Archive for the ‘Admin Tools and Tips’ Category

The Evolving Role of A CIO – And Why You Need to Know It

It wasn’t until recently that CIO became a job title recognized across the world, and particularly within organizations that consider technology as a strategic pillar. However, after an initial glory period, the scope of a CIO’s role started getting stonewalled.

For instance, in many companies, the CIO is seen as somebody who ensures that technology becomes an enabler for the other C-Suite executives to achieve their goals. For several others, it’s about one leader for oversight of everything the company is doing to replace on-premise systems with cloud-based alternatives.

However, the modern CIO’s role cuts through deeper waters. This guide tries to bring these latent ripples to the surface, to truly present the scope of a CIO’s role in the true shape.

 

Follow The Leader!

 

Being Torch Bearers for DevOps Process Transformation

Though DevOps is certainly not a new idea anymore, only a precious few organizations have been able to implement it. Done rightly, DevOps enables an enterprise to make technology a driver of quick process improvements that enable it to do business better. The reverse, sadly, is also true.

DevOps’ unrelenting focus on speed of development could as easily become the cause of frequent system crashes and application downtime for an enterprise. Here, success is dependent on a visionary leader who is also able to implement tight controls over the release process, with a focus on quick and credible feedback loops to quickly stabilize the system.

 

Blockchain? IoT? Both?

Industrial IoT proved to be one of the most talked about enterprise technologies in 2017. The transformative impact of smart sensors and connected devices in an industrial environment has held CIOs in awe for some years now. Though the emergence of the end to end IoT vendors diluted the fame-equity of the CIO in many industries, there’s a trend that’s helping CIOs reclaim the lost ground. And that’s in the form of BIoT.

The blockchain is the system of community-based digital ledger management that offers practically hack-proof information management. The same technology can also be used to offer credible information from a vast network of sensors in millions of devices. The information such captured will help analysts bring out insights that help them create processes and products that add immense value. Individually, as well as together, blockchain and industrial IoT are immensely powerful technological forces that need a potent CIO to be channelled properly for a company.

 

Technology versus Humanity

 

Safeguarding The Enterprise’s Digital Assets

As per a recent PwC survey, 61% of CEOs consider cybersecurity as a major threat to national and commercial interests. And, all of them look up to CIOs to make the enterprise prepared to combat even the most sophisticated cyber-attacks.

CIO’s role, in the context of cybersecurity, was often imagined to be limited to cybersecurity vendor management, data security process improvement, and disaster recovery and business continuity assurance. However, the modern CIO has to shape the IT strategy of the company with cybersecurity concerns firmly in mind.

In a scenario where every new access point in the enterprise IT ecosystem adds to the threat surface area, CIOs need to help organizations strike the right balance between security and mobility. Considering the huge value of intellectual property and digital assets, the ‘value’ of the CIO in ensuring these assets remain secure is immense. Particularly after the multiple ransomware attacks in 2017, enterprises have realized how crucial the CIOs role is in terms of upgrading the security readiness of an enterprise.

https://images.pexels.com/photos/356056/pexels-photo-356056.jpeg?w=940&h=650&dpr=2&auto=compress&cs=tinysrgb

 

The Modern CIOs Role in Making the Best Technologies Truly ‘Best’ For the Company

An IBM study done back in 2016 revealed that 58% of the CIOs consciously pursued technologies with the potential to truly transform processes and deliver superb business value. Though ‘disruption’ has been overused to such an extent that the word has stopped meaning anything, it has to be said that these CIOs realize the risk of remaining still in times when technologies are growing at breakneck speed.

The modern CIO is not content with managing his/her enterprise’s me-too journey on the boar of a new technology. The modern CIO knows that he/she has to choose the boat, the route, the speed, the crew, and the destinations. These are the kind of leaders that take risks, have a vision, can build teams, and motivate the urge to innovate without the fear of failure.

 

Making The Company’s Technological Foundation Strong Enough to Support Super-Fast Growth

The goal of growth for the enterprise is common to all C-suite employees. However, the CIOs responsibility is to build system capabilities and technological capabilities that can support fast growth. Considering the pace at which economic models are changing, the focus of large enterprises on growth via mergers and acquisitions, and expansion of SMB operations across international borders, enterprise technologies need to be scalable, flexible, and highly customizable. This can only happen when the CIO continues to upskill and expand his/her horizons. The role of a CIO, hence, is a growth enabler and not an operation enabler.

 

How Can Traditional CIOs Evolve Into Present and Future Ready CIOs?

It’s natural for today’s IT leaders to wonder – what skills does it take to become a successful CIO? Well, considering how the role of CIO has evolved beyond technology management, today’s leaders need to quickly upgrade their understanding of how technologies enable better business. Also, the political awareness required to manage a vast number of stakeholders within the technological environment is essential to achieve sustainable success in the capacity of a CIO. Apart from the technological awareness, CIOs need negotiation and business skills. Also, relationship management and partner management will become more important over time.

 

Concluding Remarks

The CIO is an enterprise’s torchbearer when it comes to the wide and often dimly lit fields of technology. From continually improving technology delivery process to securing the digital and intellectual properties of the company, from keeping the enterprise’s technology foundation strong to embracing and adopting disruptive technologies – the CIO does it all, and a lot more.

 

 

Author: Rahul Sharma

Reliable Tips That Will Prevent You From Being Victimized by Ransomware

In spite of the fact that it’s causing millions of dollars of cybercrime-related damage to businesses annually, not many enterprise computer users truly understand what ransomware is. Naturally, till the time WannaCry and Petya ransomware attacks became global discussion points in the first half of 2017, even the general understanding of this form of cybercrime wasn’t any good. A recent survey done with business executives revealed that 1 in 3 would agree to pay to retrieve stolen or locked data. For organizations that have already been targeted once, the percentage becomes almost double (55%).

 

A Refresher on Ransomware

Ransomware is perpetrated via spam links and phishing emails, which eventually lead to the installation of codes that lock out your computer’s data, after which the perpetrators ask you to pay ransom to get the data unlocked. Because business and massive financial value (even if it’s notional) it’s clear that the ‘revenue model’ of ransomware will keep on motivating cybercriminals to advance their means and methods. The responsibility of keeping your data secure rests with you. And there’s a lot you can do. Read on.

