IT Weekly Newsletter October 1, 2018 (Vol 18 #38)

19 days ago


Text only:

Get ready for a new look to the
Newsletter...we are not quite finished but you can get a sneak peak at
the beta site...


 


http://www.prometheandatasolutions.com/2018-index.php


 


Now in the 18th year, we have found lots of articles and
saved every single one with no way to make these available to you.  We have
gone back to 2011 and uploaded every article (12,000+) sorted by subject. 
No more searches that respond with millions of 'hits' now you can read the most
current artilcles and then do a key word
search.


 


IT Weekly Newsletter October
1, 2018


(Vol 18 #38)


 


Ask WHY first.


If you dont know WHY, the HOW, WHAT, WHEN and WHO dont
matter!


 


45 Articles across 15 Subjects for the Week of 9-21-18 to
9-27-2018


 


Some people come into our lives as blessings. Some come
into our lives as lessons.


St Mother Teresa
(1910-1997) Missionary, Nobel Peace Prize Winner


 


SUBJECTS (CLICK the Subjects then click on the TITLE of interest and a hyperlink takes you to the
article)


 


Big
Data
/ Analytics


               
Graph Technology


Cloud


               
Costs That Will Get You Fired


               
5G Impact


               
Reboot


               
SLA Key Points


Compliance


               
PCI Slipping


               
GDPR Key Lessons


Data
Management


               
Graph Technology


               
Sharing the Security Responsibility


DEVOPS


               
Operational Strategy


Disaster
Recovery


               
Take Advantage Of All
Resources


Encryption


               
WPA3


               
Storage


IoT


               
Edge Computing Holds Promise


Management


               
Retaining Your Best


               
Decision Making Questions


               
CIO Archetypes


               
Security Training Tips


               
String Leadership Traits


               
More Important than Compensation


Mobile
Devices


               
Spray-On Antennas


Networks /
Internet


               
5G Is Coming


               
WPA3 Encryption


               
5G Cloud Impact


               
Needed Security Methods


Operations


               
Migrating Dusty Mission-Critical Systems


               
Assessing KPIs


               
Edge Computing Holds Promise


Rabbit
Sense


               
Salary Negotiation


               
8 Must Ask Interview Questions


               
Behind Every Interview Question


Security


               
Startup Trust


               
Finding The Right Tool


               
Hacking Back Dangers


               
Equifax And The Expired
Certificate


               
Training Tips


               
Data Manipulation


               
Sharing Data Responsibility


               
AI Concerns


               
NIST Cybersecurity Roadmap


               
Thinking Like An
Attacker


               
Top Threat For
Years


Storage


               
Ultrathin Memory


               
NVMe Full Benefits


               
Encryption


               
NVMe Adoption


               
Persistent Memory


Technology


               
Walmart Implements Blockchain


               
AI Algorithms On Real
Robots


               
Revolutionizing Optoelectronic Industry


               
Counting Qubits


               
AI Security Concerns


               
Moore's Law Is Dead


 


The IT Weekly Newsletter is a compilation of 40+ technical
articles from last week curated from over 270 sources and arranged by subject;
no company reviews, no product reviews, no white papers and no press
releases.  The
IT Weekly Newsletter goes out to over 14,300 (2,700+ CLevel) IT professionals
around the world.


 


The IT Weekly Newsletter is for your personal and private use and is not to be copied or
forwarded.


 


The Newsletter is offered to corporations, organizations
and government agencies under quarterly subscription (at $100.00US a week) for
posting or distribution as an educational and/or brand awareness tool.  Sponsored Links are
available for $125.00US a week.


 


ARTICLES


 


Big Data / Analytics 
(Back to
Index)


 


Graph Technology


Why
You Should Extend Your Data Insights with Graph Analytics


               
TechRepublic 9/24/18


 


Cloud 
(Back to
Index)


 


Costs That Will Get You Fired


4
Hidden Cloud Computing Costs that Will Get You Fired


               
InfoWorld 9/21/18


 


5G Impact


5G
Will Bring Cloud Computing to Everyone


               
InfoWorld 9/25/18


 


Reboot


Don't
Be Afraid to Reboot Your Cloud Architecture


               
InformationWeek 9/24/18


 


SLA Key Points


Five
Key Points for Every SLA


               
TechRepublic 9/20/18


 


