IT News and Events  
February 10th, 2020 — February 16th, 2020
Volume 263, Issue 2
 
 
 
 
IBM News
Anticipating IBM's Coming Virtual Desktop Pivot
ComputerWorld, February 10th, 2020

With its recent cloud success and a new CEO, IBM is likely to put forth a powerful competitor to the coming Microsoft Azure Virtual Desktop

"This Virtual Desktop move will undoubtedly change the PC landscape, with IBM holding the strongest technological advantages...

One of the biggest mistakes IBM ever made was abandoning the desktop market, a decision it partially reversed when it partnered with Apple a few years back. But with the realization that IBM, and not Google, is the number three Cloud provider in the US - and that Microsoft is soon going to be driving its Azure Virtual Desktop to market - it seems likely that IBM may bring forth its own offering..."
more


HPE ProLiant MicroServer Gen10 Plus Announced
StorageReview.com, February 9th, 2020

HPE has announced the ProLiant MicroServer Gen10 Plus, a powerful entry-level server in an ultra micro tower form factor

"Organizations can customize the Gen10 Plus for on-premises, hybrid cloud or workloads that need datacenter performance. The server also features the latest Intel Xeon E and Pentium processors with 4x 1GbE onboard NICs and USB 3.2 Gen2 Type-A connectivity. Measuring at only 4.6 in (11.7 cm) for height, the Gen10 Plus product is half that of the previous generation (MicroServer Gen10) and can be placed either horizontally or vertically to fit a range of different use cases..."
more


IBM Watson And The Value Of Open
Forbes, February 12th, 2020

Not so long ago, back in 2011, IBM's artificial intelligence technology (later packaged and sold as Watson) triumphed in the game of Jeopardy

"Watson played against the two most successful contestants ever to appear on the show. This victory reflected the result of an enormous amount of work done by IBM and others to mine human language for the semantic meaning of words, and allow a machine to answer Jeopardy questions that would have been impossible for any computer just a few years earlier..."
more


IT - CxO
6 Keys To Digital Transformation Success
Information Week, February 14th, 2020

Nearly every enterprise is undergoing a digital transformation. Some are more successful than others. Here are 6 factors shared by the successful ones

"Digital transformation has truly arrived, with nearly all enterprise organizations are engaging in some form of transformation or else planning one. That's according to a new survey conducted by Hanover Research and commissioned by AHEAD, an enterprise cloud provider.

But how are these transformations going? That's another question entirely. A full 36% of organizations are behind schedule, according to the survey that analyzed 293 responses to the poll of key IT decision makers at US-based companies. Yet still more were on target to hit their planned schedules at 44%. Another 14% reported being ahead of schedule. Still, 6% reported being stalled..."
more


8 Ways CIOs Can Use Technology In Meetings
SearchCIO, February 13th, 2020

Meetings can be frustrating, as they often lead to scheduling and technical complications -- but today, enterprises are utilizing technology in meeting rooms to make them more beneficial

"In the workplace, meetings serve a vital role in keeping everyone on the same page, but they can also be a painful experience owing to technical glitches, scheduling challenges and lack of focus. To streamline this process, enterprises have started adopting technology in meetings..."

"Business meetings needing a makeover is not new news," said Trevor Schulze, CIO at RingCentral, a unified communications platform. "Most people feel like they're going from meeting to meeting and getting very little value out of them."
more


Average Tenure Of A CISO Is Just 26 Months Due To High Stress And Burnout
ZDNet, February 12th, 2020

Report: The vast majority of interviewed CISO executives (88%) report high levels of stress, a third report stress-caused physical health issues, half report mental health issues

"Chief Information Security Officers (CISOs, or CSOs) across the industry are reporting high levels of stress.

Many say the heightened stress levels has led to mental and physical health issues, relationship problems, medication and alcohol abuse, and in some cases, an eventual burnout, resulting in an average 26-month tenure before CISOs find new employment.

The numbers, reported by Nominet, represent a growing issue that's been commonly acknowledged, but mostly ignored across the information security (infosec) community, but one that is slowly starting to rear its ugly head as once-ignored infosec roles are becoming more prominent inside today's companies..."
more


Cybersecurity Is A Board Level Issue: 3 CISOs Tell Why
HelpNet Security, February 11th, 2020

Recognize security as both a business risk and an opportunity

"As a venture capital investor who was previously a Chief Information Security Officer, I have noticed an interesting phenomenon: although cybersecurity makes the news often and is top of mind for consumers and business customers, it doesn't always get the attention it deserves by the board of directors.

Misconceptions and knowledge gaps increase this distance between security and oversight. How can boards dive deeper into the world of security and overcome the entry barriers to collaboration?..."
more


Telltale Signs Of IT Dysfunction - And How To Fix It
CIO, February 11th, 2020

Transformational success can be derailed by a dysfunctional IT culture, the roots of which often can be traced to silos, org structures and little desire or incentive to collaborate

"The role of IT is evolving, and digital transformation has brought with it a new set of responsibilities and assumptions that can lead to IT dysfunction. An explosion of new initiatives, the need to produce more quickly, constant interaction with the business, managing third-party cloud environments instead of traditional data centers - with so much coming at IT these days, it's little wonder that organizational tensions and challenges are rising..."
more


IT - MFA
What Is Multi-Factor Authentication (MFA) & How It Works
Business 2 Community, February 12th, 2020

Here's an example of what multi-factor authentication (MFA) is not

"For instance, you head to your online bank account to login. Entering the username and password into the designated fields and click on login. From here, you've gained access to your bank information. Easy peasy and you go about your business. Wait one second! If you're one of the 54% of consumers who use five or fewer passwords for all of your online accounts, you could be setting yourself up for failure.

