Storage, Security, CxO Security Events, FOSS, DevOps, IoT, Virtualization, Sales, Cisco, Lenovo, Red Hat (291.4.4)

Storage, Security, CxO Security Events, FOSS, DevOps, IoT, Virtualization, Sales, Cisco, Lenovo, Red Hat (291.4.4)

Volume 291 Issue 4 -- Jun 20th, 2022 — Jun 26th, 2022 - Thursday

No alt text provided for this image

Each week I select 80-110 items from mainstream IT publications and publish them on the website for “IT News and Events.” I also select?press releases and blog posts?from various mainstream IT vendors. Vendors can engage with [email protected] to have their own section in this and other ITNE newsletters which reach over 45,000 subscribers including the 5,250+ subscribers to the LinkedIN edition.

No alt text provided for this image

Storage

Security

CxO Security Events

FOSS

DevOps

IoT

Virtualization

Sales

Cisco News

Lenovo News

Red Hat News

No alt text provided for this image
Thursday, July 28th, 2022: 1:00 PM to 2:00 PM EDT

Storage

Global File Systems: Hybrid Cloud And Follow-The-Sun Access

We look at global distributed file systems that put enterprise data under a single file access namespace so that enterprises and branch offices can get to data from anywhere

Managing data storage is ever more complex. IT teams have to wrestle with local, direct-attached storage, storage area networks, network attached storage and cloud storage volumes...?more

QLC vs. TLC SSDs: Which is best for your storage needs?

QLC flash memory is best for most read-intensive workloads, while TLC is suited to write-dominant workloads. Discover how QLC vs. TLC NAND are coexisting in the data center.

IT professionals tend to see the march of technology as monotonic and progressive -- always moving in one direction toward greater improvement, however that's measured. The impression is generally valid: No one makes picture tube TVs, rotary landline phones or cassette recorders anymore because there's no market for them, given the vastly superior replacement technologies...?more

Data Architecture Challenges

The more your business grows, the more complex your business's Data Architecture becomes. Enterprise Data Architecture challenges abound - from the beginning and throughout the journey.

Data has now become the lifeblood of any business, and business data cannot survive without a solid underlying Data Architecture. Data helps businesses to identify risks and opportunities, understand their customers better, and make informed decisions about their business operations...?more

Data Archiving: It Doesn't Have To Be On Tape

Long-term data storage can be done in the cloud, on disk drives, and optical disks, but each has some drawbacks.

Long-term storage-archiving-requires a very different approach than backup and recovery where throughput and deduplication are the main concerns. Archiving calls for storing data for long periods without becoming corrupted, so when it is retrieved, it is exactly what got stored 10 or 20 years ago ...?more

No alt text provided for this image
Thursday, July 28th, 2022: 1:00 PM to 2:00 PM EDT

Security

Rate Of IT Security Incidents Grows With Company Size

The rate of IT security incidents increases the more Microsoft 365 security features are used, according to Hornetsecurity

Organizations using Microsoft 365 and that use 1 or 2 of its stock security features reported attacks 24.4% and 28.2% of the time respectively, while those that use 6 or 7 features reported attacks 55.6% and 40.8% of the time respectively ...?more

Report: Open Source Security Ignored By Many Organizations

The once-sorry state of secure open source software has been improving lately, but a new report indicates it's still being largely ignored by many organizations.

That report, "The State of Open Source Security 2022," a joint venture between developer security specialist Snyk and The Linux Foundation, an open-source-focused nonprofit organization, includes some potentially worrisome findings, including: ...?more

The Top 8 Data Security Best Practices

Organizations today collect huge amounts of sensitive data known as personally identifiable information (PII). To protect this data from being breached by third parties, implementing company-wide and robust data security practices are crucial.

Yet this is no easy task. Data security is a complex process, especially when information is collected and processed through manual processes and multiple, fragmented, tools...?more

Identity Trends At Infosec 2022

This week saw the London edition of Infosec Europe - essentially a smaller version of the RSA Conference a few week ago in San Francisco.

