IT News and Events
Nov 14th, 2022 — Nov 20th, 2022 Generate the Custom HTML Email for this Issue
IT News and Events IT News and Events
Volume 296, Issue 3 << Previous Issue | Next Issue >>
IBM News
Enhanced Ingress Status for IBM Cloud Kubernetes Service and Red Hat OpenShift on IBM Cloud Clusters
On 15 November 2022, IBM introduced the enhanced Ingress Status for IBM Cloud Kubernetes Service and Red Hat OpenShift on IBM Cloud clusters.
The enhanced Ingress Status provides granular status reports for your Ingress components, including ALBs, subdomains and secrets.

Additionally, a set of new step-by-step troubleshooting guides is available in our documentation that will help narrow down and resolve issues reported by the Ingress Status. To make Ingress Status more flexible and suitable for all of your use cases, we also introduced new configuration options.

IBM News, November 15th, 2022
(Get More Information . .) open to premium members only

IBM AIOps Software Helps Businesses, Including BBC Studios and ExaVault, Transform IT Operations
IBM updates its Turbonomic Application Resource Management and Instana Observability software to help organizations manage application performance and energy and costs to accelerate sustainability initiative progress
In a constantly evolving business environment, many organizations are struggling to deliver on elevated customer expectations while navigating the challenges of skilled labor gaps, digital disruption, and increasingly complex IT environments.

With more people leaving the workforce, companies lack the staffing required to manage these environments and scale them by traditional means. To bridge this gap, organizations are turning to new digital solutions like automation technology to better leverage their existing talent.

IBM News, November 18th, 2022
(Get More Information . .) open to premium members only

IBM Db2 + Amazon Web Services: Better Together
is page on TwitterShare this page on FacebookShare this page on LinkedInE-mail this page The database built to run the world's mission-critical workloads is on AWS.
In May 2022, IBM officially announced its strategic partnership with Amazon Web Services to deliver IBM SaaS products in the AWS marketplace. IBM's SaaS products on AWS are designed to provide customers with the availability, elastic scaling, governance and security required for their mission-critical workloads, fully managed in the cloud. The IBM and AWS partnership gives customers the opportunity to quickly get started with IBM SaaS products, integrated into the AWS services and experience.
IBM News, November 17th, 2022
(Get More Information . .) open to premium members only

Innovating At The Edge? How Hybrid Cloud Overcomes The Complexity
Emerging as one of the formidable tools that will help businesses drive innovation and uncover new revenue streams, edge computing holds the key to digital transformation by moving computing out to the 'edge' of the network - to the mobile devices, equipment, and routers where data is collected.
Transporting the cloud closer to where things are happening, edge computing enables businesses across industries to take advantage of all this data to make better decisions and better serve their customers at a lower latency than typical cloud computing.

A key benefit of edge computing is that users get a better experience in terms of reliability, speed, and potentially better privacy, helping companies comply with data sovereignty regulations by keeping data on location while still being able to provide all of the features expected of modern cloud-based software.

IBM News, November 16th, 2022
(Get More Information . .) open to premium members only

Red Hat News
Friday Five - November 18, 2022
The Friday Five is a weekly Red Hat blog post with 5 of the week's top news items and ideas from or about Red Hat and the technology industry. Consider it your weekly digest of things that caught our eye.
  • Red Hat Helps Enterprises Modernize at Scale with New Migration Toolkit
  • Red Hat Global Customer Tech Outlook 2023: Security is the top priority as digital transformation continues
  • Siemens Accelerates Innovation at the Factory Edge with Red Hat OpenShift
  • CRN Tech Innovator Awards
  • The Register - Red Hat, Intel open centers for the edge

Read on for details

Red Hat News, November 18th, 2022
(Get More Information . .) open to premium members only

Code Comments: Stories From Technologists On The Frontlines Of Innovation
We say this a lot at Red Hat: no single technology vendor holds the key to success, and that includes us.
In our new podcast - Code Comments - we are talking to seasoned technologists at Red Hat partner organizations about pivotal moments they have experienced in technical projects.

Each episode dives into stories, challenges and lessons learned that our guests have encountered in their careers. The Red Hat partner ecosystem represents a diverse and robust group of leading technology vendors, solution providers, integrators and more, all with a unique view on the IT landscape, trends and what the future holds for the industry at large. Like Red Hat, our partners have lived through it all firsthand and there's still so much to learn from each other.

Red Hat News, November 17th, 2022
(Get More Information . .) open to premium members only

How We Use Red Hat Insights To Build Better Products
You've probably heard about Red Hat Insights and different services that improve your operational, business and security experience with all Red Hat platforms (if not, I recommend reading the Red Hat Insights blog channel).
The analytical information that Insights collects to power these services has a much greater impact than you might think. In this blog post, we'll give you an overview of where Insights analytics are being used (and you probably didn't even notice). Although this is very much focused on experience with Red Hat OpenShift, less advanced yet similar capabilities are available for other platforms.
Red Hat News, November 18th, 2022
(Get More Information . .) open to premium members only

Learn About Red Hat Enterprise Linux System Roles
Streamline system configuration using a collection of supported roles and workflows that ensure consistent execution of manual tasks.
What are RHEL system roles?

Red Hat Enterprise Linux (RHEL) system roles are a collection of Ansible roles and modules that can help automate the management and configuration of RHEL systems. RHEL system roles can help provide consistent and repeatable configuration, reduce technical burdens and streamline administration.