Recycling passwords is a big no-no. We highly advise coming up with unique passwords for all digital channels. We published a blog post discussing the importance of unique passwords and why using the same password is bad.

Let's dive right in and discuss the benefits of multi-factor authentication..."
more


IT - Storage
Enterprise HDDs Hit 20 TB, Boost Throughput In 2020
SearchStorage, February 13th, 2020

While waiting for HAMR to drop, we have more immediate spinning disk developments to watch out for in 2020, such as dual-actuator and shingled drives

"Flash and new memory technologies don't have a stranglehold on all the storage hardware innovation. Even age-old spinning disk will see new twists in 2020 and beyond.

Technologists and storage analysts predict the ramp of new hard disk drives (HDDs) with dual actuators that can boost input/output operations per second. That can help in use cases such as hard drive rebuilds and analytics applications. Experts also expect shingled magnetic recording (SMR)-enabled HDDs to become more commonplace for applications that write data sequentially. SMR HDDs have data tracks that partially overlap to increase areal density and capacity..."
more


HDD Failure Rates Based On 124,956 HDDs At Backblaze
Storage Newsletter, February 14th, 2020

Only one to have no failure: 4TB Toshiba model MD04ABA400V

"As of December 31, 2019, Backblaze had 124,956 spinning HDDs. Of that number, there were 2,229 boot drives and 122,658 data drives.

This review looks at the HDD annualized failure rates (AFR) for the data drive models in operation in our data centers. In addition, we'll take a look at how our 12 and 14TB drives are doing and get a look at the new 16TB drives we started using in 4Q19. Along the way we'll share observations and insights on the data presented..."
more


Higher-Than-Typical Failure Rate Among Some 12TB Seagate HDDs
Storage Newsletter, February 12th, 2020

Regular HDD Stats readers will recall that our blog post about 3Q19 explained that we planned to take a closer look at some drive failures we were seeing at the time and report back when we knew more

"Well, we've been monitoring the situation since then and wanted to update you on where things stand. Despite the fact that HDD Stats for 2019 are just around the corner, we decided to share this information with you as soon as we could, rather than waiting for the next post. In summary, this year (and going into the next year) we expect to see higher failure rates in some of our HDDs and we will be migrating some drives to newer models. Below, we'll discuss what's going on, what we're doing about it, and why customers shouldn't worry..."
more


Using On-Premises Object Storage Beyond Secondary Storage
SearchStorage, February 11th, 2020

On-premises object-based storage is replacing traditional storage in areas such as streaming, big data and IoT. Get the latest on how this technology is being used

"Don't look now, but on-premises object storage is being used for more than just secondary storage. It's easy to see why many storage managers still view it mostly in terms of secondary storage, since the technology fills the role previously dominated by tape, the longtime go-to secondary storage media. Yet, on-premises object data storage offers opportunities that extend far beyond tape backups.

With on-premises object storage, data can be accessed in milliseconds, not minutes. The technology offers streaming performance that can grow along with the system, a leading reason why it now provides back-end storage for video services, such as Netflix and Amazon Prime..."
more


IT - AI
Top 11 Use Cases Of Rpa In The Insurance Industry
AiTHORITY, February 11th, 2020

It is a well-known fact that the workforce in the Insurance space is heavily burdened with repetitive and mundane tasks

"Their time and skills are rarely channeled towards more value-added tasks.

Day to day tasks such as personal and commercial insurance line underwriting and onboarding, policyholder services and processing of claims, there's a myriad of important but plain repetitive work, affecting the overall organization's efficiency, affect customer satisfaction, business conversion and profitability..."
more


Explainable AI: But Explainable To Whom?
datanami, February 10th, 2020

As the power of AI and machine learning have become widely recognized, and as people see the value that these approaches can bring to an increasingly data-heavy world, a new need has arisen: the need for explainable AI

"How will people know the nature of the automated decisions that are made by machine learning models? How will they make use of the insights provided by AI-driven systems if they do not understand and trust the automated decisions that underlie them?

The biggest challenge to the next level of adoption of AI and machine learning is not the development of new algorithms, although of course that continues to be done. The biggest challenge is building confidence and trust in intelligent machine learning systems. Some call this need for confidence and trust a barrier for AI - and in a way it is - but I prefer to think of it as a very reasonable requirement of AI and machine learning. Explainable or interpretable AI involves the ability to present explanations for model-based decisions to humans. So explainable AI is of critical importance for the success of AI and ML systems. But explainable to whom?..."
more


2020 Brings Opportunity For Augmented Intelligence
AiTHORITY, February 12th, 2020

In the last decade, the arrival of AI and Automation in the workplace came with mixed emotions

"Despite the operational efficiency benefits, these technologies brought to businesses - and to workers themselves - the fear of job losses and lack of education around intelligent automation marred the impact of these new innovations in the working world. In 2020, that will all change. A new model of partnership between humans and machines is emerging, focused on the value of Intelligent Automation and Humans working together can bring: Augmented Intelligence..."
more


5 Key AI Trends In Customer Engagement
TechRepublic, February 11th, 2020

Digital overload is leading to more authentic trends in business. Find out the top five in a new Twilio report

"People have reached digital overload with social media alerts, push notifications, messages, robocalls, and chat bubbles coming from all sorts of apps, websites, and platforms, an estimated 63.5 notifications daily per person.

The rise of social media pushed communications into the public sphere 10 years ago, where broadcasting to the widest audience dominated, and now people prefer secure, 1-to-1 or group channels.

