IT News and Events
Jul 19th, 2021 — Jul 25th, 2021 Generate the Custom HTML Email for this Issue
IT News and Events IT News and Events
Volume 280, Issue 3 << Previous Issue
Citrix News
2021 Application Security Trends
Application security practitioners are navigating a security landscape that has become increasingly complex in recent years with the adoption of cloud and containers and the growing use of APIs
"n a new survey on application security conducted by Forrester Research, nearly 40 percent of companies say that they have been victims of a security breach as a result of an external attack carried out by a web application exploit...

With all signs pointing to hybrid work as a post-pandemic norm, companies will further increase their adoption of web and SaaS applications to support remote employees. The expanded attack vector afforded by web and SaaS apps is the reason they have become the most common way in for attackers..."

Citrix News, July 22nd, 2021
(Get More Information . .) open to premium members only

5 Priorities For Operationalizing Employee Experience In A World Of Hybrid Work
This blog post is based on the webinar Designing Employee Experiences: How to Operationalize Your EX Strategy, which is available to view on demand now
"The event featured the insights of Chris Voce, Customer Engagement Strategist at Citrix; Marc Curtis, Head of Innovation Workforce and Workplace Services at Fujitsu; and Shweta Bandi, Director of HR Technology and Employee Experience at Adobe.

In a recent Citrix survey, 43 percent of employees saw better employee experience (EX) lead to increased productivity, and more than 30 percent said EX led to improved profitability and better customer satisfaction..."

Citrix News, July 22nd, 2021
(Get More Information . .) open to premium members only

Enhance Your Workspace Capabilities With IGEL OS Powering Your Endpoints
Citrix Workspace and IGEL OS are transforming how people work through collaboration to optimize the user experience and boost productivity
"Together we deliver a compatible and intelligent solution for fast, frictionless, and secure access to virtualized and cloud workspaces from any IGEL OS-powered endpoint. IGEL is a longstanding Citrix Ready partner, and we are now part of the Citrix Ready Workspace Endpoint Program and the Citrix Ready Hybrid Multi-Cloud Program.

With Citrix Workspace, you can embrace the cloud with ease and securely deliver all the tools your employees need such as SaaS apps, web apps, and virtual apps. It also helps simplify management and speed up deployment, no matter where you are in your cloud journey..."

Citrix News, July 22nd, 2021
(Get More Information . .) open to premium members only

Kaizen Approach Transforms Security With Citrix Secure Access Solutions
Firm leverages cloud offerings to secure applications and data without hindering employee experience
"Applications, data and people are the most valued assets of any organization and must be protected at all costs. But security can't get in the way of work getting done. It's a delicate balancing act. As a leading provider of security consulting services to government and commercial customers, Kaizen Approach recognizes this. And the firm is adjusting its playbook to better manage it. Leveraging cloud-delivered digital workspace and secure access solutions from Citrix Systems, Inc. (NASDAQ:CTXS), Kaizen has created a modern security framework through which it can help itself - and its clients - deliver a simple, secure work experience that empowers employees to work when, where and how they want while keeping their information and devices safe..."
Citrix News, July 20th, 2021
(Get More Information . .) open to premium members only

Tips To Reboot Your B2B Marketing Mindset For Better Results
After COVID-19, the B2B buyer may never be the same
"In her information-packed talk from the Citrix Partner Marketing Kickoff 2021, featured speaker Lori Wizdo, Forrester VP and Senior Analyst, shares that the pandemic accelerated three major trends disrupting today's B2B market:

  • Information ubiquity: Today's B2B buyers have access to more detailed information about products, services, and vendors.

  • Millennial decision-makers: Millennial buyers have different preferences than their predecessors. Not only are they digitally self-sufficient, but they're also comfortable with asynchronous communication versus face-to-face sales meetings.

  • Consumer experiences: B2B buyers are consumers first, and they've come to expect a seamless consumer experience from B2B vendors.

