IT Weekly Newsletter ©
Promethean Data Solutions
Wednesday February 21st 2018
    Home     Contact Us     About Us     What Others Are Saying Acquisition, Availability and Reliability, BackUp

The only IT Newsletter that is 100% unbiased in its content and delivery. We cut through the spin and get to the facts. Clean, unvarnished and fresh. Every week there are more than 400 online sources that contain articles of interest to IT Professionals at all levels. Every week the IT Weekly Newsletter compiles 12-20 of the absolute best technical articles with no product or company bias, no pop-up ads, no sales angles. addressing everyday issues involving:

Reducing Risk; Improving Quality of Service; Increasing Availability; Reducing Response Time: Increasing Business Productivity; Improving Server, Storage and Networks; Improving Security; Protecting, Preserving and Restoring Data; Improving Regulatory Compliance; Reducing Audit Errors; Reducing Cost and Developing Proactive Business Solutions.

Promethean Data Solutions

This Weeks IT Topics

IT Weekly Article posts are a selection of 40+ Information Technology articles (no company or product reviews) culled each week from 280+ on line industry sources. This week's Subjects (# of articles): Backup (0), Big Data / Analytics (4), Business Continuity (0), Cloud (3), Compliance (2), Data Management (2), Databases (0), Devops (1), Disaster Recovery (0), Disk Technology (0), Email (1), Encryption (1), Iot (3), Management (6), Mobile Devices (2), Networks / Internet (5), Operations (5), Outsourcing / Colocation (0), Project Management (2), Rabbit Sense (5), Risk (1), Security (12), Servers / Sys Admins (0), Social Media (0), Storage (2), Tape (0), Technology (5) and Virtualization (0).



IT Weekly Newsletter – February 19,, 2018, Vol 18 No 7
52 Articles across 18 Subjects for the Week of 2-3-2018 to 2-15-2018


(The Complimentary Subscription button DOES NOT WORK, send an email to wavery@itweeklynewsletter.com
For LinkedIn - www.linkedin.com/in/wavery/en)



Click on Subject to go to Areas of Interest


Big Data / Analytics

(4), Data Science Trends, Golden Record, Better Security Data, Learn These 3 Languages

Cloud

(3), Few ROI Calculations, Clear Advantages, Network Innovations

Compliance

(2), GDPR Email, GDPR SOC 2 Audit

Data Management

(2), Top Security Threats, Data Overload

DEVOPS

(1), Better Security

EMAIL

(1), GDPR Compliant,

Encryption

(1), Perimeter Attacks

IoT

(3), Neglected Security, New Chips, Waking Up Devices

Management

(6), CISO Reporting Line, CISO Nightmares, What is ERP, People Side of Change, CIO-CFO Divide, Prepare For Ransomware

Mobile Devices

(2), Virtual Assistants, Waking Up Devices

Networks / Internet

(5), 5G & Terahertz, Router Configuration, 5G Standards, Cloud Innovations, Net Neutrality Affects

Operations

(5), GDPR SOC 2 Audit, SOC Analysts Disillusionment, Microservices Pitfalls, SaaS Guide, Hyper-Converged Requirements, 2nd Consolidation Wave

Project Management

(2), Difficult Relationships, Survival Tips

Rabbit Sense

(5), Breaking the Rules, Better Public Speaker, Too Attractive, Politeness Mistakes, Likable Habits

Risk

(1), Prepare For Ransomware

Security

(12), Top Data Threats, Fileless Super-Threat, Perimeter Attacks, Neglected IoT, CISO Nightmares, Better Analytic Data , Cryptojacking, Password Dilemmas, Server Breach Detection, Prepare For Ransomware, Automation Solution, Stretch Your Budget

Storage

(2), Legacy Transformation, Flash Past-Present-Future

Technology

(5), AI Buzzwords, Laser Breakthrough, Controlling Light Reciprocity, 4-D goggles, Olympic Wearables


#####################################



Big Data / Analytics
Back to Index

Crucial Data Science Trends CEOs Need to Know In 2018
Business 2 Community 2/15/18

The Golden Record: Explained
Business 2 Community 2/13/18

Better Security Analytics? Clean Up the Data First!
Dark Reading 2/12/18

Learn These 3 Languages Now If You Want to Become a Data Scientist
TechRepublic 8/14/17


Cloud
Back to Index

Fewer CIOs Running ROI Calculations for Cloud: Survey
Networks Asia 2/12/18

The Evidence Is In: The Cloud’s Advantages are Now Clear to Business
InfoWorld 2/13/18

Gartner: Networking Innovation in the Cloud Tops Vendors
Search Networking 2/8/18


Compliance
Back to Index

Ensuring That Email Data Is Compliant with GDPR Regulations
Information Management 2/8/18

Data is Global: SOC Audits are Vital Under EU’s New GDPR
Information Management 2/14/18


Data Management
Back to Index

Taking Steps to Thwart the 5 Top Data Security Threats
Information Management 2/14/18

When Does the Quest for More Data Become Data Overload?
Business 2 Community 2/13/18


DEVOPS
Back to Index

From DevOps to DevSecOps: Structuring Communication for Better Security
Dark Reading 2/15/18


EMAIL
Back to Index

Ensuring That Email Data Is Compliant with GDPR Regulations
Information Management 2/8/18

a name="Encryption">
Encryption
Back to Index

Encrypted Attacks Continue to Dog Perimeter Defenses
Dark Reading 2/14/18


IoT
Back to Index

IoT Device Security is Being Seriously Neglected
Business 2 Community 2/13/18

New IoT Chips Speed Encryption, Dramatically Reduce Power Consumption and Memory Requirements
TechRepublic 2/13/18

