IT Weekly Newsletter ©
Promethean Data Solutions
Thursday May 24th 2018
    Home     Contact Us     About Us     What Others Are Saying Acquisition, Availability and Reliability, BackUp

The only IT Newsletter that is 100% unbiased in its content and delivery. We cut through the spin and get to the facts. Clean, unvarnished and fresh. Every week there are more than 400 online sources that contain articles of interest to IT Professionals at all levels. Every week the IT Weekly Newsletter compiles 12-20 of the absolute best technical articles with no product or company bias, no pop-up ads, no sales angles. addressing everyday issues involving:

Reducing Risk; Improving Quality of Service; Increasing Availability; Reducing Response Time: Increasing Business Productivity; Improving Server, Storage and Networks; Improving Security; Protecting, Preserving and Restoring Data; Improving Regulatory Compliance; Reducing Audit Errors; Reducing Cost and Developing Proactive Business Solutions.

Promethean Data Solutions

This Weeks IT Topics

IT Weekly Article posts are a selection of 40+ Information Technology articles (no company or product reviews) culled each week from 280+ on line industry sources. This week's Subjects (# of articles): Backup (0), Big Data / Analytics (3), Business Continuity (0), Cloud (4), Compliance (4), Data Management (2), Databases (0), Devops (2), Disaster Recovery (0), Disk Technology (0), Email (1), Encryption (2), Iot (4), Management (11), Mobile Devices (2), Networks / Internet (5), Operations (2), Outsourcing / Colocation (0), Project Management (2), Rabbit Sense (4), Risk (0), Security (10), Servers / Sys Admins (1), Social Media (0), Storage (0), Tape (0), Technology (5) and Virtualization (0).



IT Weekly Newsletter – May 21, 2018, Vol 18 No 20
56 Articles across 16 Subjects for the Week of 5-11-2018 to 5-17-2018


(The Complimentary Subscription button DOES NOT WORK, send an email to wavery@itweeklynewsletter.com
For LinkedIn - www.linkedin.com/in/wavery/en)



Click on Subject to go to Areas of Interest


Big Data / Analytics

Operational Analytics
Predictive Analytics
Identifying Bad Doctors


Cloud

Provider And User Responsibilities
Best Defense
Net Neutrality Impact
SMBs Take On Extra Risk


Compliance

New EU Cyber Regulation Goes Live
GDPR Impact on SaaS
Identify GDPR Profile
10 Steps For GDPR


Data Management

Feeding A.I.
What Is A DPO


DevOps

Serverless Stale Functions
Change Resisters

EMail
Mistakes

Encryption

Uncrackable Quantum Cryptographic
Hiding In Plain Sight


IoT

Third-Party Risks
Huge Security Risk
Hide & Seek Botnets
Non-IoT Assets Connectivity


Management

Leadership Deadly Sins
Golden Meeting Minutes
Interview Brain Teasing Questions
Security Audit Policy Settings
Signs Of Success
Quiet Leadership
A Great First Day
Implement AI
Conflict Resolution Tactic
What Is A DPO
Cyberinsurance Questions


Mobile Devices

Wearable Smart Ring
Huge Security Risk


Networks / Internet

Lessons In Resiliency
Upgrade Planning Tips
5G Technologies
SDN & Automation
Transport Layer Security 1.3


Operations

Scaling Microservices
Prioritizing Vulnerability Fixes


Project Management

Essential Documents
Oversight Areas


Rabbit Sense

Interview Brain Teasing Questions
Reduce Interview Nerves
Grammar Tips
Graduation Gifts


Security

First Do No Harm
Privacy
Prioritizing Vulnerability Fixes
Security Audit Policy Settings
Shadow Device Threats
Desperate Need Of An Overhaul
Hackable 2FA
Building Shock Absorbers
Endpoint Trends
Facial Identification Tickets


Servers – Sys Admins

Prioritizing Vulnerability Fixes

Technology

Quantum Scars
Neural Network Gaming
Soft To Rigid Robots
Facial Identification Tickets
Atomically Thin Semiconductors



########### ########### ARTICLES ########### ###########


Big Data / Analytics
Back to Index

3 Top Trends Driving the Emergence of Operational Analytics
Information Management 5/11/18

What is Predictive Analytics? Transforming Data Into Future Insights
CIO 5/16/18

Walmart's Next Healthcare Move: Using Data to Identify Bad Doctors
TechRepublic 5/11/18


Cloud
Back to Index

Government Data In the Cloud: Provider and User Responsibilities
GCN 5/16/18

How to Best Defend Against Cloud-Native Malevolence
Information Management 5/16/18

The Impact of Net Neutrality Repeal on Cloud Computing
Information Management 5/14/18

Why SMBs Take on Extra Risk When Working with Cloud Vendors
TechRepublic 5/13/18


Compliance
Back to Index

Just When You think You’ve Solved GDPR . . . A New EU Cyber Regulation Goes Live
Information Management 5/10/18

Countdown to GDPR #8: What is the GDPR Impact on SaaS Providers?
Business 2 Community 5/14/18

GDPR Compliance: Identifying an Organization’s Unique Profile
HelpNet Security 5/14/18

GDPR Compliance Deadline is Approaching: 10 Things to Do Right Away
TechRepublic 5/11/18


Data Management
Back to Index

Artificial Intelligence: A Question of Data
Business 2 Community 5/11/18

What is a Data Protection Officer?
Business 2 Community 5/11/18


DevOps
Back to Index

Hey Cool, You Went Serverless. Now You Just Have to Worry About All Those Stale Functions
The Register 5/15/18