These trends (along with COVID-19 as the catalyst) are changing B2B buyer behavior, putting all businesses at risk..."

Citrix News, July 20th, 2021
(Get More Information . .) open to premium members only

IT News - CxO
10 Signs Of An IT Leader With A Growth Mindset
People with a growth mindset can prove crucial to IT teams chasing ambitious goals. Look for these characteristics and behaviors in your team - and nurture them within yourself
Stephanie Overby writes in ITProPortal, "Organizational psychologist Carol Dweck made a name for herself measuring the impact of mindset on human performance. Morea than a decade ago, she synthesized her research on the subject in her book Mindset: The New Psychology of Success. In that book, Dweck distinguished people with 'fixed mindsets', who believe that basic qualities like intelligence or talent are static, from those with 'growth mindsets,' who believe that they can develop talents and capabilities over time through effort. Those who fall in the latter group, Dweck found, thrive on challenge; as a result, they are better at problem solving and adapting to change..."
ITProPortal, July 12th, 2021
(Get More Information . .) open to premium members only

6 IT Management Traps To Avoid
When the work gets stressful, it's easy to fall prey to quick management fixes that can harden into habits that do more harm than good
"IT leadership is challenging work," opines John Edwards in CIO.

"In addition to devising technology strategies that create maximum business value on a budget, you have to establish and motivate a highly productive team capable of tackling a wide range of technical issues while executing your vision for IT.

At times the overwhelming nature of this work can lead even the best IT leaders to succumb to habits and management philosophies that on the surface appear to address a pressing need at hand but ultimately do your department more harm than good..."

CIO, July 12th, 2021
(Get More Information . .) open to premium members only

The Evolving Role Of The CISO
Curtis Simpson, CISO at Armis, discusses the top qualities that all CISOs need to possess to excel.
Curtis Simpson writes in threatpost, "Digital technologies have infused every aspect of a business, especially with the shutdown of the physical workplace. The increased interdependence between the physical, digital and cybersecurity worlds demand a leadership position that combines both the technical know-how and the ability to recognize security priorities from a business perspective. Paired with the slew of new threats impacting businesses amid a global pandemic, and the increased scope of what needs to be secured, the past year has propelled the evolution of the CISO.

Specifically: While CISOs were once known solely as the security risk managers, CISOs are now expected to be business enablers of an organization..."

threatpost, July 16th, 2021
(Get More Information . .) open to premium members only

How CIOs Should Manage The Rapid Shift To The Cloud
The pandemic caused a rapid acceleration of organizations shifting to the cloud. Now is the time to take a step back to review your move to the cloud to ensure it's strategic and effective.
"The shift to the cloud was already well under way but has been expedited for many companies because of the pandemic. The spike in cloud adoption also caused a spike in worldwide end-user spending on public cloud services, which is expected to grow 18.4% in 2021 to a total of $304.9 billion, up from $257.5 billion in 2020.

The rapid move to the remote work model that the pandemic created caused companies to rethink the use of corporate real estate and on-premise data centers, while also forcing them to rewrite and reconsider business models for this new way of life. As a result, chief information officers were pushed to accelerate their cloud adoption efforts with plummeting IT budgets. What was once a calculated journey turned into a quick shift without strategic intent, which causes the potential for unplanned high cloud consumption costs and bottlenecks in performance..."

InformationWeek, July 12th, 2021
(Get More Information . .) open to premium members only

To My Fellow CEOs: Cyber Security Is Your Business Too!
With each passing year, cyber security challenges have become more complex and more frequent. But along with this, the threat they pose to the business revenue of an organization has become immense
"This is even more true in these times when the world is trying to recover from the pandemic. Cyber attackers are trying to make full use of this opportunity provided to them by the uncertainty of the future that companies face today.

Monetary Losses Due to Cyber Attacks in Numbers

Almost every cyber attack leads to financial losses for a company. Whether it is the money spent to pay ransom in case of a ransomware attack, money spent to recover data lost in a leak, or money lost to direct cyber frauds like BEC attacks, there's always a monetary loss involved in a cyber attack.

