IT News and Events  
July 8th, 2019 — July 14th, 2019
Volume 256, Issue 2
IT - CxO
3 Walls IT Leaders Must Take Down
The Enterprisers Project, July 10th, 2019

"The supportive IT services that delighted businesses yesterday seldom spark the same delight today. Companies just expect IT to deliver quality technology components and services at an ever-decreasing cost per unit: That's considered 'hygiene.' Now they want IT to create new business value. But many CIOs and IT groups make three operational mistakes that build walls between the IT organization and the rest of the business. Those walls must be broken down. .."

5 Questions All CIOs Must Ask When Picking The Right Technology
CIO, July 11th, 2019

"Today's CIOs are the architects of their organization's digital transformations, helping build the technology infrastructure needed to support every aspect of a business.

Helping choose the right customer experience management (CXM) technology has become part of the CIO's mandate, with the head of IT increasingly on the hook for enabling customer-facing teams to deliver fluid and personalized customer experiences across all channels and mediums..."

Data As The New Oil: The Danger Behind The Mantra
The Enterprisers Project, July 11th, 2019

"Not a week goes by that I don't hear a tech pundit, analyst, or CIO say 'data is the new oil.' This overused mantra suggests that data is a commodity that can become extremely valuable once refined. Many technologists have used that phrase with little knowledge of where it originated - I know I wasn't aware of its origin.

It turns out the phrase is attributed to Clive Humby, a British mathematician who helped create British retailer Tesco's Clubcard loyalty program. Humby quipped, 'Data is the new oil. It's valuable, but if unrefined it cannot really be used. It has to be changed into gas, plastic, chemicals, etc., to create a valuable entity that drives profitable activity; so must data be broken down, analyzed for it to have value'..."

How CISOs Become Business Leaders
CSO Online, July 11th, 2019

"What's the difference between a company that has a CISO and one where the IT security manager is the highest ranked security professional? Some might say a CISO has a broader range of responsibilities, but the real answer is leadership.

A recent ESG study found that communication and leadership skills were the two most important qualities of a successful CISO. Technical acumen was far less important in the eyes of the respondents than the ability to get the right messages across..."

More Than 2 Million Cyber Incidents In 2018 Created $45 Billion In Losses
HelpNet Security, July 11th, 2019

"The data shows that cybercriminals are getting better at monetizing their activities, with OTA estimating the more than 2 million cyber incidents in 2018 resulted in over $45 billion in losses, with the actual numbers expected to be much higher as many cyber incidents are never reported..."

"While it's tempting to celebrate a decreasing number of breaches overall, the findings of our report are grim," said Jeff Wilbur, technical director of the Internet Society's Online Trust Alliance...

Worldwide IT Spending To Grow 0.6% In 2019, Says Gartner
Information Age, July 10th, 2019

"Worldwide IT spending is projected to total $3.74tn in 2019, an increase of 0.6% from 2018, according to the latest forecast by Gartner, Inc.

This is slightly down from the previous quarter's forecast of 1.1% growth..."

"Despite uncertainty fuelled by recession rumours, Brexit, trade wars and tariffs, we expect IT spending to remain flat in 2019," said John-David Lovelock, research vice president at Gartner. "While there is great variation in growth rates at the country level, virtually all countries tracked by Gartner will see growth in 2019. Despite the ongoing tariff war, North America IT spending is forecast to grow 3.7% in 2019 and IT spending in China is expected to grow 2.8%."

According to Gartner, although an economic turndown is unlikely for either 2019 or 2020, the risk is currently high enough to warrant preparation and planning..."

IT - Storage
78 Million Hdds Shipped Worldwide In 2Q19, As In 1Q19, July 12th, 2019

"In its SDAS: HDD Information Service, Preliminary CQ1 '19 Quarterly Update, published on July 9, 2019, analyst company Trendfocus, Inc. wrote:

  • 3.5″ Desktop/CE HDDs: Total desktop/CE HDD shipments (including 3.5″ external HDDs) remained steady in CQ2 at around 24.8 million units shipped, reflecting stable desktop and CE demand..."

Read of for details.

How NVMe-oF Advantages Are Transforming Storage
SearchStorage, July 13th, 2019

"Whether your organization uses Fibre Channel, remote direct memory access or TCP, NVMe-oF is now a networking option.

NVMe-oF lets an NVMe host communicate with a network-connected NVMe storage device, mapping commands and responses to the host's shared memory. With it, NVMe-based devices can be accessed over greater distances, and more devices can be looped in. One NVMe-oF advantage is it makes distributed data centers with all the capabilities of NVMe a reality.

Read on to find out about NVMe-oF advantages, how they're changing storage and what's important when deploying the technology..."

IT - Security
Attackers Turn The Tables On Incident Response Strategies
Search Security, July 8th, 2019

"If you're looking at cybersecurity as a matter of detecting threats and squashing them, you're missing the point. The opposition -- cyberattackers -- treats defenders' incident response strategies as avoidable obstacles rather than impermeable blockades, and successful defenders will always be on the alert for malicious actors who have developed their own cybersecurity incident response strategies..."

Must-Have Features In A Modern Network Security Architecture
CSO Online, July 8th, 2019

"Early in my high-tech career, Sun Microsystems was thought of as a computing visionary. Sun coined an intriguing company's tag line early on: 'The network is the computer.' What did that mean? It meant IT infrastructure was linked together in a loosely-coupled architecture, tied together via networking technologies such as Ethernet cables and the TCP/IP protocol. Thus, it was critical to engineer the network correctly to maximize network availability, performance, and business benefits.

Yes, things have changed since the early 1990s. Some networks live in the cloud, some are virtual, and some rely on application-to-application connections, but networks still connect IT systems together in one way or another..."

