IT News and Events
ITProToday: Give Your Databases the Protection to Stand Up to Any Threat (May 30th)
May 15th, 2023 — May 21st, 2023 Generate the Custom HTML Email for this Issue
IT News and Events IT News and Events
Volume 302, Issue 3 << Previous Issue | Next Issue >>
IT News - CxO
disable
AI Push Or Pause: CIOs Speak Out On The Best Path Forward
Recent advances have highlighted AI's incomparable potential and not yet fully fathomed risks, placing CIOs in the hot seat for figuring out how best to leverage this increasingly controversial technology in business. Here's what they have to say about it.
With the AI hype cycle and subsequent backlash both in full swing, IT leaders find themselves at a tenuous inflection point regarding use of artificial intelligence in the enterprise.

Following stern warnings from Elon Musk and revered AI pioneer Geoffrey Hinton, who recently left Google and is broadcasting AI's risks and a call to pause, IT leaders are reaching out to institutions, consulting firms, and attorneys across the globe to get advice on the path forward.

CIO, Wednesday, May 10,2023
(Get More Information . .) open to premium members only

Cloud Modernization Boosts Market Valuation, Deloitte Finds
Strategic cloud investments amplify the impact of other technologies on how investors value companies, the consulting firm found.
Strategic investments in cloud migration, cloud-native projects and related cyber and machine learning services deliver outsized impact on market valuation and shareholder returns, according to a Deloitte report published Tuesday. The consulting firm analyzed the financial statements and technology spending of more than 4,500 companies over a 10-year period.

Spending on cloud acts as a force multiplier, the report found, adding long-term value to investments in automation, cyber, IoT and other individual technologies. Cloud investments yielded roughly three-times the market value compared to cyber investments alone, the analysis found.

CIODIVE, Friday, May 12,2023
(Get More Information . .) open to premium members only

Top Supply Chain Technology Trends For 2023
As organisations place greater emphasis on supply chain management, Chief Supply Chain Officers (CSCOs) intend to grasp their collective opportunity to invest in growth through new technology investments.
In a survey of 499 supply chain leaders from October through December 2022, 65% of respondents said they anticipate it will be easier to fund new technology investments with 73% of supply chain IT budgets this year to be allocated to growth and performance enhancements, on average.

'The last three years of uncertainty have blurred the line between business and technology strategies to the point that they must be considered together,' said Simon Jacobson, VP analyst in Gartner's Supply Chain Practice.

FutureCIO, Friday, May 12,2023
(Get More Information . .) open to premium members only

Data Deluge Is Causing 87% Of Leaders To Suffer Decision Distress
The study, The Decision Dilemma, by Oracle and Seth Stephens-Davidowitz, data scientist and author of Everybody Lies and Don't Trust Your Gut, reveals that people feel overwhelmed and underqualified to use data to make decisions and this is hurting their quality of life and business performance.
The study of more than 14,000 employees and business leaders across 17 countries, including 4,500 respondents from Asia Pacific and Japan (JAPAC), found that people are struggling to make decisions in their personal and professional lives at a time when they are being forced to make more decisions than ever before.

Overwhelmed by data and amount of decisions to make

The study noted that people in JAPAC are overwhelmed by the amount of data and this is damaging trust, making decisions much more complicated, and negatively impacting their quality of life.

FutureCIO, Wednesday, May 10,2023
(Get More Information . .) open to premium members only

Calling Everything Digital Transformation Is A Recipe For Mediocrity
We should save the word transformation for when we fundamentally change how things work. Otherwise, everything is transformational -- even the new coffee machine in the kitchen. Here's the basis of my reasoning: Words have meaning.
Or they should have. Suppose I said, 'Let's transform our workforce?' Would you think I meant that everyone gets a raise? Or am I talking about retrenchments and restructuring? The latter would be the guess of most employees. If I said, 'Let's upgrade our workforce,' it would have a different meaning for employees. And if I said, 'We want to upgrade our customer support system,' it would be different to transforming the system.
InformationWeek, Thursday, May 11,2023
(Get More Information . .) open to premium members only

5 Digital Transformation Examples
The term 'digital transformation' can be defined broadly, encompassing many ideas and largely tied to an organization's specific goals. For example, a digital transformation might entail a business switching from paper forms to a cloud-based system for better recordkeeping, or developing an application to improve customer engagement options.
Typically, pursuing a digital transformation means prioritizing tools that enhance a company's operations, profits, growth potential and more. Here are five examples of what a digital transformation could look like for a modern business to use as inspiration for progress at your own organization.

1. Digital Transformation Creates Strategic Advantage For A Healthcare System

2. A Data-Centric Plan Helps A Multinational Food And Beverage Brand Excel

3. Digital Supply Chain Planning Improves Pandemic Coping

4. Electronics Brand Aims For An Omnichannel Approach

5. Cloud Computing Helps The University Of Bristol Reach More Students

Datamation, Monday, May 8,2023
(Get More Information . .) open to premium members only

The (Not So) Hidden Costs Of Delaying Application Modernization
CIOs are scrutinizing IT budgets closely as economic volatility increases. While application modernization is cited by 87 percent of IT, security, and executive leaders as critical to digital transformation success, 42 percent are experiencing budget constraints to fund such initiatives.
However, if organizations wait to modernize, problems will grow exponentially. An independent survey commissioned by EvolveWare found that 51 percent of organizations already have faced or anticipate critical issues with systems that have not been modernized. It's a situation that the Federal Aviation Administration (FAA) and Southwest Airlines experienced not too long ago.

