IT Weekly Newsletter September17, 2018 (Vol 18 #36)

1 month ago


Text only:

IT Weekly Newsletter
September 17, 2018


(Vol 18 #36)


 


Ask WHY first.


If
you dont know WHY, the HOW, WHAT, WHEN and WHO dont matter!


 


47 Articles across 16 Subjects for the Week of
9-7-18 to 9-13-2018


 


We can complain that the rosebush has thorns - or
rejoice that the thorn bush has roses.


Abraham Lincoln (1809-1865)
16th President of the United States


 


SUBJECTS
(CLICK the Subjects then click on the TITLE of interest and a
hyperlink takes you to the article)


 


Big Data /
Analytics


                Time to Invest?


                Caring About Variance And Covariance


Cloud


                Outage Hard Lesson


                Re-Architecting IT


                Whos Afraid


                Controlling Costs


                Attack Vectors


                Protect Your Data


Compliance


                BA May Face 1st GDPR Major Fine


                Role of Incident Response


Data Management


                Roadblocks


DEVOPS


                Demystified


                Best Paid For Non-Boss Techies


                Simplify Disaster Recovery


Disaster Recovery


                DevOps Simplify


EMail


                Impersonation Fraud


Encryption


                Five Eyes Controversy


Management


                Reporting Line of the CISO


                CEO Questions To
The CIO


                Win Over The
Board On Security


                Proving the ROI of Security


                Cloud-First


                Negotiation Mistakes


Networks
/ Internet


                Leaf-Spine Architectures


                Internal Dysfunction


                P2P and IPv6


                Does Software Fit


Operations


                The Right Firewall


                Does Software Networking Fit


Rabbit
Sense


                Sound Smarter


Security


                Embrace AI Mitigation?


                IAST and SCA


                Cryptomining Malware Families


                Win Over The
Board On Security


                British Airways Hack Preliminary


                Balancing Privacy Vs. Convenience


                Social Media Metrics


                Proving the ROI


                APIs: the Trojan Horses


                DevOps Demystified


                Trusted Insider


                Cloud Attack Vectors


                Infrastructure As Code


                TLS 1.3 Preparation


                Healthy Data Diet Is the Secret


                SOC Makeover


Social Media


                Security Metrics


Storage


                Spinning-Up Persistent Memory
Caching


Technology


                Terahertz Clock Rates


                Metal Jet 3D Printer


                Success With
AI


                Quantum Computers One Step
Closer


                Neural Network Can Learn


                AI Robots Develop Prejudice


                Entanglement of Six Light Waves


 


The
IT Weekly Newsletter is a compilation of 40+ technical articles from last week
curated from over 270 sources and arranged by subject; no company reviews, no
product reviews, no white papers and no press releases.  The IT Weekly Newsletter goes out to over
14,300 (2,700+ CLevel) IT professionals around the world.


 


The
IT Weekly Newsletter is for your personal and private use and is not to
be copied or forwarded.


 


The Newsletter is offered to corporations, organizations and government agencies
under quarterly subscription (at $100.00US a week) for posting or distribution
as an educational and/or brand awareness tool. 
Sponsored Links are available for $125.00US a week.


 


ARTICLES


 


Big Data / Analytics  (Back
to Index)


 


Time
to Invest?


5
Signs You Should Invest in Data Science


                Business 2 Community 9/10/18


 


Caring
About Variance And Covariance


Why
Should You Care About Variance and Covariance In
Business


                Business 2 Community 9/7/18


 


Cloud  (Back
to Index)


 


Outage
Hard Lesson


Azure
Outage Proves the Hard Way that Availability Zones are a Good Idea


                Data Center Knowledge 9/11/18


 


Re-Architecting
IT


Re-Architecting
IT for Multicloud: 5 Key Steps


                Networks Asia 9/11/18


 


Whos
Afraid


Whos
Afraid of Cloud Native?


