IT News and Events
May 20th, 2019 — May 26th, 2019 Generate the Custom HTML Email for this Issue
IT News and Events IT News and Events
Volume 254, Issue 4 << Previous Issue | Next Issue >>
IT - CxO
CIO Keynote: Less Jargon, More Focus On Business Outcomes
InformationWeek, May 23rd, 2019
Though they came from different disciplines, CIOs at the Interop keynote shared a common need to get down to business.
9 Must-Read Books For Digital Leaders
The Enterprisers Project, May 20th, 2019
Pack these books from MIT Press and MIT Sloan CIO Symposium speakers in your summer getaway bag to stay on top of digital business wisdom
86% Of Companies Plan To Increase IT Transformation Investment Over Next 5 Years - Datrium, May 24th, 2019
56% of respondents already have HCI, while additional 18% currently evaluating the technology.
Changes In IT: From The Trenches To The Future
InformationWeek, May 23rd, 2019
Learn how IT Leaders from Eversource Energy, Intel and Accenture Technology are looking at digital innovation - today and tomorrow.
Insights From A Leader: The Future Is All About Speed And Agility
CIO, May 24th, 2019
In a recently produced video, Cummins executives and engineers explain how the company's IT organization gets its motor running with the latest technologies
Is Your Company Spending Enough On Their Cyber Security Budget?
Information Age, May 24th, 2019
How big is your cyber security budget? Probably not big enough. Organisations need to invest more in their security
What Are E-Sports, And Why Do People Watch Them?
How-To Geek, May 23rd, 2019
What are E-Sports, and why are people watching gaming tournaments instead of football games?
5 Takeaways For It Leaders From The MIT Sloan CIO Symposium
The Enterprisers Project, May 24th, 2019
CIOs wish for simpler ways to wrangle data and experiment with business models - but change remains hard to scale. Also, it may be time to stop chasing 'alignment'
Third-Party Risks To Consider - And Manage
ITProPortal, May 24th, 2019
Four tips to help security decision makers effectively address the risks posed by relationships with technology vendors
How To Marry Security With Digital Transformation: 4 Best Practices
The Enterprisers Project, May 24th, 2019
Organizations that make security an integral part of digital transformation plans gain a competitive advantage, PwC research shows
IT - Storage
Software-Defined Storage vs NAS/SAN: What Are The Options?
ComputerWeekly, May 22nd, 2019
The pros and cons of software-defined storage and weigh up when it's a better option than buying NAS and SAN pre-built hardware shared storage arrays
What Is iSCSI and How Does It Work?
Enterprise Storage Forum, May 23rd, 2019
iSCSI is a transport layer protocol that works on top of the Transport Control Protocol (TCP), and enables block-level SCSI data transport between the iSCSI initiator and the storage target over TCP/IP networks
Why Storage Tiering Is Necessary Now More Than Ever
SearchStorage, May 24th, 2019
Tiered storage is making a comeback by incorporating AI machine learning to take advantage of the cost and performance benefits of new SSD and storage class memory technologies
IT - Security
DDoS Attacks Up In Q1 After Months Of Steady Decline
Dark Reading, May 22nd, 2019
Sudden surge suggests that new actors have stepped up to the plate to replace the old operators
Five Ways Automating IAM Saves You Money
Helpnet Security, May 21st, 2019
Identity is the foundation of security, so a robust automated identity and access management (IAM) system is by far the best way to keep your company's information safe
IT Pros Stress Importance Of Security Awareness Training
SearchSecurity, May 23rd, 2019
End-user naivete can lead to costly data breaches, underscoring the critical importance of security awareness training. Learn how phishing simulation tools can help.
Saas Performance Breaks: How Can Enterprises Protect Themselves?
eWeek, May 24th, 2019
For many enterprises, every passing moment of a downed SaaS application translates to dollars lost and productivity loss. Here are some pointers on how to circumvent this from happening
The 3 Cybersecurity Rules Of Trust
Dark Reading, May 22nd, 2019
Every day, keeping anything secure requires being smart about trust. The rules of trust will keep you and your data safer.