7 Hot Cybersecurity Trends To Be Highlighted At Black Hat
Dark Reading, July 8th, 2019

'Black Hat USA is fast approaching. With the full conference schedule online, now is the time for security pros to dive in and plan out their paths to exploring a wide range of learning opportunities. As with years past, the conference will feature sessions about new zero-day vulnerabilities, research that stretches the bounds of what's breakable in emerging technology, and new methods of defending systems in the ever-evolving tech world..."

Building A Threat Intelligence Framework: Here's How
SearchSecurity, July 9th, 2019

"Cyber threat intelligence has become a critical tool for organizations trying to defend their networks. A 2019 survey from the cybersecurity-focused SANS Institute found that 72% of survey respondents are either consuming or producing cyber threat intelligence (CTI). Only 8% say they don't use it and have no plans to start. Yet how well organizations leverage CTI is a different story. The same survey found that only 30% of responding organizations have documented their CTI requirements while 37% have only ad hoc provisions. That leaves one-third of responding organizations without any defined CTI standards. How should organizations build a threat intelligence framework? TechTarget put that question, and others, to Tom Hegel, a security researcher with AT&T Cybersecurity.

Here are his thoughts..."

Instant Messaging Platforms Are Here To Stay But Are They Secure Enough?
Information Age, July 9th, 2019

"Unless you've been living under a rock, chances are you'll have noticed that business communications are shifting away from email to a diverse range of instant messaging platforms. These days, business departments are being pressured to either tolerate employees conducting business with consumer chat solutions, such as WhatsApp, or empower them by scaling an instant messaging platform across the enterprise..."

Why Identity Is The Foundation Of Security
HelpNet Security, July 8th, 2019

"Maybe they also had video cameras to monitor the premises.

Those days are long gone. Guarding the perimeter is no longer possible because there is no perimeter.

Though some information may still be hosted on in-house servers, much of it has migrated to the cloud. According to a recent Flexera survey, 84% of enterprises have a multi-cloud strategy, with public cloud adoption surpassing private cloud adoption..."

How Organizations Are Bridging The Cyber-Risk Management Gap
CSO Online, July 12th, 2019

"Cyber-risk management is more difficult today than it was two years ago. So say 74% of cybersecurity professionals in a recent ESG research survey. Respondents point to an expanding attack surface, an increase in software vulnerabilities, and more sophisticated tactics, techniques, and procedures (TTPs) from cyber-adversaries. (Note: I am an ESG employee.)

OK, so there's a cyber-risk management gap at most organizations. What are they going to do about it? The research indicates that:..."

CRM Is 30 And Salespersons Still Hate It
CustomerThink, July 9th, 2019

"We have seen 'CRM' systems start as point solutions that morphed into suites - and back to what is called 'best-of-breed' to witness the rebirth of the suite.

We have seen CRM as a strategy, as a tool. There has been social CRM, and more recently we have seen customer engagement management (CEM), even customer experience management (CXM). Regardless of the name and scope, the goal has always been to help businesses and their representatives on one side and customers on the other side to build lasting and profitable relationships.

Amazingly, many users, especially salespersons, still hate CRM.


How Does Your CRM Manage Different Opportunity Types?
Business 2 Community, July 8th, 2019

"If your organization is involved in B2B or transactional B2C sales, a 'one size fits all' approach might possibly work.

But if you are involved in complex B2B sales, and if you are selling to a mixture of new business and existing customers, you'll almost certainly have a variety of different opportunity types.

These opportunity types will inevitably have different critical success factors, different degrees of difficulty, different average sales cycles, different average win rates and so on.

And if your opportunity management strategies fail to reflect these differences, coming up with accurate forecasts will be nigh-on impossible."

Study: Mobile CRM Market Will Grow 11% To $15B Worldwide
Mobile Marketer, July 12th, 2019

"Mobile CRM services growth is coming as digitized workforces make real-time access to critical information a necessity to foster streamlined operations, Future Markets Insights said. Businesses are placing customer satisfaction at the top of their priority list and are seeking insights for their sales efforts. 'CRM on demand' is a significant trend in the mobile CRM market, as businesses turn to cloud-based suites that promise flexibility and scalability, per the report..."

Turn Your CRM Into The Tool Your Sellers Need
Destination CRM, July 8th, 2019

"It's easy to see why: CRM systems weren't created with sellers' needs in mind, and they're often viewed as time-consuming data repositories that take valuable time away from selling.

But we've entered a new era where CRM systems can collect richer data and, with the right tools, afford deeper insights to drive sales enablement. Today's CRMs capture details that relate to-and create incentives around-the underlying key factor that drives better sales results: seller behavior.

With the right changes in both utilization and management, CRM systems can become a powerful data-driven weapon in the battle for new and legacy clients. For every dollar a company spends on CRM, it earns nearly $9 in returns, and CRM can increase sales by up to 29 percent..."

vBeers @ Boca (Biergarten Boca)
Wednesday, July 17th, 2019: 5:30 PM to 8:30 PM

Biergarten Boca - Boca Raton

These informal networking/social events provide a relaxed environment to meet with other hands-on IT professionals and promote the growth of IT in South Florida. Come out and connect with other professionals in your industry! vBeers is a great event meant to promote growth of the IT industry here in South Florida. Register today so you can be a part of this great monthly event! Feel free to invite all of your friends and co workers who work in the IT industry!

Enjoy the $5 burger and fries special! We meet in the upstairs lounge.

