IT News and Events  
November 11th, 2019 — November 17th, 2019
Volume 260, Issue 2
IT - CxO
The Chief Data Officer: The CIO's Newest Ally
CIO, November 11th, 2019

As organizations shift to data-driven strategies, the CDO role is rising. But to succeed as an entity, the CIO and CDO must work in concert - with clear delineations in responsibilities

"Jim Tyo, chief data officer at Nationwide Insurance, has a crystal-clear vision of his role: to help the company optimize the use of its data.

Tyo has 80 associates in the company's Enterprise Data Office to help achieve that mission, with another 40 contactors rounding out the data team.

Yet Tyo is equally clear that his office needs to be well integrated with IT to succeed..."

4 Top Trends Shaping Information Management
Information Management, November 11th, 2019

Before I get into the prevalent trends shaping information management, I would like to first clearly explain what IM is exactly and how it differentiates from data management

"Information management is a program that manages the processes, people and technology in an organization to understand the structure, process and usage of information for management and business intelligence purposes.

On the other hand, data management is a subset of information management. It is the process of obtaining, managing, transforming, sharing, documenting and preserving data..."

Why Cyber-Risk Is A C-Suite Issue
Dark Reading, November 12th, 2019

Organizations realize the scale of cyber-risk but lack counter-actions to build resilience

"In a global study of more than 2,200 organizations across 22 different countries, NTT Security's 2019 Risk:Value research found that cyberattacks (43%), data loss or theft (37%), and attacks on critical infrastructure (35%) - aimed particularly at telecoms and energy networks - concern respondents the most. The survey respondents figured these threats would present a greater risk to their organization over the next 12 months than trade barriers and other critical global issues such as the environment, terrorism, and government failures..."

3 Security And Ethics Considerations For Modern-Day CISOs
SearchSecurity, November 11th, 2019

Many conversations today revolve around security and ethics. A strong CISO voice is crucial to keeping enterprises safe while embracing this critical cultural awakening

"Today's CISO has many demands placed on her: reduce risk, defend budget, dejargonize tech language for the board and the executive team, and separate noise from signal when it comes to vendor claims. All these tasks focus on enterprise assets that need to be protected, from laptops and servers to databases and cloud shares to rapidly expanding IoT environments, data lakes and so forth..."

A 'First 100-Days' Plan For The New CIO
CIO, November 12th, 2019

SAIC CIO Nathan Rogers offers an approach for managing your new CIO job

"When SAIC, the large government technology services provider, acquired Engility, a smaller engineering services firm, Engility CIO Nathan Rogers became CIO of SAIC.

While SAIC's retiring CIO, Bob Fecteau, had built a high performing team, Rogers still faced the huge challenge of integrating two large companies in a short timeframe. 'We had to get people on the same systems quickly,' Rogers says. 'You cannot move on from an 'us and them' culture when you are running two different email systems'..."

How CIOs Can Get Along Better With The CMO
The Enterprisers Project, November 12th, 2019

Historically, CIOs and CMOs have often had an adversarial relationship. In the digital era, it's best to forge a partnership. CIOs share advice on how to build one

"CMOs are now the biggest tech consumers in some organizations, spending more on IT than CIOs themselves. Marketing budgets amount to 11.2 percent of company revenue, according to the 2018-19 Gartner CMO Spend survey, with technology the single biggest area of investment.

Historically, some CIOs and CMOs have butted heads. Some IT leaders have worked with a CMO who complained that IT was too slow, cautious, and bureaucratic to keep up with marketing's demand for new digital capabilities..."

Risk-Based Digital Identity Benefits CIOs, CMOs And Customers
Search CIO, November 12th, 2019

Asking customers to reaffirm their digital identities by sharing private information undermines CX and data security. Instead, use a risk-based approach to digital identity

"Companies understand that providing a great customer experience is essential in this digital age. But a new speed bump threatens to be the undoing of many CX strategies: the ubiquitous requests to authenticate one's digital identity by sharing personal information..."

