IT News and Events
Jun 20th, 2022 — Jun 26th, 2022 Generate the Custom HTML Email for this Issue
IT News and Events IT News and Events
Volume 291, Issue 4 << Previous Issue
Citrix News
Citrix A Leader In Zero-Trust Network Access
Company ranked by independent technology research firm GigaOm as Leader and Fast Mover in protecting apps and data against modern threats while delivering superior user experience
When it comes to protecting apps and data in the world of hybrid work, zero-trust network access (ZTNA) is the name of the game. And according to the GigaOm Radar for Zero-Trust Network Access, Citrix Systems, Inc. (NASDAQ:CTXS), is a Leader and Fast Mover in delivering solutions companies can use to win it.

'Virtual private networks (VPNs) have long been the default method of securing remote access,' writes Chris Ray, Security Researcher, GigaOm. 'However, VPNs are limited with respect to the level of control they can provide, as they are unable to take into consideration the context in which legitimate users are accessing resources,'

Designed to assist IT organizations in identifying more modern ZTNA solutions that provide greater control, the GigaOm Radar for Zero-Trust Network Access evaluated 12 vendors on the following criteria:

Citrix News, June 21st, 2022
(Get More Information . .) open to premium members only

Citrix Research Highlights Common Threats Across Industry Verticals
Unlike network firewalls, which operate at layer 3 and layer 4 of the network stack, web application firewalls sit in front of the apps and operate at the app layer (L7).
Their job is to monitor HTTP/S traffic to identify requests and responses that break protocol rules or app-specific policies, then filter or block that traffic and secure the app.

Recent research by the Citrix Cyberthreat Research Initiative (CTRI) team used attack metadata from Citrix ADCs deployed in enterprise networks to generate insights into the application risks that customers were exposed to. The team's findings were consistent across most industry verticals and aligned with the threats highlighted in the OWASP Top 10.

In this blog post, we'll share findings that highlight how pervasive these threats are across a range of industry verticals, from DDoS attacks against critical resources due to buffer overrun to the possibility of installing malware because of inconsistent cookie checks in apps.

Citrix News, June 23rd, 2022
(Get More Information . .) open to premium members only

Citrix Virtual Apps And Desktops 7 2203 LTSR Achieves Common Criteria Certification
Citrix is pleased to announce that the Citrix Virtual Apps and Desktops 7 version 2203 Long Term Service Release (LTSR) Premium Edition is now Common Criteria certified. Citrix Virtual Apps and Desktops 7 2203 LSTR successfully met all the requirements at Common Criteria Evaluation Assurance Level 2 with augmentation for Flaw Remediation, earning a final designation of EAL2+ (ALC_FLR.2). Citrix was able to demonstrate and prove that its Flaw Remediation management and processes exceed Common Criteria requirements.
A Common Criteria certification is an international security program in which accredited laboratories test and evaluate IT products against a standard that is agreed upon by more than 30 countries through the Common Criteria Recognition Arrangement (CCRA).

The Canadian Centre for Cyber Security operates the Canadian Common Criteria program in which Citrix Virtual Apps and Desktops 2203 LTSR was awarded the certification. This certification shows our ongoing commitment to providing secure software to our customers and brings an elevated level of assurance in cyber security and increased confidence in the network security for our Citrix Virtual Apps and Desktops product line. Learn more about Common Criteria Certification. The Common Criteria Maintenance Report for Citrix Virtual App and Desktops 7 2203 LTSR Premium Edition is now available to access.

Citrix News, June 22nd, 2022
(Get More Information . .) open to premium members only

How E-Signature Workflows Drive HR Efficiency And Employee Experience
There's more to human resources than paperwork, though it might not always feel that way
On their best days, HR professionals can dedicate their time and attention to valuable work like attracting, developing, and retaining talent. But all too often, they get bogged down in time-consuming manual tasks and paper pushing that make it impossible to focus on more strategic processes. To do their best work, HR teams need more efficient ways to deal with the large volume of employee documentation their jobs require.
Citrix News, June 21st, 2022
(Get More Information . .) open to premium members only

Protect Your Workforce Against Browser-Based Attacks With A Zero Trust Network
Which web browsing risks concern you the most?
Businesses are faced with the reality of threat actors attempting to access their networks and infrastructure and getting access to their applications and data. Today's workforce is increasingly remote-capable, and chances are your valuable data and assets are being accessed by an array of potentially vulnerable devices. Many organizations aren't adequately protected against - or even aware of - the many threats web browsing activities could pose to their infrastructure.

