IT Weekly Newsletter September3, 2018 (Vol 18 #34)

1 month ago


Text only:

IT Weekly Newsletter September
3, 2018


(Vol 18 #34)


 


Ask WHY first.


If you dont know WHY, the HOW,
WHAT, WHEN and WHO dont matter!


 


51 Articles across 15 Subjects for the Week of
8-21-18 to 8-30-2018


 


Success is sometimes the outcome of a whole string
of failures.


Vincent van Gogh (1853-1890) Dutch Painter


 


SUBJECTS
(CLICK the Subjects then click on the TITLE of interest and a
hyperlink takes you to the article)


 


Big Data / Analytics


               
Hire a Translator To
Maximize Results


               
Innovate Or Be Left
Behind


               
Not Just Technology


               
Emerging Projects


Cloud


               
Edge Computing


               
What Goes Where


               
DevOps Test Automation


               
Avoid Overspending


               
FedRAMP


               
The Biggest Risk


Compliance


               
Californias New Privacy Act


               
PIPEDA


               
California Law Domino Effect


               
GDPR Ripple


Data Management


               
Data Quality Threats


DEVOPS


               
Labels Dont Matter


               
Overcome Challenges


               
Cloud Test Automation


               
Sample Interview Questions


               
Embedding Security


Disaster Recovery


               
50% Suffer Unrecoverable Data Even


EMail


               
6.4 Billion Fake Every Day


IoT


               
Worldwide Failure Plague


Management


               
Innovate Or Be Left
Behind


               
CISO & CMO Becoming Friends


Networks / Internet


               
SD-WAN Security Mistakes


               
Year of 100GbE


               
5G Network Splicing and SFC


               
IPv6 Peering Disputes


               
Fighting Siloes


               
Architect Job Evolving


Operations


               
Edge Computing


               
What Goes Where


               
50% Suffer Unrecoverable Data Even


Rabbit Sense


               
Resume Tips


               
Preparing For A
Negotiation


               
Tortoise Beats The Hare
Every Time


               
Questions To Ask In An
Interview


Security


               
Blockchain Applications


               
SD-WAN Mistakes


               
Providing Effectiveness Evidence


               
Software-Defined Perimeter


               
FedRAMP


               
Hollywood Predictions


               
Prevention And Analysis
Technologies


               
Surviving Cyber War


               
Why Are There Update Delays


               
Awareness Issues


               
Modular Downloader Threat


               
A False Sense


Storage


               
SSD Form Factors


               
SSD Garbage Collection


               
Companies To Watch


Technology


               
AI Bias Problem


               
Future of Blockchain


               
Terrifying Uses Of AI


               
Quantum Leap


               
AI Cans and Cant's


               
Bowtie Funnel Conducts Light


 


The IT Weekly Newsletter is a compilation of 40+ technical
articles from last week curated from over 270 sources and arranged by subject;
no company reviews, no product reviews, no white papers and no press
releases.  The
IT Weekly Newsletter goes out to over 14,300 (2,700+ CLevel) IT professionals
around the world.


 


The IT Weekly Newsletter is for your personal and private
use and is not to be copied or forwarded.


 


The Newsletter is offered to corporations, organizations and
government agencies under quarterly subscription (at $100.00US a week) for
posting or distribution as an educational and/or brand awareness tool.  Sponsored Links are
available for $125.00US a week.


 


ARTICLES


 


Big Data / Analytics 
(Back to Index)


 


Hire a Translator To Maximize Results


How to
Maximize Big Data Results


           
Business
2 Community
8/30/18


 


Innovate Or Be
Left Behind


Don't
Keep Your Customer Waiting


           
Networks
Asia
8/28/18


 


Not Just Technology


Big Data
Is Now Economics and Not Just Technology


           
TechRepublic 8/28/18


 


Emerging Projects


7
Emerging Open Source Big Data Projects that Will Revolutionize Your
Business


           
Networks
Asia
8/26/18


 


Cloud 
(Back to Index)


 


Edge Computing


Edge
Computing and The Future of the
Data Center


           
Networks
Asia
8/29/18


 


What Goes Where


Edge
Or Cloud? The 6 Factors that
Determine Where to Put Workloads


           
Information Management 8/29/18


 


DevOps Test Automation


Cloud-Native DevOps wont Work Without Test Automation


           
InfoWorld 8/28/18


 


Avoid Overspending


How to
Avoid Overspending on Cloud


           
Networks
Asia
8/28/18


 


FedRAMP


FedRAMP:
Friend or Foe for Cloud Security?


