IT Weekly Newsletter ©
Promethean Data Solutions
Monday September 25th 2017
    Home     Contact Us     About Us     What Others Are Saying Acquisition, Availability and Reliability, BackUp

The only IT Newsletter that is 100% unbiased in its content and delivery. We cut through the spin and get to the facts. Clean, unvarnished and fresh. Every week there are more than 400 online sources that contain articles of interest to IT Professionals at all levels. Every week the IT Weekly Newsletter compiles 12-20 of the absolute best technical articles with no product or company bias, no pop-up ads, no sales angles. addressing everyday issues involving:

Reducing Risk; Improving Quality of Service; Increasing Availability; Reducing Response Time: Increasing Business Productivity; Improving Server, Storage and Networks; Improving Security; Protecting, Preserving and Restoring Data; Improving Regulatory Compliance; Reducing Audit Errors; Reducing Cost and Developing Proactive Business Solutions.

Promethean Data Solutions

This Weeks IT Topics

IT Weekly Newsletter – September 25, 2017, Vol 17 No 36

(The Complimentary Subscription button DOES NOT WORK, send an email to wavery@itweeklynewsletter.com
For LinkedIn - www.linkedin.com/in/wavery/en)

48 Articles across 18 Subjects for the Week of 9-15-2017 to 9-21-2017

If you don't know WHY; HOW, WHAT and WHO don't matter!
The IT Weekly Newsletter is a compilation of 40+ technical articles from last week curated from on-line sources and arranged by subject.
No company reviews, no product reviews, no white papers and no press releases.

Big Data / Analytics

Modeling Practices
6 Data Modeling Best Practices for Better Business Intelligence
https://www.information-management.com/opinion/6-data-modeling-best-practices-for-better-business-intelligence
Information Management 9/20/17


Cloud

Security Fears
Public, Hybrid Cloud Security Fears Abound
Dark Reading 9/16/17

GDPR Compliance
3 Key Steps to Vet Cloud Services for GDPR Compliance
Information Management 9/19/17

Up-Front Analysis
Up-Front Analysis Pays Off for Organizations Moving to the Cloud
Information Management 9/20/17

Deciding
How To Decide Between Cloud, On-Premise and as-a-Service
Networks Asia 4/17/17

Storage Considerations
Choosing a Cloud Provider: 8 Storage Considerations
NetworkComputing 9/13/17


Compliance

Three Things
Compliance and Your Data Center: Three Things to Know
Networks Asia 9/20/17

GDPR Guide
A 9-Step Guide to Prepare for GDPR Compliance
Information Management 9/21/17

Cloud GDPR
3 Key Steps to Vet Cloud Services for GDPR Compliance
Information Management 9/19/17

Don't Panic Over GDPR
We Mean, Don't Panic Over GDPR
The Register 9/14/17


Data Management

5 Threats
The New Face of DDoS: 5 Data Threats Facing Every Organization
Information Management 9/19/17


Databases

Transforming Technologies
8 Technologies Transforming the Database
Networks Asia 9/19/17


DEVOPS

Need For Speed
Robust Devops Trend Fueled by IT's Need for Speed, Survey Says
Search CIO 9/18/17

Terms
12 DevOps Terms You Need to Know
InformationWeek 9/13/17


Disaster Recovery

Hurricane Lessons
5 Disaster Recovery Tips: Learning from Hurricanes
NetworkComputing 9/14/17

Hurricane Recovery
There's No Single Formula for Hurricane Recovery
CIO Today 9/15/17


Email

End-To-End Encrypted
Is Universal End-to-End Encrypted Email Possible (or Even Desirable)?
Networks Asia 9/19/17


Encryption

Cloud Fears
Public, Hybrid Cloud Security Fears Abound
Dark Reading 9/16/17

End-To-End Email
Is Universal End-to-End Encrypted Email Possible (or Even Desirable)?
Networks Asia 9/19/17


IoT

Blockchain Protocol
Setting the Standard for a Blockchain Protocol for IoT
HelpNet Security 9/20/17

Serious Security
Get Serious about IoT Security
Dark Reading 9/20/17


Management

1.9 Billion Exposed
1.9 Billion Data Records Exposed in First Half of 2017
Dark Reading 9/20/17

Professional Networks
Need Top Performers? Hire Candidates With a Strong Professional Network
ERE 9/18/17