A recent Forbes article unearthed alarming statistics regarding the prevalence of cybersecurity risks. Chief among them: In 2021, Google recognized as many as 2,145,013 phishing sites - up 27 percent from the previous year. These malicious websites mimic existing websites, or appear genuine enough to pass as the real thing - and they're designed to trick you out of money or steal your data.

Citrix News, June 23rd, 2022
(Get More Information . .) open to premium members only

Scaling IoT Solutions With Citrix ADC
The growth in Internet of Things (IoT) devices has been tremendous over the last 10 years, with an estimated 10 billion to 15 billion IoT devices active as of 2022.
Every major industry either actively uses or is considering using IoT technologies to better equip, deliver, manage, or monitor their solutions. Connected cars, smart home devices, smart warehousing, and human health monitoring are a few use cases for IoT, some of which are documented by the MQTT organization.

There are several protocols to establish communication with IoT devices. At the application layer, Message Queue Telemetry Transport (MQTT), Advanced Message Queuing Protocol (AMQP), and Constrained Application Protocol (CoAP) are among the most common options. MQTT is the most popular solution for secure IoT data communication because of its reliability, fast response time, and support for a large number of devices. The MQTT protocol provides a publish/subscribe model where clients (IoT devices) connect to message brokers over a network to either publish or subscribe to information under specific topics.

Citrix News, June 21st, 2022
(Get More Information . .) open to premium members only

IT News - CxO
9 Top CIO Trends And Priorities For 2022
CIOs face a tough challenge in 2022 as they balance the need for technology investment and growth amid a growing call for fiscal prudence in uncertain economic conditions.
George Lawton writes in SearchCIO, "Enterprises worldwide are making massive changes to their business operations and in how they provision new services and customers as they continue to adapt to the fallout from the COVID-19 pandemic.

Meanwhile, recent market shifts are sharpening companies' focus on the bottom line and on delivering practical value rather than just growing the customer base.

As a result, CIOs find themselves having to balance two sometimes competing needs in 2022: supporting new services to gain a competitive advantage and cutting costs..."

SearchCIO, June 15th, 2022
(Get More Information . .) open to premium members only

3 Ideas CIOs Can Use For Better Disruption Planning
Discover how a focus on three areas -- cybersecurity, employee experience and proactive management -- can help CIOs plan for and better manage disruptions.
"Few CIOs today can escape disruption completely but focusing on critical issues can help them better manage it," writes Guilliean Pacheco in SearchCIO.

"That was one of the takeaways shared during the "Planning for the Unknown Unknowns" panel at the MIT Sloan CIO Symposium in Cambridge, Mass., on May 23. The panelists saw opportunities for innovation at almost every level in their organizations. Their reflections may provide insight other IT leaders can use to build a resilient framework and support rapid and unexpected changes.

Here are three ideas CIOs can use for better disruption planning..."

SearchCIO, June 17th, 2022
(Get More Information . .) open to premium members only

Gartner Says The Pandemic Has Reduced Compliance Reporting 30%
Fewer Observe Misconduct Since the Pandemic and a Lower Proportion Report it
The rate of compliance reporting has dropped by 30% from before the pandemic, according to Gartner, Inc. Employees are both less likely to observe misconduct and less likely to report it when observed.

'The increase in remote and hybrid working practices has reduced the amount of misconduct and the potential to observe it,' said Chris Audet, senior director, research in the Gartner Legal, Risk & Compliance practice. 'However, what we see in the data is more complex: misconduct such as gifts and entertainment, and travel abuse is falling, but things such as intimidation and unwanted behavior are on the rise.'