 

Become a Data Backup Ninja

Why would anybody pay a ransom if they had another copy of the locked data available! The way to do so has become a process at backing up your business data. For starters, you have the option of storing your data in external hard disks. That’s because the costs per GB of this mode of storage are dropping regularly. Then, there are many affordable clouds based storage service that you can trust to automatically sync up your imports data folders to an online database, ensuring you always have the latest data backup ready. Even cybersecurity experts agree; next to having a reliable anti ransomware software protecting your computers, taking regular backups is the best way to stay safe from ransomware.

 

Separate Personal and Work Activity to Different Hardware

Your business data is invaluable. Separating business and personal work to different hardware can be a pain, but the rewards are worth the pain.

Invariably, the applications and web-based tools you use for personal work aren’t half as secured as the applications that your business’ IT team takes care of. Don’t let convenience become a cause of falling prey to ransomware.

 

Educate End Users about Ransomware Cyber Crime and Related Tactics

Lack of awareness that cyber criminals are out there on the prowl is a major reason why people end up as victims of ransomware. To make things better, leading organizations are already using these strategies:

  • Conducting regular training to make employees aware of terms such as spear phishing, social engineering, etc.
  • Simulating social engineering attacks with the help of internal IT to showcase vulnerability
  • Making it mandatory for end users to pass regular security quizzes and tests

 

It’s high time you used a mix of these strategies.

Patch, patch, and patch

 

Ransomware primarily targets minute security flaws in popularity enterprise software. By keeping applications at their best stable state ensures you plug the monitor gaps that cybercriminals can otherwise exploit.

 

Thankfully, most enterprise software vendors release security upgrades frequently. The best practices are to always embrace these upgrades. Activate the automatic update option for your business applications.

 

Add Later After Layer of Security

Having a layered approach to foil ransomware attacks in particular and malware in general works great guns for a business. This means making the conscious effort to not depend on a single mechanism of keeping ransomware at bay. So, a firewall won’t do alone. It must be supplemented by strong antivirus, with specific ransomware combat capabilities.

 

Thankfully, this doesn’t always mean that you have to inflate your cybersecurity budgets because most security products tend to anyways bring in a layered protection approach. Also, remember that most ransomware codes run execution files from the Windows App Data folder or the equivalent folder on other operating systems. So, disable the permissions for executable files to be run from these locations.

 

Cryptolocker ransomware

 

Restrict Privileges of Computers Operating As A Part of a Network

The big difference that ransomware makes on a computer that’s a part of a large network is that once one of the computers if affected, the ransomware can duplicate itself on all other computers in the network, and hence, multiply the damage. This is exactly why cybercrime groups target business networks most often.

Ransomware gets the same privileges as the computer it’s hosted in. So, if an infected computer has local or global admin privileges, the ransomware will be able to use the same wrack havoc. Surely enough, such a network will witness most computers infected with the same ransomware, because of the lack of control over admin privileges.

You’d much rather struggle with ransomware on one computer, than ransomware on the entire network.

 

http://picpedia.org/highway-signs/images/ransomware.jpg

Use Latest Versions of Web Browsers

Since most ransomware installations initiate from web activity, you need to do everything possible to keep your Internet sessions safe. One reliable method is to always update Mozilla Firefox, IE, Chrome, or whichever browser you’re using because the upgrades invariably make the browser more secure against newer kinds of malware.

 

https://media.defense.gov/2017/Jun/06/2001758041/780/780/0/170606-F-AY392-0001.JPG

 

Be Convinced Before You Open a File

We’re living in times where we encounter attempts of cyber-crime (of varying intensity) almost every day. Drastic problems call for drastic measures; one of them is to be careful about what you click on and open from the web. Emails, in particular, are a primary source for cybercriminals to send carefully planned messages with infected files, or malicious links, which lead to malware (specifically, ransomware) installations. So, if you make it a practice to question the source of emails before opening any attached files, you will significantly improve your prospects of staying protected from ransomware.

 

Concluding Remarks

As we finish finalizing this piece, the Atlanta ransomware attack news (25 March 2018) is beginning to send the world into another frenzy! These are tough times; stay secure.

 

 

Author – Rahul Sharma

Top End User Computing Trends that IT Leaders Need to Sync up within 2018

The world of end computing continues to evolve at breakneck speed. Enterprise employees want the flexibility to work anytime, anywhere, using any device, any web browser, and experience the kind of UX they like. Enterprises have every reason to work towards delivering this experience, because it boosts productivity, enables workplace mobility, and enhances the work experience of employees. In a world where innovations from personal space are seeping into business workplaces, it’s imperative for IT leaders to be on the top of the trends in end-user computing. We’ve covered some of the most important ones in this guide.

Contextualized Security

End-user computing security hardly requires any underscoring as one of the most important trends that IT leaders need to track and stay on the top of. In 2018, however, it’s likely that enterprises will start making the move to implement contextual end user computing security mechanisms.

Contextual security takes several user-specific variables into account to determine the right security-related action. These variables include:

  • The roles and privileges assigned to the user
  • The roles and privileges assigned to the parent group the user is a part of
  • The most commonly used transactions, applications, and processes for a user
  • The average session length
  • The general set of locations from which secured application access is made by the user
  • The browser, IP, and device the user uses to access enterprise data

These technologies are hence able to create unique user profiles, match user behavior to the profile, and based on any deviations, can initiate tasks such as:

  • Blocking access
  • Reporting potentially malicious activity to the IT security team
  • Alter the user profile to allow the deviation, following a proper mechanism of authorizations and approvals.

The Role of AI, ML, and DA in Enhancing End-User Security

Masters of the end user computing market are focusing on enhancing the state of existing security technologies by leveraging the prowess of data analytics (DA), artificial intelligence (AI), and machine learning (ML). Organizations are already spending a lot on AI technologies, and hence many of them already have a strong base to build their futuristic end user computing security towers on. IT now has more sophisticated, data backed, and pattern dependent methods of detecting intrusion. Security technologies in 2018 will start offering inbuilt analytics and machine learning capabilities to transform the end user computing world for the better.

Managing Complexity of Device Diversity

Gone are the days when the average enterprise had merely desktops, laptops, and VoIP phones on employee desks. Today, the range of devices used by employees in a tech-powered enterprise is expansive, to say the least. There are satellite phones, handheld devices to record information, barcode scanners, tablets, smartphones, smart speakers, and whatnot. And, we’re at the edge of the transition to Industrial Revolution 4.0 powered by IoT. To make the ecosystem more complex, there are too many operating systems, web browsers, and communication protocols in play.

