IT Weekly Newsletter ©
Promethean Data Solutions
Friday August 26th 2016
    Home     Contact Us     About Us     What Others Are Saying Acquisition, Availability and Reliability, BackUp

The only IT Newsletter that is 100% unbiased in its content and delivery. We cut through the spin and get to the facts. Clean, unvarnished and fresh. Every week there are more than 400 online sources that contain articles of interest to IT Professionals at all levels. Every week the IT Weekly Newsletter compiles 12-20 of the absolute best technical articles with no product or company bias, no pop-up ads, no sales angles. addressing everyday issues involving:

Reducing Risk; Improving Quality of Service; Increasing Availability; Reducing Response Time: Increasing Business Productivity; Improving Server, Storage and Networks; Improving Security; Protecting, Preserving and Restoring Data; Improving Regulatory Compliance; Reducing Audit Errors; Reducing Cost and Developing Proactive Business Solutions.

Promethean Data Solutions

This Weeks IT Topics

IT Weekly Newsletter – August 22, Vol 16 No 33

50 Articles across 18 Subjects for the Week of 8-12-2016 to 8-17-2016

For Your Complimentary Subscription Click on 'Sign Up Now'


If you don't know WHY; HOW, WHAT and WHO don't matter!
The IT Weekly Newsletter is a compilation of 40+ technical articles from last week gleaned from sources arranged by subject; no company reviews, no product reviews, no white papers and no press releases.

Open Software Defined Storage takes an Object Storage Step
Sponsored Link from Storage Switzerland


CISO Desk Reference Guide (Discount code GR69PJFM)
Sponsored Link from CISODRG


Big Data / Analytics

Data to Action
Data to Action: How to Provide More Than Just Pipeline Analytics
Business 2 Community 8/18/16

Top Job Markets
15 Top Paying Job Markets for Data Scientists
Insurance Networking 8/16/16

Valuable Information
Analytics: Turning a Flood of Data into Valuable Information
Government Technology 8/16/16

Bad Ideas That Work
7 Bad Programming Ideas that Work
Network World 8/15/16

Preventing Overcrowding
Data Helps Cities Be Preemptive, Effective in Preventing Overcrowding
Government Technology 8/12/16


Cloud

Serverless Computing
Serverless Computing: The Smart Person's Guide
TechRepublic 8/15/16

Long, Slow Death
Why Private Clouds Will Suffer a Long, Slow Death
CIO 8/15/16

Security Trouble
Trouble In the Cloud: More Than Half of Organizations Facing Security Woes
Dark Reading 8/12/16

Measure Performance
Measure Cloud Performance like a Customer
Network World 8/10/16

Top 4
Cloud Wars: Top 4 Cloud Infrastructure Services Market Vendors
CRN 8/12/16

Skills
9 Cloud Skills IT Pros Need Now
InformationWeek 8/11/16

The Right Provider
Selecting the Right Cloud Services Provider
CloudTweaks 8/11/16

Wearable
Wearable Cloud Could Be Less Expensive, More Powerful Form of Mobile Computing
Science Daily 8/10/16


Data Management

Bitemporal Data
The Emerging Data Design: Bitemporal Data
Information Management 8/12/16


Databases

Bitemporal Data
The Emerging Data Design: Bitemporal Data
Information Management 8/12/16


Disaster Recovery

Delta Wake Up Call
Delta Outage Is a Wake-Up Call for IT Execs, CEOs
Search CIO 8/17/16

Good vs. Perfect
When a Good Recovery Strategy is Better than a Perfect Recovery Strategy
MHA 8/12/16


Disk Technology

HDD Sound Exploit
Sounds from Your Hard Disk Drive Can Be Used to Steal a PC's Data
ComputerWorld 8/12/16


Encryption

Dance Music
A New Algorithm Can Hide Messages in Your Favorite Dance Music
Network World 8/18/16

Europe about Face
The Tide May Be Turning Against Encryption in Europe
Network World 8/12/16


Management

Innovation Refusal
4 Reasons you Still Refuse to Innovate your Technology
Business 2 Community 8/18/16

Employee Security Training
Five Tips to Help Execute an Employee Training Program
HelpNet Security 8/18/16

Security Insurance
Why Doesn’t My Cybersecurity Insurance Cover that?
IT World 8/16/16

Decision Process
Ask Yourself These Five Questions before Making any Major Decisions
Fast Company 8/15/16

Shorten Hiring
5 Steps that Can Shorten the IT Hiring Process
InformationWeek 8/16/16

Funding
4 Keys To Getting Funding for Your IT Project
ComputerWorld 8/16/16

Child Care Pays For Itself
Patagonia's CEO Explains How to Make on-Site Child Care Pay for Itself
Fast Company 8/15/16

The Disney Way
'The Disney Way' Helps Ottawa County, Mich., IT Staff Communicate, Build Relationships
Government Technology 8/9/16

The Right Cloud
Selecting the Right Cloud Services Provider
CloudTweaks 8/11/16

Conquering Crisis
Conquering the 3 Most Common Types of Company Crisis
Fast Company 8/12/16