           
Information Management 8/28/18


 


The Biggest Risk


The
Biggest Risk in Cloud Computing is Not Doing It


           
InfoWorld 8/21/19


 


Compliance  (Back to Index)


 


Californias New Privacy Act


Californias New Privacy Act may Drive Tighter Controls in
Data Centers


           
Data
Center Knowledge
8/29/18


 


PIPEDA


Partners
in Compliance: Preparing for Changes to PIPEDA


           
IT World
Canada
8/22/18


 


California Law Domino Effect


The
California Data Protection Law Domino Effect


           
Information Management 8/27/18


 


GDPR Ripple


The GDPR
Ripple Effect


           
Dark Reading 8/23/18


 


Data Management  (Back to Index)


 


Data Quality Threats


10
Common Pitfalls that Threaten Data Quality Strategies


           
Information Management 8/27/18


 


DEVOPS 
(Back to Index)


 


Labels Dont Matter


ITIL,
DevOps, Whatever The Labels dont Matter


           
InformationWeek 8/27/18


 


Overcome Challenges


How
Mid-Size Firms can Overcome DevOps Challenges


           
InformationWeek 8/28/18


 


Cloud Test Automation


Cloud-Native DevOps wont Work Without Test Automation


           
InfoWorld 8/28/18


 


Sample Interview Questions


Tackle
These 10 Sample Devops Interview Questions and Answers


           
The
Server Side
8/16/18


 


Embedding Security


Embedding Security into the DevOps Toolchain


           
Dark Reading 8/23/18


 


Disaster Recovery  (Back to Index)


 


50% Suffer Unrecoverable Data Even


Nearly
Half of Businesses Suffered An
Unrecoverable Data Event in the Last Three Years


           
HelpNet Security 8/24/18


 


Email 
(Back to Index)


 


6.4 Billion Fake Every Day


6.4
Billion Fake Emails Sent Every Day


           
HelpNet Security 8/24/18


 


IoT 
(Back to Index)


 


Worldwide Failure Plague


IoT
Failures Plague Most Users Worldwide


           
HelpNet Security 8/28/18


 


Management 
(Back to Index)


 


Innovate Or Be
Left Behind


Don't
Keep Your Customer Waiting


           
Networks
Asia
8/28/18


 


CISO & CMO Becoming Friends


Why
CISOs Should Make Friends with Their CMOs


           
Dark Reading 8/27/18


 


Networks / Internet 
(Back to Index)


 


SD-WAN Security Mistakes


The 5
Biggest Mistakes in SD-WAN Security


           
NetworkComputing 8/29/18


 


Year of 100GbE


The Year
of 100GbE in Data Center Networks


           
Data
Center Knowledge
8/28/18


 


5G Network Splicing and SFC


Understanding the Value of Network Slicing and SFC in 5G
Wireless


           
TechRepublic 8/28/18


 


IPv6 Peering Disputes


We've
Found Another Problem with Ipv6:
It's Sparked a Punch-Up Between Top Networks


           
The
Register
8/28/18


 


Fighting Siloes


3
Strategies to Fight Network Siloes


           
NetworkComputing 8/23/18


 


Architect Job Evolving


Network
Architect Jobs Evolve


           
NetworkComputing 8/22/18


 


Operations 
(Back to Index)


 


Edge Computing


Edge
Computing and The Future of the
Data Center


           
Networks
Asia
8/29/18


 


What Goes Where


Edge
Or Cloud? The 6 Factors that
Determine Where to Put Workloads


           
Information Management 8/29/18


 


50% Suffer Unrecoverable Data Even


Nearly
Half of Businesses Suffered An
Unrecoverable Data Event in the Last Three Years


           
HelpNet Security 8/24/18


 


Rabbit Sense 
(Back to Index)


 


Resume Tips


10
Resume Tips You Probably Havent Thought of


           
Fast Company 8/29/18


 


Preparing For A
Negotiation


Ask
Yourself These 7 Questions When Preparing for a Negotiation


           
Fast Company 8/28/18


 


Tortoise Beats The Hare Every Time


In The
Race of Life, The Tortoise Beats
the Hare Every Time


           
Science
Daily
8/27/18


 


Questions To Ask In An Interview


HR
Experts Reveal Questions Job Candidates Should Be Asking in
Interviews


           
The
Ladders
8/23/18


 


Security 
(Back to Index)


 


Blockchain Applications


How Can
Blockchain Applications Adapt and Adopt Software Security Best
Practices?