Hosted by John J. McLaughlin

AI And Big Data Go Perfectly Together - Sometimes
SearchEnterpriseAI, July 9th, 2019

"In January, my colleagues at Dun & Bradstreet issued the results of a recent survey, which found that 40% of polled organizations are adding more jobs as a result of deploying AI. This finding appears to counter fears that AI adoption will reduce the availability of human jobs, with only eight of the 100 survey respondents saying that their organizations are cutting jobs due to AI..."

AI Projects Likely To Face Challenges, Failures As Bandwagon Fills Up, Surveys Say
ZDNet, July 8th, 2019

"Two-thirds of enterprises using artificial intelligence are trying to develop a so-called AI-first culture, but only 25% of them have a broad strategy, according to an IDC survey.

The IDC survey rhymes with what we've found in our TechRepublic Premium surveys and ZDNet deep dives. The reality is AI is a boardroom buzzword and critical technology, but disconnects abound. Half of the enterprises say AI is a priority for their companies, according to IDC..."

AI Smokes 5 Poker Champs At A Time In No-Limit Hold'Em With 'Relentless Consistency'
Tech Crunch, July 11th, 2019

"An evolution of the last AI agent to flummox poker pros individually is now decisively beating them in championship-style six-person games.

As documented in a paper published in the journal Science today, the CMU/Facebook collaboration they call Pluribus reliably beats five professional poker players in the same game, or one pro pitted against five independent copies of itself. It's a major leap forward in capability for the machines, and amazingly is also far more efficient than previous agents, as well..."

Conversational AI: Myth Versus Reality
Forbes, July 8th, 2019

"In recent years, all the excitement around chatbots and AI assistants, in particular, have brought with them a fair share of misinformation as well -- from their capabilities to their development to the bottom line.

Unfortunately, that's to be expected. I see it every day at our agency, which specializes in conversational AI, when chatting with prospective clients: There's a huge gap between the expectations and the actionable, concrete promises of AI when it comes to its real-world business applications..."

Gartner Releases First-Ever Magic Quadrant For RPA Software
Information Age, July 11th, 2019

"Given that RPA is being adopted so rapidly by enterprises, it's estimated to reach $2.4bn by 2024, some might say it's about time Gartner released their first-ever Magic Quadrant for RPA software.

According to Gartner, while, as a market, RPA is still relatively small, with a total revenue of slightly less than $850m in 2018, it's the fastest-growing software subsegment that it officially tracks, with year-over-year growth of more than 63% in 2018..."

IDC Report Shows AI Is A Priority, But Few Enterprises Are Ready
siliconAngle, July 8th, 2019

"That's according to a new International Data Corp. survey of 2,473 organizations in May that was released today. It also found that painless AI deployments are elusive for the vast majority of enterprises and that a significant number of such projects are likely to fail.

The survey findings were published in IDC's Artificial Intelligence Global Adoption Trends & Strategies report, which focuses on enterprises' AI strategies and culture, as well as the implementation challenges they face and their 'AI data readiness initiatives.'

IT - Humor
Not Even Remotely Right
ComputerWorld, July 10th, 2019

"With just minutes to go before a big meeting in a remote office, the attendees are frantically looking for the long HDMI cable that's supposed to be connected to the big flat-screen TV in the conference room. They need it so they can hook up a laptop to show a presentation, they tell pilot fish, who's on the phone back at the main office. Fish knows the remote location well enough to be able to guide the users to various IT stashes, where they might find a replacement. When that doesn't pan out, fish gets them to cannibalize another setup for its HDMI cable..."

Throwback Thursday: Hardly Worth Mentioning
ComputerWorld, July 11th, 2019

"This pilot fish does some freelance IT work, and one of his regular clients comes to him with a strange problem..."

"A Linux server at his customer's remote location had a Samba mount of a Windows server's share," says fish. "Every day at around 9:30 a.m., like clockwork, the Linux server would stop responding to any requests on this mounted directory.

"I couldn't figure it out; nothing was being output on the debug logs. I was about ready to build a new Linux kernel to see if that would fix the problem...."

IT - Technology
Are DVD And Blu-Ray Players Still Worth Buying?
reviewgeek, July 10th, 2019

"Well, if you want a DVD or Blu-Ray player, you might as well buy one. You don't need anyone's permission. But if you're undecided, you might need some reasons why a disc player is worth your hard-earned cash. Lucky for you, there are still plenty of good reasons to buy a disc player.

A Novel Concept: Owning What You Pay for

As physical media slips into the abyss, we're starting to run into an interesting problem. You can't own movies anymore..."

How Does Facial Recognition Work?
How-To Geek, July 11th, 2019

"Your face is like a fingerprint, and the technology behind facial recognition is complex.

As with any new technology, there are downsides to facial recognition. These downsides are becoming more apparent as the military, the police, advertisers, and deep fake creators, find devious new ways to take advantage of facial recognition software.

Now, more than ever, it's essential for people to understand how facial recognition works. It's also important to know the limitations of facial recognition and how it will develop in the future..."

Literally Rings Our Bell: Scotch Eggheads Take First-Ever Snap Of Quantum Entanglement
The Register, July 13th, 2019

"Physicists at the University of Glasgow, Scotland, have produced the first-ever image of a strong form of quantum entanglement, known as Bell entanglement.

To achieve this, they devised a system which fires a stream of entangled photons from a quantum source of light at 'non-conventional objects' - which change the phase of the photons as they pass through.

Researchers then set up a super-sensitive camera capable of detecting single photons which would only take an image when it caught sight of both the photon and its entangled 'twin', creating a visible record of entanglement..."

What Is A Deepfake, And Should I Be Concerned?
How-To Geek, July 8th, 2019

"The product is a deepfake, an impersonation that can be used for memes, misinformation, or porn.