This evolution is an opportunity for businesses to develop authentic connections with their customers through personalized, dynamic conversations. Businesses must prepare to have two-way conversations with their customers on multiple channels over time in order to deliver a positive experience..."
more


Busting The 5 Common Myths Business Leaders Get Wrong About AI
insideBIGDATA, February 10th, 2020

Across all industries, business leaders are waking up to the massive potential of artificial intelligence (AI) in powering decision-making processes and streamlining complicated or laborious tasks

"The sales and marketing (SaM) sector is certainly no different, and in recent years there has been significant uptake in the number of SaM professionals looking to technology to help boost sales, increase customers and ultimately promote their business. For instance, The State of AI 2019: Divergence report revealed that the adoption of AI had tripled in last 12 months..."
more


Is AI Cybersecurity's Salvation Or Its Greatest Threat?
VentureBeat, February 11th, 2020

If you're uncertain whether AI is the best or worst thing to ever happen to cybersecurity, you're in the same boat as experts watching the dawn of this new era with a mix of excitement and terror

"AI's potential to automate security on a broader scale offers a welcome advantage in the short term. Yet unleashing a technology designed to eventually take humans out of the equation as much as possible naturally gives the industry some pause. There is an undercurrent of fear about the consequences if things run amok or attackers learn to make better use of the technology..."
more


Robot Analysts Outwit Humans On Investment Picks, Study Shows
Information Management, February 11th, 2020

They beat us at chess and trivia, supplant jobs by the thousands, and are about to be let loose on highways and roads as chauffeurs and couriers

"Now, fresh signs of robot supremacy are emerging on Wall Street in the form of machine stock analysts that make more profitable investment choices than humans. At least, that's the upshot of one of the first studies of the subject, whose preliminary results were released in January.

Buy recommendations peddled by robo-analysts, which supposedly mimic what traditional equity research departments do but faster and at lower costs, outperform their flesh-and-blood counterparts over the long run, according to Indiana University professors..."
more


IT - Technology
Do you know the difference between Thunderbolt 3, USB-C 3.1 Gen 2, and USB-C 3.1 Gen 1?
ZDNet, February 10th, 2020

Don't worry if you don't, because you're not alone

"While the ports look the same, the technologies have a number of key differences between Thunderbolt 3, USB-C 3.1 Gen 2, and USB-C 3.1 Gen 1.

The problem is that the port and cable connectors for all three technologies look the same, and the only difference is the labeling (or, on some devices, the lack thereof)..."
more


Throwing Down The Gauntlet To CPU Incumbents
TheNextPlatform, February 11th, 2020

The server processor market has gotten a lot more crowded in the past several years

"It looks like it is going to be getting a little more crowded with several startups joining the potential feeding frenzy on Intel's Xeon profits.

We will be looking at a bunch of these server CPU upstarts in detail, starting with Nuvia, which uncloaked itself from stealth mode last fall and which has said precious little about what it can do to differentiate in the server space with its processor designs. But Jon Carvill, vice president of marketing with long experience in the tech industry, gave The Next Platform a little more insight into the company's aspirations as it prepares to break into the glass house..."
more


IT - Blockchain
How Blockchain Regulations Will Change In 2020
TechTalks, February 12th, 2020

As 2018 drew to a close, crypto skeptics were ready to write obituaries after the devastating bear market that year

"Talk of blockchain and cryptocurrency demise was rife among seasoned analysts. Just over twelve months later, the industry has shown remarkable resilience to rebound back.

Regulators are a segment of stakeholders who seem to be appreciating that crypto is here to stay, with Federal agencies in the US and Chinese authorities praising the potential of this technology in their respective countries' digital future..."
more


IT - CRM
Digital Trends Changing Advocacy And CRM In 2020
Business 2 Community, February 11th, 2020

The year 2020 once seemed so far away - with flying cars, robots, video calling and even smart homes

"Well, the future has arrived, and hasn't changed much.

Especially in business.

No matter the sector or size still, businesses rely heavily on customer loyalty. Loyalty can best be achieved by listening to customers, acknowledging their value and solving their needs.

Advocacy and Customer Relationship Marketing (CRM) and smart strategies to create loyal customers and will give businesses the edge over competitors..."
more


Top CRM Trends For 2020
Forrester, February 11th, 2020

Customer experience (CX) is still king in 2020

"Modern customer relationship management (CRM) must be used as a foundational technology for customer engagement in order to deliver experiences that keep your customers coming back for more. Here are our top five trends for CRM in 2020:..."
more


IT - BI
Business Intelligence Doesn't Need More AI; It Needs More Humans
Business 2 Community, February 10th, 2020

On New Year's Eve 2019 at 10:00 AM EST, an artificial intelligence algorithm sent a warning out to medical professionals around the globe about a severe respiratory infection affecting Wuhan, China

"In addition to identifying the source of the outbreak, it then used global airline ticketing data to correctly predict that the virus would likely spread to Seoul, Bangkok, Taipei, and Tokyo.

By scouring vast amounts of data including public bulletins, airline travel data, government documents, news reports, and other sources, the AI, developed by Canadian tech firm BlueDot, was able to identify the outbreak of the Wuhan coronavirus before any other organization and issue a warning to health agencies around the world.

The World Health Organization, by comparison, didn't issue their warning to the public until nine days later..."
more


ML And BI Are Coming Together, Gartner Says
datanami, February 13th, 2020

The convergence of machine learning and business intelligence is upon us, as BI tool makers increasingly are exposing ML capabilities to users, and users are performing ML activities in their BI tools

"That's according to the latest Gartner report on analytics and BI tools, which was released this week.

