John J. McLaughlin
News for Senior IT Professionals
Thursday, April 21, 2016
System News for IT Professionals, posted on April 18th (Vol 218 Issue 2)
Here are the titles for the most popular articles from the current issue:
- Intel Claims Storage Supremacy with 3D XPoint Optane Drives, 1PB 3D NAND
- Artificial Intelligence's Next Phase: Sooner and More Accessible for Everyone
- Encryption Backdoors: The Brief History Of An Oxymoron
- Why the Smart Office is Highly Susceptible to Data Breaches
- The Cost of Not Building with Security in Mind
- Many US Enterprises Manage More Than 20 Different Types of Storage
- 61% of Enterprise IT and Database Professionals Cite Poor Backup and Recovery Solutions Available Today
- Almost All Of IT Budgets Will Soon Be Dedicated To Cloud, Intel Study Finds
- Ubuntu Linux Continues To Dominate OpenStack And Other Clouds
- How To Make Your WAN Architecture Software-Defined
- Docker 1.11 ties its fate to Open Container Initiative
- Dissecting The Myth That Open Source Software Is Not Commercial
- Lack Of Career Progression Pushes IT Workers To Shop Around For Jobs
- 10 Best Smartphones Of 2016 So Far
- 18TB Hard Drives Will Be Entering The Market Soon
- The Seven Types Of E-Commerce Fraud Explained
- Dig into IoT with 41 OpenIoT Summit presentations
- 70% businesses say speed of tech outpaces training
- Cloud Adoption Could Save Feds $10 Billion Annually
- 2016 Is Still The Year Of Java 7 (Not For Long Though)
- Using Threat Hunting Technique To Fend Off Cyber Attacks
- Where DLP Technology Is Headed, And Should You Follow?
- Bitcoin Core 0.12.1 Released, Major Step Forward for Scalability
- Overlooked for Promotion? These Non-Assertive Behaviors Might Be the Cause.
- How IT teams navigate unlimited vacation policies
- 10 Things Cyber Insurance Won't Cover
- Let's Not Make Secure Encryption Illegal
- Business Intelligence Report Mentions Bitcoin and Blockchain
- Computers You Can Hold In The Palm Of Your Hand (Slideshow)
- You Keep Using that Word - NVMe. Does It Mean What I Think It Means?
Sunday, July 26, 2015
Vol 209, Issue 3
- The impending end of Moore's Law is not Intel's biggest problem
- Free (online) Linux Training/Courses
- Do Staff Perks Keep Employees Loyal?
- 5 Reasons Why Docker Is A Billion Dollar Company
- Everything you need to know about virtual reality
- Who's Managing The Career Plan?
- The Rise of Server SAN
- Replace Your NAS with Cloud Storage: The 8 Key Requirements
- Evaluating new storage for virtualization options
- Why CIOs Must Change Their Leadership Style (slideshow)
- A Look At What's On The Horizon for libreOffice
- The BYOD Debate is Not Over
- Measuring the Economic Potential of the Internet of Things
- Connected Cars - The Challenges And Benefits
- How artificial intelligence is changing economic theory
- The 10 most powerful supercomputers on Earth (slideshow)
- What CIOs really think
- Fact or Fiction: A Low Cost of Hire is Always Good
- Keeping Skills Fresh in Tech pays off
- Cyber-security's dirty little secret: It's not as bad as you think
- Spam Falls Below 50% of All Email for the First Time Since 2003
- Big Data Projects go Beyond IT Infrastructure
- The Security of Things: IoT and cybercrime
- Six Steps to Insight Advantage in a Big Data World
- IoT: AllSeen Gains IBM, Thread Releases Wireless Networking Specs for Developers
- How to Reshape IT Departments to Win in Cloud
- 10 Steps to a Better Bitcoin Wallet
- Here's how AI could fix the toxic nature of the internet
- Streaming Analytics Enter the Fast Lane
- Bad IT: Don't make these mistakes in your organization
Thursday, September 4, 2014
Popular Articles in Vol 198, Issue 5
- The Rise of White-Box Storage
- 5 Engineering Lessons from Star Trek
- Nexenta explains the economics behind Software-Defined Storage
- 4 Outsourcing Mistakes Companies still Make
- ITWorld Cartoons 2014: The Year in Geek Humor
- Why Should Anyone Trust You to Lead?