The FAA's legacy air traffic safety system failed on January 11, 2023, because of a corrupt file, bringing down both primary and backup systems. This error resulted in the cancellation of 9,000 flights that day. Similarly, Southwest Airlines' legacy point-to-point system that planned the placement of resources for its flights could not keep pace in re-assigning planes and staff to routes that were facing delays and cancellations due to bad weather.

Solutions Review, Friday, May 12,2023
(Get More Information . .) open to premium members only

Company Executives Can't Afford To Ignore Cybersecurity Anymore
Asked about the Board and C-Suite's understanding of cybersecurity across the organisation, only 39% of respondents think their company's leadership has a sound understanding of cybersecurity's role as a business enabler, according to Delinea.
36% believe that it is considered important only in terms of compliance and regulatory demands, while 17% said it is not seen as a business priority.

The disconnect between business and security goals appears to have caused at least one negative consequence to 89% of respondents' organisations, with 26% also reporting it resulted in an increased number of successful cyberattacks at their company.

The impact of misaligned goals on cybersecurity was wide-ranging as it contributed to delays in investments (35%), delays in strategic decision making (34%), and unnecessary increases in spending (27%).

HelpNet Security, Wednesday, May 10,2023
(Get More Information . .) open to premium members only

The Evolution Of The Chief Data Officer (CDO) And What It Means For Businesses Today
In 2015, Gartner defined the role of the chief data officer (CDO) as 'a senior executive who bears responsibility for information protection and privacy, governance, data quality and life cycle management, along with exploiting data assets to create business value.' That is quite the list, but one that I'm sure any early CDO would likely recall and agree with.
Over the last eight years, the CDO has earned greater credibility across organizations and become a valued partner in the delivery of competitive business outcomes. The broad scope hasn't changed, but the CDO now has greater power to influence strategy and prioritize activities.

Below I'll outline the factors pushing this evolution and what the CDO's blueprint looks like moving forward.

VentureBeat, Saturday, May 13,2023
(Get More Information . .) open to premium members only

CISOs Face Mounting Pressures, Expectations Post-Pandemic
Proofpoint's 2023 Voice of the CISO report shows deep concern among executives about impending data loss and exposure from negligent -- and malicious -- employees.
You can listen to this article. This audio was generated by AI.

According to a new survey, some CISOs feel the growing pressures and expectations around data protection in the post-pandemic threat landscape are becoming insurmountable.

Proofpoint's 2023 Voice of the CISO report revealed growing doubt among CISOs in their ability to successfully protect their organizations from data exposure and theft. According to the survey, which featured 1,600 respondents from around the world, 61% of CISOs felt their organizations are unprepared to cope with a targeted attack, up from 50% in 2022.

SearchSecurity, Wednesday, May 10,2023
(Get More Information . .) open to premium members only

CISOs' Confidence In Post-Pandemic Security Landscape Fades
Most CISOs have returned to the elevated concerns they experienced early in the pandemic, according to Proofpoint.
Globally, 68% of surveyed CISOs feel at risk of a material cyber attack, compared to 48% the year before, when they may have felt a brief sense of calm after successfully navigating the chaos of the pandemic.

This year's data represents a shift back to 2021, when nearly two thirds of CISOs believed a material attack was imminent. It's notable that UK CISOs feel most at risk globally (84%) in 2023, compared to 60% last year and 81% in 2021.

While organizations have largely overcome the disruptions of the last two years, the effects of the Great Resignation and employee turnover continue to linger, exacerbated by the recent wave of mass layoffs-It's interesting to see that 73% of CISOs believe they have adequate data protection in place yet 74% of UK security leaders had to deal with the loss of sensitive information in the past 12 months.

There is a trend to these data loss events also, as 84% of UK CISOs say that employees leaving the organization played a role in a data spill.

HelpNet Security, Friday, May 12,2023
(Get More Information . .) open to premium members only

A Guide To Data Governance: 5 Elements In Top Models
Boost your organization's potential with comprehensive data governance, from C-suite support to data quality assurance, retention rules and more.
As critical as data is for organizations to flourish in today's economy, simply collecting and storing data without a data governance policy leaves an organization without a structure to handle the information.

Only 49% of enterprise decisions are driven by data and only 10% are powered by insights, said Arnab Sen, Tredence, Inc. vice president of data engineering. Yet it's the data that will provide more benefits. 'C-level leaders and teams are developing strong data management programs that can evolve to meet the latest business, customer, operational and regulatory requirements.'

CMSWIRE, Wednesday, May 10,2023
(Get More Information . .) open to premium members only

General Dynamics IT Takes Multicloud Strategy To The Next Level
Having closed its last data center, the aerospace and defense contractor's IT division is delving deeper into cloud-native applications to optimize performance, scalability, and costs in the cloud.
These days, to serve the backbone corporate needs for more than 100,000 employees globally means betting big on the cloud.

