Blog of Tips, Tricks & Resources from New Horizons Central

What’s New in vSphere 7

While there are many new and updated features of vSphere 7, perhaps the most impactful for customers long-term will be the changes to the product updating capabilities, specifically vCenter Server Update Planner as well as Lifecycle Manager.

Nicole Winn 0 219

In April 2020, VMware announced the general availability of VMware vSphere 7, the latest version of their flagship virtualization product.  VMware customers had been anxiously awaiting the release of vSphere 7, the subsequent rollout and adoption by the customer has certainly been fantastic.

Visual Studio Code | Expert Resources & Extensions

Charles Watkins gives you the run-down and excellent summary of Visual Studio, with direct resources. Microsoft got it right.

Nicole Winn 0 373

 

Visual Studio Code (VS Code), by Microsoft, is a FREE small lightweight code editor that can be installed on Windows, MacOS, and Linux.  VS Code is not an Integrated Development Environment (IDE) like Visual Studio but it has many IDE-like features.

Numbering Systems & Conversions

Converting from one numbering system to another as a basic skill to other skills...

Nicole Winn 0 206

 

With anything related to IT someone needs to understand numbering systems and converting from one numbering system to another as a basic skill to other skills. This piece is related to that requirement which is a basic skill in the following CompTIA courses: A+, Network+, Server+, Security+, CASP, Cloud+, and CySA+ as well as Cisco and Microsoft certifications.

Anyone with questions is invited to communicate with me at drussell@nhnashville.com and I will be glad to communicate with them. 

Penetration Testing vs. Vulnerability Assessment

Penetration testing, ethical hacking, or pen-testing as it is often called, is a much more active approach to identifying and even attempting to exploit vulnerabilities in a particular system, while a Vulnerability Assessment is an exercise in checking the security state of a system at a particular point in time or under a specific configuration. 

Nicole Winn 0 182

 

Penetration testing, ethical hacking, or pen-testing as it is often called, is a much more active approach to identifying and even attempting to exploit vulnerabilities in a particular system, while a Vulnerability Assessment is an exercise in checking the security state of a system at a particular point in time or under a specific configuration.  

Wasting Hours of Your Life Pulling Data for Reports?

Your search is over! Expert Eric Satterfield to the rescue with POWER BI

Nicole Winn 0 202

 

If you, like so many others, have been searching for an easier way, a faster way, a better way to work with your data, then read on to discover just three of the reasons why I think you need Power BI, Microsoft’s next-generation data analysis tool, and believe your search is at an end.

Power BI - Ways to Drill Down Into Your Data

Power BI has become an integral part of a lot of companies trying to find out not only what their information says, but what it means, especially in relation to predicting what comes next.

Nicole Winn 0 82

 

Let’s face it: these days, people need to get their information quickly, and they need to have it summarized so that people can easily read and interpret it. Charts allow users to summarize data very quickly and efficiently. And Power BI does a fantastic job of giving users plenty of options to organize your data.

Password exploitation is a constant threat to a business' bottom line, so how are you prioritizing IT security positions to get ahead of it?

Password Exploitation: 83% of Americans Are at Risk

Nicole Winn 0 172

 

This blog outlines tips to protect your data and how cybersecurity training with New Horizons can help fill the skills gap when it comes to IT security.

Don’t Let Your Organization’s Data Get Taken Hostage by Ransomware

Network Security and Ransomware: Learn How To Protect Against Ransomware

Nicole Winn 0 248

 

Ransomware is big business for cybercriminals. It is estimated ransomware costs will reach $20 billion by 2021! The best way to prevent a ransomware attack is through a comprehensive network security program. In this blog, learn how businesses are investing in skilled IT security workers to protect personal and organizational data.

The Case FOR Dual-Axis Charts in Power BI

The ultimate goal of many reports is to help someone make a decision.

Nicole Winn 0 190

 

An easy way to get that information across is in a graphical representation (a fancy term for a chart). With Microsoft's Power BI, you can easily take all kinds of data and create many different types of charts and display them in an easy-to-understand report to tell a story about it. One quick and easy way to do this is by using a dual-axis chart.

RSS

Theme picker

Loader