IT News and Events
Sep 9th, 2019 — Sep 15th, 2019 Generate the Custom HTML Email for this Issue
IT News and Events IT News and Events
Volume 258, Issue 2 << Previous Issue
IT News - CxO
disable
5 Must-Read Harvard Business Review Articles In September
Check out these five thought-provoking HBR articles, curated especially for CIOs and IT leaders
Carla Rudder writes in The Enterprisers Project, "Each month, through our partnership with Harvard Business Review, we refresh our business library for CIOs with five new HBR articles we believe CIOs and IT leaders will value highly. These curated pieces are available now through the end of September....

  • 3 core principles of successful remote work
  • How to speak up in a meeting, and when to hold back
  • 5 ways to leave your work stress at work
  • How to challenge your own expertise
  • 3 ways to make empathy part of your culture
  • Executive's guide to real-world AI ...

Read on for details.

The Enterprisers Project, September 2nd, 2019
(Get More Information . .) open to premium members only

The Rise Of The Chief Digital Officer
As digital transformations become increasingly customer-centric, organizations are looking for leaders to drive change with the customer in mind. Enter the CDO
"The C-suite is growing increasingly crowded as organizations are bringing in a variety of new roles," notes Esther Shein in CIO, "including chief digital officers, who often work in tandem with CIOs on digital transformation initiatives on an enterprise-wide basis and rethink how to best serve customers. But what exactly do CDOs add to the C-suite mix, and why are so many organizations turning to them these days?..."
CIO, September 3rd, 2019
(Get More Information . .) open to premium members only

Digital Transformation: What Keeps CEOs Awake At Night?
Here are the top four concerns bugging CEOs and board members about digital makeovers -- and fixes CIOs can apply to mitigate the impact of those worries
"Most organizations are embarking on digital transformation, according to surveys. But how many are doing it well, efficiently or strategically?" asks Brad Fisher in InformationWeek.

"That's surely a much smaller share of the total, as planning and executing a comprehensive, enterprise-wide digital makeover is a large and daunting endeavor.

Indeed, 75% of U.S. chief executive officers surveyed by KPMG believe that the lead time to achieve significant progress on digital transformation initiatives -- such as creating an advanced-technology roadmap and overhauling large-scale IT systems -- is 'overwhelming.' With the speed of change and influx of data continuing to grow exponentially, corporate leaders are fearful that glacier-like progress can lead to corporate obsolescence..."

InformationWeek, September 4th, 2019
(Get More Information . .) open to premium members only

2020 Budget Planning: Tech Leaders Prioritize Efficiency, Business Outcomes
Analysts expect global tech investment in 'new tech' initiatives including AI and automation will hit the $1 trillion mark next year
"With a recession marker or two flashing red for the year ahead, tech managers are setting 2020 budget priorities with an eye toward maximizing resource efficiency, with data analytics and automation leading the way," writes Roberto Torres in CIO Dive.

"At data analytics firm Talend, a 2020 budget priority will be investing to increase the analytical capabilities of its sales and marketing outfits, CEO Mike Tuchen told CIO Dive..."

CIO Dive, September 4th, 2019
(Get More Information . .) open to premium members only

CISOs Turn To AI, Detection, Response And Education
Information security leaders are looking to artificial intelligence, better detection and response capabilities and user education in the face of cyber threats, but need more budget, a study shows
Warwick Ashford writes in ComputerWeekly, "The majority (84%) of chief information security officers (CISOs) polled around the globe expect the risks of cyber attacks to increase, according to a study commissioned by security firm Fortinet.

Almost a quarter of the more than 200 respondents believe the capabilities of attackers are outpacing their ability to defend their organisation..."

ComputerWeekly, September 3rd, 2019
(Get More Information . .) open to premium members only

IT News - Storage
disable
HDD Capacity Threshold Reaches 20TB
Less than 12 months ago, we were talking about the release of 15TB drives from Western Digital (WDC)
"Today 18TB (CMR) and 20TB (SMR) drives are about to be released for sampling to customers," reports Chris Evans in architectingIT.

"The relentless momentum of the HDD industry is pushing us closer to the mythical 100TB HDD. Will flash ever catch up?

The latest WDC announcements extend the Ultrastar DC HC5xx series to 18TB with the DC HC550 in a standard 3.5" form factor using 9 platters. There are now no single-digit drives in this family - capacities start at 10TB with 12TB, 14TB and now 18TB models. No performance figures have been made available (yet), but looking across the range, we can expect a slight increase in throughput compared to the 14TB generation...."

architectingIT, September 4th, 2019
(Get More Information . .) open to premium members only

IT News - AI
disable
What Enterprises Intend To Do With Artificial Intelligence
Survey shows business process automation and customer support are the low-hanging fruit with initial AI rollouts, but many organizations are moving on to tackle data analytics
"Why do enterprises buy into artificial intelligence systems?" asks Joe McKendrick in ZDNet.