That's what James Hannah, SVP and global CIO of General Dynamics Information Technology, has done in support of the Reston, Va.-based aerospace and defense contractor's 10 business units, each of which has its own CIO who works autonomously to make decisions about each division's use of digital technologies for its unique business.

CIO, Friday, May 12,2023
(Get More Information . .) open to premium members only

How Boards Can Set Enforceable Cyber Risk Tolerance Levels
Boards love to say they have low risk tolerance, but are they willing to make the expensive and painful decisions to make it truly happen?
It is becoming common for boards of directors to choose a low level of risk tolerance for the enterprise. The problem is that the action typically stops there, with the absence of any new directives to the CEO or the CFO to make different decisions in support.

The optimum next steps don't necessarily involve more money, though increased cybersecurity funding is the most obvious and often necessary move. It can also involve granting authority to make the changes needed to upgrade the enterprise's risk position.

DARKReading, Wednesday, May 10,2023
(Get More Information . .) open to premium members only

IT News - Security
disable
Refined Methodologies Of Ransomware Attacks
Adversaries were able to encrypt data in 76% of the ransomware attacks that were conducted against surveyed organizations, according to Sophos.
The survey also shows that when organizations paid a ransom to get their data decrypted, they ended up additionally doubling their recovery costs ($750,000 in recovery costs versus $375,000 for organizations that used backups to get data back). Moreover, paying the ransom usually meant longer recovery times, with 45% of those organizations that used backups recovering within a week, compared to 39% of those that paid the ransom.
HelpNet Security, Wednesday, May 10,2023
(Get More Information . .) open to premium members only

Open Source Threat Intelligence Tools & Feeds: A Complete 2023 List
The rapidly evolving cyber threat landscape demands constant vigilance from organizations seeking to protect their digital assets.
Open source threat intelligence tools and feeds have emerged as invaluable resources in this endeavor, offering insights into current trends, vulnerabilities, and threat actors. In this article, we will provide a comprehensive list of open source threat intelligence tools and feeds for 2023, equipping cybersecurity professionals and organizations with the information they need to stay one step ahead of potential cyber attacks and safeguard their systems and networks effectively.
Security Boulevard, Wednesday, May 10,2023
(Get More Information . .) open to premium members only

Hypervisor Security
Hypervisor security is the process of ensuring the hypervisor -- software that enables virtualization -- is secure throughout its lifecycle. Common security practices for hypervisors include limiting users in a local system, reducing attack surfaces and keeping systems updated.
A hypervisor is software that enables a single host device to run multiple virtual machines (VMs). Examples of hypervisors include Microsoft Hyper-V Manager and VMware vSphere. The hypervisor emulates hardware such as the central processing unit, memory and RAM.

Hypervisor security is important because, if attackers gain control of the hypervisor, they can access every VM under that hypervisor and all data stored in each VM. Additional points of vulnerability include shared hardware caches, the network and access to the physical server...

Search Security, Tuesday, May 9,2023
(Get More Information . .) open to premium members only

Advice From The ISACA Ransomware Response Checklist
A decade ago, most companies realized that being hit with a data breach was inevitable-the well-known 'when, not if' statement drove that idea home.
The time has come to make a similar realization about ransomware. Tenacious cybercrime rings and the easy availability of ransomware toolkits, as well as the financial rewards, are why ransomware attacks are increasing.

But even if an organization anticipates a ransomware attack is likely, they may not understand how vital it is to have a plan already in place, with a very detailed outline of what all parties should be doing.

When an attack happens, the immediate reaction is how to get the data back. At that point, the CISO may be getting advice from leadership, legal and others in the company on how to best approach the ransomware response.

Security Boulevard, Thursday, May 11,2023
(Get More Information . .) open to premium members only

Top 3 Trends Shaping The Future Of Cybersecurity And IAM
The need to protect sensitive information from unauthorized access and theft has never been greater, and cybersecurity and IAM technologies are evolving to meet this challenge while providing users with more convenience.
There are three key trends to watch in cybersecurity and IAM:

Organizations will prioritize identity-centric zero trust security Zero trust is a security model that assumes that all users, devices and applications are potentially compromised and should not be trusted by default. Instead, zero trust requires that all access to resources is verified and authorized on a per-user and per-device basis. Simply put, zero trust means taking an 'assume you've been breached' approach, which means that you should never trust and always verify...

HelpNet Security, Friday, May 12,2023
(Get More Information . .) open to premium members only

5 Sbom Tools To Start Securing The Software Supply Chain
Organizations can use these SBOM tools to help secure their software supply chain by understanding the components of their deployed software and applications.
Securing the software supply chain has become increasingly important over the last few years in response to numerous high-profile attacks targeting it, such as Sunburst, Log4j and Heartbleed.

One method growing in popularity is to use a software bill of materials (SBOM). Like a manufacturing-based bill of materials, an SBOM lists all the software components used to create a specific application.

SearchSecurity, Wednesday, May 10,2023
(Get More Information . .) open to premium members only

5 Facts About The Future Of Cybersecurity
Today's attackers have become increasingly elusive by generally just using stolen credentials or looking for misconfigured systems. With the evolving nature of the cyber landscape, they are taking advantage of the current geopolitical climate to exploit new areas of business operations.
Plus, as organizations are facing uncertain macroeconomic times, security risks are becoming even more challenging to detect, escalate, and manage with additional scrutiny on budgets.

