Storage, Security, CxO Events, AI, Database, Careers, Developer, Dell, Red Hat (291.3.3 )
John J. McLaughlin
Editor-In-Chief, Board Member, Professional Services Engineer, Community leader
Each week, IT News And Events (ITNE) selects articles from mainstream IT publications, press releases and blogs from major IT vendors, and webinar announcements of interest to senior IT professionals, all to be published in the websites and newsletters of “IT News and Events” for our 45,000+ email subscribers and 5,200+ LinkedIn Newsletter subscribers.
Data gravity can attract increasing amounts of data, and brings with it onerous management overheads. We look at how to mitigate data gravity in datacentre and cloud
When it comes to enterprise applications, access to data - and lots of it - is usually a good thing. And the greater the volume of required data held locally to where it is processed, the better for the business, its applications, decision-making and, in some cases, compliance...?more
20TB hard disk drives are soon going to be forgotten because 30TB models are on their way
Top HDD manufacturers including Seagate and Western Digital are on track to roll out their own line ups of 30TB hard drives by 2024. Capacity increase has been an ask among hard drive users for several years now and a handful of companies have been working on it a while now. Recently, Toshiba, Seagate and WD together with their partners made announcements about their roadmaps to build 30TB HDDs.?more
Bitwarden announced the results of a global survey of enterprise security decision makers, conducted by 451 Research, which explores enterprise password management practices and intent.
Overall, the survey finds that strong passwords remain a priority strategy and are important in shoring up the confidence of enterprise security decision makers. But, while security sentiments fall in line with best practices, implementation often falls short...?more
The importance of wireless network security cannot be understated. With the proliferation of mobile devices and the popularity of public Wi-Fi hotspots, the potential for data breaches and other cybersecurity threats has increased exponentially.
While there are many different steps that can be taken to secure a wireless network, these 12 best practices are essential for ensuring that your data and devices are safe from malicious actors...?more
Join IDC analyst Brad Casemore and subject-matter experts from our roundtable sponsor, Dell, for a private, interactive, virtual roundtable.
Leading enterprises increasingly find that modernization of datacenter infrastructure is essential to the realization of their digital transformation goals. Nowhere in the datacenter is that modernization more necessary than in relation to the network. Traditional vertically integrated switches - with their closed architectures, lack of open APIs, and dependence on manual configuration and management - often impede enterprise efforts to make infrastructure as agile and flexible as that of the public cloud...?more
Our events now feature market analysis from our strategic research partner, IDC, the global leader in market research and analysis. Following the event you'll be granted access to its highly-valued CIO research package, 'The five stages to enterprise recovery: How tech can help organizations flatten the curve to recovery".
With recent nationwide work-from-home initiatives, we understand it's not business as usual -- but you still need to do business. So TechTalk Summits is taking our events to a whole new level -- virtual and interactive.. ?more
Join CIO contributing editor Lane Cooper and subject-matter experts from our sponsor, IBM, for a private, hour-long, interactive, virtual roundtable.
In a 2021 IDC study that analyzed 446 businesses across the globe to measure the efficacy of migrating to cloud versus modernizing existing investments in mainframe systems and applications, the case for the latter won the day...?more
Deep learning software is revolutionizing the technology space by bringing in more accuracy and speed for data processing and making predictions and classifications.
It uses the concept of AI and ML to help businesses, organizations, research facilities, and universities gain intelligence from data and use it to drive their innovations.
The reason it's evident in this modern era is that people find solutions to ease their lives and perform tasks faster. Also, automation is taking over the world...?more
Academic researchers are developing projects to apply artificial intelligence to detect and stop cyberattacks and keep critical infrastructure secure, thanks to grants from the C3.ai Digital Transformation Institute.
New ransomware variants and deceptive techniques such as living off the land and store now, decrypt later are sidestepping heuristic analysis and signature-based malware detection. Behavior-based tools can compare network activity against an established norm and flag when they detect unusual and suspicious actions and patterns. Powered by artificial intelligence (AI) and machine learning (ML), such tools represent hope in a post-Colonial Pipeline world.?more
领英推荐
The term machine learning refers to a computational system that has the ability to ingest data, analyze it and spot patterns and trends.
Generally considered a subset of artificial intelligence (AI), machine learning (ML) systems generate algorithms based on a set of sample data and then deliver predictions, without being expressly programmed to do so. Moreover, these algorithms change and adapt as new data appears or conditions change...?more
Just because you may not see errors on the part of artificial intelligence doesn't mean that things are fine. It's up to humans to look for ethical or other issues.
