IT News and Events
Sep 23rd, 2019 — Sep 29th, 2019 Generate the Custom HTML Email for this Issue
IT News and Events IT News and Events
Volume 258, Issue 4 << Previous Issue | Next Issue >>
Citrix News
disable
CMP Transforms Business with Citrix
Company leverages SD-WAN solution to increase network performance for digital workspaces, fueling innovation and growth
In today's volatile and uncertain economy, organizational agility is imperative. Leading enterprises know it, and with increasing frequency, are reaching for networking solutions that can give them the performance and efficiency required not only to keep pace with change, but stay ahead of it. Take Custom Molded Products (CMP), a premier provider of pool, spa and bath products.

With the help of Citrix Systems, Inc. (NASDAQ:CTXS), and its partner XenTegra, the company has built a modern, software-defined network on which it can securely and reliably connect its facilities around the world and deliver a superior user experience that engages employees, improves productivity and accelerates business results...

Citrix News, September 24th, 2019
(Get More Information . .) open to premium members only

IT News - CxO
disable
CIO Role: Everything You Need To Know About Today's Chief Information Officers
What does a CIO do in 2019? How has the CIO skill set changed? What's coming next as the CIO role evolves? Everything you need to know about CIOs - including advice for aspiring CIOs from people who've made the leap
Laurianne McLaughlin writes in The Enterprisers Project, "The CIO, or chief information officer, emerged as a job title in the 1980's: This highly technical person would oversee the information technology department's resources and staff. But in the decades that followed, CIOs themselves rewrote the perception of their role, coming out of the back office to become true strategic business partners, working alongside their C-suite peers. Today, CEOs look to the CIO to drive innovation and revenue-generating ideas throughout the business..."
The Enterprisers Project, September 16th, 2019
(Get More Information . .) open to premium members only

10 Signs You're Being Socially Engineered
Scammers will try to trick you and your organization's users into giving up credentials or other sensitive date. Be skeptical if you see any of these signs.
"Together, phishing and social engineering are by far the number one root-cause attack vector, and they have been around nearly since computers themselves were invented," writes Roger A. Grimes in CSO Online.

"In the early 1980s, before the internet was the internet, I came across a text file that was named 'HowtoGetAFreeHSTModem.' Back in the day, screaming fast, U.S. Robotic HST 9600-baud (!!) modems were highly coveted. I quickly opened the text file. It read, 'Steal One!!'. 'What a jerk,' I thought. Then I hit the escape key to close the text file..."

CSO Online, September 19th, 2019
(Get More Information . .) open to premium members only

Why It's Time To Embrace Top-Down Cybersecurity Practices
An open culture doesn't mean being light on security practices. Having executives on board with cybersecurity, including funding it adequately, is critical for protecting and securing company data
"Cybersecurity is no longer just the domain of the IT staff putting in firewalls and backing up servers," notes Matt Shealy in opensouce.com.

"It takes a commitment from the top and a budget to match. The stakes are high when it comes to keeping your customers' information safe.

The average cost of a data breach in 2018 was $148 for each compromised record. That equals an average cost of $3.86 million per breach. Because it takes organizations more than six months - 196 days on average - to detect breaches, a lot of remediation must happen after discovery..."

opensouce.com, September 19th, 2019
(Get More Information . .) open to premium members only

CISO Do's And Don'ts: Lessons Learned
Keeping a business safe from cyber threats while allowing it to thrive is every CISO's goal
"The task is not easy: a CISO has to keep many balls in the air while being buffeted by an increasingly complex and always shifting threat landscape. Consequently, the importance of a good CISO should not be underestimated," opines Zeljka Zorz in HelpNet Security.

"Francesco Cipollone, CISO and director at UK-based cybersecurity consultancy NSC42, says that he has seen his fair share of CISOs who believe they know it all, who focus on only one specific aspect of cybersecurity, who keep the security team segregated from the engineering team and the rest of the organization, and who don't empathize with the business side..."

HelpNet Security, September 16th, 2019
(Get More Information . .) open to premium members only

IT News - Storage
disable
Top 10 File-Sharing Options: Dropbox, Box, Google Drive, Onedrive And More
Most file-sharing services have evolved into full-blown collaboration platforms. We look at 10 online services ranging from basic to enterprise-level
James A. Martin writes in ZDNet, "In 2004, if you tried to share a large file, you had two options. 1: Use a file-sharing service like YouSendIt, which was brand new at the time. Or 2: Copy the file to a disc and hand (or mail) it to the recipient, a practice known not so affectionately as 'sneakernet.'