5 Cybersecurity CISO Priorities For The Future
InformationWeek, November 14th, 2019

Seven chief information security officers share their pain points and two-year spending plans

"Many chief information security officers view their responsibilities through the National Institute of Standards and Technology's (NIST) model of Identify, Protect, Detect, Respond, and Recover. There's been a focus on detecting and responding to endpoint threats over the past few years, yet new priorities are arising: migration to the cloud, new heterogeneous devices, and custom applications, all of which have greatly expanded attack surfaces..."

10 Reasons IT Leaders Fail At Innovation
CIO, November 15th, 2019

Tech leaders have been given an innovation mandate, but many still struggle to build a robust innovation capability. What's holding them back?

"Innovation is an important driver of growth, and many technology leaders aspire to build capabilities that can deliver sustained innovation. But they have a steep hill to climb: A quarter of CIOs who participated in Deloitte's most recent global CIO survey say their innovation capabilities are nonexistent. Only 11 percent assessed their current innovation capabilities as excellent or leading..."

7 Reasons Why Your Business Needs A Password Manager
Fortress Identity, November 11th, 2019

Whether for personal use or for business purposes, password managers can help keep your credentials secure and prevent sensitive information from being leaked

"This holds especially true for businesses that want to keep network security in top shape, and password managers can help to ensure that poor user management will not result in detrimental effects for their information. Here are the top 7 reasons why password managers should be a part of every business plan.

1. Employees do not use strong passwords. The majority of people have a few simplified passwords that they use across all the accounts that they have, both personal and for business purposes. They make these easy to remember and that means easy to guess, which is a dangerous habit. A strong password is considered to be at least 12 characters long and containing a combination of numbers and symbols, and a combination of capitalized and lowercase letters. Luckily, password managers auto generate secure passwords for each individual account and store them securely in the manager..."

The Myths Of Multifactor Authentication
Dark Reading, November 12th, 2019

Organizations without MFA are wide open to attack when employees fall for phishing scams or share passwords. What's holding them back?

"Compromised credentials are a huge threat to companies today. Why? The attacker is actually using valid (that is, stolen but valid) credentials, so why would your antivirus, firewall, and other technologies you might have in place flag anything unusual? Your tools assume people accessing your network are who they say they are..."

Bankers, Here Are Nine Things Hackers Hope You Never Learn
Fortress Identity, November 11th, 2019

In my role as an advisor to financial institutions on mobile biometric authentication, I meet bankers from all over the world

"Most are technologically literate and leverage technology effectively in their operations, marketing, sales, communications, etc. However, many share a blind spot when it comes to their vulnerability to internal and external threats. They are insufficiently aware of:

  • The scale and nature of the dangers they face, internally as well as externally.
  • The latest security solutions available to financial institutions.
  • The ease and economy with which voice biometric authentication can be implemented for mobile devices.

Below, I list nine things all bankers should know about protecting themselves. My goal is motivate you to avoid the half-measure security that criminals now exploit so easily. It's time to turn your institution into a biometric fortress. The tools and expertise you need to accomplish this are ready right now..."

IT - Storage
CQ3 2019 Hard Disk Drive Results
Forbes, November 14th, 2019

Here are some results reported in our latest Digital Storage Technology Newsletter

"Total HDD shipments in CQ3 2019 were up 5.8% from CQ2 2019 (83.1 M units in CQ3 2019 versus 78.5 M units in CQ2 2019) compared with up 1.0% in CQ2 2019 from CQ1 2019, down 11.4% in CQ1 2019 versus CQ4 2018, down 9.7 % in CQ4 2018 compared with CQ3 2018.

Note that Seagate and Western Digital have both changed their release of HDD shipments making it more difficult to figure out their actual unit shipments. WD started with their CQ3 2018 announcements while Seagate starting doing this in CQ1 2017. This has made it more difficult to report actual shipments of various categories of HDDs. Thus, the numbers reported here are our best guess estimates..."

