Blog

IT News: PeopleTek, PM, CRM, Social Media, Networks, FOSS, Wireless, Developer… (Sept. 7th)

Volume 270 Issue 1

Selections from the weekly newsletter, “IT News and Events.

PeopleTek News


Thinking Strategically

As leaders we make decisions every day that are critical to the success of our work culture. Why not have a course of action that aligns with your overall workplace strategy?
[PeopleTek News, September 3rd, 2020]


PM


Agile Project Management

Agile Project Management (APM) is an iterative approach to planning and guiding project processes, that breaks it down into smaller cycles called sprints, or iterations
[SearchCIO, August 31st, 2020]

Today’s New IT Project Manager

Among the IT functions changed forever by the COVID-19 pandemic is project management. The days of “walk around” project management seem to be gone. Some thoughts on what the future looks like
[InformationWeek, September 2nd, 2020]


Social Media


4 Social Media Marketing Statistics You Need To Know

It’s hard to deny the popularity of social media platforms like Facebook, Instagram, and Twitter. In fact, there’s a good chance you have one or more of these accounts for your business and in your personal life
[Business 2 Community, September 4th, 2020]

CRM


CRM Is Failing: It’s Time To Transition To CxM

CRM and CEM/CXM are essential tools for maintaining business flow with customers. Although similar, they have distinct differences. To choose the right one, organizations need to go beyond the alphabet soup of these hi-tech business applications.
[CRMBuyer, September 1st, 2020]


Developer


Common Developer Frustrations And How To Overcome Them

There’s a right way and a wrong way to write great software. Here is the latter
[ITProPortal, September 4th, 2020]


Networks


5 COVID-Created Network Trends That Are Here To Stay

COVID-19 has reshaped the way enterprises deploy, manage, and use network services. Here are the changes that are likely to stick around long after the pandemic has ended
[Network Computing, August 31st, 2020]


Tape


Tape Data Storage Industry Tackles Challenges, Archival Uses

The tape data storage market has confronted a major legal issue and a pandemic. Buoyed by strong archival use and offline protection, capacity shipments rose last year
[SearchDataBackup, September 3rd, 2020]


FOSS


LibreOffice 7.0.1 Available For Download

LibreOffice 7.0.1, the first minor release of the LibreOffice 7.0 family, targeted at technology enthusiasts and power users, is now available for download
[The Document Foundation, September 3rd, 2020]


Wireless


Macrocell vs. Small Cell vs. Femtocell: A 5G Introduction

Small cells will provide new, fast connectivity speeds for 5G networks and capable devices, but 5G won’t stop there. Macrocells and femtocells are also key to connect 5G networks
[SearchNetworking, August 31st, 2020]


IoT


How IoT Is Helping Cities Become More Sustainable Than Ever Before

Professor Kevin Curran, senior IEEE member and professor of cybersecurity at Ulster University, discusses IoT’s role in helping cities become more sustainable
[InformationAge, August 31st, 2020]


Backup


Top 100 Cloud Backup Companies For September 2020

The top 100 online backup companies are grouped into 4 categories, namely: Consumer, Small Medium Business, Enterprise and Enablers
[StorageNewsletter, September 2nd, 2020]


BI


10 Business Intelligence Trends For Data Visualization And Data Insights

Currently, businesses have access to more data than they can count! The question remains what to do with such colossal levels of data and how to derive intelligent insights from it?
[Analytics Insight, September 4th, 2020]


MFA


What Is 2FA? Two-Factor Authentication Explained

Today, unfortunately, a strong password alone isn’t enough to protect your accounts
[ITProPortal, September 4th, 2020]

https://it.it-news-and-events.info/

IT News: Humor, AI, Tech, Big Data, Email, Operations… (Sept. 7th)

Selections from the weekly newsletter, “IT News and Events.