           
Networks
Asia
8/23/18


 


SD-WAN Mistakes


The 5
Biggest Mistakes in SD-WAN Security


           
NetworkComputing 8/29/18


 


Providing Effectiveness Evidence


Empowering Executives with Data Security Effectiveness
Evidence


           
Information Management 8/29/18


 


Software-Defined Perimeter


Why
Security Needs a Software-Defined Perimeter


           
Dark Reading 8/28/18


 


FedRAMP


FedRAMP:
Friend or Foe for Cloud Security?


           
Information Management 8/28/18


 


Hollywood Predictions


Authentication and the Movies: How Hollywood Predicted Our
Cybersecurity Present


           
SC
Magazine
8/28/18


 


Prevention And
Analysis Technologies


The
Difference Between Sandboxing,
Honeypots & Security Deception


           
Dark Reading 8/27/18


 


Surviving Cyber War


Surviving a Cyber-Nuclear War


           
Networks
Asia
8/27/18


 


Why Are There Update Delays


Why Do
Enterprises Take a Long Time to Install Vital Security Updates


           
HelpNet Security 8/24/18


 


Awareness Issues


6
Reasons Security Awareness Programs Go Wrong


           
Dark Reading 8/23/18


 


Modular Downloader Threat


Modular
Downloaders Could Pose New Threat for Enterprises


           
Dark Reading 8/24/18


 


A False Sense


A False
Sense of Security


           
Dark Reading 8/24/18


 


Storage 
(Back to Index)


 


SSD Form Factors


Four
Common SSD Form Factors and Where They Work Best


           
Search
Storage
8/28/18


 


SSD Garbage Collection


How can
SSD Garbage Collection Help Preserve Drive Speeds?


           
Search
Storage
8/28/18


 


Companies To
Watch


10 Hot
Storage Companies to Watch


           
Network World 3/28/18


 


Technology 
(Back to Index)


 


AI Bias Problem


The Bias
Problem with Artificial Intelligence, and How To Solve It


           
Information Management 8/28/18


 


Future of Blockchain


Preparing for the Future of Blockchain


           
Data
Center Knowledge
8/29/18


 


Terrifying Uses Of AI


20
Terrifying Uses of Artificial Intelligence


           
TechRepublic 7/31/18


 


Quantum Leap


NSF
Funds a Leap Toward Quantum
Computing


           
GCN 8/27/18


 


AI Cans and Cant's


Artificial Intelligence: What it Can And Can't Do for Companies


           
Networks
Asia
8/19/18


 


Bowtie Funnel Conducts Light


Bowtie-Funnel Combo Best for Conducting Light; Team Found
Answer In Simple
Equation


           
Science
Daily
8/24/18


 


Take care, have a great week and always remember


 


"There is always something to learn"


Andrea
Bocelli (1958 - ) Italian Classical Singer


 


 


Warren Avery


IT Weekly Newsletter


602-463-6558


wavery@ITWeeklyNewsletter.com


www.PrometheanDataSolutions.com


http://www.linkedin.com/in/wavery


 


The IT Weekly Newsletter is complimentary to individuals;
any contribution is greatly appreciated:


http://www.prometheandatasolutions.com/paypal01.php


 


If you would prefer not to receive further
newsletters:


 


1. Click on the Reply button.


2. Replace the Subject field with the word
REMOVE.


3. Click the Send button.


 


You will receive one additional e-mail message confirming
your removal.


 


NOTICE: This e-mail and any attachment is confidential. It
may only be read, copied and used by the intended recipient(s). If you are not
the intended recipient(s), you may not copy, use, distribute, forward, store or
disclose this e-mail or any attachment. If you are not the intended recipient(s)
or have otherwise received this e-mail in error, you should destroy it and any
attachment and notify the sender by reply e-mail.



URL links, link contents and Trademarks are copyright of
their respective owners.


 


The IT Weekly Newsletter may not be reprinted, copied or
distributed without the prior written permission of Promethean Data Solutions,
Inc.


602-463-6558


www.PrometheanDataSolutions.com


2017


Prometheandatasolutions.com

Categories: Business goods Development Information
Age: 14 until 18 year 19 until 30 year 31 until 64 years 65 and older

Deel deze nieuwsbrief op

© 2018