CxO, CxO Events, Technology, Networks, Encryption, Developer, VMware, Microsoft, Red Hat (293.3.2)
John J. McLaughlin
Editor-In-Chief, Board Member, Professional Services Engineer, Community leader
Please share this newsletter with your IT colleagues -johnj
The most popular articles posted to this newsletter become the basis of ITNE’s white-label,?enterprise IT newsletter service?which is designed to help Enterprise IT sales reps keep their name and information in front of customers and prospects by providing them with trusted news and insights. Please contact?[email protected]?for details
CxO
CxO Events
Technology
Networks
Encryption
Developer
VMware News
Microsoft News
Red Hat News
CxO
CTOs are confronting new challenges in defining their role: establishing their value to the business.
Lo Li might oversee aspects of technology at Capital One, but as the managing VP of customer digital experience and payments for a global financial corporation that has invested heavily in cloud and other modernization initiatives, she has to be concerned with budgeting, marketing and other core business functions ...?more
Unless properly managed, conflicting responsibilities between the chief information officer and the chief information security officer can cause project delays and budget overruns, says Netskope's Mike Anderson
The chief information officer (CIO) is a corporate executive in charge of IT strategy and implementation in an organisation. Conversely, the chief information security officer (CISO) is a senior-level executive responsible for developing and implementing the information security programme...?more
Of all the leadership skills related to emotional intelligence, adaptability is arguably one of the most important. Consider these three elements that shape an individual's ability to adapt
Even Daniel Goleman - author of Emotional Intelligence: Why It Can Matter More Than IQ - may not have anticipated the heightened role that emotional intelligence (EQ) plays in today's workplace. EQ is now considered an essential leadership skill, the cornerstone of many management and leadership development programs ...?more
DXC's Kristie Grinnell has a track record of balancing emotional intelligence and hard business results. Here's how she puts high EQ to work in cultivating a growth mindset for her teams.
Kristie Grinnell, SVP and CIO of DXC Technology, is an award-winning global executive known for her success in leading large-scale strategic transformations while remaining a calm, decisive, and supportive presence for her team, even when the heat is on. She has that unique ability - something we see among the top CIOs and digital leaders - to balance high emotional intelligence (EQ) and hard business results. ...?more
CxO Events
Our 1st and 2nd webcasts in this xPU series explained what xPUs are, how they work, and what they can do. In this 3rd webcast, we will dive deeper into next steps for xPU deployment and solutions
Our 1st and 2nd webcasts in this xPU series explained what xPUs are, how they work, and what they can do. In this 3rd webcast, we will dive deeper into next steps for xPU deployment and solutions
Hosted by SNIA ...?more
Learn best practices, methodologies and solutions for building sustainable enterprises from the SME
Climate change is already showing its impact across the globe, with extreme weather patterns and rising waters posing risks to people, animals, and all other life forms. And these dangers are only increasing in pace and scope. By 2026, climate-related weather events are expected to cost businesses 1.3 trillion dollars ...?more
In this webinar, experts will discuss the differences between machine learning and deep learning, and how to evaluate and choose the right approach that can address enterprise security challenges.
Advancements in artificial intelligence technology and machine learning and deep learning algorithms promise to transform enterprise security by giving IT security teams tools to detect and respond to attacks faster than before. Before security teams can use these tools, they need to know what is possible with different types of learning and how artificial intelligence can address complex questions.
Hosted by DARKReading ...?more
Technology
Integrated GPU with ray tracing support could appear next year
Intel Meteor Lake processors, the next-next-generation CPU from Intel due out in 2023, are expected to feature ray tracing support on a tiled-GPU architecture, marking a major step forward for the technology ...?more
The last year or so was already a wild ride for the open source instruction set architecture RISC-V, then Intel stepped in, took a top tier membership, a seat on the board, pledged to spend a billion dollars on the architecture, and began partnering with key RISC-V vendors.
RISC-V, the open-source reduced instruction set architecture that's used for everything from accelerators and microcontrollers to CPUs and GPUs, continues to be on an accelerating roll (no pun intended). When I asked Calista Redmond, CEO of RISC-V International, the nonprofit foundation in charge of the project, to put the current state of RISC-V into a single word, she didn't hesitate. ...?more
Cryptographically signs pics - but you'll pay $2,500 before you've bought a lens
Sony has announced a new camera feature that the electronics goliath claims will make digital images immune to secret manipulation and forgery...?more
Did someone say ECC on an SBC?
