IT Weekly Newsletter ©
Promethean Data Solutions
Monday September 26th 2016
    Home     Contact Us     About Us     What Others Are Saying Acquisition, Availability and Reliability, BackUp

The only IT Newsletter that is 100% unbiased in its content and delivery. We cut through the spin and get to the facts. Clean, unvarnished and fresh. Every week there are more than 400 online sources that contain articles of interest to IT Professionals at all levels. Every week the IT Weekly Newsletter compiles 12-20 of the absolute best technical articles with no product or company bias, no pop-up ads, no sales angles. addressing everyday issues involving:

Reducing Risk; Improving Quality of Service; Increasing Availability; Reducing Response Time: Increasing Business Productivity; Improving Server, Storage and Networks; Improving Security; Protecting, Preserving and Restoring Data; Improving Regulatory Compliance; Reducing Audit Errors; Reducing Cost and Developing Proactive Business Solutions.

Promethean Data Solutions

This Weeks IT Topics

IT Weekly Newsletter – September 26, Vol 16 No 38

62 Articles across 17 Subjects for the Week of 9-16-2016 to 9-22-2016

For Your Complimentary Subscription Click on 'Sign Up Now'


If you don't know WHY; HOW, WHAT and WHO don't matter!
The IT Weekly Newsletter is a compilation of 40+ technical articles from last week gleaned from sources arranged by subject; no company reviews, no product reviews, no white papers and no press releases.

Overcoming the Tape Negatives
Sponsored Link from Storage Switzerland


Backup

Ransomware
These Ransomware Situations Can Result in Colossal Outcomes
IT World 9/20/16


Big Data / Analytics

Cancer Diagnosis
Computer Program Beats Physicians at Brain Cancer Diagnoses
Science Daily 9/15/16

Security Questions
20 Questions Security Leaders Need to Ask About Analytics
Dark Reading 9/15/16

Ask Why
Find Hidden Insights in Your Data: Ask Why and Why Again
ComputerWorld 9/16/16


Cloud

DR Transformation
How the Move to the Cloud Has Transformed Disaster Recovery
Business 2 Community 9/21/16

Value
The Many Dimensions of Cloud Value
Network World 9/19/16

Performance Measuring
5 Cloud Performance Measuring Strategies
InformationWeek 9/20/16

Going Mainstream
Cloud Adoption goes Mainstream
CloudTweaks 8/21/16

Security Tips
Four Tips for Better Information Security in the Cloud
CloudTweaks 9/21/16

Data Privacy
Cloud Privacy for Your Enterprise’s Data: Whose Choice?
Risk Management Monitor 9/20/16

Moving Thoughts
What to Think About When Moving to the Cloud
IT World 9/18/16

HIPAA-Compliant
9 Keys to Having a HIPAA-Compliant Cloud
Network World 9/20/16

Public for Health
Why This Hospital is Moving to Amazon’s Cloud
Network World 9/20/16

What Is Shadow IT
Shadow IT: What Is It Really, and Is It Really Risky?
Information Management 9/12/16

Security Win
Yes, The Cloud Can Be a Security Win
Dark Reading 9/15/16


Data Management

Prioritize Protection
How to Protect Your Mission-Critical Information
CIO 9/21/16

Cloud Privacy
Cloud Privacy for Your Enterprise’s Data: Whose Choice?
Risk Management Monitor 9/20/16

DNS Tunneling Danger
Why DNS Shouldn’t Be Used for Data Transport
HelpNet Security 9/16/16


Disaster Recovery

Cloud Transformation
How the Move to the Cloud Has Transformed Disaster Recovery
Business 2 Community 9/21/16

Epic Snafu
Epic Snafu takes Australian Securities Exchange Offline
The Register 9/19/16


Encryption

Quantum Computing
How Quantum Computing Could Unpick Encryption to Reveal Decades of Online Secrets
TechRepublic 9/19/16


Management

Avg Breach Cost
Average Data Breach Costs $200K, not Millions
Dark Reading 9/21/16

Lack of Funding
Lack of Funding Stymies State CISOs
Dark Reading 9/20/16

Insider Threat Costs
The Hidden Cost of the Insider Threat
HelpNet Security 9/19/16

Reading the Room,
Here's the Right Way to Read a Room
Fast Company 9/19/16

Blockchain Guide
Blockchain: The Smart Person's Guide
TechRepublic 9/19/16

Burn Out
7 Signs That Being A Manager is Burning You Out
Fast Company 9/20/16

What Is Shadow IT
Shadow IT: What Is It Really, and Is It Really Risky?
Information Management 9/12/16

BI Mistakes
Business Intelligence Mistakes to Avoid at All Costs
Business 2 Community 9/17/16

Dreaded Meetings
3 Counterintuitive Steps to Rescue Your Dreaded Weekly Meetings
Fast Company 9/15/16

Dev Team Secrets
7 Dev Team Secrets IT Managers Need to Know
InformationWeek 9/15/16

Handling Disruptions
How Leading CIOs Tackle Business Disruption
IT World 8/15/16


Networks

Wi-Fi and LTE-U Coexist
Can Wi-Fi and LTE-U Live Together? The Tests are Ready
ComputerWorld 9/21/16