The Security Challenges Of Managing Complex Cloud Environments
HelpNet Security, May 22nd, 2019
Holistic cloud visibility and control over increasingly complex environments are essential for successful deployments in various cloud scenarios, a Cloud Security Alliance and AlgoSec study reveals
10 Ways To Prevent Computer Security Threats From Insiders
SearchSecurity, May 23rd, 2019
Whether via the spread of malware, spyware or viruses, insiders can do as much damage as outside attackers. Here's how to prevent computer security threats from insiders.
Cybercriminals Continue To Evolve The Sophistication Of Their Attack Methods
HelpNet Security, May 23rd, 2019
Cybercriminals continue to evolve the sophistication of their attack methods, from tailored ransomware and custom coding for some attacks, to living-off-the-land (LoTL) or sharing infrastructure to maximize their opportunities, according to the Fortinet latest report.
Incident Response: 3 Easy Traps & How To Avoid Them
Dark Reading, May 23rd, 2019
Sage legal advice about navigating a data breach from a troubleshooting cybersecurity outside counsel
DIY Open Source NAS: How To Install Freenas
Data Center Knowledge, May 25th, 2019
Open source NAS isn't appropriate for every use case, but it can be ideal for lab deployments, smaller workgroups or active archive data
To Manage Security Risk, Manage Data First
Dark Reading, May 23rd, 2019
At Interop 2019, IT and security experts urged attendees to focus on data asset management as a means of mitigating risk
Better Customer Satisfaction Through AI-Enabled CRM
CRMBuyer, May 22nd, 2019
AI is being used to carry out many jobs previously held by humans, and while this concept may sound futuristic and even scary to many, there's no need to panic
Best HCM Software 2019: Human Capital Management
ITBusinessEdge, May 23rd, 2019
Its people are any organization's most important asset. Therefore, managing those people must be a top priority for any human resources department.
What Is An HRIS? A Key Tool For All Your Human Resources Needs
CIO, May 20th, 2019
A human resources information system makes managing people, policies and procedures simple, efficient and effective for organizations of all sizes
A Guide To Understanding How Deep Learning Works
Information Management, May 22nd, 2019
Deep learning structures neurons in layers to create an 'artificial neural network' that can be trained to make intelligent decisions.
AI Is Dead, Long Live AI
ITProPortal, May 23rd, 2019
Misconceptions of AI are causing businesses genuine problems, here's how redefining the term can help.
AI Skills - 93% Of Organizations Committed To AI But Skills Shortage Poses Considerable Challenge
insideBIGDATA, May 24th, 2019
Most organizations are fully invested in AI but more than half don't have the required in-house skilled talent to execute their strategy
Artificial Intelligence, Cybersecurity Talent Top List Of Hard-To-Find Skills
ZDNet, May 25th, 2019
A majority of IT managers say they are expected to deliver more applications than a year ago. In most cases, they are working with the same number of developers.
Faulty Data Is Stalling AI Projects
Datanami, May 23rd, 2019
Tens of billions will be spent this year on AI development, but those efforts continue to be stymied by ratty data that has undermined model training efforts and burned through project budgets
Five Things To Look For In Machine Learning
jaxenter, May 24th, 2019
When we are talking about the progress of machine learning, researchers have come a long way. But what does the future hold?
Samsung Deepfake AI Could Fabricate A Video Of You From A Single Profile Pic
CNET, May 24th, 2019
Even the Mona Lisa can be faked.
What Is Artificial Intelligence?
Datamation, May 24th, 2019
Learn how artificial intelligence (AI) uses software-driven systems and intelligent agents to make decisions that approximate human cognitive functions
What Is Explainable AI?
The Enterprisers Project, May 22nd, 2019
Explainable AI means humans can understand the path an IT system took to make a decision. Let's break down this concept in plain English - and explore why it matters so much
IT - Humor
Throwback Thursday: Lost In Translation
ComputerWorld, May 23rd, 2019
Lucky; Mandarin probably would have been even harder to deal with.
Computerworld, May 24th, 2019
That's the kind of thinking that gets you out of the box
IT - Technology
A Robot Dog Pulled A 3-Ton Plane, And We're Not Scared At All
CNET, May 23rd, 2019
Seriously, we should stop kicking the robots.
USPS Tests Autonomous Long-Haul Trucks
GCN, May 22nd, 2019
The U.S. Postal Service is testing self-driving trucks for transporting intercity mail.