That Raspberry Pi 4B feeling a bit pokey? Asus' Aaeon division has managed to fit an eight-core Xeon processor, complete with error correcting memory (ECC) support, and a PCIe 4.0 x8 slot into a four-inch single board computer...?more
Networks
Managing a bevy of overlapping tools can create inefficiencies for network teams, but there are ways to address the problem
Tool sprawl is a daunting problem that plagues enterprise IT everywhere you look, from data center operations to cybersecurity to network reliability to application performance ...?more
Tool sprawl is a daunting problem that plagues enterprise IT everywhere you look, from data center operations to cybersecurity to network reliability to application performance.
It works by using a TFO cookie (a TCP option), which is a cryptographic cookie stored on the client and set upon the initial connection with the server. In other words, TFO is an optional mechanism within TCP that lets endpoints that have established a full TCP connection in the past eliminate a round-trip of the handshake and send data right away. ...?more
Wi-Fi 6E has started to show signs of a usage uptick, and predictions are that it will reach the optimum point by next year.
If you have been following the industry trends, you'd know that a lot of the companies operating in this space have their eyes set on 2023 as the sweet spot for launching Wi-Fi 6E capable access points and devices...?more
With its low latency, high throughput and multi-link operation capability, Wi-Fi 7 sounds promising. But will theoretical performance match the real-world experience?
As a wireless network architect, I'm just starting to deploy Wi-Fi 6E in the enterprise wireless LAN setting. This is considered bleeding edge right now. Currently, not many Wi-Fi 6E clients are available and most vendors shipping first-generation 6E access points are hoping the Wi-Fi experience lives up to the marketing hype. ...?more
Encryption
Once a cutting-edge sci-fi theory, quantum encryption - along with the computing power that drives it - may be close to wide-scale deployment.
When it comes online, all previous cryptographic standards used to protect our data could go up in smoke...?more
Developer
Application modernization may seem difficult, but you can achieve success if you follow these five steps.
Nine out of 10 IT leaders agree: Application modernization is hard. Problems such as staffing limitations, lack of support from management, and uncertainty about which app modernization tools to use - to name just a few of the top modernization challenges identified by Asperitas' recent survey of IT leadership - frequently make application modernization projects hard to start and difficult to sustain once they're underway. ...?more
Working at a large company? You're less likely to get time to focus than peers at smaller firms, according to data from time management app Clockwise.
Software developers spend a third of their week in meetings on average, according to data collected by time management app Clockwise - with those at large companies facing the most packed schedules...?more
VMware News
Singular partner program includes multiple business models and routes to market with VMware
VMware announced the next evolution of VMware Partner Connect - the company's singular, unified, global partner program. Partner Connect's new framework aligns to today's cloud, services, and solutions-centric business models, and will help partners drive better business performance and profitability today while transforming their businesses for tomorrow. ..?more
Company Also Receives Highest Product Scores in all Four Use Cases in 2022 Gartner Critical Capabilities for Unified Endpoint Management Tools Report
VMware, Inc. announced it has been positioned by Gartner, Inc. as a Leader in the 2022 Magic Quadrant for Unified Endpoint Management (UEM). This is the fifth consecutive year Workspace ONE - a core technology supporting unified endpoint management requirements that is part of VMware's Anywhere Workspace - has been named a Leader in the Gartner Magic Quadrant for unified endpoint management. ...?more
Microsoft News
Even with the dip in the value of cryptocurrencies in the past few months, cryptojackers - trojanized coin miners that attackers distribute to use compromised devices' computing power for their objectives - continue to be widespread
In the past several months, Microsoft Defender Antivirus detected cryptojackers on hundreds of thousands of devices every month. These threats also continue to evolve: recent cryptojackers have become stealthier, leveraging living-off-the-land binaries (LOLBins) to evade detection...?more
Red Hat News
The Friday Five is a weekly Red Hat blog post with 5 of the week's top news items and ideas from or about Red Hat and the technology industry. Consider it your weekly digest of things that caught our eye.
...?more
In this article, we explain how to integrate identity management (IdM) in Red Hat Enterprise Linux (RHEL) with single sign-on (SSO) for Red Hat solutions.
IdM in RHEL is designed to simplify identity management within a Red Hat Enterprise Linux subscription. It provides a centralized and clear method for managing identities for users, machines and services within large Linux enterprise environments. ...?more
Red Hat Summit: Connect is coming up soon, kicking off in September in three North American cities:
If you're interested in joining us, your first step is to register for the event in the city that's most convenient. (Each location features nearly the same agenda, so you won't miss out by picking one over the other.) Once you're saved your seat, check out all the offerings and activities to make the most of your in-person experience. ...?more
A white-label, enterprise IT newsletter service that is designed to help B2B sales reps keep their name and information in front of customers and prospects by providing them with trusted news and insights