IT Weekly Newsletter ©
Promethean Data Solutions
Tuesday April 24th 2018
    Home     Contact Us     About Us     What Others Are Saying Acquisition, Availability and Reliability, BackUp

The only IT Newsletter that is 100% unbiased in its content and delivery. We cut through the spin and get to the facts. Clean, unvarnished and fresh. Every week there are more than 400 online sources that contain articles of interest to IT Professionals at all levels. Every week the IT Weekly Newsletter compiles 12-20 of the absolute best technical articles with no product or company bias, no pop-up ads, no sales angles. addressing everyday issues involving:

Reducing Risk; Improving Quality of Service; Increasing Availability; Reducing Response Time: Increasing Business Productivity; Improving Server, Storage and Networks; Improving Security; Protecting, Preserving and Restoring Data; Improving Regulatory Compliance; Reducing Audit Errors; Reducing Cost and Developing Proactive Business Solutions.

Promethean Data Solutions

This Weeks IT Topics

IT Weekly Article posts are a selection of 40+ Information Technology articles (no company or product reviews) culled each week from 280+ on line industry sources. This week's Subjects (# of articles): Backup (0), Big Data / Analytics (1), Business Continuity (0), Cloud (6), Compliance (3), Data Management (3), Databases (0), Devops (1), Disaster Recovery (0), Disk Technology (0), Email (0), Encryption (1), Iot (0), Management (6), Mobile Devices (0), Networks / Internet (8), Operations (6), Outsourcing / Colocation (0), Project Management (1), Rabbit Sense (4), Risk (0), Security (12), Servers / Sys Admins (0), Social Media (0), Storage (0), Tape (0), Technology (3) and Virtualization (0).



IT Weekly Newsletter – April 23, 2018, Vol 18 No 16
48 Articles across 13 Subjects for the Week of 4-13-2018 to 4-19-2018


(The Complimentary Subscription button DOES NOT WORK, send an email to wavery@itweeklynewsletter.com
For LinkedIn - www.linkedin.com/in/wavery/en)



Click on Subject to go to Areas of Interest


Big Data / Analytics

(1), Cloud Issues

Cloud

(6), Multi Strategy, Hybrid Strategy, Security Log Files, Managing Shadow IT, 1-in-4 Stolen, Winner-Takes-All Contracts

Compliance

(3), GDPR Impact, 60% Not Ready, GDPR Guidelines

Data Management

(3), Third Party Risks, Data Prisons, Connected Technology

DEVOPS

(1), No Time For Security

Encryption

(1), WW Regulations,

Management

(6), Lack of Trust Hurts, Build (Or Repair) Trust, Candidate Fit In, Managing Shadow IT, Change Management, Best Advice Ever

Networks / Internet

(8), Troubleshooting a Router, Structured Cabling, Router-Based Attacks, Connecting 1.500 Sites, SD-WAN Security, Self-Driving, Microsegmentation, Best SMB Wireless Routers

Operations

(6), Power Density Increasing, Structured Cabling, Often-Overlooked Risks, Router-Based Attacks, Microservice Communication, Monolithic Architectures

Project Management

(1), Leadership Types

Rabbit Sense

(4), Thank You Notes, Future Critical Skills, Capitalization, Cringeworthy Interviews

Security

(12), Brain Implant Scheme, Role of KPIs, Thwart Phishing Attacks, Prevent Phishing, Router-Based Attacks, Cloud Log Files, No Time In DevOps, SD-WAN, Multifactor Authentication, Machine Learning, Cyber Drills, Microsegmentation, Hard Truths

Technology

(3), Night Face Recognition, Automating Too Quickly, New Battery Chemical


########### ########### ARTICLES ########### ###########


Big Data / Analytics
Back to Index

Moving Your Data Analytics to the Cloud Isn’t So Easy
InfoWorld 4/17/18


Cloud
Back to Index

2018 Multi-Cloud Strategy: from Niche to Norm in the Enterprise
Business 2 Community 4/19/18

What Is Hybrid Cloud Really, and What's the Best Strategy?
Networks Asia 4/18/18

Moving Your Data Analytics to the Cloud Isn’t So Easy
InfoWorld 4/17/18

Cloud Security Alert: Log Files are Not the Answer
Networks Asia 4/17/18

How to Avoid Data Prisons in Proprietary Cloud Archives
TDWI 3/19/18

5 Tips for Managing Shadow IT without Destroying Innovation
TechRepublic 4/16/18

1-In-4 Orgs Using Public Cloud has had Data Stolen
HelpNet Security 4/16/18

Cloud Contracts: How to Choose Between Winner-Takes-All and Best of Breed
TechRepublic 4/13/18


Compliance
Back to Index

The Impacts of GDPR in Asia
Networks Asia 4/19/18

60% of Companies Likely to Miss GDPR Compliance Deadline
TechRepublic 4/17/18

Understand the GDPR Guidelines for Obtaining Lawful Consent to Process Data
TechRepublic 4/12/18


Data Management
Back to Index

Overcoming Hidden Data Risks when Managing Third Parties
Information Management 4/18/18