Gartner, June 15th, 2022
(Get More Information . .) open to premium members only

Vulnerability Management Mistakes CISOs Still Make
Cybersecurity has become a major topic of discussion in the business world. The rising frequency of cyberattacks-combined with several high-profile breaches in the past few years-has put the spotlight on the impact a successful attack can have.
"Despite growing awareness, many businesses still don't have basic cybersecurity policies in place, putting them at greater risk of a data breach or other kind of successful attack," notes Shannon Flynn in CIOinsigjht.

"These are some of the most critical considerations for enterprise network security. Considering these tips when developing a business security policy can help managers and leaders build strong cyber defenses..."

CIOinsigjht, June 15th, 2022
(Get More Information . .) open to premium members only

CIO Interview: Morten Holm Christiansen, Haldor Topsoe
There's no point digitising if there is no benefit to the customer, says the Danish chemicals giant's head of IT
Karl Flinders writes in computerwekly, "After successfully creating commercial value through digitisation at some major Nordic companies, Morten Holm Christiansen has been tasked with doing the same at Danish chemical industry giant Halder Topsoe.

Having joined the company in November 2021, Christiansen is directing Copenhagen-headquartered Topsoe's digital transformation at a time when the company is also going through a major business change.

For more than 80 years, Topsoe has provided the energy industry with the catalyst technology used to refine fossil fuels. This includes providing catalyst technology, the substances that make chemical processes work much faster during refining, and designing the processing facilities..."

computerwekly, June 14th, 2022
(Get More Information . .) open to premium members only

CISOs Gain False Confidence In The Calm After The Storm Of The Pandemic
While CISOs may feel more confident in their security posture emerging from the pandemic, new research suggests that doesn't mean organizations are better prepared for large-scale attacks.
"Cybercrime reached heightened levels of intensity and sophistication in the past year," opines Lucia Milic&#259; in DARKReading

"We saw greater complexity in ransomware, supply chain, and critical infrastructure attacks. Despite the threat escalation, CISOs feel more confident in their security posture. But does that feeling of confidence actually translate into organizations being better prepared for large-scale attacks? New research suggests that is not the case..."

DARKReading, June 16th, 2022
(Get More Information . .) open to premium members only

IT News - Storage
Data Gravity: What Is It And How To Manage It
Data gravity can attract increasing amounts of data, and brings with it onerous management overheads. We look at how to mitigate data gravity in datacentre and cloud
Stephen Pritchard writes in ComputerWeekly, "When it comes to enterprise applications, access to data - and lots of it - is usually a good thing. And the greater the volume of required data held locally to where it is processed, the better for the business, its applications, decision-making and, in some cases, compliance.

But the need to store and manage data brings its own problems too, including higher costs, lower system performance, and management overheads. Here we are dealing with the idea of data gravity.

There is growing evidence that data-rich systems attract more data. This, in turn, attracts even more data-dependent applications, which then bring in yet more..."

ComputerWeekly, June 17th, 2022
(Get More Information . .) open to premium members only

Destination 30 TB: HDD Vendors Plan Different Routes To Hit Storage Milestone In 2023
20TB hard disk drives are soon going to be forgotten because 30TB models are on their way
Top HDD manufacturers including Seagate and Western Digital are on track to roll out their own line ups of 30TB hard drives by 2024. Capacity increase has been an ask among hard drive users for several years now and a handful of companies have been working on it a while now. Recently, Toshiba, Seagate and WD together with their partners made announcements about their roadmaps to build 30TB HDDs.
Gestalt IT, June 13th, 2022
(Get More Information . .) open to premium members only

IT News - AI
Ethical AI Lapses Happen When No One Is Watching
Just because you may not see errors on the part of artificial intelligence doesn't mean that things are fine. It's up to humans to look for ethical or other issues.
"Transparency often plays a key role in ethical business dilemmas," writes Jeff DeVerter in InformationWeek, "the more information we have, the easier it is to determine what are acceptable and unacceptable outcomes. If financials are misaligned, who made an accounting error? If data is breached, who was responsible for securing it and were they acting properly?

But what happens when we look for a clear source of an error or problem and there's no human to be found? That's where artificial intelligence presents unique ethical considerations..."

