tag:blogger.com,1999:blog-31330219283308576712024-02-08T05:36:32.317-05:00John J. McLaughlinNews for Senior IT ProfessionalsAnonymoushttp://www.blogger.com/profile/03989311321242861548noreply@blogger.comBlogger184125tag:blogger.com,1999:blog-3133021928330857671.post-1743550755353953522016-04-21T08:24:00.000-05:002016-04-21T08:24:22.788-05:00System News for IT Professionals - Volume 218, Issue 2 - April 11th, 2016 — April 17th, 2016
April 11th, 2016 — April 17th, 2016
Volume 218, Issue 2
IT - CxO
Are IT Executives Blind To Cybersecurity Threats?
The Best Reason for Never Giving In to Ransomware Demands
10 Things Cyber Insurance Won't Cover
The Rhetoric and Reality of IT Decision Making
Transforming The IT Department Into The Innovation Department
IT - Storage
9 Ways Flash Cuts Your Computing Costs (Anonymoushttp://www.blogger.com/profile/03989311321242861548noreply@blogger.com0tag:blogger.com,1999:blog-3133021928330857671.post-67161947966499345902016-04-21T08:20:00.002-05:002016-04-21T08:20:29.628-05:00System News for IT Professionals, posted on April 18th (Vol 218 Issue 2)
Here are the titles for the most popular articles from the current issue:
Intel Claims Storage Supremacy with 3D XPoint Optane Drives, 1PB 3D NAND
Artificial Intelligence's Next Phase: Sooner and More Accessible for Everyone
Encryption Backdoors: The Brief History Of An Oxymoron
Why the Smart Office is Highly Susceptible to Data Breaches
The Cost of Not Building with Security in Mind
Anonymoushttp://www.blogger.com/profile/03989311321242861548noreply@blogger.com0tag:blogger.com,1999:blog-3133021928330857671.post-34043294455618109432015-07-26T16:45:00.000-05:002015-07-26T16:45:02.354-05:00
Vol 209, Issue 3
The impending end of Moore's Law is not Intel's biggest problem
Free (online) Linux Training/Courses
Do Staff Perks Keep Employees Loyal?
5 Reasons Why Docker Is A Billion Dollar Company
Everything you need to know about virtual reality
Who's Managing The Career Plan?
The Rise of Server SAN
Replace Your NAS with Cloud Storage: The 8 Key Requirements
Evaluating new storage for Anonymoushttp://www.blogger.com/profile/03989311321242861548noreply@blogger.com0tag:blogger.com,1999:blog-3133021928330857671.post-36614568753159913782014-09-04T09:20:00.003-05:002014-09-04T09:20:42.586-05:00
Popular Articles in Vol 198, Issue 5
The Rise of White-Box Storage
5 Engineering Lessons from Star Trek
Nexenta explains the economics behind Software-Defined Storage
4 Outsourcing Mistakes Companies still Make
ITWorld Cartoons 2014: The Year in Geek Humor
Why Should Anyone Trust You to Lead?
Annoying Cubicle Behavior
CIOs in Training: 3 Factors for Success
Analytics for All, No Data Anonymoushttp://www.blogger.com/profile/03989311321242861548noreply@blogger.com0tag:blogger.com,1999:blog-3133021928330857671.post-68492995188616785282012-09-09T09:45:00.002-05:002012-09-09T09:49:53.762-05:00"System News for IT Professionals" Vol 174 Issue 5
Ten Signs You're About to Get Fired
4 Reasons IT Leaders Hate Giving Performance Reviews
How to Recharge Your Leadership Mojo
4 Strategies for Managing Junior IT Professionals
Doomsday Malware: It's Only a Matter of Time
Data Scientists: Meet Big Data's Top Guns
What Keeps Information Security Leaders Awake At Night
How the Cloud Changes the Virtual Desktop Landscape
Anonymoushttp://www.blogger.com/profile/03989311321242861548noreply@blogger.com0tag:blogger.com,1999:blog-3133021928330857671.post-38070233593069462152012-09-02T09:41:00.000-05:002012-09-09T09:43:24.840-05:00"System News for IT Professionals" Vol 174 Issue 4
Five Reasons Why Your Top Talent Leaves, and How to Keep Them
5 Systems You're Forgetting To Patch
Changing Risk Assessment Practices
BYOD: What We Can Learn From China
Cloud and Staff Rights: Where Does The Law Stand?
How Police Tracked Down Steve Jobs' Stolen iPads
IBM Solar Cell Semiconductors Set World Record
Before, During and After Patch Tuesday: A Survival Guide
Anonymoushttp://www.blogger.com/profile/03989311321242861548noreply@blogger.com0tag:blogger.com,1999:blog-3133021928330857671.post-87093274664132284252011-08-21T18:31:00.001-05:002011-08-21T18:33:15.257-05:00The Best of the WorstI guess that all depends on your point of view; the 10 Scariest Hacks is truly frightening. If you’re a bad guy this is good news. Regardless, the bad guys are bad but they are far from stupid…take notice/.