One look at the Nicholas Cage deepfakes or Jordan Peele's deepfake PSA makes it clear that we're dealing with strange new technology. These examples, while relatively harmless, raise questions about the future. Can we trust video and audio? Can we hold people accountable for their onscreen actions? Are we ready for deepfakes?..."

IT - Blockchain
Blockchain For Developers - What's Behind The Hype?
jaxenter, July 10th, 2019

"Within the next ten years, blockchain technologies will be a given in our software projects in the same way databases are today. In this session, Ingo Rammer presents the technical foundations of current blockchain technologies - without any hype or fancy crypto currencies which border more on tulip mania than on serious software engineering. You will learn about the basic elements, types and operations modes of today's blockchains; about the fundamental differences between public and private/permissioned networks..."

How Will Blockchain Change The Healthcare Industry?
TechWorm, July 9th, 2019

"It's been more than 10 years since blockchain was first presented by Satoshi Nakamoto in the original whitepaper, although the crypto hype - which brought the technology into the spotlight - intensified at a later stage of that journey.

Despite being around for a significant amount of time, blockchain remains an incomprehensible, mythical technology in the public eye. Mainstream institutions and enterprises tend to perceive blockchain as an immature phenomenon, whose benefits are abstract and inapplicable - however, upon closer inspection, this generalization does not hold true..."

The Top 8 Problems With Blockchain
ComputerWorld, July 8th, 2019

"While blockchain holds tremendous potential for creating new financial, supply chain and digital identity systems, it's often erroneously seen as a panacea for business problems.

The myriad of pilots and proofs of concept by large corporations and government agencies are showing real promise, but those projects don't always lead to obvious business cases that justify doing something differently. Sometimes a tried and true technology like a relational database can perform the task much more efficiently than a distributed ledger based on peer-to-peer technology that will require complex governance and rules..."

What Blockchain Can And Can't Do For Security
CSO Online, July 11th, 2019

"I recently heard yet another blockchain expert who was supposed to razzle dazzle a computer IT audience with the promise of blockchain. Usually, I hate these events, but I was a guest speaker and couldn't slip out of the room. Imagine my surprise and relief when this speaker, whose job is to gin up interest in blockchain, didn't over-sell it. In fact, she said, 'Blockchain may not be the right technology for you'..."

Howard Dresner Talks Business Intelligence Trends
SearchBusinessAnalytics, July 12th, 2019

"Howard Dresner, president and founder of Dresner Advisory Services, has seen business intelligence trends come and go.

Recently, there's been a wave of consolidation with Salesforce acquiring Tableau, Google purchasing Looker, and Qlik buying up both Podium and Attunity. But consolidation is nothing new, according to Dresner, who noted that some companies start with the specific purpose of finding an eventual buyer and that a new cycle of mergers and acquisitions comes every few of years..."

The Direction Of Business Intelligence Is Changing To Forward
SearchBusinessAnalytics, July 8th, 2019

"The direction of business intelligence is changing.

Data analysis -- and the technology that fuels it -- has long been rear-facing, looking back at what already happened. But the next wave of BI platforms will not simply examine what's already happened to hopefully reveal why; based on the intelligence it's gathered, it will be able to look forward to predict what will happen next, according to analysts and industry insiders.

Not only that, but based on a user's past data queries, today's analytics tools will offer suggestions and ask and answer questions a user may never have even thought to posit..."

AR And VR In Retail: Do Shoppers Buy The Hype?
Business 2 Community, July 12th, 2019

"Virtual reality (VR) is projected to generate $1.8 billion for retail and marketing by 2022 and its baby cousin augmented reality (AR) already hit $3 billion in 2018. With ecommerce poised to become mobile AR's largest revenue stream, 32% of brands and retailers plan to use AR or VR within 3 years and 45% believe AR and VR has the most potential to amplify their customer experience..."

7 Project Management Types And When To Use Them
Project Smart, July 8th, 2019

"Without the right project management methodology, a project can slow to a crawl, run into numerous roadblocks, or go off the rails completely and never see the finish line. Picking the wrong project management methodology is a lot like putting the wrong fuel in a car - even if the engine starts, you're not going to get very far..."

How To Choose A Project Management Framework In 4 Easy Steps
Business 2 Community, July 8th, 2019

"But sometimes it seems as if there are as many project management frameworks as there are projects. Add to that the fact that each framework or methodology has its own set of guidelines and prescribed method for working from kickoff to completion and, understandably, choosing the right one can be a challenge. But if you follow the steps we've laid out below, making a decision will be much easier.

Step 1. Look at project scope and size..."

IT - Operations
Infrastructure Monitoring: Challenges And Best Practices
Datamation, July 8th, 2019

"Infrastructure monitoring covers an array of uses and issues, from network optimization to diagnostics to intrusion detection. Infrastructure monitoring can tell you if a router is down, a server is running at an unusual utilization, and with the right security, it can also spot an intruder siphoning off company data.

Infrastructure monitoring enables infrastructure management but the two are different. Infrastructure management is the remedial steps you take in response to the findings from your monitoring tools. Infrastructure monitoring in the constant checking of the various elements of your IT platform, from your in-house data center to your private cloud to your public cloud..."

Transform Your IT Help Desk
InformationWeek, July 9th, 2019

"In a survey conducted a couple years ago by Green Elephant, a management consulting and user satisfaction survey company, 42% of respondents said that their help desk personnel were lacking in courtesy..."

"When people contacted the help desk, they were made to feel that they were interrupting," said Simon Chapleau, Green Elephant's CEO and founder. "CIOs and help desk managers have to ask themselves, 'Are we doing 80% of a service without following through? Why? And, instead of helping, are we making things worse?'..."