IT - Blockchain
For Real Estate, Blockchain Could Unshackle Investment
ComputerWorld, May 24th, 2019
A special interest group with the Enterprise Ethereum Alliance is detailing opportunities and offering examples of how blockchain can create new real estate market
How Blockchain, AI And IoT Are Intersecting In The Next Wave Of Disruption
TechZone360, May 20th, 2019
Enterprises are just beginning to scratch the surface of how today's three disruptor heavyweights - AI, Internet of Things and blockchain - will transform their organizations
Research Finds That AI Improves Business Intelligence
Open Access Government, May 24th, 2019
Research has found that AI improves business intelligence, as part of the overall movement in which technology is transforming how business analysts learn and thrive
Self-Service Business Intelligence Solutions: Potential And Requirements
CustomerThink, May 22nd, 2019
80% of all business intelligence solutions will be self-service by 2020, according to a report by Gartner.
Apple Already The No. 3 Smartglasses Player Without A Product, Says Survey
ZDNet, May 24th, 2019
Apple may not have smartglasses yet or augmented reality headsets, but it's already the third most recognizable name in the industry, according to a report.
Extended Reality Promises A Holistic Training Experience, Experts Say
HR Dive, May 21st, 2019
As the tech's potential continues to unfold, and workforces reap the benefits, employers will need to decide how to best use it in their own learning programs.
Revamped Google Glass 2 Aims More Powerful AR At The Enterprise
ComputerWeekly, May 21st, 2019
Google renews its focus on enterprise augmented reality with the Glass Enterprise Edition 2; it packs a better camera and faster processor.
IT - Operations
16 Best ITSM Tools 2019
IT Business Edge, May 23rd, 2019
ITSM tools are transitioning to being more predictive and preventive as well as cloud-based.
Best Practices For Preparing Your Infrastructure For Machine Learning And AI
Information Management, May 24th, 2019
Machine learning and artificial intelligence are all the buzz, and implementation of ML and AI in organizations is increasing
IT Asset Management Intelligence: What You Don'T Know Will Cost You
Data Center Knowledge, May 23rd, 2019
Once the necessary data is in one system, asset intelligence can be leveraged to serve a number of vital needs.
The Status Of White Box Networking In The Enterprise
SearchNetworking, May 23rd, 2019
Despite the benefits of white box networking, most enterprises are cautious about deployment. Use these five questions to determine when white box implementation is a smart move.
IT - Social Media
10 Important Skills And Traits Your Social Media Manager Will Need
Business 2 Community, May 24th, 2019
A decade ago, the role of a social media manager might not have even existed. Today, however, almost every company is involved in social media one way or another.
IT - Server
The Future Of System Architecture
CIO, May 23rd, 2019
Shifting the focus from deploying systems to reconfiguring existing resources to increase enterprise capability.
IT - Linux
Bringing The Benefits Of Linux Containers To Operational Technology
Linux Journal, May 22nd, 2019
Linux container technology was introduced more than a decade ago and has recently jumped in adoption in IT environments
Suse Enterprise Storage 6 Annouced, May 20th, 2019
Though normally configured as a hybrid solution, Ceph is incredibly flexible
The Document Foundation Releases Libreoffice 6.2.4
The Document Foundation, May 22nd, 2019
LibreOffice 6.2.4 represents the bleeding edge in term of features for open source office suites
HPC Powers Evolution Of Defects For Superconductors
inside HPC, May 24th, 2019
Researchers used the power of artificial intelligence and high-performance supercomputers to introduce and assess the impact of different configurations of defects on the performance of a superconductor
New Blueprint Lays Out Strategic Research Agenda For HPC In Europe
inside HPC, May 24th, 2019
The European ETP4HPC initiative has published a blueprint for the new Strategic Research Agenda for High Performance Computing
IT - DevOps
Six DevOps Misconceptions Debunked
Information Week, May 20th, 2019
The road to DevOps success is littered with myths and misconceptions. Here are the largest potholes you need to avoid.