InformationWeek, June 16th, 2022
(Get More Information . .) open to premium members only

7 Ways To Bring AI To Cybersecurity
Academic researchers are developing projects to apply artificial intelligence to detect and stop cyberattacks and keep critical infrastructure secure, thanks to grants from the Digital Transformation Institute.
"New ransomware variants and deceptive techniques such as living off the land and store now, decrypt later are sidestepping heuristic analysis and signature-based malware detection," writes Shannon Flynn in DARKReading.

"Behavior-based tools can compare network activity against an established norm and flag when they detect unusual and suspicious actions and patterns. Powered by artificial intelligence (AI) and machine learning (ML), such tools represent hope in a post-Colonial Pipeline world..."

DARKReading, June 15th, 2022
(Get More Information . .) open to premium members only

11 Deep Learning Software In 2022
Deep learning software is revolutionizing the technology space by bringing in more accuracy and speed for data processing and making predictions and classifications.
Amrita Pathak writes in Geekflare, "It uses the concept of AI and ML to help businesses, organizations, research facilities, and universities gain intelligence from data and use it to drive their innovations.

The reason it's evident in this modern era is that people find solutions to ease their lives and perform tasks faster. Also, automation is taking over the world.

That said, advanced products and services created using AI, Ml, and deep learning can fulfill this demand.

Deep learning is an excellent emerging technology that can transform your business by accelerating your data analysis and predictive intelligence.

In this article, we will explore the topic more and find the best deep learning software to include in your tool kit..."

Geekflare, June 15th, 2022
(Get More Information . .) open to premium members only

Best Machine Learning Platforms 2022
The term machine learning refers to a computational system that has the ability to ingest data, analyze it and spot patterns and trends.
Samuel Greengard writes in eWeek, ""Generally considered a subset of artificial intelligence (AI), machine learning (ML) systems generate algorithms based on a set of sample data and then deliver predictions, without being expressly programmed to do so. Moreover, these algorithms change and adapt as new data appears or conditions change.

This autonomous learning capability is at the center of today's enterprise. It's increasingly used to make important decisions and drive automation. Although ML is closely related to statistical analysis and data mining-and there are often overlaps across these disciplines-what sets ML apart is the ability to spot patterns, trends and properties that would otherwise go unnoticed or remain out of reach. Typically, ML typically focuses on known knowledge and ways to put it to use more effectively..."

eWeek, June 16th, 2022
(Get More Information . .) open to premium members only

IT News - Technology
AT&T Breaks Major Fibre Speed Barrier
AT&T says 20Gbps services possible in the future
Steve McCaskill writes in "US broadband operator AT&T has become the first in the industry to achieve a 20Gbps symmetrical speed on a production fibre network, claiming the milestone could mean even faster speeds for consumers and businesses in the near future.

The company achieved the transmission rate on 25GS-PON in its broadband lab in Austin, Texas and says the technology can work with its existing fibre network.

The company achieved 10Gbps in lab tests earlier this year and has a commercial 5Gbps 'Hyper Gig' broadband offering in the US...", June 13th, 2022
(Get More Information . .) open to premium members only

Intel Goes Bold With Meteor Lake CPUs That Could Take Down Apple's M2
Team Blue's new lithography seems to be yielding impressive results
"Intel has given us our first proper look at its 14th-generation desktop and mobile CPUs, codenamed 'Meteor Lake', reports Christian Guyton in, "which are due to launch in 2023. These will be the first processors to utilize the new 'Intel 4' process node, which is replacing the Intel 7 design used in the company's current CPUs.

Intel 4 is a 7nm process technology, while Intel 7 was 10nm (yes, we agree that the naming convention is silly). The exciting part is that Intel 4 will use a new type of processor lithography called 'advanced extreme ultraviolet' lithography, or EUV for short. This replaces the conventional deep-UV immersion lithography used in current processor production...", June 15th, 2022
(Get More Information . .) open to premium members only

High-Bandwidth Memory (HBM) Delivers Impressive Performance Gains
Chip-level design breakthrough provides bandwidth boost for supercomputers and artificial intelligence (AI) applications
Andy Patrizio writes in Networkworld, "IT vendors typically race to deliver incremental improvements to existing product lines, but occasionally a truly disruptive technology comes along. One of those disruptive technologies, which is beginning to find its way into enterprise data centers, is High-Bandwidth Memory (HBM).