Mentioned below are some numbers for the global monetary losses due to cyber attacks:..."

Security Boulevard, July 17th, 2021
(Get More Information . .) open to premium members only

Gartner Forecasts Worldwide IT Spending To Grow 8.6% In 2021
Worldwide IT spending is projected to total $4.2 trillion in 2021, an increase of 8.6% from 2020, according to the latest forecast from Gartner
"As many companies still suffer revenue declines, IT spending is accelerating ahead of revenue expectations worldwide according to Gartner, with boards and CEOs being more willing to invest in technology that has a clear tie to business outcomes, and less so for everything else.

For example, the IT services segment is among the top three highest growth areas for 2021 primarily due to a boost in infrastructure-as-a-service (IaaS) spending that supports mission critical workloads and avoids high on-premises costs.

The IT services segment, meanwhile, is forecast to total $1.2 trillion in 2021, an increase of 9.8% from 2020..."

Information Age, July 14th, 2021
(Get More Information . .) open to premium members only

6 IT Talent Retention Strategies: Chicago CIO Of The Year Winners Share
How are you fighting turnover right now? Award-winning CIOs share tips on how to ensure your best IT talent feels compelled to stay
"As companies consider what's next after the pandemic, experts have warned of a developing turnover tsunami on the horizon. With expanding 'work from anywhere' policies, location may no longer play a role in talent retention. Wise business and IT leaders are taking a proactive approach to ensure their best talent has plenty of reasons to stick around.

We caught up with CIOs who recently won the 2021 Chicago CIO of the Year ORBIE Awards to learn how they are retaining top IT talent today. The awards were presented by the Chicago CIO Leadership Association, a professional community that annually recognizes CIOs for their excellence in technology leadership..."

The Enterprisers Project, July 14th, 2021
(Get More Information . .) open to premium members only

IT News - Storage
Backup Storage Targets Need To Change
By eliminating features now redundant and adding capabilities that complement some of these new backup software capabilities
"Backup software companies like Veeam, Rubrik, and HYCU have been hard at work adding new capabilities, and backup storage targets need to change to keep pace. Features like de-dupe, continuous backup, managed replication, and instant recovery are now built-in to most software applications. The common practice of backup storage vendors charging a premium for similar features no longer makes sense. Backup storage targets need to change by eliminating features that are now redundant and adding capabilities that complement some of these new backup software capabilities...", July 16th, 2021
(Get More Information . .) open to premium members only

67 Million HDDs Expected To Ship In 2Q21 With All Global Figures Up
As nearline rises to apparent unit and capacity record
Here is an abstract of a report, SDAS: HDD Information Service, Preliminary CQ2 '21 Quarterly Update, July 12, 2021, by Trendfocus, Inc.

67 Million HDDs Ship as Nearline Rises to an Apparent Unit and Capacity Record

2Q21 WW HDD shipments..., July 14th, 2021
(Get More Information . .) open to premium members only

IT News - AI
Six Essential Artificial Intelligence Capabilities Leveraged By The Digital Giants
Smart AI doesn't happen in a vacuum. It requires smart people with access to computing power.
"Digital giants dominate the cloud and ecommerce markets, and part of the reason for their dominance is artificial intelligence and advanced analytics. The good news is that mainstream enterprises can learn from their experiences and employ cutting-edge technologies.

That's the word from R. "Ray" Wang who provides a roadmap for AI success in his latest book, Everybody Wants to Rule the World. Wang calls the capability needed to move forward 'AI Smart Services" that help automate precision decisions. "To fine-tune precision decisions at scale-that is, to develop decision velocity, [data-driven enterprises] must automate the process of turning signal intelligence into a decision or action. And the way to do this is by creating AI smart services-automated processes powered by AI' ..."

