IT News and Events  
June 27th, 2022 — July 3rd, 2022
Volume 291, Issue 5
IT - CxO
One Of The Best Things You Can Do As A CIO
CIO, June 28th, 2022

Stay in Business or Go Bankrupt: Where is Your Data Security Strategy Leading You?

Integrating modern data protection into the normal cycle of business is one of the best things you can do for your organization. But where do you start? That is the question. This article aims to provide you with a practical framework to improve your enterprise data protection.

Start off by doing a data protection assessment of all your company's data sources. You should profile all of your data. Each dataset brings a different value to the company. Before you make storage and protection decisions, you must know which category each piece falls into - and the value level it either provides or could cost the business. You need to figure out what to protect and how to protect it. This analysis should span across both primary and secondary storage.

What Defines A High-Performing IT Team? 5 CIOs Speak Out
The Enterprisers Project, June 28th, 2022

Leading CIOs discuss what sets top teams apart - and how to foster these qualities on your own team

Being a part of a high-trust, high-performing team can feel a bit like magic. But CIOs know there is a lot of work that goes into building and nurturing a team that can continually meet challenges and exceed goals.

CIOs who recently won the 2022 Chicago CIO of the Year ORBIE Awards shared with us a few telltale signs of a high-performing team, the qualities that set them apart, and how IT leaders can bring out the best in their own teams.

What Leaders Overlook After An ERP Overhaul
CIODIVE, June 29th, 2022

Leaders must make sure end users - employees and customers - are on board with modernization.

Modernized ERPs can revolutionize a business, give it a sharp competitive edge, and prepare it for the kind of agility and flexibility future technology developments will bring.

But a new system can also be a drain of resources and money if implementation goes wrong - as it often does. Seven in 10 digital transformation efforts fail to meet their objectives, according to a report from BCG.

2022 IT Trends And Statistics
jumpcloud, June 29th, 2022

In today's ever-changing digital world, at a certain point, many organizations find that they have an overabundance of tools and software that each department has purchased over time.

This is especially true for the IT department - their job revolves around digital infrastructure, and they often end up with too many unnecessary or clunky tools after a while.

While there is no single perfect time to address IT tool sprawl, we've found that the majority of IT organizations are interested in unifying their technology stack, an IT trend beginning in 2022. A variety of factors play into this, including world events, budget changes, current popular working models, and an overall desire for less digital clutter.

4 Stories All CIOs Should Be Able To Tell
CIO, July 1st, 2022

. and one common element that all stories must have.

Master storyteller Doug Keeley was a featured speaker at a large national sales meeting some years ago when he noticed how miserable everyone was feeling. 'Morale was horrible,' he recalls. 'There was a new leader taking over, and her opening keynote had bombed. Everyone thought this CEO was cold and lacking empathy.'

The only way to turn it around, Keeley was convinced, was to get the CEO back on stage for a more personal conversation. So, he asked her to talk about a time when she had dealt with a difficult challenge.

Digital Transformation: 5 Steps To Boost Your Progress
The Enterprisers Project, June 29th, 2022

Has your digital transformation initiative slowed - or stalled? Consider this expert advice to get things moving again

As a concept, digital transformation is not new. We have been inching closer to - and talking about - a totally integrated digital workforce since the dotcom boom. But as new technologies emerge daily, volatile markets drive executive leadership to tighten budgets, and 'efficiency' outpaces 'growth' for the most frequently seen buzzword in your email inbox, there is an increasing pressure to maximize the ROI of your digital transformation.

Ultimately, digital transformation is a game of accurate trend predictions and timely disruptions with the goal of preparing your business for the most success possible in the digital future. If you feel as though your digital transformation efforts have slowed, here are five ways to get the engine revving again.

How Should CIOs Respond To Inflation?
Gartner, June 28th, 2022

As consumers and businesses worldwide continue to feel the impact of inflation, it is emerging as a top concern among senior executive leaders.

CIOs must understand the likely impact of this global surge in inflation on the IT organization and the enterprise, in order to respond accordingly.

We sat down with Robert Naegle, VP Analyst at Gartner, to discuss the impact of inflation for CIOs and the actions they should take to respond. Members of the media who would like to speak with Robert further on this issue can contact Meghan Rimol.

Why Understanding The IT And Business Operating Model Is Critical For Change
Architecture & Governance Magazine, June 29th, 2022

How often do you hear about operational readiness and business readiness in the programmes that are running in your business? Are these aspects at the heart of the most successful change programs? I wonder?

Yes, the project can redevelop as many processes as it likes. It can look at today's process steps and look to re-engineer to drive satisfaction and take out costs.

Yes, the project can consider all the different data, which the business could absorb to enable it to be more intelligent, as well as start to enable a system to capture, enrich, and integrate it with other aspects of the business.

Yes, the project can spend time, assessing and selecting the best in breed tech that will enable you to configure to your unique needs.

But if the project is unsure about the operating model that the solution will be delivered through and supported by, and if it is unsure about the movers and shakers in the business teams that will need to change to adopt the new solution - it could be spending a lot of money and waste a lot of time. It probably won't come close to the benefits of the business case or in some cases get to that 'go live' date that's flashing on the programme plan.

Your Company Executives Could Still Be The Weakest Cybersecurity Link, June 28th, 2022

C-Suite often ask to bypass security measures

The C-Suite is often still the weakest cybersecurity link in an organization, as it focuses too hard on the bottom line, often ignoring warnings coming in from IT, and not paying that much attention to the digital employee experience (DEX).

A new report from IT software company Ivanti surveying 10,000 office workers, IT professionals, and the C-Suite on their level of prioritization and adoption of DEX in organizations found executives very much exacerbates the problem of IT security.

Today's enterprise has a hybrid workforce. Some work full-time remotely, some check in from time to time, while some prefer office life in its full glory. This approach has expanded the asset inventory under IT management by quite a lot, leaving security experts struggling.

How Tech Leaders Can Earn C-Suite Trust
CIODIVE, July 1st, 2022

Do corporate boards of directors see the CIO as a trusted advisor? More often than not, the answer is no.

The clout of senior technology executives is growing in the C-suite as more companies act on aspirations to become technology companies. But without trust in their actions and counsel, a company can fail to innovate at the pace it wants to in an age of increasing technology dependency.

For Ryan Downing, VP and CIO of Enterprise Business Solutions at Principal Financial Group, a key element of trust-building between different parts of the organization is to encourage contributions wherever relevant, no matter where they come from.

3 Ways CIOs Should Approach IT Team Accountability
The Enterprisers Project, June 30th, 2022

Holding others accountable is an essential aspect of leadership, but it isn't always easy. Consider these tips to keep teams - and projects - on track

Holding people accountable is one of the most important - and sometimes one of the most challenging - aspects of a leader's job. For CIOs, the success of a project intended to propel a company forward often depends on how well they hold their IT teams accountable.

That can be tricky. Tech workers are in high demand, and they can be demanding in turn. A recent Gartner survey shows that globally, only 29 percent of IT workers have high intent to stay with their current employer.

IT - Storage
NVMe: Driving Changes In Traditional Media & Entertainment (M&E) Storage Hierarchy, June 27th, 2022

Becoming essential element for many post-production, animation and VFX workflows

M&E storage and bandwidth requirements are increasing thanks to higher resolution content combined with higher frame rates, higher number of bits per pixel and more cameras per project. This richer content must be created cost effectively and with the most efficient use of physical and human resources possible.

In many ways the anticipated future is arriving faster than originally projected in the media industry.

For example, NHK in Japan delivered the 2020 Olympics in 8K. Taking note of this trend, camera manufacturers are committing to bringing ultra high-resolution to the masses, with 8K cameras available from Red Digital, Sony, Canon and others. These cameras often capture content at multiple Gb/s data rates and store more than a terabyte of digital content per hour.

Top Storage Virtualization Providers
Enterprise Storage Forum, June 28th, 2022

Storage virtualization streamlines storage administrators' management of all storage solutions within an enterprise infrastructure, allowing them to more efficiently tier data for applications

Virtual storage solutions also help enterprises ensure that data is still available in case of failure and increases storage scalability.

Storage virtualization decouples logical storage from physical storage, so logical storage can be accessed across a storage network, through a management console. In a virtualized storage environment, data from disparate storage sources is pooled and visible to administrators.

Why Choose NAS Over Tape For Your Data?, June 29th, 2022

Even if this comparison is made by a vendor of NAS, it's interesting to read it as the analysis is excellent on tape and can be apply to any NAS. Editor.

Data security has been more important. Buoyed by the vulnerabilities brought on by the rise of remote work, such as sloppy cybersecurity practices amongst home workers, ransomware continue to threaten businesses of all sizes. Strained IT teams are searching harder than ever to seek out storage and backup solutions with higher security

Since the best ransomware defense involves multiple backup options for redundancy, this has led to a resurgence in tape storage technology. For decades, many businesses have used LTO technology to store and backup their data. But as any storage medium, magnetic tape drives have their own advantages and disadvantages when it comes to storage and backup.

IT - Security
How Much Can Delaying A Cyber Threat Assessment Cost Your Business?
Security Boulevard, June 27th, 2022

Between cyber-criminal groups, Lazarus (North Korea), Conti (Russia), and Mustang Panda (China), almost every business in every sector is on the radar of hackers.

Because of geopolitical and economic reasons, these groups have stepped up their scanning and target acquisition activities in the last 4 weeks. Though evidence of collaboration is scant, there is some evidence to indicate that at least two of these groups have exchanged a list of targets in the past.

Security Audit
SearchCIO, June 28th, 2022

A security audit is a systematic evaluation of the security of a company's information system by measuring how well it conforms to an established set of criteria.

A thorough audit typically assesses the security of the system's physical configuration and environment, software, information handling processes and user practices.

Security audits are often used to determine compliance with regulations such as the Health Insurance Portability and Accountability Act, the Sarbanes-Oxley Act and the California Security Breach Information Act that specify how organizations must deal with information.

The Strange Business Of Cybercrime
CSO Online, June 27th, 2022

How modern cybercrime syndicates adopt the ways of enterprise business, reaping the gains and suffering the difficulties.

The old hacker stereotype-the antisocial lone wolf with coding skills-has been eclipsed by something far stranger: the cybercrime enterprise. This mutant business model has grown exponentially, with annual cybercrime revenues reaching $1.5 trillion, according to a 2018 study by endpoint security provider Bromium.

The sophistication of cybercrime operations underpins this scale of damage. The only explanation is that profit motive is fueling an engine that has driven the creation of effective organizations. But these organizations are curiously subject to many of the vicissitudes of normal business.

Perhaps the oddest outcome of this state of affairs is watching global cybercrime syndicates suffer under conventional business problems like PR difficulties.

Cloud Security Risks Remain Very Human
Inforworld, June 28th, 2022

Most of us picture cloud security threats as bad actors in some hostile country. More often, it's you and your coworkers

Talk about cloud security and you're likely to discuss provider-focused issues: not enough security, not enough auditing, not enough planning. However, the biggest cloud security risks continue to be the people who walk beside you in the hallways. According to the latest 'Top Threats to Cloud Computing' report by the Cloud Security Alliance on the HealthITSecurity website, the scary calls are coming from inside the house.

Based on a survey of more than 700 cybersecurity professionals, the report showed that the top 11 threats to cloud security include insecure interfaces and APIs, misconfigurations, lack of a cloud security architecture and strategy, as well as accidental cloud disclosure. The actual threats are not the bad actors sitting in an abandoned warehouse; it's Mary in accounting, Robert in inventory IT, even Susan in IT security.

It's A Race To Secure The Software Supply Chain - Have You Already Stumbled?
DARKReading, June 27th, 2022

If you haven't properly addressed the issue, you're already behind. But even if you've had a false start, it's never too late to get back up.

The digital world is ever-increasing in complexity and interconnectedness, and that's nowhere more apparent than in software supply chains. Our ability to build upon other software components means we innovate faster and build better products and services for everyone. But our dependence on third-party software and open source increases the complexity of how we must defend digital infrastructure.

Our recent survey of cybersecurity professionals found one-third of respondents monitor less than 75% of their attack surface, and almost 20% believe that over half of their attack surface is unknown or not observable. Log4Shell, Kaseya, and SolarWinds exposed how these statistics can manifest as devastating breaches with wide-reaching consequences. Cybercriminals already know supply chains are highly vulnerable to exploitation.