Datacenters Flush With All-Flash Storage
EnterpriseAI, November 11th, 2019

Storage based on all-flash NVM Express arrays is gaining a foothold in enterprise datacenters even as the overall server storage market stumbles

"The datacenter storage market is in the midst of a hangover following a big 2018. IHS Markit reports that global server storage revenue declined 4 percent year-on-year during the second quarter, with unit shipments dropping 10 percent. Overall, the server storage market is expected to contract by 1.5 percent in 2019.

At the same time, the all-flash storage array sector rose a healthy 21 percent over the same quarter last year - despite a second-quarter revenue dip of 1.7 percent. The flash market is being driven in part by a what the analyst defines as 'performance-optimized' storage arrays based on flash NVMe drives..."

IT - Security
2019 Trending As Worst Year On Record For Data Breaches
Information Week, November 13th, 2019

New Risk Based Security report shows data breaches up 33.3% over last year so far

"2019 likely will break a record for the most data breaches and exposed records ever, according to a new report.

There were 5,183 data breaches reported with 7.9 billion records exposed in just the first nine months of this year, according to Risk Based Security, which tracks publicly reported breaches. That's an increase of 33.3% in breaches and 112% in total records over the same period in 2018..."

Phishing Attacks Are Increasingly Sophisticated: Here's How To Stay Safe
IT Security Guru, November 11th, 2019

The days of crude phishing attacks are a thing of the past

"The days of crude phishing attacks, which anyone with a little common sense could avoid falling victim to, are a thing of the past. Today's cybercriminals are savvier than their predecessors, capable of producing spoof emails and websites convincing enough to fool even the most educated eye. While it's easy to feel helpless in the wake of these advances, there are still steps that ordinary internet and email users can take to avoid falling victim to phishing attacks..."

How Container Adoption Affects Container Security
SearchCloudSecurity, November 12th, 2019

Scalability and efficiency make container adoption an attractive option for enterprises today. Learn how containerization has evolved and grown since the release of Docker 1.0 five years ago

"Security pros know October as National Cybersecurity Awareness Month. But October 2019 marked another important event: It was the fifth anniversary of the release of Docker 1.0.

Since Docker was introduced, there has been a tremendous evolution in containers and the containerization ecosystem. Consider, for example, the emergence of container-focused cloud services, the proliferation of orchestration tools to tackle usage at scale, and the explosion of use of container runtimes and container-aware orchestration tools..."

Unreasonable Security Best Practices vs. Good Risk Management
Dark Reading, November 13th, 2019

Perfection is impossible, and pretending otherwise just makes things worse. Instead, make risk-based decisions

"Years ago, I spoke with the risk management leader at a bank where I was consulting. This person was new in the role and was outlining plans for implementing an IT risk management program. The company's program was to be based on the NIST 800 series, which predates the creation of NIST Cybersecurity Framework, and they had worked out their own proprietary risk rating system based on the control catalog in SP 800-53. It was well thought out and the leader had some success in a previous role working with the same solution..."

What You Need To Know About The New OWASP API Security Top 10 List
CSO Online, November 14th, 2019

APIs now account for 40% of the attack surface for all web-enabled apps. OWASP has identified 10 areas where enterprises can lower that risk

"OWASP, the Open Web Application Security Project known for its top 10 list of web application vulnerabilities, published the release candidate version of its API Security Top 10 list at the end of September 2019. It's a good time to pay attention to API security, since some high-profile breaches have involving APIs in recent months -- most notably, at Capital One..."

Evaluating Cyber Risk During The Holiday Season
HelpNet Security, November 15th, 2019

Fears of data loss, identity theft and fraud are leaving American consumers on edge this holiday season, and they're prepared to hold their financial institution responsible for the damages

"This is according to a new study released by Terbium Labs, which found that 68 percent of shoppers would hold their bank at least partly responsible for fraudulent activity, regardless of how the compromise occurred.

Americans are on high alert heading into the busy holiday season, as 66 percent believe they could easily become a victim of fraud, while another 65 percent believe they are at a higher risk of having their financial information exposed as a result of their holiday shopping..."