Calling In Sick
How to Prevent Your Staff from Calling in Sick When They Aren't
Fast Company 8/12/16


Mobile Devices

Wearable Cloud
Wearable Cloud Could Be Less Expensive, More Powerful Form of Mobile Computing
Science Daily 8/10/16


Networks

Dealing With Dust
Network Cleanup: Dealing with Dust
NetworkComputing 8/11/16

Fight Ransomware
Five Ways to Prevent A Ransomware Infection Through Network Security
Search Security 8/15/16

QoS Basics
The Basics of QoS
NetworkComputing 8/15/16

15 Blogs
15 WiFi Networking Blogs You should Read
Network World 8/15/16

SD-WAN evolution
Branch Office Links, Big Bandwidth needs Drive SD-WAN Evolution
Network World 8/9/16

LTE-U and Wi-Fi Compromises,
New Compromises Won't End the Fight between LTE-U and Wi-Fi
ComputerWorld 8/12/16


Operations

Dealing with Dust
Network Cleanup: Dealing with Dust
NetworkComputing 8/11/16

QoS Basics
The Basics Of QoS
NetworkComputing 8/15/16

Service Outage
Anatomy of a Service Outage: How Did We Get Here?
Network World 8/11/16


Project Management

Risky Side
The Risky Side of Project Management
CIO 8/15/16


Rabbit Sense

Stop Complaining
6 Steps to Finally Stop Complaining
Fast Company 8/16/16

Interview Like an Olympian
Train Like an Olympian for Your Next Job Interview
CIO 8/15/16

Inappropriate (Or Illegal) Questions
How to Answer a Hiring Manager's Inappropriate (or Illegal) Questions
Fast Company 8/15/16

Facebook Facts
25 Surprising Facts about Facebook
Network World 8/15/16

Handle Toxic People
12 Ways Successful People Handle Toxic People
Success 4/7/16


Security

Desk Reference
Sponsored Link - CISO Desk Reference Guide (Discount code GR69PJFM)
CISODRG

Employee Training
Five Tips to Help Execute an Employee Training Program
HelpNet Security 8/18/16

Insurance Coverage
Why Doesn’t My Cybersecurity Insurance Cover that?
IT World 8/16/16

Cyber-Certifications
8 Cyber-Security Certifications to Boost Your IT Career
InformationWeek 8/14/16

Not Prepared
4 Signs Your Company Isn’t Prepared for a Cybersecurity Threat
Information Management 8/15/16

Phishing
The Real Reason Phishing Works so Well
Dark Reading 8/16/16

Awareness Training
Employee Awareness Training: Key Component of IT Security Initiatives
HelpNet Security 8/15/16

Context-Aware Authentication
Forget Two-Factor Authentication, Here comes Context-Aware Authentication
ComputerWorld 8/15/16

Cloud Trouble
Trouble In the Cloud: More Than Half of Organizations Facing Security Woes
Dark Reading 8/12/16

HDD Sound Exploit
Sounds from Your Hard Disk Drive Can Be Used to Steal a PC's Data
ComputerWorld 8/12/16

Gentle Hack Back
A Gentler Way to Hack Back
Network World 8/8/16

Next 10 Pain Points
Your Next 10 Security Pain Points
Network World 8/15/16

Hack A Plane?
Is It Possible to Hack a Plane?
TechWorld 8/12/16


Servers / Sys Admins

Serverless Cloud
Serverless Computing: The Smart Person's Guide
TechRepublic 8/15/16


Social Media

Whaling
Whaling Goes after the Big Phish
Information Management 8/17/16

Phishing
The Real Reason Phishing Works so Well
Dark Reading 8/16/16


Storage

SDS
Sponsored Link - Open Software Defined Storage takes an Object Storage Step
Storage-Switzerland 8/18/15

Flash Myths
Flash Storage Trade-Off Myths that Are Just not True
CiOL 8/16/16


Technology

Innovation Refusal
4 Reasons you Still Refuse to Innovate your Technology
Business 2 Community 8/18/16

Pocket-Sized Drone
The U.S. Marines are Testing a Pocket-Sized Helicopter Drone
ComputerWorld 8/8/16


If A equals success, then the formula is: A = X + Y + Z, X is work. Y is play. Z is keep your mouth shut.
Albert Einstein (1879-1955) German-American physicist



Acquisition, Availability and Reliability, BackUp

Friday August 26th 2016
Disk Storage Solutions: Storage Newsletters, Computing Solutions, Phoenix Disk Storage Solutions: Storage Newsletters, Computing Solutions, Phoenix Disk Storage Solutions: Storage Newsletters, Computing Solutions, Phoenix Promethean Data Solutions

Warren Avery
[P] 602-463-6558
[F] 480-219-6914
wavery@ITWeeklyNewsletter.com

Copyright © 2005 - 2010 - Site Engineered by Software Dynamix - Last Modified: 05/08/2010