IT News and Events  
March 16th, 2020 — March 22nd, 2020
Volume 264, Issue 3
 
 
 
 
IT - CxO
5 Ways To Tick Off A CISO
CIO, March 16th, 2020

As a venture capitalist that invests solely in seed stage cybersecurity entrepreneurs, I often ask myself what keeps CISOs up at night to inform which gaps the next round of enterprise security products needs to address

"YL Ventures Managing Partner Yoav Leitersdorf sat down with cybersecurity powerhouses Pete Bodine, Managing Director at AllegisCyber Capital, Mickey Boodaei, CEO & Founder at Transmit Security, Dino Boukouris, Founding Director at Momentum Cyber, Dawn-Marie Hutchinson, CISO at GSK, Jay Leek, Managing Director at ClearSky, Richard Rushing, CISO at Motorola Mobility, and Oren Yunger, VP at GGV Capital to discuss why security vendors keep CISOs up at night. However, a lot of the answers now seem to lie in mending the risks and occasional damage rendered by existing vendors and products..."
more


COVID-19: Three Technology Areas That CIOs Must Address
ComputerWeekly, March 17th, 2020

CIOs will need to consider the IT measures that will be needed to support their organisations as the government ramps up its response to the coronavirus

"With employees working from home to limit the spread of the Covid-19 coronavirus, analyst Gartner has urged CIOs to ensure that everyone who can work from home is able to do so.

The Gartner report, Coronavirus (Covid-19) outbreak: short- and long-term actions for CIOs, recommends that IT departments ensure remote working is fully supported..."
more


69% Of CIOs Believe COVID-19 Will Significantly Impact Business
CIO, March 18th, 2020

CIO India survey reveals that while most CIOs expect an adverse impact on business, the majority believe that businesses will return to normalcy within 3 months

"CIO India's 'Business Continuity Amid COVID-19' conducted between 9-11 March polled Enterprise IT leaders from 109 organizations across the country to access their assessment of the Coronavirus on Business and the measures they are taking to counter it.

The survey reveals that on average CIOs across India see COVID-19 having an impact magnitude of 5.5 (on a scale of 1-10) but this varies across sectors.The survey reveals that on average CIOs across India see COVID-19 having an impact magnitude of 5.5 (on a scale of 1-10) but this varies across sectors..."
more


Everyone Wants To Be More Secure - As Long As It Isn't An Inconvenience
CIO Dive, March 19th, 2020

The following is a guest article from Marc Mazur, research specialist at Info-Tech Research Group. He covers research on security operations, security strategy, ransomware, insider threat, and zero trus

"We're long overdue for a sea change in our approach to digital security. Making this change a reality largely depends on how willing we are - as individuals and organizations - to rethink priorities.

That might be easier said than done..."
more


How CIOs Can Move From Technology Expert To Business Strategist
Information Age, March 19th, 2020

Andy Ross, co-founder and MD at Gravity 9, explores how CIOs can move from being a technology expert to a business strategist

"As the lines between business and IT priorities start to blur, the role of the CIO is rapidly evolving from technology expert to business strategist. As a result, they have become a key driving force behind digital innovation, helping their organisations to progress from digital transformation ideation to reality..."
more


14 Ways CIOs Can Show Leadership During The COVID-19 Crisis
Insider Pro, March 19th, 2020

What steps should CIOs be taking to help their organizations immediately weather this crisis? Fourteen CIOs share their thoughts

"Last week, in an informal poll by analyst Dion Hinchcliffe, 71 percent of CIOs agreed that the impact of Coronavirus was top of mind. Les Ottolenghi, CIO of Caesars, said, 'At the moment, my top two concerns are coronavirus and the possibility of economic downturn because of the virus.'

Stan Bush, CIO at VA Midwest Healthcare Network, said, 'Unfortunately, all we are doing is trying to protect the most at risk and slow its rate of spread to not overcome medical infrastructure. Once it's inside your borders it's almost impossible to stop without truly draconian measures.' We're clearly starting to see that happen in cities across the country..."
more


Navigating The Pandemic
CIO, March 18th, 2020

Nearly every technology company - and almost every business - is desperately determining how to use its arsenal of technology to combat the increasingly severe disruption caused by coronavirus

"In an industry obsessed with disruption, suddenly, everything has been turned on its head.

Reimagining processes and software and infrastructure to satisfy some McKinsey-driven mandate has screeched to a halt. Instead, nearly every tech company - and almost every business - is desperately determining how to use its arsenal of technology to combat the stunningly severe disruption caused by the coronavirus pandemic..."
more


IT - MFA
A Spike In Home Workers Raises Mfa Resilience Questions
Forrester, March 17th, 2020

In the midst of the coronavirus pandemic, many businesses are asking, or mandating, that office-based employees work from home

"Millions of employees who have been logging in from workstations on corporate networks are now logging in from home or elsewhere on public networks. Stronger authentication, and VPNs, that used to be required for a subset of employees at any given time now become the point of entry for your entire workforce. So what happens if your multifactor authentication (MFA) provider's infrastructure goes down? For organizations that deal with personally identifiable information (PII) and other sensitive information, having remote workers log in with only a username/password, even over VPN, is not acceptable. A critical piece of any MFA platform service is a high-availability configuration to ensure that authentication requests are processed if the infrastructure fails or parts of the network are overloaded..."
more


Best Security Keys In 2020: Hardware-Based Two-Factor Authentication For Online Protection
ZDNet, March 17th, 2020

While robust passwords go a long way to securing your valuable online accounts, hardware-based two-factor authentication takes that security to the next level

"Being sensible when it comes to passwords is important, and a crucial step to securing your online life. However, some of your online accounts -- for example, your Google Account or Dropbox -- might be so important and contain such a wealth of information that you might want to take additional steps to protect it.

