Storage, Security, CxO Events, CxO Security Events, Technology, Database, HR, DevOps, DR, Marketing, VMware News, Microsoft, Red Hat (296.1.Friday)
John J. McLaughlin
Editor-In-Chief, Board Member, Professional Services Engineer, Community leader
Please share this newsletter with your IT friends and colleagues and encourage them to become subscribers!
ITNE produces private label newsletters from these most popular articles. Contact?[email protected]?for details.
Storage
Security
CxO Events
CxO Security Events
Technology
Database
HR
DevOps
DR
Marketing
VMware News
Microsoft News
Red Hat News
Storage
AMD, EY, and Seagate are all getting behind the emerging approach to storing data; AMD, Seagate, and EY have joined the Decentralized Storage Alliance, a new organization aimed at promoting the benefits of a decentralized approach to storage
Decentralized storage is a technology where data is stored on a distributed network run by computers, or nodes, located across multiple locations ...?more
If you're responsible for managing enterprise data, you know that storage can be both a blessing and a curse. On the one hand, having access to large amounts of data can be immensely helpful in making business decisions.
On the other hand, storing all that data can be expensive and downright chaotic to manage. ...?more
Backblaze has published its quarterly disk drive reliability stats and explained how buying less reliable drives can be cheaper in the long run...?more
Security
What are the biggest cybersecurity threats affecting online retailers today? The State of Security Within eCommerce in 2022 Report from Imperva is now available and answers that question.
For this report, Imperva's cybersecurity experts analyzed 12 months of data, collected from our global network of customers, and have made this information available just in time for the holiday shopping season ...?more
Version 3.0.7 of the popular OpenSSL cryptographic library is out, with fixes for CVE-2022-3602 and CVE-2022-3786, two high-severity buffer overflow vulnerabilities in the punycode decoder that could lead to crashes (i.e., denial of service) or potentially remote code execution...?more
Telework has become a mainstay, and with it, so has employee reliance on personal mobile devices. These devices are difficult to monitor and keep up to date, presenting a unique security challenge for U.S. local, state, and federal government organizations.
On the one hand, bring-your-own-device (BYOD) strategies provide government workers increased flexibility and productivity. This is likely one of the reasons the use of unmanaged devices increased an average of 55% across federal, state, and local governments between 2020 to 2021 according to Lookout data...?more
Many countries routinely download device content from travelers at the border. Getting ahead of this eventuality can help protect sensitive data and maintain privacy for employees and their company.
Does your company have a travel policy that instructs and supports employees traveling internationally for business with direction regarding comportment and cooperation? This isn't a trick question. To have a travel program that provides employees with anticipated scenarios, and to provide them with unique devices for international travel, is a significant investment of resources both physical and monetary. ...?more
CxO Events
'The Covid-19 pandemic has supercharged the role of chief information officers, accelerating a shift from backroom technicians to front-office decisionmakers, as companies' operations are increasingly shaped by technology' (WSJ, 9/19/21). In this packed session, IDC will share research insights, explore the implications, and deliver leadership strategies for CIOs, rising CIOs, and senior technology professionals by revealing unique survey insights from Tech Talk Summit participants.
Hosted by Tech Talk Summits ...?more
This webinar will introduce digital twin usage in edge IoT applications, highlighting what is available today, what to expect in the next couple of years, and what the future holds.
Hosted by SNIA ...?more
CxO Security Events
Are you trying to ensure your organization has the cyber resilience it needs? We're here to help!
Hosted by InteropDIGITAL ...?more
The inaugural Intelligent Security Week is the hybrid event to be organized by VentureBeat, that is dedicated to the intersection between cybersecurity and AI.
Alongside valuable virtual content, this event also includes the opportunity for key decisions makers to attend high-touch in-person event experiences across the US.
Hosted by VentureBeat ...?more
CIO's and CSO's Innovation Agenda, a one-day summit where those who walk the talk come to share their secrets just in time for the new year. We'll feature leaders whose perseverance has paid off in tangible results, among them winners of the 2022 CIO 100 and CSO50 awards programs. You'll learn from their hard-won efforts how to build winning teams, an innovative culture, and models for continuous innovation that keep your stars engaged...?more
This virtual event will focus on some of the new threats posed by cybercriminals and nation-states.
On December 13, Cybersecurity Outlook 2023 will look at some of the new threats posed by cybercriminals and nation-states, as well as evolving products and technologies that may help mitigate those threats. You'll hear from some of the cybersecurity industry's leading experts, as well as researchers who have been studying the next wave of cyber vulnerabilities and exploits.