In its February 11 Magic Quadrant for Analytics and Business Intelligence (ABI) Platforms, the storied Stamford, Connecticut analyst firm did its best to quantify and qualify the trends in the sector. While BI and ML have largely existed on parallel tracks, with BI seeking to report what happened and ML seeking to predict what will happen, Gartner sees the two disciplines converging, at least as far as the toolsets are concerned..."
more


5 Disadvantages Of Business Intelligence And How To Avoid Them
Business 2 Community, February 14th, 2020

Data analytics is shaping business today

"As more information and processes take on a digital format, tools like business intelligence (BI) have become increasingly valuable. Proper integration of these technologies can give your company an edge over the competition.

Despite its many benefits, BI comes with its fair share of disadvantages. You'd expect as much with any developing technology, but there are only so many issues you can deal with before something isn't worth the investment. If you're to use BI successfully, you'll have to know what obstacles to expect.

Here are five common problems with BI and how you can avoid them..."
more


IT - HR
8 HR Technology Trends CHROs Should Investigate In 2020
SearchHRSoftware, February 14th, 2020

Many emerging HR technologies are solidly in the realm of 'must-haves,' while others remain hype. Here's some advice to help you discern which is which

"The number of HR technology choices have exploded in the last few years. That means there's more pressure on HR leaders to separate what's hype from what's helpful.

As a chief HR officer, chief people officer or other HR leader, you'll need to identify which software is truly helpful and reject technology that doesn't really bring value. That means choosing the tools that support your strategy and leaving aside those that qualify as "shiny new objects."

Here are eight HR technology trends for 2020 that you'll want to research..."
more


IT Careers: Crazy Recruitment Tactics That Worked
The Enterprisers Project, February 12th, 2020

IT leaders and recruiters discuss the over-the-top ways they've attracted tech talent - and five lessons you can apply from them in 2020

"In a new report from Harvard Business Review Analytic Services, an anecdote from Justin Kershaw, global CIO at Cargill, demonstrated the lengths IT leaders will go to attract top talent in today's competitive market - the length of the Charles River, to be exact.

'A lifelong rower, 'Kershaw' was preparing to race in Boston's Head of the Charles Regatta last year when he and a friend rowed past the MIT boathouse,' stated the report. When they spotted the Sloan School Rowing Club on the dock, Kershaw didn't let the opportunity pass him by...
more


IT - PM
10 Of The Best Project Management Software (Reviewed + Rated)
Business 2 Community, February 9th, 2020

Today's workplace is challenging, with complex marketing tasks becoming the norm

"You're expected to manage a variety of projects, like website maintenance, blogging, email marketing, and automation. Not to mention handling traditional deliverables, special events, and so on and so forth. It seems like you're doing more for your clients than ever before.

It's understood, though, that taking on and managing work-based projects can be a drain on resources. Often, you'll have multiple projects for multiple clients, and getting it all done can be difficult to effectively organize.

The traditional methods of project management just don't cut it anymore. Typing information into a spreadsheet or using word processing software to compile notes takes too much time away from actually completing projects.

Thankfully, we now have project management tools to keep us organized and out of deep water..."
more


IT - Operations
5 Common Errors That Allow Attackers To Go Undetected
Dark Reading, February 12th, 2020

Make these mistakes and invaders might linger in your systems for years

"Although cybersecurity technologies continue evolving to address current threats, many data breaches remain undiscovered for months or even years. For instance, in one of the biggest data breaches discovered in 2018, which affected 500 million customers of the Marriott Hotel Group, hackers went undetected for four years.

How can your organization detect threats faster and reduce the chances of a breach? Unfortunately, there isn't one solution. But we can analyze the root causes of known breaches and learn from them. In this column, we'll examine five common errors that make it easier for attackers to linger in an IT network undiscovered and advice on how to mitigate the risks..."
more


How To Choose A Cyber Insurance Policy
Information Age, February 10th, 2020

Cyber insurance is becoming increasingly vital for protection, so what's to be considered when choosing an insurance policy?

"Cyber insurance is a relatively new area that's hard to navigate. A standard policy is hard to come by and it's difficult to know what you're getting for your money. This article will seek the expertise of leading legal minds and cyber experts to discuss these problems.

Be prepared to show sufficient security measures

Cyber insurance providers will not offer cover for attacks to businesses that seem to be at fault for those attacks..."
more


Survey Shows 43% Of IT Professionals Still Track IT Assets In Spreadsheets
AiTHORITY, February 13th, 2020

More Than Half of Respondents Report They Mistakenly Spend Time Fixing Devices Under Warranty

"Ivanti, the company that unifies IT to better manage and secure the digital workplace, released survey results highlighting the challenges faced by IT organizations when it comes to aligning their IT Service Management (ITSM) and IT Asset Management (ITAM) processes. According to data collected by Ivanti, 43% of IT professionals surveyed reported using spreadsheets as one of their resources to track IT assets. Further, 56% currently do not manage the entire asset lifecycle, risking redundant assets, potentially creating a risk, and causing unnecessary and costly purchases..."
more


IT - Security
Best Identity Theft Protection And Monitoring Services In 2020
CNET, February 15th, 2020

Is someone applying for a mortgage in your name? Ruining your credit?

"The best identity theft protection and monitoring service can help you find out -- and fight back...

Your personal information is precious, and our directory of the best identity theft protection and monitoring services can help you proactively monitor suspicious activity and protect your identity as well as assist in recovering if you're a victim of a data breach that leads to identity fraud and theft. Unfortunately, you may need one of these protection services soon, if you don't already. That's because identity theft is a massive and growing problem, with more enormous data breaches hitting victims with increasing regularity..."
more


Cybersecurity Best Practices Every Enterprise Should Follow In 2020 [Infographic]
Business 2 Community, February 11th, 2020

Lack of awareness in protecting customer's sensitive data can lead to severe repercussions

"Enterprises should be able to predict potential cybersecurity risks and invest more in building strategies against hackers.