Humor

Elementary

Logic only takes you so far, my dear Watson.
[ComputerWorld, September 1st, 2020]

Flashback Friday: Eh, I Guess It Could Happen To Anybody

But it’s a good lesson in humility
[ComputerWorld, September 4th, 2020]

Memory-Lane Monday: While We’re Chatting, I Should Mention About The Big Red Switch …

It’s a whole new world in this place
[ComputerWorld, August 31st, 2020]

Wayback Wednesday: For My Next Trick …

I think I fulfilled all the requirements perfectly.
[ComputerWorld, September 2nd, 2020]


AI


7 Machine Learning Challenges Businesses Face While Implementing

Studies show that your business can experience 40% productivity improvement by using Artificial Intelligence and Machine Learning. It can help you to reorganize your data in such a way that you get value out of every data point that you record.
[AWS News, October 31st, 2020]

Google Debuts New AI Features And Tools To Advance MLOps

Google LLC announced today a raft of artificial intelligence-related updates as part of Google Cloud Next: OnAir, a nine-week series of livestream events that runs through Sept. 15.
[siliconANGLE, September 1st, 2020]

Feds Investing $1B To Fund 12 New AI Institutes

The federal government is increasing its investment in AI research, with the announcement on August 26 of over $1 billion of awards to establish 12 new AI and quantum information science (QIS) research institutes nationwide
[aitrends, September 3rd, 2020]

The Fourth Generation Of AI Is Here, And It’s Called ‘Artificial Intuition’

Artificial Intelligence (AI) is one of the most powerful technologies ever developed, but it’s not nearly as new as you might think. In fact, it’s undergone several evolutions since its inception in the 1950s.
[TheNetWeb, September 3rd, 2020]


Technology


World’s First Photonic Quantum Computer Is Now Publicly Available On The Cloud

Xanadu is making photonic quantum computing more accessible to developers and businesses
[techradar.pro, August 31st, 2020]

What Moore’s Law Means Today

Remember when we all got excited about more megahertz? That’s not the future of microprocessing: But Moore’s Law is alive and well – in its own way
[The Enterprisers Project, August 31st, 2020]

Microsoft Builds Deepfakes Detection Tool To Combat Election Disinformation

Microsoft has developed a deepfakes detection tool to help news publishers and political campaigns, as well as technology to help content creators ‘mark’ their images and videos in a way that will show if the content has been manipulated post-creation
[HelpNet Security, September 2nd, 2020]


Big Data


10 Big Data Statistics That Will Blow Your Mind

They call it ‘big data’ for a reason-it’s really, really big. But getting your head wrapped around the growth of information digitization is not easy.
[datanami, September 4th, 2020]

Top 3 Data Analytics Challenges And How To Resolve Them

Jerry DiMaso, CEO and co-founder of Knarr Analytics, discusses how effective analytics has become such a determinative factor that it’s now evident that those who master it will thrive. However, the journey toward that goal isn’t without obstacles. What are the most common data analytics challenges and how can companies confidently confront them?
[insideBIGDATA, September 1st, 2020]

Best 10 ETL Tools & Software

These ETL tools feature advanced data integration capabilities that can help enterprises prepare data for analytics.
[Datamation, September 1st, 2020]


Email


Protonmail vs Gmail: What’s The Best Email Provider For Your Business?

How important is the security of your email provider?
[techradar.pro, September 4th, 2020]

Gmail vs Exchange: What’s The Best Email Provider For Your Business?

Is Microsoft or Google the better email provider?
[techradar.pro, September 4th, 2020]


Operations


Make Data Centers Appeal To The Next Generation

To attract top graduates, the data centre industry needs to be louder and bolder in its approach
[ITProPortal, September 4th, 2020]

How To Efficiently Manage PC Refresh And Data Migration For A Remote Workforce

Increasing employee productivity for remote workers doesn’t have to be difficult
[ITProPortal, August 31st, 2020]

IT News: Storage, Cloud (Sept. 7th)

Selections from the weekly newsletter, “IT News and Events.

