IT Weekly Newsletter ©
Promethean Data Solutions
Sunday June 24th 2018
    Home     Contact Us     About Us     What Others Are Saying Acquisition, Availability and Reliability, BackUp

The only IT Newsletter that is 100% unbiased in its content and delivery. We cut through the spin and get to the facts. Clean, unvarnished and fresh. Every week there are more than 400 online sources that contain articles of interest to IT Professionals at all levels. Every week the IT Weekly Newsletter compiles 12-20 of the absolute best technical articles with no product or company bias, no pop-up ads, no sales angles. addressing everyday issues involving:

Reducing Risk; Improving Quality of Service; Increasing Availability; Reducing Response Time: Increasing Business Productivity; Improving Server, Storage and Networks; Improving Security; Protecting, Preserving and Restoring Data; Improving Regulatory Compliance; Reducing Audit Errors; Reducing Cost and Developing Proactive Business Solutions.

Promethean Data Solutions

This Weeks IT Topics

IT Weekly Article posts are a selection of 40+ Information Technology articles (no company or product reviews) culled each week from 280+ on line industry sources. This week's Subjects (# of articles): Backup / Recovery (1), Big Data / Analytics (0), Business Continuity (0), Cloud (5), Compliance (3), Data Management (0), Databases (0), Devops (1), Disaster Recovery (0), Disk Technology (0), Email (0), Encryption (0), Iot (1), Management (9), Mobile Devices (2), Networks / Internet (10), Operations (0), Outsourcing / Colocation (0), Project Management (1), Rabbit Sense (4), Risk (0), Security (16), Servers / Sys Admins (0), Social Media (1), Storage (2), Tape (0), Technology (7) and Virtualization (0).



IT Weekly Newsletter – June 25, 2018, Vol 18 No 25
49 Articles across 14 Subjects for the Week of 6-6-15-18 to 6-21-2018


(The Complimentary Subscription button DOES NOT WORK, send an email to wavery@itweeklynewsletter.com
For LinkedIn - www.linkedin.com/in/wavery/en)



Click on Subject to go to Areas of Interest


Backup / Recovery
Selecting A System

Cloud

Four Pillars of Invisible Infrastructure
Connectivity: Methods And Myths
Native SW Development
Avoid A Breach
Technical Migrations


Compliance

Rethinking Data Strategy
GDPR First Steps
GDPR 'Mobile Loophole'


DevOps

Back On Track

IoT

Don't Connect These

Management

Threat Modeling
Tesla And The Importance Of User Permissions
CISO's First 100 Days
22 Business Mistakes
Blockchains Top Priority
Integrating Blockchain By 2021
Retaining Staff
Manager Material Indicators
Four Faces Of Fraud


Mobile Devices

Credential abuse attacks
GDPR 'Mobile Loophole'


Networks / Internet

Hidden Tunnels' Help Hackers
How To Use The Ping Command
Don't Connect These
10 Key Interview Questions
3GPPs 5G Standards
SDN Reduces Deployment Times
Antenna Primer
Weaponizing IPv6
Four Faces Of Fraud
Security's Best-Kept Secret


Project Management

Process Ownership

Rabbit Sense

Effective Data Visualization
Working From Home Downsides
Eat the Frog Later
Walt Disney's Career Habits


Security

Threat Modeling
Employee Negligence
'Hidden Tunnels' Help Hackers
Tesla And The Importance Of User Permissions
Credential abuse attacks
CISO's First 100 Days
Connected Cars Can Lie
Increasingly Common Phishes
Tesla's Insider Saboteur
User Buy-In To Policies
Avoid A Cloud Breach
Robust DDoS Defense Principles
Different Corporate Mindset
Blockchains Top Priority
Containerized Apps Checklist
Networks Best-Kept Secret


Social Media

Credential Abuse Attacks

Storage

What Is NVMe
End-to-end NVMe arrays


Technology

USB-C Problems
Choosing An AI Strategy
Carbon Nanotube Optics
Cryptocurrency Not Ready For Prime Time
Graphene's 5 Minute Battery Charge
Expanding Lithium-Ion Batteries By 300%



########### ########### ARTICLES ########### ###########


Backup / Recovery
Back to Index

How to Select a Data Backup System
TechRepublic 6/20/18



Cloud
Back to Index

How to Achieve an Invisible Infrastructure with the Four Pillars of Multicloud
Networks Asia 6/19/18

Cloud Connectivity: Methods and Myths
NetworkComputing 6/11/18

What Is Cloud-Native? The Modern Way to Develop Software
InfoWorld 6/14/18

Avoid a Breach - 5 Tips to Secure Data Access
Networks Asia 6/11/18

Getting Technical with Cloud Migrations
No Jitter 6/14/18



Compliance
Back to Index

Why the GDPR's Wide Reach is Leading Many Companies to Rethink Data Strategy
TechRepublic 6/20/18

For GDPR Late-Comers, Data Mapping, Security are Key First Steps
Information Management 6/14/18

Is Your Company Part of the GDPR 'Mobile Loophole'?
ComputerWorld 6/14/18



DevOps
Back to Index

5 Steps to Put a Faltering DevOps Plan Back on Track
InformationWeek 6/14/18



IoT
Back to Index

24 Internet-Connected Things that Really Shouldn't Be Online
ZDnet 6/18/18



Management
Back to Index

Threat Modeling: What’s All the Buzz About?
HelpNet Security 6/21/18

Tesla Employee Sabotage Illustrates Critical Importance of User Permissions
TechRepublic 6/19/18

