IT Weekly Newsletter ©
Promethean Data Solutions
Wednesday September 19th 2018
    Home     Contact Us     About Us     What Others Are Saying Acquisition, Availability and Reliability, BackUp

The only IT Newsletter that is 100% unbiased in its content and delivery. We cut through the spin and get to the facts. Clean, unvarnished and fresh. Every week there are more than 400 online sources that contain articles of interest to IT Professionals at all levels. Every week the IT Weekly Newsletter compiles 12-20 of the absolute best technical articles with no product or company bias, no pop-up ads, no sales angles. addressing everyday issues involving:

Reducing Risk; Improving Quality of Service; Increasing Availability; Reducing Response Time: Increasing Business Productivity; Improving Server, Storage and Networks; Improving Security; Protecting, Preserving and Restoring Data; Improving Regulatory Compliance; Reducing Audit Errors; Reducing Cost and Developing Proactive Business Solutions.

Promethean Data Solutions

This Weeks IT Topics

IT Weekly Article posts are a selection of 40+ Information Technology articles (no company or product reviews) culled each week from 280+ on line industry sources. This week's Subjects (# of articles): Backup / Recovery (0), Big Data / Analytics (2), Business Continuity (0), Cloud (6), Compliance (2), Data Management (1), Databases (0), Devops (3), Disaster Recovery (1), Disk Technology (0), Email (1), Encryption (1), IoT (0), Management (6), Mobile Devices (0), Networks / Internet (4), Operations (2), Outsourcing / Colocation (0), Project Management (0), Rabbit Sense (1), Risk (0), Security (16), Servers / Sys Admins (0), Social Media (1), Storage (1), Tape (0), Technology (7) and Virtualization (0).



IT Weekly Newsletter – September 17, 2018, Vol 18 No 36
47 Articles across 16 Subjects for the Week of 9-7-18 to 9-13-2018


(The Complimentary Subscription button DOES NOT WORK, send an email to wavery@itweeklynewsletter.com
For LinkedIn - www.linkedin.com/in/wavery/en)



Click on Subject to go to Areas of Interest


Big Data / Analytics

Time to Invest?
Caring About Variance And Covariance


Cloud

Outage Hard Lesson
Re-Architecting IT
Who’s Afraid
Controlling Costs
Attack Vectors
Protect Your Data


Compliance

BA May Face 1st GDPR Major Fine
Role of Incident Response


Data Management

Roadblocks

DevOps

Demystified
Best Paid For Non-Boss Techies
Simplify Disaster Recovery


Disaster Recovery
DevOps Simplify

EMail
Impersonation Fraud

Encryption

Five Eyes Controversy

Management

Reporting Line of the CISO
CEO Questions To The CIO
Win Over The Board On Security
Proving the ROI of Security
Cloud-First
Negotiation Mistakes


Networks / Internet

Leaf-Spine Architectures
Internal Dysfunction
P2P and IPv6
Does Software Fit


Operations

The Right Firewall
Does Software Networking Fit


Rabbit Sense

Sound Smarter

Security

Embrace AI Mitigation?
IAST and SCA
Cryptomining Malware Families
Win Over The Board On Security
British Airways Hack Preliminary
Balancing Privacy Vs. Convenience
Social Media Metrics
Proving the ROI
APIs: the Trojan Horses
DevOps Demystified
Trusted Insider
Cloud Attack Vectors
Infrastructure As Code
TLS 1.3 Preparation
Healthy Data Diet Is the Secret
SOC Makeover


Social Media

Security Metrics

Storage

Spinning-Up Persistent Memory Caching

Technology

Terahertz Clock Rates
Metal Jet 3D Printer
Success With AI
Quantum Computers One Step Closer
Neural Network Can Learn
AI Robots Develop Prejudice
Entanglement of Six Light Waves



########### ########### ARTICLES ########### ###########



Big Data / Analytics
Back to Index

5 Signs You Should Invest in Data Science
Business 2 Community 9/10/18

Why Should You Care About Variance and Covariance In Business
Business 2 Community 9/7/18



Cloud
Back to Index

Azure Outage Proves the Hard Way that Availability Zones are a Good Idea
Data Center Knowledge 9/11/18

Re-Architecting IT for Multicloud: 5 Key Steps
Networks Asia 9/11/18

Who’s Afraid of Cloud Native?
Data Center Dynamics 9/7/18

The Simple Fix So Your Cloud Costs Don’t Spin Out of Control
InfoWorld 9/7/18

8 Attack Vectors Puncturing Cloud Environments
Dark Reading 9/7/18

Don’t Rely on the Cloud Provider to Protect Your Data
Data Center Knowledge 9/7/18



Compliance
Back to Index

British Airways Hacking Leaves Airline Open to Fines Under GDPR Rules
Information Management 9/10/18

The Role of Incident Response in ICS Security Compliance
Dark Reading 9/7/18



Data Management
Back to Index

10 Roadblocks to Becoming a Data-Driven Enterprise
InformationWeek 9/4/18



DevOps
Back to Index

DevOps Demystified: A Primer for Security Practitioners
Dark Reading 9/10/18

Soft Eng Salaries Soar By 25 Per Cent – And, Oh Yes, DevOps is Best Paid for Non-Boss Techies
The Register 9/7/18