"Where are they investing the most? As you go to your C-suites and boards with new concepts, where should you direct your pitches? Business process automation and customer support are foremost on the minds of executives and managers buying or implementing AI systems, and where many of the budget dollars..."

ZDNet, September 7th, 2019
(Get More Information . .) open to premium members only

IT News - Technology
disable
USB4 Brings Better Speeds And Compatibility - But Loses The Space In The Name
The organizations behind the widely used USB standard have released some new info on the latest iteration of the interface, and it's nothing but good news for consumers
Devin Coldewey writes in Tech Crunch, "It'll be faster and bring improved compatibility, with no need to pay close attention to which cable or port you're using. And pedants take note: there's no longer a space after 'USB' and the number.

USB4, as it's now styled (versus USB 4), was announced in March with a few promises regarding features, but now the actual technical specifications have been released to anyone who cares to inspect them. It's another step in the process of bringing a major standard from idea to reality.

There are three main improvements in USB4 over USB 3 (or 3.2, or 3.1 gen2v2. the naming system is a mess):..."

Tech Crunch, September 4th, 2019
(Get More Information . .) open to premium members only

IT News - Humor
disable
Memory-Lane Monday: Write Once, Use Never
Hey, don't worry about it; in a few years, no one will know what a DVD is.
"It's the early aughts, and IT department trainee gets the task of sorting through a pile of unlabeled recordable DVDs, reports the pilot fish who assigned him to the job.

'I asked him to check the DVDs one by one, discard obsolete data, sort blank media and label the rest of them according to their contents,' fish says..."

ComputerWorld, September 3rd, 2019
(Get More Information . .) open to premium members only

Throwback Thursday: Motivation
How about never? Does never work for you?
"Pilot fish gets tapped to install a secure version of FTP on an existing FTP server. But figuring out when to do it turns out to be a challenge.

'The FTP server gets a lot more use than anyone realizes, because many of our processes are automated and EDI-related,' says fish. 'The new install will require some downtime for a reboot and configuration'..."

ComputerWorld, September 5th, 2019
(Get More Information . .) open to premium members only

IT News - Security
disable
The Future Of Passwords
Why aren't passwords secure enough? Over-use? Lack of updating? Simplicity? Ease of Guessing?
Kris Spisak writes in Business 2 Community, "There's an old Popeye cartoon where the famous sailor with massive forearms stands outside a cave that's blocked by a giant boulder, and he yells, 'Open Says-Me.' 'Open sesame' wordplay aside, if only passwords were this simple.

Password security is not a new conversation. Protecting yourself in the digital world is the responsibility of everyone. Popeye and Olive Oyl included, I suppose - though I'm not sure if they ever adapted to the tech revolution..."

Business 2 Community, September 3rd, 2019
(Get More Information . .) open to premium members only

What VPN Users Need To Know About DNS Leaks
Technology is constantly evolving and new threats to online privacy are no different. While many people already take precautions such as using VPNs (Virtual Private Networks) to keep their web browsing private, these are not universal solutions and it is still important to stay on top of new threats when they are discovered
"One vulnerability which VPN users who wish to keep their web browsing private should be aware of is DNS leaking," warns Niels Bosch in AmongTech.

"DNS leaking can potentially reveal your entire web browsing history to your ISP (Internet Service Provider) and compromise your privacy - even when you are using a VPN. While it is not a cause for concern to VPN users who simply wish to view streaming site content in other countries or take advantage of regional pricing on flight tickets, VPN users who wish to protect their privacy should take precautions to prevent DNS leaking. So what really are DNS leaks - and how do you prevent them?..."

AmongTech, September 7th, 2019
(Get More Information . .) open to premium members only

8 Ways To Spot An Insider Threat
The good news is most insider threats derive from negligence, not malicious intent. The bad news is the frequency of negligence is already ahead of where it was in 2018
"When the challenge of battling inside threats arises, it's tempting to dismiss the process as little more than identifying the rogue employee(s), along with reviewing and refining permissions, controls, and authorizations to prevent recurrence. Depending on the industry, some public apologies may need to be made and some regulatory fines may need to be paid," notes Terry Sweeney in InformationWeek.

"The good news and the bad news with insider threats? The good news is most insider threats derive from negligence, not malicious intent, as Katie Burnell, global insider threat specialist at security vendor Dtex Systems, explained in a November Dark Reading webinar about the insider threat. The bad news, she said, is the frequency of negligence is already ahead of where it was in 2018..."

