25 Aug 2015 | Jim Brogden
SAP Eyes the Future with an Ear on the Past

Listening to customers and then developing tools that perfectly solve their business problems may seem like common sense for BI software makers, but it hasn’t always been the case. In the not-so-distant past, new releases were based purely on mysterious in-house choices made by product development teams. The new features added were mostly what they perceived to be the needs of users or were requested by a single deep-pocketed customer. New releases always came with some new functionality, but they also left customers craving more. The product development team just didn’t know it. There has always been a major disconnect between users and the vendor’s software development team. Thankfully, that model is changing.

Read the full story »
28 Aug 2015 | Johnny Bass | CCNP, CCNP Security, Certification, Cisco
CCNP Security Question of the Week: NTP on a Cisco ASA

Which three options are default settings for NTP on a Cisco ASA? (Choose three.)

continue
26 Aug 2015 | James Michael Stewart | Certification, CompTIA, Security+
Security+ Question of the Week: Tailgating

What mechanism can be used to prevent tailgating?

continue
24 Aug 2015 | Guest Authors | Certification, PMP, Project Management
PMP Formula of the Week: Risky Task

You are in the Executing phase of your project. As project manager, you receive weekly status reports on work progress from team members. In reviewing their input, you are particularly interested in two tasks: task 89 has an EST (estimated start time) of 45 and a LST (late start time) of 58 and task 101 has an EST of 64 and a LST of 51. Which of these tasks is riskiest?

continue
21 Aug 2015 | Johnny Bass | CCNP, CCNP Security, Certification, Cisco
CCNP Security Question of the Week: SSH Login

Which two configurations are needed to enable SSH login without a password on an IOS router?

continue
19 Aug 2015 | James Michael Stewart | Certification, CompTIA, Security+
Security+ Question of the Week: Good Password Behavior

Which of the following is an example of good password behavior?

continue
18 Aug 2015 | Rich Hummel | Hacking & Cybercrime, Security
How Your Personal Cybersecurity Habits Threaten Your Organization

In a recent survey conducted by Enterprise Management Associates (EMA) of more than six hundred people (non-IT and non-security staff), revealed more than fifty-six percent of corporate employees had not received security or policy awareness training from their organizations.

continue