Today, as far as file sharing goes, we have nearly endless options..."

ZDNet, September 18th, 2019
(Get More Information . .) open to premium members only

Western Digital Sells Intelliflash Business To Big Data Storage Supplier DDN
The sale is part of Western Digital's decision to exit the Storage Systems business all together
Stephanie Condon writes in ZDNet, "Western Digital on Thursday said it's selling its IntelliFlash data center systems portfolio to DDN, a big data storage supplier. Terms of the deal were not disclosed.

The sale is part of Western Digital's decision to exit the Storage Systems business all together, the company said. As part of that effort, it's also exploring 'strategic options' for its ActiveScale portfolio..."

ZDNet, September 19th, 2019
(Get More Information . .) open to premium members only

Is All-Flash Storage Needed For Deep Learning?
Organizations building deep learning data pipelines may struggle with their accelerated I/O needs, and whenever I/O is the question, the usual answer is 'throw flash/SSD at it.'
Shailesh Manjrekar writes in EnterpriseAI, "Certainly expensive all-flash storage arrays are highly beneficial for line-of-business applications (and to storage vendors' sales). But DL applications and workflows are inherently different from typical file-based workloads, and should not be architected the same way.

Let's start by looking inside those servers. DL uses several hidden layers of neural networks, such as convolutional (CNN), long short-term memory (LTSM), and/or recurrent (RNN). These multiple layers are accommodated by servers configured with multiple GPUs, creating a massively parallel compute layer for training and inferencing..."

EnterpriseAI, September 17th, 2019
(Get More Information . .) open to premium members only

insideBIGDATA Guide to Optimized Storage for AI and Deep Learning Workloads
Artificial Intelligence (AI) and Deep Learning (DL) represent some of the most demanding workloads in modern computing history as they present unique challenges to compute, storage and network resources
Daniel Gutierrez writes in insideBIGDATA, "In this technology guide, 'insideBIGDATA Guide to Optimized Storage for AI and Deep Learning Workloads', we'll see how traditional file storage technologies and protocols like NFS restrict AI workloads of data, thus reducing the performance of applications and impeding business innovation. A state-of-the-art AI-enabled data center should work to concurrently and efficiently service the entire spectrum of activities involved in DL workflows, including data ingest, data transformation, training, inference, and model evaluation..."
insideBIGDATA, September 17th, 2019
(Get More Information . .) open to premium members only

IT News - AI
disable
AI In Cyber Security: A Necessity Or Too Early To Introduce?
The threats against organisations are growing in volume and success, but can AI in cyber security stop the rot and turn failure into success?
"There is a list of growing cyber security threats, ranging from a rise in identity thefts and account takeovers to vindictive ransomware strains," reports Nick Ismail in Information Age.

"Businesses are feeling the strain, especially Fortune 500 enterprises, who have massive stores of data. Because of this, they have become attractive to bad actors who want to try and take over that honeypot.

But, all is not lost..."

Information Age, September 18th, 2019
(Get More Information . .) open to premium members only

6 Criteria For Selecting The Right AI Data Storage
Buying the wrong storage AI platform could have serious implications. Learn the six considerations that can affect your organization's product choice and strategy
"AI and machine learning are positioned to become two of the most important tools to help businesses create competitive advantages using their core digital assets," notes Chris Evans in SearchStorage.

"But before buying AI data storage, an organization must consider a range of requirements based on how data is acquired, processed and retained by machine learning platforms.

Let's first examine the lifecycle of data used by machine learning software, as this helps businesses understand what to consider when selecting storage for AI..."