Managing this complexity has been a challenge for enterprises for some time now. It’s just that in 2018, they will see the giants in the end user computing market release products that help them out. Today, enterprises want that their employees should have access to their personalized desktops on whichever computer they use for their work, anywhere. These are virtual desktops, and already being used aplenty by enterprises across markets. In 2018, the leading vendors will look to make their VDI services available across device types, and address operating system variations.

Diminishing Lines Between Commercial and Business Apps

Dimension Data’s End User Computing Insights Report in 2016 highlighted how several enterprise rates their state of business apps maturity lowest among six areas. This stat truly captured the need for businesses to start focusing on delivering superior app experience to end users. Because these end users are accustomed to using terrific apps for their routine life management (productivity, transportation, note taking, bookings, communication, data management, etc.), their expectations from equivalent business apps are as expansive. This makes it important for IT leaders to keep a stern eye on the progress of business apps at their workplaces. An important trend in this space is the use of personalized app stores for user groups, as made possible by Microsoft Windows 10 app store.

Increased Adoption of Desktop as a Service

DaaS must be an important component of the virtualization strategy of any enterprises. Now, traditionally it’s been seen that services such as Amazon WorkSpaces have been restricted to only being viable for disaster recovery and business continuity planning. However, it’s going to be exciting to watch for developments in this space throughout 2018.

  • Vendors are likely to release updates that will help address challenges around desktop image management and application delivery.
  • DaaS applications that can act as extensions to your data centre will appear on the surface, driving adoption.
  • Integrated services such as Active Directory, application manager, and Microsoft System Center will also help further the adoption of DaaS.
  • New services, functionalities, and configurations will be kept on adding to DaaS solutions.

A useful option for enterprises will be to seek the services of consultants with experience in VDI strategy.

Video Content Management

Video has become a crucial content format for enterprises. The importance of video content is clear from the kind of estimates tech giants are making; for instance, Cisco estimates that 80% web traffic will be made up of video content access, by the end of 2020.

Enterprise end users require video content for DIY guidance, or to share the same with their end customers. Also, field employees need tech support via video content to be able to quickly manage their technical issues. Video Content Management Systems, hence, will become important for the enterprise from an end user experience point of view.

Concluding Remarks

Throughout 2018, expect to witness pressing changes in the end user computing market. Primarily, vendors will push to increase adoption of advanced, feature rich, and power packed end-user computing solutions.

 

 

Author – Rahul Sharma

Top End User Computing Trends that IT Leaders Need to Sync up within 2018

The world of end computing continues to evolve at breakneck speed. Enterprise employees
want the flexibility to work anytime, anywhere, using any device, any web browser, and
experience the kind of UX they like. Enterprises have every reason to work towards
delivering this experience, because it boosts productivity, enables workplace mobility, and
enhances the work experience of employees. In a world where innovations from personal
space are seeping into business workplaces, it’s imperative for IT leaders to be on the top of
the trends in end-user computing. We’ve covered some of the most important ones in this
guide.

Contextualized Security

End-user computing security hardly requires any underscoring as one of the most important
trends that IT leaders need to track and stay on the top of. In 2018, however, it’s likely that
enterprises will start making the move to implement contextual end user computing security
mechanisms.
Contextual security takes several user-specific variables into account to determine the right
security-related action. These variables include:
• The roles and privileges assigned to the user
• The roles and privileges assigned to the parent group the user is a part of
• The most commonly used transactions, applications, and processes for a user
• The average session length
• The general set of locations from which secured application access is made by the user
• The browser, IP, and device the user uses to access enterprise data
These technologies are hence able to create unique user profiles, match user behaviour to the
profile, and based on any deviations, can initiate tasks such as:
• Blocking access
• Reporting potentially malicious activity to the IT security team
• Alter the user profile to allow the deviation, following a proper mechanism of
authorizations and approvals.

The Role of AI, ML, and DA in Enhancing End-User Security

Masters of the end user computing market are focusing on enhancing the state of existing
security technologies by leveraging the prowess of data analytics (DA), artificial intelligence
(AI), and machine learning (ML). Organizations are already spending a lot on AI
technologies, and hence many of them already have a strong base to build their futuristic end
user computing security towers on. IT now has more sophisticated, data backed, and pattern
dependent methods of detecting intrusion. Security technologies in 2018 will start offering
inbuilt analytics and machine learning capabilities to transform the end user computing world
for the better.

Managing Complexity of Device Diversity

Gone are the days when the average enterprise had merely desktops, laptops, and VoIP
phones on employee desks. Today, the range of devices used by employees in a tech-powered
enterprise is expansive, to say the least. There are satellite phones, handheld devices to record
information, barcode scanners, tablets, smartphones, smart speakers, and whatnot. And, we’re
at the edge of the transition to Industrial Revolution 4.0 powered by IoT. To make the
ecosystem more complex, there are too many operating systems, web browsers, and
communication protocols in play.
Managing this complexity has been a challenge for enterprises for some time now. It’s just
that in 2018, they will see the giants in the end user computing market release products that
help them out. Today, enterprises want that their employees should have access to their
personalized desktops on whichever computer they use for their work, anywhere. These are
virtual desktops, and already being used aplenty by enterprises across markets. In 2018, the
leading vendors will look to make their VDI services available across device types, and
address operating system variations.

Diminishing Lines Between Commercial and Business Apps

Dimension Data’s End User Computing Insights Report in 2016 highlighted how several
enterprise rates their state of business apps maturity lowest among six areas. This stat truly
captured the need for businesses to start focusing on delivering superior app experience to
end users. Because these end users are accustomed to using terrific apps for their routine life
management (productivity, transportation, note taking, bookings, communication, data
management, etc.), their expectations from equivalent business apps are as expansive. This
makes it important for IT leaders to keep a stern eye on the progress of business apps at their
workplaces. An important trend in this space is the use of personalized app stores for user
groups, as made possible by Microsoft Windows 10 app store.

Increased Adoption of Desktop as a Service

DaaS must be an important component of the virtualization strategy of any enterprises. Now,
traditionally it’s been seen that services such as Amazon WorkSpaces have been restricted to
only being viable for disaster recovery and business continuity planning. However, it’s going
to be exciting to watch for developments in this space throughout 2018.
• Vendors are likely to release updates that will help address challenges around desktop
image management and application delivery.
• DaaS applications that can act as extensions to your data center will appear on the surface,
driving adoption.
• Integrated services such as Active Directory, application manager, and Microsoft System
Center will also help further the adoption of DaaS.
• New services, functionalities, and configurations will be kept on adding to DaaS
solutions.
A useful option for enterprises will be to seek the services of consultants with experience in
VDI strategy.

