IT News and Events
Sep 2nd, 2019 — Sep 8th, 2019 Generate the Custom HTML Email for this Issue
IT News and Events IT News and Events
Volume 258, Issue 1 << Previous Issue | Next Issue >>
IT - CxO
disable
2020 Budget Planning: Tech Leaders Prioritize Efficiency, Business Outcomes
CIO Dive, September 4th, 2019
Analysts expect global tech investment in 'new tech' initiatives including AI and automation will hit the $1 trillion mark next year
5 Must-Read Harvard Business Review Articles In September
The Enterprisers Project, September 2nd, 2019
Check out these five thought-provoking HBR articles, curated especially for CIOs and IT leaders
An Inside Look At How CISOs Prioritize Budgets & Evaluate Vendors
Dark Reading, September 4th, 2019
n-depth interviews with four market-leading CISOs reveal how they prioritize budgets, measure ROI on security investments, and evaluate new vendors
CISOs Turn To AI, Detection, Response And Education
ComputerWeekly, September 3rd, 2019
Information security leaders are looking to artificial intelligence, better detection and response capabilities and user education in the face of cyber threats, but need more budget, a study shows
Digital Transformation: What Keeps CEOs Awake At Night?
InformationWeek, September 4th, 2019
Here are the top four concerns bugging CEOs and board members about digital makeovers -- and fixes CIOs can apply to mitigate the impact of those worries
The Rise Of The Chief Digital Officer
CIO, September 3rd, 2019
As digital transformations become increasingly customer-centric, organizations are looking for leaders to drive change with the customer in mind. Enter the CDO
IT - Storage
disable
$6.3 Billion In 2Q19 For WW Enterprise External OEM Storage Systems Market - IDC
Storage Newsletter, September 6th, 2019
Vendor revenue in the WW enterprise external OEM storage systems market decreased 0.8% Y/Y to $6.3 billion during 2Q19
HDD Capacity Threshold Reaches 20TB
architectingIT, September 4th, 2019
Less than 12 months ago, we were talking about the release of 15TB drives from Western Digital (WDC)
Securing and Deduplicating the Edge with EdgeFS
By Dmitry Yusupov, Visionary Entrepreneur, Founder / CTO and Storage Software Architect
Data security presents a major challenge of Edge/Fog computing growth. Learn how to overcome issues with the introduction of modern decentralized data layer EdgeFS
IT - Security
disable
'It Takes Restraint': A Seasoned Ciso's Sage Advice For New CISOs
InformationWeek, September 3rd, 2019
Todd Fitzgerald wrote the books on being a chief information security officer. Here he offers tips on what to do and what not to do in the first few months of a new CISO jo
Security Pros Need More And Better Visibility Into Their Cloud Networks
HelpNet Security, September 4th, 2019
In this Help Net Security podcast, Kevin Sheu, VP Product Marketing and Marcus Hartwig, Senior Product Marketing Manager at Vectra AI, discuss the Vectra superhero survey from Black Hat USA 2019
3 Promising Technologies Making An Impact On Cybersecurity
Dark Reading, September 3rd, 2019
The common thread: Each acts as a force multiplier, adding value to every other security technology around it
Supply Chain Security: Five It Strategies For Choosing Vendors Wisely
HelpNet Security, September 5th, 2019
With the proliferation of SaaS solutions, API integrations and cloud computing, virtually everything in the modern enterprise is connected to untold number of outside entities
Cybercriminals Impersonate Chief Exec's Voice With AI Software
Dark Reading, September 3rd, 2019
Scammers leveraged artificial intelligence software to mimic the voice of a chief executive and successfully request $243,000.
What VPN Users Need To Know About DNS Leaks
AmongTech, September 7th, 2019
Technology is constantly evolving and new threats to online privacy are no different. While many people already take precautions such as using VPNs (Virtual Private Networks) to keep their web browsing private, these are not universal solutions and it is still important to stay on top of new threats when they are discovered
Security Pros And 'Black Hats' Agree On Most Tempting Targets
Dark Reading, September 5th, 2019
Malicious actors look for accounts that are springboards to other systems, according to nearly 300 attendees of Black Hat USA
The Future Of Passwords
Business 2 Community, September 3rd, 2019
Why aren't passwords secure enough? Over-use? Lack of updating? Simplicity? Ease of Guessing?