HBM is significantly faster than incumbent memory chip technologies, uses less power and takes up less space. It is becoming particularly popular for resource-intensive applications such as high-performance computing (HPC) and artificial intelligence (AI)..."

Networkworld, June 16th, 2022
(Get More Information . .) open to premium members only

Will Optics Ever Replace Copper Interconnects? We Asked This Silicon Photonics Startup
Star Trek's glowing circuit boards may not be so crazy
Tobias Mann writes in The Register, "Science fiction is littered with fantastic visions of computing. One of the more pervasive is the idea that one day computers will run on light. After all, what's faster than the speed of light?

But it turns out Star Trek's glowing circuit boards might be closer to reality than you think, Ayar Labs CTO Mark Wade tells The Register. While fiber optic communications have been around for half a century, we've only recently started applying the technology at the board level. Despite this, Wade expects, within the next decade, optical waveguides will begin supplanting the copper traces on PCBs as shipments of optical I/O products take off..."

The Register, June 18th, 2022
(Get More Information . .) open to premium members only

IT News - Humor
BOFH: Tech Helps HR Investigate The Boss's Devices
We're going to need a corkboard, push pins, red yarn and emails dating back to 2003
EPISODE 11 The Boss is - not to put too fine a spin on it - crapping himself.

Apparently, there's a rumour about some legal action in the wind and that the substance of his email conversations is now being asked about.

At the moment it's just some questions from HR, but who knows how far this could go?

". and so we will need to see the contents of his mailbox, including his sent, deleted and archived documents," the company's HR person tells me.

I can tell it's serious as one of the company's lawyers is pacing around in the background.

"So you want me to recover his deleted emails?" I ask.


The Register, June 17th, 2022
(Get More Information . .) open to premium members only

IT News - BI
How Can CIOs Build Business Value With Business Analytics?
Business analytics has become invaluable for CIOs of companies that want to bolster their competitiveness in the new economy
Analytics is becoming more important than ever in the world of business. Over 70% of global businesses use some form of analytics. This figure will rise as globalization, supply chain challenges and other factors increase competitiveness.

This is an important year for enterprises keeping in view that most global industries are recovering from the pandemic horror, and the era of web 3.0 is at the doorstep. For both reasons, the role of CIOs has to embrace automation and analytical thinking in strategizing the organization's initiatives. Until now, they were proactively involved to maximize IT efficiencies and accelerate cost savings in general.

SmartDataCollective, June 15th, 2022
(Get More Information . .) open to premium members only

IT News - Operations
A SaaS Evaluation Checklist To Choose The Right Provider
Replacing a legacy app with a SaaS alternative can be tedious. Create a checklist related to reliability, support and uptime to pick the right SaaS app and provider.
"Enterprise IT managers deal with a lot of legacy software," writes Steven S. Warren in SearchCloudComputing. "This software often runs on hardware that's no longer supported, risking downtime and tying up money in specialist contracts. It most likely also uses a specific programming language that makes it challenging to manage and maintain -- let alone improve.

Businesses know the time and money IT teams sink into these legacy software systems, but they're often afraid to switch to a cloud-hosted alternative. No one wants to get hacked or discover they have no support available during an outage..."

SearchCloudComputing, June 16th, 2022
(Get More Information . .) open to premium members only

The Challenges Of Managing Increased Complexity As Hybrid IT Accelerates
SolarWinds released the findings of its ninth annual IT Trends Report which examines the acceleration of digital transformation efforts and its impact on IT departments.
"The report found the acceleration of hybrid IT has increased network complexity for most organizations and caused several worrisome challenges for IT professionals.

Hybrid and remote work have amplified the impact of distributed and complex IT environments. Running workloads and applications across both cloud and on-premises infrastructure can be challenging, and many organizations are increasingly experiencing-and ultimately hindered by-these pain points..." - HelpNet Security

HelpNet Security, June 16th, 2022
(Get More Information . .) open to premium members only

IT News - Security
7 Hottest Programming Languages Of 2022
Some of the programming languages on this list have been popular for quite a while; others are just beginning to win the favor of developers.
Christopher Tozzi writes in ITProToday, "But all are worth familiarizing yourself with.