Using our combined military, SOC, and internal experience, we have compiled our top five insights on how organizations can keep an eye on the most prevalent threats- and build out more robust security architectures to defend against them.

Solutions Review, Wednesday, May 10,2023
(Get More Information . .) open to premium members only

8 Tips For Successful Container Vulnerability Scanning
Container vulnerability scanning is a critical part of container security. It involves inspecting container images and their components to identify potential security issues, weaknesses or vulnerabilities.
Containers are lightweight, portable units used to package, distribute and deploy applications. They run on container engines like Docker and are managed by container orchestrators like Kubernetes.

The goal of container vulnerability scanning is to minimize the risk of deploying applications with known vulnerabilities or security flaws. This process is critical in maintaining a secure environment and ensuring the overall safety of the application infrastructure.

Cloud Native Now, Wednesday, May 10,2023
(Get More Information . .) open to premium members only

Identity Governance: Right People, Right Access, Right Time
Enterprise companies are increasing spending on software-as-a-service (SaaS) tools to enhance employee productivity and drive digital transformation projects.
In doing so, IT teams are facing new challenges to ensure the right level of access to the right people at the right time. This results in headaches for CIOs and CISOs who want to ensure organizations have the appropriate security posture while balancing other priorities. In fact, this permission sprawl for employees and extended workforce members across cloud and on-premises systems significantly increases the risk of security breaches.

According to Verizon's Data Breach Report, 82% of breaches involved a human factor such as the use of stolen credentials, phishing and misuse, among other errors. Modern identity governance solutions can ensure only the right users have the right level of access to the right systems, all to deliver better security outcomes and ensure companies pass required compliance audits.

Security Boulevard, Friday, May 12,2023
(Get More Information . .) open to premium members only

What's behind SBOM skepticism? One word: Fear
In this ConversingLabs Cafe interview, Josh Corman, founder of I Am The Cavalry, talks about what's behind industry skepticism around software bills of materials.
If there's a poster child for the increased focus and attention on the security of software supply chains, it is the SBOM, or software bill of materials. SBOMs are a critical component for operationalizing software supply chain security. Practically, SBOMs act like a list of ingredients for the software that makes up applications: calling out otherwise invisible dependencies on proprietary, open source and licensed, commercial libraries.
ReversingLabs, Wednesday, May 10,2023
(Get More Information . .) open to premium members only

9 Open Source Threat Intelligence Sources
Keeping up with cybersecurity news is a challenge. From newly discovered vulnerabilities to new attack methodologies, you live a life of 'need to know' when ability to find is difficult. As a security professional, knowing is more than half the battle.
To stay within your budget, you need the open source threat intelligence resources that provide you with the right information at the right time.

What is open source threat intelligence?

The term open source applies to any publicly available information that you can get without having to pay money for a proprietary technology or process. Open source threat intelligence is publicly available, free context into and information about:

flare, Tuesday, May 9,2023
(Get More Information . .) open to premium members only

IT News - MFA
disable
The Ultimate Guide To Multi-Factor Authentication
In today's digital age, the security of sensitive information and data is of utmost importance. Cyber criminals are constantly finding new ways to exploit security weaknesses and gain access to critical data, which can lead to identity theft, fraud, and other serious consequences.
One way to enhance security and protect against these threats is to implement multi-factor authentication (MFA). Secureflo offers MFA solutions to enhance your business's security against cyber threats.

In today's digital age, the security of sensitive information and data is of utmost importance. Cyber criminals are constantly finding new ways to exploit security weaknesses and gain access to critical data, which can lead to identity theft, fraud, and other serious consequences. One way to enhance security and protect against these threats is to implement multi-factor authentication (MFA). Secureflo offers MFA solutions to enhance your business's security against cyber threats.

Security Boulevard, Monday, May 8,2023
(Get More Information . .) open to premium members only

IT News - Storage
disable
Storage's Role In Generative AI
Generative AI continues to create industry buzz. Experts say storage plays a critical role in making the technology run.
Generative AI is rising in popularity due to a confluence of growth in IT infrastructure, including storage.

Generative AI relies on deep learning, compute and GPU, all of which have matured in the last ten years. It also needs high IOPS storage to provide fast access to large datasets tech vendors have been refining for decades as IT has continued to evolve. Storage tools such as object storage, which can scale for large datasets, and distributed parallel files systems, which provide high-performance, low-latency data processing, have been the backbone of cloud computing and the big data movement.

Search Storage, Tuesday, May 9,2023
(Get More Information . .) open to premium members only

New Moves In AFA Driven By QLC Flash
A new chapter is opening in the all-flash storage array (AFA) world as QLC flash enables closer cost comparisons with hybrid flash/disk and disk drive arrays and filers.
There are now 14 AFA players, some dedicated and others with hybrid array/filer alternatives. They can be placed in three groups. The eight incumbents, long-term enterprise storage array and filer suppliers, are: Dell, DDN, Hitachi Vantara, HPE, Huawei, IBM, NetApp and Pure Storage. Pure is the newest incumbent and classed as such by us because of its public ownership status and sustained growth rate. It is not a legacy player, though, as it was only founded in 2009, just 14 years ago.