How Does Your Cyber Resilience Measure Up?
Dark Reading, November 14th, 2019

The security measures companies take today may not be enough for tomorrow's cyber assault, but switching to a proactive, risk-based framework may better protect your organization

"The frequency and sophistication of worldwide cyberattacks continue to surge, with businesses falling victim to a ransomware attacks every 13.275 seconds, according to Cyber Defense Magazine. No agency, company, or organization is immune to the devastation a cyberattack can bring, and although companies are making progress in improving their efforts, they still face a growing number of challenges..."

Wednesday, November 20th, 2019: 5:30 PM to 8:30 PM

Biergarten Boca - Boca Raton

These informal networking/social events provide a relaxed environment to meet with other hands-on IT professionals and promote the growth of IT in South Florida. Come out and connect with other professionals in your industry! vBeers is a great event meant to promote growth of the IT industry here in South Florida.

Register today so you can be a part of this great monthly event! Feel free to invite all of your friends and co workers who work in the IT industry!

We meet in the upstairs lounge where you can take advantage of the $5 burger special and discounted beers!

Hosted by John J. McLaughlin

How People Analytics Informs HR Strategy
Business 2 Community, November 12th, 2019

Let's face it- technology has our brains inundated with unprecedented amounts of information

"As a result, we've developed countless platforms and pieces of technology infrastructure that keep us organized, efficient, and profitable. The advent of technology in the business world combined with its future potential makes this an exciting time for us all. Technology can rapidly access troves of data in seconds, enabling us to make decisions that are much more informed than those of yesteryear..."

Tech Leaders Summit: How To Start Your RPA And AI Journey
Information Age, November 11th, 2019

A lot of organisations already understand the benefits of RPA and AI but find it hard to know how to get started. Who should be involved?

"Should it be driven by the business or IT? What should be automated first?

During a lively panel discussion at Tech Leaders Summit, business leaders, who've embarked on RPA and AI projects of their own, as well as leading analysts, discussed how best to get started with automation..."

The More Data, The Better The AI, Isn't It?
jaxenter, November 12th, 2019

In this session, speaker Michael Kieweg will discuss data and AI and the relationship between the two

"Get comfortable and watch his session from the Machine Learning conference where he discusses how to tackle challenges related to data quality and how to use data for better artificial intelligence performance.

LEVERTON is developing and utilizing Artificial Intelligence to extract key data from corporate and legal documents. With large volumes of data coming from different sources it is necessary to maintain a healthy level of data quality for deep learning algorithms to learn. In this talk, Michael Kieweg will showcase how LEVERTON tackles challenges related to data quality for good AI performance..."

Why Business Leaders Are Short Sighted On AI
ZDNet, November 15th, 2019

A new white paper tracks a big blind spot among business leaders considering implementing artificial intelligence

"Artificial intelligence is one of the most marketed (hyped, you might say) and ill-defined technology categories being packaged and lobbed at those in the enterprise these days. You might think overexposure would lead to fatigue and a healthy dose of skepticism.

Not so, according to original research from IFS, a global enterprise applications company..."

IT - Humor
The Jig Is Up
ComputerWorld, November 11th, 2019

Join the tech workforce for high-voltage adventure!

"It's back 40 years ago, and this pilot fish is working in the repair department of a company that manufactures microwave transmitting equipment for the telecom industry. (But it's 40 years ago, so you all should know who uses this stuff.)..."

Throwback Thursday: Oh, Sorry, Did Someone Sell Off Half Of Your Capacity?
ComputerWorld, November 14th, 2019

And are you sure that that metaphorical pipe is draining FLOODwater?

Back in the day, the company where this pilot fish works has part of its operations on a mainframe - and mostly that's fine.

'The start of the month - running reports from the prior month - was the busiest time,' says fish. 'Fortunately, there was enough capacity that only at month-end did the system hit its limits, and sometimes not even then, if things were spaced out a bit...

IT - Technology
SHAKEN/STIR: Finally! A Solution to Caller ID Spoofing?
Dark Reading, November 12th, 2019

The ubiquitous Caller ID hasn't changed much over the years, but the technology to exploit it has exploded. That may be about to change

"Fraud and abuse in the form of robocalling, and more specifically illegally spoofed calling, is the No. 1 consumer complaint to the Federal Communications Commission (FCC). Robocalls make up nearly half of all phone calls, so frustrated consumers simply don't answer incoming calls and businesses can't get through to customers when they need to reach them..."