And there's no better way to secure your online accounts than to use hardware-based two-factor authentication (2FA). Security keys are easy to use, put an end to phishing attacks, cheap, and are less hassle and much more secure than SMS-based two-factor authentication. And the good news these days is that you can get security keys in a variety of formats, from USB-A and USB-C, Lightning for iPhone users, and even keys that use Bluetooth..."
more


Multi-Factor Authentication: What Is It And Why Do You Need It?
Business 2 Community, March 18th, 2020

Traditional password-and-username authentication can leave users vulnerable

"In 2010 Christopher Chaney, a celebrity obsessed cyber-stalker, got hold of a number of celebrity emails. Using data gleaned from social media and Wikipedia, he successfully guessed the passwords to over 50 personal email accounts belonging to famous women, including Scarlett Johansson, Mila Kunis, and Christina Aguilera. He had access to these accounts for almost a year, and he was responsible for posting nude photos of Scarlett Johanssen and several non-celebrity women. He has since been sentenced to 10 years in jail..."
more


IT - Storage
4 Causes Of SSD Failure And How To Deal With Them
SearchStorage, March 19th, 2020

Although NVMe SSDs are a highly reliable storage technology, they are still prone to occasional failure. Here are some best practices to keep your SSDs humming along

"Compared to hard drives, SSDs are remarkably reliable; yet, no storage technology is perfect. Even the latest NVMe SSDs are susceptible to a sudden or gradual breakdown.

Knowing how to spot the signs of an imminent SSD failure, as well as understanding how to troubleshoot a malfunctioning SSD, can mark the difference between permanent data loss and a trouble-free recovery. Like any storage device, an NVMe SSD will eventually fail; the only variable is when. Unlike hard drives, SSDs can't send an audible warning that something may be going wrong. Yet, while the SSD may be dead, all is not necessarily lost.

Here's a look at four leading causes of SSD failure and how to resolve the problems..."
more


Achieving Fast, Accurate NAS Migrations In 5 Key Steps
StorageReview.com, March 19th, 2020

Gartner estimates 83 percent of data migration projects either fail or exceed their budgets and schedules

"This is likely due to the fact that many companies still operate without the aid of dedicated migration software. Trying to navigate a Network-Attached Storage (NAS) migration with outdated and incompetent tools means:

  • High cost of both internal and external personnel
  • Increased risk across all aspects of the project from data integrity to reputation of the migration team
  • Increased number of switchover events with extended outage durations
  • Disruption to the business
  • Lack of proper reporting and governance
  • Skilled staff distracted by migrations instead of working on strategic initiatives

All these challenges can be avoided or significantly mitigated by following a solid migration process..."
more


Bit Rot: How Hard Drives And SSDs Die Over Time
How-To Geek, March 18th, 2020

Computer storage is both a blessing and a curse. We can store terabytes of photos, documents, and more at home

"But that data is more precarious than we might assume thanks to a phenomenon known as bit rot or data degradation.

Hard Drives and SSDs Don't Last Forever

Take a hard drive and an SSD and bury them with a book in a time capsule for 100 years. You can bet the book will be legible when it resurfaces, but the storage drives? Good luck...'"
more


Ceph Gets Fit And Finish For Enterprise Storage
The Next Platform, March 18th, 2020

Ceph, the open source object storage born from a doctoral dissertation in 2005, has been aimed principally at highly scalable workloads found in HPC environments and, later, with hyperscalers who did not want to create their own storage anymore

"For years now, Ceph has given organizations object, block, and file-based storage in distributed and unified cluster systems well into the tens of petabytes and into the exabyte levels, storage that takes high levels of expertise to deploy, run, and manage. Building and managing these massive object storage clusters takes the kind of skills that HPC, hyperscaler, cloud builder, and other service providers tend to have. But large enterprises and many Tier 2 and Tier 3 service providers do not have such skills.

And the workloads they need to run - either themselves or on behalf of clients - is driving demand for object storage among more mainstream enterprises, who want to leverage artificial intelligence, analytics, containers, and similar advanced technologies but who do not have the expertise to manage complex Ceph environments..."
more


Software-Defined-Storage Market To Reach $86 Billion By 2023
Storage Newsletter, March 19th, 2020

The software-defined-storage (SDS) market is expected to register a 28% CAGR from 2019 through 2023

"As storage capacity grows due to the accumulation of data for video, big data, data analytics, AI and ML, an increasing portion of data center storage- spend is expected to shift towards SDS storage, which is suited for this new type of data retention and processing.

The SDS market comprises hyper-converged infrastructure (HCI) and standalone SDS products..."
more


IT - Security
How To Avoid A Costly Enterprise Ransomware Infection
HelpNet Security, March 17th, 2020

In most cases of human-operated ransomware attacks against enterprises, the hackers don't trigger the malware immediately

"What are the attackers waiting for? One of the reasons for the delay is the wish to spread the ransomware to many systems before running it. But they also like to wait for the weekend or at least the night, when there's few or no employees - IT, IT security or others - to notice something is wrong and to react promptly to minimize the damage..."
more


8 Key Security Considerations For Protecting Remote Workers
CSO Online, March 16th, 2020

Many security and IT teams suddenly have to support and protect employees who must work remotely due to the COVID-19 crisis. Make sure you cover these areas

"Your boss just called and all your employees are mandated to work from home for the next two to three weeks due to the potential COVID-19 pandemic. What could go wrong?

What risks are you now bringing to the firm? These are the actions should you take immediately to ensure you can allow your workforce to work remotely and securely..."
more


Exploring The Risky Behavior Of IT Security Professionals
HelpNet Security, March 18th, 2020

Almost 65% of the nearly 300 international cybersecurity professionals canvased by Gurucul at RSA Conference 2020 said they access documents that have nothing to do with their jobs

"Meanwhile, nearly 40% of respondents who experienced bad performance reviews also admitted to abusing their privileged access, which is double the overall rate (19%)..."

