Saturday, January 4, 2020

Netiquette IQ multi-cloud strategy-Blog Of 1/4/2019



From whatis.com

multi-cloud strategy
A multi-cloud strategy is the use of two or more cloud computing platforms to take advantage of services and capabilities that no one cloud provider can offer on its own. Redundancy and vendor lock-in concerns are driving many multi-cloud deployments, as are business and technical goals -- including the desire to comparison shop and take advantage of the pricing, speed and capacity a particular cloud provider offers in a particular geography. .

Quote of the Day
 


"More than half of the average enterprise's workloads now run in external cloud environments. If IT operations for multi-cloud is to succeed, IT leaders must adapt processes and staffing accordingly." -- John Burke


Multi-cloud Learning Center
 

Enterprise IT weighs pros and cons of multi-cloud management
IT ops pros are getting used to multi-cloud management, especially for disaster recovery, but moving from cloud to cloud via container portability is still rare.
Evaluate these 9 multi-cloud management platforms
Dig into the benefits -- and drawbacks -- of the top tools and services to help enterprises manage their hybrid and multi-cloud environments.
Suffering from cloud sprawl? Secure multi-cloud systems in 2 steps
As enterprise cloud adoption increases, so too does the risk of cloud sprawl -- and, with it, cloud security threats. Learn how to beat cloud sprawl in two steps.
Effective multi-cloud storage strategies and management techniques
Multi-cloud deployments have their advantages, but they're also complex and challenging to manage and maintain. Learn where to focus as you get started.
Everything you need to know about multi-cloud security
This guide provides resources to help security practitioners learn how to manage a multi-cloud environment, including the tools and services required for ensuring security.
What's the difference between multi-cloud vs. hybrid cloud strategies?
When comparing multi-cloud vs. hybrid cloud deployments, you'll want to pay particular attention to the management concepts and tools for each cloud strategy.

Related Terms
 


_________ is the uncontrolled proliferation of an organization's cloud instances, services or providers.
a. Cloud sprawl
b. Cloud cloning








========================================  
For a great satire on email, please see the following:
https://www.youtube.com/watch?v=HTgYHHKs0Zwscoop_post=bcaa0440-2548-11e5-c1bd-90b11c3d2b20&__scoop_topic=2455618
=============================================== 
Good Netiquette And A Green Internet To All! 



++++++++++++++++++++++++++++++++++++++++++++++++++++


Every year millions of Americans find themselves unable to vote because they miss a registration deadline, don’t update their registration, or aren’t sure how to register.

Our partners at Vote Forward have made it easy to contact historically under-represented, not-yet-registered voters living in key 2020 swing states to provide them with everything they need to register to vote.

Click the link to set up an account or sign in, then scroll down to the second row of options and choose one of the campaigns that includes voter registration forms.


+++++++++++++++++++++++++++++++++++++++++++++++++






air gapping
Air gapping is a security measure that involves physically isolating a computer or network to prevent it from connecting directly or wirelessly to other systems that can connect to the Internet. Air gapping is used to protect many types of critical systems, including those that support the stock market, the military, the government and industrial power industries.
To prevent unauthorized data extrusion through electromagnetic or electronic exploits, there must be a specified amount of space between the air-gapped system and outside walls and between its wires and the wires for other technical equipment. In the United States, the U.S. National Security Agency TEMPEST project provides best practices for using air gaps as a security measure.

For a system with extremely sensitive data, a Faraday cage can be used to prevent electromagnetic radiation (EMR) escaping from the air-gapped equipment. Although such measures may seem extreme, van Eck phreaking can be used to intercept data such as key strokes or screen images from demodulated EMR waves, using special equipment from some distance away. Other proof-of-concept (POC) attacks for air- gapped systems have shown that electromagnetic emanations from infected sound cards on isolated computers can be exploited and continuous wave irradiation can be used to reflect and gather information from isolated screens, keyboards and other computer components.

As of this writing, the Defense Advanced Research Projects Agency (DARPA) is awarding grants for prototype hardware and software designs that will keep sensitive data physically isolated. The grants are made possible under the Guaranteed Architecture for Physical Security (GAPS) program.

Enhancing air-gapped security measures

The problem with physical separation as a security technique is that, as complexity increases in some system or network to be isolated, so does the likelihood that some unknown or unauthorized external connection will arise.

Perhaps the most important way to protect a computing device or network from an air gap attack is through end user security awareness training. The infamous Stuxnet worm, which was designed to attack air-gapped industrial control systems, is thought to have been introduced by infected thumb drives found by employees or obtained as free giveaways.
The software-defined perimeter (SDP) framework is another tool network engineers can use to create a type of "virtual air gapping" through policy enforcement. SDP requires external endpoints that want to access internal infrastructure to comply with authentication policies and ensures that only authenticated systems can see internal IP addresses.