IT - Blockchain
Blockchain To Help CBP Track Canadian Energy Imports
GCN, November 12th, 2019

The Department of Homeland Security's Customs and Border Protection is looking adapt a Canadian firm's blockchain application to track oil and natural gas shipments coming into the U.S. over the northern border

"The $182,700 investment from DHS Science and Technology Directorate went to Mavennet Systems, which has built a blockchain-as-a-service platform for Canadian commercial oil markets that allows real-time audits of natural gas trading there.

In adapting the system for use by CBP, DHS said Mavennet will create a generic end-to-end platform the agency can use to track any variety of imported commodities. The platform includes automation and API integration, as well as the ability to adapt to legacy systems, according to DHS..."

Early Lessons On Blockchain: Companies A Long Way From Widespread Adoption
CIODive, November 13th, 2019

Though most blockchain adoption cases at an enterprise level are still in the early stage, there's lessons to be gleaned from their experiences

"In South Korea, a credit card company uses blockchain technology to let its staff and customer base - 23 million altogether - sign on easily and securely to its platform.

Another company, which offers a rewards program for customers, also leverages blockchain to ensure its 9 million daily users can access services.

Powering both platforms is Seongnam, South Korea-based blockchain company Blocko. Both clients saw value in a blockchain solution because it fit the use case, according to Jae Shin, chief marketing officer at Blocko..."

C-Suite Executives Explain Why Virtual Reality Is A Boon For Business
InsiderPro, November 11th, 2019

Virtual reality, augmented reality and the overall field of spatial computing may be more typically seen as topics for academic researchers and those in the entertainment market

"In fact, the technology is being used by businesses today that are finding measurable value deploying it.

During a session here at the recent Connected Enterprise conference, executives at two very different businesses -- a construction company and an online travel site, explained how they use VR today and why they're excited by its potential moving forward..."

The 22 Best Project Management Tools For Business
CIO, November 14th, 2019

Having the right set of tools to tackle analytics, requirements, change, and project progress will help project managers perform at their best

"Top-level project managers are in high demand, thanks to the high-level leadership, knowledge, and capabilities they bring to business projects. But having the right set of tools is also essential to project management success.

Project management tools and templates not only increase team productivity and effectiveness but also prepare the organization for changes brought about by high-impact projects. To perform at their best, project managers need to make the most of tools aimed at business intelligence and analytics, business requirements, change management and project management, as well as a wide array of forms and templates..."

IT - Operations
12 Tips For Dealing With A Manipulative Security Manager
Dark Reading, November 15th, 2019

Don't let yourself be stuck in an unhealthy work environment with a toxic manager who takes advantage of your talent

"In my experience, top security performers love nothing more than to solve problems and improve the state of security where they work. These star professionals give much of themselves to any organization to which they belong. There are good managers who treat this type of exemplary employee in a healthy, constructive manner. There are also more than a few bad managers who use a variety of manipulative techniques to put problem solvers down..."

Compare Offerings From 3 Major Desktop-As-A-Service Providers
SearchVirtualDesktop, November 11th, 2019

Three desktop-as-a-service providers, Citrix, VMware and Microsoft, all offer virtual desktops as a part of their cloud services. Delve into the pros and cons of their offerings.

"Desktop-as-a-service offerings can deliver virtual desktops with fewer management tasks for IT, but there are a variety of routes an organization can take to get there.

Citrix, VMware and Microsoft all offer managed desktop services as part of their cloud portfolios, but it's not always clear what distinguishes one offering from another.

There's no simple formula for choosing between the three major desktop-as-a-service providers. Much depends on what systems the organization is already running, and their specific needs and budget. For organizations that are already invested in Citrix or VMware technologies, the decision will likely be easier..."

IT - Database
How To Choose A Database For Your Application
InfoWorld, November 11th, 2019

From performance to programmability, the right database makes all the difference. Here are 12 key questions to help guide your selection

"Picking the 'right' database can often be critical to the success of an application. Rather than taking the advice of vendors or using a database because you already happen to have it, it's useful to consider the fundamental purpose and requirements of the data store.

