IT Weekly Newsletter ©
Promethean Data Solutions
Monday June 26th 2017
    Home     Contact Us     About Us     What Others Are Saying Acquisition, Availability and Reliability, BackUp

The only IT Newsletter that is 100% unbiased in its content and delivery. We cut through the spin and get to the facts. Clean, unvarnished and fresh. Every week there are more than 400 online sources that contain articles of interest to IT Professionals at all levels. Every week the IT Weekly Newsletter compiles 12-20 of the absolute best technical articles with no product or company bias, no pop-up ads, no sales angles. addressing everyday issues involving:

Reducing Risk; Improving Quality of Service; Increasing Availability; Reducing Response Time: Increasing Business Productivity; Improving Server, Storage and Networks; Improving Security; Protecting, Preserving and Restoring Data; Improving Regulatory Compliance; Reducing Audit Errors; Reducing Cost and Developing Proactive Business Solutions.

Promethean Data Solutions

This Weeks IT Topics

IT Weekly Newsletter – June 26, 2017, Vol 17 No 24

47 Articles across 17 Subjects for the Week of 6-16-2017 to 6-22-2017

For Your Complimentary Subscription Click on 'Sign Up Now'


If you don't know WHY; HOW, WHAT and WHO don't matter!
The IT Weekly Newsletter is a compilation of 40+ technical articles from last week curated from on-line sources and arranged by subject.
No company reviews, no product reviews, no white papers and no press releases.

How Do You Manage Petabytes of Data?
Sponsored Link from Storage Switzerland


Big Data / Analytics

Bayesian vs Frequentist
Numbers War: How Bayesian vs. Frequentist Statistics Influence AI
The Register 6/22/17

Intelligent Graph Analytics
Finding Data Relationships with Intelligent Graph Analytics
Information Management 6/20/17

DVR for Data
‘DVR for Data’ Gives TIAA Deep Insights Into Its Digital Business
IT World 6/16/17


Cloud

Myths
The 2 Cloud Security Myths that Must Die
InfoWorld 6/16/17

Security Ladder,
Climbing the Security Maturity Ladder in Cloud
Dark Reading 6/15/17


Compliance

Top Certifications
The Top 6 Governance, Risk and Compliance (GRC) Certifications
IT World 6/19/17


Data Management

Governance Models
Don't Wait Until It's Too Late to Build a Data Governance Model
Search Data Management 6/22/17

Blockchain
Blockchain and Your Data
Upside 6/1/17


Email

Saying No
Save These Emails for the Next Time You Feel Bad About not Helping Your Coworkers
Fast Company 6/19/17


Encryption

Whack-A-Mole
Governments to Declare War on Mathematics and Dumb Criminals
ZDnet 6/18/17


Internet

IoT Over WiFi
For IoT Over WiFi, 802.11ax Is the New HaLow
NetworkComputing 6/22/17

IoT Security
IoT Security: Creating a Baseline Trace
NetworkComputing 6/20/17

Red Bull Racing F1 IoT
How Red Bull Racing Uses IoT to Win
IT World 6/21/17


Management

Data Breach Costs
Data Breach Costs Drop Globally But Increase in US
Dark Reading 6/20/17

Blockchain Collaboration
4 Ways Blockchain Is the New Business Collaboration Tool
ComputerWorld 6/20/17

Web-Scale IT
Web-Scale IT: Getting Started
NetworkComputing 6/16/17

Winning Team Traits
High-Performing IT Teams: 7 Winning Traits
NetworkComputing 6/19/17

Becoming Persuasive
7 Techniques to Make You More Persuasive
TLNT 6/19/17


Mobile Devices

Disparate Mobile Platforms
How TiVo’s CIO Manages Disparate Mobile Platforms
ComputerWorld 6/19/17


Networks

WAN Design Changes
How WAN Design is Changing
NetworkComputing 6/20/17

IoT Over WiFi
For IoT Over WiFi, 802.11ax Is the New HaLow
NetworkComputing 6/22/17

VDI Planning
VDI Planning: The Network Perspective
NetworkComputing 6/21/17

Wireless Troubleshooting
Wireless Troubleshooting: Lessons Learned
NetworkComputing 6/13/17

SD-WAN Security
When SD-WAN is More than SD-WAN
Network World 6/15/17

Hyperscale Switching
Hyperscale Data Centers Are Pushing the Limits In the Gigabit Ethernet Switching Market
Network World 6/15/17

IPv6 Truancy
Small Carriers Aren't Showing Up to Ipv6 Standards Chats, Consultant Warns
The Register 6/15/17


Operations

Microservices Pros & Cons
7 Reasons to Switch to Microservices — and 5 Reasons You Might Not Succeed
IT World 6/10/17