In my books, noted below, I often lament about the lack of civility, deterioration of written communication and abuse of the power of the Internet. Electronic communication, in my opinion, breeds negativity and behavior which does not exist in direct communication. 

The following is an except from my first book which addresses angry email replies.

Enjoy the article and check out the website!
================================================== 

======================    
 For a great satire on email, please see the following:
https://www.youtube.com/watch?v=HTgYHHKs0Zwscoop_post=bcaa0440-2548-11e5-c1bd-90b11c3d2b20&__scoop_topic=2455618
=============================================== 
Good Netiquette And A Green Internet To All! 

Special Bulletin - My just released book

"You're Hired. Super Charge our Email Skills in 60 Minutes! (And Get That Job...) 

is now on sales at Amazon.com 

Great Reasons for Purchasing Netiquette IQ
·         Get more email opens.  Improve 100% or more.
·         Receive more responses, interviews, appointments, prospects and sales.
·         Be better understood.
·         Eliminate indecision.
·         Avoid being spammed 100% or more.
·         Have recipient finish reading your email content. 
·         Save time by reducing questions.
·         Increase your level of clarity.
·         Improve you time management with your email.
·        Have quick access to a wealth of relevant email information.
Enjoy most of what you need for email in a single book.

 =================================

**Important note** - contact our company for very powerful solutions for IP
 management (IPv4 and IPv6, security, firewall and APT solutions:
www.tabularosa.net
==================================================

Another Special Announcement - Tune in to my radio interview,  on Rider University's station, www.1077thebronc.com I discuss my recent book, above on "Your Career Is Calling", hosted by Wanda Ellett.   

In addition to this blog, Netiquette IQ has a website with great assets which are being added to on a regular basis. I have authored the premiere book on Netiquette, “Netiquette IQ - A Comprehensive Guide to Improve, Enhance and Add Power to Your Email". My new book, “You’re Hired! Super Charge Your Email Skills in 60 Minutes. . . And Get That Job!” has just been published and will be followed by a trilogy of books on Netiquette for young people. You can view my profile, reviews of the book and content excerpts at:

 www.amazon.com/author/paulbabicki

In addition to this blog, I maintain a radio show on BlogtalkRadio  and an online newsletter via paper.li.I have established Netiquette discussion groups with Linkedin and  Yahoo I am also a member of the International Business Etiquette and Protocol Group and Minding Manners among others. I regularly consult for the Gerson Lehrman Group, a worldwide network of subject matter experts and I have been contributing to the blogs Everything Email and emailmonday . My work has appeared in numerous publications and I have presented to groups such as The Breakfast Club of NJ and  PSG of Mercer County, NJ.


I am the president of Tabula Rosa Systems, a “best of breed” reseller of products for communications, email, network management software, security products and professional services.  Also, I am the president of Netiquette IQ. We are currently developing an email IQ rating system, Netiquette IQ, which promotes the fundamentals outlined in my book.

Over the past twenty-five years, I have enjoyed a dynamic and successful career and have attained an extensive background in IT and electronic communications by selling and marketing within the information technology marketplace.Anyone who would like to review the book and have it posted on my blog or website, please contact me paul@netiquetteiq.com.
=============================================================


Wednesday, January 1, 2020

Netiquette IQ Blog For 1/1//2020 Reminder: CISA Publishes Weekly Vulnerability Summaries 12/31/2019 11:43 AM EST Original release date: December 31, 2019



















12/31/2019 11:43 AM EST

Original release date: December 31, 2019
Did you know that the Cybersecurity and Infrastructure Security Agency (CISA) publishes a weekly Vulnerability Bulletin? This recurring item provides a summary of all new vulnerabilities that have been recorded by the CISA-sponsored National Institute of Standards and Technology (NIST) National Vulnerability Database (NVD) within the past week. Patch information is provided when available. CISA encourages interested parties to sign up for the email/text list or RSS feed to automatically receive the Vulnerability Summary each week.
This product is provided subject to this Notification and this Privacy & Use policy.


========================================  
For a great satire on email, please see the following:
https://www.youtube.com/watch?v=HTgYHHKs0Zwscoop_post=bcaa0440-2548-11e5-c1bd-90b11c3d2b20&__scoop_topic=2455618
=============================================== 
Good Netiquette And A Green Internet To All! 