These are the most important questions to ask when you are picking a database:..."

IT - Server
Converged vs. Hyper-Converged Infrastructure Requirements
SearchConvergedInfrastructure, November 13th, 2019

Companies considering convergence should compare the features, benefits and limitations of CI and HCI, and look at which workloads drive organizations to data center convergence

"Converged vs. hyper-converged infrastructure: That's the decision many IT leaders make as they look for ways to reduce the cost and complexity of optimizing and maintaining their data centers.

Traditional data centers are often composed of components sourced from a wide variety vendors, which can create deployment, management, support and compatibility issues. But with converged infrastructure (CI), organizations get a standardized, prequalified, turnkey, rack-based appliance packaged and sold by a single vendor..."

IT - DevOps
Achieving Organizational Change Through Scaled DevOps, November 14th, 2019

The rapid pace of technological change has had a major impact on customer expectation, forcing IT decision-makers to adopt agile processes to ensure the continual delivery of innovation

"This has led to the mass adoption of DevOps practices, with 77% of organizations indicating they rely on DevOps to deploy software, or plan to, in the near future.

DevOps is a key ingredient for building and deploying better software faster. It enables developers to spend less time on onerous tasks and more time creating new features that drive competitive advantage and elevate customer experience..."

How DevOps Is Driving The Demand For Cross-Platform Tools, November 15th, 2019

The demands of modern business mean companies today want choice when it comes to the technology they deploy

"Gone are the days when they rigidly used a single environment-instead they want to be able to use the best of technology from vendors and be sure it will work across environments seamlessly.

Whether it's on-premises or the cloud, Linux or Windows, SQL Server or Oracle databases or even at the development tool level, they want their people to be able to use the Integrated Development Environment (IDE) they're most at home with, yet still be able to share third party tools and resources. This requirement for greater choice is being driven by three key factors..."

The 20 Best DevOps Podcasts, November 15th, 2019

The truth is podcasting is hard and it takes considerable work to create something special

"The low barrier of entry intrigue is a double-edged sword, making it harder for good podcasts to get noticed in the incessant wave of new shows coming to market every day.

Fortunately, there are podcast fanatics out there who can help curate the signal from the noise to ultimately recommend the best podcasts. I've worked in the DevOps space for awhile now, most notably at AppDynamics and Sumo Logic, and also run Discover Pods-a site about podcasts.

Without further adieu, here are my picks for best DevOps podcasts..."

The Time Has Come For An Engineering Approach To DevOps, November 11th, 2019

Do you want to know how to do DevOps?

"Are you doing DevOps but not satisfied with the results you are getting? DevOps is complex. It does not come with a prescription, installation guide, user's manual or maintenance manual. It doesn't even have a standard definition. How can anyone expect to get good results with DevOps without clear and definitive guidance? There are plenty of books that describe different aspects of DevOps and customer user stories, but up until now there has not been a book that frames DevOps as an engineering problem with a step-by-step engineering solution and a clear list of recommended engineering practices to guide implementers..."

IT - Cloud
IT Professionals Deem Hybrid Cloud As Most Secure
HelpNet Security, November 15th, 2019

Enterprises plan to aggressively shift investment to hybrid cloud architectures, with respondents reporting steady and substantial hybrid deployment plans over the next five years, according to a Nutanix survey

"The vast majority of 2019 survey respondents (85%) selected hybrid cloud as their ideal IT operating model.

Vanson Bourne surveyed 2,650 IT decision-makers in 24 countries around the world about where they're running their business applications today, where they plan to run them in the future, what their cloud challenges are, and how their cloud initiatives stack up against other IT projects and priorities..."

Public Cloud Revenue Set To Grow 17% In 2020, According To Gartner
Information Age, November 12th, 2019

While Saas will remain the largest market segment, IaaS secures highest growth in 2020 due to data centre consolidation

"Gartner has today released its forecast for the worldwide public cloud services market which is set to grow 17% in 2020 to total $266.4 billion, up from $227.billion in 2019..."

