Storage, Security, CxO Security Events, FOSS, DevOps, IoT, Virtualization, Sales, Cisco, Lenovo, Red Hat (291.4.4)
John J. McLaughlin
Editor-In-Chief, Board Member, Professional Services Engineer, Community leader
Each week I select 80-110 items from mainstream IT publications and publish them on the website for “IT News and Events.” I also select?press releases and blog posts?from various mainstream IT vendors. Vendors can engage with [email protected] to have their own section in this and other ITNE newsletters which reach over 45,000 subscribers including the 5,250+ subscribers to the LinkedIN edition.
Thursday, July 28th, 2022: 1:00 PM to 2:00 PM EDT
We look at global distributed file systems that put enterprise data under a single file access namespace so that enterprises and branch offices can get to data from anywhere
Managing data storage is ever more complex. IT teams have to wrestle with local, direct-attached storage, storage area networks, network attached storage and cloud storage volumes...?more
QLC flash memory is best for most read-intensive workloads, while TLC is suited to write-dominant workloads. Discover how QLC vs. TLC NAND are coexisting in the data center.
IT professionals tend to see the march of technology as monotonic and progressive -- always moving in one direction toward greater improvement, however that's measured. The impression is generally valid: No one makes picture tube TVs, rotary landline phones or cassette recorders anymore because there's no market for them, given the vastly superior replacement technologies...?more
The more your business grows, the more complex your business's Data Architecture becomes. Enterprise Data Architecture challenges abound - from the beginning and throughout the journey.
Data has now become the lifeblood of any business, and business data cannot survive without a solid underlying Data Architecture. Data helps businesses to identify risks and opportunities, understand their customers better, and make informed decisions about their business operations...?more
Long-term data storage can be done in the cloud, on disk drives, and optical disks, but each has some drawbacks.
Long-term storage-archiving-requires a very different approach than backup and recovery where throughput and deduplication are the main concerns. Archiving calls for storing data for long periods without becoming corrupted, so when it is retrieved, it is exactly what got stored 10 or 20 years ago ...?more
Thursday, July 28th, 2022: 1:00 PM to 2:00 PM EDT
The rate of IT security incidents increases the more Microsoft 365 security features are used, according to Hornetsecurity
Organizations using Microsoft 365 and that use 1 or 2 of its stock security features reported attacks 24.4% and 28.2% of the time respectively, while those that use 6 or 7 features reported attacks 55.6% and 40.8% of the time respectively ...?more
The once-sorry state of secure open source software has been improving lately, but a new report indicates it's still being largely ignored by many organizations.
That report, "The State of Open Source Security 2022," a joint venture between developer security specialist Snyk and The Linux Foundation, an open-source-focused nonprofit organization, includes some potentially worrisome findings, including: ...?more
Organizations today collect huge amounts of sensitive data known as personally identifiable information (PII). To protect this data from being breached by third parties, implementing company-wide and robust data security practices are crucial.
Yet this is no easy task. Data security is a complex process, especially when information is collected and processed through manual processes and multiple, fragmented, tools...?more
This week saw the London edition of Infosec Europe - essentially a smaller version of the RSA Conference a few week ago in San Francisco.
There were about 15,000 attendees and 300+ solution providers from a range of cyber and information security areas. Of course my primary interest was to get briefings and understand the viewpoint from an identity and access management perspective and see how far the tentacles of identity were now spreading into other orthogonal areas of security. It didn't disappoint and I had some thought provoking conversations. ...?more
This webinar covers: What hardcoded secrets are ; Why hardcoded secrets are a security risk ; How to detect and remediate hardcoded secrets and How to use the maturity model to effectively manage your organization's use of secrets
Hard coding secrets-usernames, passwords, tokens, API keys and more-is a risky practice that's been around for as long as developers have been writing code. This problem is far from solved. In fact, hardcoded secrets are increasing in prevalence due to modern microservice-based architectures in which comments and services need to authenticate with each other securely and establish authorization mechanisms...?more
领英推荐
Members of the Opensource.com community recommend this mix of books covering everything from a fun cozy mystery to non-fiction works that explore thought-provoking topics.
It is my great pleasure to introduce Opensource.com's 2022 summer reading list. This year's list contains seven wonderful reading recommendations from members of the Opensource.com community. You will find a nice mix of books covering everything from a fun cozy mystery to non-fiction works that explore thought-provoking topics. I hope you find something on this list that interests you. ...?more
Regardless of whether the overall economy is experiencing a correction or is on the cusp of a recession, organizations are going to prioritize some projects over others as resources become more constrained.