ZDNet, July 17th, 2021
(Get More Information . .) open to premium members only

The Real Successes Of AI
Despite the hype, especially around self-driving cars, AI is writing code, designing Google chip floor plans, and telling us how much to trust it.
"Given just how much of the AI hype is just that-hype-it's easy to forget that a wide range of companies are having real success with AI. No, I'm not talking about Tesla's continued errant marketing of AI-infused 'full self-driving.' As analyst Benedict Evans writes, ''V'ersion nine of 'Full Self-Driving' is shipping soon (in beta) and yet will not in fact be full self-driving, or anything close to it.' Rather, I'm talking about the kinds of real-world examples listed by Mike Loukides, some of which involve not-so-full self driving.

To make AI work, you're going to need money and good data, among other things, a recent survey suggests. Assuming these are in place, let's look at a few areas where AI is making headway in making our lives better and not merely our marketing..."

InfoWorld, July 16th, 2021
(Get More Information . .) open to premium members only

IT News - Blockchain
Potential Use Cases Of Blockchain Technology For Cybersecurity
A blockchain is a database that stores data in the form of chained blocks. A blockchain can be used in a centralized or decentralized manner
"Decentralized blockchains are not owned by a single entity - rather, all users have collective control. Let's take Bitcoin, for example.

Bitcoin's network consists of thousands of computers, called nodes, which are operated by individuals or groups of people in different geographic locations. Decentralized blockchains are immutable. This essentially means that data transactions are irreversible. Blockchain technology's decentralized nature makes it ideal for cybersecurity.

Blockchain technology automates data storage, provides data integrity and is transparent. Let's explore the potential use cases of blockchain technology for cybersecurity..."

IT Business Edge, July 16th, 2021
(Get More Information . .) open to premium members only

IT News - Humor
Try Placing A Pot Plant Directly Above Your CRT Monitor - It Really Ties The Desk Together
Our hero, Regomised as "Sean", had taken his first steps into the glorious world of IT as a trainee support technician for a housing association at the impossibly young age of 18.
'"One afternoon," he told us, "I got a call from an agitated lady in the same building complaining her monitor screen was all bendy."

Keen to impress his new employers with his diligence, he took himself downstairs to investigate.

"Sure enough, the CRT screen was displaying the desktop, but was bowed in from the sides."

There are some who never experienced the delight of cathode ray tubes, nor the pleasure of fiddling with picture focus or adjustment or even the simple joy of hitting the degauss button. Sean's entry into IT came as CRT monitors were breathing their last (he told us that the hefty devices of this story were replaced by Compaq-branded TFTs shortly after)...'

The Register, July 16th, 2021
(Get More Information . .) open to premium members only

IT News - PM
7 New Rules Of Project Management
COVID-19 has greatly affected the future of work and how teams collaborate to get projects done, resulting in significant changes in the skills and strategies necessary to succeed as a project manager
"The past year wrought massive changes in the way people work. Before the pandemic, according to a recent Pew Research study, around 20% of employed adults worked from home. Today that number is 71%, and 54% of those want to keep doing it. The pandemic has accelerated what is starting to look like a massive shift of knowledge workers from offices to distributed, remote work settings. Every knowledge worker - 1.25 billion worldwide - has been impacted by this..."
CIO, July 14th, 2021
(Get More Information . .) open to premium members only

IT News - Security
Understanding And Stopping 5 Popular Cybersecurity Exploitation Techniques
With more than 550,000 new malware samples being discovered every day, closing the security gaps that enable these cyberthreats to access systems should be a priority for organizations. Unfortunately, many are leaving themselves needlessly exposed to risk
"Exploits are often associated with zero-day attacks that take advantage of vulnerabilities not yet known to the software provider, which means there are no patches yet available. A study by Google revealed there were 24 zero-days vulnerabilities exploited by attackers in 2020.

At the same time, 80% of attacks exploit a vulnerability that was reported at least three years ago..."