10 Top Metadata Management Tools
Datamation, July 10th, 2019

"Metadata management solutions play a key role in managing data for organizations of all shapes and sizes, particularly in the cloud computing era. The need for a framework to aggregate and manage diverse sources of Big Data and data analytics - and extract the maximum value from it - is indisputable. Metadata management is designed to address this task. It provides powerful tools that put information assets to work more effectively - including ratcheting up governance and compliance while reducing risk..."

A Lawyer's Guide To Cyber Insurance: 4 Basic Tips
Dark Reading, July 12th, 2019

"These days, it seems that everyone has heard a cyber insurance horror story: a catastrophic cyber event followed by a swift denial of cyber insurance coverage. At a time when all companies are beginning to think in terms of cyber resilience, cyber insurance is an important part of any company's cyber preparedness. As outside counsel, I've spent significant time reviewing cyber policies. Below are my top tips to consider when looking at your cyber insurance coverage..."

Gartner: Companies Shied Away From Data Center Spending In 2019
CIODive, July 11th, 2019

"The numbers from the recent report indicate a complex market in a state of transition, one where the cloud continues to exert influence over spending decisions.

Up to now, execs have had a 'yes, and' mentality, said Lovelock. Managers had been more open to experimenting with new technology while still maintaining their existing platforms..."

MTTR is Dead, Long Live CIRT, July 12th, 2019

"The game is changing for the IT ops community, which means the rules of the past make less and less sense. Organizations need accurate, understandable, and actionable metrics in the right context to measure operations performance and drive critical business transformation.

The more customers use modern tools and the more variation in the types of incidents they manage, the less sense it makes to smash all those different incidents into one bucket to compute an average resolution time that will represent ops performance, which is what IT has been doing for a long time..."

Separating Fact From Fiction With 9 Costly Data Center Myths
Information Management, July 12th, 2019

"So where else can you reduce costs if it already feels like you've trimmed your resources to the bone? Take a hard look at these common misconceptions, all of which can end up costing your data center big money that would be better spent elsewhere..."

IT - Server
Colocation Facilities Buck The Cloud-Data-Center Trend
Networkworld, July 8th, 2019

"Data center workloads are moving but not only to the cloud. Increasingly, they are shifting to colocation facilities as an alternative to privately owned data centers.

What is colocation?

A colocation facility or colo is a data center in which a business can rent space for servers and other computing hardware that they purchase but that the colo provider manages.

The colo company provides the building, cooling, power, bandwidth and physical security. Space is leased by the rack, cabinet, cage or room. Many colos started out as managed services and continue to offer those specialized services..."

9 Open Source Password Managers To Secure Yourself With
The FOSS Post, July 10th, 2019

"Without the master password, no one can access those credentials (username, password..).

The program would allow you to add/remove/modify records of your credentials per website/URL. You can think of it as an encrypted vault to store your sensitive information, and the master password is the key to open that vault.

Why Do you Need a Password Manager?

People use password managers so that they don't have to remember all the usernames/passwords of the websites they visit. Instead, they can just remember 1 password, and then access all the other passwords whenever they need..."

Open-Source Peer-To-Peer File Synchronization Tool Syncthing 1.2.0 Released
Linux Uprising, July 11th, 2019

"Syncthing, an open source continuous file synchronization tool, had a new release yesterday. The new Syncthing 1.2.0 adds QUIC with NAT traversal as a new transport protocol, fixes some bugs, and enables automatic error reporting.

Syncthing is a free, open-source peer-to-peer file synchronization application written in Go, which implements its own open Block Exchange Protocol. The application, which is available for Windows, Mac, Linux, Android, Solaris, Darwin and BSD, can sync files between devices on a local network, or between remote devices over the Internet.

The app is both private and secure. None of your data is ever store anywhere else other than your own computers (no central server); all communication is secured using TSL and authenticated using a strong cryptographic certificate. Basically, it can replace Dropbox and other similar services with something decentralized, where your data is your data alone..."

What's New In HPC Research: Traffic Simulation, Performance Variations, Scheduling & More
HPCWire, July 11th, 2019

"Power consumption is a major hurdle on the road the exascale. In this dissertation, Stephanie Labasan of the University of Oregon focuses on power consumption by visualization and analysis applications, which tend to be more data-intensive than traditional HPC applications. She examines power/performance tradeoffs for popular algorithms under different configurations, demonstrating that additional performance can be gained by redistributing power based on predicted performance..."

IT - DevOps
How DevOps Training And Certification Benefits The Team, July 8th, 2019

"Cisco's move demonstrates a trend by organizations that provide training and certification to place more value on the practical aspects of educating technology professionals - which, in turn, should have a major impact on those looking to build DevOps teams.

"Advances in network technologies have enabled new applications and business models - converged IP networks enabled voice over IP, 3G networks enabled mobile applications and 4G networks enabled mobile video," said Susie Wee, senior vice president and CTO of DevNet at Cisco Systems..."

Certifications For DevOps Engineers, July 12th, 2019

"DevOps teams appreciate using DevOps processes, especially in multi- and hybrid cloud infrastructures, for many reasons. For one thing, DevOps breaks down barriers and enables agile software development and continuous delivery of IT operations. It is also popular in enterprises because it helps accelerate business outcomes through digital transformation..."

Top DevOps Challenges At Does19, July 11th, 2019

"I wanted to examine these at global events, asking the same question.

I was GamingWorks' booth boy at the event, which gave me a chance to ask a lot of delegates visiting the stand.

Here is a summary of what they said, with my commentary based on what I have picked up on my travels as The IT Paradigmologist..."

IT - Cloud
4 Critical Considerations: Shifting It Infrastructure To Public Cloud
CIODive, July 8th, 2019

"Moving a legacy IT to a public cloud infrastructure offers many benefits: 1) cost savings, 2) improved performance and flexibility, and 3) access to capabilities the enterprise cannot build internally.