SearchStorage, September 18th, 2019
(Get More Information . .) open to premium members only

IT News - Humor
disable
I'd Say You Need Another Cup
The humiliation may have been worse than the scalding.
"It's the late 1960s shop gets several new IBM 1403 Model N1 printers. The 1403 is big, fast - and loud. The Model N1 addresses the noise issue by enclosing the printer on all sides. When the printer encounters an error, the top automatically opens. That can really be helpful when you have a sea of printers in a computer room; you know at a glance which one has an error..."
ComputerWorld, September 20th, 2019
(Get More Information . .) open to premium members only

Throwback Thursday: Ultimatum
"I'm sorry, Dave, I can' do that..."
"It's 1977, and this pilot fish's company is moving to a new data center. 'The old facility was in the basement of the headquarters building,' says fish. 'Access was via an ancient magnetic strip reader with no special capabilities. You either got in or you didn't..."
Computerworld, September 19th, 2019
(Get More Information . .) open to premium members only

IT News - HR
disable
6 Ways Big Data Is Changing HR
Excellence in the human resources (HR) department can be instrumental in a company's success
"After all, HR professionals assume responsibilities like hiring and firing, on-boarding and training updates and making employees happy, productive and eager to stick around.

People who work in HR often use technologies to impact their work, big data among them. Here are six ways big data in HR has had an impact.

1. Assisting HR Professionals in Representing Their Companies Accurately

Most candidates understandably want to know what it's like to work at a company before they apply for positions there. They wonder what the typical atmosphere is like, what the company values most and how employees feel about being part of the workforce..." - insideBIGDATA

insideBIGDATA, September 19th, 2019
(Get More Information . .) open to premium members only

IT News - Security
disable
Cybersecurity Frameworks Hold Key To Solid Security Strategy
Cybersecurity frameworks take work, but they help organizations clarify their security strategies. If you don't have one, here's what to consider, even for emerging perimeterless security options
Tom Nolle writes in SearchSecurity, "Whether organizations truly need a cybersecurity framework is one of the biggest questions that's never really asked in information security. This is because some vendors focus on selling spot security products, an approach that doesn't lend itself to encouraging enterprises to step back and look at security in the overall context of what they are trying to achieve..."
SearchSecurity, September 19th, 2019
(Get More Information . .) open to premium members only

(IN)SECURE Magazine Issue 63 Released
(IN)SECURE Magazine is a free digital security publication discussing some of the hottest information security topics. Issue 63 has been released today. It's a free download, no registration required
Table of contents

  • Identifying evasive threats hiding inside the network
  • Inside the NIST team working to make cybersecurity more user-friendly
  • Report: Black Hat USA 2019
  • Healthcare's blind spot: Unmanaged IoT and medical devices
  • What the education industry must do to protect itself from cyber attacks
  • Solving security problems: Security advice for those with limited resources
  • Review: Specops uReset
  • True passwordless authentication is still quite a while away
  • Six criteria for choosing the right security orchestration vendor
  • Ensuring supply chain security: 5 IT strategies for choosing vendors wisely
  • Have you thought about the often-overlooked mobile app threat?

Get the latest issue of (IN)SECURE Magazine and subscribe for free

HelpNet Security, September 19th, 2019
(Get More Information . .) open to premium members only

IT News - Database
disable
Should Your Company Use DBaaS?
From SaaS to IaaS, companies are rapidly moving to the cloud to gain huge agility and cost benefits. So, is it time for your company to take advantage of database as a service (DBaaS)?
"Here's a high-level discussion to help you along your decision path," offers Tyler Duzan in DevOps.com.

"First, it's important to distinguish DBaaS from simply running a database on a cloud-based server, such as Amazon AWS or Microsoft Azure. While you can certainly gain some cost and agility benefits from running your database on a virtual machine, you'll still need to provision and maintain the database, that is, you will need server operations expertise..."

DevOps.com, September 20th, 2019
(Get More Information . .) open to premium members only

IT News - DevOps
disable
DevOps Terms: 10 Advanced Concepts To Know
Are you moving farther down the path with DevOps and tripping on the lingo? Experts explain key DevOps terms and phrases that teams should understand
"Do you have the basics of DevOps down?" asks Carla Rudder in DevOps.com.

"Can you explain what it is in one or two sentences, tops? Have you deciphered the essential acronyms, from CD to SDLC? If not, check out DevOps terms: 10 essential concepts, explained - a good jumping off point for those new to the practice. But if you are ready to dive into the deeper end of DevOps, you will need a few advanced definitions..."