An updated AFA history graphic - we first used this graphic in 2019 - shows how these incumbents have adopted AFA technology both by developing it in-house and acquiring AFA startups. We have added Huawei to the chart as an incumbent; it is a substantial AFA supplier globally.

Blocks&Files, Friday, May 12,2023
(Get More Information . .) open to premium members only

Ultimate Guide To Raid Levels: Definition, Types, And Uses
RAID technology helps businesses manage their hard drive storage in a variety of ways. By deploying multiple drives in a RAID configuration in a single array, storage teams can employ protective, performative or restorative technologies for hard disk drives (HDDs).
If your business is considering implementing a RAID array, learn more about each of the major configurations to decide which would be best for your organization. This guide highlights the design of each of the most popular RAID configurations as well as their advantages and disadvantages.

RAID levels explained

  • What is RAID storage?
  • How does RAID work?
  • What are the implementation types of RAID?
  • What are the different RAID levels?
  • Bottom line: Effectively using RAID in your business

What is RAID storage?

Enterprise Storage Forum, Monday, May 8,2023
(Get More Information . .) open to premium members only

Opinion: NVMe Performance Will Force Applications to Process Data Where it is Stored
As Non Volatile Memory express (NVMe) storage performance increases, application design will have to change to take better advantage of the Input/Output Operations Per Second (IOPS) and bandwidth found in locally-connected NVMe devices.
This is a hypothesis I've been developing lately now that I'm semi-retired and have more time to think. If I'm right, this will have big implications for externally attached storage with high compute requirements, which we'll get to in a moment.

I base this thinking in large part on the massive increase in Input/Output performance we have seen over the last 40 years (from 3 MB/sec to 13 GB/sec). This doesn't compare to CPU or memory performance increases, of course, and networking increases largely fall in between storage and CPU/memory.

Enterprise Storage Forum, Monday, May 8,2023
(Get More Information . .) open to premium members only

NVMe-over-Fabrics in Cloud-Native Environments
By delivering much better speed, reduced latency, and higher parallelism compared to conventional storage technologies like SATA and SAS, Non-Volatile Memory Express (NVMe) has transformed the storage business
NVMe over Fabrics (NVMe-oF) is the next frontier in unleashing the full power of NVMe storage, which is gaining popularity among cloud-native practitioners. In this piece, we'll explore NVMe-over-Fabrics (oF), diving into its advantages, disadvantages and best practices for deployment in cloud-native settings.
Cloud Native Now, Friday, May 12,2023
(Get More Information . .) open to premium members only

7 Ways To Mitigate CISO Liability And Risk
Recent civil and criminal cases have brought CISO liability questions to the fore. Learn how to understand and manage personal risk exposure as a security executive.
When a federal jury found former Uber CSO Joe Sullivan guilty of charges related to a data breach cover-up, cybersecurity leaders across the world sat up and took notice.

"Many CISOs thought, 'Should I leave this occupation?'" said Gadi Evron, CISO in residence at venture capital firm Team8, during a panel discussion at RSA Conference 2023. "'Why is the CISO the only one standing trial?"

Search Storage, Tuesday, May 9,2023
(Get More Information . .) open to premium members only

IT News - AI
disable
5 Ways AI Is Going To Change The Way You Use Google Search
Google Search results will soon display AI generated content
Google just held its I/O 2023 event, where a large amount of time was dedicated to how AI will boost the company's many platforms. Gmail, for example, is going to be able to write more detailed emails that may help you get refunds on canceled flights. Google Bard, the company's own generative AI, will integrate itself into multiple first-party apps like those on Workspace.

However, one of the more interesting parts of the presentation has to be SGE, or Search Generative Experience. This is the long-awaited generative AI update that will be coming to Google Search, giving Microsoft's Bing a new challenger. Despite the boost to Bing, Microsoft still hasn't been able to close the gap over its rival, and in the future it looks like that gap will even grow bigger.

Below is a list detailing all of the new ways SGE will change Google Search later this year.

techradar.pro, Tuesday, May 9,2023
(Get More Information . .) open to premium members only

AI To Create New Ways To Work, And Users Are All For It: Microsoft Report
Data from Microsoft's latest Work Trend Index shows that workers are set to embrace the benefits AI can offer to help boost innovation and eliminate productivity disrupters.
AI is set to completely transform the way people work, helping to reduce burnout and increase productivity - and workers are ready to embrace the change, according to Microsoft's latest Work Trend Index.

To compile its latest report, Microsoft surveyed 31,000 people in 31 countries and analyzed trillions of Microsoft 365 productivity signals, along with labor trends from the LinkedIn Economic Graph. This resulted in three key findings: an abundance of digital notifications is hampering innovation, employees want AI to help lessen their workloads, and employees at all levels of a business should be given training to help them best leverage AI.