Shifting The Cybersecurity Paradigm From Severity-Focused To Risk-Centric
DARKReading, June 29th, 2022

Embrace cyber-risk modeling and ask security teams to pinpoint the risks that matter and prioritize remediation efforts.

New cybersecurity vulnerabilities increased at a never-before-seen pace in 2021, with the number of vulnerabilities reaching the highest level ever reported in a single year. As a threat analyst that monitors security advisories daily, I also observed a 24% jump in new vulnerabilities exploited in the wild last year - indicating threat actors and malware developers are getting better at weaponizing new vulnerabilities. Not only are vulnerabilities proliferating at an unprecedented rate, but threat actors have also gotten better at racing to take advantage of them with a range of new malware and exploits.

The Dark Side Of Digital Transformation: Massive Fraud
InformationWeek, June 30th, 2022

A holistic approach to combatting the growing problem of fraud requires an analytics strategy that draws data from multiple internal and external sources.

The COVID-19 pandemic has altered the way we work, play, and do business. So many of our activities have gone online, virtual or remote, that we have supercharged the evolution of internet-based, sustainable solutions. From virtual schooling to ordering groceries, practically everything we interact with has adopted a digital component.

This rapid evolution of digital solutions has come with a downside: record-breaking fraud.

Top 5 Myths Of Cyber Security Debunked
Security Boulevard, June 27th, 2022

Myths of Cyber Security : We work online. We live online. As our fast-paced lives get exponentially dependent on digital services, the urgency to protect our information from being misused is crucial.

In 2021, Microsoft went down in flames of embarrassment, as it sustained the biggest hack of that year, over 30,000 US businesses were affected by a sweeping attack on the Microsoft Exchange email servers, one of the largest email servers in the world.

The hackers were able to exploit four different zero-day vulnerabilities that allowed them to gain unauthorized access to emails from small businesses to local governments.

Top Six Security Bad Habits, And How To Break Them
threatpost, June 28th, 2022

Shrav Mehta, CEO, Secureframe, outlines the top six bad habits security teams need to break to prevent costly breaches, ransomware attacks and prevent phishing-based endpoint attacks.

Cybercrime is on the rise, and attacks are getting faster, more nuanced and increasingly sophisticated. The number of cyberattack-related data breaches rose 27 percent in 2021 - an upward trend that shows no signs of slowing down.

Bad security habits, such as using the same password more than once may seem innocuous, but unchecked bad behavior or security habits can leave your organization open to a devastating breach.

Bad security habits cost businesses millions of dollars. Consider this, the average cost of a data breach reached $4.24 million per incident in 2021, the highest in 17 years.

What You Need To Know About PCI 4.0: Requirements 10, 11 And 12
tripwire, June 29th, 2022

As we continue our review of the 12 Requirements of PCI DSS version 4.0, one has to stop and consider, is it possible to have a favorite section of a standard?

After all, most guidance documents, as well as regulations are seen as tedious distractions from the importance of getting the job done. However, depending on a person's position and function in an organization, it is possible to 'geek out' on some of the information in these official papers.

In the case of the new PCI DSS, it is clear from my previous articles, that the language was very carefully considered. As we continue with the final Requirement sections, one can see that the Standard has something to contemplate for all levels of an organization.

Benefits Of A Virtual CISO
Security Boulevard, June 28th, 2022

The role of Chief Information Security Officer (CISO) emerged as far back as the mid-1990s when Citicorp hired Steve Katz after a cybersecurity breach in 1995 that led to a $10 million loss.

This crucial executive position entails managing the security risks to an organization's data and systems by developing, overseeing and maintaining an information security program.

While Steve's role was obscure at the time, today's threat landscape-defined by an ever-increasing pool of malicious actors deploying both rudimentary and sophisticated techniques to hack networks and steal data-sees most businesses wanting the expertise and on-demand knowledge that a CISO brings to the table.

SANS Institute: Human Error Remains The Top Security Issue
SearchSecurity, June 30th, 2022

The SANS Institute's annual report on security awareness found that human risk is still the biggest source of data breaches and security issues for enterprises.

Human error remains the most effective vector for conducting network infiltrations and data breaches.

The SANS Institute security center issued its annual security awareness report Wednesday, which was based on data from 1,000 infosec professionals and found that employees and their lack of security training remain common points of failure for data breaches and network attacks. The report also tracked the maturity level of respondents' security awareness programs and their effectiveness in reducing human risk.

Zero Trust: What Does It Actually Mean - And Why Would You Want It?
The Register, June 30th, 2022

'Narrow and specific access rights after authentication' wasn't catchy enough

Since publishing our article and video on APIs, I've talked with a few people on the API topic, and one aspect that keeps coming up is the importance of security for APIs.

In particular, I hear the term 'zero trust' increasingly being applied to APIs, which led to the idea for this post. At the same time, I've also noticed what might be called a zero trust backlash, as it becomes apparent that you can't wave a zero trust wand and instantly solve all your security concerns.

Zero trust has been on my radar for almost a decade, as it was part of the environment that enabled network virtualization to take off. We've told that story briefly in our SDN book - the rise of microsegmentation as a widespread use-case was arguably the critical step that took network virtualization from a niche technology to the mainstream.

Microsoft 365 Security: How CDR Integration Boosts Email Security
Security Boulevard, June 28th, 2022

Employees in every enterprise regularly receive emails with content and attachments from within and outside the organization, involving multiple business units, vendors, partners, and other third parties.

With all of the emails and attachments entering your organization each day, any employee with an email address - especially those that often interact with the world outside your company - is vulnerable to zero-day targeted attacks via sophisticated phishing attempts and hijacked email conversations. Phishing refers to the fraudulent practice of sending email messages that contain a malicious attachment and look harmless to the recipients.

Hackers use increasingly sophisticated social-engineering tactics to get victims to open these phishing emails. Due to this increase in complex social-engineering tactics, many businesses have seen an increase in spear-phishing schemes and business email compromise (BEC) attacks, particularly those targeting Microsoft Office 365 users.

IT - CxO Events
DevOps: Continuous Deployment (July 11th)
Monday July 11th, 2022: 1:00 PM to 2:00 PM EDT

Continuous deployment is challenging because automating deployments across platforms has never been especially easy.

Often platforms are customized to the point where it is difficult to automate application deployments - each platform is its own unique "snowflake." However, the growing complexity of application development projects coupled with increased reliance on software to drive digital business transformation initiatives and concerns over software supply chain integrity requires organizations to revisit their approach to application delivery.

In this discussion, we will share more about these challenges and how to better approach them.

SNIA: Storage Life on the Edge: Accelerated Performance Strategies (July 12th)
Tuesday, July 12th, 2022: 1:00 PM to 2:00 PM EDT

Attend this SNIA Networking Storage Forum webcast on June 15, 2022 where we will discuss: ; The increasing need to do more at the edge across compute, storage and networking ; The rise of intelligent edge locations ; Different solutions that provide faster processing or data movement at the edge ; How computational storage can speed up data processing and transmission at the edge and Security considerations for edge processing

Edge is the new frontier of compute and data in today's world, driven by the explosive growth of mobile devices, work from home, digital video, smart cities, and connected cars. An increasing percentage of data is generated and processed at the edge of the network. With this trend comes the need for faster computing, access to storage, and movement of data at the edge as well as between the edge and the data center.

Hosted by SNIA

InformationWeek: The World's Best (Digital) Workplaces: Featuring guest speaker J.P. Gownder from Forrester (July 13th)
Wednesday, July 13th, 2022: 1:00 PM to 2:00 PM EDT

Attend this webinar and you'll: ; Find out what the best digital workplaces are doing to retain their workforce and provide the best possible employee experience. ; Learn what IT teams can do today to hone employee engagement, workplace flow and community in a digital, dispersed workforce. ; Discover how IT is going to change over the next five years, and what you do to get ahead of these changes.

What role does technology play in today's most in-demand workplaces? How can enterprises provide an employee experience that drives engagement, productivity, and growth in the post pandemic, digitally dispersed workplace?

In this special presentation, our experts will examine the growing intersection between the Employee Experience and the Digital Employee Experience. And also revealing what today's IT professionals must focus on as they look to a future of changing and expanding workplace responsibilities.

Our experts will review research and insights provided by Forrester and discuss how real-world professionals are working to ensure their IT teams contribute to the overall employee experience, with practices and solutions that have been adopted to successfully thrive in today's work environment.

Hosted by InformationWeek

CIO: Mainframe Application Modernization Initiatives in Support of Successful Transformation (July 26th)
Tuesday, July 26th, 2022: 1:00 PM to 2:00 PM EDT

Join CIO contributing editor Lane Cooper and subject-matter experts from our sponsor, IBM, for a private, hour-long, interactive, virtual roundtable.

In a 2021 IDC study that analyzed 446 businesses across the globe to measure the efficacy of migrating to cloud versus modernizing existing investments in mainframe systems and applications, the case for the latter won the day.

The study found that businesses that leverage their investments on the mainframe, while developing a modernization roadmap have an overall better outcome -- quantitatively and qualitatively -- than those that move off them. Replatforming, the researchers found, can be riskier and more costly than modernizing existing investments.

Join CIO contributing editor Lane Cooper and subject-matter experts from our sponsor, IBM, for a private, hour-long, interactive, virtual roundtable.

Hosted by CIO

IT - CxO Security Events
Angelbeat CyberSecurity (July 12th)
Tuesday, July 12th, 2022: 12:00 PM to 3:00 PM EDT

This Angelbeat virtual seminar focuses on the Cybersecurity, features expert/technical speakers from AWS and other leading companies


12:00 ET Virtual Seminar Introduction/Overview

12:05 Combatting Rogue URL Tricks: How You Can Quickly Identify, Investigate and Stop the Latest Phishing Attacks, through Security Awareness Training, KnowBe4

12:25 The Browser: Top Attack Vector that is Insufficiently Protected, Perception Point

12:45 Data Resiliency, Security and Ransomware Protection Strategies. Veeam

12:55 Siloing Isn't Security: Infrastructure Design Recommendations to Achieve Security, Business Continuity and Collaboration Objectives, Case Study Examples, Sayers

1:05 2022 Threat Landscape Assessment and Predictions through Year-End, Extreme

1:15 Zero Trust Deployments and Integration with Networking Security Best Practices, Extreme

1:25 Hybrid & Multi-Cloud Security Best Practices: Managing Shared Responsibility Matrices Across Cloud, Data Center and MSPs, Deft

1:45 Leveraging Low Code Development Platforms to Enhance Application Security, through Pre-Built Components that Simplify Encrypting Data-at-Rest, Integration with IAM and Other Security Tasks, Outsystems

2:05 DevSecOps Approach to Cloud Security: Leverage Security Automation to Protect your Critical Data & Enable Continuous Compliance, Logicworks

2:25 AWS Keynote Topics

  • Automate Cloud Compliance and Governance with Centralized Alerts, Detect Deviations from Security Best Practices, with AWS Security Hub
  • Protect and Discover Sensitive Data at Scale, with Amazon Macie

Hosted by AngelBbeat

BWGConnect: Work Smarter, Not Harder: Overcoming Cloud Security (July 12th)
Tuesday, July 12th, 2022: 3:00 PM to 4:00 PM EDT

BWG Connect & Orca Security invite you to participate in an interactive discussion with your peers.


During our virtual events, we encourage senior professionals to share & network with like-minded industry peers. Each session is moderated by a BWG Connect professional to ensure that our conversations remain on topic and answer critical questions that the audience truly cares about. All audience members will have the ability to ask live questions and will have access to introductions to any of the attendees following the event. We're always open to making connections to others within our network as well

Hosted by BWGConnect

Security Boulevard: Effectively Tackling Hardcoded Secrets With A Secrets Management Maturity Model (July 13th)
Wednesday, July 13th, 2022: 1:00 PM to 2:00 PM EDT

This webinar covers: What hardcoded secrets are ; Why hardcoded secrets are a security risk ; How to detect and remediate hardcoded secrets and How to use the maturity model to effectively manage your organization's use of secrets

Hard coding secrets-usernames, passwords, tokens, API keys and more-is a risky practice that's been around for as long as developers have been writing code. This problem is far from solved. In fact, hardcoded secrets are increasing in prevalence due to modern microservice-based architectures in which comments and services need to authenticate with each other securely and establish authorization mechanisms.