                Data Center Dynamics 9/7/18


 


Controlling
Costs


The
Simple Fix So Your Cloud Costs Dont Spin Out of Control


                InfoWorld 9/7/18


 


Attack
Vectors


8
Attack Vectors Puncturing Cloud Environments


                Dark
Reading
9/7/18


 


Protect
Your Data


Dont
Rely on the Cloud Provider to Protect Your Data


                Data Center Knowledge 9/7/18


 


Compliance  (Back
to Index)


 


BA
May Face 1st GDPR Major Fine


British
Airways Hacking Leaves Airline Open to Fines Under
GDPR Rules


                Information Management 9/10/18


 


Role
of Incident Response


The
Role of Incident Response in ICS Security Compliance


                Dark
Reading
9/7/18


 


Data Management  (Back to Index)


 


Roadblocks


10
Roadblocks to Becoming a Data-Driven Enterprise


                InformationWeek 9/4/18


 


DEVOPS  (Back
to Index)


 


Demystified


DevOps
Demystified: A Primer for Security Practitioners


                Dark
Reading
9/10/18


 


Best
Paid For Non-Boss Techies


Soft
Eng Salaries Soar By 25 Per Cent And, Oh Yes, DevOps is Best Paid for
Non-Boss Techies


                The
Register
9/7/18


 


Simplify
Disaster Recovery


Using
DevOps to Simplify Disaster Recovery


                NetworkComputing 9/6/18


 


Disaster
Recovery  (Back to Index)


 


DevOps
Simplify


Using
DevOps to Simplify Disaster Recovery


                NetworkComputing 9/6/18


 


Email  (Back
to Index)


 


Impersonation
Fraud


Why
That Email From Your Boss Could Be A Scam Waiting To
Happen


                TechRepublic 9/10/18


 


Encryption  (Back
to Index)


 


Five Eyes Controversy


Controversy
Erupts Over Five Eyes Countries Statement on Encryption


                IT
World Canada
9/7/18


 


Management  (Back
to Index)


 


Reporting
Line of the CISO


Why
Are We Still Talking About the Reporting Line of the CISO?


                Business 2 Community 9/13/18


 


CEO
Questions To The CIO


What
Boards and CEOs Should Be Asking CIOs


                InformationWeek 9/10/18


 


Win
Over The Board On Security


5
Steps That Can Help CISOs Win Over the Board on Security Programs


                Information Management 9/12/18


 


Proving
the ROI of Security


Swaying
the C-Suite: Proving the ROI of a Sound Security Strategy


                Information Management 9/7/18


 


Cloud-First


The
3 Reasons CIOs have Become Cloud-First


                InfoWorld 9/11/18


 


Negotiation
Mistakes


All
the Things Youre Doing Wrong in Negotiations


                Fast
Company
9/10/18


 


Networks / Internet  (Back to Index)


 


Leaf-Spine
Architectures


Why
Networks are Evolving Toward Leaf-Spine Architectures


                NetworkComputing 9/11/18


 


Internal
Dysfunction


How
Internal Dysfunction Puts Your Network at Risk


                HelpNet Security 9/11/18


 


P2P
and IPv6


Ensuring
P2P Apps don't Cause Network Performance Issues with IPv6


                Search Networking 9/10/18


 


Does
Software Fit


Does
Software Networking Fit Modern Data Center Requirements?


                Search
SDN
9/10/18


 


Operations  (Back to Index)


 


The
Right Firewall


Getting
the Right Firewall Protection for Your Data Centre


                Networks Asia 0/12/18


 


Does
Software Networking Fit


Does
Software Networking Fit Modern Data Center Requirements?


                Search
SDN
9/10/18


 


Rabbit Sense  (Back
to Index)


 


Sound
Smarter


Five
Easy Ways to Sound Smarter


                Fast
Company
9/10/18


 


Security  (Back to Index)


 


Embrace
AI Mitigation?


Are
Organizations Ready to Embrace AI Security Mitigation?


                Information Management 9/10/18


 


IAST
and SCA


The
Intersection Between IAST and SCA And Why You Need
Both in Your Security Toolkit


                Networks Asia 9/13/18


 


Cryptomining
Malware Families


8
Cryptomining Malware Families to Keep on the Radar


                Dark
Reading
9/12/18


 


Win
Over The Board On Security


5
Steps That Can Help CISOs Win Over the Board on Security Programs


                Information Management 9/12/18


 


British
Airways Hack Preliminary


British
Airways Hack: Infosec Experts Finger Third-Party Scripts on Payment Pages


                The
Register
9/11/18


 


Balancing
Privacy Vs. Convenience


Where
Do Your Customers Stand on the Convenience vs. Security Debate?