Storage


High-Performance Interconnects And Storage Performance

Should you use InfiniBand or RDMA over Converged Ethernet as an interconnect? We discuss each technology’s effect on performance features such as latency, IOPS and throughput
[SearchStorage, September 1st, 2020]

Broadcom Unveils Industry’s First Gen 7 64Gb/S Fibre Channel Switching Platforms

New End-to-End 64Gb/s Storage Solutions Boast Industry-Leading Switches, Adapters, and Transceivers
[Broadcom News, September 1st, 2020]

Troubleshoot SAN Issues To Improve Performance

Common SAN problems include compatibility issues, hardware failures and sluggish storage response times, but a few proven strategies can easily resolve these issues
[SearchStorage, September 3rd, 2020]

Cloud


The Age Of Multi-Cloud: Are You Ready To Take On The Challenge?

Cloud is becoming an influential part of business strategies.
[ITProPortal, September 2nd, 2020]

Top Cloud Computing Providers

Here is a listing of the largest and most currently successful cloud services companies in the world
[eWeek, August 31st, 2020]

Five Critical Cloud Security Challenges And How To Overcome Them

Today’s organizations desire the accessibility and flexibility of the cloud, yet these benefits ultimately mean little if you’re not operating securely. One misconfigured server and your company may be looking at financial or reputational damage that takes years to overcome.
[HelpNet Security, August 31st, 2020]

Events for IT Executives (270.1)

Selections from the weekly newsletter, “IT News and Events.

CxO Events

Reduce the Costs And Risks Associated With IT Modernization Projects (Sept. 24th)

Join CIO on Thursday, September 24, at 2:00 pm ET to learn how top CIOs are drastically reducing the costs and risks associated with IT modernization projects.

The Future of Data Layer Strategies: Trends & Innovations (Sept. 29th)

BWG Connect invites senior IT managers to participate in a candid, interactive, peer-to-peer, industry discussion. Hear from your peers on the importance of Digital Transformation, strategies being implemented and challenges being faced!

How China’s Cyber Threat Groups Support Beijing’s Geopolitical Objectives (Sept. 30th)

It’s no secret that Beijing has ambitious plans to reposition itself as the world’s superpower – one of the keys to its success has been its ability to deploy its cyber units to conduct state-endorsed operations.

Understanding and Reducing the Cost of Cloud Storage (Sept. 30th)

BWG Connect invites senior IT managers to participate in a candid, interactive, peer-to-peer, industry discussion. Hear from your peers on the importance of Digital Transformation, strategies being implemented and challenges being faced!

IT News: Security (Sept. 7th)

Selections from the weekly newsletter, “IT News and Events.

Security


Majority Of IT Leaders Feel Network Security Is Not Up To Scratch

IT security pros demand greater network visibility, despite budgets tightening
[ITProPortal, September 2nd, 2020]

The Hidden Costs Of Losing Security Talent

One person’s exit can set off a chain of costly events.
[Dark Reading, September 2nd, 2020]

Why Data Is The Missing Link In Your Cybersecurity Strategy

Everyone’s aware of how challenging maintaining a strong cybersecurity posture is these days.
[HelpNet Security, September 4th, 2020]

IT News: CxO (Sept. 7th)

Volume 279 Issue 1

Selections from the weekly newsletter, “IT News and Events.

https://it.it-news-and-events.info/

CxO

Creating An IT Culture Of Inclusiveness And Belonging

For too long, and out of necessity, Black IT professionals have been silent about their experience. Creating a safe space to engage, listen and learn from others is a necessary first step towards creating a workplace culture that fully supports and values people of color
[CIO, September 4th, 2020]

5 Must-Read Harvard Business Review Articles In September

Check out these five thought-provoking HBR articles, curated especially for CIOs and IT leaders
[The Enterprisers Project, September 1st, 2020]

CISO As A Service (vCISO, Virtual CISO, Fractional CISO)