How to Avoid Data Prisons in Proprietary Cloud Archives
TDWI 3/19/18

Connected Technology & the Future of Your Data
Business 2 Community 41/14/18


DEVOPS
Back to Index

Devs Know Application Security is Important, But Have No Time for It
HelpNet Security 4/17/18


Encryption
Back to Index

Where Crypto Regulations Stand Worldwide
Business 2 Community 4/18/18


Management
Back to Index

75% of Consumers Won't Buy Your Product if They Don't Trust You to Protect Their Data
TechRepublic 4/17/18

The Simple Equation Every Manager Needs to Build (or Repair) Trust
Fast Company 4/16/18

10 Questions to Help You Know If the Candidate Will Fit In
TLNT 4/16/18

5 Tips for Managing Shadow IT without Destroying Innovation
TechRepublic 4/16/18

What is Change Management? A Guide to Organizational Transformation
CIO 4/12/18

The Best Advice these 11 Successful People Ever Received
Success 6/20/17


Networks / Internet
Back to Index

Troubleshooting a Router Installation
NetworkComputing 4/17/18

How Structured Cabling can Help Scale Network, Ease Complexity
Networks Asia 3/27/18

Why Router-Based Attacks Could Be the Next Big Trend in Cybersecurity
TechRepublic 4/17/18

Siemens is Building an SD-WAN Network That Will Connect 1,500 Sites Across the Globe
Networks Asia 4/15/18

Intelligent Network Security with SD-WANs
Networks Asia 4/9/18

Juniper: Machine Learning Isn't All We Need for Smart Networks
Data Center Knowledge 4/14/18

Microsegmentation: Strong Security in Small Packages
Dark Reading 4/12/18

The 10 Best Wireless Routers for Telecommuters and SMBs In 2018
TechRepublic 4/13/18


Operations
Back to Index

New Workloads, Cost Pressures Drive up Data Center Power Densities
Data Center Knowledge 4/18/18

How Structured Cabling can Help Scale Network, Ease Complexity
Networks Asia 3/27/18

Data Center Infrastructure, the Often-Overlooked Security Risk
Data Center Knowledge 4/17/18

Why Router-Based Attacks Could Be the Next Big Trend in Cybersecurity
TechRepublic 4/17/18

How to Mitigate the Complexity of Microservice Communication
Search Microservices 4/16/18

Dated Monolithic Architectures are Killing Future IT Opportunities
SD Times 4/13/18


Project Management
Back to Index

Pioneer, Driver, Guardian or Integrator: Which Type of Leader Are You?
PMWorld 360 4/16/18


Rabbit Sense
Back to Index

How to Write Thank-You Notes that Impress Hiring Managers
Fast Company 4/17/18

Future-Proof Your IT Career with These Critical Skills
CIO 4/17/18

7 Types of Words You Need to Stop Capitalizing
The Ladders 4/12/18

What You Can Learn From 7 of the Most Cringeworthy Job Interviews
Fast Company 4/16/18


Security
Back to Index

Researchers Propose Scheme to Secure Brain Implants
HelpNet Security 4/18/18

The Role of KPIs in Incident Response
Dark Reading 4/18/18

How Fact-Checking Could Thwart Phishing Attacks
TechRepublic 4/18/18

How to Prevent Phishing By Studying the Psychology Behind Digital Fraud
TechRepublic 4/17/18

Why Router-Based Attacks Could Be the Next Big Trend in Cybersecurity
TechRepublic 4/17/18

Cloud Security Alert: Log Files are Not the Answer
Networks Asia 4/17/18

Devs Know Application Security is Important, But Have No Time for It
HelpNet Security 4/17/18

Truth or Myth: Users Truly Hate Multifactor Authentication
Networks Asia 4/16/18

Five Ways Machine Learning Can Save Your Company From A Security Breach Meltdown
Business 2 Community 4/14/18

Cybersecurity Drills More Important Than Ever for Data Centers
Data Center Knowledge 4/12/18

Microsegmentation: Strong Security in Small Packages
Dark Reading 4/12/18

8 Hard Truths About Working in Cybersecurity
TechRepublic 4/12/18


Technology
Back to Index

Face Recognition Technology That Works in the Dark
Science Daily 4/16/18

Quote
One accurate measurement is worth a thousand expert opinions.
Rear Admiral Grace Hopper (1909 - 1992) American Computer Scientist and United States Naval Officer





Acquisition, Availability and Reliability, BackUp

Tuesday April 24th 2018
Disk Storage Solutions: Storage Newsletters, Computing Solutions, Phoenix Disk Storage Solutions: Storage Newsletters, Computing Solutions, Phoenix Disk Storage Solutions: Storage Newsletters, Computing Solutions, Phoenix Promethean Data Solutions

Warren Avery
[P] 602-463-6558
[F] 480-219-6914
wavery@ITWeeklyNewsletter.com

Copyright © 2005 - 2010 - Site Engineered by Software Dynamix - Last Modified: 05/08/2010