The First 100 Days of the New CISO
Business 2 Community 6/18/18

22 Business Mistakes You Have No Excuse for Making
Business 2 Community 6/15/18

Don’t Start the Blockchain Revolution without Making Security a Top Priority
HelpNet Security 6/14/18

Most Aerospace and Defense Companies to Integrate Blockchain by 2021
HelpNet Security 6/15/18

4 Ways Insurers can Retain Their Best IT Staff
Digital Insurance 6/13/18

5 Signs that Show You’re Manager Material
Fast Company 6/14/18

Four Faces of Fraud: Identity, 'Fake' Identity, Ransomware & Digital
Dark Reading 6/14/18



Mobile Devices
Back to Index

Credential Abuse Attacks -- Have You Checked Your Accounts Lately?
Networks Asia 6/10/18

Is Your Company Part of the GDPR 'Mobile Loophole'?
ComputerWorld 6/14/18



Networks / Internet
Back to Index

'Hidden Tunnels' Help Hackers Launch Financial Services Attacks
Dark Reading 6/20/18

How to Use the Ping Command to Test Your Network
How To Geek 6/20/18

24 Internet-Connected Things that Really Shouldn't Be Online
ZDnet 6/18/18

10 Key Interview Questions for Network Administrators
NetworkComputing 6/18/18

How 3GPP's New Networking Standards Could Bring True 5G One Step Closer to Reality
TechRepublic 6/18/18

How Montana State University Uses Software Defined Networking to Reduce Deployment Times
TechRepublic 6/13/18

Antenna Primer for WiFi Pros
NetworkComputing 6/14/18

Weaponizing IPv6 to Bypass IPv4 Security
Dark Reading 6/12/18

Meet 'Bro': The Best-Kept Secret of Network Security
Dark Reading 6/14/18



Project Management
Back to Index

Process Ownership: Vital for Lean Management and Operational Efficiency
PMWorld 360 6/16/18



Rabbit Sense
Back to Index

The Few, The Proud: 11 Key Principles of Effective Data Visualization
Business 2 Community 6/19/18

Working from Home: 5 Hidden Downsides No One Talks About
TechRepublic 6/19/18

Sometimes You Need to Eat the Frog Later
TLNT 6/15/18

3 Career Habits that Helped Walt Disney Launch the Company
The Ladders 6/14/18



Security
Back to Index

Threat Modeling: What’s All the Buzz About?
HelpNet Security 6/21/18

Employee Negligence Still Poses Major Security Concerns
HelpNet Security 6/20/18

'Hidden Tunnels' Help Hackers Launch Financial Services Attacks
Dark Reading 6/20/18

Tesla Employee Sabotage Illustrates Critical Importance of User Permissions
TechRepublic 6/19/18

Credential Abuse Attacks -- Have You Checked Your Accounts Lately?
Networks Asia 6/10/18

The First 100 Days of the New CISO
Business 2 Community 6/18/18

Connected Cars Can Lie, Posing A New Threat to Smart Cities
Government Cyber Insider 5/13/18

Flying Under the Radar: Four Increasingly Common Phishes You should Know About
SC Magazine 6/19/18

Tesla Hit By Insider Saboteur Who Changed Code, Exfiltrated Data
SC Magazine 6/19/18

3 Tips for Driving User Buy-in to Security Policies
Dark Reading 6/18/18

Avoid a Breach - 5 Tips to Secure Data Access
Networks Asia 6/11/18

The Four Principles of a Robust DDoS Defense
Networks Asia 6/18/18

Modern Cybersecurity Demands a Different Corporate Mindset
Dark Reading 6/15/18

Don’t Start the Blockchain Revolution without Making Security a Top Priority
HelpNet Security 6/14/18

Containerized Apps: An 8-Point Security Checklist
Dark Reading 6/14/18

Four Faces of Fraud: Identity, 'Fake' Identity, Ransomware & Digital
Dark Reading 6/14/18

Meet 'Bro': The Best-Kept Secret of Network Security
Dark Reading 6/14/18



Social Media
Back to Index

Credential Abuse Attacks -- Have You Checked Your Accounts Lately?
Networks Asia 6/10/18



Storage
Back to Index

What Is NVMe, and How is it Changing Enterprise Storage
IT World 6/20/18

End-to-End NVMe Arrays Poised to Resurrect External Storage
The Register 6/15/18



Technology
Back to Index

3 Problems with USB-C You Need to Know About
How To Geek 6/20/18

The Right Fit: Choosing an AI Strategy
InformationWeek 6/19/18

Carbon Nanotube Optics Provide Optical-Based Quantum Cryptography and Quantum Computing
Science Daily 6/18/18

Bitcoin Could Break the Internet, Central Bank Overseer Says
Bloomberg 6/17/18

Graphene Tech: What if Five Minutes Were Enough to Charge Your Battery?
ZDnet 6/18/18

Tripling the Energy Storage of Lithium-Ion Batteries
Science Daily 6/14/18


Quote
Nothing travels faster than the speed of light, with the possible exception of bad news, which obeys its own special laws.
Douglas Adams (1952 – 2001) English Writer, Humorist, and Dramatist







Acquisition, Availability and Reliability, BackUp

Sunday June 24th 2018
Disk Storage Solutions: Storage Newsletters, Computing Solutions, Phoenix Disk Storage Solutions: Storage Newsletters, Computing Solutions, Phoenix Disk Storage Solutions: Storage Newsletters, Computing Solutions, Phoenix Promethean Data Solutions

Warren Avery
[P] 602-463-6558
[F] 480-219-6914
wavery@ITWeeklyNewsletter.com

Copyright © 2005 - 2010 - Site Engineered by Software Dynamix - Last Modified: 05/08/2010