- Annoying Cubicle Behavior
- CIOs in Training: 3 Factors for Success
- Analytics for All, No Data Scientists Needed
- Data Erasure Technology: Ensuring Security, Savings and Compliance
- Three Security Practices that IoT Will Disrupt
- The IT-Savvy 10%
- Data Centers are the New Polluters
- NASA Launches Massive Cloud Migration
- Eight Steps for Comprehensive BYOD Governance
- Dominica to Be the First Bitcoin Nation
- Why Physical Security (and Infosec!) Still Matter
- Data Ownership & Encryption in the Cloud
- 8 Ways to Talk Security with Executive Management
- Dark Skies Hang over Midtier Cloud Providers
- Toss Routers with Hardcoded Passwords, Expert Says
- The Short-Term View on Bitcoin Remittances
- 10 Common Software Security Design Flaws
- Why Large Data Centers need Overlay Networks
- BYOD Policy: Don't Reinvent the Wheel
- BYOD: California Ruling a Wakeup Call
- Up Close and Personal with the Chief Data Officer
- Should Companies Practice Data Retention or Data Destruction?
- CIOs: Expand Your Skills with M&A
- Big Data: There's Signal in that Noise
Sunday, September 9, 2012
"System News for IT Professionals" Vol 174 Issue 5
- Ten Signs You're About to Get Fired
- 4 Reasons IT Leaders Hate Giving Performance Reviews
- How to Recharge Your Leadership Mojo
- 4 Strategies for Managing Junior IT Professionals
- Doomsday Malware: It's Only a Matter of Time
- Data Scientists: Meet Big Data's Top Guns
- What Keeps Information Security Leaders Awake At Night
- How the Cloud Changes the Virtual Desktop Landscape
- Cloud Computing Confusing to Many: Survey
- 10 Security Reasons to Bring Outsourced Services Back Home
- California Assembly OKs Bill Banning Warrantless Smartphone Tracking
- The State of Virtual Data Protection and Recovery
- 5 Signs Your Cloud Service Provider Can't Handle Tier 1 Apps
- Preparing for Your First Security Breach
- Not Your Grandfather's Outsourcing
- Don't Take Incumbency For Granted
- 18 Great IT Tools for Android
- Best BYOD Management: Containment Is Your Friend
- Get Things Done: 10 To-Do Apps for Android and iOS
- Risk Management Now Driven By 'Fear', Not Strategic Enough
- 12 Pieces Of Advice For IT Service Desks - From A Customer!
- Minimize Energy Costs by Following the Moon
- Big Data Analytics Today Lets Businesses Play 'Moneyball'
- Five Ways to Sell Management on Security
- Colocation Facilities - The Hidden Enabler of the Next-Generation Enterprise WAN
- Lesson from Toyota Hack: Threats Can Be Internal, Too
- Is Two-Factor Authentication Worth the Potential Headache?
- Six Ways to Protect Against the New Actively Exploited Java Vulnerability
- IT's 9 Biggest Security Threats
- 8 IT Lessons Learned From the 2012 Summer Olympics
- Project Management for High-Performing Lazy People
- Yes, Facebook Can Get You Fired
- 3 Reasons Why There's No Measuring ROI on Social Media
- The Attacker's Trade-Off: Stealth versus Resilience
- Don't Base Security on Hunches
- Imagine Having NFL Players as Your Co-Workers
- Top 5 Habits of Highly Effective Project Managers
- Software-defined Security?