Transparency often plays a key role in ethical business dilemmas -- the more information we have, the easier it is to determine what are acceptable and unacceptable outcomes. If financials are misaligned, who made an accounting error? If data is breached, who was responsible for securing it and were they acting properly? ...more
It is relatively easy to get a group of people that creates a new database management system or new data store.
We know this because over the past five decades of computing, the rate of proliferation of tools to provide structure to data has increased, and it looks like at an increasing rate at that. Thanks in no small part to the innovation by the hyperscalers and cloud builders as well as academics who just plain like mucking around in the guts of a database to prove a point.?more
As the amount of data generated globally grows exponentially, data-driven businesses are increasingly turning to more innovative database management systems to store, manage, and process all that data.
This article provides an overview of database management, how it has evolved - especially during the COVID-19 pandemic - and the future of database management systems...?more
CIOs share key best practices for IT leaders looking to level up with a mix of technical and business credentials aimed at growing their CIO role.
With the technology landscape in constant flux, getting certified on the latest tools and techniques can be a valuable way to advance your career - even for IT leaders...?more
A shorter workweek is not necessarily the key to reducing team stress. Consider addressing these underlying problems first
The pandemic has forever changed the workplace, causing many in the tech industry to now question the traditional five-day workweek. One proposed solution is a four-day workweek, which some believe promises to redefine workplace productivity and employee happiness. Research shows those working four days per week report higher well-being, less burnout, and improved productivity...?more
One tried and true way for IT professionals to differentiate themselves from the rest of the pack is to earn certifications in critical infrastructure technologies.
While opportunities abound in today's dynamic job market, the volume of competition for any given IT opening can be enormous. Job sites such as LinkedIn can be humbling. Who wants to be just in the top 20% of the 750 candidates that have already applied for a job? One tried and true way for IT professionals to differentiate themselves from the rest of the pack is to earn certifications in critical infrastructure technologies...?more
For would-be quantum programmers scratching their heads over how to jump into the game as quantum computers proliferate and become publicly accessible, a new beginner's guide provides a thorough introduction to quantum algorithms and their implementation on existing hardware
'Writing quantum algorithms is radically different from writing classical computing programs and requires some understanding of quantum principles and the mathematics behind them,' said Andrey Y. Lokhov, a scientist at Los Alamos National Laboratory and lead author of the recently published guide in ACM Transactions on Quantum Computing... ?more
Emphasis on flexibility, keeping your options open, making operations more simple, improving velocity - with an eye to moving quickly for the business
Software never really changes. It is, as Capitol Canary CTO Mikhail Opletayev put it recently, 'a set of instructions that tells computers what to do.'...?more
Managing unstructured data is key to business growth.
Every organization today is data-rich. Today, it is widely acknowledged that no organization can effectively service their customers without investing in some form of data-driven technology and analytics. As companies double down on digital transformation, more capacity is needed to process a wider variety of applications from files and objects to streams, forcing them to prioritize a well-designed digital infrastructure investment... more
Partners can now provide multi-tenancy for Tanzu on VxRail and VMware Cloud Foundation to simplify their IaaS deployments.
With the explosive growth of containerized applications running from the core to the edge, and onto the Radio Access Network (RAN), businesses of all sizes and roles are challenged with managing the myriad of infrastructures needed to host those ever-growing applications... ?more
The new Dell Unity XT 5.2 Operating Environment brings feature/function parity between Unity XT HFAs and AFAs.
Dell Technologies continues delivering breakthrough storage software innovations to its customers with the availability of Dell Unity XT's latest Operating Environment (OE) 5.2. This software release delivers several important storage technologies designed to simplify how users address capacity expansion and recover data faster, expand disaster recovery topologies, increase storage utilization and cost-effectively upgrade Unity XT systems while lowering CapEx/OpEx.?more
Red Hat Enterprise Linux (RHEL) provides the stable foundation for advanced workloads both on-premises and in public clouds such as Microsoft Azure
For Azure, Red Hat and Microsoft have been working together to provide the tools needed to deliver workloads faster, with less effort - backed by tightly integrated, enterprise-grade support. Many of today's workloads require some form of enterprise database, and one of the most popular is Microsoft SQL Server...?more
The Friday Five is a weekly Red Hat blog post with 5 of the week's top news items and ideas from or about Red Hat and the technology industry. Consider it your weekly digest of things that caught our eye.
Read on for details?more
A new type of computer is being developed that can break many of our existing cryptographic algorithms.
As a result, we need to develop new algorithms that are secure against those computers and that will run on our existing computers. This is called "post-quantum cryptography".
What is a quantum computer?...?more