You're In Charge of Change, and Now You Need to Talk About DevOps Hater Robin
The Register 5/14/18


Email
Back to Index

This is What’s Wrong With Your Emails
Fast Company 5/16/18


Encryption
Back to Index

Uncrackable Encryption Could Be On the Horizon
GCN 5/16/18

Researchers Hide Information in Plain Text
Science Daily 5/10/18


IoT
Back to Index

Why Enterprises can't Ignore Third-Party IoT-Related Risks
Dark Reading 5/14/18

IoT and Personal Devices Pose Huge Security Risk to Enterprises
ComputerWeekly 5/13/18

Hide and Seek Brings Persistence to IoT Botnets
Dark Reading 5/11/18

How to Manage Non-IoT Equipment that Runs Alongside Connected Devices
TechRepublic 5/11/18


Management
Back to Index

The 7 Deadly Sins Leaders Commit that Hold Them Back
The Ladders 5/16/18

These Are the Most Important Minutes of Any Meeting
Fast Company 5/16/18

10 Brain Teasing Questions to Ask When Interviewing IT Professionals
TechRepublic 12/8/16

A Governance Perspective on Security Audit Policy Settings
Information Management 5/15/18

7 Signs of Success for Insurance CIOs
Digital Insurance 5/15/18

Quiet Leadership is Still Leadership (and Matters More Than You Think)
Fast Company 5/14/18

Four Easy Ways to Give Your New Hire a Great First Day
Fast Company 5/14/18

How C-Suite Leaders can Best Implement AI
InformationWeek 5/14/18

This Common Conflict Resolution Tactic is a Sign of Bad Management
Fast Company 5/11/18

What is a Data Protection Officer?
Business 2 Community 5/11/18

Cybersecurity Insurance: What to Look for When Comparing Policies
TechRepublic 5/10/18


Mobile Devices
Back to Index

Wearable Ring, Wristband Allow Users to Control Smart Tech with Hand Gestures
Science Daily 5/14/18

IoT and Personal Devices Pose Huge Security Risk to Enterprises
ComputerWeekly 5/13/18


Networks / Internet
Back to Index

The Internet's Lessons in Resiliency
NetworkComputing 5/16/18

5 Campus Network Upgrade Planning Tips
NetworkComputing 5/14/18

5G Must Make Use of Different Technologies, Including WiFi
Data Center Knowledge 5/14/18

How Do the Benefits of SDN Improve Network Automation?
Search SDN 5/14/18

Ready or Not: Transport Layer Security 1.3 Is Coming
Dark Reading 5/10/18


Operations
Back to Index

7 Secrets to Scaling With Microservices
InfoWorld 5/16/18

Don't Roll the Dice When Prioritizing Vulnerability Fixes
Dark Reading 5/15/18


Project Management
Back to Index

6 Essential Documents for Project Management Success
TechRepublic 5/16/18

2 Project Oversight Areas that Warrant More Executive Focus
PMWorld 360 5/9/18


Rabbit Sense
Back to Index

8 Ways to Be Less Nervous About Your Next Job Interview
TechRepublic 5/16/18

Want to Sound Smarter? Master These 7 Grammar Tips
The Ladders 5/14/18

The Essential High-Tech Graduation Gift Guide
TechRepublic 5/7/18


Security
Back to Index

Security Vendors Need to Stop Doing More Harm Than Good
ZDnet 5/16/18

How Privacy Is Moving Data Security To the Top of Corporate Agendas
CSO Online 5/16/18

Don't Roll the Dice When Prioritizing Vulnerability Fixes
Dark Reading 5/15/18

A Governance Perspective on Security Audit Policy Settings
Information Management 5/15/18

Exposing the Threat of Shadow Devices
HelpNet Security 5/14/18

A Year After the Equifax Data Breach, What If Nothing Changes?
Business 2 Community 5/13/18

Two-Factor Authentication Hackable
SC Magazine 5/10/18

Building Cybersecurity Shock Absorbers for the Enterprise
Networks Asia 5/10/18

5 Top Trends in Endpoint Security for 2018
Networks Asia 5/14/18

Ticketmaster Working on Facial Identification System to Replace Tickets
v3 co uk 5/8/18


Servers – Sys Admins
Back to Index

Don't Roll the Dice When Prioritizing Vulnerability Fixes
Dark Reading 5/15/18


Technology
Back to Index

Explanation for Puzzling Quantum Oscillations Has Been Found
Science Daily 5/15/18

Exclusive: Neural Networks Could Be a 'Silver Shotgun Shell' for the Games Industry
v3 co uk 5/14/18

Robots Go From Soft to Rigid (... Jokes Follow)
ZDnet 5/11/18

Ticketmaster Working on Facial Identification System to Replace Tickets
v3 co uk 5/8/18

Strain Improves Performance of Atomically Thin Semiconductor Material
Science Daily 5/10/18


Quote
I suppose it is tempting, if the only tool you have is a hammer, to treat everything you see as a nail.
Abraham Maslow (1908 - 1970, American Psychologist





Acquisition, Availability and Reliability, BackUp

Thursday May 24th 2018
Disk Storage Solutions: Storage Newsletters, Computing Solutions, Phoenix Disk Storage Solutions: Storage Newsletters, Computing Solutions, Phoenix Disk Storage Solutions: Storage Newsletters, Computing Solutions, Phoenix Promethean Data Solutions

Warren Avery
[P] 602-463-6558
[F] 480-219-6914
wavery@ITWeeklyNewsletter.com

Copyright © 2005 - 2010 - Site Engineered by Software Dynamix - Last Modified: 05/08/2010