8 Ways To Spot An Insider Threat
InformationWeek, September 6th, 2019
The good news is most insider threats derive from negligence, not malicious intent. The bad news is the frequency of negligence is already ahead of where it was in 2018
IT - CRM
disable
How A Sales Representative Uses Microsoft Dynamics CRM To Convert More Leads Into Opportunities
SWC, September 3rd, 2019
As a sales representative, you will most likely be using the Sales application from your Microsoft Dynamics 365 homepage
Organizations Reap Benefits Of Mobile CRM Apps
SearchCustomerExperience, September 3rd, 2019
Salesforce now offers organizations such as Cornell University the ability to render CRM systems as apps, making it easy to manage students and faculty at a number of colleges
What Is A CRM Model?
Business 2 Community, September 3rd, 2019
Your company has a serious problem. Customers are leaving left and right, taking streams of revenue with them
vBeers-SF
disable
vBeersPlus @ General Provision Downtown Ft. Lauderdale
Wednesday, September 11th, 2019: 6:00 PM to 9:00 PM
vBeersPlus events include sponsorships - recruitment, community, commercial
IT - HR
disable
HR Manager Is One Of The Most Promising Careers
SHRM, September 5th, 2019
The job prospects for HR managers over the next decade are looking strong
TechnologyAdvice Human Resources Software Buyer'S Guide
TechnologyAdvice, September 6th, 2019
The growing human resources (HR) software market is forecasted to reach $10.9 billion by 2023
IT - AI
disable
AI Predictions: How AI Is Transforming Five Key Industries
Information Age, September 4th, 2019
What are the key industries that are ripe for disruption as AI becomes more pervasive? Here, we explore the biggest AI predictions
How To Make A Career Switch Into AI: 8 Tips
The Enterprisers Project, September 5th, 2019
How can you switch from another IT specialty into AI? Experts say there's still time: Try these transition tips to start building an AI career path
Not Worried About Unethical AI? You Should Be
Information Age, September 5th, 2019
What is your organisation's attitude to AI? As the technology becomes more pervasive, the problem of unethical AI must be addressed
What Enterprises Intend To Do With Artificial Intelligence
ZDNet, September 7th, 2019
Survey shows business process automation and customer support are the low-hanging fruit with initial AI rollouts, but many organizations are moving on to tackle data analytics
IT - Humor
disable
Memory-Lane Monday: Write Once, Use Never
ComputerWorld, September 3rd, 2019
Hey, don't worry about it; in a few years, no one will know what a DVD is.
Throwback Thursday: Motivation
ComputerWorld, September 5th, 2019
How about never? Does never work for you?
IT - Technology
disable
Robots As A Service: A Low-Risk Path To Warehouse Automation?
Supply Chain Dive, September 3rd, 2019
RaaS revenues and deployments are rapidly eclipsing those from robot purchases, as end users discover more value in securing robotic solutions rather than just equipment
Usb4 Brings Better Speeds And Compatibility - But Loses The Space In The Name
Tech Crunch, September 4th, 2019
The organizations behind the widely used USB standard have released some new info on the latest iteration of the interface, and it's nothing but good news for consumers
IT - Blockchain
disable
Blockchain Adoption Barriers In Startups And Enterprises
Business 2 Community, September 4th, 2019
Blockchain is a fashionable topic to discuss. Not surprising as the Fourth Industrial Revolution is here, and blockchain adoption is a part of it
Blockchain Bits: Market Forecast, State Initiatives, Cryptocurrency
GCN, September 6th, 2019
While blockchain's ability to secure data is attractive, the technology also requires data-intensive computation and adequate storage for unstructured documents and records
Gartner: Eight Ways Blockchain Can Support Governments
ComputerWeekly, September 4th, 2019
Distributed ledgers are not just limited to finance and smart contracts. Gartner explores how blockchain can tackle government inefficiencies
IT - ERP
disable
Risks And Advantages Of ERP Migration: Monolithic To Serverless Architecture
Jaxenter, September 4th, 2019
According to the New Stack Serverless Survey, more than three-fourths of enterprises are already using or plan to use serverless computing in the coming 18 months.