Video Content Management

Video has become a crucial content format for enterprises. The importance of video content
is clear from the kind of estimates tech giants are making; for instance, Cisco estimates that
80% web traffic will be made up of video content access, by the end of 2020.
Enterprise end users require video content for DIY guidance, or to share the same with their
end customers. Also, field employees need tech support via video content to be able to
quickly manage their technical issues. Video Content Management Systems, hence, will
become important for the enterprise from an end user experience point of view.

Concluding Remarks

Throughout 2018, expect to witness pressing changes in the end user computing market.
Primarily, vendors will push to increase adoption of advanced, feature rich, and power
packed end-user computing solutions.

Author : Rahul Sharma

The Skills That Separate a Great IT Manager from Good Ones

Working in the IT industry means dealing with a rapid pace of change that impacts everything, right from operational practices to remunerations. Plus, the complexity of systems, applications, and processes is mindboggling. Then, systems and processes are so interlinked that managers can’t take a single decision without dealing with several little-known variables. Plus, clients are always pushing to shrink delivery teams and cut costs every year. Of course, there are cybersecurity and compliance risks to make life tough.

It’s commendable, then, that there are great IT leaders in most enterprises, driving progress, and enabling everyone around them. In this guide, we’ve covered some of the skills that separate a great IT manager from the merely good ones.

Understanding the People behind the Employees

Of course, understanding one’s people is a skill relevant to managers in every industry, and not particularly IT. However, IT presents specific challenges that make it crucial for a great manager to understand the people in his/her team.

In a typical IT team, there are people who are keen to learn the latest technologies and work using latest tools. Then, there are people who wish to grow their expertise within a specific technology and come closer to the business impacts of the technology. Put an employee in a role that’s in utter contrast to his/her key technology learning motivations, and you’ll have a might mess to manage very soon. Instead, great IT managers are always prepared to go to great lengths to understand their team and help them take up IT operations and delivery roles that match well with them.

 

Emotional Intelligence

It’s been suggested that emotional intelligence accounts for almost 90% of the difference between good and great managers in general. IT managers who take conscious efforts to upgrade their emotional intelligence reap the benefits in the form of respect from all related stakeholders, faster and better conflict resolution and even quicker and more valuable promotions. When pressures from all sides (clients, internal auditors, dissatisfied employees, and supervisors) mount, the great IT manager is able to exercise caution, care, and courage in dealing with situations. Emotional intelligence also helps IT managers understand the intrinsic feelings and desired of different players around them, further enabling them to frame their communication so as to appease, satisfy, and convince them. A keen sense of observation, coupled with high EQ, is the perfect recipe for success for an IT manager.

 

The Ability to Upgrade One’s Technical Knowledge

In a typical IT manager’s routine day, there are 2-4 meetings, several discussions on project KPIs, and brainstorming on new projects and campaigns. With an eternal stream of deadline bound deliverables to manage, it’s tough for IT managers to find out the time and desire to upgrade their technical knowledge. However, strong technical understanding is essential for managers to maneuver conversations with teams comprised mostly of IT engineers. Plus, employees are quick to identify IT managers who fail to account for the limitations and strong points of technologies and tools while devising plans and strategies.

 

The Ability to Delegate Extensively and Correctly

IT is an industry where the depth of subject matter knowledge is so much that it almost accepted that individuals won’t possess it. Thus, IT managers always need to rely on several people to take control of projects. This calls upon managers to showcase dexterity in delegating tasks to others (again, this links back to the skill of knowing your team). Developments in IT business sphere and operational management frameworks are so fast that IT managers always need to anticipate the need to keep their time free for proactive management. This is only possible if they delegate tasks like a pro.

 

Communication

A no-brainer, for sure. But why does an IT Manager need to be super strong in communication? The answer – because the very nature of the product or service is such that customers don’t exactly understand or appreciate the nuances unless somebody explains them in a language they are comfortable with. Only a strong communicator, hence, can detect unsaid emotions among client representatives and mold communications accordingly.

 

The Ability Of Being Decisive

Expect an IT manager to face several situations every day, wherein they are expected to make quick decisions. Whether it’s something short-term such as estimating resourcing needs for a new project to something with long-term consequences, such as deciding among a few equally potent vendors for a virtualization project – IT managers have to rely on their intuition, experience, data, advice, and heuristics to be able to manage such situations. Unremarkable IT managers fall into the trap of extracting data from different sources for every decision they need to make. Equally obnoxious, of course, is the practice of taking hasty decisions and letting your teams bear the brunt of the same. The great IT manager strikes the right balance.

 

Creating A Culture of Innovation

Considering the breakneck speed at which the dynamics of IT industry are changing, teams that fail to innovate will fail to exist in a few years. How does an IT manager, then, foster the spirit of innovation, particularly considering how important it is to also maintain operational discipline? Well, great IT managers do so by:

  • Ensuring innovators that they’ll find their leaders by their side, even if the innovators don’t deliver the desired results.
  • Connecting innovators with the right people, at the right time.
  • Explaining the value of innovation and experimental trials with different options to clients.

 

Calculated risks, taken consciously – that’s a good mantra to live by. It takes continued focus on extracting valuable lessons from failures, documenting them, and sharing them with the entire team, for IT managers to truly grow their people.

 

Concluding Remarks

Amidst all the challenges of working in the IT industry, great IT managers manage to stay calm, deliver projects within deadlines, and grow their teams and themselves. This guide presents some of the skills that help them do so.

 

Author: Rahul Sharma

Is Network Monitoring System Worth the Investment?

Your business’ digital network is your most important operations-enablement asset. A network problem could bring mission-critical business applications to a grinding halt. Inaccessible websites, unusable ERP applications, excruciatingly slow loading application screens, the inability of one system to connect with and communicate with another – and the list goes on.

 

 

Network Monitoring Tools – A Solution

 

Network downtime costs you severely. Maintenance, hence, is not only better than cure, at least from a network management perspective, but also financially a much smarter option. To do so, network administrators need to measure the network’s performance regularly, in terms of important KPIs. These measures are compared to threshold values to detect possible issues or potential problems in the making. This is made possible by network monitoring tools. These tools keep a stern watch on the network performance, push real-time updates to administrators, and carry out automated tests on the network to detect and report anomalies.

