IT Weekly Newsletter ©
Promethean Data Solutions
Wednesday June 29th 2016
    Home     Contact Us     About Us     What Others Are Saying Acquisition, Availability and Reliability, BackUp

The only IT Newsletter that is 100% unbiased in its content and delivery. We cut through the spin and get to the facts. Clean, unvarnished and fresh. Every week there are more than 400 online sources that contain articles of interest to IT Professionals at all levels. Every week the IT Weekly Newsletter compiles 12-20 of the absolute best technical articles with no product or company bias, no pop-up ads, no sales angles. addressing everyday issues involving:

Reducing Risk; Improving Quality of Service; Increasing Availability; Reducing Response Time: Increasing Business Productivity; Improving Server, Storage and Networks; Improving Security; Protecting, Preserving and Restoring Data; Improving Regulatory Compliance; Reducing Audit Errors; Reducing Cost and Developing Proactive Business Solutions.

Promethean Data Solutions

This Weeks IT Topics

IT Weekly Newsletter – June 27, Vol 16 No 25

63 Articles across 16 Subjects for the Week of 6-17-2016 to 6-23-2016

For Your Complimentary Subscription Click on 'Sign Up Now'


If you don't know WHY; HOW, WHAT and WHO don't matter!
The IT Weekly Newsletter is a compilation of 40+ technical articles from last week gleaned from sources arranged by subject; no company reviews, no product reviews, no white papers and no press releases.

The Road to Data Mobility – Consolidation, Storage Virtualization or Data Virtualization?
Sponsored Link from Storage Switzerland


Big Data / Analytics

Teamwork
Power of Teamwork in Data Science
Information Management 6/22/16

Effective Statistics
Ten Simple Rules to Use Statistics Effectively
Science Daily 6/20/16


Cloud

Data Location
Where does Your Cloud Data Live? 3 Questions to Ask
HelpNet Security 6/22/16

Private On-Premises
Creating a Public Cloud Experience in-House
Data Center Knowledge 6/21/16

FUD
Fear Your On-Premises Security, Not the Cloud
InfoWorld 6/17/16

Security Complications
Cloud, SDN, and Security Complications
NetworkComputing 6/15/16


Data Management

Data Lakes
The Data Lake: What It Is, What It's for, Where It's Going
Upside 6/10/16

Dark Age Quality
Is Data Quality Stuck in the Dark Ages?
Upside 6/8/16

Cloud Location
Where does Your Cloud Data Live? 3 Questions to Ask
HelpNet Security 6/22/16

Data-Driven Company
3 Ways to Become a Data-Driven Company
Business 2 Community 6/16/16

Departing Employees
How to Prevent Data from Leaving with a Departing Employee
IT World 6/18/16


Encryption

Enigma-Breaking HQ
Bletchley Park in 360: See Inside Britain's Enigma-Breaking HQ
cnet 6/23/16


Internet

Securing IoT
8 Tips to Secure Those IoT Devices
Network World 6/20/16

Bluetooth 5
Bluetooth 5: Five Things for IT to Know
InformationWeek 6/20/16

Behavior ID
How Behavior Online Will Identify You
Network World 6/17/16

Sensor Based World
An Insurer's Guide to the Sensor-Based World
Insurance Networking 6/14/16

ISPs on the Ropes
Sorry, ISPs: The FCC Finally Has the Dopes on the Ropes
InfoWorld 6/17/16

Net Neutrality
Net Neutrality Decision: what Matters, What Doesn't
NetworkComputing 6/15/16


Management

Measure Results
Measure Your Employees’ Results, not Their Time
Network World 6/21/16

Better Presentations
Three Better Ways to Start Your Next Presentation
Fast Company 6/21/16

Soft-Skill Gap
The Soft-Skills Gap You Haven’t Heard of
Fast Company 6/21/16

Leadership Engagement
5 Things Great Leaders Do to Inspire Great Engagement
TLNT 6/17/16

Ethical Hackers
Ethical Hackers: How Hiring White Hats Can Help Defend Your Organization Against the Bad Guys
TechRepublic 6/20/16

Oxymoron: Chinese Privacy
Gartner on Doing Business in China: Privacy? What’s That?
Network World 6/16/16


Mobile Devices

Employee Privacy
BYOD Can Pose Privacy Risks to Employees
IT World 6/23/16

911 Struggle
Why Smartphones Struggle with 911
Network World 6/2/16

Computer-Assisted Embarrassment
Does Your Smartphone Embarrass You?
Network World 6/20/16

High-End VR
High-End Mobile VR is Virtually Here
ComputerWorld 6/20/16

Sensor Based World
An Insurer's Guide to the Sensor-Based World
Insurance Networking 6/14/16


Networks

Squeezing Ethernet
10 Ways to Get the Most Out of Ethernet
NetworkComputing 6/21/16

Comfort Zone
Networking Education: Leave Your Comfort Zone
NetworkComputing 6/21/16

SDN Deployment
10 Things You Should Know About Deploying a Software Defined Network
TechRepublic 6/22/16

WAN NFV
The Case for WAN Acceleration as NFV
Network World 6/15/16

Bluetooth 5
Bluetooth 5: Five Things for IT to Know
InformationWeek 6/20/16

5G
The FCC is About to Take a Big Step To Superfast 5G Networks
Network World 6/20/16