A CISO as a service (CISOaaS) is the outsourcing of CISO (chief information security officer) and information security leadership responsibilities to a third-party provider. By hiring a third-party provider to manage its security program remotely, an organization gains access to staff and resources that it doesn’t have in-house, and can better keep up with information security and compliance demands.
[SearchSecurity, September 3rd, 2020]

Solving The CISO Cloud Paradox: How To Put The Genie Back Without Losing The Magic

Managing privileged access across all cloud environments
[ITProPortal, September 2nd, 2020]

Leading Through Uncertainty: 7 Characteristics Of Highly Successful Digital Leaders

Apoorva Chhabra, associate principal analyst at Gartner, examines the 7 characteristics of highly successful digital leaders
[InformationAge, September 3rd, 2020]

Why Digital Transformation Remains Your Best Chance To Survive The COVID-19 Onslaught

As businesses face a never foreseen or imagined, straight out of a dystopian pandemic fiction situation, where sustenance is all that matters – digital transformation is providing them the means to weather the storm
[Business 2 Community, August 31st, 2020]

From Defense To Offense: Giving CISOs Their Due

In today’s unparalleled era of disruption, forward-thinking CISOs can become key to company transformation — but this means resetting relationships with the board and C-suite
[Dark Reading, August 31st, 2020]

https://it.it-news-and-events.info/

Events for IT Executives (270.1)

Vol 270 Issue 1 Posted Sept. 7th

Selections from the weekly newsletter, “IT News and Events.


CxO Events


Infrastructure Agility and Modernization for the Enterprise in Transition (Sept. 10th)

Join us Thursday, September 10, 2020 at 1pm ET to learn how top CIOs are creating a flexible infrastructure to keep their organizations nimble and agile.
Hosted by CIO and Citrix

[Thursday, September 10th, 2020: 1:00 PM to 2:00 PM]

Accelerating Your Digital Experience – Leveraging Authentication and Security Management (Sept. 10th)

BWG Connect invites senior IT managers to participate in a candid, interactive, peer-to-peer, industry discussion. Hear from your peers on the importance of Digital Transformation, strategies being implemented and challenges being faced!
[Thursday, September 10th, 2020: 1:30 PM to 2:30 PM]

Networking op to discuss new approaches to search, resource visibility, and security (Sept. 14th)

Join us Monday, September 14, at 11:00 am ET to hear top CIOs discuss innovation and new approaches to search, resource visibility, and security.
[Monday, September 14th, 2020: 11:00 AM to 12:00 PM]

Securing Hybrid Enterprise Infrastructures Across a Distributed Workplace (Sept. 15th)

Join us Tuesday, September 15 at 2:00pm ET to learn how top CSOs are securing hybrid enterprise infrastructures across distributed workplaces.
[Tuesday, September 15th, 2020: 2:00 PM to 3:00 PM]

How China’s Cyber Threat Groups Support Beijing’s Geopolitical Objectives (Sept. 30th)

It’s no secret that Beijing has ambitious plans to reposition itself as the world’s superpower – one of the keys to its success has been its ability to deploy its cyber units to conduct state-endorsed operations.
[Wednesday, September 30th, 2020 BST]

https://it.it-news-and-events.info/

IT News: Security (Sept. 7th)

Volume 270 Issue 1

Selections from the weekly newsletter, “IT News and Events.

Security


Majority Of IT Leaders Feel Network Security Is Not Up To Scratch

IT security pros demand greater network visibility, despite budgets tightening
[ITProPortal, September 2nd, 2020]

The Hidden Costs Of Losing Security Talent

One person’s exit can set off a chain of costly events.
[Dark Reading, September 2nd, 2020]

Why Data Is The Missing Link In Your Cybersecurity Strategy

Everyone’s aware of how challenging maintaining a strong cybersecurity posture is these days.
[HelpNet Security, September 4th, 2020]

Accelerating Your Digital Experience - Leveraging Authentication and Security Management

IT News: CxO (Sept. 7th)

Volume 279 Issue 1

Selections from the weekly newsletter, “IT News and Events.