Hosted by blackhat, DARKReading, OMDIA ...?more
Technology
Technological upheavals continue to disrupt the world. If these newer shifts gain momentum and intensify, expect to see more strategic and revolutionary developments in 2023.
According to MediaPeanut, the tech industry has a 5-6% growth pattern yearly. Catching emerging technology waves sooner helps you leverage them in the nascent stages to gain a competitive advantage ...?more
The advent of the Data Processing Unit (DPU) or the I/O Processing Unit, or whatever you want to call it, was driven as much by economics as it was by architectural necessity.
领英推荐
The fact that chips are pressing up against reticle limits and CPU processing for network and storage functions is quite expensive compared to offload approaches have combined to make the DPU probable. The need to better secure server workloads, especially in multitenant environments, made the DPU inevitable. And now, the economics of that offload makes the DPU not just palatable, but desirable...?more
Database
VEERUM opted to build its digital twin technology software on a MongoDB database hosted on AWS. Find out why in this case study.
When three self-professed problem-solvers joined forces in 2014 to rethink the unwieldy way most industrial sites and facilities were managed, even they couldn't have envisioned how far they would get. The trio - Steve Fisher, Amit Varma, and Scott Benesh - would develop digital twin technology software and found the Calgary-based company VEERUM...?more
NoSQL database vendors Aerospike and Couchbase this week unveiled new enhancements that accelerate the performance and accessibility of their offerings, as the NoSQL market continues to notch gains against the relational incumbents.
While the relational database market continues to dominate the database field in terms of sheer spending, the NoSQL segment is setting the pace for growth, as companies look for more flexible databases to power applications across Web, mobile, and IoT use cases. ...?more
HR
A willingness to consider far-flung candidates and offering meaningful work are just two of the ways IT leaders are getting more strategic about addressing IT hiring challenges.
CIOs need to try a lot harder these days to find IT talent, particularly when it comes to the most difficult-to-fill positions. Strategies most IT leaders are deploying include offering signing bonuses and more paid time off, being open to hiring people with different types of life experiences, and looking for cultural fit in addition to - or instead of - specific technical know-how. And some are simply looking to build the talent themselves...?more
Talent acquisition is no longer a top priority for HR pros, research suggests. In 2021, about 40% of HR professionals surveyed by Lattice said talent acquisition was a priority over the next 12 months. Only 17% of Lattice respondents said as much in 2022.
This evolution may come as little surprise: In HR Dive's 2022 Identity of HR report, hiring was listed as a top priority in the industry. It was also listed as one of HR's biggest challenges. A number of factors have exacerbated the issue: The Great Resignation and the Great Reshuffle remained throughout the year, while the quiet quitting debate sprawled from summer to fall...?more
According to Gartner, there are five ways managers can increase an employee's sense of connectedness to their company culture.
Hybrid work is becoming the norm in the workforce. People spend about two days a week in the office and rave about decreased expenses, increased productivity, and a better work-life balance ...?more
DevOps
Realizing the full benefits of DevOps requires a commitment at the cultural level. Consider this expert advice to establish a DevOps culture throughout your organization
DevOps is the leading software development methodology practiced worldwide, with a market share of 47 percent. By adopting DevOps, which emphasizes constant collaboration between development and operations teams, you can experience 63 percent improvement in software quality, 63 percent faster release, and 55 percent better collaboration among teams...?more
DR
Recovery isn't the only priority when ransomware hits. Careful planning, training and coordination among IT teams are critical to maintain business continuity during an attack.
Ransomware attack recovery is a critical activity that IT cybersecurity teams typically address. Business continuity cannot be a footnote in this process. Ransomware attacks can disrupt operations, but if an organization uses and stores sensitive information, it must also be prepared to maintain business continuity if that information is compromised...?more
It's increasingly common for companies in all sectors to use the cloud to store their data. The cloud provides scalability, security and flexibility that was often inaccessible to businesses only a few years ago. But just like any other technology, it has its limits.
What happens if a severe thunderstorm knocks out power to a data center or if an employee accidentally deletes critical files? These are the types of scenarios that, however unlikely, can still happen and cause significant disruptions to a company if they're not prepared. ...?more
As more and more large enterprises adopt cloud technologies, there are still many small- and medium-sized companies that have yet to take that leap
There are economic incentives that make the movement to the cloud beneficial, such as trading capex for opex expenses, but these enterprises lack some of the skills and resources to successfully navigate the migration. These companies can instead get a taste of the cloud through cloud-based services like disaster recovery-as-a-service (DRaaS). DRaaS uses a secure, managed cloud as a target site to help organizations recover entire applications or sites by providing a means to failover...?more
BigPanda has published a new report created with Enterprise Management Associates (EMA), titled 'The Modern IT Outage: Costs, Causes and Cures.'