'We knew insider privilege abuse was rampant in most enterprises, but these survey results demonstrate that the infosecurity department is not immune to this practice,' said Saryu Nayyar, CEO of Gurucul. 'Detecting impermissible access to resources by authorized users, whether it is malicious or not, is virtually impossible with traditional monitoring tools. That's why many organizations are turning to security and risk analytics that look at both employee and entity behaviors to identify anomalies indicative of insider threats.'
more


Will An Increase In Remote Working Lead To More Cyber Attacks?
Information Age, March 17th, 2020

Security expert predicts at least a 30-40% increase in cyber attacks during the coronavirus pandemic as remote working increases

"The vulnerability of endpoints, from mobile phones and laptops through to home computers will be exploited by cyber attackers to gain access to corporate networks during enforced coronavirus remote working, according to Dave Waterson, CEO at security protection software company, SentryBay.

He predicts that cyber attacks exploiting endpoints will rise by at least 30-40%..."
more


The 10 Most Powerful Cybersecurity Companies
CSO Online, March 17th, 2020

What makes these 10 security vendors the biggest power players? We break it down.

"Anyone who ever attended an RSA conference understands that cybersecurity vendors introduce hundreds of amazing, innovative products every year. But C-level execs aren't looking for the flashiest new point products. Faced with a severe shortage of security professionals and up against rapidly evolving threats, CISOs are looking for strategic partners, advisory services, and vendors that offer broad platforms. They are also gravitating toward managed security services and cloud-based solutions..."
more


Security Is Leaving The Data Center And Moving To The Edge
HelpNet Security, March 18th, 2020

The traditional network security model, in which traffic is routed through the data center for inspection and policy enforcement, is for all intents and purposes obsolete

"A 2019 study by research firm Gartner found that 'more users, devices, applications, services and data are located outside of an enterprise than inside.'

Driven by the adoption of multi-cloud infrastructure and applications, mobility and distributed workforces, the focal point for security has shifted to users and devices. As a result, the current data center-centric approach to network security is struggling to support a load it was not designed to bear..."
more


IT - CRM
6 Signs You May Be Ready For A CRM Switch
CRM Buyer, March 16th, 2020

In today's evolving business environment, every operational decision is critical -- and that includes best practices for managing the customer journey

"The customer relationship management platform is an integral part of the process. In fact, 91 percent of companies with more than 11 employees use a CRM system.

Because of the time it saves and the structure CRM delivers (and its ever-growing importance in the overall sales tech stack), it can seem daunting for businesses to make a switch, but the reality is there are a few clear signs that it's time to make a CRM change, even if it means rebuilding integrations and essentially starting from scratch..."
more


3 Reasons Support Leaders Can Benefit From A Sales CRM
Business 2 Community, March 18th, 2020

With 89 percent of companies competing primarily on the basis of customer experience, customer service has become a critical function for any business to perform and grow

"To drive differentiation, businesses must integrate service into every interaction point of the customer journey, including the sales cycle.

However, the level of support and engagement that customers receive during the purchase experience often falls short of expectations in the current marketplace. In fact, 77 percent of B2B buyers claim that their latest purchase was 'very difficult.' To help ensure your buyer's journey is an effortless one, businesses will want to bridge silos and close gaps between sales and support. Read on to learn the top three ways customer service teams can benefit from an integrated sales CRM..."
more


4 Ways Intelligent CRM Can Help You Reach Tech-Savvy Millennials
CRM Buyer, March 18th, 2020

Does your customer relationship management strategy have what it takes to reach Generation Y?

"It's estimated that by 2021, an additional US$394 billion in revenue could be gained from artificial intelligence adoption in CRM activities in the U.S.

As companies grow and technology evolves at a faster-than-ever pace, collecting, storing and providing data is becoming a bigger and bigger task. No customer -- and certainly not your millennial customer -- will wait around if you're not able to provide an answer or solution right away..."
more


Machine Learning Is Your Secret Weapon For Customer Acquisition
AiTHORITY, March 18th, 2020

If you're looking for a strategy to get ahead when it comes to customer acquisition, Machine Learning can be your secret weapon

"While Machine Learning does fall under the larger category of Artificial Intelligence (AI), it's a bit more specific and can be an extremely effective technology to pair with your customer and prospect database. True AI can think for itself like Lieutenant Commander Data from Star Trek. Machine Learning, however, can automate tasks and apply predictive analytics that drive meaningful growth. Machine Learning is the AI focal point for your Customer Relationship Management (CRM) tool and can be the key to boosting your customer acquisition..."
more


IT - AI
How To Tame Robotic Process Automation (RPA) Anxiety
The Enterprisers Project, March 16th, 2020

Robotic Process Automation should be a positive - a chance to reduce drudge work

"But when some people hear RPA, they think job loss: Here are 5 ways leaders can manage fears...

The phrase Robotic Process Automation (RPA) itself can breed anxiety. It sounds a bit dystopian: Here come the robots - and when they arrive, their first order of business will be to take over our jobs.

The truth about RPA is not necessarily so bleak. For starters, there is no army of physical robots marching toward your office. But it is a form of automation that, if deployed with any kind of significant scale, will very likely impact some people in your organization's day-to-day job duties...."
more


Why Isn't Machine Learning Living Up To The Hype?
InformationWeek, March 18th, 2020

An obsession with tasks is leading to marginal returns on tech investments. Now is the time to rethink our approaches to machine learning

"When chief information officers think about their organizations and where machine learning might be deployed, the process often begins with an inventory of tasks.

The CIOs and department leaders identify routine, repeatable processes that humans can pass off to computers. Then the operations and IT teams set up targeted programs to make those tasks more efficient..."
more


IT - Humor
Memory-Lane Monday: Documentation Just Takes Up Too Much Space
ComputerWorld, March 16th, 2020

And apparently it doesn't spark joy

"It's the 1980s, and legacy systems are already a problem. IBM is still shipping source code for big-iron internals, says this mainframe pilot fish.