Tackling the problem of hardcoded secrets is not something most organizations do overnight. Doing it right requires a combination of approaches, technology, processes and organizational buy-in. In this webinar, you'll learn how to build an effective secrets management program using a maturity model that helps you assess your current capabilities and plan your next steps.

TechTalk Summits: VIRTUAL MIAMI, FL (July 14th)
Thursday, July 14th, 2022: 2:00 PM to 4:00 PM EDT

Our events now feature market analysis from our strategic research partner, IDC, the global leader in market research and analysis. Following the event you'll be granted access to its highly-valued CIO research package, 'The five stages to enterprise recovery: How tech can help organizations flatten the curve to recovery".

With recent nationwide work-from-home initiatives, we understand it's not business as usual -- but you still need to do business. So TechTalk Summits is taking our events to a whole new level -- virtual and interactive.

Virtual Commercial IT, live interactive online events bring presentations from IT innovators to your desktop -- or wherever you are. Share and discuss content from mixed media -- from live web cameras and video, to presentations and linked content.

You'll get the full benefits of our live regional roadshow events - what TechTalk is known for - networking while learning about the most cutting edge technologies in a live environment. Meet and speak with our sponsors, the companies you need to know on the cutting edge of technology, get specific information for your applications and arrange follow-up.

Hosted by TechTalk Summits

DARKReading: How Ransomware Works - And What You Can Do to Stop It (July 14th)
Thursday, July 14th, 2022: 1:00 PM to 2:00 PM EDT

Attend this webinar and you'll: Gain new insights to the evolving tricks and deceptions used by online criminals to capture your servers and desktops; Discover new ways to identify dormant ransomware threats - and effectively eradicate them; Devise new tactics and strategies to minimize your organization's risk and exposure to ransomware; Be better able to identify anomalous conditions in your network that could be red flags for ransmoware infection.

From Darkside, to Lockbit, to Conti, ransomware gangs pulled off many headline-making attacks in the last year and they have evolved their techniques to become more stealthy and sophisticated when targeting organizations. In this webinar, experts walk you through the steps these gangs and affiliates often take to breach a network and then move around, undetected, in preparation for a future ransomware attack. We will then examine which tools and strategies should be put in place in order to defend against the disruptive and damaging incidents.

Hosted by DARKReading

Recorded Future: Analyst Spotlight: How to Identify and Prioritize Your Attack Surface (July 14th)
Thursday, July 14th, 2022: 11:00 AM to 12:00 Noon

In this session experts from Recorded Future and Cyber Threat Cognitive Intelligence will join forces for an analyst-focused session covering: How to use attack surface intelligence to identify vulnerable assets; How to use vulnerability intelligence to prioritize vulnerabilities; and How to put it all together for a more effective way to reduce organizational risk

External attack surface management has proven to be an essential function for organizations of all sizes. Attack surface management helps organizations gain a complete picture of their cyber risk profile from the attacker's point of view, often enabling the discovery of previously unknown assets.

However, knowing what attackers see is only part of the equation. To effectively protect your organization, you also need to understand what attackers are using in the wild. Enter vulnerability intelligence. Vulnerability intelligence identifies which vulnerabilities are actively exploited so that organizations stay one step ahead of adversaries.

Hosted by Recorded Future

CSO: Future of Cybersecurity Summit (July 19th 2022)
Tuesday, July 19th, 2022: 1:00 PM to 7:00 PM Wednesday, July 20th

Our best-in-class keynotes, conversations, and workshops give you insight into how leaders in every field approach their toughest problems. You'll leave prepared with game-plans for the biggest market shifts, and ready for the future of work.

How Should We Anticipate Unknown Threats? Creating a Proactive Organization for Swift Response

Anticipation. It's one of the U.S. Army's eight principles of sustainment, along with integration, responsiveness, simplicity, economy, survivability, continuity, and improvisation. On the information security battlefield, CISOs and their organizations face growing needs to better anticipate threats. The downside if they don't? Dwell time grows - and with it - exponential damage to revenue, operations, and reputation. Join us as information security and business experts discuss how to define risk tolerance, share anticipatory risk strategies for business, and how CISOs and security leaders can enable them for success in their organizations.

Hosted by CSO

InteropDIGITAL: The Identity Crisis: How to Overcome Obstacles to Better Access Control (July 19th)
Tuesday, July 19th, 2022: 11:00 AM

Attend this complimentary virtual event on July 19th and you'll: ; Learn about the latest technologies that are revolutionizing identity governance and access management ; Get practical tips for overcoming obstacles to innovation ; Explore the state of Making Multi-factor Authentication (MFA) and how to speed up adoption and Understand the basics on machine identities and where they fit in your IAM strategy

Despite all the password leaks, credential stuffing attacks, data breaches, wasted time, and abandoned shopping carts, most businesses still rely on antiquated identity and access management systems. There are newer alternatives that provide both better security and an easier user experience. But overhauling an enterprise IAM system is full of obstacles.

Hosted by InteropDIGITAL

DARKReading: Building and Maintaining Security at the Network Edge (July 28)
Thursday, July 28th, 2022: 1:00 PM to 2:00 PM EDT

Attend this webinar and you'll: Join a nuanced discussion about when to move to the edge versus the cloud. ; Learn tips for how to manage specific security challenges of edge computing. ; Explore how to securely build out the edge from the start and prepare the environment to manage expanding workloads and new applications. and Find out how to manage and secure an exploding number of devices on the edge.

Advances in networking and new technologies have expanded the possibilities of deploying applications at the network edge. These edge devices bring with them their own security management challenges and risks. How do you scale your security to manage the sheer number of devices on the edge? In this webinar, experts discuss how to decide whether to move to the cloud or deploy to the edge. You will learn strategies and technologies for building out the edge securely and to manage the new workloads and applications effectively.

Hosted by DARKReading

ITProToday: How to Be Ready for Ransomware (Aug. 18th)
Tuesday, August 18th, 2022: 11:00 AM to 5:00 PM EDT

In this virtual event, presented by ITPro Today and InformationWeek, get a better picture of today's threat landscape; learn what tools and techniques can best help your organization detect and prevent these attacks; design a thorough incident response plan that will help your organization survive a successful attack intact; and be prepared with a fast answer to the age-old question: 'to pay or not to pay?'

You thought it was bad before?

You may wish for the days when ransomware attackers just used some malware, encrypted data, and asked you for Bitcoin. Supply chain attacks, doxing and blackmail threats, intellectual property theft, and inventive ransom requests that have deep business consequences, are now part and parcel of the attacker toolbox. How are IT leaders supposed to prepare for such complex threats?

  • How to Prevent Ransomware Attacks
  • You've Been Attacked. Now What?
  • Protecting Your Business Lifeblood - Your Data
  • Should You Pay?

Hosted by ITProToday

IT - CxO Podcasts
CIO Ken Grady And Leadership Coach Seth Rigoletti On Making Work More Human
CIO, June 27th, 2022

Ken Grady, CIO at IDEXX, and Seth Rigoletti, Leadership Coach at Valico Group, join host Maryfran Johnson for this CIO Leadership Live interview,

Jointly produced by and the CIO Executive Council. They discuss making work more human, bridging IT generational gaps, lightbulb leadership moments, reframing change management and more.

Consistent Security Is Very Difficult
Gestalt IT, June 28th, 2022

Security is a hard job. We spend our time analyzing our environment and building controls to keep our users and their data safe. As hard as security can feel it's even harder to apply consistently.

Attackers only have to get lucky once. Is your company using security in a reactionary mode? Or are they planning ahead with policies and platforms designed to prevent exposure? In this episode, sponsored by Fortinet, we discuss why Consistent Security is Hard.

How Will Data Science And Ai Transform Healthcare?
cxotalk, June 28th, 2022

Data science, machine learning, and artificial intelligence have the potential to transform healthcare in profound ways.

In this episode of CXOtalk, we speak to Dr. Shez Partovi, Chief Medical, Innovation & Strategy Officer at Royal Philips to discuss how these technologies are already improving patient outcomes, diagnosing disease, and more.

5 Surprising Cyberattacks AI Stopped This Year
DARKReading, June 29th, 2022

See how these novel, sophisticated, or creative threats used techniques such as living off the land to evade detection from traditional defensive measures - but were busted by AI.

We're now halfway through 2022, and already we have seen a range of cyberattacks, familiar and unfamiliar, disrupting organizations. However, we have also seen uplifting stories of successful threat detection efforts, as well.

In this article, we will look at five novel, sophisticated, or creative threats that used techniques such as "living off the land" to evade detection by traditional defensive measures. These threats were all discovered by artificial intelligence (AI) technology, which can spot subtle deviations in device and user behavior and autonomously enforce "normal," stopping a threat in its tracks.

5 Top Deep Learning Trends In 2022
Datamation, June 27th, 2022

The safety and compliance firm J. J. Keller & Associates is working with Hewlett Packard Enterprise (HPE) to power its cloud transformation.

J. J. Keller selected HPE's scalable GreenLake cloud services, according to HPE last month.

The firm serves the construction, industrial, and trucking markets in North America.

The cloud services by HPE are intended to support the J.J. Keller's growing demands for data processing and storage across various business applications that run on site or across remote locations. They are set up to enable the firm to scale its business across the U.S., Canada, and Mexico.

AI Ethical Decision Making: Is Society Ready
Architecture & Governance Magazine, June 30th, 2022

With the accelerating evolution of technology, artificial intelligence (AI) is playing a growing role in decision-making processes.

Humans are becoming increasingly dependent on algorithms to process information, recommend certain behaviors, and even take actions of their behalf. A research team recently studied how humans react to the introduction of AI decision making. Specifically, they explored the question, 'is society ready for AI ethical decision making?' by studying human interaction with autonomous cars.

The team published their findings in the Journal of Behavioral and Experimental Economics.

Detecting, Addressing And Debunking The Hidden AI Biases
AiTHORITY, July 2nd, 2022

Those of us in the technology sector are quick to celebrate advances in artificial intelligence (AI).

From applications that can detect fraudulent transactions to those that can predict disease progression, AI is poised to optimize business automation processes and drive powerful research breakthroughs. So why is it that a 2021 survey by the Pew Research Center found that a greater share of Americans reported being 'more concerned than excited' about AI's increasing presence, and how can our community address this?

Machine Learning Best Practices
Dataversity, June 28th, 2022

Artificial intelligence (AI), machine learning (ML), and data science are together transforming modern organizations in new ways.

These highly advanced technologies-along with a long queue of related technologies-have reshaped global organizations of all shapes and sizes in recent times. The cumulative success of these technologies in businesses is so huge that now the remaining organizations are all playing 'catch-up' to survive or remain relevant.

The unique feature of ML technology is that it allows a computer to learn on its own-by using models (algorithms) and studying sample data to determine the correct answer. In ML, machines do not need prior programming to produce results; the machines can study sample datasets and train themselves to provide desirable results when needed. The algorithm contains all the smart logic to test data at every step of processing to arrive at the correct conclusion.

MLOps: The New Role In Data Science
CIO, June 29th, 2022

The demand for consistent, reliable insights in-house has brought about a new role - the machine learning operations (MLOps) analyst.

In this Q&A we learn about this role and what it can mean for companies and data science teams.

Machine learning operations (MLOps) analysts have burst onto the scene as demand has grown among businesses for consistent, reliable insights in-house. We speak to Monika Rzepecka, MLOps analyst at the market, consumer, and brand intelligence agency, GfK, to hear what the role involves and what it delivers, strategically.

IT - Blockchain
No Matter The Price, The Message Of Bitcoin Has Already Won
Bitcoin Magazine, July 1st, 2022

Bitcoin has conveyed an important message to the world since its inception. It is the message of liberation from corrupt governments and financial intermediaries

Bitcoin is free speech recorded in every block and replicated on thousands of computers distributed around the world. It cannot be silenced any longer; it is here to stay to speak its immutable truth. Its message of freedom has been set in stone. It speaks to us with increasing confidence about what is to come and that Bitcoin has already won.

