Thursday, April 21, 2016

System News for IT Professionals - Volume 218, Issue 2 - April 11th, 2016 — April 17th, 2016

April 11th, 2016 — April 17th, 2016
Volume 218, Issue 2
 
  
 
 

System News for IT Professionals, posted on April 18th (Vol 218 Issue 2)

Here are the titles for the most popular articles from the current issue:

  • Intel Claims Storage Supremacy with 3D XPoint Optane Drives, 1PB 3D NAND
  • Artificial Intelligence's Next Phase: Sooner and More Accessible for Everyone
  • Encryption Backdoors: The Brief History Of An Oxymoron
  • Why the Smart Office is Highly Susceptible to Data Breaches
  • The Cost of Not Building with Security in Mind 
  • Many US Enterprises Manage More Than 20 Different Types of Storage
  • 61% of Enterprise IT and Database Professionals Cite Poor Backup and Recovery Solutions Available Today
  • Almost All Of IT Budgets Will Soon Be Dedicated To Cloud, Intel Study Finds
  • Ubuntu Linux Continues To Dominate OpenStack And Other Clouds
  • How To Make Your WAN Architecture Software-Defined 
  • Docker 1.11 ties its fate to Open Container Initiative
  • Dissecting The Myth That Open Source Software Is Not Commercial
  • Lack Of Career Progression Pushes IT Workers To Shop Around For Jobs
  • 10 Best Smartphones Of 2016 So Far
  • 18TB Hard Drives Will Be Entering The Market Soon 
  • The Seven Types Of E-Commerce Fraud Explained
  • Dig into IoT with 41 OpenIoT Summit presentations
  • 70% businesses say speed of tech outpaces training
  • Cloud Adoption Could Save Feds $10 Billion Annually
  • 2016 Is Still The Year Of Java 7 (Not For Long Though) 
  • Using Threat Hunting Technique To Fend Off Cyber Attacks
  • Where DLP Technology Is Headed, And Should You Follow?
  • Bitcoin Core 0.12.1 Released, Major Step Forward for Scalability
  • Overlooked for Promotion? These Non-Assertive Behaviors Might Be the Cause.
  • How IT teams navigate unlimited vacation policies 
  • 10 Things Cyber Insurance Won't Cover
  • Let's Not Make Secure Encryption Illegal
  • Business Intelligence Report Mentions Bitcoin and Blockchain
  • Computers You Can Hold In The Palm Of Your Hand (Slideshow)
  • You Keep Using that Word - NVMe. Does It Mean What I Think It Means?

Sunday, July 26, 2015

Vol 209, Issue 3

Sunday, September 9, 2012

"System News for IT Professionals" Vol 174 Issue 5





Sunday, September 2, 2012

"System News for IT Professionals" Vol 174 Issue 4





Sunday, August 21, 2011

The Best of the Worst

I guess that all depends on your point of view; the 10 Scariest Hacks is truly frightening.  If you’re a bad guy this is good news.  Regardless, the bad guys are bad but they are far from stupid…take notice/.
CIO (August 16, 2011)

Undetected Threats

If you want to know how APT’s can go unnoticed by even the most advanced detection algorithms read APT Attackers Hiding in Plain Sight.  Turns out that the way not to be noticed (also true in real life) is not do anything that will draw attention.
Dark Reading (August 17, 2011)

Protecting Your Child

Facebook in conjunction with two of the best in IT security has Published A Personal Security Guide for Teenagers.  The guide is available through a link in the article.  With over 750MM users, a lot of teens need to brought up to speed that there are bad people out there.
TechWorld (August 19, 2011)

Privacy A Priority

Every company has information that should not see the light of day; unfortunately thru error, malfeasance or ignorance stuff gets out.  Here are the Top Five Privacy Issues Organizations Must Tackle in the coming years.  There are holes that must be acknowledged and filled.
IT Business Edge (August 18, 2011)

Passé Passwords

The password has been with us since the beginning of time it seems and we have looked at all sorts of biometrics, token and the like as a replacement.  Now from the NSTIC Director: ‘We’re Trying to Get Rid of Passwords’; whether they will find an new method of authentication for the masses is another question.
NetworkWorld (August 18, 2011)

Hacked and Unaware

A new report from McAfee indicates that the majority of Fortune 2000 companies have been hacked and many are not aware of the intrusion.  The Dire Warning from McAfee Security Specialist should have a chilling affect on companies and prod them into an even higher level of security awareness and preparedness.
Enterprise Systems Journal (August 15, 2011)

Forever Present

If you thought getting rid of malware was tough you haven’t seen anything.  A Man Reveals Secret Recipe Behind Undeletable Cookies, these cookies are called ‘respawning’ and can be a real headache for those infected.
The Register (August 18, 2011)

BART Lessons

The recent cyber attack gives 3 Security Lessons From BART’s Anonymous Breach.  While you may be inclined to point a finger at a transit company thing you are different, in reality, there is no difference in the computer room – pay attention.
InformationWeek (August 18, 2011)

Failure is Just the Tip of the Iceberg

When something goes wrong the first thing every one does is fix the problem and then move on to the next item on the list.  This article indicates what we all know:  The Cure for Network Downtime is Not Just Technology but a close examination of all aspects to fully understand not only the nature of the problem but everything and everyone that could possibly be involved.
NetworkWorld (August 16, 2011)

Lessons Learned the Hard Way

Experience is a hard teacher when the lesson is DR.  Unfortunately It Takes a Disaster To Prove a Techie Right in most cases and these four were expensive and painful.
InfoWorld (August 17, 2011)

A Great Primer

There are only two types of companies that are intimately familiar with BC and DR; those that are and those that will be.  Making a Start on these two very important aspects for your company will mean the difference between survival and death.  If you don’t have a well thought out plan, now is the time to start.
Continuity Central (August 17, 2011)

Database Forensics

Finding out that someone has hacked into your database is not something that shows up immediately; usually someone outside the company notices the anomaly and gives a heads up warning.  The industry no recognizes that Database Auditing, Forensics Style is coming into the lime light and redo logs, etc. are not going to tell you what, when, how, where and who got tint.
Dark Reading (August 15, 2011)

Myths, Facts and Reality

When vendors stop talking about a technology then you can rest assured that the technology is dead or getting mature.  In the case of the cloud the later applies; however knowing The (Real) State of the Cloud, 2011 becomes more difficult because the hype is overshadowed by reality and vendors don’t like reality at the dog and pony shows.
Cloud Computing (August 15, 2011)

Hidden Expenses Can Kill the ROI

Vendors love to provide the raw data for your ROI because there are always gotchas that pop up that you don’t think about.  In Preparing for the Real Costs of Cloud Computing there are going to be some substantial surprises if you are very careful in turning over every rock.

InfoWorld (August 15, 2011)