'IBM discontinued supporting BTAM under CICS, but we had a major customer who communicated via CICS BTAM,' fish says.

Translation: The big customer uses the CICS transaction-processing system, and connects to it over telecommunication lines using the very old BTAM protocol - and IBM has just stopped supporting that approach.
more


Wayback Wednesday: All True Statements, In Their Way
ComputerWorld, March 18th, 2020

Why challenge a giant?

"This pilot fish is working as a printer repair tech when he's called to a job at a small manufacturing plant.

'I was greeted at the front door by a supervisor who said he would show me where the printer was,' says fish..."
more


IT - Technology
Building A More Accurate Time Service At Facebook Scale
Facebook Engineering, March 20th, 2020

Almost all of the billions of devices connected to the internet have onboard clocks, which need to be accurate to properly perform their functions

"Many clocks contain inaccurate internal oscillators, which can cause seconds of inaccuracy per day and need to be periodically corrected. Incorrect time can lead to issues, such as missing an important reminder or failing a spacecraft launch. Devices all over the world rely on Network Time Protocol (NTP) to stay synchronized to a more accurate clock over packet-switched, variable-latency data networks..."
more


How Supersonic Commercial Flight Is Possible With Big Compute
insideHPC, March 16th, 2020

In this video from Big Compute 2020, Blake Scholl from Boom Supersonic describes how high performance computing in the cloud has opened a new era of high-speed flight

"Boom Supersonic is redefining what it means to fly by building Overture, history's fastest commercial airliner. Boom's vision is to bring families, businesses, and cultures closer together through supersonic travel and make the world dramatically more accessible.

Boom is the first commercial airplane manufacturer to commit to a carbon neutral flight test program. The company is backed by world-class investors and has 30 aircraft on pre-order. Founded in 2014, Boom has assembled a team of over 140 full-time employees who have made contributions to over 139 air and spacecraft companies..."
more


Stacking Up Arm Server Chips Against X86
The Next Platform, March 18th, 2020

It is pretty clear at this point that there is going to be a global recession thanks to the coronavirus outbreak

"Maybe it will be a V-shaped recession that falls fast and recovers almost as fast, and maybe it will be a sharp drop and a much more prolonged climb back to normalcy. As we have pointed out before, we think that IT technology transitions are accelerated by such trying times, and this could happen starting soon. There is no doubt that companies are going to be even more aggressive in measuring the performance per dollar and performance per watt on every piece of hardware that will still need to go into datacenters in the coming days, weeks, and months..."
more


The 6 Best Free Video Conferencing Apps
How-To Geek, March 16th, 2020

If you suddenly find yourself working from home or another remote location, you're going to miss those interactions with other people

Video conferencing can help by allowing you to talk face-to-face, even if it is via a screen.

  • Google Hangouts
  • CISCO Webex Meetings
  • Zoom Meetings
  • Skype
  • FreeConference
  • Jitsi

Fortunately, there are plenty of free video conferencing apps you can use to connect.
more


IT - BI
Augmented Analytics Drives Next Wave Of AI, Machine Learning, BI
InfornationWeek, March 19th, 2020

Business intelligence will move beyond dashboards, and AI and machine learning will become easier for less skilled workers as augmented analytics are embedded into platforms

"Enterprises struggling to get their data management and machine learning practices up to speed in an era of more and more data may be in for a nice surprise. After years of bending under the weight of more data, more need for insights, and a shortage of data science talent, augmented analytics is coming to the rescue. What's more, it could also help with putting machine learning into production, something that has been an issue for many enterprises..."
more


What Is The Difference Between Business Intelligence, Data Warehousing And Data Analytics
insideBIGDATA, March 16th, 2020

In the age of Big Data, you'll hear a lot of terms tossed around

"Three of the most commonly used are 'business intelligence,' 'data warehousing' and 'data analytics.' You may wonder, however, what distinguishes these three concepts from each other so let's take a look.

Business Intelligence (BI)

What differentiates business intelligence from the other two on the list is the idea of presentation. Business intelligence is primarily about how you take the insights you've developed from the use of analytics to produce action. BI tools include items like:..."
more


IT - AR-VR
AV And VR For Business In Virtualization And Where VMware Sits
BrianMadden, March 16th, 2020

Rachel Berry looks at how VMware seems best poised to lead the way when it comes to AR/VR streaming, and she also talks with Ben Jones of The GRID Factory

"In Part 1 of our AR and VR for business update, we covered VMware's progress in supporting the management of both AR/VR endpoints (e.g., headsets such as the Pico, Vive, Oculus) and also their work on developing some interesting support for applications. However, we still had some questions on whether the VMware graphics stack was ready for the demands of graphical demands of VR..."
more


Hilton Uses Oculus VR To Train For Broken Coffee Makers, Other 'Frustrating' Guest Issues
HR Dive, March 17th, 2020

Hilton is using Oculus virtual reality (VR) technology to train employees across its 6,000 resorts and properties on facilities, operations and empathy, according to a March 10 article published by Oculus parent company Facebook

"Hilton is one of a few examples of organizations that have turned to immersive technology to tackle empathy training. In October 2019, the University of California, Berkeley, announced plans to adopt VR to train learners on handling "challenging interpersonal moments." VR solutions firm Talespin announced last year it had developed a tool for training workers on communication, empathy and leadership using scenarios like a termination meeting..."
more


Where's The Zoom Of VR?
Tech Crunch, March 16th, 2020

Remote collaboration tools like Zoom are gathering massive amounts of attention as people begin working from home en masse

"But, as with most trends, virtual reality seems to be sitting out this boom.

This should be surprising to absolutely no one, but the lack of widespread adoption is not for lack of trying.