                Networks Asia 9/11/18


 


Social
Media Metrics


Need-to-Know
Social Media Metrics for Data Security Teams


                Information Management 9/5/18


 


Proving
the ROI


Swaying
the C-Suite: Proving the ROI of a Sound Security Strategy


                Information Management 9/7/18


 


APIs:
The Trojan Horses


APIs: The
Trojan Horses Of Security


                HelpNet Security 9/10/18


 


DevOps
Demystified


DevOps
Demystified: A Primer for Security Practitioners


                Dark
Reading
9/10/18


 


Trusted
Insider


Are
You the Biggest Threat to Your Employer


                Networks Asia 9/10/18


 


Attack
Vectors


8
Attack Vectors Puncturing Cloud Environments


                Dark
Reading
9/7/18


 


Infrastructure
As Code


Introduction
to Infrastructure as Code


                NetworkComputing 8/30/18


 


TLS
1.3 Preparation


TLS
1.3 Won't Break Everything


                Dark
Reading
9/7/18


 


Healthy
Data Diet Is the Secret


Why
a Healthy Data Diet Is the Secret to Healthy Security


                Dark
Reading
  9/6/18


 


SOC
Makeover


The
SOC Gets a Makeover


                Dark
Reading
9/6/18


 


Social Media  (Back
to Index)


 


Security
Metrics


Need-to-Know
Social Media Metrics for Data Security Teams


                Information Management 9/5/18


 


Storage  (Back to Index)


 


Spinning-Up
Persistent Memory Caching


Prepare
to Have Your Minds Blown, Storage Industry. 5 Words: Client Access Optane DIMM
Caching


                The
Register
9/7/18


 


Technology  (Back to Index)


 


Terahertz Clock Rates


Graphene
Enables Clock Rates In the Terahertz Range


                Science Daily 9/10/18


 


Metal
Jet 3D Printer


HP's
Metal Jet 3D Printer may Build Your Next Car's Innards


                cnet 9/10/18


 


Success
With AI


Success
with Automation and AI Requires a High 'RQ'


                Search
CIO
9/9/18


 


Quantum
Computers One Step Closer


Penn
State Researchers Discover Fresh Way to Speed Up
Creation of Quantum Computers


                v3
co uk
9/5/18


 


Neural
Network Can Learn


Bots
Using MIT's Neural Network can Teach Themselves How to
Manipulate Objects They've Never Seen


                v3
co uk
9/10/18


 


AI
Robots Develop Prejudice


Could AI
Robots Develop Prejudice on Their Own?


Science Daily 9/6/18


 


Entanglement
of Six Light Waves


Experiment
Obtains Entanglement of Six Light Waves With a Single
Laser


                Science Daily 9/6/18


 


Take care, have a great week and always remember


 


"There
is always something to learn"


Andrea Bocelli (1958 - )
Italian Classical Singer


 


 


Warren Avery


IT
Weekly Newsletter


602-463-6558


wavery@ITWeeklyNewsletter.com


www.PrometheanDataSolutions.com


http://www.linkedin.com/in/wavery


 


The IT Weekly Newsletter is complimentary to individuals;
any contribution is greatly appreciated:


http://www.prometheandatasolutions.com/paypal01.php


 


If you would prefer not to receive
further newsletters:


 


1. Click on the Reply button.


2. Replace the Subject field with the word REMOVE.


3. Click the Send button.


 


You will receive one additional e-mail message confirming
your removal.


 


NOTICE: This e-mail and any attachment is confidential. It
may only be read, copied and used by the intended recipient(s). If you are not the
intended recipient(s), you may not copy, use, distribute, forward, store or
disclose this e-mail or any attachment. If you are not the intended
recipient(s) or have otherwise received this e-mail in error, you should
destroy it and any attachment and notify the sender by reply e-mail.


 


URL links, link contents and Trademarks are copyright of their
respective owners.


 


The IT Weekly Newsletter
may not be reprinted, copied or distributed without the prior written
permission of Promethean Data Solutions, Inc.


602-463-6558


www.PrometheanDataSolutions.com


2017


Prometheandatasolutions.com

Categories: Business goods Development Information
Age: 14 until 18 year 19 until 30 year 31 until 64 years 65 and older

Deel deze nieuwsbrief op

© 2018