There were about 15,000 attendees and 300+ solution providers from a range of cyber and information security areas. Of course my primary interest was to get briefings and understand the viewpoint from an identity and access management perspective and see how far the tentacles of identity were now spreading into other orthogonal areas of security. It didn't disappoint and I had some thought provoking conversations. ...?more

No alt text provided for this image
Tuesday, July 19th, 2022: 11:00 AM

CxO Security Events

Security Boulevard: Effectively Tackling Hardcoded Secrets With A Secrets Management Maturity Model (July 13th)

This webinar covers: What hardcoded secrets are ; Why hardcoded secrets are a security risk ; How to detect and remediate hardcoded secrets and How to use the maturity model to effectively manage your organization's use of secrets

Hard coding secrets-usernames, passwords, tokens, API keys and more-is a risky practice that's been around for as long as developers have been writing code. This problem is far from solved. In fact, hardcoded secrets are increasing in prevalence due to modern microservice-based architectures in which comments and services need to authenticate with each other securely and establish authorization mechanisms...?more

No alt text provided for this image
Tuesday, July 19th, 2022: 1:00 PM to 7:00 PM Wednesday, July 20th

FOSS

7 Summer Book Recommendations From Open Source Enthusiasts

Members of the Opensource.com community recommend this mix of books covering everything from a fun cozy mystery to non-fiction works that explore thought-provoking topics.

It is my great pleasure to introduce Opensource.com's 2022 summer reading list. This year's list contains seven wonderful reading recommendations from members of the Opensource.com community. You will find a nice mix of books covering everything from a fun cozy mystery to non-fiction works that explore thought-provoking topics. I hope you find something on this list that interests you. ...?more

No alt text provided for this image
Thursday, July 14th, 2022: 2:00 PM to 4:00 PM EDT

DevOps

TechStrong Con: Downturn Brings Additional Sense of DevOps Urgency

Regardless of whether the overall economy is experiencing a correction or is on the cusp of a recession, organizations are going to prioritize some projects over others as resources become more constrained.

During the 'DevOps: Has the Bubble Burst?' panel made up of DevOps executives and investors from venture capital firms that kicked off the virtual TechStrong Con event today, panelists said organizations will need to continue to invest in DevOps automation and cybersecurity to ensure their long-term survival ...?more

IoT

Why Businesses Can't Afford Anything Less Than Zero Trust In IoT

The IoT Landscape and Threats

Considering the inherent insecurity of connected devices, the threats facing organizations today often involve weakly-defended IoT equipment as the first line of attack. This is especially alarming as 94% of CIOs acknowledge some serious threat to their environment within the next year...?more

No alt text provided for this image
Thursday, July 14th, 2022: 1:00 PM to 2:00 PM EDT

Virtualization

5 Best Practices When Implementing A Container Strategy

Software developers must be vigilant in regards to their use of hardware resources. Dedicated hardware is often expensive to buy, run, and maintain-and there's only so much room in a data center for extra servers.

The ability to run multiple virtual machines on one piece of hardware makes virtualization a good option. Yet, each virtual machine must include its own guest OS and everything that entails...?more

Sales

We Asked 9 Successful Sales Leaders About The Economy

It's been a tough couple of years, Sales Hackers -- And it's about to get tougher.

And it's about to get tougher.

From layoffs at Redfin and Tesla to the plummeting crypto markets, companies are starting to tighten their belts - and the economy has shifted from the so-called 'Great Resignation,' with a job market heavily favoring employees, to the 'Forced Resignation.'...?more

Why Sales Organizations Are Leveraging Sales Automation Software

As part of Solutions Review's Premium Content Series-a collection of contributed columns written by industry experts in maturing software categories-Jay McGrath, the Chief Revenue Officer at Tonkean, shares insights on the value sales automation software provides Revenue Operations (RevOps) teams.

Every sales organization is looking for a way to get ahead. Strategies to help personnel operate more efficiently. Tools that might help them close more deals faster. This drive-combined with an increasing appreciation for the practical importance of well-tuned internal operations-has led to the rise of Revenue Operations, or, RevOps. RevOps is a business function charged with maximizing an organization's revenue-generating potential ...?more

No alt text provided for this image
Wednesday, July 13th, 2022: 1:00 PM to 2:00 PM EDT

Cisco News

Best-In-Class Learning Experiences: Combining Human And Digital Elements For Maximum Impact

The recent global pandemic and current global events, coupled with the escalating nature of digital revolution, have affected not only our working habits but also how we learn - making it increasingly difficult to deliver training that will stick. We are overwhelmed, distracted, and impatient. Flexibility in where and how we learn is increasingly important.