Since Satoshi Nakamoto mined the first block, Bitcoin has been communicating with us. Communication does not take place solely through the use of words. Much of it is accomplished through nonverbal means. Each movement, tone of voice, pause and reaction sends nonverbal cues that reveal what the speaker is thinking, what they want, or how confident they are.

Best ERP Software: Top 10 To Manage Day-To-Day Operations For 2022
Business 2 Community, June 27th, 2022

The term 'enterprise resource planning' was coined in 1990 by Gartner.

At the time, the idea of using dedicated software to plan a company's resource management pipeline was strange and unfamiliar, especially for businesses that had already gone through the painstaking process of building ERP systems on pen and paper.

Jump forward to today, and almost 90% of businesses use some form of ERP software. ERP software is critical to nearly every business operation, from managing HR to corralling bookkeeping, and even ordering supplies. By centralizing resource data in one place, businesses have become significantly more efficient and make better decisions now than ever before.

How To Avoid Unrealistic ERP Implementation Timelines: 9 Tips
SearchERP, June 28th, 2022

Determining the length of an ERP implementation can be difficult but doing so is a crucial part of planning. Learn how to avoid an unrealistic timeline.

Determining how long it will take to implement a new ERP system is not a straightforward exercise, yet doing so is a very important step in the planning phase. Project leaders must take certain steps to ensure they're moving forward with a realistic implementation timeline.

If leaders create an extended timeline, they may face difficulties securing approval for the project. Creating one that is too short, on the other hand, can lead to various potential issues -- including missing important milestones such as the go-live, requiring additional budget and lacking requirements during the implementation. Some of the steps project leaders should follow include comparing the proposed timelines to those of similar projects and pushing back on vendors' claims about implementation speed.

Maximizing ERP Systems With AI And Wide Data
Dataversity, June 28th, 2022

In the current business landscape, traditional enterprises are looking for agile technologies to accelerate growth and digital transformation.

Many of these organizations have petabytes of data stored in enterprise resource planning (ERP) systems and while ERP platforms can provide an overview of 'what happened,' many organizations want to know 'what will happen' or 'what's the persona of my user?' or 'how much inventory should we order for next quarter?'

There is no question that ERP systems are critical assets for the enterprise. Since Gartner first coined the term in 1990, these systems have blossomed, enabling organizations to support back and front-office functions from forecasting to inventory management and even customer relationship management. ERP systems allow a company to procure data in order to provide a myriad of critical analytics including sales forecasting, inventory management, and human resources reports.

Top ERP System Examples
SelectHUB, June 28th, 2022

Enterprise resource planning (ERP) consists of tools intended to facilitate the management of all information that impacts a company's business decisions

Depending on your company's niche, you'll benefit from different functionality available in ERP software. There are several ERP system examples that can streamline operations for manufacturing, accounting, marketing and more.

This article can help you learn more about what functionality is available in different solutions and evaluate which might be best for your corporation.

IT - EdTech
How 3D Printing Is Changing Education
eSchool News, June 27th, 2022

3D printing helps boost interactive learning, accommodates different learning styles, and ensures equal access in the classroom

If the pandemic has taught us anything, it's that we must invest in educational technology. When schools use technology to improve the quality and quantity of educational content, learners will thrive. Amid this technology-driven educational environment, 3D printing offers students the following: helping to facilitate differentiated instruction, increasing student engagement, expanding practice opportunities, and scaling up standardized instruction.

Tech & Learning Announces Winners Of Best Of Show At ISTE 2022
Tech&Learning, June 28th, 2022

This annual awards celebrates the products, and businesses behind each one, who are transforming education in schools around the world.

Tech & Learning's Best of Show Awards at ISTELive 22(opens in new tab) celebrate the products, and businesses behind each one, who are transforming education in schools around the world. Tech & Learning's panel of judges awarded the products and solutions to exhibitors at ISTELive 22 Live who show the greatest promise to the industry, according to the U.S.'s most tech-savvy and knowledgeable educators.

'It was great to be back in person at ISTELive22 and see so many examples of innovation on the exhibit hall floor,' says Christine Weiser, content director for Tech & Learning. 'Our judges chose the following winners as examples of excellence in terms of value, quality, ease of use, and versatility. Congratulations to our winners!'

IT - Operations
Collaborating across IT operations for a stronger enterprise environment
TechRepublic, June 30th, 2022

IT operations now requires more collaboration. Learn the roles of DevOps, NetOps and NetSecOps and how to encourage them to work together.

Numerous roles facilitate software development in IT operations. Although these roles are separated technically, they all contribute massively to building a strong enterprise environment. Therefore, understanding these different roles and harmonizing their operations is necessary for building a more holistic and efficient enterprise architecture.

In the digital transformation era, numerous actors contribute their expertise to a successful IT operation. Oftentimes, these roles will be subsumed into DevOps, NetOps and NetSecOps. Unfortunately, due to the similarities across the roles, they have been misinterpreted in IT operations.

Comparing Water And Immersion Cooling For Servers
Datamation, June 30th, 2022

I recently visited Lenovo, which claims, with a solid foundation, to be a leader in water cooling. It is hard to argue with that position, given Lenovo is aggressive in implementing this technology.

I was at Dell Technologies World recently and was also impressed by Dell's joint effort with Intel and GRC to create a better immersion solution for servers.

I've covered water cooling for a long time and have not only built my own water-cooled PCs, but also explored the use of waterless coolant for automobiles. What fascinates me about these technologies is that they can be both far more effective and arguably more affordable than air cooling when you are pushing performance.

Let's contrast leading water-cooling efforts, like those from Lenovo, with the immersion efforts of Dell, GRC, and Intel.

Will Hydrogen Power The Data Center Of The Future?
DataCenter Knowledge, June 29th, 2022

It's time to recognize hydrogen's potential as a viable alternative to fossil fuels in terms of cost and efficiency - and because it can drastically reduce greenhouse gases.

It's no secret that the modern data center is dependent on a reliable supply of electricity. From the physical systems that keep it cool to nearly every component of an IT infrastructure, electricity is the fuel of business IT, which has made protecting that resource an imperative for data center operators since day one.

In the United States, we've been able to trust the reliability of our electrical services via the nationwide grid, but even that's starting to come under scrutiny as the electrical infrastructure ages, demand grows, and even cyberthreats add to the existing challenges of delivering reliable electricity. On top of that, there is an increased push to reduce greenhouse gases across all aspects of energy usage. Unfortunately, according to the EPA's calculations, electricity generation is the second-largest contributor to greenhouse gas (GHG), accounting for 25% of the total GHG in the U.S. alone, according to a 2020 study.

IT - Database
10 Major Database Security Threats And How To Prevent Them
Security Boulevard, Security Boulevard

Data is a crucial asset of your company. Companies gather a lot of data daily from their customers and daily operations.

The data stored in databases are then utilized to handle and automate different functions within and outside companies.

Because of its importance, data protection is crucial to business protection.

In this post, you'll be learning more about database security threats and what you can do to protect your database:

IT - Linux
9 Bash Script Examples to Get You Started on Linux
How-To Geek, June 29th, 2022

If you're starting out with Bash scripting on Linux, getting a solid grasp of the basics will stand you in good stead. They're the foundation of deeper knowledge and higher scripting skills.

For the shell to execute a script, the script must have the executable file permission set. Without this, your script is just a text file. With it, it's still a text file, but the shell knows it contains instructions and will try to execute them when the script is launched.

The whole point of writing scripts is that they run, so the first basic step is to know how to let Linux know your script should be considered executable.

8 Ways to Secure SSH Server Connections on Linux
MUO, June 29th, 2022

SSH is a globally-used protocol used to access remote servers. Here's how you can strengthen your SSH connections on Linux for maximum security.

SSH is a widely-used protocol used for accessing Linux servers securely. Most users use SSH connections with default settings to connect to a remote server. However, the unsecured default configurations also pose various security risks.

The root account of a server with open SSH access may be at risk. And especially if you are using a public IP address, it is much easier to hack the root password. Therefore, it is necessary to have knowledge about SSH security.

Top PHP Hardening Security Tips For Linux Servers
Tecmint, June 28th, 2022

It's no brainier that PHP is one of the most used server scripting programming languages. It makes sense for an attacker to find various ways by which he can manipulate PHP as it is often paired with MySQL and enable access to the private data of your users.

By any means, we are not claiming PHP is vulnerable or has some serious issues by default but we have to make sure that we tweak PHP in such a way that it can be more robust than ever before.

1. Remove Unnecessary PHP Modules

By default, you get a set of PHP modules that can be helpful in various tasks but some unnecessary modules might not be useful for each project. To list available PHP modules, utilize the given command:

So, You Think You Can Design A 20 ExaFLOPs Supercomputer?
The Next Platform, June 30th, 2022

The US Department of Energy has a single 2 exaflops system up and running - well, most of it anyway

... and that of course is the 'Frontier' system at Oak Ridge National Laboratory and two more slated for delivery, and that is the 'Aurora' system at Argonne National Laboratory supposedly coming sometime this year and the 'El Capitan' system at Lawrence Livermore National Laboratory, which is due next year. It took a lot of money and sweat to get these machines into the field - in Intel's case, the sweat to money ratio has been pretty high given the four-year delay and massive architectural changes involved the latest and final incarnation of Aurora.

What's New In HPC Research: Exa2Pro, Dqra, And HiCMA-PaRSE Frameworks & More
HPCWire, June 28th, 2022

In this regular feature, HPCwire highlights newly published research in the high-performance computing community and related domains. From parallel programming to exascale to quantum computing

Researchers from the Institute of Aerodynamics and Gas Dynamics at the University of Stuttgart, Hewlett Packard Enterprise (HPE), the High Performance Computing Center Stuttgart at the University of Stuttgart, and the Laboratory of Fluid Dynamics and Technical Flows at the University of Magdeburg 'Otto von Guericke' describe the Relexi framework that they have developed. Relexi 'bridges the gap between machine learning workflows and modern computational fluid dynamics (CFD) solvers on HPC systems providing both components with its specialized hardware.' It is 'a scalable reinforcement learning (RL) framework. built with modularity in mind and allows easy integration of various HPC solvers by means of the in-memory data transfer provided by the SmartSim library.'

4 New IT Workforce Realities
CIO, July 1st, 2022

Does the 'battle for talent' have to be a forever war?

Every day the headlines remind us just how fragile/broken the human supply chain is. At the height of the pandemic we discovered severe shortages of truck drivers, meat packers, and emergency room nurses. As we limp through the frustratingly elongated ramp toward a post-COVID world we are experiencing significant shortages of coders, butchers, bakers, pilots, waiters/waitresses, hospitality workers, cashiers and tax preparers/reviewers.

In every corner of our economy there is a massive imbalance between the demand for talent and the supply.

IT - DevOps
Agile vs DevOps: What Are The Main Differences?
ServerWatch, July 1st, 2022

The current schools of thought surrounding software development have evolved to include far more communication between stakeholders and rapid responses to changes.

Whereas the original waterfall approach was rigid and inefficient, today's DevOps and Agile methodologies offer more flexibility and better ultimate results.

However, these two approaches each have unique use cases that help software teams work better. It's important to understand the difference between Agile and DevOps to set your team up for success.

DevOps, Present And Future
Forrester, June 30th, 2022

The verdict is in: DevOps isn't just a trendy term or shiny new thing. It's real, and it delivers real results.

As a result, the loose set of operating principles that emerged circa 2009 has become the default approach for most software-intensive organizations and is having an increasing effect on enterprise IT operating models.

This is a good thing. As Forrester's research has shown, implementing DevOps consistently reduces time-to-market, increases enterprise agility, and makes businesses more resilient. Forrester's The State Of DevOps, 2022 survey research shows that the highest performers are much more likely to be well along in their agile/DevOps transformations compared to laggards. And that's just the beginning: DevOps may have demonstrated its value, but it's not resting on its laurels.

IT - Cloud
6 Ways Cloud Networking Teams Can Up Their Game
ITProToday, July 1st, 2022

Many cloud networking teams believe that achieving excellence will be too costly and too difficult. But that's not actually the case.

In the pursuit of cloud excellence, many organizations have settled for cloud networks that are adequate at best. This will usually cause a ripple effect of dissatisfaction; for example, if your network is too slow to implement changes, you might test the patience of your developers. If you lack visibility and management controls, then you may struggle to assure C-suite executives when asked about usage, performance, and availability.

