Welcome to the first edition of the Enterprise Efficiency Weekly Quiz. We know that you're busy, and this is our way of helping you get the most from your E2 Community Membership.
Here's how it works: Each Friday, we'll put together a quiz taken from stories that have run during the week. Take a look, answer the questions on the message board, and wait to see if you're a winner.
If you are a winner, what do you get? That's where this contest is unique to Enterprise Efficiency. Winners will have the joy of one of the Enterprise Efficiency editors (and maybe more than one) say, "Congratulations, you're a winner!" in a public comment to your message. Who wouldn't want that?
Of course, even before then you'll have had the pleasure of being introduced (or re-introduced) to some of the great articles that appear each week in Enterprise Efficiency. Let us know what you think of the idea, enjoy the quiz -- and let the games begin!
Woo-hoo! Huzzah, and a big "Well Done!" to @Nicky48, the first person to post a correct set of answers to the first E2 Quiz.
We're already putting together the quiz for Friday -- everyone get ready! If you get all correct answers, you could be the next recipient of a giant "Woo-hoo!" from the editors of Enterprise Efficiency!
Thanks for being a great example @Nicky48 -- truly well done!
1. True or False: The Economic Development Agency destroyed desktops, printers, TVs, cameras, computer mice, and keyboards in a misguided attempt to stop a malware attack. --- Yes, even the keyboards
2. Now that TechNet is being shut down by Microsoft, solid alternatives include MSDN, Azure, and what other option from Microsoft?
--- Time limited evaluations, but none of the alternatives come close to the value of TechNet.
3. When the Michigan Cancer Consortium's records were hacked, the resulting loss of information was determined to be a potential violation of which rules and regulations? 1. HIPAA 2. Sarbox 3. GLB 4. Identity Theft Protection Act 5. None of the above
- were not medical records and therefore, no notification under HIPAA was sent to individuals. However, because the reports contained Social Security numbers, the Identity Theft Protection Act did apply. MDCH therefore contacted individuals about the breach along with steps that could be taken to protect from the potential for identity theft.
4. When Michael Hugos learned that his organization had a major malware infection his first reaction was ---a desperate desire to leave the room and huddle somewhere in private with my staff and figure out what the heck to do. I wanted to run and hide from public view and from the painfully obvious evidence that my email system had been breached and was now spewing a virus far and wide.
5. True or False: Video Games Are Sports. --- YES, Just ask the federal government, which is now granting P-1 Visas to "cyber athletes" under the same provisions usually reserved for people coming for the Olympics or to play in the NBA.
@a.saji, you're right: Open-book tests are really as much a test of how well you know the book's index as of how well you know the material. For this one, though, I tried to provide some "cheat codes." After all, I want everyone to pass this exam!
Thanks, @Anand! That was really the point: We know that everyone is busy and that it's easy to miss stories. We just want to help point out some of the interesting things that go on here at E2, and provide a fun way to look back at the week. I'm glad you enjoyed it!
Thanks, @Zaius! Since the current team has been working with the E2 Community for almost 3 years we keep looking for new ways to present information -- the last thing we want is for everyone to get bored!
I hope folks will let us know what they think of these new ideas -- and point out presentations on other sites that they think we might want to try. We're all ears -- after all, for the members this is your site, not ours!
The blogs and comments posted on EnterpriseEfficiency.com do not reflect the views of TechWeb, EnterpriseEfficiency.com, or its sponsors. EnterpriseEfficiency.com, TechWeb, and its sponsors do not assume responsibility for any comments, claims, or opinions made by authors and bloggers. They are no substitute for your own research and should not be relied upon for trading or any other purpose.
4/29/2014 - Join Dell and Intel for an interactive discussion about implementing, refining and improving your virtual environment. Specifically we’ll discuss pain points virtualization can solve and those that it can create and how to prevent them.
Enterprise Efficiency is looking for engaged readers to moderate the message boards on this site. Engage in high-IQ conversations with IT industry leaders; earn kudos and perks. Interested? E-mail: email@example.com
Dell's Efficiency Modeling Tool The major problem facing the CIO is how to measure the effectiveness of the IT department. Learn how Dell’s Efficiency Modeling Tool gives the CIO two clear, powerful numbers: Efficiency Quotient and Impact Quotient. These numbers can be transforma¬tive not only to the department, but to the entire enterprise. Read the full report
Now that TGen has broken new ground in genomic research by using Dell's storage, cloud, and high-performance computing solutions, the company discusses what will come next for it and for personalized medicine.
The Translational Genomics Research Institute wanted to save lives, but its efforts were hobbled by immense computing challenges related to collecting, processing, sharing, and storing enormous amounts of data.
Office and personal productivity tools come in a first-class and coach flavor set, but what makes the difference is primarily little things that most users won't encounter. What's the big issue in using something other than Office, and can you get around it?
We really don't want an "Internet of Everything" but even building an Internet of Everythinguseful means setting some ground rules to insure there's value in the process and that costs and risks are minimized.
Google's Chrome OS has a lot of potential value and a lot of recent press, but it still needs something to make it more than a thin client. It needs cloud integration, it needs extended APIs via web services, and it needs to suck it up and support a hard drive.
On a recent African trip I saw examples of the value of the cloud in developing nations, for educational and community development programs. We could build on this, but not only in developing economies, because these same programs are often under-supported even in first-world countries.
VMware's debate with Cisco on SDN might finally create a fusion between an SDN view that's all about software and another that's all about network equipment. That would be good for every enterprise considering the cloud and SDN.
Wearing a bulky, oversized watch is good training for the next phase in wristwatches: the Internet-enabled, connected watch. Why the smartphone-tethered connected watch makes sense, plus Ivan demos an entirely new concept for the "smart watch."
Cloud storage costs are determined primarily by the rate at which files are changed and the possibility of concurrent access/update. If you can structure your storage use to optimize these factors you can cut costs, perhaps to zero.
The Internet has evolved into a machine for drumming up a chorus of "Happy Birthday" messages, from family, friends, friends of friends who you added on Facebook, random people that you circled on G+, and increasingly, automated bots. Enough already.