IT Weekly Newsletter ©
Promethean Data Solutions
Monday May 29th 2017
    Home     Contact Us     About Us     What Others Are Saying Acquisition, Availability and Reliability, BackUp

The only IT Newsletter that is 100% unbiased in its content and delivery. We cut through the spin and get to the facts. Clean, unvarnished and fresh. Every week there are more than 400 online sources that contain articles of interest to IT Professionals at all levels. Every week the IT Weekly Newsletter compiles 12-20 of the absolute best technical articles with no product or company bias, no pop-up ads, no sales angles. addressing everyday issues involving:

Reducing Risk; Improving Quality of Service; Increasing Availability; Reducing Response Time: Increasing Business Productivity; Improving Server, Storage and Networks; Improving Security; Protecting, Preserving and Restoring Data; Improving Regulatory Compliance; Reducing Audit Errors; Reducing Cost and Developing Proactive Business Solutions.

Promethean Data Solutions

This Weeks IT Topics

IT Weekly Newsletter – May 29, 2017, Vol 17 No 20

53 Articles across 18 Subjects for the Week of 5-19-2017 to 5-25-2017

For Your Complimentary Subscription Click on 'Sign Up Now'


If you don't know WHY; HOW, WHAT and WHO don't matter!
The IT Weekly Newsletter is a compilation of 40+ technical articles from last week curated from on-line sources and arranged by subject.
No company reviews, no product reviews, no white papers and no press releases.

Ransomware – How To Create a Proactive Protection File Strategy
Sponsored Link from Storage Switzerland


Zerowait SimplStor - The Affordable Petabyte < $100K
Sponsored Link from SimplStor


Big Data / Analytics

Free Tools
22 Free Tools for Data Visualization and Analysis
ComputerWorld 5/25/17

Predictive Analytics
Predictive analytics: The smart person's guide
TechRepublic 5/19/17


Business Continuity

Planning Mistakes
Seven Business Continuity Strategy Planning Mistakes
Search Disaster Recovery 5/25/17

Ill-Equipped
Most People are Ill-Equipped to Deal with Ransomware
Disaster Recovery Journal 5/19/17


Cloud

Securing Storage
7 Ways to Secure Cloud Storage
NetworkComputing 5/24/17

IaaS
Why Infrastructure as a Service (IaaS) Works for Enterprise-Level Companies
Business 2 Community 5/24/17

Edge Computing
Will Edge Computing Replace the Cloud?
InformationWeek 5/23/17

Beware Lock-In
Why Public Cloud R&D is Making Lock-In Worse, Not Better
TechRepublic 5/22/17

73% By 2020
73% Of Enterprises Will Run Almost Entirely on SaaS by 2020, Report Says
TechRepublic 5/18/17


Compliance

Follow the Rules
Data Security & Privacy: The Risks of Not Playing by the Rules
Dark Reading 5/24/17


Data Management

GDPR Data Location
Finding Customer Data is Big Hurdle to Meeting GDPR Right to Erasure
ComputerWeekly 5/25/17

Lake to Cesspool
How to Keep Your Data Lakes from Becoming Cesspools
TechRepublic 5/23/17

Connected Explosion
Cisco Security Exec: ‘Connected Devices are Creating 277 Times More Data Than People are’
IT World 5/22/17


Disaster Recovery

Ransomware Strategy
Sponsored Link - Ransomware – How To Create a Proactive Protection File Strategy
Storage-Switzerland 5/19/17


Disk Technology

100TB SSDs
Travel IT Biz Reportedly Testing 100TB SSDs
The Register 5/17/17

External USB Drives
Best External Hard Drive 2017: 6 USB hard disks tested
Trusted Reviews 1/30/17


Internet

DNS Audit Errors
The Most Common Errors Identified in Professional DNS Audits
IT World 5/23/17


Management

Retaining Diversity
A 12-Step Program for Retaining Your Diverse Workforce
TLNT 5/24/17

Firing An Employee
3 Things to Think About Before Firing an Employee
TechRepublic 5/23/17

A Business Unit
10 Ways CIOs Can Run Their Business Like a Business
InformationWeek 5/23/17

Bitcoin Collaboration
4 Ways Blockchain is the New Business Collaboration Tool
ComputerWorld 5/23/17

Basement to Boardroom
How the CISO Moved from the Basement to the Boardroom
TechRepublic 5/22/17

Enterprise Architect
Why You Need an Enterprise Architect
IT World 5/18/17

Spending Control
Don't worry CIOs: You Still Control Tech Spending
IT World 5/22/17

To-Do List Hacks
These 10 CEOs’ Top To-Do List Hacks
Fast Company 5/21/17

Employee Theft
4 Steps to Protect Your Company from Employee Theft
TLNT 5/19/17


Networks

Failures Looms Large
Gartner: Potential for Network Failures Looms Large
NetworkComputing 5/23/17

Working SLA
How to Make a Network SLA Work or Your Organization
Search Networking 5/24/17

Enterprise SDN
SDN In the Enterprise
NetworkComputing 5/19/17


Operations

Better Capacity Planning
Tips for Better Capacity Planning
Data Center Knowledge 5/24/17