 

Why Does the Question of Evaluating Usefulness Come Up?

Enterprises want reliable and power packed software for everything they manage. Network monitoring software must bring about seamless and total network visibility round the clock, equipment monitoring capabilities, automatic alert setup, reporting, etc. Of course, there are costs associated with these features.

However, it must also be understood that enterprises are almost always prepared for minor application outages, and even tolerate them to a great extent. A few minutes or a couple of hours of downtime doesn’t bring down a mountain. Then, IT managers are always under pressure to reduce costs, are anyways overwhelmed with complex projects, and not easy to convince to approve the budget for new tools.

 

 

Are These Tools Worthy Investments?

How does one make a case for network monitoring tools? Are they even worth the investment? Well, these questions don’t have easy answers.

For an e-commerce business, a remote education business, and a financial institution, for instance, even an hour of downtime could cause serious branding damage, sales loss, and customer attrition. For others, the odd outage of a few minutes or hours might not be such a showstopper.

One approach to finding answers, however, is to understand the value they add, the problems they solve, and calculating ROI accordingly.

 

The Costs of Network Monitoring Software

For any ROI analysis, you need to know the denominator, and that’s the cost of the network monitoring software. Here are the most important cost components:

  • Licensing costs of the software, particularly in case of enterprise level network monitoring tools
  • Maintenance and upkeep costs, particularly if the same is not included in the licensing deal
  • Salaries of internal IT consultants and network admins necessary to manage the tool
  • Costs of hardware and software storage for the tool
  • Cost of training users
  • Post-implementation consulting issues

 

Dedicated network management systems that include monitoring tools as a part of the larger suite are obviously more expensive than standalone monitoring systems. It can be challenging to apportion an appropriate cost percentage to the monitoring tool if an enterprise commissions a complete network management suite.

Even if you go for an open source network monitoring tool, there will be associated costs. Understand all of these costs to be able to calculate a realistic and representative ROI figure.

 

 

The Simplest Analysis – Damage Prevented versus Cost of Software

A quick (and often reliable) method of evaluating the investment worthiness of network monitoring systems is to compare their annual cost (annualize long-term costs over a 5-year period, let’s say) with the estimated annual damage caused by outages.

Annual damages = Damage via lost sales (DLS) + Damage to employee productivity (DEP)

 

DLS: Average sale value per hour x Average duration of each outage x Average number of outages per year

DEP: Average cost of employee hour x Average duration of each outage x Average number of outages per year x Number of employees affected

 

Add these up, and compare the cost of the software. Simple enough?

 

Sophisticated Analyses

Of course, there is such a thing as an oversimplification, and it could often lead to unnecessary and expensive purchases. So, we’re also going to cover some nuanced benefits of network monitoring systems which positively impact their ROIs.

 

Staff Salary Saving

If a network monitoring tool allows enterprises to cut down its night shift to half, and to reduce the monitoring staff strength to 50%, that’s a significant saving annually.

 

Early Detection Benefits

Network monitoring tools offer advanced reporting on network aspects such as utilization rates, transmit/receive stats (such as packets per second), error percentages, round trip times, and percentage availability. This helps network engineers and admins to prevent outages, reduce time to response and time to resolve in case of outages, and in general, improve network performance.

 

Reduced Support Incidents

Network issues easily result in a spate of support incidents raised by employees from affected teams. To close these calls, network engineers need time. Often, the need to close calls within the stipulated SLAs requires network teams to add resources. Sophisticated network monitoring tools, however, because of the advantages listed in the last section, allow admins and engineers to make corrective changes, and issue workaround practices to reduce these support calls.

 

Reduction in Time to Fix

Network technicians often find it challenging to locate sources of network problems, particularly when it’s linked to one or more devices in a geographically separated and distributed network. Because network monitoring systems offer geographic maps and live diagnostics data feeds, engineers can actually find these problem sources without leaving office. This can knock of several hours from the average problem fix times.

Understand all these benefits, evaluate their significance (as contextualized for your business), and factor them in your cost-benefit analysis for network monitoring tools.

 

Concluding Remarks

When IT budgets are tight, enterprise IT decision makers need to determine ROIs and perform accurate cost-benefit analyses to make a purchase decision. Network monitoring tools offer concrete benefits and come with concrete one time and recurring cost heads. This guide offers a framework to help you evaluate.

 

Author: Rahul Sharma

Top Alternatives to Team Viewer – Keeping the Remote Desktop Management Flame Lit

2016 was a tough year for Team Viewer and its users as the software company fell prey to one of the worst ransomware attacks in recent history. A significant number of people had their personal details exploited and their money was stolen, in many of these cases. It was, thus, quite natural that even after the company relaunched itself late in the year 2017, people were still afraid to install the software.

 

If you have been making things work with short-term alternatives, we’re sure you need better tools that are secure and guaranteed absolute confidentiality with regards to the privacy of their users.

 

 

 

How Remote Desktop Management Works?

The technology behind the process is simple enough. A remote desktop software is installed on the desktop that the user wishes to access, which allows the device to go online. The software provider’s server acts as the mediator between the user and the device, thus, nullifying the requirement for the two to be in physical proximity.

 

What The Hack Meant?

A cyber-attack of such huge proportions obviously had a number of implications and made SMB, as well as enterprise users, realize the consequences that lax online security can have on their operations, and those of their end users. Many Team Viewer accounts hacked also compromised key financial information of the affected users. The hackers, thus, hacked into not only the Team Viewer accounts but also those that gave them access to the users’ bank accounts. For a very long time, Team Viewer denied all accountability and blamed the spree of attacks on the users for not having sufficiently solid passwords and not keeping the passwords to themselves.

Note: Whichever remote desktop sharing software you use, make sure that the passwords you set for your accounts have different combinations of letters and numbers so as to appear random. Moreover, always keep these to yourselves and never use the same password for two different sites.

 

Here are 6 of the best software that you can install without hesitation, instead of Team Viewer:

 

Join.me

One of the biggest contenders in the field of remote access packages meant for web conferencing and meeting, Join.me was conceived by LogMeIn. The software is compatible with both Windows and Mac OS X. Join.me comes armed with a number of features, a few of them being meeting notifying and scheduling, international conferencing, and others. An extra $19 every month would also allow for advanced meetings and professional management. In terms of the security offered, the accounts are protected via double factor authentication systems, managed and overseen by LogMeIn.