Virtual reality has already had a rough couple of years. Though a handful of startups in the space have continued to raise and find customers, most have done so by either committing to tight niches or opening up their services and minimizing their reliance on VR-only audiences. All the while, investors and founders have been left to wonder whether the 'presence' offered by immersing yourself wholly in a digital environment is undone by crude avatars, clunky hardware and lackluster integrations with popular work software tools..."
more


IT - Operations
3 Steps To Applying Agile Methodologies In IT Operations
InfoWorld, March 19th, 2020

Almost any team can benefit from agile techniques, but IT operations needs a few adjustments for best results

"Agile practices are not just for software development teams sprinting to code, test, and release applications. Agile methodologies, including scrum and Kanban, are being used today by a variety of business, data science, and technology teams, including IT operations.

Although agile methodologies can be applied to IT operations successfully, there are some notable differences in the charter, priorities, and culture of operating teams that need consideration. Understanding these differences and then defining strategic priorities structure how self-organizing IT operations teams can execute on their initiatives and be better members of other multidisciplinary agile teams..."
more


COVID-19 Best Practices For Data-Center Operators
Networkworld, March 18th, 2020

Uptime Institute has created a COVID-19 response guide based on tips and recommendations from its network of data center operators and partners

"Data-center operators are trained to anticipate upheaval due to fires, floods, power outages and other catastrophic events. The novel coronavirus, however, is sending people in charge of mission-critical facilities into uncharted territory..."

"Data centers and IT teams are typically very good at planning. We plan for normal operations, we plan for the future, we plan for abnormal events ... [but] very few people have planned for the type of pandemic that we're facing now," said Fred Dickerman, senior vice president for management services at Uptime Institute.
more


IT - Server
Disaggregated Hyper-Converged Infrastructure Vs. Traditional HCI
SearchConvergedInfrastructure, March 17th, 2020

A technical examination of what the pending demise of hyper-converged infrastructure 1.0 and rise of hyper-convergence 2.0 means for planning, buying, deployment and management

"Early on, hyper-converged infrastructure vendors marketed their products as low-cost, commodity computing platforms primarily designed for use in remote office/branch office or SMB environments. Since that time, hyper-convergence has grown up and will likely remain a fixture in the data center for a wide variety of use cases for the foreseeable future.

Hyper-converged platforms have also evolved with how they are purchased, deployed and managed. The clearest illustration of this evolution is the development of next-generation, disaggregated hyper-converged infrastructure products, also known as hyper-converged infrastructure 2.0 or HCI 2.0..."
more


Top Hyper-Converged Infrastructure Tco Factors To Consider
SearchConvergedInfrastructure, March 20th, 2020

A lot of factors for estimating hyper-converged total cost of ownership are fairly straightforward, others less so. Follow these guidelines to get started on this complex process

"Determining the true hyper-converged infrastructure total cost of ownership is perhaps one of the biggest challenges you'll face when assessing hyper-converged appliances. Not only must you take into account the cost of the appliance itself, but also what it takes to deploy, maintain and scale the system over the long term.

The cost of the product itself will depend on whether you purchase it outright or take a consumption-based approach. With consumption-based pricing, you have fewer upfront costs, but the ongoing fees can add up quickly. You must also take into account any optional components or services you want to include, as well as the level of support when opting for a hyper-converged infrastructure appliance that requires additional fees. Also be sure to factor in software licenses and any hidden costs that might come with the system..."
more


IT - Linux
How I Migrated From A Mac Mini To A Raspberry Pi
opensouce.com, March 16th, 2020

Learn more about Linux by turning a Raspberry Pi Model 2 into a workable desktop computer

"Some time ago, I decided to move my computing environment from a Mac Mini PowerPC to a Raspberry Pi Model 2. This article describes my reasons for doing so and how I did it. While it is quite technical in places, if you're considering switching from an existing system to something decidedly lean and mean, there are things that you need to know before making that leap. There are lots of links to click as well, which will lead you to the software and apps that I mention..."
more


IT - FOSS
Document Freedom In 2020
The Document Foundation, March 17th, 2020

In the age of the cloud, most people think they don't have 'real' files any more, as these have been replaced by pointers in an online system

"They don't realise they have lost their freedom until they download the file to edit it on their laptop. At that point, they realize that without buying a proprietary office suite they are unable to access their very own contents, as these are hostage of a proprietary file format. Something that wouldn't have happened if they had chosen the standard Open Document Format (ODF), which can be fully implemented by any software vendor without special permission, and without having to reverse engineer an obfuscated pseudo-standard format owned by a single company.

Back in 2012, European Commission Vice President Neelie Kroes said: 'Open standards create competition, lead to innovation, and save money,' while announcing the publication of a new policy to help public authorities avoid dependence on a single ICT supplier..."
more


Open Source Cloud Storage: 14 Top Tools
Datamation, March 18th, 2020

Open source cloud storage offers a critical support function for many people and businesses

"Cloud storage is absolutely essential for one key reason: Storage valuable data on-premises without a remote backup can be a recipe for disaster. To keep costs low, many people use open source cloud storage. It's like that among the 15 open source cloud tools below, you'll find one that will work for you..."
more


IT - HPC
Marvell Talks Up Thunderx3 And Arm Server Roadmap
HPCWire, March 17th, 2020

Now sampling and will be broadly available later in 2020

"The new chip will feature up to 96 Arm v8.3+ cores and support 4 threads per core thus delivering up 384 threads per socket. While many details of ThunderX3's architecture were not disclosed, Marvell says more information will be forthcoming over the next few months. Marvell also took the opportunity to issue a barrage of performance advantage claims over both Intel and AMD CPUs.