The 24 Best ERP Solutions For 2019 And Beyond
ERP Solutions Review, September 4th, 2019
The marketplace for Enterprise Resource Planning (ERP) platforms is maturing on a daily basis, getting more and more crowded with excellent software tools for a variety of use cases, verticals, deployment methods and budgets
IT - BI
disable
Here Are 10 Key Benefits Of Business Intelligence Software
MastersInDataScience.org, September 3rd, 2019
Business intelligence tools are essential for companies to stay competitive and maximize revenue streams
Top 10 Bi Data Visualization Tools
CIA, September 5th, 2019
Visual analytics is the core of business intelligence. Here are the tools you need to see through the data.
IT - AR-VR
disable
5 Ways Augmented Reality Could Boost Your Business Today
Business 2 Community, September 5th, 2019
Augmented reality (AR) has the power to turn any passive touch-point - from products to packaging to places - into an interactive digital discovery channel, enabling a direct dialogue with your end-users
IT - Operations
disable
Top 10 Data Center Stories Of The Month: August 2019
Data Center Knowledge, September 2nd, 2019
To make sure you didn't miss anything big, here are the 10 biggest things we wrote about in August
IT - FOSS
disable
LibreOffice 6.3.1 And LibreOffice 6.2.7
The Document Foundation, September 5th, 2019
The Document Foundation announces LibreOffice 6.3.1, the first minor release of the LibreOffice 6.3 family, and LibreOffice 6.2.7, the seventh minor release of the LibreOffice 6.2 family, with many bug fixes and a key security improvement
IT - HPC
disable
Will HPC Centers Say ADIOS To POSIX I/O?
The Next Platform, September 5th, 2019
The widening performance disparity between compute and I/O is not likely to get any better in the fast-approaching exascale era
IT - DevOps
disable
10 Pitfalls To Avoid When Implementing DevOps
opensouce.com, September 5th, 2019
Make your DevOps implementation journey smoother by avoiding the mistakes others have made
The State Of DevOps Report 2019 Is Out
DevOps.com, September 4th, 2019
The Accelerate State of DevOps Report 2019 is out like every other year. Now, let's talk about the key findings of this year's survey
IT - Cloud
disable
Cloud Needs A Modern Data Foundation, Modern Data Needs A Cloud Foundation
ZDNet, September 2nd, 2019
Survey shows that cloud helps accelerate data modernization and transformation efforts. But it needs to be undertaken gradually, with an eye to security and performance
How Much Should Enterprises Worry About Vendor Lock-In In Public Cloud?
Business 2 Community, September 7th, 2019
One of the key drivers to a multi-cloud strategy is the fear of vendor lock-in
How To Build And Maintain A Multi-Cloud Security Strategy
SearchCloudSecurity, September 6th, 2019
When using multiple cloud service providers, it's critical to consider your enterprise's cloud scope and the specifics of each cloud service to maintain security
Multicloud Businesses Face Higher Breach Risk
Dark Reading, September 3rd, 2019
A new report finds 52% of multicloud environments have suffered a breach within the past year, compared with 24% of hybrid cloud users
What Network Tools Are Available For Public Cloud Monitoring?
SearchNetworking, September 5th, 2019
Multi-tenant public cloud monitoring can pose significant challenges. Luckily, some tools can help track these environments and even flag potential security threats
IT - Wireless
disable
Don't Be Blinded By 5G: Why You Can't Neglect Wi-Fi 6
InsiderPro, September 6th, 2019
As important as 5G is for smartphones and other devices, don't overlook an equally important next-generation wireless technology -- Wi-Fi 6
Wi-Fi 6 Is Barely Here, But Wi-Fi 7 Is Already On The Way
CNET, September 3rd, 2019
You'll be at the point where wireless is faster than wired
IT - DR
disable
Good Communication Is A Key Part Of Disaster Response
GCN, September 5th, 2019
The ConversationBehind the scenes during hurricanes and other disasters, scores of public information officers in state and local government agencies are fixed to their screens -- often in 24-hour shifts -- frantically fielding facts and phone calls, rushing to get information to the news media and the public
IT - Networks
disable
4 Steps For A Smooth SDN Installation
SearchDataCenter, September 5th, 2019
Software-defined infrastructure can be tricky to implement. Automation, vendor-supported hardware and skilled developers are essential for smooth updates
5 Reasons Why You Should Never Trust A Free VPN
CNET, September 6th, 2019
Take your privacy and security seriously enough to avoid malware, ad tracking and slow connections