So, why do enterprises put up with it? Well, many cloud networking teams believe that achieving excellence will be too costly and too difficult - but that's not actually the case.

Cloud Security Best Practices: A Summer School District To-Do List
Security Boulevard, June 30th, 2022

With summer break upon us, it's just about time to punch your ticket and take a vacation. But before you do - or even after you return - be sure you take the time to revisit cloud data security.

Why? Because even when students are away, class is still in session. In other words, summer is a great opportunity to learn more about protecting sensitive data in the cloud. That's why we've put together this blog to guide you through all you need to know about strengthening your cloud security over summer break.

From the risks that threaten your cloud data to the trends you may have missed, it's important to understand exactly what you're up against. Let's walk through the basic cyber threats and the security best practices you'll need to defeat them.

How Cloud Is Disrupting IT Operation
CIO, June 30th, 2022

The rapid evolution of cloud services is forcing IT organizations to scramble to attract the right skills and fight fires reactively rather than taking time to devise a proper cloud-first strategy.

Fewer than 11% of enterprises in APAC today use a single cloud. Instead, organizations are settling on multi-cloud, hybrid strategy with interoperability between cloud providers.

This APAC trend reflects what's happening globally; 92% of enterprises now have a multi-cloud strategy in place, according to the Flexera 2021 State of the Cloud report.

It's easy to see why most companies are going down this route: it provides maximum flexibility to pick and choose the best capabilities of each provider while also optimising cost and creating competitive tension between suppliers.

Innovations In 5G Technology Create New Possibilities For Cloud Computing
AiTHORITY, June 28th, 2022

The implementation of 5G continues to grow quickly. The two main factors contributing to the swift adoption of the technology are the constant construction of 5G infrastructure and the growing use of smartphones around the world and particularly in developing economies.

According to research by J.P. Morgan, Northeast Asia is leading the global adoption of 5G technology. Additionally, 5G adoption is projected to help accelerate the Internet of Things (IoT) in the region. By 2025, Japan and South Korea are expected to see 150 million IoT connections, which is +29% in terms of compound annual growth rate (CAGR). China, meanwhile, is expected to see 2.5 billion connections. uCloudlink Group Inc., AT&T, Inc., Marvell Technology, Inc., DISH Network Corp., SK Telecom Co.,Ltd.

High Availability And Security For Cloud-Based Systems
Security Boulevard, June 30th, 2022

IT organizations striving to ensure compliance with HIPAA, Sarbanes-Oxley, BASEL II and similar regulations generally have a good grasp of the security considerations that apply to key hardware and software systems running in the cloud.

They need to manage user authentication and access control, disk encryption, update planning and backup/restore. But there are high availability (HA) and disaster recovery (DR) considerations that may not be as obvious. Not only may there be a need to ensure that key systems are available no less than 99.99% of the time, but there may be a need to ensure that a DR infrastructure is in place to ensure continuity of operations in the event of a regional catastrophe that takes out the primary cloud infrastructure. While there are numerous options for configuring HA and DR solutions in the cloud, not all of them are suitable for solutions designed with regulatory compliance in mind.

IT - Networks
5G Private Networks Offer Enterprise An Alternative To Wi-Fi
Network Computing, June 28th, 2022

For years, cellular networks and Wi-Fi appeared settled into their areas of dominance. But in some enterprise use cases, upgrades to cellular technology have handed companies unprecedented choice.

For wireless-network managers who've been around awhile, the 5G vs. Wi-Fi debate may seem a little tired. The argument goes back to much earlier versions of cellular and Wi-Fi technologies. But even as the technologies settled into dominant positions in their separate areas of the wireless world, they each have continued to evolve.

Wi-Fi is a type of wireless local area network (WLAN) that is favored for supplying wireless connectivity to the home, office, campus, and other facilities. Cellular networking is the dominant player outdoors, on mobile phones and many other devices when Wi-Fi is unavailable. The two technologies have co-existed for decades, and no doubt will continue to do so for many years.

Protecting Organizations From 5G Threats
Security Boulevard, July 2nd, 2022

The industry is buzzing about 5G technology and its potential. For example, almost every new smartphone is advertised as '5G compatible,' with the majority of mobile subscriptions switching to 5G over the next five years. With its promise of improved speed, reliability and connectivity, 5G offers a wealth of benefits.

The excitement globally connected communities feel about 5G is understandable, since connectivity drives companies' daily operations and is part of everyone's daily lives. But with all of the advantages of 5G come new threats to organizations.

Introducing New Cybersecurity Threats From 5G

5G technology will enable future IoT functions and interconnectivity of smart devices due to its enhanced reliability and connectivity. Since IoT is designed around ease of use, most of these devices are incapable of supporting strong security functions and are increasingly vulnerable to cyberattacks. And with an increasing number of 5G-compatible, connected unsecured IoT devices, there is a greater attack surface for distributed denial-of-service (DDoS) attacks and other threats to target. It's easy to see that less-secure devices connecting to networks open up a world of new possibilities for attackers.

IT - IoT
Top 10 IoT Companies
Enterprise Networking Planet, June 30th, 2022

The Internet of Things, or IoT, which derives competitive advantages from a distributed network of devices, machines, and infrastructure, is on the rise - dramatically.

Grandview Research indicates that the edge computing sector will grow by a torrid 33 percent CAGR between 2022 and 2030. Clearly, the enterprise is investing heavily in IoT.

However, the success of your company's IoT initiatives is determined by selecting the most appropriate IoT provider for your deployments. To assist, we explore 10 top IoT vendors.

IoT And Machine Identity Management In Financial Services
Security Boulevard, June 29th, 2022

IoT has already positively impacted the financial sector and will only continue to in the future

The bank of things facilitates the billions of data transfers that take place every day. It enables insurance companies to collect and share data with customers about their insured goods in real time, allows consumers to make instant contactless payments and provides the framework for retail banks to collect information on each customer that enters one of their locations.

IoT Use Cases in 2022
Enterprise Networking Planet, July 1st, 2022

The Internet of Things (IoT) a broad term that describes a wide range of devices that can connect and process data via an Internet connection.

This sector continues to expand and evolve as more industries realize the valuable use cases that IoT offers.

IoT devices can collect data about their surroundings and send it back to a central server for analysis or storage. Because these devices are connected via the Internet, they can be controlled remotely from anywhere in the world.

This means businesses have access to real-time information on production levels, weather conditions, customer behavior, energy consumption and much more. This makes IoT deployments incredibly valuable for organizations looking to improve efficiency across their operations.

IT - Careers
9 Hiring Trends For The Most In-Demand IT Jobs Of 2022
The Enterprisers Project, June 29th, 2022

From a renewed focus on employee retention to the importance of certifications, here are nine important trends to know when it comes to filling IT roles this year

Skills development and talent management are both challenges and opportunities that span every industry vertical and role - for companies of all sizes. These challenges are being exacerbated throughout the pandemic as most companies fundamentally shift certain business practices and subsequently fill new or emerging roles, particularly in IT.

DevOps Institute's Upskilling IT 2022 Report and Survey researched global and regional must-have IT skill capabilities and learned that insufficient resources and skill gaps are the top global challenge. From a global perspective, 40 percent of our respondents said that the resource and skill shortage is one of their top three challenges today.

Do This Before Accepting A Job Offer!
Ask The Headhunter, June 27th, 2022

It's always a relief when I get a job offer, but that's also when I think I'm most vulnerable to accepting a job that maybe I should not. Face it, after 7, 8 or 9 interviews (common today), you just want to get it over with and start the job!

Q: "You have said people often quit their jobs or get fired because 'they took the wrong job to begin with.' I understand, but how do we avoid a mistake like that? Is there a strategy or a reminder I should write on my hand?"

Nick's Reply

You can do something pretty obvious to avoid going to work for a questionable company or accepting the wrong job: meet everyone that will affect your success. It's not really a strategy. It's more of a tactic that will help you confirm a really good opportunity and keep you from getting a walk-on role in a nightmare. You shouldn't write on your hand, but if you insist, write these two words: upstream and downstream.

Storage Certifications To Bolster Your Skills
Ask The Headhunter, June 28th, 2022

Storage admins looking to gain new skills or make better use of their vendor-supplied storage systems can look to certification and qualification courses.

Most jobs require a mix of practical experience and education. For data storage administrators, this typically takes the form of certifications -- if not undergraduate degrees.

Certifications provide a relatively cost-controlled avenue for aspiring or existing IT professionals who are looking to enhance their knowledge of storage systems. Vendors often offer certifications that can help admins better understand specific storage systems and become better versed in general storage best practices. IT admins should check with vendors to see if they offer certification programs such as these.

Worried About Burnout? Few Enterprises Are Set Up To Fight The Real Causes
ComputerWorld, June 29th, 2022

C-level execs argue a fine game about caring about their employees - but those platitudes somehow never make it into the HR meetings about bonus benchmarks.

Employee burnout is often cited as a reason for losing enterprise employees. But a CEO saying that is like the head of a hospital saying death is the prime reason for bad outcomes.

Although both statements are obviously true, they are effectively meaningless without addressing their causes. A recent McKinsey report found that 'employers have invested unprecedented resources in employee mental health and well-being.' That is a classic way of treating 'burnout' as though it is a mental aberration.

IT - Email
Mozilla Thunderbird 102 Released With New Address Book, Import/Export Wizard
9to5linux, June 28th, 2022

The Mozilla Thunderbird open-source, cross-platform, and free email and calendaring client has been updated today to version 102, a major release that adds many new features and enhancements.

After the big announcement earlier this month that Mozilla Thunderbird is coming to Android devices, the project released today Mozilla Thunderbird 102 as the first major new series of the popular email client almost a year after the release of Mozilla Thunderbird 91.

Highlights of Mozilla Thunderbird 102 include a new address book that supports importing of contacts in the vCard format, refreshes the design of the contact cards with new contact entries, and makes it a lot easier to navigate and interact with your contacts.

What's New In Mozilla Thunderbird 102
How-To Geek, June 28th, 2022

Mozilla Thunderbird is having a resurgence right now, armed with an expanded team of developers and a plan to take over the email world (including Android).

The first of several planned updates, Thunderbird 102, is about to start rolling out.

Thunderbird 102 isn't the complete overhaul that some fans might be waiting for - the 'completely modernized UI' is scheduled for Thunderbird 114 next year. However, this update is a step in the right direction, with a few design tweaks and new features.

The most important change this time around is the updated address book, which now has a cleaner design and more field options. It's still interoperable with the vCard format, so importing and exporting your contacts from other applications is easy. Just like before, it will also show contacts from any synchronized accounts, like Gmail.

IT - Backup
Backup Maintenance: Five Key Points To Consider
ComputerWeekly, June 29th, 2022

Effective backups need to ensure all data is protected, and to track media and software changes. We look at five key things to consider

If organisations depend on their data, then they need robust backups - but making sure backup is effective is a challenge. Backing up business data has become easier over the past decade, through improvements in backup technologies, better-performing storage systems and the option to backup to the cloud. Firms no longer rely solely on cumbersome and potentially fragile physical backup media.

But these developments have added complexity at the same time, as firms face ever-greater volumes of data. To keep to recovery time objectives (RTO), IT teams need to ensure backups actually work. And to ensure that, backup infrastructure needs maintenance.

Best Virtual Machine (VM) Backup Software 2022
ServerWatch, June 29th, 2022

Virtual machine (VM) backup software is essential for any organization that uses virtualization to maintain operational efficiency and flexibility. VMs rely on software instead of hardware, so they are more sensitive to bugs than physical servers.

Individual processes can crash if one of them has a bug, and since VMs run several processes at once, it's common for one of those processes to take others with it when it crashes. These kinds of errors also mean VMs are at risk of issues like memory leaks or software errors.

VM backup software is important because it saves a copy of your virtual machine files that can be restored if a VM fails or is compromised. It also copies the VM configuration files so you can restore the whole backup if something goes wrong or you need to recreate the same environment to test something.

IT - Mobile
The Top Mobile Security Threats Of 2022
IT Security Guru, June 29th, 2022

Most of our daily activities revolve around our phone. Protecting your information on it should be a top concern.

Whether you are ordering food online, booking a doctor's appointment, or checking your balance, you are doing it through your phone. For many years we believed that we had a valid reason to trust our phone with sensitive information.