 

Splashtop

Not only does Splashtop offer quite a user-friendly interface, it also allows users to access it from anywhere, thus, making web communications and conferencing much easier, thanks to its speedy connection. It is compatible with Windows, Android, iOS, Linux and OS X.

The cherry on the top is actually the first six months of free trial, and even after that, they charge a meager $1.99 monthly. Using the free package, you can connect to a maximum of 5 devices. Even more impressive is its streaming quality, which has garnered widespread acclaim all over the user community.

 

Ultra VNC

Ultra VNC is the remote desktop software usually recommended unanimously by experts. Of course, the fact that it costs absolutely nothing, and the procedure required for its installation and setup is easy, should be factored into the equation. However, the main reason is that this is, by far, the closest that VNC technology comes to following the strictest user security practices. This guarantees absolute security, thus, making it almost impossible to breach. Made solely for Windows, Ultra VNC ensures quick and easy transfers of data from one computer to another.

 

WebEx Free

Yet another remote desktop software that can be availed free, is WebEx Free, an initiative of Cisco. The software can be used on desktops as well as mobile phones. Live interaction is made possible with this nifty little tool. A recent addition to its functions was made when developers ensured that users could alter details regarding web meetings prior to their commencement. Certain users can also access its Corporate Directory feature. On the offside, however, quite a few Advanced Scheduler functions are not available on WebEx Free. For instance, it does not have the necessary provisions for sending its users copies of invitation emails or removing meetings from logs once they have been completed.

 

 

Chrome Remote Desktop

Chrome Remote Desktop gets the job done without the hassle of installation and setup. It can work just as well as an extension and is compatible with major operating systems. Its Chrome-based authentication and protected operations make it one of the most secure remote desktop software.

The Chrome Remote Desktop is perfectly cut out for businesses, what with file and folder transfers being a breeze using it. Moreover, users are permitted to operate on any desktop that is connected to the system without having to let go of the comforts of their favorite browser.

 

Windows Remote Desktop Connection

Windows Remote Desktop Connection has been incorporated into Ultimate and Business variants of Microsoft Windows, free of cost. The access granted to users over other remote systems is quick and absolute.

This is the perfect match for those who are not too experienced with remote desktop management since it is rather simple to install and requires very little time to be set up. A negative aspect of it, however, is the fact that it cannot operate too many desktops in one go.

 

Concluding Remarks

Since the Team Viewer scandal, new and improved alternatives have come up in the market for remote desktop sharing software. The existing remote computing tools have also been re-developed with more focus on user safety concerns. However, fact remains that users should be safe too, from their ends, by researching about their remote desktop management software and taking care to abide by standard security protocols.

 

Author: Rahul Sharma

Microsoft Word Productivity Hacks Every IT Manager Needs to Know

A Forrester report suggested that more than 90% businesses offer Office to their employees. This stat alone captures the essence of the kind of stronghold that MS Office has in terms of enterprise document management and productivity software. Among all Office sub-products, MS Word and MS Excel, without a doubt, are applications that most office employees use at least once a day. These applications have become the mainstays of how ‘text’ and ‘table’ formats of data are essentially interacted with, by end users. MS Word, specifically, is a pillar of office productivity.

 

Here’s Something Interesting about MS Word

 

So, almost everyone who’s anybody thinks he/she knows MS Word. Maybe you are, but maybe you’re not. That’s because Microsoft keeps on adding more features to its Word application, and not many users realize how much value these lesser known features can add. Microsoft has recently acquired a startup called Intentional Software, to ramp up its abilities around automation and simplifying programming for collaborative Office 365 products. Emails, reports, proposals, and letters – you name it, and there’s MS Word involved. It’s surprising how even the busiest and smartest IT managers don’t do the effort of understanding lesser known Word features to get the most out of the software.

With this guide, there’s no looking back; here are some super cool productivity hacks for MS Word.

 

Extracting All Images from an MS Word Document

Stuck with a product manual with 100+ screenshots, and tasked with creating a new guide, re-using the old pictures? How do you copy and paste so many images separately without losing a lot of valuable time? Here’s a trick.

  • Use the Save As the option to save the Word document.
  • Select Web Page as the target format.
  • Once you save it, Word creates a .html file, along with a folder that contains all the embedded images.
  • Now, all you need is to go to this folder, and you have your images waiting for you.

 

Copying Multiple Sections from a Long Document

For IT manager who needs to go through long reports, and is tasked with creating executive summaries, MS Word’s Clipboard feature is a godsend.

Using this feature, you can quickly review the last 24 selections of text and images you copied from the document! All you need to do is to go to the Home tab, look for the Clipboard button, and click on it.

This saves you vital time as you can visit the Clipboard anytime to take a quick look at whatever you selected and copied. This, for obvious reasons, proves invaluable particularly when you are trying to mark important content sections, to review them or collate them later.

 

Real-Time Co-Authoring

For IT managers hard pressed for deadlines, and those working closely with other managers and executives to prepare proposals and review documents, co-authoring is a tremendous productivity hack. This is the equivalent of co-authors sitting next to each other and working on the same content.

Co-authoring enables users to see everyone’s changes as they happen in the document, facilitating super quick feedback. MS Office support guides explain co-authoring as a 3-step process.

  • Save your document to SharePoint Online, or OneDrive.
  • Send out invites to people to edit the document along with you.
  • When this shared document is opened, each invitee will see the work that was done by others (supported by MS Word 2016, Word Android, and Word Online).

 

View Documents Side By Side

Pressing ALT + Tab to switch between two simultaneously opened Word documents can be disorienting. It certainly isn’t the best way to compare documents. If you don’t want to use the ‘Compare’ feature in the ‘Review’ tab of MS Word, and only want to go through two documents side by side, there’s an option.

  • Open the two documents you wish to view side by side.
  • Go to the View tab.
  • In the ‘Windows’ section, click on ‘View Side by Side’ option
  • If you also want the two documents to scroll simultaneously, you can click on the ‘Synchronous Scrolling’ button.

 

Pin Files to ‘Recently Used’

Ask an IT manager who needs to prepare daily, weekly, and monthly reports, as to what a mess it can be to maintain basic templates, which you can edit and repurpose into newer reports. No more ‘search’ hassles, because you can keep your trusted and ready-reckoner files pinned to the ‘recently used’ tab.