The recent rise of Arm CPUs in servers targeting HPC and the cloud is noteworthy. Arm has long been a force in embedded applications, leveraging its low power consumption attributes. Now, advancing chip features, available silicon, an emerging accelerator strategy, and a significantly expanded ecosystem are invigorating Arm's server aspirations..."
more


IT - DevOps
How To Be The Right Person For DevOps
opensouce.com, March 16th, 2020

Creating healthy relationships is the essential ingredient in DevOps success

"In my kitchen, we have a sign that reads "Marriage is more than finding the right person. It is being the right person." It serves as a great reminder of the individual responsibility everyone has in any healthy relationship. As organizations adopt DevOps as a model of developing and delivering value to customers, the impact of healthy relationships is extremely important for success..."
more


IT - Cloud
7 Tips To Manage Cloud Sprawl In Your Enterprise
SearchCloudComputing, March 20th, 2020

Cloud sprawl can lead to all sorts of unwanted surprises. Review these recommendations to get control over all the cloud resources across your business

"Organizations run into all sorts of problems when there is a lack of visibility and control over their cloud resources. Cloud sprawl is one of the biggest pitfalls associated with minimal oversight.

Cloud sprawl refers to the unchecked proliferation of an organization's cloud instances, services and service providers. It can lead to unexpected costs, security vulnerabilities and management nightmares.

It's critical for businesses to put controls in place to monitor their assets and prevent things from getting out of hand. Follow these tips to help manage cloud sprawl in your organization..."
more


IT - Wireless
The Everyday Guide To 5G: Considerations, Challenges, Applications, And The Future
Network Computing, March 18th, 2020

5G rollouts are anticipated throughout 2020 and beyond; network operators still have a lot to do to make 5G live up to its full potential

"5G enables lower latency, utilization of wider channel bandwidths, higher speeds, and improved spectral efficiency. Moreover, the new 5G spectrum below 6 GHz and in the millimeter wave range facilitates significant improvements in capacity that were not possible with 4G spectrum alone. Usage of these large wide swaths of new spectrum bands for 5G are part of the reason 5G trials are showing significant increases in peak throughput: up to 8 concurrent streams at 20 Gbits/sec downloads and four concurrent streams of 10 Gbits/sec uploads..."
more


IT - DR
10 Considerations For Choosing The Right DaaS Solution
Data Center Knowledge, March 19th, 2020

The coronavirus pandemic is forcing companies to reconsider their business continuity plans

"It's safe to say that only two months ago, few organizations were thinking seriously about how to ensure business continuity if their workforce was barred from the office. Things have changed quickly.

Tech leaders are now scrutinizing solutions for teleconferencing, collaboration, security, and even virtual workplaces. But providing remote workspaces at scale - including high-performance desktops - is a stress test that far exceeds providing a subset of employees with remote access..."
more


Business Continuity: Coronavirus Crisis Puts CIOs' Plans To The Test
CIO, March 19th, 2020

As the Coronavirus pandemic spreads, CIO have the perfect opportunity to brush up on business continuity planning as they strategize their response

"As the COVID-19 coronavirus rattles industries, it's more important than ever for IT leaders to ensure employees have the tools they require to work remotely and securely.

"When traditional channels and operations are impacted by the outbreak, the value of digital channels, products and operations becomes immediately obvious," according to Gartner analyst Sandy Shen. "This is a wake-up call to organizations that focus on daily operational needs at the expense of investing in digital business and long-term resilience..."
more


Developing A Continuity Plan For The Post-Coronavirus World
InformationWeek, March 16th, 2020

These baseline business continuity strategies will help ensure your organization is positioned to keep operations going even as the business environment is up-ended

"Arguably every company around the world has seen its priorities shift dramatically in recent days and weeks, as impacts from the spread of COVID-19 enter completely uncharted territory. Not only have supply chain concerns and fears of the economic fallout been top of mind, but disruptions in the workforce are prompting CIOs and CSOs to wonder how they'll maintain daily operations if their employees can't travel or even come into the office..."
more


How To Ensure Cybersecurity Plans Align With BC/DR Plans
SearchCIO, March 17th, 2020

It's crucial for organizations to have a collection of emergency-focused plans in place that can interact with each other if a cybersecurity attack occurs

"Cybersecurity attacks are often business-affecting events that should trigger business continuity (BC) and disaster recovery (DR) plans. Is that true in your organization? News reports on ransomware attacks, distributed denial-of-service (DDOS) attacks, phishing and virus attacks occur almost daily. Fortune 500 organizations -- including Facebook with 540 million affected records and Capital One Bank with 80,000 affected bank accounts and 140,000 Social Security numbers -- have sustained significant losses and damage to their reputations from these attacks..."
more


IT - Networks
As The Networks Evolve Enterprises Need To Rethink Network Security
Networkworld, March 16th, 2020

Q&A: John Maddison, executive vice president of products for network security vendor Fortinet, discusses how to deal with network security in the digital era

"Digital innovation is disrupting businesses. Data and applications are at the hub of new business models, and data needs to travel across the extended network at increasingly high speeds without interruption. To make this possible, organizations are radically redesigning their networks by adopting multi-cloud environments, building hyperscale data centers, retooling their campuses, and designing new connectivity systems for their next-gen branch offices. Networks are faster than ever before, more agile and software-driven. They're also increasingly difficult to secure. To understand the challenges and how security needs to change, I recently talked with John Maddison, executive vice president of products for network security vendor Fortinet..."
more


Five Ways To Reinforce Your SD-WAN Security
Network Computing, March 17th, 2020

Like any network technology, SD-WANs require strong security. Here's a look at five ways to keep the network serving your branch locations safe from intruders and attackers

"SD-WAN technology offers numerous benefits, such as greater agility and lower transport cost. But how do you address security once you move traffic off a structured, private MPLS VPN and onto public broadband links?

Here are five tips to ensure that your SD-WAN will always be resilient and secure.

1. Integrate SD-WAN security into your organization's overall security architecture..."
more


The 3 Best VPN Services For 2020
reviewgeek, March 20th, 2020

A VPN (virtual private network) service is a great way to ensure you have a secure network connection while online

"It also allows you to protect your browsing history, torrent, and access content that is blocked or regionally restricted.

What Does a VPN Do?