Today, we have to acknowledge that this isn't completely true and examine the risks inherent in our mobile devices. Looking ahead to 2022, these are the threats to be on the lookout for.

IT - Big Data
11 Dark Secrets Of Data Management
CIO, June 28th, 2022

A solid data management strategy can reap rewards for any business seeking to capitalize on the value of data. Still, the road to data-driven decision-making remains rife with challenges and conundrums.

Some call data the new oil. Others call it the new gold. Philosophers and economists may argue about the quality of the metaphor, but there's no doubt that organizing and analyzing data is a vital endeavor for any enterprise looking to deliver on the promise of data-driven decision-making.

And to do so, a solid data management strategy is key. Encompassing data governance, data ops, data warehousing, data engineering, data analytics, data science, and more, data management, when done right, can provide businesses in every industry a competitive edge.

The 8 Best Data Mining Tools And Software To Consider For 2022
Solutions Review, July 1st, 2022

Solutions Review's listing of the best data mining tools and software is an annual mashup of products that best represent current market conditions, according to the crowd

Our editors selected the best data mining tools and software based on each solution's Authority Score; a meta-analysis of real user sentiment through the web's most trusted business software review sites and our own proprietary five-point inclusion criteria.

The editors at Solutions Review have developed this resource to assist buyers in search of the best data mining tools and software to fit the needs of their organization. Choosing the right vendor and solution can be a complicated process - one that requires in-depth research and often comes down to more than just the solution and its technical capabilities. To make your search a little easier, we've profiled the best data mining tools and software providers all in one place. We've also included platform and product line names and introductory software tutorials straight from the source so you can see each solution in action.

IT - Encryption
Evaluating The Use Of Encryption Across The World's Top One Million Sites
HelpNet Security, June 30th, 2022

A new report from security researcher and TLS expert Scott Helme, evaluates the use of encryption across the world's top one million sites over the last six months and reveals the need for a control plane to automate the management of machine identities in increasingly complex cloud environments.

The research suggests that while progress has been made in some areas, more education is needed to ensure that machine identities are used in the most effective way to protect our online world:

  • Use of TLSv1.2 has declined by 13% over the last six months, with v1.3 in use by almost 50% of sites - more than twice as many sites as v1.2. The adoption of v1.3 is being driven by widespread digital transformation. initiatives, cloud migration and new cloud native stacks that default to v1.3.

  • Even though organizations are adopting stronger TLS protocols, they are failing to couple this with a move to stronger keys for TLS machine identities. Industry-standard ECDSA keys are now used by just 17% of websites - up from 14% six months ago. Slower, less secure RSA keys are still used by 39% of the top one million websites.

  • Growth in the adoption of HTTPS has plateaued at 72% - the same level as in December.

'The fact that companies are deploying TLS v1.3 with machine identities using RSA keys shows there is still a lot of progress to be made with machine identity management.

IT - Tape
Spectra Logic: A Niche Storage Empire
Blocks&Files, June 28th, 2022

Over 43 years Spectra Logic has built a niche tape, archive, nearline, object, on-premises, and multi-cloud data management empire.

Quantum is the only other standalone tape library and adjacent systems supplier. Along with Spectra Logic, both are the twin survivors of the once bustling tape hardware and software business. Both are also seeing a renaissance of tape as hyperscalers realize that it is the best available archive medium in a world of unceasing unstructured data growth.

Spectra Logic is based in Boulder, Colorado, and supplies tape libraries plus a set of frontend systems for object storage caching, nearline storage, hierarchical, and multi-cloud storage management. It has more than 20,000 installations in over 80 countries and has amassed 125 patents, 19 filed by the founder. It has made just one acquisition, from which it gained its name, and has been profitable for quite a while.

What's Driving The Resurgence In Tape Storage Use?
SearchStorage, June 30th, 2022

Tape storage use has had a recent revival as a result of its air-gapped protection from ransomware. But that's not the only reason why businesses use the legacy technology.

For well over a decade, IT vendors and experts alike have proclaimed tape to be dead. However, the rumors of tape's demise have been greatly exaggerated.

Tape storage technology is in the middle of a resurgence. This renaissance is the result of a number of factors, including improvements in the technology and its ability to protect against cyber attacks.

IT - Sales
5 Proven Ways To Boost Sales Productivity Through Technology Powerplay, June 27th, 2022

With the ever-changing business landscape, sales productivity is the constant goal that eludes organization

Most organizations fail to keep up with dynamic customer and market needs and lose out on opportunities. The advent of technology and advanced analytics can enable the sales team to boost productivity multifold.

The sales teams deploying new-age methods to boost sales are not able to hit the targets, affecting their sales managers and their companies. There are several tools and tactics that can help organizations drive sales productivity. Below are a few methods that are proven to increase productivity...

Reform Or Perish: Sales Cycles Can No Longer Function With Poorly Targeted Outreach
AiTHORITY, June 27th, 2022

Sales intelligence tools are influencing B2B sales cycles with an unmatched effectiveness.

Yet, a very high percentage of B2B salespeople wondered why they don't get enough assistance from these sales tools in the beginning of every sales cycle.

How would you react if you were told that one-fifth of the monthly outreach calls would never materialize into a sale despite using best sales technologies?

According to a latest research on B2B Sales outreach data, sales team waste more than 45 hours every month on such outreach calls. That's close to 2500 hours in a year! This drain in sales is happening despite B2B sales teams having access to best of sales intelligence and sales planning tools. Lusha found almost 50% of B2B sales professionals believe wrongly targeted sales outreach.

IT - Marketing
10 Essential Data-Driven B2B Email Marketing Strategies
SmartDataCollective, June 29th, 2022

Big data is the key to successful email marketing campaigns, so it must be used effectively.

Big data technology is leading to a lot of changes in the field of marketing. A growing number of marketers are exploring the benefits of big data as they strive to improve their branding and outreach strategies.

Email marketing is one of the disciplines that has been heavily touched by big data. If you want to make the most of your big data strategy, you should keep reading to learn how to incorporate data into email marketing.

Marketing Trends In 2022: How Does It Look Like?
TechZone360, June 28th, 2022

An effective marketing tactic has been utilized in order to make an effective promotion of platforms, come up with ads that evaluate specific audiences or demographics with keywords and hashtags on social network websites with retargeting campaigns.

In general, marketing in 2022 will be a subject matter for those business owners who usually take risks, invest in their brand, follow customers' interactions online more closely and attentively than ever before, or spot setbacks, as competition continues to change at an unprecedented pace.

From this point of view, we recommend you to contact the lead generation agency and get a consultation in terms of how to choose a suitable marketing model. Effective marketing always requires both deep thinking and quick results, so effective storytelling will be even more significant to an organization's success than ever before.

IT - Developer
Over A Decade In Software Security: What Have We Learned?
IT Security Guru, July 1st, 2022

Shifting Right Towards Resilience, Quality, and Security with Synopsys & BSIMM

With over a decade experience in software security, what can Synopsys teach us? Managing Consultant Adam Brown presented this very subject at Infosecurity Europe 2022, with the help of Synopsys's BSIMM metrics.

The Building Security in Maturity Model (BSIMM) is an assessment done by Synopsys that helps firms analyse the state of their software security. This understanding then allows these firms to repair where they are going wrong. Currently on the 12th iteration of BSIMM, the 13th is on the horizon. According to Adam Brown, Managing Consultant, through an interview-driven process, Synopsys works with 231 firms to produce reports and aggregate this data for free availability at

DDN News
DDN Wins Artificial Intelligence Breakthrough Award For Third Consecutive Year
DDN News, June 30th, 2022

Prestigious Award Recognizes DDN AI and Machine Learning Solutions in Enterprise Digital Transformation, Business Analytics, Research, and Autonomous Driving

DDN announced that it has received its third consecutive 'AI Hardware Innovation Award' in the annual AI Breakthrough Awards program conducted by AI Breakthrough, a leading market intelligence organization that recognizes technological and product leadership in global AI and AI-driven digital transformation markets.

DDN was recognized for its DDN A3I (Accelerated, Any-Scale AI) AI400X system, which has been instrumental in bringing unmatched operational excellence for enterprise digital transformation initiatives in AI, financial services, healthcare, manufacturing, autonomous driving, research, and other enterprise IT infrastructures. DDN has delivered powerful, easy-to-deploy, market-leading and data management solutions to thousands of organizations globally.

Cisco News
Cisco Helps Service Providers Build A Sustainable Internet For The Future With Advancements To Its Converged Network Solution To Lower Costs
Cisco News, June 27th, 2022

Cisco has enhanced its Routed Optical Networking solution with new products and features that can help customers save up to 45% in power and up to 70% in real estate/space for equipment.

Cisco announced advancements to its Routed Optical Networking solution, delivering on its commitment to redefine the economics of the internet and help communication service providers close the digital divide by connecting more people, places, and things.

Cisco unveiled its technology strategy for the Internet for the Future in December 2019, featuring new silicon, optics, and software to help service providers reduce the costs of building and extending their networks to reach more people. Cisco later announced its ground-breaking Routed Optical Networking architecture in March 2021, featuring converged networking protocols, reduced networking layers, advanced automation tools and simplified network access to foster open networking and prepare for the rise of 5G.

Cisco Joins Forces With GDIT To Deliver Private 5G To Government Agencies
Cisco News, June 28th, 2022

Together, Cisco and GDIT can provide government agencies with simple and intuitive private 5G solutions for IoT and edge use cases.

Cisco announced its expanded relationship with General Dynamics Information Technology (GDIT), a business unit of General Dynamics (NYSE:GD), to deliver Cisco Private 5G services to a broad set of government entities.

GDIT has been providing comprehensive IT solutions to Federal, State, and Local governments for more than three decades, and has partnered with Cisco since the 1980s to deliver cutting-edge innovation. Combining GDIT's extensive background and close understanding of use cases for government agencies and its expertise in cybersecurity, artificial intelligence, edge computing, and IoT devices with Cisco's secure and reliable private 5G service will provide an end-to-end tailored solution for each customer to achieve its desired mission outcomes.

Oracle News
Celebrating HR Heroes Around The World
Oracle News, June 28th, 2022

As the pandemic disrupted workers across every industry, organizations around the world turned to their HR leaders to help weather the storm

And HR leaders have risen to the challenge, working tirelessly to ensure employees could stay productive, happy and safe.

In addition to the ever-evolving work environments, employee needs and values are continuously changing. Over the past few years, we've seen a renewed focus on skills, wellness and mental health, diversity and inclusion, and overall employee experience.

Commvault And Oracle Partner To Deliver Metallic Data Management As A Service On Oracle Cloud Infrastructure To Accelerate Enterprise Hybrid Cloud Adoption
Oracle News, June 29th, 2022

OCI coupled with Metallic data management as a service (DMaaS) enables enterprise customers to protect and secure their data against threats, adhere to local data residency laws, and ease data management and recovery

Commvault, a global enterprise leader in intelligent data services across on-premises, cloud, and SaaS environments, has expanded its strategic partnership with Oracle to include Metallic DMaaS on Oracle Cloud. As part of Commvault's multi-cloud strategy, Metallic's industry-leading services will be offered on Oracle Cloud Infrastructure (OCI) and available in all commercial OCI regions globally.

Destination Retailer, Event Network Taps Oracle Retail To Engage Customers Throughout Each Store
Oracle News, June 30th, 2022

Mobile Point-of-Service arms store associates to better help customers get what they need throughout the store and checkout faster

Event Network is a leading operator of gift shops for aquariums, zoos, museums, science centers, botanical gardens, and other highly regarded cultural attractions. To better serve guests and these unique destinations, the company is upgrading its existing Oracle Retail Xstore Point-of-Service (POS) and adopting Oracle Retail Xstore Office cloud services. With the mobile retail POS, dynamic currency conversion and a checkout process, store associates are better equipped to help assist guests throughout their shopping journey as they discover meaningful items and mementos to commemorate their visit.

New Netsuite Program Rewards Customers And Community For Peer Referral
Oracle News, June 28th, 2022

We are lucky to have a highly engaged community of customers, partners and independent consultants that know our product inside and out.

This community has experienced the benefits of NetSuite firsthand, and often advocates on our behalf, recommending our products to peers at other organizations.