New Method for Waking Up Devices
Science Daily 2/12/18


Management
Back to Index

Reporting Line of the CISO: Why Reporting to the CIO is Increasingly a Problem in Large Firms
Business 2 Community 2/13/18

Security Nightmares: These 3 Threats Keep CISOs Up at Night
TechRepublic 2/13/18

What Is ERP? A Guide to Enterprise Resource Planning Systems
CIO 2/12/18

7 Tips to Focus on the People Side of Change
TLNT 2/12/18

How to Bridge the CIO-CFO Divide in Your Organization
TechRepublic 2/12/18

Prepare Now for Ransomware
Risk Management Monitor 2/12/18


Mobile Devices
Back to Index

What the Virtual Assistant Battle is Really All About, in a Single Word
ComputerWorld 2/15/18

New Method for Waking Up Devices
Science Daily 2/12/18


Networks / Internet
Back to Index

5G Won’t Cope, Terahertz Will Provide more Bandwidth
Network World 2/8/18

Five Ways to Check If Your Router is Configured Securely
Networks Asia 2/8/17

5G Won't Just Be Fast, It'll Do the ML-Fueled Self-Optimization Thing
The Register 2/12/18

Gartner: Networking Innovation in the Cloud Tops Vendors
Search Networking 2/8/18

8 Ways the End of Net Neutrality May Affect IT Departments
TechRepublic 2/8/18


Operations
Back to Index

Data is Global: SOC Audits are Vital Under EU’s New GDPR
Information Management 2/14/18

One in Three SOC Analysts Now Job-Hunting
Dark Reading 2/12/18

3 Common Pitfalls of Microservices Integration—and How to Avoid Them
InfoWorld 2/14/18

SaaS-Ifying Your Enterprise Application? A Quick-and-Dirty Guide
InfoWorld 2/9/18

Five Requirements for Hyper-Converged Infrastructure Software
Data Center Knowledge 2/8/18

This Wave of Data Center Consolidation is Different from the First One
Data Center Knowledge 2/8/18


Project Management
Back to Index

Difficult Relationships: 5 Easy Ways to Improve Them, Backed by Research
The Ladders 2/11/18

5 Survival Tips for Reluctant Project Managers
TechRepublic 2/7/18


Rabbit Sense
Back to Index

Consider These 5 Things Before You Break the Rules in Your Career
Fast Company 2/14/18

27 Tips to Be a Better Public Speaker
The Ladders 2/12/18

Here’s How Attractiveness Can Hurt You at Work
The Ladders 10/27/17

7 Politeness Mistakes You Could be Making At Work — Even If No One’s Broken It to You Yet
The Ladders 1/29/18

11 Habits of Ridiculously Likeable People
The Ladders 10/19/17


Risk
Back to Index

Prepare Now for Ransomware
Risk Management Monitor 2/12/18


Security
Back to Index

Taking Steps to Thwart the 5 Top Data Security Threats
Information Management 2/14/18

Fileless Malware: Not Just a Threat, but a Super-Threat
Dark Reading 2/14/18

Encrypted Attacks Continue to Dog Perimeter Defenses
Dark Reading 2/14/18

IoT Device Security is Being Seriously Neglected
Business 2 Community 2/13/18

Security Nightmares: These 3 Threats Keep CISOs Up at Night
TechRepublic 2/13/18

Better Security Analytics? Clean Up the Data First!
Dark Reading 2/12/18

What Is Cryptojacking? How to Prevent, Detect, and Recover From It
Networks Asia 2//12/18

Risking Security for an Easy Life: People’s Password Dilemmas Revealed
Networks Asia 2//5/18

Managing Security through Server Breach Detection
Networks Asia 2/12/18

Prepare Now for Ransomware
Risk Management Monitor 2/12/18

20 Signs You Need to Introduce Automation into Security Ops
Dark Reading 2/8/17

7 Ways to Maximize Your Security Dollars
Dark Reading 2/5/18


Storage
Back to Index

6 Ways to Transform Legacy Data Storage Infrastructure
NetworkComputing 2/12/18

How Flash is Panning Out in the Enterprise
The Register 2/14/18


Technology
Back to Index

AI and Machine Learning: Breaking Down Buzzwords
Dark Reading 2/13/18

Tricking Photons Leads to First-of-Its-Kind Laser Breakthrough
Science Daily 2/12/18

Breakthrough in Controlling the Transmission Of Light
Science Daily 2/8/18

New '4-D Goggles' Allow Wearers to Be 'Touched' By Approaching Objects
Science Daily 2/8/18

How Wearable Tech Will Help Winter Olympic Athletes Skate Faster and Stay Warm
TechRepublic 2/8/18

Quote

What separates us from the chaos is out ability to mourn people we've never met.

David Levithan (1072 - ) American Author



Acquisition, Availability and Reliability, BackUp

Wednesday February 21st 2018
Disk Storage Solutions: Storage Newsletters, Computing Solutions, Phoenix Disk Storage Solutions: Storage Newsletters, Computing Solutions, Phoenix Disk Storage Solutions: Storage Newsletters, Computing Solutions, Phoenix Promethean Data Solutions

Warren Avery
[P] 602-463-6558
[F] 480-219-6914
wavery@ITWeeklyNewsletter.com

Copyright © 2005 - 2010 - Site Engineered by Software Dynamix - Last Modified: 05/08/2010