++++++++++++++++++++++++++++++++++++++++++++++++++++

·        Antarctica Day
·        Bifocals at the Monitor Liberation Day
·        Clark Kent’s Birthday
·        Basketball Day
·        Day With(out) Art Day
·        Rosa Parks Day
·        World Aids Day
·        December 2
·        Cider Monday
·        Cyber Monday
·        Mutt Day
·        Special Education Day
·        Safety Razor Day
·        International Day for the Abolition of Slavery
·        December 3
·        Giving Tuesday
·        Trick Shot Day
·        International Day of Persons With Disabilities
·        December 4
·        World Wildlife Conservation Day
·        Cookie Day
·        Dice Day
·        Sock Day
·        December 5
·        Bathtub Party Day
·        International Ninja Day
·        Sacher Torte Day
·        International Volunteer Day for Economic & Social Development
·        World Soil Day
·        International Day of the Reef
·        December 6
·        Faux Friday
·        Salesperson Day
·        Pawnbrokers Day
·        Miners’ Day
·        St. Nicholas Day
·        December 7
·        Bartender Appreciation Day
·        Earmuff Day
·        Cotton Candy Day
·        Play Outside Day
·        Rhubarb Vodka Day
·        International Civil Aviation Day
·        Pearl Harbor Remembrance Day
·        December 8
·        Pretend To Be a Time Traveler Day
·        Day of Lard
·        Worldwide Candle Lighting Day
·        World Choral Day
·        December 9
·        Green Monday
·        International Anti-corruption Day
·        Cremation Day
·        World Techno Day
·        December 10
·        Dewey Decimal System Day
·        Nobel Prize Day
·        Human Rights Day
·        International Animal Rights Day
·        December 11
·        International Mountain Day
·        Magnum PI day
·        UNICEF Birthday
·        Kaleidoscope Day
·        App Day
·        December 12
·        Poinsettia Day
·        12-Hour Fresh Breath Day
·        Gingerbread House Day
·        Cocoa Day
·        Ding-a-ling Day
·        December 13
·        Day of the Horse
·        Lost and Found Day
·        December 14
·        Monkey Day
·        Yoga Day
·        Gingerbread Decorating Day
·        International Shareware Day
·        December 15
·        Cat Herders Day
·        Cupcake Day
·        International Tea Day
·        December 16
·        Barbie and Barney Backlash Day
·        Chocolate-covered Anything Day
·        December 17
·        A Christmas Carol Day
·        Wright Brothers Day
·        Clean Air Day
·        December 18
·        Answer the Telephone Like Buddy the Elf
·        International Migrants Day
·        Give a Wine Club Day
·        December 19
·        Free Shipping Day
·        Re-Gifting Day
·        December 20
·        Underdog Day
·        Ugly Christmas Sweater Day
·        Games Day
·        Sangria Day
·        Poet Laureat Day
·        International Human Solidarity Day
·        December 21
·        Winter Solstice
·        Crossword Puzzle Day
·        Humbug Day
·        Short Girl Appreciation Day
·        World Peace Day
·        Global Orgasm Day
·        Celebrate Short Fiction Day
·        Flashlight Day
·        December 22
·        Be a Lover of Silence Day
·        December 23
·        Festivus
·        Human Light Celebration
·        Metric Conversion Day
·        December 24
·        Christmas Eve
·        Egg Nog Day
·        December 25
·        Christmas Day
·        Christmas Pudding Day
·        December 26
·        Boxing Day
·        Candy Cane Day
·        Thank-you Note Day
·        Whiners’ Day
·        December 27
·        Free Balloon Day
·        Howdy Doody Day
·        Visit the Zoo Day
·        December 28
·        Chocolate Day
·        Short Film Day
·        December 29
·        Tick Tock Day
·        YMCA Day
·        December 30
·        Bacon Day
·        Falling Needles Day
·        December 31
·        New Years Eve
·        No Interruptions Day
·        Global Champagne Day
·        Banished Words Day
·        Leap Second Time Adjustment Day
·        Make Up Your Mind Day
·        Look on the Bright Side Day
·        Universal Hour of Peace Day
·        World Peace Meditation Day



++++++++++++++++++++++++++++++++++++++++++++++++++



Every year millions of Americans find themselves unable to vote because they miss a registration deadline, don’t update their registration, or aren’t sure how to register.

Our partners at Vote Forward have made it easy to contact historically under-represented, not-yet-registered voters living in key 2020 swing states to provide them with everything they need to register to vote.

Click the link to set up an account or sign in, then scroll down to the second row of options and choose one of the campaigns that includes voter registration forms.


+++++++++++++++++++++++++++++++++++++++++++++++++






air gapping
Air gapping is a security measure that involves physically isolating a computer or network to prevent it from connecting directly or wirelessly to other systems that can connect to the Internet. Air gapping is used to protect many types of critical systems, including those that support the stock market, the military, the government and industrial power industries.
To prevent unauthorized data extrusion through electromagnetic or electronic exploits, there must be a specified amount of space between the air-gapped system and outside walls and between its wires and the wires for other technical equipment. In the United States, the U.S. National Security Agency TEMPEST project provides best practices for using air gaps as a security measure.