To recognize and reward our community, I'm excited to announce a new referral program, SuiteReferral. The new program offers rewards and exclusive benefits to organizations that invite peers to join the NetSuite community, with no costs attached or ongoing requirements for membership.

Oracle Becomes First Hyperscaler To Open A Cloud Region In Mexico
Oracle News, June 30th, 2022

39th cloud region continues Oracle's momentum in expanding its global cloud region footprint

Public and private organizations from sectors including telecommunications, financial services, and the public sector will benefit from Oracle Cloud Infrastructure's price-performance, built-in security, and disaster recovery capabilities

Underscoring Oracle's commitment to sustainability across its worldwide cloud regions, the new region in Queretaro will be powered with 100 percent renewable energy by 2025

Oracle Named Overall Digital Innovation Award Winner By Ventana Research
Oracle News, June 29th, 2022

15th Annual Digital Innovation Award selects Oracle ME as most innovative product of the year

Oracle has been named the overall winner of Ventana Research's 15th Annual Digital Innovation Awards for its Oracle ME employee experience platform.

The Digital Innovation Awards highlight technology providers that exemplify innovation and strive to create solutions that improve people, processes, information, and technology. This awards program recognizes achievements in innovation across the entire technology industry, including analytics, customer experience, data, digital business, digital technology, human capital management, marketing, office of finance, office of revenue, and operations and supply chain.

Oracle Payment Cloud Service Lets Restaurants Accept All Major Payment Options And Eliminate Hidden Fees
Oracle News, June 28th, 2022

With a fixed fee rate and no long-term contract, new payment processing service enables restaurants to avoid excessive costs while giving diners choice in how they pay

The accelerated use of digital payments has created more options for diners, but also complexity and cost for restaurants. Eliminating this headache, Oracle today announced the Oracle Food and Beverage Payment Cloud Service. With the service, restaurants in the US can now accept the latest in contactless payment options, including debit/credit cards and Apple Pay, Google Pay, and Samsung Pay, without hidden fees and unpredictable costs. Unlike some other solutions on the market, Payment Cloud Service offers transparent, fixed fee rate pricing with no long-term contract or monthly minimum requirements. And as the service runs on Oracle Cloud Infrastructure (OCI), it has high security standards, end-to-end encryption, and is PCI/DSS compliant. This means restaurants can give their customers choice in how they pay, all while operating with predictable payment processing costs that support a healthier bottom line.

Oracle Scales Up Billing For 10 Million Enterprise Accounts
Oracle News, June 30th, 2022

Billing performance test demonstrates high throughput and processing efficiency of Oracle Cloud Scale Billing on OCI, reducing bill run time by 94%

Communications service providers (CSPs) are quickly upgrading their billing systems to monetize growing demand for enterprise services including 5G-enabled internet of things (IoT) solutions. To succeed, CSPs will have to scale to concurrently support multiple pricing and payment models across large employee bases or millions of IoT devices.

Helping CSPs address these demands, the Oracle Communications Cloud Scale Billing solution was recently put to the test. Running on Oracle Cloud Infrastructure (OCI) and using Oracle Container Engine for Kubernetes (OKE), the solution completed a bill run for 10 million accounts across eight representative CSP enterprise customers in 4.5 hours. Oracle achieved a processing throughput of 2.29 million accounts billed per hour and 680,000 accounts invoiced in eight minutes, representing a 94% reduction in bill run completion time.

Utilities Worldwide Supercharge Operations With Oracle Cloud
Oracle News, June 28th, 2022

Water and electric utilities adopt Oracle cloud solutions to get up and running faster, automate data management, and boost customer service

Utilities are rapidly adopting Oracle Utilities Cloud applications to improve customer service, billing, asset management, meter management, and other essential services. Today, more than 210 utilities are serving 107 million households and nearly 10 million smart meters worldwide with Oracle Energy and Water cloud solutions.

Oracle Cloud for Utilities solutions include Oracle Utilities Customer Cloud Service, Oracle Utilities Billing Cloud Service, Oracle Customer Experience for Utilities, Oracle Utilities Work and Asset Cloud Service, Oracle Opower solutions, and more. Visit here to learn more.

VMware News
VMware Named 2022 HPE Global Technology Partner Of The Year
VMware News, June 28th, 2022

VMware recognized for embodying partnership-first value and commitment to helping mutual customers unleash their growth potential and achieve better business outcomes

VMware announced the company was named the 2022 HPE Global Technology Partner of the Year. This award recognizes VMware as an HPE partner that exemplifies commitment and success in delivering value to customers on their digital transformation journey.

VMware Wins 2022 HPE Global Technology Partner of the Year (Graphic: Business Wire)

'For our mutual customers, VMware is and remains a core technology stack built to run their most critical enterprise applications. It's an honor to celebrate VMware as an HPE partner that consistently delivers exceptional financial performance, cutting-edge innovation, and meaningful business results,' said George Hope, Worldwide Head of Partner Sales, HPE. 'HPE and VMware continue to closely collaborate to meet the demands of today's customers pursuing data-first modernization from the edge to the cloud, with a strong portfolio of HPE GreenLake solutions that include virtualization, cloud and mobility solutions and services.'

VMware Unveils vSphere+ and vSAN+
VMware News, June 28th, 2022

To Simplify Operations with Centralized Infrastructure Management, Increase Developer Velocity with Integrated Kubernetes, and Extend On-Premises with Hybrid Cloud Services

VMware unveiled VMware vSphere+ and VMware vSAN+ to help organizations bring the benefits of the cloud to their existing on-premises infrastructure with no disruption to their workloads or hosts. Introduced at VMworld 2021 as a technology preview known as Project Arctic, these new offerings will help customers enhance their infrastructure by providing centralized cloud-based infrastructure management, integrated Kubernetes, access to new hybrid cloud services, and a flexible subscription model.

'VMware vSphere+ and VMware vSAN+ represent the next major evolution of those foundational solutions that customers know and trust,' said Krish Prasad, senior vice president and general manager for VMware Cloud Platform Business, Cloud Infrastructure Business Group, VMware. 'Wherever customers are on their digital transformation journey and in executing their cloud strategy, vSphere+ and vSAN+ will help accelerate their transformation by bringing the benefits of cloud to their existing on-premises infrastructure and workloads, along with simplified consumption via a flexible subscription model.'

Dell News
Break Down Data Silos With A Data Lakehouse
Dell Technologies, June 27th, 2022

This solution provides self-service and on-demand workloads for on-prem/co-lo data lakehouses, supporting BI and ML in one place.

In the data-driven era, you must be able to generate value from all your data capital, from the intelligent edge to core data centers to multiple clouds. But the distributed nature of data can make that complex and costly - setting up barriers to insight and innovation. Traditional data management systems, like data warehouses, have been used for decades to store structured data and make it available for analytics. However, data warehouses aren't set up to handle the increasing variety of data - text, images, video, Internet of Things (IoT) - nor can they support artificial intelligence (AI) and Machine Learning (ML) algorithms that require direct access to data.

Data Protection Suite Continues Momentum With Latest Updates
Dell Technologies, June 29th, 2022

Avamar, NetWorker and Data Protection Advisor headline the latest feature enhancements.

The latest releases of Dell Avamar, NetWorker, Data Protection Advisor and Data Protection Central are now available. The new release adds to a string of new updates and innovations to Dell Data Protection Suite and continues the momentum of the Dell Data Protection software portfolio in the marketplace.

As two of the three data movers in Data Protection Suite, Avamar and NetWorker play critical roles in delivering efficiency, flexibility and reliability to customer data protection operations. These updates maintain that path and represent Dell's ongoing commitment to Data Protection Suite, its components and its thousands of customers.

ESG At Dell Technologies: Our Purpose In Action
Dell Technologies, June 30th, 2022

Using technology to positively impact our people and the planet is in our DNA, and it's been demonstrated in our purpose for decades.

At Dell Technologies our purpose is to create technologies that drive human progress. Since the day we were founded almost 40 years ago, we have used technology to positively impact people, global communities and the planet. It's in our DNA and it's one of the reasons I joined Dell nine months ago. I believe in the role technology and technologists can play in the world, and Dell's long-term commitments and actions to drive meaningful change.

Real impact doesn't happen without a plan, and Dell has had a plan - for 2020, for 2030, and beyond. And, as this space continues to evolve, we are committed to evolving with it. Our FY22 ESG Report combines Diversity & Inclusion, Supply Chain Responsibility and Progress Made Real metrics, goals and progress into a single report. Our commitment to environmental, social and governance (ESG) is our purpose in action. It brings together who we are with what we do.

Integration-As-A-Service: Transforming The Integration Experience
Dell Technologies, June 29th, 2022

INaaS is enabling the Dell data ecosystem transformation by revolutionizing the way integration services are offered to users.

Integration as a Service (INaaS) is a Dell Technologies integration service that enables Dell Digital and business teams to build, migrate, monitor and manage a wide range of integration solutions through a unified, easy-to-use, secure and compliant online portal.

Data Integration Platforms (DIP) is an internal organization within Dell Digital which accelerates business outcomes by providing secure, robust & 'as-a-service' platform solutions. These DIP solutions enable the enterprise applications to integrate anything, anywhere and anytime. INaaS plays a key role in facilitating these integration services.

Unique OEM Technology Based On Your Needs
Dell Technologies, June 29th, 2022

Bring your innovation to life with our unique, customized OEM Solutions.

In an earlier blog, we provided a high-level overview of how Dell Technologies OEM Solutions can make your job easier and bring your product or service to market faster. Today, we'll discuss how our unique, Intel-based OEM solutions are purpose-built to meet your needs right off the shelf.

Ready Designs, Based on your Needs

Many companies claim to listen and act on customer feedback, but how many can provide a concrete example? In our case, OEM product planning experts monitor customer requests daily, observing trends, such as increased requests for specific features, quickly.

Lenovo News
Lenovo Recognized As The Winner Of 2022 Microsoft Device Partner Of The Year
Lenovo News, June 29th, 2022

The company was honored among a global field of top Microsoft partners for demonstrating excellence in innovation and implementation of customer solutions based on Microsoft technology.

'I am excited and proud that Lenovo has been recognized as Microsoft's Device Partner of the Year. This award is a testament to both companies' shared commitment in delivering industry-leading services for our customers.' said Ken Wong, Executive Vice President of Lenovo, and President of Lenovo Solutions and Services Group. 'With our partners, Lenovo works tirelessly to help businesses leverage our end-to-end capabilities - from device to the cloud - to transform their visions into reality.'

Work For Humankind: World Of Possibilities Opens Up For Remote Island With Lenovo Technology
Lenovo News, June 27th, 2022

Work for Humankind enables Lenovo to support ongoing conservation work from one of the world's most far-flung workspaces on Robinson Crusoe Island through lasting technology solutions

As part of its landmark partnership with Island Conservation and the Robinson Crusoe Island community, Lenovo reveals the next stage of its Work for Humankind project: critical pieces of smarter technology installed throughout the island will become permanent fixtures to leave a lasting legacy and stronger connectivity on an island that's home to one of the world's most diverse ecosystems.

Bridging the digital divide, a previously isolated island of 900 people will now remain connected to the world through Lenovo technology to open new possibilities for tourism, trade, employment, and education, increasing its environmental and economic resilience. For the first time ever, this remote island community has self-determined, equitable access to the internet. This is their most important advancement regarding connectivity in more than 20 years.

Nutanix News
From Scholarship Recipient To Nutanix Software Engineer
Nutanix News, June 28th, 2022

Proud to call herself a woman in engineering, Nađa (Nadja) Gavrilović was recently hired as a full-time engineer for our team in Serbia after previously being awarded one of our Nutanix .heart Advancing Women in Technology (AWIT) Scholarships.

We spoke with Nađa about her new hire experience at Nutanix, the impact of receiving the AWIT scholarship, and her transition from student to full-time employee at Nutanix.

Share with us your role at Nutanix?

I recently joined the Nutanix team as a software engineer. I work with an amazing Serbian team of engineers developing new platforms and solutions. I'm very proud of it.

The Power Of Partner Ecosystems
Nutanix News, June 28th, 2022

Technology ecosystems are gaining in strategic value across customers, partners, and vendors alike - and the reason is simple.

Customers need to unlock innovation from their IT investments, and they will need a diverse stack of technologies to work well together to achieve their goals.