HelpNet Security, July 12th, 2021
(Get More Information . .) open to premium members only

Is Remote Desktop Protocol Secure? It Can Be
Matt Dunn, associate managing director in Kroll's Cyber Risk practice, discusses options for securing RDP, which differ significantly in terms of effectiveness
"Most of the problems with setting up Remote Desktop Protocol (RDP) for remote work involves making RDP accessible via the public internet. RDP itself is not a secure setup and therefore requires additional security measures to keep workstations and servers protected. Without proper security protocols in place, organizations face several potential risks, including the increased risk of cyberattacks. The typical targets of these attacks tend to be small businesses because they often lack the resources needed to protect against and respond to these threats..."
threatpost, July 13th, 2021
(Get More Information . .) open to premium members only

New Survey: IT And Security Leaders Want More IT Freedom For Employees, But Also Stricter IT Security
In one of the first major surveys of IT and Security professionals since the Covid19 pandemic, Hysolate together with independent global survey organisation Global Surveyz interviewed 200 IT and Security leaders at top US and UK companies with 500-10,000 employees to learn more about the challenges they are facing. The findings are fascinating.
"The survey found that 87% of respondents want to give their employees more IT Freedom. What does IT Freedom mean in this content? Respondents see it as giving their employees the freedom to do their jobs. The opposite of IT Freedom appears to be locked down devices, and this is where we see an interesting paradox. 79% of respondents believe that IT and Security need to add more IT restrictions to reduce risky employee behavior, and here we have a paradox. How can users get their jobs done, if security restrictions are getting in the way?..."
Security Boulevard, July 15th, 2021
(Get More Information . .) open to premium members only

API Security: An Emerging CISO Pain Point
With the increase in API usage, API attacks are also becoming more and more prolific. Many CISOs realize their API security needs a reality check
"The API economy is no stranger to many of us. Without two applications or databases communicating and sharing data through APIs, the digital experiences we have grown accustomed to, such as getting a text message when your Uber has arrived, are not possible. Building a business that relies on APIs has brought success to many companies...

Because APIs are becoming increasingly valuable to businesses, the usage of APIs has reached an all-time high. In the 2020 State of API Survey by Postman, 84.5% of participants stated that APIs are playing a significant role in digital transformation initiatives. What's even more interesting is that a third (30.6%) of the survey respondents said that APIs played a role in their ability to respond to COVID-19..."

CISO MAG, July 12th, 2021
(Get More Information . .) open to premium members only

How Identity Management And Compliance With Security Standards Can Help Prevent Sensitive Data Leakage
Cyber criminals can gain access to sensitive data through unauthorized access. Learn how to use security standards to set up preventative measures.
The end of the traditional perimeter

The traditional data center has gone through many fundamental changes over the years. There once was the concept of a self-contained data center and internal network that was protected at the external-facing boundaries by network and web application firewalls. In this scenario, within the physical building, corporate-owned endpoints were trusted so they could easily access data via the internal network.

With corporate data and applications moving to the cloud, the bring-your-own-devices (BYOD) paradigm, and growing adoption of remote work, the traditional security perimeter has disappeared. Organizations must now face the challenge of defining new security policies to mitigate the risks associated with a perimeter-less network: sensitive data leakage, and data privacy and regulatory compliance breaches.

Security Boulevard, July 15th, 2021
(Get More Information . .) open to premium members only

IT News - Linux
Microsoft Just Blew Up The Only Reason You Can't Use A Linux Desktop
For almost 30 years, the number one reason Windows users have given for not running Linux is they couldn't run their programs on it. Now that Windows 365 Cloud PC is almost here that excuse has just been blown to bits
"Microsoft has just announced the release of Windows 365 and Cloud PC. This new service, built on top of Azure Virtual Desktop, enables you to bring their Windows 10 and eventually Windows 11, desktop, apps, tools, data, and settings to your personal and work devices, including Windows PCs (naturally!) but Macs, iPads, Linux, and Android devices as well.