Here’s how you can add a document here:

  • Go to the File tab
  • Click on Open to see a list of files that have been only recently used
  • Click on the ‘Pin this item to the list’ button

 

Make Your Documents Easier to Read

If your supervisor or boss keeps on requesting re-work on documents because of ‘readability’ issues, you know how much time can be lost in attending to the ambiguous feedback. No need to put up with any of it any longer, because MS Word brings you two globally trusted readability tests, built right into the tool. These tests are:

  • Flesch Reading Ease test
  • Flesch-Kincaid Grade Level test

Here’s how you can use this feature:

  • Go to File, and click on Options.
  • Go to Mail > Compose Messages > Spelling and AutoCorrect
  • Select Proofing.
  • Look for an option called ‘When correcting spelling in Outlook’; under this, check the ‘Check grammar with spelling’ box.
  • Check the ‘Show readability statistics’ box.

 

More Productivity Hacks

Apart from all the nifty tricks we covered above, there’s a lot more you can do with MS Word. For instance:

  • Transferring ODT files with Microsoft Word Online and Google Docs (useful while you’re working with startups and vendors that use open source document management software, saving files in ODT format)
  • Keyboard shortcuts, such as Ctrl + Alt + V, to access formatting options while pasting content from one section to another.
  • Press ALT, see how shortcut indications pop up at the top of the menu bar, telling you which key you can press to access the associated action quickly.

 

Concluding Remarks

Chances are that it will still take time before you get your personalized AI-powered robot assistant to take away your Office applications work. Till then, trust the kind of productivity hacks as presented in this guide to make work quicker, better, and more fun.

 

 

Author: Rahul Sharma

 

Must-Have Windows System Admin Tools in 2018

Open source applications and tools simplify the lives of Windows system administrators considerably. You will find plenty of open source system admin tools that improve the performance and efficiency of system administrators. While some automate the basic administration functions, others help with troubleshooting and maintenance.

 

Thanks to the introduction of new technologies and web services, system administrators are keeping busy nowadays. Not only must they configure, upkeep, and ensure smooth operations of computer systems within a limited budget, but they must also contend with the growing number of digital threats, changing security policies, training, and technical support. No wonder these individuals need all the support they can get!

Thankfully, we’ve compiled a list of open source tools that will not only serve this purpose in 2018 but for the next few years as well.

 

  1. Git

 

System administrators will find it easier to handle projects of varying sizes with Git, an open source distributed version control tool. This free system is not only easy to use but fast and efficient. You get access to lots of handy features, such as staging areas, different workflows, enhanced GPG signing for commits and tags, colour controls, etc. for a more powerful performance. Thanks to Git, you don’t have to spend the whole day creating a test setup; you can simply develop a branch and then clone it. And thanks to the Change history option, the configuration changes can easily be monitored.

System administrators can now maintain numerous independent local branches due to Git’s branching model. Developing, merging, and deleting a particular takes just a few seconds. Plus, users can form a branch whenever they wish to test out a new idea, and delete it quickly in case it doesn’t live up to expectations. Perhaps the most surprising aspect is, Git’s internal data formatting is capable of supporting dates beyond 2100.

 

  1. Kubernetes

Google’s Kubernetes is an incredibly powerful system offering horizontal scaling features to Windows system admins. Now, depending on the CPU usage, they can control a user interface to scale the app up and down with a single command. Kubernetes is capable of automating functions like scaling, deployment, and management of containerized apps. Thanks to this tool, sysadmins can place containers as per their infrastructure and other requirements automatically without losing any of their availability.

Nodes are servers in Kubernetes that configure container networking and take care of assigned workloads. Using the Kubernetes, the nodes stay connected to the cluster group. When a container fails to respond to the user-defined source, it gets removed. And if a particular container fails, it is immediately restarted. Upon the death of nodes, they are replaced and rescheduled.

 

 

A unique IP address is assigned to containers with Kubernetes, while a set of containers gets one DNS name. So, creating clusters only requires two commands.

 

  1. Eclipse

One of the most commonly used integrated development environments (IDEs), Eclipse started off as a Java development tool but soon evolved into something that could be used to create apps in other programming languages, such as Perl, PHP, Python, C/C++. Eclipse’s cloud versions support web technologies, like HTML, CSS, and JavaScript. And system administrators are benefitted from the support of more than 250 open source projects, most of which are connected to development tools.

 

  1. Docker

 

 

Developed using open source technology, Docker addresses different kinds of infrastructure and applications for both developers and system administrators. Now, apps can be created easily, deployed, and then run in virtual containers with Linux servers. Due to the low overhead and small footprint, sysadmins enjoy plenty of flexibility and require fewer systems. If you are moderately skilled in developing software, Docker can be used to create Linux container easily. All that is required is a working Dockerfile and Docker setup.

 

There are two editions of Docker available – the Community Edition and the Enterprise Edition. While the former provides developers with the tools necessary to create applications, the latter offers multi-architecture operations to IT. Many big tech companies like Microsoft and Red Hat use Docker in collaboration with their services.

 

  1. PowerShell

This is a task-based scripting language and command-line shell developed by Microsoft and built using the .NET framework. System administrators use PowerShell to control and automate Windows administration. Loaded with amazing features, like Get-Module, Get-Help, remote management, among others, PowerShell allows system administrators to remotely manage and run Windows PCs, Windows Server, and PowerShell commands or access complete PowerShell sessions on Windows.

 

To use this remote management tool, you must download Remove Server Administration Tools Active Directory PowerShell module on your system along with the WinRM tool. Due to the Filter parameter, you can apply filters in PowerShell and locate what you’re searching for easily.

 

  1. NetBeans

A well-known open source IDE, NetBeans allows system administrators to develop mobile, web, and desktop applications quickly and easily. The major features include code generating, code editing, debugging tools, a GUI builder, etc. NetBeans supports JavaScript, HTML5, Java, PHP, and C/C++. The small size of this admin tool makes installation simple and convenient; all you need to do is download the program and install it. The IDE features are all fully-integrated, which means you won’t have to hunt anymore for plug-ins. Plus, all the features work simultaneously upon launching NetBeans.