What's the most important programming language to learn in 2022? That's an open question, but one way to answer it is to look at languages that are currently trending.

Some of them are well-established coding languages that have long been popular. Others are newer languages that are just now entering their heyday. Either way, they're languages worth familiarizing yourself with..."

ITProToday, June 15th, 2022
(Get More Information . .) open to premium members only

How To Build Cybersecurity Resilience
Cybersecurity has been changing rapidly over the past couple of years, due in no small part to the COVID-19 pandemic. In response, organizations have digitized at an unprecedented rate and, in the process, created new opportunities for cybersecurity shortfalls
A.N. Ananth writes in Security Boulevard, "Here are four trends that, in addition to the anticipated rise in ransomware, should affect how you practice cybersecurity and how you build resilience in your organization.

Work From Home, Remote Access and an Expanded Attack Surface

Around 62% of employees between the ages of 22 and 65 said they work remotely at least occasionally, according to research by Owl Labs. It's evident that remote work and remote access are here to stay. Now is the time to ask yourself whether you are adjusting your security strategy to match these workforce trends..."

Security Boulevard, June 16th, 2022
(Get More Information . .) open to premium members only

It's Time To Rethink Breach Management
By combining and automating all the elements required to handle a breach, it's possible to gain control over potentially devastating events.
Security breaches and breakdowns have become an unfortunate fact of life. With the average cost of a security breach reaching $4.24 million, it's critical to find ways to automate detection and ratchet up protection. What's more, any breach detection and remediation framework must support a growing array of regulatory obligations, such as GDPR, CCPA, HIPAA, PHI and PCI.
eWeek, June 17th, 2022
(Get More Information . .) open to premium members only

Once Is Never Enough: The Need For Continuous Penetration Testing
If you Google 'How often should I do penetration testing?', the first answer that pops up is 'once a year.'
Miri Adjiashvili opines in HelpNet Security, "Indeed, even industry-leading standards like PCI-DSS dictate that external penetration testing be conducted annually (or after significant changes to infrastructure or applications), while internal penetration testing takes place annually, with segmentation testing occurring every six months.

Yet today's cybercriminals don't work on annual schedules. They don't wait until pen testing time rolls around and the vulnerabilities found are rectified. They strike fast, they strike hard, and they use advanced AI-powered and automated tools to exploit vulnerabilities many organizations don't even know exist, let alone exist in their own networks..."

HelpNet Security, June 14th, 2022
(Get More Information . .) open to premium members only

12 Best Practices For Wireless Network Security
The importance of wireless network security cannot be understated. With the proliferation of mobile devices and the popularity of public Wi-Fi hotspots, the potential for data breaches and other cybersecurity threats has increased exponentially.
"While there are many different steps that can be taken to secure a wireless network," opines Anas Baig in Solutions Review, "these 12 best practices are essential for ensuring that your data and devices are safe from malicious actors.

1. Enabling Two-Factor Authentication (2FA)

Two-factor authentication adds an extra layer of security to the login process. It requires users to enter both a username and password, as well as a code that is generated by an authenticator app. This makes it more difficult for someone to gain unauthorized access to the network..."

Solutions Review, June 17th, 2022
(Get More Information . .) open to premium members only

If You Really Want To Improve Cyber Resilience Stop Letting Employees Create Their Own Passwords
A fundamental change of attitude to access credentials is required to give organizations a chance of regaining control over cyber security says Julia O'Toole, Founder and CEO of MyCena Security Solutions.
"In mid-March, the Cybersecurity and Infrastructure Security Agency (CISA) released a report highlighting how cyber actors routinely exploit poor security configurations, weak controls, and other poor cyber hygiene practices to gain access and compromise user systems. These included not enforcing multifactor authentication, primarily with remote desktop access, the use of vendor-supplied default login usernames and passwords, and the failure to detect and block phishing attempts.