But then, those strategies don't have to be complicated. In fact, simplifying your approach towards cybersecurity (or cybercriminals at large) can go a long way.

Not sure if you are maintaining the right cyber hygiene for your business and your customers? Here are a few tips by industry leaders that could help..."
more


DDoS Attacks Nearly Double Between Q4 2018 And Q4 2019
Dark Reading, February 13th, 2020

Peer-to-peer botnets, TCP reflection attacks, and increased activity on Sundays are three DDoS attack trends from last quarter

"The number of distributed denial-of-service (DDoS) attacks nearly doubled between the fourth quarter of 2018 and fourth quarter of 2019, researchers found in a new study of DDoS trends.

Last quarter brought an increase in the number of attacks relative to the third quarter of 2019, Kaspersky Labs researchers report, and attacks also lasted longer. This was expected, they said, as the fourth quarter is often a period of "retail warfare," driving cybercrime between October and December. The end of 2018 was "very calm" and set an expectation for a 2019 increase. However, researchers did not notice a spike in DDoS activity around Black Friday or Christmas..."
more


In 2019, A Total Of 7,098 Reported Breaches Exposed 15.1 Billion Records
HelpNet Security, February 11th, 2020

In 2019 the total number of records exposed increased by 284% compared to 2018, according to Risk Based Security

2019 saw an increase in reported breaches

In total, there were over 15.1 billion records exposed shattering industry projections. There were 7,098 breaches reported in 2019, a 1% increase on 2018, though the gap is anticipated to grow throughout Q1 2020 as more 2019 incidents come to light.

'2019 was a rough year for breach activity, with reported breaches reaching an all-time high and the number of records exposed up 284% compared to 2018' commented Inga Goddijn, Executive Vice President at Risk Based Security.
more


Intrusion Prevention System (IPS)
SearchSecurity, February 12th, 2020

An intrusion prevention system (IPS) is a network security and threat prevention tool

"The idea behind intrusion prevention is to create a preemptive approach to network security so potential threats can be identified and responded to swiftly. Intrusion prevention systems are thereby used to examine network traffic flows in order to find malicious software and to prevent vulnerability exploits..."
more


Mac-Based Security Threats Outpacing Windows
ComputerWeekly, February 11th, 2020

Security threats targeting Apple endpoints are growing more quickly than those targeting Windows machines, according to Malwarebytes

"Organisations running Mac-based systems are increasingly at risk of compromise, with the volume of threats targeting the environment now growing more rapidly than those targeting Windows, according to Malwarebytes' latest annual State of malware report, which has just been released.

Over the course of 2019 - besides overarching trends such as an increased focus on targeted attacks, the resurgence of threats such as Emotet and TrickBot, and the emergence of new ransomware families such as Ryuk and Sodinokibi - Malwarebytes said it saw nearly twice as many Mac threats detected per endpoint as Windows ones..."
more


Password Security Best Practices In 2020
Business 2 Community, February 9th, 2020

Concerned about protecting your financial transactions and private data stored online?

"A strong password policy is your front line of defense against security threats, scammers and hackers. Implementing the best password security practices is as important at work as it is at home.

You need to understand the severity that easy-to-guess passwords bring. Also no, you cannot have the same password for twenty different accounts, only because it is easy to remember. Let's get straight to the point and go through some of the best policies that will help you create reliable, secure passwords online..."
more


What To Know About Open Source Security
Information Age, February 11th, 2020

Many companies have a preference towards open source technology, so what should be kept in mind in regards to ensuring its security?

"Like any area of tech, open source needs its own security measures to thrive without a hitch.

A major benefit that organisations gain from using open source tech is that it's freely available and not distributed from a particular proprietor.

The 'open source' aspect refers to the code, and can be found within databases, applications and operating systems, among other software. This code can be changed to suit the needs of the business..."
more


IT - Database
4 Enterprise Database Security Best Practices
SearchSecurity, February 11th, 2020

Beyond protecting enterprise databases from vulnerabilities, it is critical to improve and review their security on a regular basis. Learn more with these database security best practices

"The importance of securing sensitive information cannot be denied. Fortunately, most organizations today have solid cybersecurity programs that use a diverse set of controls to achieve defense-in-depth security. Through these programs, corporate servers have been hardened, enterprise endpoints have been secured and monitoring tools have been implemented. Organizations have also been able to eradicate highly sensitive information from endpoint devices and consolidate the most crucial corporate data in enterprise systems and the databases that support them..."
more


New Database Innovations Deliver A Single Database That Supports All Data
The future is data driven

The future is data driven, and effective use of data will increasingly determine a company's competitiveness

"During his keynote at Oracle OpenWorld London, Oracle Executive Vice President Juan Loaiza announced the latest innovations which further strengthen Oracle's strategy of providing a single converged database engine able to meet all the needs of a business. The new database features enable customers to take advantage of new technology trends-such as employing blockchain for fraud prevention, leveraging the flexibility of JSON documents, or training and evaluating machine learning algorithms inside the database..."
more


IT - Server
A Guide To GPU Implementation And Activation
SearchDataCenter, February 12th, 2020

Data center GPU usage goes beyond hardware. Admins must work with vendors and developers to have the right software architecture and code to benefit from GPUs

"Graphics processing unit hardware is straightforward to install on most general-purpose servers, but its benefits are not automatic; they require the combined support of a software framework, drivers, hypervisor extensions and a GPU-enabled application to unlock any benefits.