  1. Vim

 

 

Vi Improved, popularly known as Vim, is an open source text editing app that supports command-line interface, and apps in a graphical user interface (GUI). Vim offers plugin support and system for numerous file formats and programming languages. It is quite speedy and works great on its own as the tool relies less on Cntrl/Alt sequences, enabling you to focus more on the modes. Vim also boasts of great keyboard macro facility for automating editing tasks. Developers might take a while to get the hang of this tool, but once they do, they will realize just how versatile Vim is.

 

  1. Bootstrap

Earlier known as Twitter Blueprint, the Bootstrap framework was developed by Twitter developers to improve reliability throughout open source toolkits. Thanks to Bootstrap, you can develop CSS, HTML, and JavaScript-based apps quickly and efficiently. The framework features a 12-column grid system and a responsive layout for dynamically adjusting the site to a compatible screen resolution. The results work consistently across different browsers and the output is uniform.  A lot of customization options are present, and if you encounter any issues, you can seek help from the extended support community.

 

  1. Cordova

This free Apache-sponsored open source tool can be used for developing mobile apps with JS, CSS, and HTML. Cordova wraps the application into a native container so it can access system functions across different platforms. The best part is, moderately-skilled web developers don’t need to learn any new programming languages. Prototyping can also be done fairly quickly. Apart from the various library options, you can create vector graphics to design specifications.

 

 

Any system administrator worth his salt will know that certain tools are important for the job as well as peace of mind since they make him more agile and efficient. The more you become familiar with those tools, the more you can improve upon your OS’ default set of tools and perform various functions.

 

 

Author: Rahul Sharma

Top Free VDI System Administration Tools to Have In Your Kitty

Successful implementation of virtual desktop infrastructure in your enterprise means you need to invest in sophisticated VDI tools. Also, to manage the VDI implementation, you need several related tools. The costs can truly be inhibitory for several businesses. However, it doesn’t mean you need to wait before VDI becomes significantly cheaper than what it costs today. And that’s because you can use open source VDI solutions, as well as network monitoring and performance optimization tools you need alongside. Some of these tools are so good that they’re used by system admins even in enterprises where they’d get premium tools without any budgetary constraints to impede their requests. In this guide, we’ve covered a variety of VDI implementation and management tools; so read on.

 

 

Xen Project

Many commercial server virtualizations are based on Xen Project. Also, several hardware appliances and cloud-based solution use Xen Project as a base. Citrix XenDesktop, for instance, is XEN based. The platform typically hosts Linux guests, although you can find drivers for other operating systems.

 

Setting up Xen is easy, hassle-free, and quick. There were times when ‘virtual server’ was almost synonymous with Xen. The key to Xen’s success is that it is separated from the OS, and hence delivers tremendous security. It also means that using Xen, system admins can run any OS in the virtualized environment.

 

With Xen, you can allocate dedicated resources to each virtual machine, and fire up several VMs simultaneously. Different VMs can have different OS and configuration settings.

 

Process Monitor (ProcMon)

Process Monitor is amongst the most popular process level monitoring tool for Windows. It shows real-time registry and process level activity, file system information, and thread activity. The best of two well-known system utilities – Regmon and Filemon – come together in a single package in the form of ProcMon.

If you need deep insights into the processes running on your virtual machines, servers, and computers, trust Process Monitor. It helps VDI system admins identify the files accessed when a report is generated, the registry keys added when an application kicks into action, and the network traffic generated by each process.

Expert system admins accomplish a lot more with process monitor, right from identifying applications that pose significant resource demands, to identifying unauthorized and malware-initiated processes. Trust Process Manager to serve as a core utility for the purpose of systems troubleshooting.

 

 

WinDirStat

Since you’re here looking for free tools, we assume you’d also want to delay storage purchases, and hence need a tool to view disk usage stats and clean up disk space. WinDirStat does all this for you, and some more.

On starting up, this software reads the entire directory tree once and presents it in 3 intuitive views.

  • Directory list: Tree view of Windows Explorer, sorted on the basis of file/sub-tree sizes
  • Treemap: Whole contents of the directory in plain view
  • Extension list: A sort of a legend shows stats related to different file types

The color-coded representation of files and directories, arranged as per file types, helps you quickly identify culprit files, followed by their quick and easy clean up from the directory.

 

iPerf

Here’s a popular tool that network and system admins can use to measure User Datagram Protocol bandwidth and TCP bandwidth performance. Basic iPerf commands help network admins find tremendous insights into the network’s bandwidth availability. Also, you get useful information related to network delays, jitters, and data loss.

IPerf helps system admins find out maximum TCP bandwidth, issues reports on maximum segment size and the maximum transmission units. IPerf can work in multithreaded mode, for several connections, simultaneously. Also, it can help report delay jitter, packet loss, and can create very specific UDP bandwidth streams.

System admins find it highly useful to remember or keep a list of iPerf commands. With these commands, you can set any computer as a server, and the other as a server. This lets admins find out information such as network switch capacity, wireless router capacity, etc. In this manner, iPerf helps you understand the practical performance of your network devices.

 

 

VMware OS Optimization Tool

Windows continues to be among the more widely used Oss for enterprise IT across the globe. Windows settings can have a massive impact on the VDI environment for your company. The system performance, as well as maximum capacity limits, can be enhanced or disrupted because of the different Windows settings.

This is where OS Optimization Tool comes to the fore. This tool lets you use Windows Horizon View to optimize Windows 7 and subsequent versions. The tool brings to you some customizable templates for enabling and disabling Windows services and features as per the best practices and recommendations relevant for VMware. For instance, this will help you disable unnecessary services, and that can go a long way in improving system performance.

Among Its many features are local analysis and optimization, remote analysis, template management, and optimization history. Also, you’ll be able to find public templates that could help you quickly experiment with different configurations, and see which suits your needs the best.

 

Microsoft and Amazon’s Free Solutions

Apart from the free solutions discussed above, there are some other options too, which are for free, but only for a limited time, or with feature limitations. For instance, there’s a free version of Hyper-V that lets system admins set up fully functional host servers without the need to pay any license fees. However, they can’t host Windows accounts, although Linux Guest can be hosted. Amazon Workspaces is another option, considering it offers a free package wherein users get two bundled workspaces with usage rights of up to 40 hours a month. The offer, however, remains for two months, after which you need to upgrade.

 

Concluding Remarks

Implementation and management of VDI in your business don’t always mean you need to spend a lot of money. With the kind of free tools discussed in this guide, you can knock off a large chunk of the costs involved, and experience the benefits of VDI without upturning your IT budget for the year.