Volume 281, Issue 4: August 23rd, 2021 — August 29th, 2021
Each week I select 60-90 items from mainstream IT publications and publish them on the website for “IT News and Events. I track the most popular articles and use those articles as the basis of my “IT Newsletter As A Service.”
These are are most popular articles of this week’s issue.
Building effective IT 101: Processes matter, but some matter more than others. Here’s where to put your skin in the game as an IT leader.
The CTO has emerged as a key player in the C-suite, as digital transformations become high strategic priorities for so many organizations
The Cloud Security Alliance (CSA), the world’s leading organization dedicated to defining standards, certifications, and best practices to help ensure a secure cloud computing environment, announced the inaugural members of the CSA CxO Trust Advisory Council
Learn how to harness the power of conflict to make better decisions and build team trust
Gartner Says Executive Leaders Must Act Now In Evaluating 7 Trends For An Effective Strategic Planning Process
Function-Specific Strategic Planning Templates Are Available for Complimentary Download
Enterprise risk management done correctly can mitigate different types or levels of risk. Depending on the industry and group, risk management should address the organization’s business needs and respond to any risk event
The latest subject in our CIO career series is Kirsten Garen, CIO of CDK Global. Garen joined the $1.7B auto dealership technology provider in November 2020.
The pandemic has given many organizations an unexpected crash course in digitalization
Think back to a year ago: The pandemic hit, normal daily life came to a jarring halt and businesses everywhere rushed to transition to remote / hybrid workplace models for survival.
Privileged access management (PAM) is in a bizarre place right now. On the one hand, organizations mostly understand the value of PAM.
On average, it takes a business 287 days to find and contain a data breach
The insider cybersecurity threat vector is vast and complex, but here are some things you can do now to prevent an incident.
Wi-Fi 6E is the most secure wireless standard ever, but making the wrong implementation decisions or not understanding its risks will negate that advantage
Cyber security threats are a constant for organizations, whether they do business with the public or other organizations.
The fundamentals of cybersecurity in 2021: Scalability, user awareness, and the ability to evolve to meet changing network and security needs
The phrase ‘time is money’, originally attributed to Benjamin Franklin, reprimands the slothful for wasting their working hours
In 2020, the average ransomware payment was $312,493 – a 171% year-over-year increase.
Data is the lifeblood of today’s information-based business.
Having a remote workforce is not all about finding the top talents, increasing employees’ productivity, or reducing your operating cost
The latest revisions of the SNIA Computational Storage Architecture and Programming Model Version 0.8 Revision 0 and the Computational Storage API v0.5 rev 0 are now live on the SNIA website
NVMe arrays are the highest performance storage solutions available, offering a massive speed boost for enterprises willing to make the investment. Here’s how to select the right NVMe solution for you.
QLC flash memory is best for most read-intensive workloads, while TLC is suited to write-dominant workloads. Discover how QLC vs. TLC NAND are coexisting in the data center.
IT teams in search of a distributed file system that supports object storage must carefully map out their requirements — and remember that no two products are exactly alike
But questions of where and when remain, and better visibility being top priority
As cloud adoption surges in popularity, it’s important that your cloud team is well equipped to handle their next project. However, there are mistakes that can derail a project
Here’s a look at the seven IaaS and PaaS cloud providers included in Gartner’s Magic Quadrant for Cloud Infrastructure and Platform Services report.
With a bit of effort and attention, businesses can avoid cloud security problems that arise from misconfigurations
Three facets when you’re considering cloud
The discipline of predictive analytics is likely to increase in importance as it is complemented by artificial intelligence. NHS and National Express case studies prove the point
Among the techniques to speed AI deployment, companies can deploy ready-made AI software, including pre-trained models and scripts.
In this special guest feature, Aparna Dhinakaran, Chief Product Officer at Arize AI, explains five of the biggest misconceptions surrounding machine learning observability. Arize AI is a startup focused on ML Observability. Aparna was previously an ML engineer at Uber, Apple, and Tubemogul (acquired by Adobe).
Boston Dynamics is known for the flashy videos of its robots doing impressive feats. Among Boston Dynamics’ creations is Atlas, a humanoid robot that has become popular for showing unrivaled ability in jumping over obstacles, doing backflips, and dancing
Data Center World keynote: It’s still early days for quantum computing, where the fundamental technology remains unsettled, and the nature of workloads is fuzzy.
‘Extreme-scale AI’ is here
Millions of Americans are looking for ways to increase their salaries and advance their careers. Fortunately, IT jobs are plentiful and lucrative.
IT jobs deal with technical procedures or software that requires a specialty, so becoming certified in a specialized area demonstrates to employers that you have the distinct skill set needed to succeed in that role
When Oracle Corp. acquired the rights to MySQL through its purchase of Sun Microsystems Inc. in 2010, the company had a decision to make.
Decentralized storage technology can be confusing and complicated. These best practices, however, can help with implementation in enterprise IT infrastructure
Agile project management has grown in popularity for software development teams globally, but also for other businesses that balance multiple projects and deadlines.
BEC is costing businesses millions of dollars
CRM usage remained ‘largely flat’ over the last few years
While most of the world is full of good-intentioned, trustworthy people, there is a huge number of bad actors out there that want to take down your systems and get their hands on your hard-earned money or data. That’s why next-generation firewalls are an important part of modern cyber security strategy.
Enterprise resource planning (ERP) has been the backbone of many organizations for decades. ERPs were popular because they offered a centralized back-end to manage and view vital business information in one place