Let me repeat that: Windows 365 will enable you to run your Windows desktop, apps, data, etc., etc. on Linux. That's the Linux desktop they're talking about..."

ZDNet, July 15th, 2021
(Get More Information . .) open to premium members only

New Hardened VMs from CIS: Ubuntu, Amazon Linux 2, MS Server 2019 STIG
CIS offers virtual images hardened in accordance with the CIS Benchmarks, a set of vendor agnostic, internationally recognized secure configuration guidelines. CIS Hardened Images provide users a secure, on-demand, and scalable computing environment
"They are available from major cloud computing platforms like AWS, Azure, Google Cloud Platform, and Oracle Cloud...

A virtual image is a snapshot of a virtual machine (VM) used to create a running instance in a virtual environment, thus providing the same functionality as a physical computer. Virtual images reside on the cloud and let you cost-effectively perform routine computing operations without investing in local hardware and software. Hardening is a process of limiting potential weaknesses that make systems vulnerable to cyber attacks. More secure than a standard image, hardened virtual images reduce system vulnerabilities to help protect against denial of service, unauthorized data access, and other cyber threats..."

Center for Internet Security, July 14th, 2021
(Get More Information . .) open to premium members only

IT News - FOSS
17 Free Cybersecurity Tools You Should Know About
Cybersecurity products can get pricy but there are many excellent open source tools to help secure your systems and data. Here's a list of some of the most popular with cyber pros
"Cybersecurity tools aren't just for the enterprise anymore; they're essential for every type and size of organization.

Effective products, coupled with in-depth cybersecurity planning, are a must for all, since bad actors are no longer just going after the big fish. Whether businesses have an in-house security team or outsource these services, every entity needs cybersecurity pros to discover and fix any points of weakness in computer systems. This reality can tax the bottom line, but luckily there are an array of free cybersecurity tools available.

Here is a rundown of some of the free tools cybersecurity professionals use every day to identify vulnerabilities...", July 13th, 2021
(Get More Information . .) open to premium members only

IT News - Cloud
10 Edge Computing Products You Should Know About
Here's 10 edge computing devices - from AWS and Eaton to Dell Technologies and Cisco - who are making waves in the growing edge market.
"The worldwide edge computing market is exploding, expected to grow over 12 percent annually to $250 billion by 2024, according to IT research firm IDC.

The goal of edge computing is to reduce latency and network congestion, while boosting data security by putting storage, networking, software, security and servers where the data resides to be collected and processed locally. By deploying tailormade edge devices where the data is generated, edge computing environments can manage devices over a smaller and more efficient local network where bandwidth is used by local data-generating devices, thus making latency and congestion no longer an issue for businesses..."

CRN, July 13th, 2021
(Get More Information . .) open to premium members only

Briefing: Cloud Storage Performance Metrics
We look at some of the key storage performance metrics that determine what your applications will get from cloud storage, plus cloud essentials that are beyond simple measurement
"About 50% of business data is now stored in the cloud - and the volume stored using cloud technologies is higher still when private and hybrid clouds are factored in.

Cloud storage is flexible and potentially cost-effective. Organisations can pick from the hyperscalers - Amazon Web Services, Google's GCP and Microsoft Azure - as well as local or more specialist cloud providers..

But how do we measure the performance of cloud storage services? When storage is on-prem, there are numerous well-established metrics to allow us to keep track of storage performance. In the cloud, things can be less clear..."

ComputerWeekly, July 16th, 2021
(Get More Information . .) open to premium members only

As Cloud Costs Climb, Is Repatriation The Answer?
Cloud is becoming the norm, but enterprises shouldn't assume that it's the best solution for long term, even if they've already made the shift
"Dropbox saved nearly $75 million by repatriating workloads from the public cloud and building its own tech infrastructure, the company detailed in its S-1. That such a large company would move largely off public cloud, where startups often begin and established companies shed legacy systems to get to, seemed an anomaly.