Each of your devices (your computer, smartphone, etc.) have their own unique IP address, which tells services who, what, and where you are. A VPN sits in between your device and however it connects to the internet, spoofing your device's IP address. Anything you do online goes first through the VPN, then to the router, causing your router (and everything outside of your device) to think you have a different identity..."
more


VPN Usage Surges As More Nations Shut Down Offices
Dark Reading, March 19th, 2020

As social distancing becomes the norm, interest in virtual private networks has rocketed, with some providers already seeing a doubling in users and traffic since the beginning of the year

"The use of virtual private networks (VPNs), a staple technology for remote work, has more than doubled in some countries impacted by the Cononavirus pandemic, as offices close, governments mandate social distancing, and workers move to remote work.

One provider of VPN services, NordVPN, says it has seen 165% growth in the number of average daily users, up from an expansion of 40% just last week. Google has marked a six- to tenfold increase in searches for VPN-related queries since the beginning of the year. And other VPN providers, such as Atlas VPN, have seen a massive rise in the amount of data flowing through their networks, with Italian users more than doubling their use of that provider's network..."
more


IT - IoT
Invest In The Right IoT Trend And Profit More In 2020
SmartDataCollective, March 17th, 2020

You can profit more in 2020 by investing in the right IoT trends. Here's what you need to know and consider to do so and to thrive

"Recently, IoT is creating a lot of buzz in the tech industry. From parking spaces of your home to refrigerators, coffee machines, dishwashers, lights and locks of your house - IoT is bringing almost every home appliances and other everyday physical objects into the digital fold.

Well, this emerging technology is not really a concept. Rather, it is a network that connects any device to the Internet and also to other connected devices..."
more


Understand IoT Data Storage Options For Data Deluge
IoT Agenda, March 18th, 2020

Cloud is the favored storage choice for many IoT uses, but vendors have stepped up their offerings to meet the growing variety of needs, including custom-built options

"As organizations draw more data from the rapidly expanding number of connected devices in the world, moving data from endpoints to the cloud won't always make sense.

Nearly 42 billion devices will be connected to the internet by 2025 as part of the ever-expanding IoT ecosystem, according to a forecast from research firm IDC. Those devices will generate 79.4 zettabytes of data, a staggering volume that organizations will need to capture, store and process, according to the report 'Worldwide Global DataSphere IoT Device and Data Forecast, 2019-2023...'"
more


IT - Careers
4 In 10 Employees Lack Work-From-Home Tech Tools
CIO Dive, March 17th, 2020

Four in 10 employees say their companies aren't equipped with the technology needed to let them work from home, according to a survey of 1,000 full-time workers from organizations with more than 200 employees commissioned by project management software company Wrike

"Amid the novel coronavirus pandemic, the need to stay apart from each other isn't just about crowded buses or shops: it impacts the workplace too.

Companies are flipping strategies to protect employees while getting work done ahead of a looming recession.

Remote work is enabled by tech tools, which means companies without a strong arsenal of technologies and processes in place will struggle to adapt. Conversely, those who invested early might be reaping benefits..."
more


How To Lead In The Age Of Newly Remote Teams
The Enterprisers Project, March 16th, 2020

What can leaders do to support teams working remotely at a time of much uncertainty? NetHealth CIO Jason James shares concrete steps CIOs and IT leaders can take right now

"This week marks the largest migration of employees moving from traditional office settings to remote work in history. What had been jammed highways weeks ago now gives way to open roads. Public transit will be emptier and coffee shops will go dark. Some workers are well prepared for the transition, while others will set up makeshift offices at their dining table and try to mute the sound of barking dogs and family activity. The traditional office has largely been suspended in hopes of slowing the COVID-19 virus and flattening the curve..."
more


Is The Coronavirus Threat Forcing Businesses To Create A Remote Workforce?
AiTHORITY, March 17th, 2020

The Novel Coronavirus - COVID-19 - is making headlines around the world. Businesses are cautiously being advised to review Business Continuity Plans (BCP) in the event the global virus outbreak is upgraded to a pandemic

"Specialists have advised that citizens may have to self-isolate to contain the virus. Some estimates suggest that up to 1 in 5 people 'could be off sick' in the event a pandemic is declared.

According to the Center for Disease Control and the World Health Organization (WHO), Coronavirus belongs to the same class of viruses like the common cold. At present, significant parts of Asia, Europe, and North America are on high alert to the threat, governments are outlining emergency preparations in direct response to the virus. It is advised that businesses do the same and review readiness guidelines and business continuity plans..."
more


Tech Won't Save You From Lockdown Disaster: How To Manage Family And Free Time While Working From Home
The Register, March 21st, 2020

Tips from El Reg hack with two decades of WFH experience

"If you aren't already, chances are that your home will soon become a prison of sorts as efforts to contain the spread of the coronavirus force, or at least encourage, us to 'shelter in place' with only very occasional trips out for food, medicine, and fresh air.

From California and New York in the US to Europe and the UK, citizens are being told to keep their distance from one another, work from home if possible, close schools and universities, and to avoid pubs, bars, restaurants, gyms, hairdressers, clubs, and similar places..."
more


IT - Virtualization
10 Steps To Ensure PCI DSS-Compliant Container Deployment
Container Journal, March 16th, 2020

Enterprises seeking to leverage containers and microservices in compliance with the Payment Card Industry Data Security Standard (PCI DSS) will find some advantageous synergies between the regulations and the technologies, as well as some aspects that require particularly careful attention

"While PCI-DSS version 3.2, the industry's latest, does not yet specifically address containerized environments, enterprises must nevertheless ensure that appropriate monitoring, security and governance is in place to achieve compliance. This is especially important, as recent reports are showing a struggle to maintain compliance.