That's why HPE and Nutanix established a strategic partnership, to help our joint customers achieve their cloud, digital transformation, and operational excellence goals.

Today, Nutanix is honored to be awarded the 2022 HPE GreenLake Ecosystem Partner of the Year. It is the culmination of the past three years of teamwork, solution innovation, and most importantly - customer value creation.

Fortinet News
Fortinet Xperts Summit 2022 Regional Events For Partners
Fortinet News, June 27th, 2022

With new, sophisticated cyber threats continuing to impact the security of businesses around the world, it is crucial that organizations have the support needed to defend against them. This includes the partners they rely on for security expertise

Fortinet holds annual, regionally operated XPERTS Summit events for its partners to ensure they are up to date on the latest Fortinet technology and solutions and are maintaining their cybersecurity expertise. Regional events will start kicking off in June.

The Value of the Fortinet XPERTS Summits for Partners

Fortinet regional XPERTS Summits are tailored, hands-on training events designed for highly skilled engineering partners. These summits help partners learn new skills and gain technical training that, in turn, helps them differentiate themselves in a competitive market. In these training events, partners have the opportunity to work with a variety of Fortinet technology offerings to ensure they are up to speed on the latest and greatest, including Secure SD-WAN, OT security, zero-trust access, and FortiManager.

New 2022 SASE Market Trends Study Shows Solutions Exceed Expectations In Remote Work Connectivity And Security
Fortinet News, June 28th, 2022

Digital Services and Distributed Workforce Trends Accelerate Investments, According to CIO Research Sponsored by Masergy and Fortinet

Masergy, the software-defined network and cloud platform for the digital enterprise, and Fortinet, a global leader in broad, integrated and automated cybersecurity solutions, today released the results of a new Secure Access Service Edge (SASE) research study from CIO. The findings show recent trends are accelerating investments in SASE solutions with recognized benefits exceeding expectations across five key categories - most notably remote work connectivity and security performance.

This trend is the reason Fortinet and Masergy teamed up in 2020 to deliver a highly differentiated SASE architecture that converges security and networking. The Masergy-delivered SASE offering is built using Fortinet Secure SD-WAN, which converges highly scalable SD-WAN, next-generation firewall, advanced routing, and zero trust network access (ZTNA) into a single solution. Combined with Masergy's global software-defined network, 24/7 network and security management services, industry-leading service level agreements, and exceptional customer experience, the joint SASE offering helps redefine what is possible for future-thinking businesses.

Secure SD-WAN: The Foundation For Network Transformation
Fortinet News, June 30th, 2022

Over the past several years, virtualization and cloud adoption has led to a massive migration of applications and resources to cloud environments.

Today, nearly every organization has some portion of its resources in the cloud, with 89% of organizations having a multi-cloud strategy in place. And Gartner estimates that by 2025 over 95% of new digital workloads will be deployed on cloud-native platforms.

SD-WAN has played a pivotal role in enabling the global digital transformation of organizations. At first, it simply provided a more flexible way for branch offices to quickly connect to cloud-based applications. But as networks continued to evolve, SD-WAN became essential, providing fast and secure access between clouds, clouds and data centers, and as the centerpiece of SASE solutions that extend that same access coupled with security to home and mobile workers. Today, new SD-WAN platforms serve as essential building blocks for highly dynamic and broadly distributed networks. Here's a look at the evolution of SD-WAN over the past 8 years:

Securing The Infrastructure Of Today And Tomorrow
Fortinet News, June 30th, 2022

With a focus on the future challenges of securing today and tomorrow's infrastructure, EMEA-based Fortinet Field CISOs Joe Robertson and Alain Sanchez recently shared their thoughts on this important topic, commenting on the urgency around securing infrastructure and important strategies to help defend OT organizations.

Q: What is Critical Infrastructure Today?

JR (Joe Robertson): One of the key factors in defining infrastructure is that it's technology that everybody uses. For example, though you don't usually think of a street this way, it is technology. If you go back to the Roman era, the Roman roads were technology. They were 'the internet' 2000 years ago. Roads are still technology that is used by society today. So, when we talk about infrastructure, whether it's roads or electricity or plumbing or public transportation, these are all critical infrastructures to our modern society.

When critical infrastructure is not functioning, for whatever reason, this creates blockages in society. We have to be aware that attackers are looking at ways to disrupt societies. These are considerations that governments are worried about, and justifiably so.

Red Hat News
Red Hat Shares - Get Started With Cloud Services
Red Hat News, June 29th, 2022

In the last issue of Red Hat Shares, we introduced you to the basics of cloud services―what they are, what they do, who uses them and how they benefit organizations.

Now let's dig a little deeper and put the concept of cloud services into practice. (What better way to learn than to do, right?) In this issue, we'll explain how to use cloud, application and data services―as well as hosted tools―in our console, take you down a few cloud services-related learning paths, give you some tips when making cloud service provider choices and walk through how three companies have benefited from cloud services.

Friday Five - July 1, 2022
Red Hat News, July 1st, 2022

The Friday Five is a weekly Red Hat blog post with 5 of the week's top news items and ideas from or about Red Hat and the technology industry. Consider it your weekly digest of things that caught our eye.

  • Expanding U.S. healthcare travel benefits for access several healthcare services
  • CRN - Red Hat To Offer Pay-Per-Use OpenShift On HPE GreenLake
  • Red Hat Shares - Get started with cloud services
  • Red Hat Learning Community celebrates 100,000 members
  • Customer success stories: reducing costs and risks while increasing flexibility, scalability and productivity with Red Hat solutions and services

Read on for details

Harvard Business Review Analytics Services Report - Digital Transformation Refocused: New Goals Require New Strategies
Red Hat News, June 30th, 2022

The Covid-19 pandemic has been a catalyst for many organizations in their digital transformations, leading companies to expedite technology initiatives, design dramatic changes to processes and reexamine culture and the role it plays in today's new business world.

As some organizations find success in their digital transformation strategies, they are able to provide additional bandwidth to their teams to focus on improving customer experience through the collection and analysis of data.

Successful digital transformation allows for mistakes, encourages transparency and supports open communication. If new initiatives fail, retrospectives need to be encouraged at both the team and organization level. A lack of institutionalized open communication strategies will prevent the organization from learning, evolving and gaining strength through these failures. It's important to celebrate success and learning and invest in the employees and partners of the organization.

How Is Red Hat Addressing The Demand To Develop Offerings More Securely?
Red Hat News, July 1st, 2022

The IT industry not only looked very different 20 years ago, product security looked very different as well.

Open source software wasn't mainstream and the majority of vendors had full control and secrecy over their product code.

Today, however, almost every software vendor contributes to and incorporates open source software within their product or managed service (herein called "offerings"), but does this impact the security of these offerings? In particular, what is Red Hat doing to demonstrate that our offerings are developed in a secure manner and provide trustworthy solutions? Red Hat, like other software vendors, continues to monitor and participate in developing solutions which meet emerging market requirements, customer demand and ongoing cybersecurity requirements issued by governments around the world.

The Experience Of Bringing Openssl 3.0 Into Red Hat Enterprise Linux And Fedora
Red Hat News, June 27th, 2022

Red Hat Enterprise Linux 9 (RHEL 9) ships with OpenSSL 3.0, a core operating system (OS) library that has been in the making for quite a while. This was a long and involved process for a variety of reasons.

What's the big deal, why wasn't this just a normal package update? The previous major stable version was OpenSSL 1.1 and there is no 2.0 in the middle. The OpenSSL team decided to make an explicit jump in numbering to highlight that this new version included major structural, and more importantly, application programming interface (API) and application binary interface (ABI) changes compared to previous OpenSSL versions.

These changes affect applications that use the library in direct ways, sometimes by breaking compilation, and often in subtle ways by changing how the library behaves in some situations.

Citrix News
10 Reasons To Try Citrix DaaS Standard For Azure
Citrix News, June 27th, 2022

Organizations today are looking for a simple way to deliver apps and desktops on demand, from the cloud, with simplified management and a strong layer of security to keep data safe and off the device

We've designed Citrix DaaS Standard for Azure to directly meet the needs of today's remote work scenarios, enabling your business to expand when needed and giving your people the freedom to work wherever they want with a desktop-as-a-service (DaaS) solution.

Thinking about remote work and how VDI and DaaS might help? Citrix now offers Citrix DaaS Standard for Azure, a simple, easy-to-implement solution that is part of our Citrix DaaS family of cloud services and offers a low cost, secure way to deliver cloud-based Windows or Linux desktops and apps to your workforce. In this blog post, I'm going to cover the Top 10 reasons why customers are choosing Citrix DaaS Standard for Azure as their virtual desktops and apps solution and why you should, too.

Get Inspired: Microsoft Recognizes Citrix In Partner Of The Year Awards
Citrix News, June 29th, 2022

Citrix is more engaged than ever as one of Microsoft's strongest and most reliable partnerships

Globally we are a leader in driving Azure consumption with our Citrix DaaS solution; a visionary and innovator on the Azure Marketplace platform; and are expanding our services to bring new integrations to Windows 365. It's for these reasons and more that Citrix was named a Finalist for two Microsoft Partner of the Year awards.

Our commitment to Microsoft programs is accelerating value for customers looking to achieve more from their digital transformation. This value extends to customers of all sizes with Citrix DaaS, enabling them to quickly and easily start using powerful tools in a secure hybrid environment. Microsoft is more excited than ever about Citrix because of our ability to help customers migrate effectively to Microsoft Azure and Microsoft 365.

Marc O'Polo Sews Up Future Of Work With Citrix
Citrix News, June 28th, 2022

Fashion label designs digital workspace to enable secure work from anywhere

As one of the world's premium brands for casual wear, Marc O'Polo is always thinking ahead and on top of trends. While many companies viewed the shift to remote work as a pandemic-inspired fad, the Stockholm-based fashion label knew better and began designing a digital workspace that would allow its employees to work from anywhere using solutions from Citrix Systems, Inc. (NASDAQ: CTXS).

"Our goal is to create conditions under which our 2,000 employees worldwide can develop their full creativity and work together optimally, wherever they happen to be,' said Matthias Holzner, Manager IT Application & Collaboration, Marc O'Polo.

Now In Preview: Service Continuity For Chrome OS And Safari For MacOS
Citrix News, June 30th, 2022

It has been a busy Q2 for the service continuity team at Citrix. We have been focused on growing the adoption of the feature in Citrix Cloud and have been working with customers on testing and validation.

With hundreds of customers now taking advantage of service continuity, we even published a companion guide so you can conduct your own testing and simulate different outages.

In this blog post, I'll look the next round of innovation in service continuity.

Citrix and Chrome OS

One of the main advantages Citrix DaaS has over other solutions is its resiliency. Service continuity is our answer to the 'SLA question.' Service continuity was a complete redesign of our Citrix Cloud control plane, with design-for-failure as a guiding principle.

Supply Chain Delays Put Enterprises On Ransomware Risk Alert
Citrix News, June 28th, 2022

New research reveals majority of large businesses can't replace unsupported hardware, leaving potential vulnerabilities exposed

The continued global supply chain disruption is putting enterprises at increased risk from the likes of ransomware attacks, according to new research from Citrix.

The new study, based on a poll of 200 IT security decision makers in UK businesses employing over 250 people, explored the current supply chain landscape and its potential cyber-security implications.

It has revealed that four in five (80%) security leaders believe that supply chain issues or delays have put their organisation at increased risk from ransomware - for example, by being unable to replace unsupported hardware. A further 70 per cent believe their organisation is being specifically targeted by cyber-attackers in order to gain access to external systems and data, such as those in government or private enterprises.

What's New With Citrix DaaS And Citrix Virtual Apps And Desktops - June 2022
Citrix News, June 28th, 2022

One of the things I love most about being part of Citrix is the excitement around our latest innovations. It is rewarding to see how our customers leverage them to capture new opportunities to create the next frontier in their digital transformation

In this blog post, I'll share recent enhancements that we've brought to Citrix DaaS and Citrix Virtual Apps and Desktops that empower our customers with the flexibility to deliver apps and desktops quickly and securely with our robust desktop as a service (DaaS) and VDI solutions.

We have a lot of exciting enhancements to cover, so use the following links to help you quickly navigate between sections:...