During the 'DevOps: Has the Bubble Burst?' panel made up of DevOps executives and investors from venture capital firms that kicked off the virtual TechStrong Con event today, panelists said organizations will need to continue to invest in DevOps automation and cybersecurity to ensure their long-term survival ...?more
The IoT Landscape and Threats
Considering the inherent insecurity of connected devices, the threats facing organizations today often involve weakly-defended IoT equipment as the first line of attack. This is especially alarming as 94% of CIOs acknowledge some serious threat to their environment within the next year...?more
Software developers must be vigilant in regards to their use of hardware resources. Dedicated hardware is often expensive to buy, run, and maintain-and there's only so much room in a data center for extra servers.
The ability to run multiple virtual machines on one piece of hardware makes virtualization a good option. Yet, each virtual machine must include its own guest OS and everything that entails...?more
It's been a tough couple of years, Sales Hackers -- And it's about to get tougher.
And it's about to get tougher.
From layoffs at Redfin and Tesla to the plummeting crypto markets, companies are starting to tighten their belts - and the economy has shifted from the so-called 'Great Resignation,' with a job market heavily favoring employees, to the 'Forced Resignation.'...?more
As part of Solutions Review's Premium Content Series-a collection of contributed columns written by industry experts in maturing software categories-Jay McGrath, the Chief Revenue Officer at Tonkean, shares insights on the value sales automation software provides Revenue Operations (RevOps) teams.
Every sales organization is looking for a way to get ahead. Strategies to help personnel operate more efficiently. Tools that might help them close more deals faster. This drive-combined with an increasing appreciation for the practical importance of well-tuned internal operations-has led to the rise of Revenue Operations, or, RevOps. RevOps is a business function charged with maximizing an organization's revenue-generating potential ...?more
The recent global pandemic and current global events, coupled with the escalating nature of digital revolution, have affected not only our working habits but also how we learn - making it increasingly difficult to deliver training that will stick. We are overwhelmed, distracted, and impatient. Flexibility in where and how we learn is increasingly important.
In Cisco Sales & Partner Global Operations, our mission is to accelerate partner transformation by driving operational readiness, productivity, effectiveness, and experience at scale. When our partners are successful, everyone wins. Delivering operational information in an easy and impactful way is key to helping them be the best at what they do, especially during times of continual change...?more
Much like our blue furry anthropomorphic hedgehog friend who can run supersonic speeds, our networks today need to be fast and agile. Enter SONiC (Software for Open Networking in the Cloud)...?more
As an early adopter of Cisco Secure Endpoint, Per Mar Security Services has seen the product evolve alongside the threat landscape.
In the last few years SONiC has gained strong momentum in the community, and has been battle tested within some of the world's largest and most demanding cloud networks...?more
In part one of this two-part blog post, we review the basics of forward-error correction (FEC). In part two, we will discuss implementation and the impact of FEC on performance.
Today's insatiable demand for bandwidth is pushing network speeds higher and higher. Unfortunately, the faster the data rate, the greater the likelihood of transmission errors...?more
Delivering unmatched performance in an industry-first form factor, the new offering sits in a class of its own
Today, Lenovo is introducing the ThinkStation P360 Ultra, which rounds out its portfolio of desktop workstations, to deliver unmatched performance in a never-before-seen form factor. Half the size of a traditional small form factor desktop workstation, the machine sits in a class of its own...?more
Lenovo Group announced the appointment of two industry leaders as independent non-executive directors of the company, namely Ms. Cher Wang Hsiueh Hong and Professor Xue Lan.
'On behalf of the Board and management of Lenovo, I am pleased to welcome Ms. Wang and Prof. Xue to Lenovo's Board of Directors. They bring a wealth of global insight, experience, and perspective across key areas of innovation, investment, and social responsibility.. ...?more
Tuesday, July 12th, 2022: 3:00 PM to 4:00 PM EDT
Businesses want to make data driven decisions using data platforms and artificial intelligence (AI) to extract valuable knowledge to apply to the products and services they use and offer. Most of them rely on specialized data platforms to ingest and analyze all business sources of data in a continuous fashion.
Splunk offers an extensible data platform that supports shared data from any environment to provide all teams in an organization the visibility they need for end-to-end observability, with context, of every interaction and business process ...?more
The Red Hat Learning Community (RHLC) celebrates a monumental milestone this week as it exceeds 100,000 members!
At its launch in September of 2018, the main goal was simple: provide a collaborative space for open source learners to connect as they optimize their skills in working with Red Hat products. As the core of that mission has remained true since its launch, Red Hat has strived to provide our users what they need in order to collaborate, learn, build skills and meet their individual learning and career goals. ...?more
Red Hat Enterprise Linux 9 (RHEL 9) is the latest version of Red Hat's flagship operating system, released at the Red Hat Summit in May 2022.
New capabilities added to RHEL 9 help simplify how organizations manage security and compliance when deploying new systems or managing existing infrastructure. This article takes a brief look at three of the new security features available in this release...?more