Living Social was Hacked…What Should You Do?

Big news hit the online world over the weekend, over 50 million Living Social subscribers were notified of a major cyber-attack which led to the unauthorized access to data on their servers, including names, e-mail addresses, date of birth for some users, and encrypted passwords (hashed and salted).

Living Social is a major daily deal site where people can seek out discount deals on things from a day at the spa to dinner for two. Consumers see these sites as safe but all it takes is something as harmless as a password in the hands of the wrong person to lead to so much destruction

Read more

Virtualization, the Cloud, and Multi-Tenant Environments

For organizations, the cloud’s per-use approach provides tangible relief from hardware or software investments by offering a pay-for-service model. The benefits include greater resource access, dynamic scaling, and improved costs, along with the ease of automated management for resources and performance. Companies adopt cloud computing to reduce infrastructure overhead, adjust service levels to meet changing needs, and to quickly deliver applications. However, with these advantages come certain limitations, especially in relation to security.

Read more

Traditional Telephony Concepts

Cisco Voice Technologies, now typically referred to as Unified Communications Technologies, not only depend on a solid network foundation, but also use conceptual building blocks from the world of traditional telephony. The reasons for this are:

Capability to interconnect the Unified Communications Environment to the PSTN
Creating “new world” equivalent logical functions that mimic “old world” methodologies
Understanding the basic elements utilized in older telephony can help in knowing how these same functions are created in Unified Communications networks. Here we will map out the basics of an analog telephone call.

Read more

Basic Project Management Techniques

In each organization problems are going to come up and a project is going to be created to help resolve this issue. Each project is unique and there are going to be different techniques a project manager can use to ensure a successful completion. We have complied a list of some basic techniques project managers use throughout the timeline based on the PMBOK® Guide—Fourth Edition.

Read more

Beginner’s Guide: Seven Layers of the OSI Model

The OSI model is a conceptual tool used to discuss and describe network functions. The use of a standard reference model is essential to communicating ideas as well as creating new technologies. It is a good idea to be familiar with the OSI model, the features assigned to each layer, and examples of common protocols or technologies associated with the OSI layers.

Read more