However, to realize these benefits, enterprises must change the way they use compute and storage resources.

Running legacy infrastructure is like walking knee-deep in the sea at low tide. As the tide comes in, one has to learn to swim to move effectively and survive in this new environment..."'

6 Reasons Every Organization Needs Cloud Security
CSO Online, July 9th, 2019

"Research shows that organizations are moving systems and data to the cloud in rising numbers. Security when working in the cloud is just as important as in on-premises environments, but relies on a shared security responsibility model to mitigate against cyber threats. Read on for six reasons organizations around the world need cloud security - and how pre-hardened virtual images can help..."

As Public Cloud Adoption Grows, New Drawbacks Discovered
SearchDataBackup, July 10th, 2019

"Public cloud adoption is proving to be more costly for some companies than they expected.

A recent survey conducted by U.K.-based tech research company Vanson Bourne asked 900 IT leaders if the public cloud has delivered on all of their organizations' expected benefits. Only 32.2% of respondents said all their expectations were met, while 58.1% said some expected benefits came to fruition and 9.6% said only a few of their expected benefits were achieved. The remaining 0.1% said they saw no benefit to public cloud adoption at all..."

Cloud Security And Risk Mitigation
Dark Reading, July 9th, 2019

"The cloud certainly offers advantages, but as with any large-scale deployment, the cloud can also offer unforeseen challenges. The concept of the cloud just being 'someone else's data center' makes me cringe because it assumes you're relinquishing security responsibility because 'someone else will take care of it.'

Yes, cloud systems, networks, and applications are not physically located within your control, but security responsibility and risk mitigation are. Cloud infrastructure providers allow a great deal of control in terms of how you set up that environment, what you put there, how you protect your data, and how you monitor that environment. Managing risk throughout that environment and providing alignment with your existing security framework is what's most important..."

Cloud Services - Build, Buy Or Fork?
architectingIT, July 11th, 2019

"Storage services in public cloud have been a busy area as traditional vendors work with cloud service providers to deliver value-add storage solutions. Looking wider afield, we've also seen CSPs using open source to deliver database platforms, although that hasn't proved popular with some. So, should CSPs build, buy or fork to deliver the next wave of new services and applications in the cloud?..."

How To Deal With The On-Premises vs. Cloud Challenge
SearchWindowsServer, July 9th, 2019

"For some administrators, the cloud is not a novelty. It's critical to their organization. Then, there's you, the lone on-premises holdout.

With all the hype about cloud and Microsoft's strong push to get IT to use Azure for services and workloads, it might seem like you are the only one in favor of remaining in the data center in the great on-premises vs. cloud debate. The truth is the cloud isn't meant for everything. While it's difficult to find a workload not supported by the cloud, that doesn't mean everything needs to move there..."

The Hybrid Cloud Arena Hits An Inflection Point
wikibon, July 12th, 2019

"True private clouds are those in which performance is consistently fast and efficient, regardless of whether an enterprise's workloads run on-premised or in public clouds. Whether you move those workloads into one or more public clouds, keep them entirely on-premises or partition them across several clouds, they should perform so well that your users see no degradation in performance..."

Tips For Migrating And Managing Data Workloads In The Cloud, July 11th, 2019

"The cloud is a more scalable, more flexible, more available and possibly less expensive solution for storing and processing data.

What is not always obvious is the how of moving data workloads to the cloud. In several key respects, cloud-based data workloads are fundamentally different than those hosted on-premises.

Understanding those differences is critical for moving data workloads to the cloud effectively. While it's true that the cloud offers a variety of benefits for hosting data workloads, actually realizing those benefits requires a plan for managing data effectively once it is in the cloud.

Let's take a look at what that entails..."

IT - Wireless
RRFM: Wireless Broadband Alliance Squeezes Out 40-Page Ode To The Joy Of Wi-Fi 6
The Register, July 11th, 2019

"The Wireless Broadband Alliance (WBA) has released guidelines for engineers who will have to implement Wi-Fi 6, meaning the advent of the 802.11ax standard is truly upon us - despite the fact it is not expected to be officially ratified until late 2019.

Wi-Fi 6 involves different propagation and coverage density characteristics than its predecessor, and offers better support for mesh networks, which means IT departments will have to adapt their deployment strategies..."

IT - Networks
Problem: Complex Networks Getting Harder To Secure
Network Computing, July 9th, 2019

"Public scrutiny of every security breach does a lot for the revenue streams of cyber security companies. It increases public awareness and puts pressure on businesses. But, does it really do anything to address the underlying issue of securing increasingly complex networks?

The expanded attack surface of a modern distributed network or a business undergoing digital transformation forms an atmosphere that's tailor-made for malicious activity. Previous to an attack, hackers consider the complexity of a system. That's because the wider the range of possible targets, the easier it is to find undetected vulnerabilities. It also makes successful penetration more likely, and reduces the risk of being caught to almost zero..."

SD-WAN In Play: How Software-Defined Solves Core Business Challenges
ComputerWeekly, July 12th, 2019

"Over the past few years, as software-defined networking (SDN) becomes a more established part of the network owner's toolbox, much of the early interest has surrounded software-defined wide area networks (SD-WANs).

SD-WANs use SDN to automate and prioritise traffic routing between enterprise sites and datacentres, either by creating a transport-agnostic virtual overlay that sits on top of the user's preferred network infrastructure, or running as an 'as-a-service' option..."

Understanding SD-WAN Progress In 2019
Network Computing, July 10th, 2019

"We know about wide area networks (WAN) that connect users to applications and move data over long distances by establishing connectivity among enterprise branches spanning across geographical locations.