'At this point, cloud adoption is mainstream,' said Sid Nag, research vice president at Gartner.

Taking Responsibility For Security In The Cloud
ComputerWeekly, November 12th, 2019

From accidental leaks to full-on data breaches, maintaining security across cloud services is becoming a headache for enterprises

"What questions should organisations be asking of their cloud service provider and, ultimately, whose responsibility is cloud security anyway?

With the increasing prevalence of cloud services, as well as the growing threat of data breaches, organisations are becoming more aware of the risks associated with poor security infrastructure. However, these threats can be mitigated by having the appropriate security protocols in place, through negotiations with the cloud provider and utilising a cloud access security broker (CASB)..."

Why Ocean Spray's CTO Hit Pause On Cloud Migration
CIODive, November 13th, 2019

Jamie Head expected things to break technologically. His job was to make sure the rest of the business understood that, too

"In his first year at Ocean Spray, Jamie Head is taking the cranberry co-op from the bog to the cloud.

Ocean Spray named Head CIO in July 2018 and he has since laid the organizational groundwork the co-op needed for innovation for the next two or three years. He wanted to bring Ocean Spray's IT out of the backoffice.

Now, equipped with a title change - chief technology and digital officer - Head wants to take risks..."

IT - Networks
How Can SD-WAN And Edge Computing Services Work Together?
SearchNetworking, November 13th, 2019

Organizations may want to consider the effect SD-WAN and edge computing could have when combined. Make sure to consider all options before choosing a combination model, however

"Software-defined WAN, or SD-WAN, and edge computing can work together in two main ways: SD-WAN can route traffic to edge resources, and SD-WAN and edge computing can share infrastructure.

First, SD-WAN services can selectively direct application traffic to the resources that provide the best available service. These destinations can include resources in on-site or nearby edge facilities..."

5G: What IT Leaders Need To Know
The Enterprisers Project, November 14th, 2019

5G networks promise fast speeds and low latency: That's a big deal in an era when data is gold

"Let's explore what 5G means for AI, IoT, and other applications, as well as your notions about networking and bandwidth...

The basics of 5G start simply: 5G stands for the telecom providers' fifth-generation technology. You already knew that, or perhaps don't need to know that - the semantics aren't what will impact your business. You also already know 5G's overarching promise: It will be faster than previous generations..."

SD-WAN Explained In 15 Key Terms And Phrases
HPE News, November 15th, 2019

This SD-WAN glossary delves into the various capabilities, technologies and components that encompass SD-WAN, explained with 15 concise definitions

"One way to understand software-defined WAN is to split the phrase in two: software-defined and WAN. This technology takes software-defined concepts and builds these capabilities into an organization's existing WAN infrastructure..."

The Top 10 Network Security Best Practices To Implement Today
SearchNetworking, November 15th, 2019

Even as security techniques improve, attackers are becoming more adept. Learn about 10 network security best practices and how they can keep your network secure

"Security response technologies are improving, thanks in part to innovations in areas such as machine learning and automation. However, cybercriminals are equally adept at exploiting technical advances for their own interests. This makes it crucial for enterprises to have all their bases covered with best practices to ensure they have the appropriate policies, methodologies and procedures in place to maintain a strong defense against threats..."

IT - IoT
IoT In 2020: The Awkward Teenage Years
Networkworld, November 15th, 2019

The internet of things will see more growth in 2020, along with more growing pains - security, lack of complete solutions

"Much of the hyperbole around the Internet of Things isn't really hyperbole anymore - the instrumentation of everything from cars to combine harvesters to factories is just a fact of life these days. IoT's here to stay.

Yet despite the explosive growth - one widely cited prediction from Gartner says that the number of enterprise and automotive IoT endpoints will reach 5.8 billion in 2020 - the IoT market's ability to address its known flaws and complications has progressed at a far more pedestrian pace. That means ongoing security woes and a lack of complete solutions are most of what can be safely predicted for the coming year..."