InformationWeek, September 6th, 2019
(Get More Information . .) open to premium members only

3 Promising Technologies Making An Impact On Cybersecurity
The common thread: Each acts as a force multiplier, adding value to every other security technology around it
"A few weeks ago, while attending Black Hat 2019, I was invited to participate in a Dark Reading technology panel hosted by editor Tim Wilson. The discussion focused on new types of technologies that can truly improve cybersecurity defenses," reports Jon Oltsik in Dark Reading.

"My first instincts were to go with some of the product categories I research daily. For example, I could have described how machine learning algorithms can improve security analytics or vulnerability management..."

Dark Reading, September 3rd, 2019
(Get More Information . .) open to premium members only

IT News - BI
disable
Top 10 Bi Data Visualization Tools
Visual analytics is the core of business intelligence. Here are the tools you need to see through the data.
"There is golden knowledge in the sea of data that businesses are swimming in," opines Martin Heller in CIA.

"Being able to fish out the business intelligence you need - when you need it - is the key to steering your ship.

In this article, we'll discuss 10 BI tools that feature data visualization and analysis..."

CIA, September 5th, 2019
(Get More Information . .) open to premium members only

IT News - DevOps
disable
10 Pitfalls To Avoid When Implementing DevOps
Make your DevOps implementation journey smoother by avoiding the mistakes others have made
"In companies of every size, software is increasingly providing business value because of a shift in how technology teams define success," reports Mehul Rajput in opensouce.com.

"More than ever, they are defined by how the applications they build bring value to their customers. Tickets and stability at the cost of saying no are no longer the key value of IT. It's now about increasing developer velocity by partnering with the business..."

opensouce.com, September 5th, 2019
(Get More Information . .) open to premium members only

The State Of DevOps Report 2019 Is Out
The Accelerate State of DevOps Report 2019 is out like every other year. Now, let's talk about the key findings of this year's survey
"The Industry Continues to Improve, Particularly Among the Elite Performers: Proportion of high performers have tripled, now comprising 20% of all teams. This shows the improvement is real for those who really are doing the right things," notes Niladri Choudhuri in DevOps.com.

"Delivering Software Quickly, Reliably and Safely Is at the Heart of Technology Transformation and Organizational Performance: It is evident that speed, stability and availability leads to organizational performance in terms of profitability, productivity and customer satisfaction.

The Best Strategies for Scaling DevOps in Organizations Focus on Structural Solutions that Build Community: High performers favor strategies that create community structures at both high and low levels of organization. Having established community of practices, having proof of concepts, helps them become more resilient and successful. Dojos are becoming more and more important..."

DevOps.com, September 4th, 2019
(Get More Information . .) open to premium members only

IT News - Cloud
disable
Multicloud Businesses Face Higher Breach Risk
A new report finds 52% of multicloud environments have suffered a breach within the past year, compared with 24% of hybrid cloud users
"More than half of firms running multicloud environments have been hit with a data breach in the past year, compared with 24% of hybrid cloud organizations and 24% of single-cloud users," notes Kelly Sheridan in Dark Reading.

"To gain a better understanding of how the public and private sectors are engaging with the $325 billion cloud market, researchers with Nominet polled 274 CISOs, CTOs, CIOs, and other professionals responsible for cybersecurity in large organizations across the US and UK. While 61% believe the risk of a breach is the same or lower in the cloud compared with on-prem environments, it seems there is a link between the number of clouds used and risk of attack..."

Dark Reading, September 3rd, 2019
(Get More Information . .) open to premium members only

What Network Tools Are Available For Public Cloud Monitoring?
Multi-tenant public cloud monitoring can pose significant challenges. Luckily, some tools can help track these environments and even flag potential security threats
"As enterprise cloud deployments ramp up, IT groups need to confront the fog associated with tracking activity within these sometimes opaque environments," writes Amy Larsen DeCarlo in SearchNetworking.

"A survey of 338 IT professionals commissioned by network testing and security vendor Ixia published earlier this year found that 80% had expanded their cloud deployments in 2018. But less than 20% had the information they need to accurately monitor performance, security and resource usage within these environments..."

SearchNetworking, September 5th, 2019
(Get More Information . .) open to premium members only

How Much Should Enterprises Worry About Vendor Lock-In In Public Cloud?
One of the key drivers to a multi-cloud strategy is the fear of vendor lock-in
"'Vendor lock-in' means that a customer is dependent on a particular vendor for products and services, and unable to use another vendor without substantial switching costs or operational impact," writes Jay Chapel in Business 2 Community.

"The vendor lock-in problem in cloud computing is the situation where customers are dependent (i.e. locked-in) on a single cloud service provider (CSP) technology implementation and cannot easily move to a different vendor without substantial costs or technical incompatibilities..."