- Overcome Storage Virtualization Challenges
- 10 Tips for Protecting Mobile Users
- Social Media at Work: Not Our Biggest Time-Waster
- 10 Ways to Avoid Mistakes during Project Development
- 10 Social Lessons IT Should Teach
- Big Data Deserves IT's Attention
- 'Big Security' a Natural, Necessary Extension of Big Data
- Map of State Data Breach Notification Laws
- Supercomputers Help New Orleans Prepare for Hurricane Isaac
- Vast Majority of Firms Already Victims of Advanced Malware Attacks
- Re-evaluating Security and Privacy Practices
- 10 Online Reputation Management Tips for Businesses
Sunday, September 2, 2012
"System News for IT Professionals" Vol 174 Issue 4
- Five Reasons Why Your Top Talent Leaves, and How to Keep Them
- 5 Systems You're Forgetting To Patch
- Changing Risk Assessment Practices
- BYOD: What We Can Learn From China
- Cloud and Staff Rights: Where Does The Law Stand?
- How Police Tracked Down Steve Jobs' Stolen iPads
- IBM Solar Cell Semiconductors Set World Record
- Before, During and After Patch Tuesday: A Survival Guide
- 2 Cloud Computing Era Myths Debunked
- Eight Trends That Are Changing Network Security
- 12 Cool Future Transportation Concepts
- The Wild World of Wearable Computers
- Cloud Computing Goes Mainstream
- Technology's Dark Side: Devious Devices Designed to Harm You
- Community Cloud Not a Cure-All for Cloud Compliance
- How I Organize Everything with Plain-Text Notes
- Full circle?
- Why Woz Is Unhappy With the Cloud
- 6 Recruitment Rules for HR, IT
- The Privacy Cat Is Out Of the Bag
- 9 Ways to Cut Outsourcing Consulting Costs
- Top 12 Recession-Proof IT Jobs
- Harvard Stores 70 Billion Books Using DNA
- IT Vendors: A CIO's Adversaries or Allies?
- 'Talking' Smart Cars Begin Year-Long Test Aimed At Accident Reduction
- Coaching Employees through Strategic Changes
- Top Challenges Facing Healthcare CIOs
- 'Shadow IT' Can Be the Cloud's Best Friend
- BYOD 2.0 and Spotting the Next Big Trend
- Self Service: The Most Understated Reason Why SDNs Will Rock Your World
- IT Succession Planning Inconsistent Across Government
- Your Biggest Risk: People with Good Intentions (But Bad Education)
- Porous Network Perimeters Sometimes Caused By People
- The Technology Economics of the Mainframe
- Security Manager's Journal: At Budget Time, You Ask and Hope to Receive
- 60-Minute Security Makeover: Prevent Your Own 'Epic Hack'
- 7 Reasons the FTC Could Audit Your Privacy Program
- SDNs: Love 'em or Leave 'em?
- How to Secure Data by Addressing the Human Element
- Does Big Data Mean Big Security Issues?
- Ten Surefire Ways to Get Promoted
- Doyenz: The Risks of Using the Cloud for Business Continuity Come Home to Roost
- 11 Ways around Using More Spectrum for Mobile Data
- Thoughts from the SIP Trunking Road Show
- Tips To Keep Kids Safe Online
- Investing For Transformation In 2013
- The 10 Commandments of Emergency Management
- DNA On Microchips: Big Data's Future Storage Answer?
- 4 Questions to Ask Before Starting a Big Data Initiative
- The Five Hottest IT Trends of 2012, So Far
Sunday, August 21, 2011
The Best of the Worst
I guess that all depends on your point of view; the 10 Scariest Hacks is truly frightening. If you’re a bad guy this is good news. Regardless, the bad guys are bad but they are far from stupid…take notice/.
CIO (August 16, 2011)
CIO (August 16, 2011)
Undetected Threats
If you want to know how APT’s can go unnoticed by even the most advanced detection algorithms read APT Attackers Hiding in Plain Sight. Turns out that the way not to be noticed (also true in real life) is not do anything that will draw attention.