The Ultimate Guide To Devops: Everything An Enterprise Needs To Know
Information Age, May 20th, 2019
DevOps: the practice that combines software development and IT operations to speed up the delivery lifecycle, while improving quality. Here, we provide the ultimate guide
IT - Cloud
3 Ways To Approach Cloud Bursting
SearchDataCenter, May 22nd, 2019
With different cloud bursting techniques and tools from Amazon, Zerto, VMware and Oracle, admins can bolster cloud connections and efficiently move data in and out of on-prem facilities.
5 Cost Saving Tricks To Reduce AWS Cloud Hosting Bill
Business 2 Community, May 24th, 2019
Mingled among the multitude of reasons to move from on premise hosting to the cloud is often cost savings.
6 Questions To Ask When Comparing Cloud Services In 2019
Among Tech, May 23rd, 2019
These days, it wouldn't be exaggerating to say that your business can achieve essentially anything with the cloud. Over the years, the variety of cloud functionality has flourished
Cloud Transition - 5 Best Practices To Follow
CIO, May 23rd, 2019
Is your business transitioning from on-premises infrastructure to multi-cloud, hybrid cloud, or both? If you answered yes to any of these, you are embarking on the single most significant technology shift your company will face over the next decade
Half Of Businesses Don't Have Skills For Proper Cloud Security
ITProPortal, May 23rd, 2019
Cloud and security need to be considered as parts of the same ecosystem, report suggests.
IT - Wireless
What Is Wi-Fi 6 And Why You're Going To Want It
ZDNet, May 20th, 2019
No individual device on your wireless network may run that much faster, but your total speed will increase
Business Continuity Planning: Surviving Big Outages
Enterprise Storage Forum, May 23rd, 2019
Learn how implementing a business continuity plan (BCP) can safeguard both your business and IT operations from major emergencies
IT - Networks
How Is Service Mesh Architecture Different From SDN And NFV?
SearchNetworking, May 22nd, 2019
Service mesh separates itself from SDN and NFV approaches with its clear focus on managing the communication and forwarding between multiple microservices
A Guide To VPN Troubleshooting- Fix All Your VPN Problems
ITProPortal, May 24th, 2019
VPN has become an essential tool to access the unrestricted world of the internet.
5G As An Enterprise LAN / Wi-Fi Replacement Is A Myth
Disruptive Wireless, May 20th, 2019
There are at least 10 reasons why 5G will not be a viable WLAN (wireless local area network) technology for mainstream enterprise. Despite recent claims to the contrary, it is not an alternative to Wi-Fi in offices, hospitals, apartment blocks or similar locations.
Compare Offerings From Network Analytics Market Leaders
SearchNetworking, May 23rd, 2019
Learn how 10 top network analytics tools compare when it comes to vendor type, deployment mode, specific features and technical support options
IT - IoT
Choosing The Right Model For Maintaining And Enhancing Your IoT Project, May 24th, 2019
Learn more about these two models: Centralized Golden Master and Distributed Build System
Consumer IoT Devices Are Compromising Enterprise Networks
Dark Reading, May 22nd, 2019
While IoT devices continue to multiply, the latest studies show a dangerous lack of visibility into those connected to enterprise networks
Number Of Connected Devices Reached 22 Billion, Where Is The Revenue?
HelpNet Security, May 23rd, 2019
Enterprise IoT remains the leading segment, accounting for more than half of the market, with Mobile/Computing at just over a quarter
Over 90% Of Data Transactions On IoT Devices Are Unencrypted
CSO Online, May 22nd, 2019
A report from Zscaler reveals some troubling facts about the risks posed by network-connected IoT devices
San Diego Makes Strong Bet On IoT, Telematics And Apps
Government Technology, May 22nd, 2019
The city is in the midst of one of the biggest IoT deployments in North America, involving cameras, microphones and sensors, that will help understand how people move through San Diego's streets.
Study: Most Enterprise IoT Transactions Are Unencrypted
Networkworld, May 23rd, 2019
A Zscaler report finds 91.5% of IoT communications within enterprises are in plaintext and so susceptible to interference.
IT - Careers
Never Work With Jerks
Ask The Headhunter, May 20th, 2019
In the May 21, 2019 Ask The Headhunter Newsletter a reader fails to see that the problem is jerks.