A graphics processing unit chip can contain one or more separate GPU cores -- similar to CPU chips. However, the GPU chip itself is almost never enough to fulfill GPU roles, so the latest GPU chip sockets are rarely directly integrated onto server motherboards..."
more


Hyper-Converged And Composable Architectures Transform IT
SearchConvergedInfrastructure, February 10th, 2020

Hyper-convergence and up-and-coming HCI 2.0 and composable infrastructure can help you achieve your IT and business goals. See why, how and where their strengths and weaknesses lie

"Demands placed on infrastructure fluctuate due to changing business requirements and ever-evolving technology challenges. Two of these challenges include digital transformation, an overarching term covering a range of issues and technologies, and a more technology-specific scenario known as edge computing..."
more


Hyper-Converged Data Center Vendors Innovate, Evolve Products
SearchConvergedInfrastructure, February 12th, 2020

Review notable hyper-converged, HCI 2.0 and composable disaggregated product news to gain insight into data center convergence technology as you make infrastructure decisions

"The hyper-converged data center has been around for years now, going back to at least when pioneer Nutanix helped jump-start the market with its first appliances in 2013. A lot has changed since then. Continued product innovation has advanced hyper-convergence.

Today, hyper-converged technology has gone mainstream, and big and small organizations have adopted hyper-converged infrastructure and its descendants to meet the storage and processing requirements of their data and mission-critical workloads..."
more


IT - HPC
What's New In HPC Research: Quantum Clouds, Interatomic Models, Genetic Algorithms & More
HPCWire, February 14th, 2020

In this bimonthly feature, HPCwire highlights newly published research in the high-performance computing community and related domains

"Optimizing irregular-shaped matrix-matrix multiplication on GPUs

Linear algebra is a common application in big data and computational science on HPC. These operations are well-optimized when handling regularly shaped matrix inputs with GPUs, but comparatively little literature has discussed irregularly shaped matrix inputs with GPUs. In this paper (written by a team from the University of Alabama, Oak Ridge National Laboratory, the University of California, Riverside, and the University of Sydney), the authors propose two matrix-matrix multiplication algorithms for irregularly shaped inputs on GPUs. They demonstrate a speedup of up to 3.5x along with greater efficiencies in resource usage..."
more


IT - Cloud
10 Hidden Cloud Gotchas To Watch Out For
CIO, February 11th, 2020

The upsides of the cloud are well known. But IT leaders seeking to capitalize on cloud services should beware these cloud-specific issues that can impact your strategy - and the bottom line

"The cloud revolution has been around long enough that every IT leader knows the overarching value proposition: The cloud makes it easier to share resources, it adapts quickly to shifting loads and demands, and it can save time and money by eliminating the need to buy, install and maintain racks of your own hardware.

But there are downsides, and they aren't mentioned as frequently. Maybe that's because the idea of offloading your hassles to some Shangri-La of a server farm hidden in the sky is so seductive..."
more


Benefits Of Cloud Data Discovery Tools And Services Multiply
SearchCloudSecurity, February 12th, 2020

With multi-cloud and privacy regulations becoming the new normal, infosec teams need data discovery tools and services to keep up. Learn more about available cloud options

"As more organizations move sensitive data into the cloud, there is increasing pressure to identify what kinds of data are in various cloud storage models, to track data in all cloud environments and to control data protection throughout all cloud deployments.

The motivations for this are multiplying rapidly. Reasons range from internal security best practices and data classification needs to regulatory and privacy requirements, such as GDPR and California Consumer Privacy Act. That said, this is a tall order -- discovery alone can be a huge headache. Fortunately, there is a steady increase in the number of tools and services organizations can employ to discover sensitive data in cloud environments..."
more


Cloud Networking Vs. Cloud Computing: What's The Difference?
SearchNetworking, February 10th, 2020

Organizations might sometimes consider cloud computing and cloud networking as interchangeable due to their similarities. But the two strategies have different goals and processes

"The use of cloud computing has risen steadily, as organizations increasingly run their applications in cloud services. As cloud computing adoption has grown, cloud networking has emerged adjacently.

Comparing cloud networking vs. cloud computing highlights some similarities between the two strategies -- but they are different. While cloud computing concerns how applications run, cloud networking concerns how access to applications is delivered..."
more


IT - Wireless
Watch For These 6 Wireless Networking Trends In 2020
SearchNetworking, February 14th, 2020

No doubt you've heard about 5G and Wi-Fi 6. But don't forget other wireless trends emerging in 2020, such as CBRS, dynamic spectrum sharing and Open RAN

"It is clear wireless is now poised to become the leading networking option for many enterprise use cases. It's also clear that advancements in 5G networks, the introduction of edge computing options, the advent of Citizens Band Radio Service and the improvements available with Wi-Fi 6 will gradually change the way networks are built and IT services are delivered.

Below are six wireless networking trends Doyle Research expects will drive mobile operator and enterprise IT architectures in 2020 and beyond..."
more


IT - DR
Choosing The Right Disaster Recovery For Your Business
ComputerWeekly, February 10th, 2020

We look at the various options available when implementing disaster recovery, and how much they're worth

"Historically, building and maintaining a disaster recovery (DR) site, while critical to ensure business continuity, was often too costly and complex for most companies.

As Rajiv Mirani, chief technology officer at Nutanix, points out: 'It simply wasn't feasible for many enterprises to pay for the upfront costs and ongoing expenses of maintaining a second site, to be used only in the event of a disaster.'

From a DR perspective, the starting point for most large enterprises is their core IT infrastructure, which is often based on a primary on-premise datacentre or private cloud..."
more


Disaster Recovery Automation Tools Gaining Traction
SearchDisasterRecovery, February 10th, 2020

As new disaster recovery automation tools emerge, vendors and industry analysts recognize a growing demand for simplifying what can be a tedious process

"Disaster recovery is a prime target for automation as businesses' downtime tolerance and overall DR know-how have lowered.