But as cloud computing continues to mature, the costs of running such infrastructure is catching up creating a "trillion dollar paradox," according to a recent report from venture capital firm Andreessen Horowitz (a16z), coauthored by Sarah Wang, a partner at a16z, and Martin Casado, general partner at a16z..."

CIODIVE, July 12th, 2021
(Get More Information . .) open to premium members only

Multi-Cloud Is Creating New Security Challenges For Businesses
Businesses are struggling to migrate legacy apps to the cloud safely.
"Businesses are increasingly turning towards multi-cloud to distribute risk, take advantage of differences in vendor pricing and support applications that require specific providers. However, as the number of providers grows, so do cybersecurity risks and challenges.

These are the conclusions of a new paper, recently published by cybersecurity company Tripwire. Polling 314 security professionals for the report, Tripwire found that while most (59 percent) of them have configuration standards and best-practice security frameworks (78 percent), less than two in five apply them with consistency..."

ITProPortal, July 12th, 2021
(Get More Information . .) open to premium members only

Edge-To-Cloud Architecture Turns Key For Digital Initiatives
Enterprises pursuing digital transformation initiatives may need to reexamine their infrastructure architecture to bring compute and storage closer to data generated at the edge
"The future is edge to cloud" resonated like a politician's oft-repeated campaign slogan throughout the keynotes and customer presentations at the recent HPE Discover 2021 conference.

Antonio Neri, HPE president and CEO, said an edge-to-cloud architecture would be a "strategic imperative" for every enterprise that is exiting the "data-rich but insight-poor" information era and moving into the "age of insight" to extract greater business value from its ever-growing volumes of data...."

SearchCIO, July 15th, 2021
(Get More Information . .) open to premium members only

IT News - Careers
You Have A Remote Workforce - What Now?
Jay Turner, vice-president, development and operations at Console Connect by PCCW Global, discusses how businesses can effectively managed a remote workforce
"The pandemic caused an abrupt shift to the way we work, and is expected to have implications for years to come. The biggest impact was on businesses that had to pivot to managing a remote workforce. Understandably, at first, many companies and their employees were concerned about moving fully online. Today, the majority of workers believe they are as effective when working remotely and, in many instances, want to ditch the office all together..."
Information Age, July 16th, 2021
(Get More Information . .) open to premium members only

2 Weeks Vacation Time? Are You Kidding?
Many companies want a new hire to start earning vacation time all over again - but that doesn't make it a done deal
Question: "Your advice about negotiating salary (explain your value) worked great! But a careful reading of the offer and benefits (thanks again) revealed I'd get only two weeks' vacation time! I'd be walking away from five weeks at my old job. Do I really have to give up my hard-earned vacation?"

Nick's Reply

"This is the perfect time to negotiate assertively for what you want because employers are dying for good talent. If you're really good at your work, you have excellent negotiating leverage in the current economy and labor market. I'm glad to hear you got a good salary offer. Now let's work on that vacation time!

Many companies want a new hire to start earning vacation time all over again - but that doesn't make it a done deal. If you want the vacation time you deserve, you must negotiate to get it..."

Ask The Headhunter, July 12th, 2021
(Get More Information . .) open to premium members only

IT News - Developer
How Software Developers Can Create Mobile Apps Securely And Quickly
The mobile app market is booming, but to achieve success, organisations must develop mobile apps securely and rapidly
"Mobile apps offer big opportunities for businesses in the digital age. According to research from Statista, international revenues from mobile apps will reach a staggering $935bn by 2023, up from $365bn in 2018.

However, the process of creating mobile apps is considerably different from the process of enterprise software development. For starters, mobile apps are usually cloud-native, designed for a range of different operating systems and devices, and dependent on Android and iOS back-end microservices..."

ComputerWeekly, July 12th, 2021
(Get More Information . .) open to premium members only

Sections in this issue:
click to jump to section