ComputerWorld, Tuesday, May 9,2023
(Get More Information . .) open to premium members only

IT News - Technology
disable
What Makes A Future Fit Technology Strategy?
The data is clear: Future fit companies outperform their peers by 1.6x. So, we get lots of questions from clients asking, 'How do I get future fit?'
Over the last few months, we published three case studies detailing the future fit technology strategies of the inaugural winners of Forrester's Technology Strategy Impact Awards - Oshkosh Corporation (NA), Enel (EMEA), and Sportsbet (APAC). These companies had unique approaches to developing future fit's core drivers - platforms, practices, partners, and people.
searchCIO, Friday, May 12,2023
(Get More Information . .) open to premium members only

Learning Management System (LMS)
A learning management system is a software application or web-based technology used to plan, implement and assess a specific learning process.
It's used for e-learning practices and, in its most common form, consists of two elements: a server that performs the base functionality and a user interface (UI) that is operated by instructors, students and administrators.

Typically, an LMS provides an instructor with a way to create and deliver content, monitor student participation, and assess student performance. It might also provide students with interactive features, such as threaded discussions, video conferencing and discussion forums.

searchCIO, Friday, May 12,2023
(Get More Information . .) open to premium members only

IT News - Operations
disable
MTTR vs. MTBF: What's The Difference?
Businesses rely every day on various systems and pieces of equipment to keep their operations running smoothly. But all systems inevitably require upkeep. It could be intangible software, like an IT service network that has accumulated enough bugs to break an important feature, sending developers scrambling for a fix. Or it could be a piece of physical equipment, like an ice cream machine in a fast food restaurant with a broken o-ring.
Eventually, everything breaks down, from multi-site IT systems down to individual light bulbs. Unplanned downtime can have catastrophic consequences, and it's up to facility maintenance engineers and technicians to plan ahead so that swift measures are taken to rectify a failure. The goal is to minimize downtime, reducing the costs associated with lost productivity, revenue or customer dissatisfaction.

Downtime can be minimized in many ways. For example, businesses can aim to reduce the amount of time it takes to repair a piece of equipment by having sufficient replacement parts accessible to technicians on-site. Or, they can observe repair processes to find faster ways to perform repairs or quicker ways to notify technicians. Even further, they can make investments in better-performing tools with longer lifespans to reduce the number of repairs needed.

IBM, Friday, May 12,2023
(Get More Information . .) open to premium members only

Edge Data Center
An edge data center is a small data center that is located close to the edge of a network. It provides the same device found in traditional data centers but is contained in a smaller footprint, closer to end users and devices.
Edge data centers can deliver cached content and cloud computing resources to these devices. The concept works off edge computing, which is a distributed IT architecture where client data is processed as close to the originating source as possible. Because the smaller data centers are positioned close to the end users, they are used to deliver fast services with minimal latency.

In an edge computing architecture, time-sensitive data may be processed at the point of origin by an intermediary server that is located in close geographical proximity to the client.

Search Data Center, Tuesday, May 9,2023
(Get More Information . .) open to premium members only

3 Tips For Enterprise Patch Management
We have recently concluded the first quarter of 2023, and there have already been over 250 patches for the many components and flavours of Microsoft's operating systems, as well as a handful of patches for Adobe, Apple, and Android.
If you are a computer professional, you have also had to patch various other enterprise-class hardware and software assets in your environment.

With all of the technology we have today, installing software updates has become a near-daily, full-time activity. Patch management for large-scale enterprise IT systems can be one of the most stressful parts of an IT professional's job.

Fortra, Wednesday, May 10,2023
(Get More Information . .) open to premium members only

Us Data Center Market Nears Full Capacity
Demand for data center infrastructure persists amid power limitations, supply chain issues, and rising costs.
The North American data center market is at near capacity, which means that enterprises looking for colocation services may not be able to get the space they need at the data center they want, or they may have to pay a premium for it.

Market researcher datacenterHawk, which helps companies search for colocation and cloud service providers, says that the North American data center market is facing record-high demand, although the rate of growth has slowed somewhat due to economic headwinds.

Networkworld, Wednesday, May 10,2023
(Get More Information . .) open to premium members only

IT News - BI
disable
Nine Things I Learned At Tableau Conference 2023
Tableau Conference 2023 wraps up today in Las Vegas after a three-day run, sending thousands of people back to the data sources from where they came. While data camp might be over for now, the lessons will hopefully endure. Here are nine things I learned about the company while attending the show.
Tableau has the sort of huge, engaged customer base that many brands would love to have. When Salesforce bought Tableau for almost $16 billion in 2019, the company had 86,000 customers. That number had increased to 121,000 by 2021, and by one count it now has north of 126,000 customers.

That extended 'data fam' showed up in large numbers this week for Tableau Conference 2023, which was held at the Mandalay Bay hotel in Sin City. More than 5,000 people attended the conference, which was twice the figure from last year, the company said. Next year's conference will be in San Diego in May. Can it double attendance again and bring 10,000 to America's Finest City?

datanami, Friday, May 12,2023
(Get More Information . .) open to premium members only

Gartner Identifies The Top 10 Data And Analytics Trends For 2023
Gartner Analysts Are Discussing How Organizations Can Leverage These Trends at the Gartner Data & Analytics Summit, May 8-9, in Mumbai, India
Gartner, Inc. identified the top 10 data and analytics (D&A) trends for 2023 that can guide D&A leaders to create new sources of value by anticipating change and transforming extreme uncertainty into new business opportunities.