Business 2 Community, September 7th, 2019
(Get More Information . .) open to premium members only

IT News - Wireless
disable
Wi-Fi 6 Is Barely Here, But Wi-Fi 7 Is Already On The Way
You'll be at the point where wireless is faster than wired
"Wi-Fi 6 is just now arriving in phones, laptops and network equipment," notes Stephen Shankland in CNET. "But engineers are already turning their attention to what'll come next: Wi-Fi 7. With speeds as high as 30 gigabits per second, the next generation of Wi-Fi promises better streaming video, longer range and fewer problems with traffic congestion.

The change will come in a series of steps, beginning with improvements to Wi-Fi 6, that lay the groundwork for the expected arrival of Wi-Fi 7 in 2024..."

CNET, September 3rd, 2019
(Get More Information . .) open to premium members only

IT News - Networks
disable
Why SD-WAN Is Taking Over Enterprise Networks
The traditional connectivity model doesn't work for today's distributed enterprises
"One of the fastest growing enterprise networking technologies, SD-WAN can simplify network management and optimize connections to cloud services," reports Mary Branscombe in Data Center Knowledge.

"Leased-line and MPLS connectivity can serve your head office well, but for small branch offices and remote workers using SaaS applications the public internet is often the only option. They could be customer service agents working from home, first responders on scene, or travelling executives all using latency-sensitive voice and video services - something traditional enterprise WANs struggle to support..."

Data Center Knowledge, September 3rd, 2019
(Get More Information . .) open to premium members only

IT News - Careers
disable
Soft Skills: 10 Ways To Hire For Them
Resumes don't tell you enough about a job candidate's soft skills, such as communication or consensus-building. Use these 10 techniques to evaluate during the interview
"How important are soft skills to IT departments right now?" asksStephanie Overby in The Enterprisers Project.

"More than three-quarters (78 percent) of HR leaders say they have become more focused on finding technology employees with strong soft skills, according to a survey conducted by technology consultancy West Monroe Partners. And more than two-thirds (67 percent) say that they have withheld a job offer to an otherwise qualified technology candidate solely because of that candidate's lack of soft skills..."

The Enterprisers Project, September 4th, 2019
(Get More Information . .) open to premium members only

IT News - Virtualization
disable
Hyper-V vs. VMware Comparison: What Are The Differences?
Hyper-V and VMware are in a perpetual battle for supremacy in the virtualization market. Although the two hypervisors have similar features, capabilities are somewhat different
"For years, VMware was the only sensible choice for enterprise-class server virtualization," notes Brien Posey in SearchServerVirtualization.

"However, Microsoft made drastic improvements to Hyper-V in Windows Server 2012 and Windows Server 2012 R2. As such, it seems prudent to explore the question of using Hyper-V vs. VMware in your data center and the differences between these two hypervisors.

Both VMware and Microsoft offer highly capable platforms. Both companies have products for small shops but also sell products with features suitable for the largest enterprise environments. In fact, VMware and Hyper-V have an extremely comparable feature set. Both products offer roughly the same core feature set and support capabilities such as network virtualization, VM migration, storage migration and network interface card teaming..."

SearchServerVirtualization, September 3rd, 2019
(Get More Information . .) open to premium members only

Oracle VM VirtualBox 6.0.12
Oracle VM VirtualBox 6.0.12 release includes improvements and regression fixes for Oracle VM VirtualBox 6.0
Notable bug fixes are:

  • OCI: handle empty virtual-disk image correctly while exporting to Oracle Cloud Infrastructure
  • Windows guests: fixed mouse cursor visibility, graphics corruption in Windows 10 and shared folder issue
  • Linux Host and Guest: fixes for kernel module build for SLES-12 SP4 kernel
  • Linux Guest: fixed issue on shared folders and improved compatibility of vboxvideo kernel module build
  • USB: improved the identification of power-saved devices on Windows hosts

The Oracle VirtualBox Team

Oracle, September 4th, 2019
(Get More Information . .) open to premium members only

IT News - Developer
disable
Why I Use Java
There are probably better languages than Java, depending on work requirements. But I haven't seen anything yet to pull me away
"I believe I started using Java in 1997, not long after Java 1.1 saw the light of day," recalls Chris Hermansen in opensouce.com. "Since that time, by and large, I've really enjoyed programming in Java; although I confess these days, I'm as likely to be found writing Groovy scripts as "serious code" in Java.

Coming from a background in FORTRAN, PL/1, Pascal, and finally C, I found a lot of things to like about Java. Java was my first significant hands-on experience with object-oriented programming. By then, I had been programming for about 20 years, and it's probably safe to say I had some ideas about what mattered and what didn't..."

opensouce.com, September 3rd, 2019
(Get More Information . .) open to premium members only

Sections in this issue:
click to jump to section