Dark Reading (August 17, 2011)
Dark Reading (August 17, 2011)
Protecting Your Child
Facebook in conjunction with two of the best in IT security has Published A Personal Security Guide for Teenagers. The guide is available through a link in the article. With over 750MM users, a lot of teens need to brought up to speed that there are bad people out there.
TechWorld (August 19, 2011)
TechWorld (August 19, 2011)
Privacy A Priority
Every company has information that should not see the light of day; unfortunately thru error, malfeasance or ignorance stuff gets out. Here are the Top Five Privacy Issues Organizations Must Tackle in the coming years. There are holes that must be acknowledged and filled.
IT Business Edge (August 18, 2011)
IT Business Edge (August 18, 2011)
Passé Passwords
The password has been with us since the beginning of time it seems and we have looked at all sorts of biometrics, token and the like as a replacement. Now from the NSTIC Director: ‘We’re Trying to Get Rid of Passwords’; whether they will find an new method of authentication for the masses is another question.
NetworkWorld (August 18, 2011)
NetworkWorld (August 18, 2011)
Hacked and Unaware
A new report from McAfee indicates that the majority of Fortune 2000 companies have been hacked and many are not aware of the intrusion. The Dire Warning from McAfee Security Specialist should have a chilling affect on companies and prod them into an even higher level of security awareness and preparedness.
Enterprise Systems Journal (August 15, 2011)
Enterprise Systems Journal (August 15, 2011)
Forever Present
If you thought getting rid of malware was tough you haven’t seen anything. A Man Reveals Secret Recipe Behind Undeletable Cookies, these cookies are called ‘respawning’ and can be a real headache for those infected.
The Register (August 18, 2011)
The Register (August 18, 2011)
BART Lessons
The recent cyber attack gives 3 Security Lessons From BART’s Anonymous Breach. While you may be inclined to point a finger at a transit company thing you are different, in reality, there is no difference in the computer room – pay attention.
InformationWeek (August 18, 2011)
InformationWeek (August 18, 2011)
Failure is Just the Tip of the Iceberg
When something goes wrong the first thing every one does is fix the problem and then move on to the next item on the list. This article indicates what we all know: The Cure for Network Downtime is Not Just Technology but a close examination of all aspects to fully understand not only the nature of the problem but everything and everyone that could possibly be involved.
NetworkWorld (August 16, 2011)
NetworkWorld (August 16, 2011)
Lessons Learned the Hard Way
Experience is a hard teacher when the lesson is DR. Unfortunately It Takes a Disaster To Prove a Techie Right in most cases and these four were expensive and painful.
InfoWorld (August 17, 2011)
InfoWorld (August 17, 2011)
A Great Primer
There are only two types of companies that are intimately familiar with BC and DR; those that are and those that will be. Making a Start on these two very important aspects for your company will mean the difference between survival and death. If you don’t have a well thought out plan, now is the time to start.
Continuity Central (August 17, 2011)
Continuity Central (August 17, 2011)
Database Forensics
Finding out that someone has hacked into your database is not something that shows up immediately; usually someone outside the company notices the anomaly and gives a heads up warning. The industry no recognizes that Database Auditing, Forensics Style is coming into the lime light and redo logs, etc. are not going to tell you what, when, how, where and who got tint.
Dark Reading (August 15, 2011)
Dark Reading (August 15, 2011)
Myths, Facts and Reality
When vendors stop talking about a technology then you can rest assured that the technology is dead or getting mature. In the case of the cloud the later applies; however knowing The (Real) State of the Cloud, 2011 becomes more difficult because the hype is overshadowed by reality and vendors don’t like reality at the dog and pony shows.
Cloud Computing (August 15, 2011)
Cloud Computing (August 15, 2011)
Hidden Expenses Can Kill the ROI
Vendors love to provide the raw data for your ROI because there are always gotchas that pop up that you don’t think about. In Preparing for the Real Costs of Cloud Computing there are going to be some substantial surprises if you are very careful in turning over every rock.
InfoWorld (August 15, 2011)
InfoWorld (August 15, 2011)
Subscribe to:
Posts (Atom)