In Cisco Sales & Partner Global Operations, our mission is to accelerate partner transformation by driving operational readiness, productivity, effectiveness, and experience at scale. When our partners are successful, everyone wins. Delivering operational information in an easy and impactful way is key to helping them be the best at what they do, especially during times of continual change...?more

Meet Rapidly Scaling Cloud Data Center Requirements with SONiC

Much like our blue furry anthropomorphic hedgehog friend who can run supersonic speeds, our networks today need to be fast and agile. Enter SONiC (Software for Open Networking in the Cloud)...?more

Per Mar Security Remains Resilient As Threats Evolve

As an early adopter of Cisco Secure Endpoint, Per Mar Security Services has seen the product evolve alongside the threat landscape.

In the last few years SONiC has gained strong momentum in the community, and has been battle tested within some of the world's largest and most demanding cloud networks...?more

Today's High Speed Optical Links Would Fail If Not For This Technology (Part 1)

In part one of this two-part blog post, we review the basics of forward-error correction (FEC). In part two, we will discuss implementation and the impact of FEC on performance.

Today's insatiable demand for bandwidth is pushing network speeds higher and higher. Unfortunately, the faster the data rate, the greater the likelihood of transmission errors...?more

No alt text provided for this image
Tuesday, July 12th, 2022: 1:00 PM to 2:00 PM EDT

Lenovo News

Lenovo Redefines The Power Of Desktop Workstations With The Introduction Of The Thinkstation P360 Ultra

Delivering unmatched performance in an industry-first form factor, the new offering sits in a class of its own

Today, Lenovo is introducing the ThinkStation P360 Ultra, which rounds out its portfolio of desktop workstations, to deliver unmatched performance in a never-before-seen form factor. Half the size of a traditional small form factor desktop workstation, the machine sits in a class of its own...?more

Two Industry Leaders Join Lenovo Board Of Directors

Lenovo Group announced the appointment of two industry leaders as independent non-executive directors of the company, namely Ms. Cher Wang Hsiueh Hong and Professor Xue Lan.

'On behalf of the Board and management of Lenovo, I am pleased to welcome Ms. Wang and Prof. Xue to Lenovo's Board of Directors. They bring a wealth of global insight, experience, and perspective across key areas of innovation, investment, and social responsibility.. ...?more

No alt text provided for this image
Tuesday, July 12th, 2022: 3:00 PM to 4:00 PM EDT

Red Hat News

Introducing Red Hat Insights Integration With Splunk

Businesses want to make data driven decisions using data platforms and artificial intelligence (AI) to extract valuable knowledge to apply to the products and services they use and offer. Most of them rely on specialized data platforms to ingest and analyze all business sources of data in a continuous fashion.

Splunk offers an extensible data platform that supports shared data from any environment to provide all teams in an organization the visibility they need for end-to-end observability, with context, of every interaction and business process ...?more

Red Hat Learning Community Celebrates 100,000 Members

The Red Hat Learning Community (RHLC) celebrates a monumental milestone this week as it exceeds 100,000 members!

At its launch in September of 2018, the main goal was simple: provide a collaborative space for open source learners to connect as they optimize their skills in working with Red Hat products. As the core of that mission has remained true since its launch, Red Hat has strived to provide our users what they need in order to collaborate, learn, build skills and meet their individual learning and career goals. ...?more

Security Features In Red Hat Enterprise Linux 9

Red Hat Enterprise Linux 9 (RHEL 9) is the latest version of Red Hat's flagship operating system, released at the Red Hat Summit in May 2022.

New capabilities added to RHEL 9 help simplify how organizations manage security and compliance when deploying new systems or managing existing infrastructure. This article takes a brief look at three of the new security features available in this release...?more

No alt text provided for this image
Tuesday, July 12th, 2022: 12:00 PM to 3:00 PM EDT

要查看或添加评论,请登录

John J. McLaughlin的更多文章

社区洞察

其他会员也浏览了