CxO


Creating An IT Culture Of Inclusiveness And Belonging

For too long, and out of necessity, Black IT professionals have been silent about their experience. Creating a safe space to engage, listen and learn from others is a necessary first step towards creating a workplace culture that fully supports and values people of color
[CIO, September 4th, 2020]

5 Must-Read Harvard Business Review Articles In September

Check out these five thought-provoking HBR articles, curated especially for CIOs and IT leaders
[The Enterprisers Project, September 1st, 2020]

CISO As A Service (vCISO, Virtual CISO, Fractional CISO)

A CISO as a service (CISOaaS) is the outsourcing of CISO (chief information security officer) and information security leadership responsibilities to a third-party provider. By hiring a third-party provider to manage its security program remotely, an organization gains access to staff and resources that it doesn’t have in-house, and can better keep up with information security and compliance demands.
[SearchSecurity, September 3rd, 2020]

Solving The CISO Cloud Paradox: How To Put The Genie Back Without Losing The Magic

Managing privileged access across all cloud environments
[ITProPortal, September 2nd, 2020]

Leading Through Uncertainty: 7 Characteristics Of Highly Successful Digital Leaders

Apoorva Chhabra, associate principal analyst at Gartner, examines the 7 characteristics of highly successful digital leaders
[InformationAge, September 3rd, 2020]

Why Digital Transformation Remains Your Best Chance To Survive The COVID-19 Onslaught

As businesses face a never foreseen or imagined, straight out of a dystopian pandemic fiction situation, where sustenance is all that matters – digital transformation is providing them the means to weather the storm
[Business 2 Community, August 31st, 2020]

From Defense To Offense: Giving CISOs Their Due

In today’s unparalleled era of disruption, forward-thinking CISOs can become key to company transformation — but this means resetting relationships with the board and C-suite
[Dark Reading, August 31st, 2020]

IT News: Security (Aug. 31st)

Volume 269 Issue 4 Posted Aug. 31st

Selections from the weekly newsletter, “IT News and Events.

Security

Deep Fake: Setting The Stage For Next-Gen Social Engineering

Humans are susceptible to normalcy bias, which may leave us vulnerable to disinformation that reinforces our beliefs
[Dark Reading, August 26th, 2020]

The 7 Elements Of An Enterprise Cybersecurity Culture

An effective ‘human firewall’ can prevent or mitigate many of the threats enterprises face today. Adopt these seven elements of a culture of cybersecurity to defend against risks
[SearchSecurity, August 24th, 2020]

New Attack Vectors Make Securing Virtual Companies Even More Challenging

As organizations are settling into long-term remote working, new attack vectors for opportunistic cyberattackers-and new challenges for network administrators have been introduced, Nuspire reveals
[HelpNet Security, August 25th, 2020]

Best Practices To Maintain VPN Security

Enterprises looking to maintain VPN security should focus on proper endpoint security and authentication, VPN server security and documentation for security policies
[SearchNetworking, August 27th, 2020]

Average Cost Of A Data Breach In 2020: $3.86M

When companies defend themselves against cyberattacks, time is money
[Dark Reading, August 24th, 2020]

Four Ways IT Can Better Support And Secure Remote Workers

The impact of remote work has just begun. Is your IT team ready?
[ITProPortal, August 24th, 2020]

A 2020 Approach To Security: People Matter

The information security industry frequently utilizes the phrase ‘people, processes and technology’ (PPT) to describe a holistic model of securing the business.
[HelpNet Security, August 24th, 2020]

A 10-Point Plan For Addressing WFM Cybersecurity Challenges

Back in early Spring, ensuring users could access the necessary applications securely from home was priority No. 1. Now, 3-4 months later, work from home looks like it’s here to stay . for a while, at least. Here’s your to-do list for the next 6 months and beyond
[CIO, August 24th, 2020]

https://it-news-and-events.info

IT News: CxO (Aug. 31st)

Selections from the weekly newsletter, “IT News and Events.