A big IT problem these days is that while organizations have more data and that data is growing faster than ever, fewer administrators focus solely on storing and managing that information. This age of specialization calls for products that require less manual intervention. Industry experts and vendors see demand for tools that build in disaster recovery automation to handle tedious tasks and reduce downtime..."
more


Why Disaster Recovery-As-A-Service Is The Industry's Next Vital Tool
Information Age, February 14th, 2020

Veniamin Simonov, director of product management at NAKIVO, explores why disaster recover-as-a-service is the industry's vital tool

"Disaster recovery-as-a-service is the industry's next vital tool.

Recent studies have estimated that in 2019, the average cost estimate for cleaning up a cyber attack stood at $1.1 million. In an era of frequent cyber attacks and subsequent catastrophic data loss, this means that the manual recovery of information is quite impractical. It is also dangerous, as manual recovery is far too reliant on a number of factors that are not guaranteed or fail-safe, such as staff initiative and knowledge..."
more


IT - IoT
5G Adoption Should Change How Organizations Approach Security
Dark Reading, February 12th, 2020

With 5G adoption, businesses will be able to power more IoT devices and perform tasks more quickly, but there will be security ramifications

"Last year, all four wireless carriers began offering 5G, and people couldn't be happier. While some may have to wait until devices and infrastructure fully catch up with demand, the promise of being able to communicate and download at speeds of up to 10Gbps has users and companies eagerly anticipating a very speedy future.

5G promises super-high bandwidth and throughput and ultra low-level latency communication that are up to 20 times faster than 4G LTE. 5G can reach speeds of 20GB per second, while 4G LTE maxes out at 1GB per second. While this is a nice-to-have in many situations, businesses are looking forward to 5G adoption to power more Internet of Things (IoT) devices and enable their employees to perform tasks very quickly..."
more


6 Factors That Raise The Stakes For Iot Security
Dark Reading, February 10th, 2020

Developments that exacerbate the risk and complicate making Internet of Things devices more secure

"The enterprise is finally coming to realize just how risky Internet of Things (IoT) devices are to their security postures. Whether it comes from unencrypted communication with devices, hard-coded passwords, vulnerability-ridden unmanaged devices, or insecure configurations, a huge flaw always seems to be lurking around the corner with regard to IoT deployments. It's only natural for new-ish technology. IoT is following a common progression in security maturation that's happened so many times in everything from Wi-Fi to Web apps..."
more


Securing The Internet Of Things In The Age Of 5G
Information Management, February 14th, 2020

The next generation of mobile communications is upon us and it promises not only drastically increased speed but connectivity for a wide variety of devices that have been gaining popularity in recent years

"The increasing adoption of IoT (Internet of Things) devices and industrial automation through ICS (Industrial Control Systems) is a key focus area for 5G in addition to simply supporting mobile phones, as was the focus of previous generations of mobile communications.

5G is already being deployed in parts of the U.S. with plans for more widespread availability in 2020 by major carriers. Meanwhile, widespread coverage is already available in parts of Europe and Asia, putting pressure on carriers in other countries to hurry deployment..."
more


IT - Careers
HR Tech Makes Your Job Search A Living Hell
Ask The Headhunter, February 14th, 2020

Cost Cutting Algorithms Are Making Your Job Search a Living Hell

HR tech in your face: Nick's take

"Don't miss this excellent run-down on the 'pseudoscience' and 'profoundly disturbing' technology that HR is using in its never-ending battle to turn you into a bucket o' bits. See also Why does HR waste time, money and the best job candidates?..."
more


11 Hottest Software Engineering Jobs Of 2020
TechRepublic, February 11th, 2020

Demand for AR/VR professionals soared 1,400% in 2019, but the opportunities don't stop there

"A Hired report, released on Tuesday, found that 2020 will be a big year for software engineering talent. The influx of digital transformation initiatives worldwide has bolstered the demand for these professionals, especially with specialties in augmented reality (AR) and virtual reality (VR).

Hired's 2020 State of Software Engineers report determined the most popular jobs in software engineering, as well as the impressive salaries these professionals earn..."
more


Demand For Data Engineers Up 50%, Report Says
datanami, February 12th, 2020

Looking to hire a data or machine learning engineer?

"You're not alone, as those two positions are among the fastest growing jobs in the country, according to recent figures.

The Dice 2020 Tech Job Report labeled data engineer as the fastest growing job in technology in 2019, with a 50% year-over-year growth in the number of open positions. Interest in the position has been burbling for years, as organizations discover data engineers are they key personnel for unlocking the value of their data..."
more


Hired: AR/VR Engineers Replace Blockchain Programmers As Hottest Commodity
VentureBeat, February 11th, 2020

Augmented reality and virtual reality jobs are hot, with demand surging 1,400% in 2019

"This means that AR/VR knowledge is the hot new thing, supplanting blockchain engineers, who according to Hired's data were in demand a year ago. In last year's report, blockchain engineer demand grew 517%. It's a surprise to me, as AR/VR is having a mixed impact in consumer markets. But demand in the enterprise is strong..."
more


IT Salary Report 2020: Get Paid What You Are Worth
Information Week, February 12th, 2020

IT pros must do real research about their value in the market if they want to be paid fairly. InformationWeek's 2020 IT Salary Report can help technologists get started

"It's a good time to be an IT pro. The economy is strong. Unemployment is low. Plus, IT is not just a business cost center anymore. Tech is now core to business operations, creating value for customers, and more. With that in mind, here's the No. 1 question you should be asking yourself in 2020: Are you being paid what you are worth in today's booming market?

