Welcome to the first edition of the Enterprise Efficiency Weekly Quiz. We know that you're busy, and this is our way of helping you get the most from your E2 Community Membership.
Here's how it works: Each Friday, we'll put together a quiz taken from stories that have run during the week. Take a look, answer the questions on the message board, and wait to see if you're a winner.
If you are a winner, what do you get? That's where this contest is unique to Enterprise Efficiency. Winners will have the joy of one of the Enterprise Efficiency editors (and maybe more than one) say, "Congratulations, you're a winner!" in a public comment to your message. Who wouldn't want that?
Of course, even before then you'll have had the pleasure of being introduced (or re-introduced) to some of the great articles that appear each week in Enterprise Efficiency. Let us know what you think of the idea, enjoy the quiz -- and let the games begin!
Woo-hoo! Huzzah, and a big "Well Done!" to @Nicky48, the first person to post a correct set of answers to the first E2 Quiz.
We're already putting together the quiz for Friday -- everyone get ready! If you get all correct answers, you could be the next recipient of a giant "Woo-hoo!" from the editors of Enterprise Efficiency!
Thanks for being a great example @Nicky48 -- truly well done!
1. True or False: The Economic Development Agency destroyed desktops, printers, TVs, cameras, computer mice, and keyboards in a misguided attempt to stop a malware attack. --- Yes, even the keyboards
2. Now that TechNet is being shut down by Microsoft, solid alternatives include MSDN, Azure, and what other option from Microsoft?
--- Time limited evaluations, but none of the alternatives come close to the value of TechNet.
3. When the Michigan Cancer Consortium's records were hacked, the resulting loss of information was determined to be a potential violation of which rules and regulations? 1. HIPAA 2. Sarbox 3. GLB 4. Identity Theft Protection Act 5. None of the above
- were not medical records and therefore, no notification under HIPAA was sent to individuals. However, because the reports contained Social Security numbers, the Identity Theft Protection Act did apply. MDCH therefore contacted individuals about the breach along with steps that could be taken to protect from the potential for identity theft.
4. When Michael Hugos learned that his organization had a major malware infection his first reaction was ---a desperate desire to leave the room and huddle somewhere in private with my staff and figure out what the heck to do. I wanted to run and hide from public view and from the painfully obvious evidence that my email system had been breached and was now spewing a virus far and wide.
5. True or False: Video Games Are Sports. --- YES, Just ask the federal government, which is now granting P-1 Visas to "cyber athletes" under the same provisions usually reserved for people coming for the Olympics or to play in the NBA.
@a.saji, you're right: Open-book tests are really as much a test of how well you know the book's index as of how well you know the material. For this one, though, I tried to provide some "cheat codes." After all, I want everyone to pass this exam!
Thanks, @Anand! That was really the point: We know that everyone is busy and that it's easy to miss stories. We just want to help point out some of the interesting things that go on here at E2, and provide a fun way to look back at the week. I'm glad you enjoyed it!
Thanks, @Zaius! Since the current team has been working with the E2 Community for almost 3 years we keep looking for new ways to present information -- the last thing we want is for everyone to get bored!
I hope folks will let us know what they think of these new ideas -- and point out presentations on other sites that they think we might want to try. We're all ears -- after all, for the members this is your site, not ours!
The blogs and comments posted on EnterpriseEfficiency.com do not reflect the views of TechWeb, EnterpriseEfficiency.com, or its sponsors. EnterpriseEfficiency.com, TechWeb, and its sponsors do not assume responsibility for any comments, claims, or opinions made by authors and bloggers. They are no substitute for your own research and should not be relied upon for trading or any other purpose.
12/5/2013 - With the looming April 8th 2014 end-of-support date for Windows XP, IT departments are working to wrap up the move to Windows 7 and Windows 8. Yet at many organizations, lingering concerns about application compatibility are impeding the process.
Join us for a detailed, interactive webinar to hear expert advice on how to address application issues in your OS migration.
12/17/2013 - This webcast will show how you can:
-Transform your IT infrastructure by leveraging Dell’s OpenManage integrated with System Center, our Hyper-Scale technologies, and factory capabilities
-Connect with people-centric solutions with Dell Desktop Virtualization Solutions (DVS)
-Inform your users with business intelligence based on Dell deployment, applications like Boomi, and comprehensive reference architectures
Enterprise Efficiency is looking for engaged readers to moderate the message boards on this site. Engage in high-IQ conversations with IT industry leaders; earn kudos and perks. Interested? E-mail: firstname.lastname@example.org
Dell's Efficiency Modeling Tool The major problem facing the CIO is how to measure the effectiveness of the IT department. Learn how Dell’s Efficiency Modeling Tool gives the CIO two clear, powerful numbers: Efficiency Quotient and Impact Quotient. These numbers can be transforma¬tive not only to the department, but to the entire enterprise. Read the full report
Now that TGen has broken new ground in genomic research by using Dell's storage, cloud, and high-performance computing solutions, the company discusses what will come next for it and for personalized medicine.
The Translational Genomics Research Institute wanted to save lives, but its efforts were hobbled by immense computing challenges related to collecting, processing, sharing, and storing enormous amounts of data.
VMware's debate with Cisco on SDN might finally create a fusion between an SDN view that's all about software and another that's all about network equipment. That would be good for every enterprise considering the cloud and SDN.
Wearing a bulky, oversized watch is good training for the next phase in wristwatches: the Internet-enabled, connected watch. Why the smartphone-tethered connected watch makes sense, plus Ivan demos an entirely new concept for the "smart watch."
Cloud storage costs are determined primarily by the rate at which files are changed and the possibility of concurrent access/update. If you can structure your storage use to optimize these factors you can cut costs, perhaps to zero.
The Internet has evolved into a machine for drumming up a chorus of "Happy Birthday" messages, from family, friends, friends of friends who you added on Facebook, random people that you circled on G+, and increasingly, automated bots. Enough already.
Fedora Linux is launching a new model for structuring Linux distributions, a two-ring approach with core functions surrounded by special-interest-group customizations. This could streamline Linux to enhance its role in everything in our tech future.
For many users, lack of support is the only barrier to open-source adoption, and there are some strategies that can be used to get you support and one possible way of minimizing your need for it in the first place.
Who'd have thought? But the liaison is actually not only good for both companies, it's good for the cloud market, because it will promote the cloud to SMBs, and it's the little guys that will make or break the cloud of the future.
Google Glass certainly posed potential privacy risks, and there are considerations for its use by consumers, but we've let ourselves forget the profound benefits that augmented reality tools like Glass could bring to the workplace.
We can reconcile our notions of big-data, analytics, and the cloud only by recognizing there are really two clouds, the resource cloud we know and the "information cloud" we're only glimpsing with things like Hadoop. It's time to focus on information-cloud architecture.