CxO

CIO Role: 8 Ways The Pandemic Has Changed IT Forever

The CIO’s place as a cross-functional business leader has crystallized during the COVID-19 pandemic. Here are some other ways the role is evolving, according to CIOs
[The Enterprisers Project, August 26th, 2020]

5 Conversations CIOs Must Have To Advance Digital Business

CEOs are turning to CIOs to lead digital business efforts, but success depends on your ability to inspire, empower, and engage other business leaders. These are the conversations you need to be having
[CIO, August 26th, 2020]

A New IT Landscape Empowers The CIO To Mix And Match

IT has always had an outsized influence on which technologies are adopted by organizations large and small. Now cloud giants are rolling up customers into big suites that are easy to manage just as the obstacles that prevented best-of-breed drop away
[ZDNet, August 27th, 2020]

How CISOs Can Play A New Role In Defining The Future Of Work

Rather than just reacting to security issues in the COVID-19 era, CISOs are now in a position to be change agents alongside their C-suite peers
[Dark Reading, August 27th, 2020]

5 Critical IT Roles For Rapid Digital Transformation

As some organizations look to transform faster than anticipated, putting critical tech roles in place will be the key to a smooth, successful journey
[InformationWeek, August 28th, 2020]

It’s Never The Data Breach – It’s Always The Cover-Up

The felony charges levied against former Uber CSO paints him as actively masterminding and executing a plan to cover up a major data breach. This serves as a reminder that CSOs and CISOs must consider how decisions made in the moment can be interpreted, construed, or proven to be criminal after the fact
[ZDNet, August 28th, 2020]

CIO Interview: Steve Otto, Chief Technology Officer, The R&A

When the coronavirus pandemic caused The Open to be cancelled, The R&A’s tech team took the UK’s flagship golf tournament online
[ComputerWeekly, August 26th, 2020]

How To Ensure CIO And CMO Alignment When Making Technology Investment Decisions

Pieter Brinkman, senior director technical marketing at Sitecore, explores how to ensure CIO and CMO alignment when making technology investment decisions
[InformationAge, August 24th, 2020]

Redefining What CISO Success Looks Like

Key to this new definition is the principle that security programs are designed to minimize business risk, not to achieve 100% no-risk
[Dark Reading, August 28th, 2020]

A Frictionless Customer Experience:
Modern Customer Identity and Access Management

IT News for Busy Executives (Aug 28th)

Most Popular Articles Vol 269 Issue 3

Each week I track what are the most clicked on articles from the weekly newsletter, “IT News and Events..” Those most popular articles are the basis of the private edition newsletter we produce as part of out “IT Newsletter As A Service.”

Here they are.

Most Popular Articles in Vol 269 Issue 3, Grouped into Sections


CxO


Digital Transformation: 5 Reasons Why It Still Fails

While COVID-19 is accelerating a great deal of change, these five stumbling blocks can still get in the way of your digital transformation. Here’s how to beat them

The CIO’s Cost-Optimization Playbook: 7 Tips For Tight Times

IT leaders lend advice on optimizing IT for value when budgets get lean – without impairing growth projects

Cybersecurity New Normal Needs Change In Process, Cisos Say

As CISOs face an increasingly remote workforce, they need to confront past security mistakes, while adjusting to cybersecurity’s new normal

What’s On The Minds Of Technology Execs As They Wrestle With Tight Budgets

Two separate surveys find tight budgets, but optimism that digital transformation’s surge will continue. Artificial intelligence and IoT initiatives have been sidelined for now…

Kubernetes: 5 Realities It Pros Wish The CIO Knew

What do IT professionals working hands-on with Kubernetes need their bosses to know? IT leaders should keep these five realities of containers and orchestration in mind

Understanding The Gist Of NIST

Here are three principles for security leaders to consider when assessing their security command centers

How COVID Accelerated Digital Transformation At Aflac

Rich Gilbert, chief digital information officer, on how COVID-19 is allowing IT at the insurer to move full steam ahead on its innovation roadmap