IT - Careers
8 Cybersecurity Jobs That Require Project Management Skills
Information Management, November 14th, 2019

Juggling a number of tasks and making sure the end results occur on time and on budget are just a few of the tasks an effective project manager takes on

"Project management is an important part of IT; without plans, goals and problem-solving strategies, initiatives and new programs would be virtually impossible to complete.

Effective project management is even more important in the cybersecurity field, where lack of organization or planning could mean a compromise of secure systems..."

IT - Virtualization
Full Virtualization Vs. Paravirtualization: What Are The Key Differences?
SearchServerVirtualization, November 12th, 2019

Full virtualization and paravirtualization both enable hardware resource abstraction, but the two technologies differ when it comes to isolation levels

"The idea behind virtualization is to abstract underlying hardware resources from the software that uses those resources. A hypervisor is a software tool installed on the host system to provide this layer of abstraction. Once a hypervisor is installed, OSes and applications interact with the virtualized resources abstracted by the hypervisor -- not the physical resources of the actual host computer..."

IT - Backup
8 Backup & Recovery Questions To Ask Yourself
Information Week, November 14th, 2019

Don't wait until after a disaster, DDoS, or ransomware attack to learn just how good your backups really are

"They're the first questions you might be asked in the heat of a disaster, DDoS, or ransomware attack: How soon before we're back up? How good are our backups? Have the wrong answer to those questions, and it will feel like getting kicked while you're down.

Good backups are essential to business continuity, but how do you know yours are 'good'? And how do you know they'll be ready when you need them? Start by finding answers to the following eight questions..."

IT - Big Data
10 Data And Analytics Trends For 2020
InformationWeek, November 12th, 2019

Data and analytics are permeating all parts of the digital enterprise. Here are the trends you need to watch in the years ahead

"Data and analytics have gained traction in organizations, driven by the promise of big data a few years ago and the potential of machine learning and other types of artificial intelligence more recently. Even as many enterprises seemed to be stalled in their production AI plans, they are still making those plans, and know they are crucial for success in the years to come..."

10 Strategic Trends That Will Drive Data Management In 2020
HealthData Management, November 12th, 2019

The New Year is only weeks away, but it will mark major changes in how organizations manage and use data

"Research firm Gartner has identified the 10 top strategic technology trends that will affect how organizations manage data. Gartner defines a strategic technology trend as one with substantial disruptive potential that is beginning to break out of an emerging state into broader impact and use, or which is rapidly growing with a high degree of volatility, expected to reach a tipping point over the next five years..."

TOP 10 insideBIGDATA Articles for October 2019
insideBIGDATA, November 12th, 2019

In this continuing regular feature, we give all our valued readers a monthly heads-up for the top 10 most viewed articles appearing on insideBIGDATA

"We've heard from many of our followers that this feature will enable them to catch up with important news and features flowing across our many channels. We're happy to oblige! We understand that busy big data professionals can't check the site everyday..."

IT - Encryption
Don't Rush Quantum-Proof Encryption, Warns NSA Research Director
Nextgov, November 15th, 2019

Quantum computers could crack the codes that secure the world's digital information

"Racing to a solution could create more threats, according to Dr. Deborah Frincke...

In 1994, an American mathematician named Peter Shor discovered a way to crack the codes that banks, e-commerce platforms and intelligence agencies use to secure their digital information. His technique, dubbed Shor's algorithm, drastically shortened the time it took to find the prime numbers that underlie public-key cryptography, making codes that typically take thousands of years to break solvable in a matter of months.

But there was a catch: Shor's algorithm could only run on a quantum computer, and those didn't exist yet..."

IT - Developer
What Makes A Great Software Developer?
AmongTech, November 12th, 2019

Software experts are of great demand nowadays and the list of the main requirements that a developer must confirm to is getting bigger each year

"Professional qualities necessary for successful soft developer

As we all know software developers are experts in creating computer programs that help organizations, equipment and machines to operate more effectively. These magicians of our time are engaged in companies that deal in computer systems design or related services. With the level of our digital involvement in everyday life these programmers are extremely popular and employment of software developers is growing with each year..."