DevOps.com, September 16th, 2019
(Get More Information . .) open to premium members only

IT News - Cloud
disable
Five Common Cloud Configuration Mistakes
It's a joint responsibility to keep data safe in the cloud. Here's what cloud customers must do to keep their end of the bargain
Peter Smith writes in Dark Reading, "There's no doubt that the cloud can improve certain aspects of security. After all, clouds have enormous economies of scale that provide customers with dedicated security teams and technologies that aren't feasible for the vast majority of organizations. That's the good news. The bad news happens when customers don't properly configure and secure their own workloads and buckets in a cloud environment..."
Dark Reading, September 17th, 2019
(Get More Information . .) open to premium members only

Top Five Cloud Storage Pitfalls
Cloud storage offers apparent simplicity, but unexpected costs, complexity, data movement and integration challenges can arise. We look at how to avoid common cloud storage pitfalls
"Key among the challenges and pitfalls the industry encounters while moving enterprise data onto public cloud storage are the often unexpected costs that arise with cloud, plus the challenges of creeping complexity, data movement and cloud security. So how to avoid these?" asks Paul Stringfellow in ComputerWeekly.

"Cost continues to be the biggest pitfall with any cloud service, and storage is no different..."

ComputerWeekly, September 19th, 2019
(Get More Information . .) open to premium members only

IT News - Wireless
disable
Wi-Fi Certified 6 Launches New Era For Wireless Connectivity
The Wi-Fi 6 wireless standard is now ready for deployment, thanks to the debut of a certification effort that helps guarantee interoperability
"The next generation of Wi-Fi, originally known as 802.11ax, but now branded as Wi-Fi Certified 6, is ready for broad deployment," reports Sean Michael Kerner in SearchNetworking.

"The Wi-Fi Alliance has made public the availability of the Wi-Fi Certified 6 certification program that aims to qualify and help ensure that devices are compliant and interoperable with the new Wi-Fi standard. Among the numerous benefits that Wi-Fi 6 promises are boosted capacity and bandwidth speeds as well as improved energy efficiency over previous Wi-Fi standards..."

SearchNetworking, September 18th, 2019
(Get More Information . .) open to premium members only

IT News - DR
disable
Disaster Recovery: Steps SMBs, Enterprises Must Take
Disaster strikes: Your critical data is gone. How long can your business survive?
"From natural forces to cyber events to blackouts caused by worn infrastructure, disasters can cause business disruptions, work stoppage, a battered brand image and, worst of all, data loss. Loss of critical business and customer information can damage giant corporations; for small enterprises - which often lack the personnel and budget to protect against risk - the stakes are higher, and disasters may well put them out of business..." - eWeek
eWeek, September 18th, 2019
(Get More Information . .) open to premium members only

IT News - Networks
disable
The CISO must be included in any SD-WAN discussion
When CISOs are engaged in the selection of a Secure SD-WAN solution, they not only enable their organization to build a robust WAN edge, but they can also ensure that those connections don't become the weak link in the security chain
"Extending advanced services to the WAN Edge of the network can have a serious impact on a security architecture and strategy," opines John Maddison in CSO Online.

"News cycles are filled with stories about critical network breaches that began by taking advantage of some neglected element of the network, whether by exploiting a vulnerable IoT device or by hijacking some wireless access point at a remote retail location..."

CSO Online, September 19th, 2019
(Get More Information . .) open to premium members only

The Evolution Of SDN And Its Role In Networking
Has SDN run its course, or has the architecture simply evolved? In many current products, data centers and cloud environments, SDN may be closer than you think.
"Software-defined networking, or SDN, is a strategy that splits the control plane from the forwarding plane and pushes management and configuration to centralized consoles," writes John Fruehe in SearchNetworking.

"SDN is now over 10 years old. When the history of SDN began, many people thought gleaming software-defined networks would replace tightly coupled, vertically integrated network products. The massive data centers of Amazon, Facebook and Google all moved to SDN, but why isn't SDN everywhere?

Well, it is, even if it's not always called SDN..."

SearchNetworking, September 19th, 2019
(Get More Information . .) open to premium members only

IT News - Careers
disable
What Brilliant Interview Questions Should You Ask Employers?
Inc. Magazine published an article called, "Impress a Potential Employer In an Interview With These 3 Unexpected Yet Brilliant Questions." Here's Nick take on that article.
"The problem with these 'brilliant' interview questions is that they are indirect and too clever. They don't get to the truth you need to judge an employer. I like Inc.'s #2 question, but I think the best questions you can ask in job interviews are about the work, the people, and the money..."
Ask The Headhunter, September 20th, 2019
(Get More Information . .) open to premium members only

Sections in this issue:
click to jump to section