Leading An Organisation Through Disruptive Crises As A CTO – Gartner

Marty Resnick, senior research analyst at Gartner, explores how chief technology officers, or CTOs, can lead their organisations through disruption

What Working From Home Means For CISOs

Bharat Mistry, principal security strategist at Trend Micro, discusses what working from home means for CISOs


CxO Events


How Outsourcing Identity is Driving Productivity & Enhancing Customer Service (Aug. 31st)

BWG Connect invites senior IT managers to participate in a candid, peer-to-peer, interactive industry discussion. Hear from your peers on the importance of IAM, what does it mean to an end user, what are the challenges companies are currently encountering and solutions being implemented.

Accelerating Your Digital Experience – Leveraging Authentication and Security Management (Sept. 10th)

BWG Connect invites senior IT managers to participate in a candid, interactive, peer-to-peer, industry discussion. Hear from your peers on the importance of Digital Transformation, strategies being implemented and challenges being faced!

Accelerating the New Intelligent Data Center (Sept. 1st)

BWG Connect invites senior IT managers to participate in a candid, peer-to-peer, interactive industry discussion. Hear from your peers about concrete lessons learned & real-world challenges faced during these unprecedented times.

A Frictionless Customer Experience: Modern Customer Identity and Access Management (Sept. 2nd)

BWG Connect invites senior IT managers to participate in a candid, peer-to-peer, interactive industry discussion. Hear from your peers about concrete lessons learned & real-world challenges faced during these unprecedented times.


Security


Black Hat USA 2020 Recap: Experts Discuss Election Security Questions, But Offer Few Answers

The U.S. election in November is once again expected to be a target of digital adversaries. Experts at Black Hat USA 2020 highlighted the many election security questions authorities must address

Why Password Policies Are A Waste Of Time And Money For Companies

Password policies aren’t adequate for corporate cybersecurity

7 Things To Look For In A Security Awareness Training Provider

Not all cybersecurity awareness training vendors are the same or are right for your organization. Here’s how to find the best match

16 Top Endpoint Protection Platforms

Looking for a better endpoint protection platform to protect remote staff working on Windows PCs, Macs, smartphones or even Linux? One of these might be the answer.

10 RDP Security Best Practices To Prevent Cyberattacks

Securing remote connections is critical, especially in a pandemic. Enact these RDP security best practices at your organization to prevent ransomware, brute-force attacks and more

Enterprise Cybersecurity Hygiene Checklist For 2020

Cybersecurity hygiene in the enterprise must be a shared responsibility between employees and employers. Follow these steps to get the job done by both

Black Hat USA 2020 Musings: Weird And Wonderful Virtual Events Are Here To Stay

Black Hat USA 2020 was nothing like an in-person event, but it was incredibly useful for all involved, providing even the most grizzled industry veterans with fresh perspectives

Telehealth Is The Future Of Healthcare, But How Secure Is It?

54 percent of Americans have opted for virtual visits during pandemic, a CynergisTek survey reveals

62% Of Blue Teams Have Difficulty Stopping Red Teams During Adversary Simulation Exercises

New Exabeam research shows that 62 percent of blue teams have difficulty stopping red teams during adversary simulation exercises

MFA Mistakes: 6 Ways To Screw Up Multifactor Authentication

Fearful of messing up its implementation, many enterprises are still holding out on MFA. Here’s what they need to know

Five Ways To Maximize FIDO

Perform a quick Google search for ’causes of data breaches’, and you will be inundated with reports of stolen credentials and weak passwords

Working From Home Is Still Leading To Major Cybersecurity Issues

Since the shift to remote working, businesses have been exposed to greater cyber risk

What Are The Three Pillars Of Cybersecurity?

