IT Weekly Newsletter August 20, 2018 (Vol 18 #32)

1 month ago


Text only:

IT Weekly Newsletter August
20, 2018


(Vol 18 #32)


 


Ask WHY first.


If
you dont know WHY, the HOW, WHAT, WHEN and WHO dont matter!


 


47 Articles across 20 Subjects for the Week of
8-10-18 to 8-16-2018


 


Good enough never is.


Debbi
Fields (1956 - ) Founder of Mrs. Fields Bakeries


 


SUBJECTS
(CLICK the Subjects then click on the TITLE of interest and a
hyperlink takes you to the article)


 


Big Data /
Analytics


                Data Veracity Challenge


                Cloud Solution


                Electricity Use Predicts Traffic
Congestion


Cloud


                Multi Strategy


                Three As of SaaS adoption


Compliance


                Post-GDPR


Data Management


                Data Veracity Challenge


                DeDupe Optimization


                Improving Security


                Containerization


DEVOPS


                Improving Security


                Containerization


Disaster Recovery


                Data Recovery Do's And Don'ts


Disk Technology


                100TB Small Form-Factor SSD


                New HDD Technologies


Encryption


                Pass A
Law To Decrypt


IoT


                Inoculate The
Tech Herd


                Operational View


Management


                Hiring A
New CISO


                Filtering Questions


                Budget Season


                CDOs and CAOs


                Realistic Work Perks


                Leader Or
A Manager? Heres The Difference


                Shadow IT Risks


                Body Language Of
Remote Workers


Mobile
Devices


                Fake Charging Stations


Networks
/ Internet


                Will DHCP Become Irrelevant


                Startups That Shakeup


                Zero-Trust


                Rise Of
The Packet Brokers


Operations


                Managing Multiple Monitoring
Tools


                Tips For
Buying Refurbished


                Going Liquid


Rabbit
Sense


                Types Of
Motivation


                Age-Old Spaghetti Mystery


                Body Language Blunders


                Data Center Has Live Fish Cams


                Left-Handers


Risk


                Shadow
IT Risks


Security


                Improving DevOps


                Open Source Software


                Inoculate The
Tech Herd From IoT


                IPsec Vulnerability


                Designers Swap Security For Speed


                The False Positive


                Social Media Deception Tricks


                The Future Is AI, IoT, And Big Data


                Phrase-Based Passwords


                Enigma Of
AI


Social Media


                Deception Tricks


Storage


                DeDupe Optimization


                100TB Small Form-Factor SSD


                New HDD Technologies


Technology


                One Atom Transistor


                Validation Of
Schwarzites


                AI: Myth Vs Reality


                What Powers AI & ML


 


The
IT Weekly Newsletter is a compilation of 40+ technical articles from last week curated
from over 270 sources and arranged by subject; no company reviews, no product
reviews, no white papers and no press releases. 
The IT Weekly Newsletter goes out to over 14,300 (2,700+ CLevel) IT
professionals around the world.


 


The
IT Weekly Newsletter is for your personal and private use and is not to
be copied or forwarded.


 


The Newsletter is offered to corporations, organizations and government
agencies under quarterly subscription (at $100.00US a week) for posting or
distribution as an educational and/or brand awareness tool.  Sponsored Links are available for $125.00US a
week.


 


ARTICLES


 


Big Data / Analytics  (Back
to Index)


 


Data
Veracity Challenge


Data
Veracity Challenge Puts Spotlight on Trust


                Information Management 8/10/18


 


Electricity
Use Predicts Traffic Congestion


Can
Electricity Use Predict a Bad Morning Commute?


                GCN 8/9/18


 


Cloud  (Back
to Index)


 


Multi
Strategy


7
Secrets to a Successful Multi-Cloud Strategy


                Networks Asia 8/13/18


 


Three
As of SaaS adoption


Three As of
SaaS Adoption, And Why Every Company Goes Through Them


                HelpNet Security 8/14/18


 


Compliance  (Back
to Index)


 


Post-GDPR


Here's
What's Next for the GDPR


                TechRepublic 8/15/18


 


Data Management  (Back to Index)


 


Data
Veracity Challenge


Data
Veracity Challenge Puts Spotlight on Trust


                Information Management 8/10/18


 