CIO (August 16, 2011)Anonymoushttp://www.blogger.com/profile/03989311321242861548noreply@blogger.com0tag:blogger.com,1999:blog-3133021928330857671.post-90236507029040890192011-08-21T18:29:00.000-05:002011-08-21T18:29:42.733-05:00Undetected ThreatsIf you want to know how APT’s can go unnoticed by even the most advanced detection algorithms read APT Attackers Hiding in Plain Sight. Turns out that the way not to be noticed (also true in real life) is not do anything that will draw attention.
Dark Reading (August 17, 2011)Anonymoushttp://www.blogger.com/profile/03989311321242861548noreply@blogger.com0tag:blogger.com,1999:blog-3133021928330857671.post-55874879259583016512011-08-21T18:27:00.000-05:002011-08-21T18:27:58.815-05:00Protecting Your ChildFacebook in conjunction with two of the best in IT security has Published A Personal Security Guide for Teenagers. The guide is available through a link in the article. With over 750MM users, a lot of teens need to brought up to speed that there are bad people out there.
TechWorld (August 19, 2011)Anonymoushttp://www.blogger.com/profile/03989311321242861548noreply@blogger.com0tag:blogger.com,1999:blog-3133021928330857671.post-36464914513116382902011-08-21T18:25:00.002-05:002011-08-21T18:25:59.122-05:00Privacy A PriorityEvery company has information that should not see the light of day; unfortunately thru error, malfeasance or ignorance stuff gets out. Here are the Top Five Privacy Issues Organizations Must Tackle in the coming years. There are holes that must be acknowledged and filled.
IT Business Edge (August 18, 2011)Anonymoushttp://www.blogger.com/profile/03989311321242861548noreply@blogger.com0tag:blogger.com,1999:blog-3133021928330857671.post-53635409999949490992011-08-21T18:24:00.001-05:002011-08-22T12:05:54.933-05:00Passé PasswordsThe password has been with us since the beginning of time it seems and we have looked at all sorts of biometrics, token and the like as a replacement. Now from the NSTIC Director: ‘We’re Trying to Get Rid of Passwords’; whether they will find an new method of authentication for the masses is another question.
NetworkWorld (August 18, 2011)Anonymoushttp://www.blogger.com/profile/03989311321242861548noreply@blogger.com0tag:blogger.com,1999:blog-3133021928330857671.post-16772115349904105892011-08-21T18:22:00.002-05:002011-08-21T18:22:58.580-05:00Hacked and UnawareA new report from McAfee indicates that the majority of Fortune 2000 companies have been hacked and many are not aware of the intrusion. The Dire Warning from McAfee Security Specialist should have a chilling affect on companies and prod them into an even higher level of security awareness and preparedness.
Enterprise Systems Journal (August 15, 2011)Anonymoushttp://www.blogger.com/profile/03989311321242861548noreply@blogger.com0tag:blogger.com,1999:blog-3133021928330857671.post-88030780883292559222011-08-21T18:21:00.000-05:002011-08-21T18:21:28.597-05:00Forever PresentIf you thought getting rid of malware was tough you haven’t seen anything. A Man Reveals Secret Recipe Behind Undeletable Cookies, these cookies are called ‘respawning’ and can be a real headache for those infected.
The Register (August 18, 2011)Anonymoushttp://www.blogger.com/profile/03989311321242861548noreply@blogger.com0tag:blogger.com,1999:blog-3133021928330857671.post-57849936092651070642011-08-21T18:19:00.000-05:002011-08-21T18:19:06.211-05:00BART LessonsThe recent cyber attack gives 3 Security Lessons From BART’s Anonymous Breach. While you may be inclined to point a finger at a transit company thing you are different, in reality, there is no difference in the computer room – pay attention.
InformationWeek (August 18, 2011)Anonymoushttp://www.blogger.com/profile/03989311321242861548noreply@blogger.com0tag:blogger.com,1999:blog-3133021928330857671.post-54972077130623245532011-08-21T18:16:00.000-05:002011-08-21T18:16:29.945-05:00Failure is Just the Tip of the IcebergWhen something goes wrong the first thing every one does is fix the problem and then move on to the next item on the list. This article indicates what we all know: The Cure for Network Downtime is Not Just Technology but a close examination of all aspects to fully understand not only the nature of the problem but everything and everyone that could possibly be involved.
NetworkWorld (Anonymoushttp://www.blogger.com/profile/03989311321242861548noreply@blogger.com0tag:blogger.com,1999:blog-3133021928330857671.post-91209343920844304042011-08-21T18:14:00.000-05:002011-08-21T18:14:55.011-05:00Lessons Learned the Hard WayExperience is a hard teacher when the lesson is DR. Unfortunately It Takes a Disaster To Prove a Techie Right in most cases and these four were expensive and painful.