Security Training
A Better Way to Teach Cybersecurity to Workers
Wall Street Journal 9/17/17

Fail Fast
Business Lessons from Sports Icons: Failure’s Just Part of the Game
Business 2 Community 9/14/16

Communication Tips
6 Executive Communication Tips for C-Suite Success
IT World 9/15/17

Equifax Blame
Equifax Exec Departures Raise Questions About Responsibility for Breach
Dark Reading 9/18/17

CDO Decision
How to Decide If Your Company Needs a Chief Digital Officer
TechRepublic 9/18/17

Blockchain Guide
Blockchain: The Smart Person's Guide
TechRepublic 6/14/17


Networks

Securing Wi-Fi
5 Ways to Secure Wi-Fi Networks
Networks Asia 8/21/17

SD-WAN vs. MPLS
Is SD-WAN Better than MPLS
Network World 9/21/17

Careless Errors
Survey: Careless Errors Still Pose Biggest Threat to Agency Networks
GCN 9/19/17

Enabling Quantum
Cost Effective Quantum Moves a Step Closer
Science Daily 9/19/17

ICMP Redirects
Network Analysis: Investigating ICMP Redirects
NetworkComputing 9/12/17


Management

Success Responsibilities
What Is a Project Manager? The Lead Role for Project Success
IT World 9/215/17

Failed Projects
When to Kill (and When to Recover) a Failed Project
IT World 9/14/17


Rabbit Sense

Defining A Professional
10 Things That Define a True Professional
TechRepublic 7/27/2010

Worthwhile Certifications
18 Certifications Worth Having
Global Knowledge 9/19/17

Interview Mistakes
7 Reasons from Recruiters Why You Didn’t Get the Job
The Ladders 9/12/17

Mentally Strong
13 Things Mentally Strong People Won’t do
The Ladders 9/12/17


Security

Least Effective
Least Effective Enterprise Security Measures
HelpNet Security 9/20/17

1.9 Billion Exposed
1.9 Billion Data Records Exposed in First Half of 2017
Dark Reading 9/20/17

SMB Partners
5 Tips for Enterprises to Ensure Their SMB Partners Don't Cause a Data Breach
TechRepublic 9/20/17

26 Terms
26 Cybersecurity Terms You Should Know, from A to Z
Business 2 Community 9/19/17

Equifax Failed Commitment
What's That, Equifax? Most People Expect to Be Notified of a Breach Within Hours?
The Register 9/19/17

New Training Method
A Better Way to Teach Cybersecurity to Workers
Wall Street Journal 9/17/17

Pay Attention to the Past
To Be Ready for the Security Future, Pay Attention to the Security Past
Dark Reading 9/18/17

Call Center
5 Steps to Secure Your Emergency Call Center
TechRepublic 9/15/17

Blockchain
3 Ways Blockchain is Changing Cybersecurity
InformationWeek 9/14/17


Servers / Sys Admins

Managing Patches
8 Best Practices for Managing Software Patches
TechRepublic 9/19/17

vCPU Troubleshooting
Solve Common vCPU Troubleshooting Issues
Search Server Virtualization 9/18/19


Storage

Software-Defined
After Almost 30 Years of Software-Defined Storage, What’s Next?
Networks Asia 9/20/17

Cloud Considerations
Choosing a Cloud Provider: 8 Storage Considerations
NetworkComputing 9/13/17


Technology

Wireless Power
Data and Power Could Run Over the Same Wireless Network
Network World 9/21/17

Pro Habits
7 Habits of IT Pros That Might Surprise You
NetworkComputing 9/15/17

Beyond Lithium
Step Towards Better 'Beyond Lithium' Batteries
Science Daily 9/18/17


In the long run, men hit only what they aim at. Therefore, they had better aim at something high.
Henry David Thoreau (1817 - 1862) American Essayist and Poet



Acquisition, Availability and Reliability, BackUp

Monday September 25th 2017
Disk Storage Solutions: Storage Newsletters, Computing Solutions, Phoenix Disk Storage Solutions: Storage Newsletters, Computing Solutions, Phoenix Disk Storage Solutions: Storage Newsletters, Computing Solutions, Phoenix Promethean Data Solutions

Warren Avery
[P] 602-463-6558
[F] 480-219-6914
wavery@ITWeeklyNewsletter.com

Copyright © 2005 - 2010 - Site Engineered by Software Dynamix - Last Modified: 05/08/2010