For a system with extremely sensitive data, a Faraday cage can be used to prevent electromagnetic radiation (EMR) escaping from the air-gapped equipment. Although such measures may seem extreme, van Eck phreaking can be used to intercept data such as key strokes or screen images from demodulated EMR waves, using special equipment from some distance away. Other proof-of-concept (POC) attacks for air- gapped systems have shown that electromagnetic emanations from infected sound cards on isolated computers can be exploited and continuous wave irradiation can be used to reflect and gather information from isolated screens, keyboards and other computer components.

As of this writing, the Defense Advanced Research Projects Agency (DARPA) is awarding grants for prototype hardware and software designs that will keep sensitive data physically isolated. The grants are made possible under the Guaranteed Architecture for Physical Security (GAPS) program.

Enhancing air-gapped security measures

The problem with physical separation as a security technique is that, as complexity increases in some system or network to be isolated, so does the likelihood that some unknown or unauthorized external connection will arise.

Perhaps the most important way to protect a computing device or network from an air gap attack is through end user security awareness training. The infamous Stuxnet worm, which was designed to attack air-gapped industrial control systems, is thought to have been introduced by infected thumb drives found by employees or obtained as free giveaways.
The software-defined perimeter (SDP) framework is another tool network engineers can use to create a type of "virtual air gapping" through policy enforcement. SDP requires external endpoints that want to access internal infrastructure to comply with authentication policies and ensures that only authenticated systems can see internal IP addresses.


In my books, noted below, I often lament about the lack of civility, deterioration of written communication and abuse of the power of the Internet. Electronic communication, in my opinion, breeds negativity and behavior which does not exist in direct communication. 

The following is an except from my first book which addresses angry email replies.

Enjoy the article and check out the website!
================================================== 

======================    
 For a great satire on email, please see the following:
https://www.youtube.com/watch?v=HTgYHHKs0Zwscoop_post=bcaa0440-2548-11e5-c1bd-90b11c3d2b20&__scoop_topic=2455618
=============================================== 
Good Netiquette And A Green Internet To All! 

Special Bulletin - My just released book

"You're Hired. Super Charge our Email Skills in 60 Minutes! (And Get That Job...) 

is now on sales at Amazon.com 

Great Reasons for Purchasing Netiquette IQ
·         Get more email opens.  Improve 100% or more.
·         Receive more responses, interviews, appointments, prospects and sales.
·         Be better understood.
·         Eliminate indecision.
·         Avoid being spammed 100% or more.
·         Have recipient finish reading your email content. 
·         Save time by reducing questions.
·         Increase your level of clarity.
·         Improve you time management with your email.
·        Have quick access to a wealth of relevant email information.
Enjoy most of what you need for email in a single book.

 =================================

**Important note** - contact our company for very powerful solutions for IP
 management (IPv4 and IPv6, security, firewall and APT solutions:
www.tabularosa.net
==================================================

Another Special Announcement - Tune in to my radio interview,  on Rider University's station, www.1077thebronc.com I discuss my recent book, above on "Your Career Is Calling", hosted by Wanda Ellett.   

In addition to this blog, Netiquette IQ has a website with great assets which are being added to on a regular basis. I have authored the premiere book on Netiquette, “Netiquette IQ - A Comprehensive Guide to Improve, Enhance and Add Power to Your Email". My new book, “You’re Hired! Super Charge Your Email Skills in 60 Minutes. . . And Get That Job!” has just been published and will be followed by a trilogy of books on Netiquette for young people. You can view my profile, reviews of the book and content excerpts at:

 www.amazon.com/author/paulbabicki

In addition to this blog, I maintain a radio show on BlogtalkRadio  and an online newsletter via paper.li.I have established Netiquette discussion groups with Linkedin and  Yahoo I am also a member of the International Business Etiquette and Protocol Group and Minding Manners among others. I regularly consult for the Gerson Lehrman Group, a worldwide network of subject matter experts and I have been contributing to the blogs Everything Email and emailmonday . My work has appeared in numerous publications and I have presented to groups such as The Breakfast Club of NJ and  PSG of Mercer County, NJ.


I am the president of Tabula Rosa Systems, a “best of breed” reseller of products for communications, email, network management software, security products and professional services.  Also, I am the president of Netiquette IQ. We are currently developing an email IQ rating system, Netiquette IQ, which promotes the fundamentals outlined in my book.

Over the past twenty-five years, I have enjoyed a dynamic and successful career and have attained an extensive background in IT and electronic communications by selling and marketing within the information technology marketplace.Anyone who would like to review the book and have it posted on my blog or website, please contact me paul@netiquetteiq.com.
=============================================================