DeDupe
Optimization


How
to Get the Most from Deduplication Software


                TechRepublic 8/15/18


 


DEVOPS  (Back
to Index)


 


Improving
Security


Improving
DevOps Security Practices


                NetworkComputing 8/16/18


 


Containerization


Containerization
Requires Changes to Some Familiar Development Processes


                Information Management 8/15/18


 


Disaster
Recovery  (Back to Index)


 


Data
Recovery Do's And Don'ts


Data
Recovery Do's and Don'ts for IT Teams


                TechRepublic 8/15/18


 


Disk Technology  (Back to Index)


 


100TB
Small Form-Factor SSD


Oh My
Tosh, It's Only a 100TB Small Form-Factor SSD, SK?


                The
Register
8/14/18


 


New
HDD Technologies


New
Hard Disk Drive Technologies Offer Stiff Competition For
NAND


                Seeking Alpha 8/7/18


 


Encryption  (Back
to Index)


 


Pass A Law To Decrypt


Australia
On The Cusp of Showing the World How to Break
Encryption


                The
Register
8/12/18


 


IoT  (Back
to Index)


 


Inoculate
The Tech Herd


How
To Inoculate the Tech Herd from IoT Cyber-Infections


                TechRepublic 8/15/18


 


Operational
View


IoT:
The Operational View


                NetworkComputing 8/10/18


 


Management  (Back
to Index)


 


Hiring
A New CISO


What
to Look Out for When Hiring a New CISO


                Business 2 Community 8/26/28


 


Filtering
Questions


Create
This List of Questions to Help You Shut Down Interruptions


                Fast
Company
8/16/18


 


Budget
Season


Preparing
for IT Budget Season


                InformationWeek 8/14/18


 


CDOs
and CAOs


What
CDOs and CAOs Want You to Know


                InformationWeek 8/15/18


 


Realistic
Work Perks


9
Realistic Work Perks Every Employee would Love


                The Ladders 8/14/18


 


Leader
Or A Manager? Heres The Difference


Are
You a Leader or a Manager? Heres the Difference


                Fast
Company
8/13/18


 


Shadow
IT


Shadow
IT: Every Company's 3 Hidden Security Risks


                Dark
Reading
8/7/19


 


Body
Language Of Remote Workers


How
to Read the Virtual Body Language Of Remote Workers


                TLNT 8/9/18


 


Mobile Devices  (Back
to Index)


 


Fake
Charging Stations


Fake
Charging Stations can Hack Your Smartphone


                Business 2 Community 8/14/18


 


Networks / Internet  (Back to Index)


 


Will
DHCP Become Irrelevant


What
Is DHCP, And Why Might its Days May Be Numbered as IPv6 Grows?


                Networks Asia 8/15/18


 


Startups
That Shakeup


8
Networking Startups Shaking Up the Industry


                NetworkComputing 8/13/18


 


Zero-Trust


Network
Security Shrinks to Zero-Trust


                NetworkComputing 8/9/18


 


Rise
Of The Packet Brokers


The
Rise of Next-Generation Network Packet Brokers


                Network
World
8/9/18


 


Operations  (Back to Index)


 


Managing
Multiple Monitoring Tools


To
Provide Greater Business Value, IT Needs A New Way of
Monitoring Events


                Information Management 8/15/18


 


Tips
For Buying Refurbished


10
Tips for Buying Refurbished Technology Devices


                TechRepublic 8/13/18


 


Going
Liquid


So,
You Want to Go Liquid Heres What Awaits Your Data Center Team


                Data Center Knowledge 8/918


 


Rabbit Sense  (Back
to Index)


 


Types
Of Motivation


There
Are 4 Types of MotivationHeres What Each Does to
Your Brain


                Fast
Company
8/13/18


 


Age-Old
Spaghetti Mystery


Mathematicians
Solve Age-Old Spaghetti Mystery


                Science Daily 8/13/18


 


Body
Language Blunders


13
Body Language Blunders that Can Make You Look Bad


                The Ladders 6/24/18


 


Data
Center Has Live Fish Cams


Microsoft's
Underwater Data Center has Live Fish Cams


                cnet 8/9/18


 


Left-Handers


Psychologists
Explain How Left-Handed People Work Differently


                Fast
Company
8/13/18


 