New Wi-Fi Channel
The Fight Over a New Wi-Fi Channel is Coming to a Head
ComputerWorld 6/19/16

Five Signs
Five Signs an Attacker is Already in Your Network
Network World 6/16/16

Security Complications
Cloud, SDN, and Security Complications
NetworkComputing 6/15/16


Operations

Containers vs VMs
Read My Lips, says Docker: Containers aren't VMs
InfoWorld 6/21/16

Utility Incentives
How to Get Paid for Your Data Center Efficiency Project
Data Center Knowledge 6/21/16

Containers
Containers Commanding more IT Dollars, Survey Finds
InformationWeek 6/20/16

SaaS Startups
10 SaaS Startups Every Enterprise should Know
InformationWeek 6/22/16

Tenacious IT
Tenacious IT: 7 True-Life Tales of Techie Triumph
InfoWorld 6/22/16


Project Management

Free Tools
14 Best Free Project Management Software Programs 2016
TechWorld 6/23/16


Rabbit Sense

Professional Networking
7 Ways to Maintain Your Professional Network Without Annoying Your Contacts
Fast Company 6/22/16

Making Friends
Six Habits of People Who Make Friends Easily
Fast Company 6/22/16

Better Presentations
Three Better Ways to Start Your Next Presentation
Fast Company 6/21/16


Security

Predictions
Gartner’s top 10 Security Predictions
Network World 6/23/16

Unsecured Cameras
Unsecured Security Cameras Lead to Privacy Erosion
HelpNet Security 6/22/16

Securing IoT
8 Tips to Secure Those IoT Devices
Network World 6/20/16

Top Technologies
Gartner’s Top 10 Technologies for Information Security in 2016
Information Management 6/21/16

FUD
Fear Your On-Premises Security, Not the Cloud
InfoWorld 6/17/16

Cyber-Secure Vacation
5 Tips for Staying Cyber-Secure on Your Summer Vacation
Dark Reading 6/20/16

Phish Tracker
Trying to Track Down a Phisher
Network World 6/20/16

EMV Quagmire
The Retail EMV Quagmire
ComputerWorld 6/20/16

Ethical Hackers
Ethical Hackers: How Hiring White Hats Can Help Defend Your Organization Against the Bad Guys
TechRepublic 6/20/16

Adaptive
Why Everyone Is Rallying Around ‘Adaptive Security’: Part 1
Dark Reading 6/15/16

Top 10 Technologies
Top 10 Technologies for Information Security and Their Implications
HelpNet Security 6/17/16

Five Signs
Five Signs an Attacker is Already in Your Network
Network World 6/16/16

Departing Employees
How to Prevent Data from Leaving with a Departing Employee
IT World 6/18/16

How Secure
How Secure is Secure? Tips For Investing In the Right Strategy
Dark Reading 6/17/16

Cloud & SDN Complications
Cloud, SDN, and Security Complications
NetworkComputing 6/15/16


Servers / Sys Admins

Hacked Now What
Your Server Has Been Hacked. What Next?
Business 2 Community 6/16/16


Social Media

Emojis Risk
The Not-So-Cute Side of Emojis: Potential Security, Privacy, and Bandwidth Issues
TechRepublic 6/22/16


Storage

Storage Consolidation
Sponsored Link - The Road to Data Mobility – Consolidation, Storage Virtualization or Data Virtualization?
Storage-Switzerland 6/23/16

SSD Benefits
Solid-State Drives: 7 Things to Know
NetworkComputing 6/23/16

Top Storage Arrays
Top Unified Utility Storage Arrays – DCIG
Storage Newsletter 6/23/16


Technology

Micrometer Solar Cell
These Ultra-Thin Solar Cells Can Be Bent Around a Pencil
ComputerWorld 6/20/16

Terrifying AI
10 Terrifying Uses of Artificial Intelligence
TechRepublic 2/11/16

Supercomputers
The 10 Most Powerful Supercomputers in the World
Network World 6/20/16

Machine Learning
Real Or Virtual? The Two Faces of Machine Learning
InfoWorld 6/7/16

Touch-Sensitive Robots
Threading the Way to Touch-Sensitive Robots
Science Daily 6/17/16

Hairy 3D Printing
Researchers Open Hairy New Chapter in 3-D Printing
Science Daily 6/17/16


When you make a mistake, there are only three things you should ever do about it: 1. Admit it. 2. Learn from it, and 3. Don’t repeat it.
Paul 'Bear' Bryant, (1913 – 1983) Alabama Football Coach



Acquisition, Availability and Reliability, BackUp

Wednesday June 29th 2016
Disk Storage Solutions: Storage Newsletters, Computing Solutions, Phoenix Disk Storage Solutions: Storage Newsletters, Computing Solutions, Phoenix Disk Storage Solutions: Storage Newsletters, Computing Solutions, Phoenix Promethean Data Solutions

Warren Avery
[P] 602-463-6558
[F] 480-219-6914
wavery@ITWeeklyNewsletter.com

Copyright © 2005 - 2010 - Site Engineered by Software Dynamix - Last Modified: 05/08/2010