Imagine a manual process of launching a new analytics application and configuring the WAN infrastructure for the application to be accessible to all users of enterprises. Admins would need to applying software updates to physical resources as well as business applications. They'd also have the tedious task of configuring all routers and network devices and testing the application. There also would be the need to apply new network policies and orchestrate all nodes to support all business applications..."

IT - IoT
Global IoT Market Projected To Reach $1,111.3 Billion By 2026
HelpNet Security, July 12th, 2019

"Fortune Business Insights in a report, titled 'Global Internet of Things (IoT) market: Global market analysis, insights and forecast, 2019-2026' states that IoT technology holds significant potential in the ICT sector.

As per the report, the global market was valued at $190.0 Bn in the year 2018 and is anticipated to reach $1111.3 Bn by 2026. The analysts in the report predict that the global market will expand at a ferocious CAGR of 24.7% throughout the forecast years..."

IT - Careers
Don't Subcontract Your Job Choices
Ask The Headhunter, July 8th, 2019

In the July 9, 2019 Ask The Headhunter Newsletter a reader says all the job-search tools are mind boggling. What delivers the best job choices?


"I can't decide whether to change employers or try for an internal move. I haven't had to search for a new job in over a decade. The number of 'tools' being marketed is mind boggling! Job sites, coaches, intelligent agents (really?), video resumes, and my favorite, services that use 'big data' to match me to the perfect job. I tried one service that sends jobs to my mobile, but it's spam. Can you recommend a few of the very best services to try?..."

Sysadmin vs SRE: What's The Difference?, July 9th, 2019

"In the IT world, there has always been a pull between generalist and specialist. The stereotypical sysadmin falls in the generalist category 99 times out of 100. The site reliability engineer (SRE) role is specialized, however, and grew out of the needs of one of the first companies to know real scale: Google. Ultimately, these two roles have the same goal for the applications whose infrastructure they operate: providing a good experience for the applications' consumers. Yet, these roles have drastically different starting points..."

7 IT Salary And Hiring Trends For 2019
CIO, July 12th, 2019

"When it comes to IT, change is a constant. Thanks to a wide range of maturing technologies and the threat of digital disruption, the pace of change in IT has accelerated - even in just the past year. But one facet of IT remains the same: that IT organizations continue to struggle to find enough talent to meet demand.

That talent gap puts pressure on IT hiring practices and on organizations' ability to offer competitive salaries in a tight talent market. But emerging trends from the Robert Half 2019 Salary Guide suggest that organizations are adapting and finding ways to fill skills gaps, even if they can't lure the top tech talent available..."

Cybersecurity Skills Shortage Prompts New Hiring Approach
SearchSecurity, July 12th, 2019

"It's been called a tech pipeline: a recruitment path for graduates of computer science or national security, both traditionally male-dominated disciplines, into the cybersecurity workforce. This pipeline is one reason why the cybersecurity industry is so homogenous in terms of diverse backgrounds.

When hiring managers choose from a pool of candidates who share similar backgrounds, it's natural that the end result is not representative of a wide range of experiences and educations. Sometimes these limits are taken for granted by leadership in charge of hiring. It is almost a given that candidates for cybersecurity positions should come from computer science or IT educational backgrounds. But by taking the blinders off and considering people with nontraditional backgrounds, some veteran security professionals hope to diversify their teams in an effort to combat diverse threats..."

Retailers Engineer New Ways To Recruit And Retain It Talent
ComputerWeekly, July 11th, 2019

"June was a month of celebration for the UK's technology industry, with London Tech Week shining a light on much of what is good and innovative about the sector.

Figures from the Office for National Statistics showed there are 100,000 more people in UK digital jobs than this time last year, and employment minister Alok Sharma waxed lyrical about 'the UK's powerhouse digital sector'.

There was also recognition from a global technology behemoth that London is a hotbed of tech talent, with Facebook announcing plans to create 500 jobs at an engineering hub in the capital's Soho district later this year..."

The Future Of Work: 6 Things To Look Forward To
Business 2 Community, July 8th, 2019

"It's a difficult question to answer, considering the constant changes in workforce demands and advancements in HR technology. And according to a recent employee engagement survey, only 28 percent of respondents said their company focuses on employee engagement and 20 percent said they don't regularly measure their employee engagement. This leaves a lot of room for improvement. Here's a quick look into what we can expect in the future of work:..."

Building A Personal Brand That Shines
Business 2 Community, July 10th, 2019

"The first time I heard it, I didn't really understand what they meant by that. Myself as a brand? I was unsure. As time went on, I heard personal branding being talked about more and more, but didn't know much about it or how to build a personal brand, so what exactly is it? Personal branding is how you market yourself and your career as a brand, in other words, your personal brand is your reputation. As a result, how you market yourself is a building block to your career. The reactions people feel when they hear your name, good or bad, help portray your image to them. Are you someone that never follows up with people?..."

How To Teach Software Engineering Students About The Enterprise, July 10th, 2019

"In this opinion article, you will find a set of suggestions for the inclusion of enterprise technology into software engineering courses. This piece goes through the difficulties that students face and proposes simplifications successfully used in the past. The continual advancement of enterprise technologies leads to a simplifying of the inclusion process in education..."

Should Recruiters Still Rely On Job Boards In 2019?
Business 2 Community, July 11th, 2019

"Job boards made their way into the job market more than 20 years ago! These frequently used tools have been through the highs and lows of hiring, including the recession. With the flood of digital transformation into the HR space, are job boards rolling with the punches or becoming the punchline of a 'back in my day' joke?

Dive into the debate on whether or not job boards will reign supreme or fall to their deaths:..."