Compliance  (Back to
Index)


 


PCI Slipping


PCI
Compliance Slipping for First Time In 6 Years, but IT Remains On Top


               
TechRepublic 9/24/18


 


GDPR Key Lessons


5
Key Lessons for Organizations Still Struggling with GDPR


               
Information Management 9/24/18


 


Data Management  (Back to
Index)


 


Graph Technology


Why
You Should Extend Your Data Insights with Graph Analytics


               
TechRepublic 9/24/18


 


Sharing the Security Responsibility


Data
Security Sharing the Responsibility


               
Business 2 Community 9/21/18


 


DEVOPS 
(Back to
Index)


 


Operational Strategy


DevOps
is an Operational Strategy, Not a Project


               
NetworkComputing 9/21/18


 


Disaster Recovery 
(Back to
Index)


 


Take Advantage Of All Resources


With
a Data Recovery Plan, Take Advantage of All Resources


               
Search
Disaster Recovery
9/27/18


 


Encryption 
(Back to
Index)


 


WPA3 Encryption


WPA3
Brings New Authentication and Encryption to WiFi


               
NetworkComputing 6/25/18


 


Storage


What
do You Mean By Storage
Encryption?


               
HelpNet Security 9/24/18


 


IoT 
(Back to
Index)


 


Edge Computing Holds Promise


How
Edge Computing Will Change Enterprise IT


               
InformationWeek 9/19/18


 


Management 
(Back to
Index)


 


Retaining Your Best


How
to Retain Your Best IT Workers


               
InformationWeek 9/26/18


 


Decision Making Questions


3
Questions I ask Before Making Decisions


               
The
Ladders
9/25/18


 


CIO Archetypes


8
CIO Archetypes: What Kind of IT leader are You?


               
CIO 9/18/18


 


Security Training Tips


6
Security Training Hacks to Increase Cyber IQ Org-Wide


               
Dark Reading 9/21/18


 


String Leadership Traits


6
Practical Reasons Why You Are Not a Strong Leader


               
The
Ladders
9/21/18


 


More Important than Compensation


Nearly
60% of Tech Talent say Theres
Something More Important than Compensation


               
Business 2 Community 9/22/18


 


Mobile Devices  (Back to
Index)


 


Spray-On Antennas


Spray-On
Antennas Could Unlock Potential of Smart, Connected Technology


               
Science
Daily
9/21/18


 


Networks / Internet 
(Back to Index)


 


5G Is Coming


He
5G Revolution is Coming. Here's
Everything You Need to Know


               
cnet 9/27/18


 


WPA3 Encryption


WPA3
Brings New Authentication and Encryption to WiFi


               
NetworkComputing 6/25/18


 


5G Cloud Impact


5G
Will Bring Cloud Computing to Everyone


               
InfoWorld 9/25/18


 


Needed Security Methods


What
Network Security Methods Do I Need to Keep Data Safe?


               
Search
Data Center
9/21/18


 


Operations 
(Back to
Index)


 


Migrating Dusty Mission-Critical Systems


That
Scary Old System with 'Do Not Touch' On It? Your Boss Very Much Wants You to
Touch It. Now What Do You Do?


               
The
Register
9/25/18


 


Assessing KPIs


Why
Organizations Should Regularly Assess the KPIs They Track


               
Information Management 9/21/18


 


Edge Computing Holds Promise


How
Edge Computing Will Change Enterprise IT


               
InformationWeek 9/19/18


 


Rabbit Sense 
(Back to
Index)


 


Salary Negotiation


Four
Things You Absolutely Must Do in Your Salary Negotiation


               
Fast Company 9/24/18


 


8 Must Ask Interview Questions


Always
Ask These 8 Questions In a Job
Interview


               
Fast Company 9/21/18


 


Behind Every Interview Question


Every
Interview Question is Really This Question


               
Fast Company 9/24/18


 


Security 
(Back to
Index)


 


Startup Trust


Why
Entrusting Security to a Startup May Be Worth the Risk


               
Data
Center Knowledge
9/25/18


 


Finding The
Right Tool


To
Find the Right Security Tool, Know Thyself Or Navigating the Security Maze


               
SC
Magazine
9/26/18


 


Hacking Back Dangers


Hacking
Back: Simply a Bad Idea


               
Dark Reading 9/24/18


 