'The need to deliver provable value to the organization at scale is driving these trends in D&A,' said Gareth Herschel, VP Analyst at Gartner. 'Chief data and analytics officers (CDAOs) and D&A leaders must engage with their organizations' stakeholders to understand the best approach to drive D&A adoption. This means more and better analysis and insights, taking human psychology and values into account.'

Gartner analysts presented the top 10 D&A trends business and IT leaders must engage and incorporate into their D&A strategy (see Figure 1) at the Gartner Data & Analytics Summit, taking place in Mumbai through today.

Gartner, Tuesday, May 9,2023
(Get More Information . .) open to premium members only

IT News - HR
disable
Why Are Layoffs Ineffective?
The Hidden Costs of Layoffs in the Tech Industry: Why Short-Term Savings Can Have Long-Term Consequences
In the past few months, the technology industry has been in the news, with several tech companies, including Google, Facebook, Microsoft, and Amazon, announcing mass layoffs, with other companies following suit. While the general perception behind layoffs is that they are due to these companies losing money, there can be several other reasons behind them.

One reason for the layoffs could be a change in the company's strategy or business focus. Companies may decide to shift their focus to different areas or projects, and as a result, they may need to restructure their workforce. In such cases, layoffs may be necessary to eliminate positions that are no longer needed or to consolidate roles and responsibilities. Another reason could be related to the company's performance or growth.

CXOtoday.com, Wednesday, May 10,2023
(Get More Information . .) open to premium members only

IT News - Server
disable
7 Best Rack Servers Of 2023
Rack servers are crucial for companies that need a robust computing infrastructure to support their operations. With the technology constantly improving, many rack servers are on the market, each with special characteristics and abilities.
To assist you in making an informed choice and enhancing your data center's performance, we have compiled a list of the 10 best rack servers for 2023. Regardless of your company's size, we have you covered!
  • Dell EMC PowerEdge R760: Best for large enterprises and businesses
  • IBM Power S1024 Server: Best high-performance rack server (Read more)
  • HPE ProLiant DL320 Gen11 Server: Best for small and medium-sized enterprises
  • Oracle Server X9-2: Best for customizability and advanced security
  • Inspur NF5468A5: Best for maintenance and upgradeability
  • Cisco UCS C240 M7: Best for Cisco ecosystem integration
  • Lenovo ThinkSystem SR650 V3: Best budget rack server

Best Rack Servers Comparison

ServerWatch, Friday, May 12,2023
(Get More Information . .) open to premium members only

IT News - FOSS
disable
Open Source At America's Famous Los Alamos Lab: Pragmatism As Its Nucleus
Its 20,000-node cluster uses outdated MariaDB - for very good reasons
Established 80 years ago this year, Los Alamos National Labs remains most famous for its central role in developing the first atomic bomb. But that belies the breadth of scientific research it has undertaken since, encompassing physics, chemistry and biology, and addressing the threat of COVID-19.

Despite the breadth of subjects the US Department of Energy institution researches, its thousands of scientists have one need in common: data. One of the people ensuring they get it is Steven Senator, deputy group leader of the lab's high-performance computing division.

The Register, Wednesday, May 10,2023
(Get More Information . .) open to premium members only

LibreOffice 7.4.7 Community
The Document Foundation releases LibreOffice 7.4.7 Community, the seventh and last minor release of the LibreOffice 7.4 line, which is approaching the end of life [1]. The new release is immediately available for Windows (Intel and Arm processors), macOS (Apple and Intel processors), and Linux.
LibreOffice offers the highest level of compatibility in the office suite market segment, with native support for the OpenDocument Format (ODF) - beating proprietary formats for security and robustness - to superior support for MS Office files, to filters for a large number of legacy document formats, to return ownership and control to users.

LibreOffice Technology Platform

Products based on the LibreOffice Technology platform - the transactional engine shared by all LibreOffice based products, which provides a rock solid solution with a high level of coherence and interoperability - are available for major desktop operating systems (Windows, macOS, Linux and Chrome OS), for mobile platforms (Android and iOS), and for the cloud.

The Document Foundation, Thursday, May 11,2023
(Get More Information . .) open to premium members only

The Future Of Open Source In The Age Of AI: Analysts Break Down Open Source Summit Insights
Open-source computing is facing an inflection point when it comes to enterprise use cases.
The recent surge in artificial intelligence presents a challenge to open source and could potentially topple generations of open-source work.

'No one wants to bet against open source,' said industry analyst John Furrier (pictured, left). 'However, open source is in trouble right now because of the AI wave. We're seeing a lot of signals where there are pressure points coming in this tornado of open source that puts a lot of things at risk.'

The organizational model, project model, licensing model and human equation are all areas of concern for open source in the face of the AI surge. However, startups, companies and non-profits will all leverage the value of open source, and finding a balance between using open source and making money will be important, Furrier added.

SiliconANGLE , Wednesday, May 10,2023
(Get More Information . .) open to premium members only

IT News - Cloud
disable
Why DevOps and CloudOps are Critical for Successful Cloud Implementations
The advent of cloud computing has transformed the way businesses operate, allowing them to access scalable resources and improve their agility. Cloud computing has enabled organizations to quickly and easily provision resources on-demand, resulting in faster time-to-market and reduced costs.
However, the rapid adoption of cloud technology has led to the emergence of new challenges, such as ensuring security and compliance, managing costs, and optimizing performance. To address these challenges, organizations are turning to DevOps and CloudOps methodologies to enhance their cloud implementations.