How Client VPN Technologies Will Evolve With AI And Automation
insideHPC, September 3rd, 2019
With help from artificial intelligence and automation, client VPN technologies could innovate the way they handle data flows within hybrid cloud environments
Mellanox Rolls Out New LinkX 200G & 400G Cables & Transceivers
insideHPC, September 3rd, 2019
Mellanox announced new LinkX 100/200/400G cables and transceivers at the China International Optoelectronic Expo (CIOE) September 4th in Shenzhen, China and the European Convention for Optical Communications (ECOC) Sept 21st in Dublin, Ireland
Why SD-WAN Is Taking Over Enterprise Networks
Data Center Knowledge, September 3rd, 2019
The traditional connectivity model doesn't work for today's distributed enterprises
IT - IoT
disable
IoT Data Management Requires Mission-Critical Edge Processing
IoT Agenda, September 3rd, 2019
To get the most out of edge data, IT pros must know how to use machine learning algorithms to designate data to real-time or traditional cloud processes
IoT Security Essentials: Physical, Network, Software
Networkworld, September 3rd, 2019
Internet of things devices present unique security problems due to being spread out, exposed to physical attacks and often lacking processor power
IoT Security Risks Persist; Here's What To Do About Them
SearchSecurity, September 4th, 2019
Nontech manufacturers building IoT devices combined with resource constraints is a recipe for disaster. It's the reality of IoT security issues, and the problem isn't going away.
IT - Careers
disable
Soft Skills: 10 Ways To Hire For Them
The Enterprisers Project, September 4th, 2019
Resumes don't tell you enough about a job candidate's soft skills, such as communication or consensus-building. Use these 10 techniques to evaluate during the interview
IT - Virtualization
disable
Hyper-V vs. VMware Comparison: What Are The Differences?
SearchServerVirtualization, September 3rd, 2019
Hyper-V and VMware are in a perpetual battle for supremacy in the virtualization market. Although the two hypervisors have similar features, capabilities are somewhat different
Oracle VM VirtualBox 6.0.12
Oracle, September 4th, 2019
Oracle VM VirtualBox 6.0.12 release includes improvements and regression fixes for Oracle VM VirtualBox 6.0
Surprise: Next-Generation Virtual Machines Will Help Power Multicloud Computing
SiliconANGLE , September 5th, 2019
Hypervisor technology has been one of the building blocks of cloud computing from the start
IT - Compliance
disable
Can Compliance Definition Really Include Cloud?
ITProToday, September 2nd, 2019
When system architects are establishing compliance definition, they may avoid cloud to avoid risk. But that risk may have been overhyped in the first place. Here's why
It's Not Healthy To Confuse Compliance With Security
InformationWeek, September 5th, 2019
Healthcare organizations should be alarmed by the frequency and severity of cyberattacks. Don't assume you're safe from them just because you're compliant with regulations
IT - Backup
disable
Security Think Tank: Blockchain Is Not For Everyone, So Look Carefully Before You Leap
ComputerWeekly, September 5th, 2019
What are the best and most effective ways information security professionals can use blockchain technology?
Top 100 Cloud Backup For September 2019 - Backup Review
Storage Newsletter, September 3rd, 2019
The top 100 online backup companies are grouped into 4 categories, namely...
IT - Big Data
disable
Can We Stop Doing ETL Yet?
datanami, September 3rd, 2019
Despite the advances we've made in data science and advanced analytics in recent years, many projects still are beholden to a technological holdover from the 1980s
IT - Developer
disable
APIs Are The Next Big SaaS Wave
Tech Crunch, September 6th, 2019
While the software revolution started out slowly, over the past few years it's exploded and the fastest-growing segment to-date has been the shift towards software as a service or SaaS
The Competitive Advantages Of Modern SCMs
DevOps.com, September 3rd, 2019
Source code management (SCM) is not a new concept. It has been in existence since around 1980, when Revision Control System (RCS), one of the first major SCMs, was released
Top Serverless Vendors
Datamation, September 5th, 2019
An in-depth roundup of the top serverless services in the market today, with tips on how to choose the best serverless solution for your cloud use
Why I Use Java
opensouce.com, September 3rd, 2019
There are probably better languages than Java, depending on work requirements. But I haven't seen anything yet to pull me away
Sections in this issue:
click to jump to section