Risk  (Back to Index)


 


Shadow
IT


Shadow
IT: Every Company's 3 Hidden Security Risks


                Dark
Reading
8/7/19


 


Security  (Back to Index)


 


Improving
DevOps


Improving
DevOps Security Practices


                NetworkComputing 8/16/18


 


Open
Source Software


Open
Source Software Poses a Real Security Threat


                Dark
Reading
8/15/18


 


Inoculate
The Tech Herd From IoT


How
To Inoculate the Tech Herd from IoT Cyber-Infections


                TechRepublic 8/15/18


 


IPsec
Vulnerability


Security
Gaps Identified in Internet Protocol 'IPsec'


                Science Daily 8/14/18


 


Designers
Swap Security For Speed


Three
More Data-Leaking Security Holes Found in Intel Chips as Designers Swap
Security for Speed


                The
Register
8/14/18


 


The
False Positive


Securitys
Bane: The False Positive


                HelpNet Security 8/15/18


 


Social
Media Deception Tricks


Social
Engineers Show off Their Tricks


                Dark
Reading
8/13/18


 


The
Future Is AI, IoT, And Big Data


How
AI, IoT, and Big Data Will Shape the Future of Cybersecurity


                TechRepublic 8/13/18


 


Phrase-Based
Passwords


Making
Phrase-Based Passwords More User Friendly for Better Online Security


                Homeland Security News 8/6/18


 


Enigma
Of AI


The
Enigma of AI & Cybersecurity


                Dark
Reading
8/10/18


 


Social Media  (Back
to Index)


 


Deception
Tricks


Social
Engineers Show off Their Tricks


                Dark
Reading
8/13/18


 


Storage  (Back to Index)


 


DeDupe
Optimization


How
to Get the Most from Deduplication Software


                TechRepublic 8/15/18


 


100TB
Small Form-Factor SSD


Oh My
Tosh, It's Only a 100TB Small Form-Factor SSD, SK?


                The
Register
8/14/18


 


New
HDD Technologies


New
Hard Disk Drive Technologies Offer Stiff Competition For
NAND


                Seeking Alpha 8/7/18


 


Technology  (Back to Index)


 


One
Atom Transistor


Boffins
Build the Smallest Transistor, Controlled By an Atom


                The
Register
8/15/18


 


Validation
Of Schwarzites


Long-Sought
Carbon Structure Joins Graphene, Fullerene Family


                Science Daily 8/13/18


 


AI:
Myth Vs Reality


Artificial
Intelligence: How Much is Hype and How Much is Reality?


                Networks Asia 8/12/18


 


What
Powers AI & ML


Powering
AI in the Enterprise


                Data Center Knowledge 8/9/18


 


Take care, have a great week and always remember


 


"There
is always something to learn"


Andrea Bocelli (1958 - )
Italian Classical Singer


 


 


Warren Avery


IT
Weekly Newsletter


602-463-6558


wavery@ITWeeklyNewsletter.com


www.PrometheanDataSolutions.com


http://www.linkedin.com/in/wavery


 


The IT Weekly Newsletter is complimentary to individuals;
any contribution is greatly appreciated:


http://www.prometheandatasolutions.com/paypal01.php


 


If you would prefer not to receive
further newsletters:


 


1. Click on the Reply button.


2. Replace the Subject field with the word REMOVE.


3. Click the Send button.


 


You will receive one additional e-mail message confirming
your removal.


 


NOTICE: This e-mail and any attachment is confidential. It
may only be read, copied and used by the intended recipient(s). If you are not
the intended recipient(s), you may not copy, use, distribute, forward, store or
disclose this e-mail or any attachment. If you are not the intended
recipient(s) or have otherwise received this e-mail in error, you should destroy
it and any attachment and notify the sender by reply e-mail.



URL links, link contents and Trademarks are copyright of their
respective owners.


 


The IT Weekly
Newsletter may not be reprinted, copied or distributed without the prior
written permission of Promethean Data Solutions, Inc.


602-463-6558


www.PrometheanDataSolutions.com


2017


Prometheandatasolutions.com

Categories: Business goods Development Information
Age: 14 until 18 year 19 until 30 year 31 until 64 years 65 and older

Deel deze nieuwsbrief op

© 2018