IaaS
Why Infrastructure as a Service (IaaS) Works for Enterprise-Level Companies
Business 2 Community 5/24/17

Google Systems Book
Want to Understand How Google Runs Its Production Systems? Read This Free Book
TechRepublic 5/24/17

Containers vs. VMs
Containers vs. Virtual Machines: A Simplified Answer To a Complex Question
TechRepublic 5/23/17

Emergency Patching
7 Tips for Effectively Rolling Out Emergency Patches
TechRepublic 4/20/17

Patching
WannaCry Reminds CIOs to Stay on Top Of Patching
IT World 5/18/17


Project Management

Pressure Failures
Under Pressure, IT May Need to Fail Fast With Some Projects
InformationWeek 5/22/17


Rabbit Sense

Introvert Traits
The 5 Blessings of Introverts at Work
The Ladders 5/23/17

Interview Questions
15 Tricky Job Interview Questions -- And How to Nail Them
IT World 5/25/17

Cool Star Wars Mugs
The 20 Coolest Star Wars Coffee Mugs in Any Galaxy
TechRepublic 11/16/17

Avoid a Career Plateau
Three Things You Need to Do to Avoid Hitting a Career Plateau
Fast Company 5/24/17

Things Not to Do
9 Things Smart People won’t Do
The Ladders 5/17/17

Genuine People Habits
12 Habits of Genuine People
The Ladders 5/18/17


Risk

All Generations Guide
All Generations, All Risks, All Contained: A How-to Guide
Dark Reading 5/18/17


Security

Threat Hunter Insights
10 Things Threat Hunters Watch for
IT World 5/25/17

Step Ahead
Staying a Step Ahead of Internet Attacks
Dark Reading 5/23/17

Internal Sabotage
9 Ways Organizations Sabotage Their Own Security: Lessons from the Verizon DBIR
Dark Reading 5/22/17

Fake Fixes
Be Wary of Fake WannaCry fixes
IT World 5/23/17

Emerging Threats
Emerging Threats to Add to Your Security Radar Screen
Dark Reading 5/22/17

Basement to Boardroom
How the CISO Moved from the Basement to the Boardroom
TechRepublic 5/22/17

Staying Safe Guide
The Modern Guide to Staying Safe Online
IT World 5/19/17

All Generations Guide
All Generations, All Risks, All Contained: A How-to Guide
Dark Reading 5/18/17

Fatigue Rx
In Search of an Rx for Enterprise Security Fatigue
Dark Reading 5/22/17

Patching
WannaCry Reminds CIOs to Stay on Top Of Patching
IT World 5/18/17

Forgetting the Basics
Don't Forget Basic Security Measures, Experts Say
Dark Reading 5/18/17

WannaCry Lessons
5 Security Lessons WannaCry Taught Us the Hard Way
Dark Reading 5/18/17


Servers / Sys Admins

Containers vs. VMs
Containers vs. Virtual Machines: A Simplified Answer To a Complex Question
TechRepublic 5/23/17

Emergency Patching
7 Tips for Effectively Rolling Out Emergency Patches
TechRepublic 4/20/17

Patching
WannaCry Reminds CIOs to Stay on Top Of Patching
IT World 5/18/17


Storage

Affordable Petabyte
Sponsored Link - Zerowait SimplStor - The Affordable Petabyte < $100K
Simplstor 5/29/17

Cloud Secure
7 Ways to Secure Cloud Storage
NetworkComputing 5/24/17

Disruptive Private Vendors
Five Disruptive Private Vendors in Storage Technologies for 2017 by Gartner
Storage Newsletter 5/25/17

100TB SSDs
Travel IT Biz Reportedly Testing 100TB SSDs
The Register 5/17/17

External USB Drives
Best External Hard Drive 2017: 6 USB hard disks tested
Trusted Reviews 1/30/17


Technology

Deep vs. Machine Learning
Deep Learning vs. Machine Learning: The Difference Starts with Data
Search Business Analytics 5/18/17

Edge Computing
Will Edge Computing Replace the Cloud?
InformationWeek 5/23/17

End of Accounting
Automation and the End of Accounting
ComputerWorld 5/22/17

Bitcoin Collaboration
4 Ways Blockchain is the New Business Collaboration Tool
ComputerWorld 5/23/17


What is important is seldom urgent and what is urgent is seldom important.
Dwight D. Eisenhower (1890 – 1969) 34th President of the United States



Acquisition, Availability and Reliability, BackUp

Monday May 29th 2017
Disk Storage Solutions: Storage Newsletters, Computing Solutions, Phoenix Disk Storage Solutions: Storage Newsletters, Computing Solutions, Phoenix Disk Storage Solutions: Storage Newsletters, Computing Solutions, Phoenix Promethean Data Solutions

Warren Avery
[P] 602-463-6558
[F] 480-219-6914
wavery@ITWeeklyNewsletter.com

Copyright © 2005 - 2010 - Site Engineered by Software Dynamix - Last Modified: 05/08/2010