Using DevOps to Simplify Disaster Recovery
NetworkComputing 9/6/18



Disaster Recovery
Back to Index

Using DevOps to Simplify Disaster Recovery
NetworkComputing 9/6/18



Email
Back to Index

Why That Email From Your Boss Could Be A Scam Waiting To Happen
TechRepublic 9/10/18



Encryption
Back to Index

Controversy Erupts Over Five Eyes Countries’ Statement on Encryption
IT World Canada 9/7/18



Management
Back to Index

Why Are We Still Talking About the Reporting Line of the CISO?
Business 2 Community 9/13/18

What Boards and CEOs Should Be Asking CIOs
InformationWeek 9/10/18

5 Steps That Can Help CISOs Win Over the Board on Security Programs
Information Management 9/12/18

Swaying the C-Suite: Proving the ROI of a Sound Security Strategy
Information Management 9/7/18

The 3 Reasons CIOs have Become Cloud-First
InfoWorld 9/11/18

All the Things You’re Doing Wrong in Negotiations
Fast Company 9/10/18



Networks / Internet
Back to Index

Why Networks are Evolving Toward Leaf-Spine Architectures
NetworkComputing 9/11/18

How Internal Dysfunction Puts Your Network at Risk
HelpNet Security 9/11/18

Ensuring P2P Apps don't Cause Network Performance Issues with IPv6
Search Networking 9/10/18

Does Software Networking Fit Modern Data Center Requirements?
Search SDN 9/10/18



Operations
Back to Index

Getting the Right Firewall Protection for Your Data Centre
Networks Asia 0/12/18

Does Software Networking Fit Modern Data Center Requirements?
Search SDN 9/10/18



Rabbit Sense
Back to Index

Five Easy Ways to Sound Smarter
Fast Company 9/10/18



Security
Back to Index

Are Organizations Ready to Embrace AI Security Mitigation?
Information Management 9/10/18

The Intersection Between IAST and SCA And Why You Need Both in Your Security Toolkit
Networks Asia 9/13/18

8 Cryptomining Malware Families to Keep on the Radar
Dark Reading 9/12/18

5 Steps That Can Help CISOs Win Over the Board on Security Programs
Information Management 9/12/18

British Airways Hack: Infosec Experts Finger Third-Party Scripts on Payment Pages
The Register 9/11/18

Where Do Your Customers Stand on the Convenience vs. Security Debate?
Networks Asia 9/11/18

Need-to-Know Social Media Metrics for Data Security Teams
Information Management 9/5/18

Swaying the C-Suite: Proving the ROI of a Sound Security Strategy
Information Management 9/7/18

APIs: The Trojan Horses Of Security
HelpNet Security 9/10/18

DevOps Demystified: A Primer for Security Practitioners
Dark Reading 9/10/18

Are You the Biggest Threat to Your Employer
Networks Asia 9/10/18

8 Attack Vectors Puncturing Cloud Environments
Dark Reading 9/7/18

Introduction to Infrastructure as Code
NetworkComputing 8/30/18

TLS 1.3 Won't Break Everything
Dark Reading 9/7/18

Why a Healthy Data Diet Is the Secret to Healthy Security
Dark Reading 9/6/18

The SOC Gets a Makeover
Dark Reading 9/6/18



Social Media
Back to Index

Need-to-Know Social Media Metrics for Data Security Teams
Information Management 9/5/18



Storage
Back to Index

Prepare to Have Your Minds Blown, Storage Industry. 5 Words: Client Access Optane DIMM Caching
The Register 9/7/18



Technology
Back to Index

Graphene Enables Clock Rates In the Terahertz Range
Science Daily 9/10/18

HP's Metal Jet 3D Printer may Build Your Next Car's Innards
cnet 9/10/18

Success with Automation and AI Requires a High 'RQ'
Search CIO 9/9/18

Penn State Researchers Discover Fresh Way to Speed Up Creation of Quantum Computers
v3 co uk 9/5/18

Bots Using MIT's Neural Network can Teach Themselves How to Manipulate Objects They've Never Seen
v3 co uk 9/10/18

Bots Using MIT's Neural Network can Teach Themselves How to Manipulate Objects They've Never Seen
Science Daily 9/6/18

Experiment Obtains Entanglement of Six Light Waves With a Single Laser
Science Daily 9/6/18



Quote
We can complain that the rosebush has thorns - or rejoice that the thorn bush has roses.
Abraham Lincoln (1809-1865) 16th President of the United States





Acquisition, Availability and Reliability, BackUp

Wednesday September 19th 2018
Disk Storage Solutions: Storage Newsletters, Computing Solutions, Phoenix Disk Storage Solutions: Storage Newsletters, Computing Solutions, Phoenix Disk Storage Solutions: Storage Newsletters, Computing Solutions, Phoenix Promethean Data Solutions

Warren Avery
[P] 602-463-6558
[F] 480-219-6914
wavery@ITWeeklyNewsletter.com

Copyright © 2005 - 2010 - Site Engineered by Software Dynamix - Last Modified: 05/08/2010