IT Weekly Newsletter ©
Promethean Data Solutions
Monday February 27th 2017
    Home     Contact Us     About Us     What Others Are Saying Acquisition, Availability and Reliability, BackUp

The only IT Newsletter that is 100% unbiased in its content and delivery. We cut through the spin and get to the facts. Clean, unvarnished and fresh. Every week there are more than 400 online sources that contain articles of interest to IT Professionals at all levels. Every week the IT Weekly Newsletter compiles 12-20 of the absolute best technical articles with no product or company bias, no pop-up ads, no sales angles. addressing everyday issues involving:

Reducing Risk; Improving Quality of Service; Increasing Availability; Reducing Response Time: Increasing Business Productivity; Improving Server, Storage and Networks; Improving Security; Protecting, Preserving and Restoring Data; Improving Regulatory Compliance; Reducing Audit Errors; Reducing Cost and Developing Proactive Business Solutions.

Promethean Data Solutions

This Weeks IT Topics

IT Weekly Newsletter – February 27, 2017, Vol 17 No 8

50 Articles across 16 Subjects for the Week of 2-10-2016 to 2-16-2017

For Your Complimentary Subscription Click on 'Sign Up Now'


If you don't know WHY; HOW, WHAT and WHO don't matter!
The IT Weekly Newsletter is a compilation of 40+ technical articles from last week curated from on-line sources and arranged by subject.
No company reviews, no product reviews, no white papers and no press releases.

What is a Data Fabric?
Sponsored Link from Storage Switzerland


Big Data / Analytics

Human Insight
Redfin CTO says Machine Learning Needs Human Help
ComputerWorld 2/22/17

10 Vs
The 10 Vs of Big Data
Upside 2/8/17

Cleaning
Stop Overdoing it When Cleaning Your Big Data
TechRepublic 2/20/17

Privacy Issues
Big Data Privacy Is a Bigger Issue Than You Think
TechRepublic 2/17/17


Cloud

Data-Jacking
The Era Of Data-Jacking is here. Are You Ready?
Dark Reading 2/16/17

Database Security
Cloud-Based Databases Need New Approaches to Ensure Data Security
HelpNet Security 2/23/17

7 Times Faster
The Cloud Is Growing 7 Times Faster Than the Rest of IT
Network World 2/21/17

Control Shadow IT
8 Steps to Regaining Control Over Shadow IT
IT World 2/21/17

Hybrid Preference
RightScale Cloud Report: Users prefer Hybrid Cloud Solutions
CloudTweaks 2/17/17


Compliance

$5.5M HIPAA Penalty
Poor Access Management Leads to $5.5M HIPAA Penalty
Data Center Knowledge 2/17/17


Data Management

Data Fabrics
Sponsored Link – What is a Data Fabric?
Storage-Switzerland 2/21/17

GDPR Headache
Survey Shows US CIOs Getting a GDPR Headache
InformationWeek 2/21/17

Shrink Data Footprint,
How to Shrink Your Data Storage Footprint
NetworkComputing 2/21/17


Databases

Cloud Security
Cloud-Based Databases Need New Approaches to Ensure Data Security
HelpNet Security 2/23/17


Disk Technology

Ethernet Drives
Future of the Ethernet Drive May Hinge on NVMe Over Ethernet
Search Storage 2/21/17


Email

Personal vs. Corporate Security
Personal Vs. Corporate Email: The Security Threats Differ, says Google
TechRepublic 2/17/17


Encryption

SHA-1 Crack
Researchers Present First Practical Crack for SHA-1 Crypto
IT News 2/24/17


Internet

IoT 'Die Hard' Lessons
Tunneling Through the "Walls" of IoT in the Enterprise
Dark Reading 2/22/17

LTE for IoT
Don’t Wait for 5G: LTE Could Be Your Key to IoT
ComputerWorld 2/21/17

IFTTT Guide
IFTTT: The smart person's guide
TechRepublic 2/13/17

IoT Efficient Power
Efficient Power Converter for Internet of Things
Science Daily 2/17/17


Management

Authorized Trashing?
I Was Authorized to Trash My Employer's Network, Sysadmin Tells Court
The Register 2/23/17

GDPR Headache
Survey Shows US CIOs Getting a GDPR Headache
InformationWeek 2/21/17

Real Breach Cost
We Finally Know How Much a Data Breach can Cost
Network World 2/21/17

Shadow IT Compromise
How the DOT Discovered its Network Was Compromised by Shadow IT
IT World 2/22/17

Riff Sessions
Do You Even Riff?
Business 2 Community 2/21/17

Integration Roadmap
Five Reasons Why Every CIO Needs an Integration Roadmap In 2017
Business 2 Community 2/18./17

Breach Lessons
10 Lessons Learned from Breach Response Experts
Risk Management Monitor 2/17/17

Control Shadow IT
8 Steps to Regaining Control Over Shadow IT
IT World 2/21/17

New FOIA Rules
New FOIA Rules Open Contractors to More Risks of Disclosure
Washington Technology 2/17/17