This year is a great time for you, as a technology professional, to take a critical look at your value in the market and current compensation. Do you know what your peers are making in terms of salary and benefits? What skills will keep you in demand in the months and years ahead? Are you more likely to be successful in your search for a remote opportunity?..."
more


IT - Compliance
Why 67% Of Companies Fear They Can't Sustain Privacy Compliance
CIO Dive, February 12th, 2020

True privacy depends on where and how data travels

"Data privacy management and protocol got a facelift with the enactments of the General Data Protection Regulation and the California Consumer Privacy Act.

Many companies failed to meet compliance standards in time for GDPR. And for companies that met the deadline, 67% fear they won't be able to sustain compliance, according to Tanium.

"People realize that they can be compliant one time - you can get ready for that audit and pass that audit. But the day after that audit is done, people go back to their day jobs," Chris Hallenbeck, CISO for the Americas at Tanium, told CIO Dive..."
more


IT - Email
Half Of Cybercrime Losses In 2019 Were The Result Of Business Email Compromise (BEC) Scams
HelpNet Security, February 12th, 2020

Business email compromise (BEC) and email account compromise (EAC) scams are still the most lucrative schemes for cybercriminals

"The FBI's Internet Crime Complaint Center (IC3) has calculated that, in 2019, the average monetary loss per BEC/EAC scam complaint reached $75,000.

During the past year, the IC3 received a total of 467,361 cybercrime complaints with reported losses exceeding $3.5 billion, and $1.77 billion of those are the result of BEC/EAC.

For comparison, BEC/EAC-associated losses were $1.3 billion in 2018, $676 million in 2017 and $360 million in 2016 (with a $30,000 average monetary loss per complaint)..."
more


Ignore Email At Your Own Peril [Infographic]
Business 2 Community, February 15th, 2020

There are lots of people out there who think that email is dead

"As it turns out, nothing could be further from the truth, and believing in the myth of email's death could be costing your business - BIG TIME. Would it surprise you to learn that businesses with email response rates of less than an hour are significantly more successful than even those who take two hours? Responding to email is a nonverbal cue that build trust with your clients, and if you're dropping the ball chances are you're losing a lot of business because of it..."
more


IT - Backup
Ensure Your Backup Infrastructure Has Sufficient Networking
SearchDataBackup, February 13th, 2020

How can you effectively modify your backup process to fit your network speed? Because bandwidth constantly varies, employ best practices for a range of scenarios

"Managing today's highly sophisticated backup infrastructure is a 24/7 proposition. A data center handles so many activities each day that your network must be strong enough to manage the demand.

Examine the issues associated with managing network bandwidth and ensure that it is sufficient and dynamically adaptable to current as well as unanticipated demands..."
more


IT - Big Data
AI Usage In Banking Is Forcing The Conversation Around The Ethical Use Of Data
insideBIGDATA, February 12th, 2020

Over the past few years, the financial services industry has made huge strides in adopting new technologies like artificial intelligence into its workflow

"The cache of data that banks can access holds endless potential to create valuable new products and experiences for clients. With this progress, however, comes concerns around the ethical use of personal data in banking. But with the right business practices in place, banks can reap the benefits of AI while keeping customers in control of their data and protected from its misuse..."
more


IT - Encryption
Chaos & Order: The Keys To Quantum-Proof Encryption
Dark Reading, February 12th, 2020

The implications of chaos form the basis of a new approach to encryption that promises quantum-proof perfect secrecy. But first, your current crypto needs some tidying up

"The specter of quantum-powered cyberattacks that can break even the most powerful encryption algorithms looms ever-larger and ever-darker. Chances are, nation-state attackers will be equipped with quantum computing long before the average enterprise has rolled it out. Future-thinking organizations wonder what to do now to defend themselves from that inevitability..."
more


Enterprise Companies Struggle To Control Security Certificates, Cryptographic Keys
ZDNet, February 11th, 2020

Certificate authority misuse, MiTM attacks, and problems with cryptographic key handling are now of serious concern to enterprise firms

"Enterprise companies are struggling to contain the security and control implications of using multiple cryptographic keys and digital certificates, new research suggests.

On Tuesday, Keyfactor and the Ponemon Institute released the 2020 "The Impact of Unsecured Digital Identities" report, which examines how cryptographic keys and certificates are handled in enterprise environments.

Responses from over 600 IT and cybersecurity executives from organizations in the US and Canada were collected and analyzed across 14 industries..."
more


WhatsApp Tops 2 Billion Users Worldwide
CNET, February 12th, 2020

The Facebook-owned messaging app says it's committed to strong encryption

"Messaging app WhatsApp has hit 2 billion users, the company said in a blog post Wednesday.

The app, which is owned by Facebook, is end-to-end encrypted. It was founded in 2009 and bought by Facebook in 2014..."
more


IT - Developer
Sprint Plans Are Worthless, But Sprint Planning Is Everything
Business 2 Community, February 13th, 2020

Dwight D. Eisenhower, the World War II leader and U.S. President, wrote: "'.' plans are of no particular value, but '.' planning is indispensable"

"It's a powerful phrase that aligns all so well with Scrum. Contrary to a myth that there is no planning in Scrum, planning is actually everything: we plan our work not only in Sprint Planning but also every day at Daily Scrum.

However, it is the plans that we make that are less important: we use them to guide our decisions initially, but we do not stick to them if it doesn't make sense. Daily Scrum is there to make sure we replan at least once every 24 hours.

So to continue this analogy, I'd like to talk about a common myth that gets brilliant teams stuck in their Sprint Planning feeling overwhelmed..."
more