WAN Virtualization
Virtualizing WAN Capabilities
Network World 9/21/16

DNS Tunneling Danger
Why DNS Shouldn’t Be Used for Data Transport
HelpNet Security 9/16/16

Security Utilities
The Hacking Toolkit: 13 Essential Network Security Utilities
TechRepublic 8/11/16

VPNs, Tor and VPN Routers
A Defensive Computing Term Paper on Privacy: VPNs, Tor and VPN Routers
ComputerWorld 9/18/16

Virtualized
In Virtualized Networking, Availability Tracking is Key
Search Networking 9/17/16

5G connectivity
5G Connectivity Means Big Changes for Business and Consumers
TechRepublic 9/16/16

SD-WAN
SD-WAN: The MSP Connection
NetworkComputing 9/15/16


Operations

No Time
5 Things Your in-House IT Staff Doesn’t Have Time for
Business 2 Community 9/22/16

Passwordless Logins
An Introduction to Passwordless Logins
Business 2 Community 9/20/16

Epic Snafu
Epic Snafu takes Australian Securities Exchange Offline
The Register 9/19/16

Guppy Inefficiency
The Guppies Will Get You
ComputerWorld 9/14/16


Project Management

Project vs Change Management,
What’s Difference between Project Management and Change Management?
CIO 9/19/16


Rabbit Sense

2016 Ig Nobel Prize 'Winners'
Here are the 2016 Ig Nobel Prize 'winners'
Network World 9/22/16

Managing Time
Secrets of People with All the Time In The World
Fast Company 9/20/16

Creativity
7 Surprising Facts about Creativity, According to Science
Fast Company 9/16/16


Risk

SIEM Security Solution
Managing Information Security Risks with a SIEM Solution
Continuity Central 9/13/16

Four Key Concepts
Four Key Concepts for Effective Risk Management
Continuity Central 9/16/16


Security

TV/Film InfoSec
Security Is No Fiction: Infosec on TV, Film—and In Space
IT World 9/22/16

Avg Breach Cost
Average Data Breach Costs $200K, not Millions
Dark Reading 9/21/16

1 Billion Records Breached
2016 on Track to See Over 1 Billion Records Breached
Dark Reading 9/20/16

It's Personal
Data Breaches: This Time it's More Personal
Network World 9/20/16

Security Tips
Four Tips for Better Information Security in the Cloud
CloudTweaks 9/21/16

Insider Threat Costs
The Hidden Cost of the Insider Threat
HelpNet Security 9/19/16

Best Practices
The Top 4 Data Security Best Practices
IT World Canada 9/16/16

Network Utilities
The Hacking Toolkit: 13 Essential Network Security Utilities
TechRepublic 8/11/16

Merger
How to Keep IT Security at the Forefront During a Merger
IT World 9/19/16

City Lessons
What Smart Cities Can Teach Enterprises about Security
Dark Reading 9/19/16

Cloud Win
Yes, The Cloud Can Be a Security Win
Dark Reading 9/15/16

Analytic Questions
20 Questions Security Leaders Need to Ask About Analytics
Dark Reading 9/15/16

Awareness Training
Awareness Training: How Much is too Much?
Network World 9/15/16

SIEM Risk Solution
Managing Information Security Risks with a SIEM Solution
Continuity Central 9/13/16


Storage

SSD Innards
See How an SSD Works
Network World 9/19/16

Falling Flash Prices
Falling Flash Prices are a Boon to Enterprise Storage Buyers
ComputerWorld 9/18/16

Outlook
A Look Ahead at the Opportunities and Challenges
Horison 9/19/16

Mind-Boggling Growth
Digital Data Storage is Undergoing Mind-Boggling Growth
EE Times 9/14/16


Tape

Overcoming Negatives
Sponsored Link - Overcoming The Tape Negatives
Storage-Switzerland 9/22/16


Technology

Driverless State Regulations
U.S. DOT Lays Out Role for States in Regulating Self-Driving Cars
Government Technology 9/20/16

Life Changing
Five Technologies that Will Change Our Lives in Five Years
ComputerWorld 9/20/16

Military Technology
10 Pieces of Military Technology that Changed The Way the Civilian World Works
TechRepublic 8/19/16

Self-Driving Shopping Cart
Walmart's Self-Driving Shopping Cart Magic
ComputerWorld 9/19/16

Reading Closed Books
MIT Researchers Can Read 9 Pages into a Closed Book with Terahertz Tech
TechRepublic 9/12/16

Talking Computers
How We Learned to Talk to Computers, and How They Learned to Answer Back
ZDnet 9/15/16


Virtualization

WAN Virtualization
Virtualizing WAN Capabilities
Network World 9/21/16


Amateurs sit and wait for inspiration, the rest of us just get up and go to work.
Stephen King (1947- ) American Horror Writer



Acquisition, Availability and Reliability, BackUp

Monday September 26th 2016
Disk Storage Solutions: Storage Newsletters, Computing Solutions, Phoenix Disk Storage Solutions: Storage Newsletters, Computing Solutions, Phoenix Disk Storage Solutions: Storage Newsletters, Computing Solutions, Phoenix Promethean Data Solutions

Warren Avery
[P] 602-463-6558
[F] 480-219-6914
wavery@ITWeeklyNewsletter.com

Copyright © 2005 - 2010 - Site Engineered by Software Dynamix - Last Modified: 05/08/2010