The scwcmd command-line tool provides greater functionality than the GUI-based Security Configuration wizard. The tool allows you to remotely apply role-based security policy to groups of computers, analyze the configuration of groups of computers against the role-based security policy and build GPOs that apply the settings in the role-based security policy. Security policy allows you to enforce a baseline security configuration across all servers in your environment and verify that all servers remain compliant. So, what are the real benefits of using the command-line tool? Enforcing and auditing security is not a one time job but should be a regular task that needs to be incorporated into the enterprise information security program or policy. Using the scwcmd tool you can automate and run this process on regular basis such as, a script included in the Windows scheduled tasks. The tool can output reports in HTML format which can be published on the enterprise intranet or a web portal used by the security staff. To create a GPO from a security configuration wizard policy file, from an elevated command prompt on a domain controller type the following: Scwcmd transform /p:PathandPolicyFilename /g:NewGPODisplayName The new GPO will then become available under the Group Policy Object node of the Group Policy Management console.
SmartStyle Computing by Zenith Infotech Ltd is a private cloud solution targeting ITaaS (IT as a Service) VARs and IT service providers. The solution is based around cloud servers, advanced storage and virtualized technology. VARs can combine an array of resources to form a resilient setup which can be marketed as business continuity solution. Zenith Infotech provides additional add-ons on top of the core functionality that allows VARs and customers to implement a complete computing solution. The additional packages include offsite-to-offsite data replication, rich thin clients and mirroring features for the contents of Windows servers and clients. To read more about SmartStyle go here.
In March of 2011 a high level conference at the Royal Society (a Fellowship of the world's most eminent scientists and the oldest scientific academy in continuous existence) discussed the current and future landscape of science. Many aspects were tackled and many questions came up such as, how should authorities, businesses and scientists respond to today's reality? and what is the correct balance between competition and collaboration? An intensive report called Knowledge, Networks and Nations reviews, based on available data, the changing patterns of science, and scientific collaboration, in order to provide a basis for understanding such ongoing changes. Amongst the recommendations made we find the necessity of having an international strategy for science that addresses global challenges and a supported, encouraged and facilitated approach to collaborative science. To read more about this story go here.
The University of Western Australia is shifting its 400 TB of data resources to private cloud. All of the University IT resources will now be hosted on the cloud while the connections between the cloud data centers and the University have been upgraded to 10Gbps. So what's the big fuzz? The move is quite big and the interesting part is to know on what basis was the decision taken by the University of Western Australia top management! The main decisive factor seems to be the availability of computing power including storage that would meet their students, researchers and academics future needs. We hope that they have made the right choose and to read the full story go here.
Auditing or assessing risks related to cloud setups may seem daunting at first, especially if an IT audit and assurance professional may lack cloud computing experience. A fine book published by ISACA & ITGI can give you the necessary heads up to initiate an assurance process. It is an excellent starting point but remember that it has to be modified or customized to your specific environment. Magic templates do not exist! The book will help you initiate a cloud computing audit/assurance review dealing with the effectiveness of the service provider's internal controls and security, amongst other GRC elements. For more details about Isaca's Cloud Computing Management Audit/Assurance Program book go here.