Ken’s TOP 5 Information Pivot Points of Week 34

OX 5 ibm 1. Data Visualization: InfoSphere BigInsights combines the power of Hadoop with enterprise-grade features including visualization & exploration, advanced analytics, and security & administration. InfoSphere BigInsights Quick Start Edition, the latest edition to the InfoSphere BigInsights family, is a free, downloadable, non-production version. With InfoSphere BigInsights Quick Start, you get access to hands-on learning through a set of tutorials designed to guide you through your Hadoop experience.

NFPA 2. Big Data viewed from a different perspective. Do you know the NFPA Smoke Detection requirements for Data Centers? Visit NFPA and register for their free access version. NFPA 75 is the Standard for the Protection of Information Technology Equipment and covers the requirements for the protection of information technology equipment and information technology equipment areas. This standard sets forth the minimum requirements for the protection of information technology equipment and related areas from damage by fire or its associated effects — namely smoke, corrosion, heat, and water.

ISACA3. Data Analytics. History of ISACA: ISACA was incorporated by individuals who recognized a need for a centralized source of information and guidance in the growing field of auditing controls for computer systems. Previously known as the Information Systems Audit and Control Association, ISACA now goes by its acronym only, to reflect the broad range of IT governance professionals it serves. Today, ISACA’s constituency—more than 110,000 strong worldwide—is characterized by its diversity. Constituents live and work in more than 180 countries and cover a variety of professional IT-related positions—to name just a few, IS auditor, consultant, educator, IS security professional, regulator, chief information officer and internal auditor. For membership information, click here.

ITBUSINESSEDGE4. CyberSecurity: Straight A’s for Determining Risk and Avoiding the Big F. Authentication is about ensuring that the person logging into a system is who they say they are. Depending on the role and level of access for an individual user, companies should require that employees provide more than one form of authentication. A good example is a security token that constantly generates a new random PIN. Adding a second form of authentication makes it harder to infiltrate a system.

OpenADR25. Smart Grid/OpenADR: The OpenADR Alliance today announced the first OpenADR 2.0b-certified devices from a number of member companies, including: AutoGrid, EnerNOC, Fujitsu, Honeywell and IPKeys Technologies. The OpenADR 2.0b Profile Specification released in July of this year, is a full-feature specification for complex energy management solutions supporting automated demand response (ADR) and distributed energy resource (DER) management for both wholesale and retail programs. ADR programs enable customers to reduce their energy usage during times of peak demand, high wholesale market prices or grid stress. Special Note: “The Alliance would like to congratulate AutoGrid, EnerNOC, Fujitsu, Honeywell and IPKeys Technologies on being the first companies to complete the 2.0b certification process; this is a major milestone in addressing the global market requirements for automated demand response programs,” said Barry Haaser, managing director, OpenADR Alliance.

Share on facebook
Share on twitter
Share on linkedin
Share on pinterest

Leave a Reply

Your email address will not be published. Required fields are marked *


Join 7,294 other subscribers