Containers and microservices are inherently supportive of PCI DSS compliance across several fronts. In an ideal microservices architecture, each service and container deliver a single function, which is congruent with the PCI DSS requirement to implement only a single primary function with each server. In the same way, containers provide narrow functionality by design, meeting the PCI DSS mandate to enable only necessary protocols and services..."
more


IT - Compliance
Privacy Compliance: 5 Things It Leaders Need To Know In 2020
The Enterprisers Project, March 18th, 2020

Don't take a watch-and-wait approach to privacy compliance regulations including CCPA. Here's how to take control of organizational data and preserve customer trust

"A new study found that 95 percent of CIOs say their role is expanding to include new responsibilities in cybersecurity (64 percent), data privacy/compliance (49 percent), and customer experience (46 percent).

This makes sense, given the recent privacy compliance regulation policies like the California Consumer Privacy Act (CCPA) and the European Union's General Data Protection Regulation (GDPR). The stakes for corporate trust and brand reputation are at an all-time high, so how can CIOs make compliance a top priority while balancing other business and IT needs?..."
more


IT - Backup
Best Data Center Backup And Recovery Solutions Of 2020 As Reviewed By Customers - Gartner
Storage Newsletter, March 17th, 2020

Data Center Backup and Recovery Solutions from Gartner, Inc. defines the data center backup and recovery software market as being focused on providing backup capabilities for the upper-end mid-market and large-enterprise environments

"It defines the upper-end mid-market as being 500 to 999 employees, and the large enterprise as being 1,000 employees or greater. Protected data comprises data center workloads, such as file share, file system, OS, database, email, content management, CRM, ERP and collaboration application (such as content management solutions) data. Backup and recovery software products provide features such as traditional backup to tape, backup to conventional random-access media (such as a HDD or SSDs) or devices that emulate the previous backup targets such VTL, data reduction (such as compression, deduplication or single instancing), array and/or server-based snapshot, heterogeneous replication, and CDP..."
more


IT - Big Data
Big Data And AI: 7 Common Misunderstandings
The Enterprisers Project, March 19th, 2020

Some false notions have emerged about how AI and big data work together, leading to potential confusion

"IT leaders, now's the time to clarify these seven points

As organizations became engulfed in big data - high-volume, high-velocity, and/or high-variety information assets - the question quickly became how to effectively derive insight and business value from it.

'Big data naturally leads to advanced analytics. When we can capture a lot of information about a business topic that you can improve, you don't want just to scratch the surface..."
more


How Business Professionals Can Improve Their Data Management
Information Age, March 17th, 2020

Doug Laney, principal, data & analytics strategy at Caserta, discusses how business professionals can manage their data more effectively

"While attending and speaking at the TDWI Strategy Summit recently, I got to chatting over lunch with a couple data and analytics luminaries I've known for years: Professor Hugh Ryan (University of Georgia, Terry College of Business), and Marie Clark (GE entrepreneur in residence, and founder of Ambient Intelligence). We were noting how quick many organisations are to hand the keys to BI tools over to business professionals without them having a sufficient appreciation of the data itself, and in a moment of clumsily adapted political nostalgia, I blurted out: 'Ask not what your data can do for you, ask what you can do for your data.' We had a quick laugh, then got down to outlining what this means..."
more


IT - Java
Oracle Announces Java 14
AiTHORITY, March 18th, 2020

Oracle JDK 14 Represents More Than Two Years of On-Time Six-Month Feature Releases, Bringing Innovation and Predictability to Developers

"Oracle announced the general availability of Java 14 (Oracle JDK 14). Java 14 continues Oracle's commitment to accelerate innovation by delivering new enhancements to enterprises and the developer community with a new feature release every six months. The latest Java Development Kit (JDK) delivers new features, including two new highly anticipated preview features - Pattern Matching for instance of (JEP 305) and Records (JEP 359), as well as a second preview of Text Blocks (JEP 368)..."
more


Java 14 - 'It Feels Like The Early Days Of Java'
jaxenter, March 17th, 2020

For the release of Java 14 we talked to Java expert Dr. Heinz Kabutz. What does he like and dislike about Java 14? What is he currently working on? What does he still find disturbing in 2020?

"JAXenter: What do you think is the most important new feature in Java 14?

Dr. Heinz Kabutz: A few months ago, Brian Goetz complained on the Java Champion mailing list that they were not getting enough feedback on their preview features. As a result, I decided to from now on always run my JavaSpecialists.eu website on the latest preview version of Java. If you look at the website right now, you will see 'Running on Java 14-ea+29-1384 (Preview)' at the top. It is a bit of work to do this. Besides my master branch, I have three other branches for the Java 14 features: java14-preview, jep359 (records) and jep368 (text blocks). I generally work in master, but then rebase the three other branches off that..."
more


Java At 20: Ready For Life In The Cloud
jaxenter, March 17th, 2020

In the last decade, the enterprise IT landscape has moved from large, monolithic applications towards lighter and more modular application architectures

"Java EE was an enabler of the old way of creating enterprise apps, so it too needed to change with the times. Reinvention - including the advent of Quarkus - suggests a bright future ahead for enterprise Java.

Borne out of many years of work in the enterprise distributed systems arena, enterprise Java went on to become a dominant force in application development.

Twenty years on, Java is still standing strong towards the top of industry language rankings. This is, in no small part, a result of the level of reinvention that we've seen in enterprise Java, which suggests that it may avoid the fate of other 'legacy' technologies..."
more


IT - Developer
My Top 6 Open Source Frameworks For Web Development
opensouce.com, March 19th, 2020

A detailed rundown of the backend frameworks most used by custom web developers

"There are a lot of backend frameworks that are open source and easily available, but not all of them offer great features. Backend frameworks are an essential part of website development, as they work as the nuts and bolts of a website. Basically, they handle everything behind the scenes of a website.

Backend frameworks have extensive libraries, APIs, web servers, and a lot more. They are responsible for the database, ensuring it makes proper communication with the front end and generates backend functionality.

As promised, what follows is a rundown of my top 6 backend frameworks..."
more