Posts

Showing posts from January, 2021

Azure Purview is integrated with Microsoft Information Protection.

The launches catch the wave of the heated market for these types of tools. The market for cloud data management services will move $ 13 billion next year, according to Forrester estimates . Snowflake's initial public offering in September, for example, broke a record for a software company and was the largest in the US this year, according to Bloomberg . Amazon's AWS cloud unit has also enhanced its Redshift data warehouse. MCITP Database Administrator job role involves designing and developing logical data models, create physical databases and create data services by using Transact-SQL.  Microsoft's finance department itself realized the need for these tools. When employees had to locate some type of information or insight, 70% of the time they had to collect data manually - before the company introduced its new tools, the publication says. Part of the technology came from the need for the finance team and also from the work that Microsoft did to comply with European data

Azure Government Secret expansion

Microsoft also announced several new services in the Azure Government Secret; for application developers, Azure Kubernetes Service (AKS) and Azure Container Instances help you deploy and manage applications in containers more easily. Know more:  Managed Onsite Services Azure Sentinel and Azure Security Center intelligent security analysis services are also available from Azure Government Secret. Together with Azure Monitor, these services help the customer collect, analyze and act on telemetry data from their Azure and on-premises environments. Customers, including those from the United States Department of Defense, law enforcement and other agencies, are using Azure Government Secret. The service is authorized by both the Department of Defense Impact Level 6 (IL6) and the Intelligence Community Directive (ICD) 503. Microsoft is also announcing availability zones for the Azure government. Availability zones, built to handle data center failures through redundancy and logical isolation

Globo adopts Nvidia's AI solution for creating virtual scenarios

 The Rede Globo , with the tech help of NVIDIA Enterprise has developed a virtual set design system with the visual quality of photorealism, which has the ability to integrate the participants in remote format and the ability to customize the setting according to each program. The solution was used in the broadcast of a virtual football tournament on the SporTV channel and as part of the panels section of Globoplay's virtual stand during the CCXP Worlds 2020. Named Virtualcast, this project started with the “Futebol de Casa” tournament, broadcast by the SporTV channel. The content consisted of virtual football matches played by professional players from Brazilian clubs, with narration by Everaldo Marques. With the graphics in realistic visual quality, the system integrated the electronic games for receiving, viewing and analyzing data and statistics of the matches in real time. The Juniper network engineers center on providing high-availability network structure to withstand the o

Wasting time on IT problems can kill your business

 Information technology (IT) has become, in recent years, something so ingrained and important in business activities that it is unthinkable to manage and operate a prosperous business without using resources such as the  internet , e-mail, computers,  smartphones  and other technologies that streamline and organize administrative processes and connect people and companies. Know more:  Managed LAN Service Computers need maintenance Just like  any other equipment or business structure  (machines, vehicles, air conditioners, etc.) computers need maintenance and they need to be done both to correct problems and to avoid problems. Avoiding a problem with company computers is usually much cheaper than fixing and dealing with the consequences of an unexpected defect. Today, it is possible to hire very cheap services that include diagnosing problems with cards, peripherals, hard drives and other parts of computers and  notebooks. It is worth knowing these services and computer maintenance pla

What to think before migrating from IT to cloud

 More and more companies are adopting the cloud service as an infrastructure for their IT processes. This change represents a new and important phase in the way companies operate and those that do not adapt can quickly become obsolete. The Juniper JNCIA Engineer will Monitor, Maintain and Configure IP Networks supporting Data and Voice. However, it is common for some doubts to arise about this process. After all, what to consider before migrating IT to the cloud? With that in mind, we have put together, in this post, everything you need to know about the subject, in addition to showing some of the main advantages of using this service. Check out! How does using the cloud help your company's scalability? Advantages of migrating from IT to cloud First, it is critical to understand the benefits that the cloud brings to IT operations and the business as a whole. After all, no major corporate change occurs without considering the impacts it may have in the future. Therefore, we will hi

Digital transformation: is it necessary to integrate IT and business?

 The consultancy IDC , one of the most respected companies in IT and business research in the world, says that one in nine Latin American companies should undertake digital transformation strategies by the end of 2018. Brazil, which holds 45% of the technological movement in the region, it is considered as one of the countries where most organizations are following this phenomenon. In other words, the conscious and strategic insertion of digital tools, methods and practices has been driving business investments in the country. This means that technology is no longer just a support and has assumed a leading role in the running of organizations - especially in companies that have already understood that it is necessary to integrate technological capacity and business strategy. Why does digital transformation require IT and business integration?  When we talk about digital transformation, we are referring to the adoption of disruptive technologies that are transforming the way the corpora

Cloud security myths you may have heard

 Cloud security is a major concern for companies that undertake digital transformation strategies. After all, virtualizing IT capabilities and services can create a sense of loss of control. A study by the Ponemon Institute in several countries, including Brazil, points out that 33% of respondents are unsure or do not agree that their organizations are committed to protecting confidential information in the cloud. Therefore, ensuring that data produced, stored and shared in cloud computing is always available, complete and reliable is a very relevant topic. 1. Public clouds are not secure The word “public” may initially give the impression that the use of software and virtualized equipment is not safe, but this is not true. The public cloud is so named because it is maintained by a provider that delivers resources to multiple customers from one or more data centers. This practice follows strict information security protocols, including well-defined access and operation layers. Hiring r

What requirements should be evaluated to choose the best cloud storage service?

 Safety When we talk about migration, we are entrusting our data to third parties, so it is extremely important that we check the level of security offered by the company. It is important to have a good firewall to avoid setbacks and confirm that it is possible to change the settings according to the needs of the company. Remember that the safety factor is always next to the credibility factor, so choose providers with know-how. It is very important to understand that security in relation to the imputation, modification and deletion of data is the responsibility of the contractor, not the provider. So, in addition to choosing a secure cloud, maintain good internal access control. Cryptography Look for a provider that offers customers the ability to create and manage their own encryption keys. This guarantees autonomy and independence of access even in relation to the provider, who will not be able to decrypt the files. In addition to personal key encryption, it is interesting that the

Hyper agile: what it is and how it relates to IT

 Hyper Agile is a development method used to scale smoothly from small to large teams. It also aims to enhance projects from a return on investment (ROI) perspective. There are a number of parameters within this innovative method and, with them, several IT management challenges can be overcome. So much so that the adoption by technology managers in the most varied types of projects grows. Interested in the subject? Check out how Hyper Agile relates to IT below! What are the parameters of Hyper Agile? Hyper Agile was designed by Damon Poole, founder of Nexxle. He defined some parameters for this methodology. Are they: short iterations; total automation; massively parallel virtual pipelining; development hierarchy; classification of work items; test estimation and anticipation; quality quotient; meritocracy. How can Hyper Agile parameters improve IT management? See now, a breakdown of the principles of Hyper Agile and how they are useful in IT management. Short iterations and process aut