CISA suggested that organizations can help strengthen their network defences against commonly exploited practices by adopting a zero-trust security model, which enables users to be assigned only the access rights required to perform their assigned tasks. Access control can limit the actions of malicious cyber actors and reduce the chance of user errors..."

Continuity Central, June 15th, 2022
(Get More Information . .) open to premium members only

IT News - Database
The Future Of Database Management Systems
As the amount of data generated globally grows exponentially, data-driven businesses are increasingly turning to more innovative database management systems to store, manage, and process all that data.
This article provides an overview of database management, how it has evolved - especially during the COVID-19 pandemic - and the future of database management systems.

What Is a Database?

Before learning more about database management systems, it's essential to understand what a database is and how various kinds of databases are used.

Dataversity, June 16th, 2022
(Get More Information . .) open to premium members only

IT News - Networks
3 SD-WAN Challenges And Solutions
Points to consider when selecting an SD-WAN solution include WAN/LAN branch architecture, deployment and service provisioning, and centralized management.
"Software-Defined Wide Area Networking (SD-WAN) uses the concept of Software Defined Networking (SDN) to distribute network traffic over a wide area network (WAN). SD-WAN automatically determines the most efficient way to route application traffic between branch offices and data centers based on pre-configured policies," writes Sagar Nangare in CIO.

"SD-WAN is managed by a central controller that sends policy information to all connected devices. The software allows network operations teams to remotely program network edge devices using zero-touch or low-touch provisioning. This minimizes, and in some cases eliminates, the need to manually configure routers in branch offices..."

CIO, June 14th, 2022
(Get More Information . .) open to premium members only

IT News - Careers
3 Certification Tips For IT Leaders Looking To Get Ahead
CIOs share key best practices for IT leaders looking to level up with a mix of technical and business credentials aimed at growing their CIO role.
"With the technology landscape in constant flux, getting certified on the latest tools and techniques can be a valuable way to advance your career - even for IT leaders," opines CIO.

"Typically, CIOs consider certifications as a means for training up IT staff on vital skills around key initiatives such as cybersecurity, data analytics, AI, or the cloud. But certificates, even technical ones, can be an important part of any IT leader's career journey, giving them hands-on experience, strategic insights into emerging technologies and methodologies, and the possibility to grow their peer network..."

CIO, June 17th, 2022
(Get More Information . .) open to premium members only

Top 2022 IT Certifications To Advance Your Career
One tried and true way for IT professionals to differentiate themselves from the rest of the pack is to earn certifications in critical infrastructure technologies.
Salvatore Salamone writes in InformationWeek, "While opportunities abound in today's dynamic job market, the volume of competition for any given IT opening can be enormous. Job sites such as LinkedIn can be humbling. Who wants to be just in the top 20% of the 750 candidates that have already applied for a job? One tried and true way for IT professionals to differentiate themselves from the rest of the pack is to earn certifications in critical infrastructure technologies.

That point was hammered home in a recent 'Upskilling IT 2022' report by the DevOps Institute. 'IT professionals ultimately control and manage their own upskilling journeys - and recruiting trends show that building critical skill sets is a worthy personal investment,' said Jayne Groll, CEO of DevOps Institute..."

InformationWeek, June 17th, 2022
(Get More Information . .) open to premium members only

The 4-Day Workweek: 3 Things Development Team Leaders Should Prioritize Instead
A shorter workweek is not necessarily the key to reducing team stress. Consider addressing these underlying problems first
"The pandemic has forever changed the workplace, causing many in the tech industry to now question the traditional five-day workweek," writes Brett Stevens in The Enterprisers Project.

"One proposed solution is a four-day workweek, which some believe promises to redefine workplace productivity and employee happiness. Research shows those working four days per week report higher well-being, less burnout, and improved productivity.

But the four-day workweek is not a one-size-fits-all model, and adopting one could be detrimental to teams that overlook underlying issues in their workplace culture. In cases where teams experience high friction in their development processes, compressing the workweek and removing flexibility may exacerbate burnout..."

The Enterprisers Project, June 17th, 2022
(Get More Information . .) open to premium members only

Sections in this issue:
click to jump to section