A curated technology Newsletter with no Company or Product reviews

Published twice weekly to keep you informed

 

IT Weekly Newsletter August 22, 2020

Articles Added from 8-15-2020 to 8-21-2020

 

"Things don't have to change the world to be important.

Steve Jobs (1955 - 2012) Founder of Apple Computer

 

Weekly Podcast with Small World Big Data

 

An API to access our SQL repository of article links and metadata can be added to your internal or external website that would assist in keeping your staff up to date and/or visitors on your site.  Call us at 602-463-6558 for pricing. Imagine the productivity if we can save one hour per staff per week in staying current.

 

In addition to these recent articles added since the last Newsletter search over 16,570+ archived articles using the SEARCH box with a keyword or keywords.

 

SECURITY

 

Threat Intelligence: MISP Lab Setup

How to Control Security Costs During a Down Economy

Incident Response- Linux Cheatsheet

Stolen Data: The Gift That Keeps on Giving

Phishing Emails Used to Deploy KONNI Malware (CISA Alert AA20-227A)

DHS CISA Warns of Phishing Emails Rigged with KONNI Malware

Zero-Trust Security 101

Crypto-Mining Worm Steal AWS Credentials

 

CLOUD TECHNOLOGY

 

Cloud Repatriation: Why It's More Than 'Just' Public Cloud Retreat

Cloud: The Currency for the New Normal

 

MANAGEMENT and LEADERSHIP

 

CISOs Should Put Ad Fraud Security on Their Radars

Cyber Insurance: The Moral Quandary of Paying Criminals Who Stole Your Data

62% of Female Keynote Speakers Experienced Discrimination at Tech Conferences

5 Emerging Tech Terms You Should Know from Gartner's 25th Hype Cycle Report

Morningstar on Reshaping Its Infrastructure for Flexibility

Four Ways Good Leaders Become Great Ones

 

NETWORKS and CONNECTIVITY

 

Wi-Fi HaLow Standard a New Modality for Wireless Access Control

Virtual Meetings Overshadow Telephony More Than Ever

5G Rollout Includes Challenges to Supply Chain, WFH Value

8 Reports to Help Manage Telecom Costs

Time to Toss Your Traditional WAN... Finally?

 

DEVOPS and AGILE DEVELOPMENT

 

Why Quality & Security Both Matter in Software

 

DATA PROTECTION and ANALYTICS

 

Python Is Eating the World: How One Developer's Side Project Became the Hottest Programming Language On the Planet

Throwing a Fastball: How the Minnesota Twins Are Using Machine Learning to Analyze Mounds of Data

5 Analytics Mistakes You Need to Avoid

Data Health Check 2020

Creating a House of Mirrors to Protect Your Unstructured Data

Privacy with Machine Learning Best Libraries Example with Tensorflow

Elephants vs Trains: This is How AI Helps Ensure They Don't Collide

 

DATA CENTER OPERATIONS

 

Transparent Solar Panels for Windows Hit Record 8 Percent Efficiency

 

GEEK STUFF

 

The Long Journey Into Holographic Transportation

Preparations Begin for AWS Center for Quantum Computing at Caltech

 

SERVER ADMINISTRATION

 

STORAGE TECHNOLOGIES

 

Cloud Storage Options in a Nutshell: Storing and Securing Your Stuff

 

AUDIT and COMPLIANCE

 

POTPOURRI

 

10 Resume and Interview Tips from Security Pros

15 Simple Things You Can Do Today that Will Help

  We do not use cookies or collect, store or save any information on visitors.  The only items we collect are that someone visited and the articles viewed. We never share or sell our subscriber list.

 

 

Feel free to forward the Newsletter to your staff, associates, peers and anyone involved in IT

 

Warren Avery

602-463-6558

wavery@ITWeeklyNewsletter.com

http://www.linkedin.com/in/wavery

 

If you would like to advertise with us, give me a call.

 

If you would prefer not to receive further newsletters:

 

1. Click on the Reply button.

2. Replace the Subject field with the word REMOVE.

3. Click the Send button.

 

URL links, link contents and Trademarks are copyright of their respective owners.