InfoWorld (August 17, 2011)
Anonymoushttp://www.blogger.com/profile/03989311321242861548noreply@blogger.com0tag:blogger.com,1999:blog-3133021928330857671.post-16401485094425971122011-08-21T18:13:00.000-05:002011-08-21T18:13:02.821-05:00A Great PrimerThere are only two types of companies that are intimately familiar with BC and DR; those that are and those that will be. Making a Start on these two very important aspects for your company will mean the difference between survival and death. If you don’t have a well thought out plan, now is the time to start.
Continuity Central (August 17, 2011)Anonymoushttp://www.blogger.com/profile/03989311321242861548noreply@blogger.com0tag:blogger.com,1999:blog-3133021928330857671.post-66344876582069953922011-08-21T18:11:00.000-05:002011-08-21T18:11:28.502-05:00Database ForensicsFinding out that someone has hacked into your database is not something that shows up immediately; usually someone outside the company notices the anomaly and gives a heads up warning. The industry no recognizes that Database Auditing, Forensics Style is coming into the lime light and redo logs, etc. are not going to tell you what, when, how, where and who got tint.
Dark Reading (August 15,Anonymoushttp://www.blogger.com/profile/03989311321242861548noreply@blogger.com0tag:blogger.com,1999:blog-3133021928330857671.post-77555025936695630182011-08-21T18:09:00.000-05:002011-08-21T18:09:43.310-05:00Myths, Facts and RealityWhen vendors stop talking about a technology then you can rest assured that the technology is dead or getting mature. In the case of the cloud the later applies; however knowing The (Real) State of the Cloud, 2011 becomes more difficult because the hype is overshadowed by reality and vendors don’t like reality at the dog and pony shows.
Cloud Computing (August 15, 2011)Anonymoushttp://www.blogger.com/profile/03989311321242861548noreply@blogger.com0tag:blogger.com,1999:blog-3133021928330857671.post-4642633061316062252011-08-21T18:07:00.000-05:002011-08-21T18:07:44.599-05:00Hidden Expenses Can Kill the ROIVendors love to provide the raw data for your ROI because there are always gotchas that pop up that you don’t think about. In Preparing for the Real Costs of Cloud Computing there are going to be some substantial surprises if you are very careful in turning over every rock.
InfoWorld (August 15, 2011)
Anonymoushttp://www.blogger.com/profile/03989311321242861548noreply@blogger.com0tag:blogger.com,1999:blog-3133021928330857671.post-1496342411621715872011-08-21T18:05:00.000-05:002011-08-21T18:05:52.656-05:00Fast Isn't a GivenBy their nature clouds have multiple users on the same virtual machine and there’s the rub: Cloud Performance Isn't Always Stable. You can get a guaranteed performance in your contract but that clause won't be cheap…and you cost savings may evaporate very quickly. Make sure you get what you want in writing and if your cloud vendor balks, you walk.
Cloud Computing (August 18, Anonymoushttp://www.blogger.com/profile/03989311321242861548noreply@blogger.com0tag:blogger.com,1999:blog-3133021928330857671.post-79745367284417013292011-08-21T18:03:00.000-05:002011-08-21T18:03:57.516-05:00Clemson’s Five Year Climb to the TopFive years age, CIO James Bottom came into a University with, shall we say, a diverse IT environment. The CIO provided the leadership, encouragement and vision as the Clemson IT Team Embraces Call to be Entrepreneurial and propel Clemson to a showcase for university and college IT departments.
NetworkWorld (August 15, 2011)Anonymoushttp://www.blogger.com/profile/03989311321242861548noreply@blogger.com0tag:blogger.com,1999:blog-3133021928330857671.post-3703129074498183522011-08-21T18:01:00.000-05:002011-08-21T18:01:54.603-05:00A Great PrimerThere are only two types of companies that are intimately familiar with BC and DR; those that are and those that will be. Making a Start on these two very important aspects for your company will mean the difference between survival and death. If you don’t have a well thought out plan, now is the time to start.
Continuity Central (August 17, 2011)Anonymoushttp://www.blogger.com/profile/03989311321242861548noreply@blogger.com0tag:blogger.com,1999:blog-3133021928330857671.post-22455495453017757012011-08-18T16:18:00.003-05:002011-08-20T18:50:46.414-05:00The FuturePredicting the future in IT is about as sure as winning the lottery; but on the other hand we know the sun is going to come up tomorrow. Likewise some things do make sense and here are Three Technology Trends Your Company Can't Ignore. We like the last paragraph about those individuals that see trends and implement good ideas.
ComputerWorld (August 9, 2011)Anonymoushttp://www.blogger.com/profile/03989311321242861548noreply@blogger.com0tag:blogger.com,1999:blog-3133021928330857671.post-49618445765050975462011-08-18T16:17:00.005-05:002011-08-19T08:04:38.168-05:00USB Devices Pose Huge ProblemUSB Devices Pose Huge Problem: You may be asking how big a problem are USB devices today. A recent study by the Ponemon Institute of 745 IT and Security Managers found that USB Devices Are The Big Hole in Network Security. Some of the percentages are downright scary.
NetworkWorld (August 9, 2011)
Anonymoushttp://www.blogger.com/profile/03989311321242861548noreply@blogger.com0