PeoplActive is an ISO 27001:2013 certified leading tech hiring platform. By utilizing an exclusive network of 4000+ Silicon Valley caliber tech talent specialized in 100+ in-demand IT skills, it was pretty easy for businesses to hire game-changing Engineers and developers in just 48 hours. So, if you want to accelerate your business, schedule a quick call with our experts now.

Security Boulevard, Friday, May 12,2023
(Get More Information . .) open to premium members only

Enterprises Move To The Edge, But The Edge May Not Be Ready
Making the leap from collecting operational IoT data to IoT insights is not a trivial task -- and a lot of companies are struggling.
For years, we've heard that our best bet is to put everything into the cloud. Now, the computing action seems to be moving away from centralized services out toward the edge -- embedded systems, sensors, kiosks, point-of-sale terminals, mobile devices, wearables, robots, the internet of things, you name it. They demand resident software, and produce and store local data. This means software and data run -- and require support -- at a million different locations. How should technology professionals prepare for this ever-edgy state of things?
ZDNet, Wednesday, May 10,2023
(Get More Information . .) open to premium members only

How To Get Your Enterprise Data Center Storage Deployments Edge Ready
In this article, learn best practices for preparing enterprise data center storage deployments to be edge ready.
By 2025, more than 40% of enterprise storage will be deployed at the edge, which is a significant increase from 15% in 2022. Also, large enterprises will triple their unstructured data capacity stored as file or object storage on-premises, at the edge, or in the public cloud by 2025 compared to 2022.

Infrastructure and operations leaders are expanding storage beyond the traditional data center towards the public cloud and the edge to deliver data services close to or at the location where the data is generated or consumed rather than in a centralized environment. In that way, companies will no longer have to wait for data transmission times across a wide area network to or from a central point, allowing for enhanced efficiency and productivity while also enabling network resilience and location flexibility.

Data Center Knowledge, Wednesday, May 10,2023
(Get More Information . .) open to premium members only

IT News - DR
disable
Business Continuity Basics: How To Plan And Carry Out Exercises
Business continuity plans and strategies require the involvement of many different members of your organization, but to be effective during a crisis, these individuals need to have practiced their roles. This is where business continuity exercising comes in, as Julie Miranto explains...
What is a business continuity exercise and why are they important?

Running business continuity exercises gives the executive leadership team of an organization and other designated incident responders the opportunity to play out realistic disaster scenarios that could disrupt their regular business. How would they react? Do they have a thorough understanding of the incident response plans and protocol in place, and can they effectively act in a moment of crisis? Exercises put business continuity plans and their application to the test.

During exercises, plan participants face various problems to solve as if disaster was striking in real-time. Depending on your company's unique goals, multiple types of exercises could be effective.

Ultimately, the goal is for organizational leaders and plan participants to become familiar with business continuity strategies. These exercises also help companies improve their plans to better address the organization's current needs.

Continuity Central, Friday, May 12,2023
(Get More Information . .) open to premium members only

IT News - Compliance
disable
The Data Protection Act 2018 - A Five Year Reflection
In the wake of TikTok being fined 12.7m UK pounds by the Information Commissioner's Office ('ICO'), we look at some of the key data protection issues in the UK. We consider what you should be doing in your business as we approach the fifth anniversary of the General Data Protection Regulation 2016/679 ('GDPR').
In the UK, data protection is governed by the Data Protection Act 2018, which implements the GDPR. The GDPR came effect on 25 May 2018 and strengthened the rights of data subjects in the EU (of which the UK was still part). It also increased enforcement of breaches of data protection principles. The GDPR was a pivotal moment in the commitment of the EU to data privacy.

The Data Protection Act 2018 sets out the rules for collecting and processing personal data. The definition of personal data is now much wider than the previous definition of personal data. It now includes any data which can identify a living person, such as name, address, date of birth, IP address, picture, social media handles, bank details, medical records etc.

enterprise times, Friday, May 12,2023
(Get More Information . .) open to premium members only

IT News - Big Data
disable
Data Catalog Tools
Data catalog tools work with data catalogs to make them more efficient. Data catalogs typically come with tools included as part of the data catalog package. The tools included with data catalogs have been developed to support data quality, analytics, and compliance with data privacy regulations. Unfortunately, the number of independently sourced tools for data catalogs is essentially nonexistent.
Generally speaking, the independent tools described in various articles as supporting data catalogs are data analytics platforms, which use the data catalog as a tool.

In most articles titled 'Data Catalog Tools,' the topic ends up being about data catalogs, not the tools designed to supplement them. (Software developers take note: The sheer volume of searches suggests a need for data catalog tools.)

Data catalogs are used to develop and store the detailed inventory of an organization's data assets and are designed to help researchers locate useful data, as needed. They use metadata - a label using data to summarize and identify data files and assets - to collect, organize, and access the data, and to support a searchable inventory for the organization's data.

Dataversity, Wednesday, May 10,2023
(Get More Information . .) open to premium members only

Sections in this issue:
click to jump to section