Vulnerable vs. Exploitable
Vulnerable vs. Exploitable: Why These are Different & Why it Matters
Business 2 Community 6/19/17

To Err Is Human
British Airways’ Outage, Like Most Data Center Outages, was Caused by Humans
Network World 6/8/17

White Box Servers
White Boxes Crushing the Traditional Server Market
Network World 6/12/17

Disparate Mobile Platforms
How TiVo’s CIO Manages Disparate Mobile Platforms
ComputerWorld 6/19/17

WannaCry Lessons
What have We Learned from WannaCry?
Network World 6/16/17

Hyperscale Switching
Hyperscale Data Centers Are Pushing the Limits In the Gigabit Ethernet Switching Market
Network World 6/15/17

£80M Outage
That Minutes-Long Power Glitch? It's Going to Cost British Airways £80m, IAG Investors Told
The Register 6/15/17


Project Management

Winning Team Traits
High-Performing IT Teams: 7 Winning Traits
NetworkComputing 6/19/17


Rabbit Sense

Saying No Via Email
Save These Emails for the Next Time You Feel Bad About not Helping Your Coworkers
Fast Company 6/19/17

Becoming Persuasive
7 Techniques to Make You More Persuasive
TLNT 6/19/17

Career Killers
9 Things that Will Kill Your Career
The Ladders 6/16/17

Interview Mistakes
8 Mistakes Smart People Never Make in Job Interviews
The Ladders 6/16/17


Security

Culture Shift
5 Pieces of Advice for Navigating the Security Culture Shift
Business 2 Community 6/22/17

Complex Passwords
Can’t Remember Complex Passwords? No Need to Worry!
Business 2 Community 6/21/17

IoT Baseline
IoT Security: Creating a Baseline Trace
NetworkComputing 6/20/17

Fact vs. Fiction
Cybersecurity Fact vs. Fiction
Dark Reading 6/20/17

Data Breach Costs
Data Breach Costs Drop Globally But Increase in US
Dark Reading 6/20/17

Vulnerable vs. Exploitable
Vulnerable vs. Exploitable: Why These are Different & Why it Matters
Business 2 Community 6/19/17

Invisible Invaders
Invisible Invaders: Why Detecting Bot Attacks Is Becoming more Difficult
Dark Reading 6/19/17

Get Employees Caring
How to Make Your Employees Care About Cybersecurity: 10 Tips
TechRepublic 6/19/17

MFA +/-
The Challenges and Benefits of Multi-Factor Authentication – MFA 101, Part 2
Business 2 Community 6/17/17

Password Pool
It’s Getting Deep In the Password Pool: Time To Drain It
Business 2 Community 6/16/17

Undetectable Threat,
Fileless Malware: An Undetectable Threat
TechRepublic 6/15/17

Cloud Myths
The 2 Cloud Security Myths that Must Die
InfoWorld 6/16/17

Cloud Ladder,
Climbing the Security Maturity Ladder in Cloud
Dark Reading 6/15/17

SD-WAN Security
When SD-WAN is More than SD-WAN
Network World 6/15/17

10 Jobs
Want A Career in Cybersecurity? Here Are 10 Jobs to Explore
TechRepublic 6/15/17


Servers / Sys Admins

White Boxes
White Boxes Crushing the Traditional Server Market
Network World 6/12/17


Storage

Managing Petabytes
Sponsored Link - How Do You Manage Petabytes of Data?
Storage-Switzerland 6/19/17


Technology

Red Bull Racing F1 IoT
How Red Bull Racing Uses IoT to Win
IT World 6/21/17

Healthcare Changes
5 Ways Technology Will Change the Future of Healthcare
TechRepublic 6/21/17

Key AI Concepts
4 Key AI Concepts You Need to Understand
InfoWorld 6/14/17

Smart Glasses
The 5 Surprising Things to Know About Smart Glasses
ComputerWorld 6/17/17

Robots and AI
Why Robots and AI Won't Replace Most Jobs Any Time Soon
TechRepublic 5/17/17

AI or Machine Learning
How to Tell If AI or Machine Learning is Real
InfoWorld 6/16/17


There are two ways of exerting one's strength; one is pushing down, the other is pulling up.
Booker T. Washington (1856-1915) American Educator



Acquisition, Availability and Reliability, BackUp

Monday June 26th 2017
Disk Storage Solutions: Storage Newsletters, Computing Solutions, Phoenix Disk Storage Solutions: Storage Newsletters, Computing Solutions, Phoenix Disk Storage Solutions: Storage Newsletters, Computing Solutions, Phoenix Promethean Data Solutions

Warren Avery
[P] 602-463-6558
[F] 480-219-6914
wavery@ITWeeklyNewsletter.com

Copyright © 2005 - 2010 - Site Engineered by Software Dynamix - Last Modified: 05/08/2010