyber-attack which led to the unauthorized access to data on their servers, including names, e-mail addresses, date of birth for some users, and encrypted passwords (hashed and salted).

Living Social is a major daily deal site where people can seek out discount deals on things from a day at the spa to dinner for two. Consumers see these sites as safe but all it takes is something as harmless as a password in the hands of the wrong person to lead to so much destruction

Read more