The report investigates how much it costs organisations when their IT systems are no longer available. It found that the iconic $5,600 is no longer valid with organisations digitising rapidly ...?more
Marketing
Everlytic has taken a step-by-step approach to growing your business's digital communication abilities by developing what's called the Everlytic Growth Journey. In it, they break the progression of mastering business messaging and marketing automation into three levels: Bulk Communicator, Message Personaliser, and Communication Automator.
In this article, we explore the final level of this journey - the destination businesses often aim for with their strategic, functional messaging: putting it on autopilot. By automating messaging in this way, businesses save time, improve the customer experience, and optimise returns ...?more
CXOToday has engaged in an exclusive interview with Mr. Ritesh Ujjwal - Founder & CEO, Kofluence.
Can you trace Kofluence's journey for us from its inception. (CXO Today)
Kofluence started in 2020, headquartered in Bangalore with a simple vision of democratising the influencer marketing landscape and making social influence accessible for all. We believe anyone can monetize their social reach, given the right opportunities and enablement...?more
VMware News
Today VMware stockholders voted to approve the proposed acquisition of VMware by Broadcom, Inc. The vote took place at a special meeting of stockholders this morning. The deal is expected to close in Broadcom's fiscal year 2023, which began in November 2022.
When the transaction does close, the combination of VMware and Broadcom will offer our combined customers more choice and flexibility to modernize, build, deploy, connect, and protect applications consistently, regardless of where they run: from the data center to any cloud, and to the edge ...?more
Over the past decade, challenger brands have shaken up the status quo in the business world by pioneering a digital-smart strategy, centered on accelerating innovation via software in the cloud.
There are unique qualities that distinguish a digital-smart business: an ability to harness machine learning to turbocharge business insights; a focus on taking automation to the next level; and an obsession with driving the next leap forward in employee engagement and productivity ...?more
For me, people are wired for connection, which builds our sense of purpose and belonging, and ultimately inspires us to work collectively to influence change.
Growing up in a small community, I learned that when individuals work collaboratively, combining efforts into a greater collective, we can achieve wider outcomes. Likewise, sustainability initiatives need the engagement of both individuals and community to reach their full potential. Working collaboratively with a sense of purpose, we become better prepared to manage and reduce our collective footprint, whilst creating an individual commitment to sustainable living ...?more
Microsoft News
A critical priority for the U.S. Department of Defense (DoD) is accelerating the speed at which information is collected, analyzed and delivered to where it is needed to support mission goals. Satellites are increasingly playing an important role in this ability to harness and move data around the world, but limitations in the current government architecture can still present challenges to getting information where it's needed, when it's needed.
To solve this, the DoD's Defense Innovation Unit (DIU) has partnered with the U.S. Space Force in developing a Hybrid Space Architecture (HSA), designed to rapidly scale available space resources and bring together the best capabilities across government and commercial industry to establish ubiquitous, resilient connectivity and insights for mission leaders...?more
Red Hat News
The open hybrid cloud vision of Red Hat covers four footprints: physical, virtual, cloud and edge. Red Hat Enterprise Linux (RHEL) is at the forefront of the innovation that comes with edge computing by providing a more consistent, reliable and security-focused operating system to fuel the demand from enterprises to operate at the closest point of data generation.
Red Hat Insights is a valuable part of the RHEL subscription and experience across all footprints of the hybrid cloud, with edge being no exception. We have made Advisor recommendations compatible with RHEL deployed at the edge to help you extend your data center capabilities. You will have an analytics tool at your disposal which will help keep your servers healthier by proactively highlighting operational issues. ...?more
The Friday Five is a weekly Red Hat blog post with 5 of the week's top news items and ideas from or about Red Hat and the technology industry. Consider it your weekly digest of things that caught our eye.
...?more
I have been working as a Technical Account Manager (TAM) with Red Hat for around a year now. I love interacting with my customers, working with them on shared goals and providing proactive tips on how to get the most out of the Red Hat products they are using.
One of the Red Hat tools that I love to share with customers is Red Hat Insights. Red Hat Insights itself is a great tool, and is included in many Red Hat subscriptions (including Red Hat Ansible Automation Platform, Red Hat Enterprise Linux and Red Hat OpenShift). It can really help you understand risks within your environment and any areas you should be focusing on...?more
When determining the next steps of your professional development journey, you want to make sure you are on the right path to meet your goals. Red Hat Training and Certification offers guided learning pathways for individuals of all experience levels, covering topics such as deploying containers, developing containerized applications, managing container storage and using automated DevOps pipelines.
With so many options available, Red Hat is committed to making the process easy to navigate so you can understand what courses are aligned with your professional journey. ...?more