Equifax And
The Expired Certificate


Equifax
IT Staff Had to Rerun Hackers' Database Queries to Work Out What Was Nicked
Audit


               
The
Register
9/17/18


 


Training Tips


6
Security Training Hacks to Increase Cyber IQ Org-Wide


               
Dark Reading 9/21/18


 


Data Manipulation


Data
Manipulation: How Security Pros Can Respond to an Emerging Threat


               
Dark Reading 9/21/18


 


Sharing Data Responsibility


Data
Security Sharing the Responsibility


               
Business 2 Community 9/21/18


 


AI Concerns


Growth
In AI Deployments Adding To
Security Concerns at Most Organizations


               
Information Management 9/21/18


 


NIST Cybersecurity Roadmap


Turn
the NIST Cybersecurity Framework into Reality: 5 Steps


               
Dark Reading 9/20/18


 


Thinking Like
An Attacker


Think
Like An Attacker: How a Red Team
Operates


               
Dark Reading 9/20/18


 


Top Threat For Years


Europol:
Ransomware Will be Top Threat for Years


               
InfoSecurity 9/22/18


 


Storage 
(Back to
Index)


 


Ultrathin Memory


Ultrathin
Memory Storage Device could Spell Breakthroughs


               
Search
Storage
9/27/18


 


NVMe Full Benefits


How
to Get the Full Benefits from NVMe Flash Storage


               
Search
Storage
9/27/18


 


Encryption


What
do You Mean By Storage
Encryption?


               
HelpNet Security 9/24/18


 


NVMe Adoption


How
NVMe Technology Will Rock the Enterprise Storage Boat


               
Search
Storage
9/21/18


 


Persistent Memory


Storage
Class Memory Advances Could Be a Game-Changer


               
Search
Storage
9/21/18


 


Technology 
(Back to
Index)


 


Walmart Implements Blockchain


Walmart,
Sam's Club Start Mandating Suppliers Use IBM Blockchain


               
Data
Center Knowledge
9/25/18


 


AI Algorithms On Real Robots


How
Do Some of the Best AI Algorithms Perform on Real Robots? Not Well, it Turns Out


               
The
Register
9/25/18


 


Revolutionizing Optoelectronic Industry


Smaller,
Faster and More Efficient Modulator Sets to Revolutionize Optoelectronic
Industry


               
Science
Daily
9/24/18


 


Counting Qubits


Quantum
Computing: A New Way to Count Qubits


               
Science
Daily
9/24/18


 


AI Security Concerns


Growth
In AI Deployments Adding To
Security Concerns at Most Organizations


               
Information Management 9/21/18


 


Moore's Law Is Dead


Moore's
Law Is Dead': Three Predictions About the Computers of Tomorrow


               
TechRepublic 9/19/18


 


 


Take care, have a great week and always remember


 


"There is always something to learn"


Andrea Bocelli
(1958 - ) Italian Classical Singer


 


 


Warren Avery


IT Weekly Newsletter


602-463-6558


wavery@ITWeeklyNewsletter.com


www.PrometheanDataSolutions.com


http://www.linkedin.com/in/wavery


 


The IT Weekly Newsletter is complimentary to individuals;
any contribution is greatly appreciated:


http://www.prometheandatasolutions.com/paypal01.php


 


If you would prefer not to receive further
newsletters:


 


1. Click on the Reply button.


2. Replace the Subject field with the word
REMOVE.


3. Click the Send button.


 


You will receive one additional e-mail message confirming
your removal.


 


NOTICE: This e-mail and any attachment is confidential. It
may only be read, copied and used by the intended recipient(s). If you are not
the intended recipient(s), you may not copy, use, distribute, forward, store or
disclose this e-mail or any attachment. If you are not the intended recipient(s)
or have otherwise received this e-mail in error, you should destroy it and any
attachment and notify the sender by reply e-mail.



URL links, link contents and Trademarks are copyright of
their respective owners.


 


The IT Weekly Newsletter may not be reprinted, copied or
distributed without the prior written permission of Promethean Data Solutions,
Inc.


602-463-6558


www.PrometheanDataSolutions.com


2017


Prometheandatasolutions.com

Categories: Business goods Development Information
Age: 14 until 18 year 19 until 30 year 31 until 64 years 65 and older

Deel deze nieuwsbrief op

© 2018