Posts

Showing posts from August, 2020

What Makes a Security Plan?

      Hello, and welcome back to my blog. This week, I would like to quickly discuss the levels that go into making a security plan. These types of plans are an important tool for IT departments and Cybersecurity Administrators to design a plan that will help protect or slow down an attack on the network.     Of course, security plans can vary from company to company; however, their purpose remains the same, with threats looming every day. With IT managers adjusting in response to the ever-changing threats, the created security plan must be designed to stop or slow down any attempt to breach network defenses. Below we will look at the principal components of a security plan and what they entail.    Separate Networks              As the name suggests, having more than one network can protect company assists from hackers and the like. The reason being is that having every computer on one network would lead to issues if that subsequent work were to fail, which would stop operati

32-bit vs. 64-bit: What are the differences

  As with all Microsoft Windows Operating Systems, there are many different flavors. From Home to Pro editions from 32-bit to 64-bit, there is something for everyone. In terms of architecture, what are the differences?   A quick history    In 1993, Microsoft released Windows NT 3.1, which was a fully 32-bit operating system. This version of Windows brought NTFS to the masses. In 2003, Microsoft would introduce a 64-bit Windows XP edition that took advantage of the 64-bit processors released.   What are the differences?   64-bit processors are more complex than 32-bit versions. This is because 64-bit processors can handle more data at once compared to the 32-bit processors. It can store more computational values, including memory addressing, which means it can access over four billion times the physical memory of a 32-bit version.   In terms of Windows Server, having the 64-bit version of the Server OS would allow for better performance with applications and utilize

The Five Ways to Migrate Applications to the Cloud.

  Hello, and welcome to my blog!   This week we will be discussing the Five Ways to Migrate Applications to the Cloud.    Before we begin, perhaps it would be best to chat about what is Cloud computing. So, Cloud computing is the on-demand availability of computer system resources, especially data storage and computing power, without direct active management by the user.    Now, to make things clear from some, the Cloud is a server that is located in another location. On that server, the user may store applications, which then he or she can have access to that information at a later time via the Internet. However, there can be some issues when trying to migrate applications to the Cloud, which we will be discussing.    Organizations seeking to move applications into the Cloud have five options: rehost on infrastructure-as-a-service (IaaS), refactor for platform-as-a-service (PaaS), revise for IaaS or PaaS, rebuild on PaaS, or replace with software-as-a-service (SaaS), according

The Internet of Things and possible vulnerabilities

  So, what is the Internet of Things anyway?        The Internet of Things or IoT is an extensive network of devices that are constantly sharing information. For example, all over the world, there are millions of devices, such as smartphones, TVs, computers, game consoles, tablets, refrigerators, stoves, and even havoc systems connected to the Internet. Moreover, other things, such as motor vehicles, trains, ships, and other things, are now obtaining access to the Internet. All these devices are exchanging information every day other the Internet. Thus, the Internet of things. It is strange to think about these things as having access to the Internet; however, some of these items require receiving updated firmware like refrigerators or electric cars. These updates carry new features, and security updates that protect these items from attack as hackers look to gain access to obtain financial information or access to sensitive information. But why would someone what to gain access to m

User Acceptance Testing

What is User Acceptance Testing?              User Acceptance Testing (UAT) is the final stage in the software development life cycle. At this stage, users will test the software to see if they can carry out tasks that the software was designed to do and check for any issues that can be brought to the developer for tweaking. A well designed UAT test provides a thorough vetting of the application. Also, a UAT test provides a macro-level overview of how complete an application is. How are they administered?                Several steps need to be considered before performing a UAT test. Following these phases is essential to a successful test result which are: 1. Knowledge Gathering for Test Plan                A UAT test planning should always be done first as gathering information required to perform a comprehensive test. It requires extensive collaboration between the integration manager, the relevant business process owners, and the different functional leads. The informati