IT - Virtualization
Container Training: How To Teach IT Teams About Containers
Container Journal, July 12th, 2019

"When it comes to educating IT professionals about containers, perhaps the most important guidance to follow is to focus on teaching concepts, not tools.

That's because the tools that IT teams use to work with containers change constantly. Utilities such as the Docker CLI evolve. Container runtimes rise and fall in popularity. Cloud-based container services come and go.

So, while it's important for engineers to learn to use whichever specific tools they need to work with containers in a given context, the primary goal of container training should be to communicate the core concepts of containerization, rather than teaching the mechanics of particular tools.

Toward that end, here are the main concepts that container training should cover:..."

IT - Compliance
How To Ensure Cloud Compliance
Datamation, July 12th, 2019

"Cloud compliance ensures that cloud computing services meet the compliance requirements of enterprise customers. However, enterprises adopting cloud services should not assume that every cloud company necessarily meets the organization's unique requirements because compliance-related service offerings vary.

Data transfer, storage, backup, retrieval, and access necessitate cloud compliance. While IT tends to be in charge of implementing compliance, other functions or formal departments may (and probably should) be involved. This involvement includes decision-making, monitoring and audits, governance, security, data protection, risk management and legal..."

Security Think Tank: Benefits Of GDPR Compliance
ComputerWeekly, July 9th, 2019

"A full year after the General Data Protection Regulation (DGPR) came into full force, many companies still have a lot of work to do in meeting its compliance requirements.

Perhaps those companies are prepared to risk paying any levied fine - up to 4% of global turnover - should they be subject to an investigation by the Information Commissioner's Office (ICO), rather than put the required effort into compliance..."

You Can't ignore GFPR In Customer Service
ZDNet, July 11th, 2019

"Many organizations, particularly in North America, think that the EU's General Data Protection Regulation (GDPR) doesn't apply to them. On May 25, 2018, the day the GDPR went into effect, I happened to be in Canada doing an in-person workshop with a large financial services client. In a session about contact center trends, I mentioned GDPR -- only to be greeted with blank stares and "What's that?" from the room. On the day of implementation!..."

IT - Email
Is Your Email The Weakest Link?
Business 2 Community, July 13th, 2019

Your information can also be compromised by malware, allowing spoofed websites access to collect your login credentials. Furthermore, phishing attacks are categorized into: credential harvesting, extortion, malware, and spear phishing.

1 in every 99 emails is a phishing attack, and in a 5 day work week, this amounts to nearly 5 phishing emails per employee. With 30% of phishing emails making it past default security, businesses could be receiving daily attacks and not know it. In fact, from 2013 to 2016, cyberattacks cost businesses over $5 billion worldwide and from 2016 to 2017, phishing attacks increased by 65%.

Although 83% of people have received phishing attacks, 64% of infosec professionals are targeted by spear phishing, and 35% of professionals don't even know what "phishing" means. Today, a phishing attack on a midsize business can cost an average of $1.6 million. It is common for consumers to stop using a business following a security breach. Saying this, phishing can not only lead to a damaged business reputation, but also decreased productivity and a loss of proprietary data.

IT - Backup
10 Top Cloud Backup Services For Enterprises
Datamation, July 8th, 2019

"Clearly, cloud computing plays a critical role in backup for enterprises. Today's enterprises face the daily risk of ransomware, cyberattacks and natural disasters - as well as the common occurrence of accidentally deleted files. As a result, a robust cloud backup procedure is a must. And with the competitive prices from many cloud companies, online backup offers enterprises an easy way to comply with the 3-2-1 backup rule.

The 3-2-1 rule is a simple shorthand for making sure you are complying with industry best practices for cloud backups:.."

Best Cloud Backup Services 2019
Yahoo!, July 10th, 2019

"Both your PC and your local backup drive could be lost at the same time to theft, flood or fire.

Cloud-backup services, also known as online-backup services, help you avoid such data disasters. They copy your valuable information to an offsite repository that never goes offline and is available from anywhere, preventing catastrophe.

Based on more than 40 hours of testing, our top pick among cloud-backup services is IDrive ($13.90 for the first year for Tom's Guide readers), which backs up an unlimited number of PCs, Macs, smartphones and tablets for a reasonable price. IDrive is the best choice if you have multiple computers and phones to back up..."

IT - Big Data
5 Big Data Vulnerabilities You Could Be Overlooking
insideBIGDATA, July 12th, 2019

"The elevated risk is just a byproduct of digital-heavy and internet-reliant operations in the modern world. Few organizations still maintain a local or private data system, with most opting to take advantage of the cloud.

Although there are many reasons for this, the most pertinent is the always-on and mobile-friendly benefits of cloud technologies. In addition, there's an opportunity for organizations to take a step back and allow cloud providers to manage the more complex aspects of a network, including security, maintenance and more..."

Cloud Cost Implications Of The 5 V's Of Big Data
SearchCloudComputing, July 12th, 2019

"Enterprises increasingly use the cloud for big data analytics. These platforms provide scalable alternatives that can save money compared to on-premises systems, but only if they're used properly.

Cost controls can be a problem for companies of all sizes and experience levels, even those well versed in cloud computing. That's why it's essential for users to understand cloud analytics and the five V's of big data: volume, variety, velocity, veracity and value. From there, they must learn to spend wisely to maximize the ROI..."

How To Use Big Data To Deliver Optimized Customer Experiences
SmartDataCollective, July 9th, 2019

Business success begins and ends with customer experience. According to recent studies, 90 percent of buyers would gladly spend more fora better customer experience. That's exactly why understanding what an improved experience means for customers is so important.

When you are doing research, it is important to use web analytics. Web analytics tools can give a lot of insights that will help you serve customers more dependably. You may need to learn what is web analytics before proceeding..."