10 Things Recruiters Hate About You
The Enterprisers Project, May 21st, 2019
Tech job seekers have plenty of choices right now. But if you pull these moves that drive recruiters crazy, you may burn a bridge you'll need later
Remote Work: Powered By Talent, Enabled By Tech
CIODive, May 21st, 2019
This war for talent is intense. You can't depend solely on one geographic location anymore if you want to scale
Top 14 Data Engineer And Data Architect Certifications
CIO, May 23rd, 2019
Data engineers and data architects are in high demand. Here are the certifications that will give your career an edge
IT - Virtualization
Containers Vs. VMs: What's The Difference?
SearchServerVirtualization, May 23rd, 2019
Containers have rapidly come into focus as a popular option for deploying applications, but they have limitations and are fundamentally different than VMs
Why Enterprises Should Dump Their VMs For Containers
ComputerWeekly, May 23rd, 2019
Kubernetes is five years old and server virtualisation is the new legacy, says Aparna Sinha, director of product management for Kubernetes at Google
IT - Compliance
The Not-Yet United States Of Data Privacy, 1 Year After GDPR
CIODive, May 22nd, 2019
Fewer than 20 states have a data privacy bill in the works, with many breathing their last breaths in committee, dying before making it to the governors' desks.
How To Conduct A Proper GDPR Audit: 4 Key Steps
CSO Online, May 22nd, 2019
Organizations subject to the EU's General Data Protection Regulation should do regular compliance audits. Here are the steps experts say you should take.
For Graham Holdings, GDPR Compliance Was A Breeze
CIODive, May 23rd, 2019
Every year Graham Holdings has a mandatory data inventory, Halota said. It's 'an enormous job but it's really critical to us to know what we have.'
GDPR: Are We There Yet?
ComputerWeekly, May 24th, 2019
A full year after the full implementation of the GDPR, there has not been the severe punitive action expected by many and personal data breaches continue to happen, leaving many wondering if any progress has been made
GDPR And The Cloud
CSO Online, May 23rd, 2019
New protections for consumers provide consumers with added protections to ensure their privacy and prevent issues related to data theft or misuse
IT - Email
Isn't Email Supposed To Be Dead?
ITProPortal, May 21st, 2019
One place email certainly isn't headed? Extinction
2019's Top Email Security Best Practices For Employees
SearchSecurity, May 21st, 2019
Attackers exploit email every day to break into your network, but you can reduce risk for everyone by promoting these email security strategies for employees.
Selecting Enterprise Email Security: Scaling To The Enterprise
Securosis, May 20th, 2019
he first choice is which platform you will build your email security on.
Why Prediction, And Not Detection, Is The Key To Reducing Email Risk
ITProPortal, May 23rd, 2019
Implement a predictive security posture to proactively identify attacks, rapidly respond to threats and minimize business disruption
IT - Big Data
Big Data Challenges Impacting Data-Driven Business Goals
CIO, May 21st, 2019
IT leaders need to understand the opportunities big data presents so they can overcome the various challenges and remain competitive in the growing data-centric economy
Big Data Offers New Solutions For Disaster Mitigation Planning
SmartDataCollective, May 24th, 2019
Big data can help organizations prepare for massive, unexpected disasters that can cost millions of dollars
Data Virtualisation: The Key To Getting The Most From Your Data Lake
ITProPortal, May 20th, 2019
Alberto Pan, CTO at Denodo will be able to look at the potential benefits data virtualisation and provide real, practical advice for companies looking to unlock the potential of machine learning.
How Cities Are Becoming Smarter With Big Data
Business 2 Community, May 23rd, 2019
Cities are growing at alarming speeds as they become highly populated and more urbanized
The Five Commandments Of Big Data Cloud Migration
Information Age, May 21st, 2019
With data cloud migration you can't muscle your way in. Brute doesn't work for moving and maintaining petabytes of data.
IT - Encryption
12 Dark Secrets Of Encryption
CIO, May 23rd, 2019
With data security a key concern across all systems, encryption is increasingly becoming the go-to solution. But encryption may be less of a sure thing than you think.
IT - Developer
From Traditional To Agile Software Development -Changing Culture, Processes, And Architecture
CIO, May 23rd, 2019
Delivering working, tested, and deployable software on a continuous basis delights customers and gives organizations more visibility and adaptability throughout project lifecycles.
Sections in this issue:
click to jump to section