Cybersecurity is a business issue, not an IT issue. Organizations must foster a cybersecurity culture championed by management and supported by technology, governance, and staff awareness

How Organizations And Individuals Can Defend Against Would-Be Identity Thieves

Shielding against identity theft in a post-pandemic world


Technology


Gartner Gets Hyped For Emerging Tech

It’s the dog days of August, which means it’s time for Gartner to issue its annual Hype Cycle for Emerging Technologies

World’s Largest Chip Gets Beefier: 850 Thousand Cores For AI

Industry’s biggest processor now packs 850,000 cores, 2.6 trillion transistors

IBM Brings An Architecture Gun To A Chip Knife Fight

For the past several years here at The Next Platform, as we have been pondering what IBM might do with the future Power10 processor, we have been feinting here and there with our analytical pen, trying to suss out precisely what Big Blue might be up to, particularly with the unique memory architecture that it has been working on for more than a decade

Photonics Processor Aimed At AI Inference

Silicon photonics is exhibiting greater innovation as requirements grow to enable faster, lower-power chip interconnects for traditionally power-hungry applications like AI inferencing

How Intel Will Keep Moore’s Law Cranking For Years To Come

Maybe your 2025 laptop won’t suck

The Ticking And Tocking Of Intel’s ‘Ice Lake’ Xeon SP

It has been a long time since Intel changed its manufacturing process – what it used to call a ‘tick’ – and the microarchitecture and architecture of a processor design – what it used to call a ‘tock’ – at the same time


Humor


Flashback Friday: Well, Not Intentionally

And we’re not at all upset that you canceled the contract

Wayback Wednesday: The Abcs, Or The 1-2-3’s?

How simple do I have to make this?

Memory-Lane Monday: Great Idea, Except …

Let’s just say you’re unclear on the concept


Storage


Backblaze Tested 139,867 HDDs In 2Q20

Lowest historical annualized failure rate of 0.81% vs. 1.07% in 1Q20, no failure on Toshiba 4TB drives since 4Q18

DCIG 2020-21 Top 5 High-End Storage Arrays Report Now Available

DCIG is pleased to announce the immediate availability of the inaugural DCIG 2020-21 TOP 5 High-End Storage Arrays report

Caching Vs Tiering

New technologies are coming to storage and data centres that adds to the hierarchy of choices available to system and solution architects


AI


Artificial Intelligence (AI) For Beginners

Artificial intelligence can seem daunting as you start work. Let’s break down how AI works, common types of AI, how it improves big data insights, and strategy essentials

Can Artificial Intelligence Improve Your Customer Service?

Excelling customer service has never been more important for businesses

In Gartner’s 2020 Hype Cycle, Explainable AI Leaps Ahead

The annual report shows AI is “dominating and becoming pervasive in all the technology that we’re using,” according to Gartner Research VP Brian Burke


Operations


Coronavirus: How COVID-19 Has Elevated The Status Of The Datacentre Industry

The pandemic has served to highlight just how dependent the world is on the datacentre community – and governments, policy-makers and investors are taking note

Why Some Data Centers Don’t Patch And Why They Should

Despite costly consequences, many data center operators don’t get around to patching serious security vulnerabilities until it’s too late

Large-Scale Migrations Away From On-Premise Environments Are Underway

COVID-19 has had a massive effect on DevOps, leading to large-scale migrations away from on-premises environments, a Codefresh survey reveals


Careers


Does It Matter Whether You’re Qualified For The Job?

Why Women Don’t Apply for Jobs Unless They’re 100% Qualified


Social Media


How Social Media Is Changing Customer Service

Social media has really changed customer service behavior in recent years


Networks


3 SD-WAN Cloud Connectivity Options To Explore

Enterprises can connect their SD-WAN infrastructure to cloud providers’ platforms using three methods: back-to-back access, private PoP connections and internet VPN


PM


2 Project Oversight Areas That Warrant More Executive Focus

When it comes to project oversight, there are two areas on which executives should focus


FOSS


10 Best Free And Open Source Software (FOSS) Programs I Found In 2020

As 2020 comes to a close, it is time to bring you the best 10 Free and Open Source Software (FOSS) programs I have come across during this year