Budgeting Guide
IT Budgeting: The Smart Person's Guide
TechRepublic 2/16/17

No Formal Digital Strategy
CIO Jury: More Than Half of CIOs Have No Formal Digital Transformation Plan
TechRepublic 2/17/17


Mobile Devices

Stretchable Screens
Stretchable Screens will Follow Upcoming Flexible Ones
Network World 2/20/17


Networks

SD-WAN Vendors
12 Sizzling SD-WAN Vendors
NetworkComputing 2/15/17

Packet Loss Vs. Delay
Network Performance: Packet Loss vs. Delay
NetworkComputing 2/22/17

LTE for IoT
Don’t Wait for 5G: LTE Could Be Your Key to IoT
ComputerWorld 2/21/17

Shadow IT Compromise
How the DOT Discovered its Network Was Compromised by Shadow IT
IT World 2/22/17

5G Challenges
5G Is Promising, but Challenging
NetworkComputing 2/16/17

Control Expansion
How To Control the Expanding Government Network
GCN 2/17/17


Operations

Control Shadow IT
8 Steps to Regaining Control over Shadow IT
IT World 2/21/17


Project Management

Affordable Tools
7 Project Management Tools any Business Can Afford
CIO 2/20/17


Rabbit Sense

Career Lessons
From “Reluctant Accountant” to IT Dream Job: 5 Career Lessons
InformationWeek 2/6/17

Negative Negotiating Words
Nine Words and Phrases to Avoid When You're Negotiating a Salary
Fast Company 2/20/17

Brain Activity
Want To Know What Your Brain Does When it Hears a Question?
Fast Company 2/21/17

Body Language Mistakes
Five Body Language Mistakes You're Making in Interviews
Fast Company 2/21/17

Brain Shuffle
Your Brain Has a "Shuffle" Button—Here’s How to Use It
Fast Company 2/21/17


Security

NY Cybersecurity Regs
New York Cybersecurity Regs to Take Effect March 1
Risk Management Monitor 2/23/17

Data-Jacking
The Era Of Data-Jacking is here. Are You Ready?
Dark Reading 2/16/17

75% Unqualified
Fewer Than One-Fourth Of Cybersecurity Job Candidates are Qualified
Dark Reading 2/22/17

Cloud Security
Cloud-Based Databases Need New Approaches to Ensure Data Security
HelpNet Security 2/23/17

Employee Tipping Point
Reaching the Cybersecurity Tipping Point
Network World 2/22/17

IoT 'Die Hard' Lessons
Tunneling Through the "Walls" of IoT in the Enterprise
Dark Reading 2/22/17

Breach Lessons
10 Lessons Learned from Breach Response Experts
Risk Management Monitor 2/17/17

12 Steps
12 Steps to Small Business Security
Network World 2/20/17

9 New Hacks
Nowhere to Hide: 9 New Hacks Coming to Get You
InfoWorld 2/20/17

Smart Bot Invasion
Prepare for the Smart Bot Invasion
InfoWorld 2/14/17

Voice Errors
Voice Biometrics Prone to Error, Study Shows
Dark Reading 2/20/17

Personal vs. Corporate Email
Personal Vs. Corporate Email: The Security Threats Differ, says Google
TechRepublic 2/17/17


Servers / Sys Admins

Linux Grep
The Many Faces of Grep
ComputerWorld 2/21/17


Storage

Data Fabrics
Sponsored Link – What is a Data Fabric?
Storage-Switzerland 2/21/17

Shrink Data Footprint,
How to Shrink Your Data Storage Footprint
NetworkComputing 2/21/17


Technology

Drone Growth
Gartner: Demand for Drones to Take Off In 2017
Security InfoWatch 2/15/17

Machine Learning Hype
How Machine Learning's Hype is Hurting Its Promise
TechRepublic 2/15/17

Cool Research Projects
10 of Today's Really Cool Network & IT Research Projects
Network World 2/1/16

Battery Leap
Looking for the Next Leap in Rechargeable Batteries
Science Daily 2/17/17

Irrelevant Humans
Machine Augmented Humans: Does Elon Have a Point?
CloudTweaks 2/16/17


Risk comes from not knowing what you're doing.
Warren Buffett (1930 - ) American Investor, Businessman, and Philanthropist



Acquisition, Availability and Reliability, BackUp

Monday February 27th 2017
Disk Storage Solutions: Storage Newsletters, Computing Solutions, Phoenix Disk Storage Solutions: Storage Newsletters, Computing Solutions, Phoenix Disk Storage Solutions: Storage Newsletters, Computing Solutions, Phoenix Promethean Data Solutions

Warren Avery
[P] 602-463-6558
[F] 480-219-6914
wavery@ITWeeklyNewsletter.com

Copyright © 2005 - 2010 - Site Engineered by Software Dynamix - Last Modified: 05/08/2010