Red Hat News, November 18th, 2022
(Get More Information . .) open to premium members only

Red Hat Enterprise Linux 9.1 Is Now Available
As organizations spread their IT infrastructure from the datacenter to the cloud and the network edge, they increasingly need more scalable hybrid cloud solutions paired with enhanced operational stability.
With Red Hat Enterprise Linux (RHEL), they can drive consistency, flexibility and reliability as they innovate.

RHEL 9 became generally available in May 2022, and the new 9.1 update brings customers a number of new features and capabilities, including enhancements to SQL, Red Hat Smart Management with Red Hat Satellite, Red Hat Insights and Workstations.

Red Hat News, November 16th, 2022
(Get More Information . .) open to premium members only

Red Hat Enterprise Linux And Microsoft Security Update Of November 2022
On November 8th, 2022, Microsoft released a series of security updates for various Windows operating systems to fix two security issue
Both security issues aren't documented in detail. The security advisories talk about 'Windows Kerberos RC4-HMAC Elevation of Privilege Vulnerability' and a generic 'Windows Kerberos Elevation of Privilege Vulnerability,' correspondingly. From the accompanying knowledge base articles we can see that these vulnerabilities affect use of the standard RC4-HMAC encryption type in the Active Directory Kerberos implementation. It has been known for some time that RC4-HMAC is an encryption type that might be broken, and a recommendation has been to disable RC4-HMAC use in Active Directory environment, enforced via various STIG and CIS profiles for Windows systems.
Red Hat News, November 17th, 2022
(Get More Information . .) open to premium members only

Red Hat OpenShift Service On AWS GovCloud Receives FedRAMP In-Process Designation
Wherever your agency is on its cloud journey, I bring good news.
Red Hat OpenShift Service on AWS GovCloud, the enterprise-ready cloud services offering, has been designated as FedRAMP 'In-Process', which is a designation provided to Cloud Service Providers (CSPs) that are actively working toward a FedRAMP Authorization with either the Joint Authorization Board (JAB) or a federal agency. Red Hat is currently working towards receiving FedRAMP High certification to allow organizations in highly regulated industries to build and deploy Kubernetes-based applications on ROSA while addressing key government security and compliance requirements.
Red Hat News, November 17th, 2022
(Get More Information . .) open to premium members only

IT News - CxO
5 Ways To Overcome Multifactor Authentication Vulnerabilities
Improve the resiliency of multifactor authentication by giving users more information, making default settings more secure, hiding secrets and more.
Multifactor authentication boosts the safety of usernames and passwords, but depending on the MFA method used, it may not offer as much protection as you might think.

To better secure user accounts and data, it's time to make MFA more resilient.

At Authenticate 2022, Roger Grimes, data-driven defense evangelist at security awareness company KnowBe4, presented how vendors can improve their MFA products.

SearchSecurity, November 8th, 2022
(Get More Information . .) open to premium members only

CIO's Guide To More Engaged IT Teams In The Post Pandemic World
We are living in interesting times. With the pandemic mostly behind us but still lingering, our IT teams have adopted fairly well in producing remarkable results by collaborating and working remotely.
In this short article, I will share how we can make our teams even more productive by supercharging them in a post-pandemic era and implementing the following ideas in a virtual setting or in person:

1. Have Fun: IT professionals spend 50-60 or even more hours on their jobs. If they are not having fun, they will burn out faster and possibly be not as productive. There are several ways you can make their professional lives fun...

Architecture&Governance, November 7th, 2022
(Get More Information . .) open to premium members only

The Shifting Role Of The CISO
My year as a venture capital CISO-in-residence.
The CISO role has evolved dramatically over the past decade, maturing from security officer to impactful business leader who, increasingly, is a part of their organization's C-suite. In light of the considerable impact security risks have on business objectives, this is a welcome transformation. Encouraging employees to go beyond their day-to-day and view security as a priority, making allies of users and business managers and providing the organization with tangible value, is extremely rewarding.
DARKReading, November 8th, 2022
(Get More Information . .) open to premium members only

5 Harvard Business Review Articles That Will Resonate With CIOs Right Now
From AI to digital transformation and everything in between, these HBR articles cover the critical topics IT leaders care about most
Through our partnership with Harvard Business Review, we regularly refresh our resource library with five new HBR articles we believe CIOs and IT leaders will value highly. Check out the curated pieces below, available to readers now.

  • Why You Need an AI Ethics Committee
  • How to Overcome Your Fear of the Unknown
  • 4 Types of Business Transformation
  • How leaders can escape their echo chambers
  • Is your company squandering digital opportunities?

Read on for details

The Enterprisers Project, November 8th, 2022
(Get More Information . .) open to premium members only

3 Critical Roles For Successful Digital Transformation
It takes a team to implement digital transformation, but these three roles can make the difference between success and failure. Here's how
Companies are like high-performance engines - they're optimized over time to create the greatest output. They handle small incremental changes and fine-tuning well but often break down when broader changes and rebuilding are needed.

Enter the digital transformation journey. How can companies learn how to shift quickly to meet the needs of their customers, employees, and the market when incremental progress isn't working? What roles can help ensure success along the way?

The Enterprisers Project, November 7th, 2022
(Get More Information . .) open to premium members only

IT Leadership: Lessons From The Military
Top CIOs with military backgrounds share the leadership advice that has helped shape their career success
Turbulent times can either paralyze you with fear or energize you with unlimited opportunities - and great leaders are often what make the difference. In the midst of complexity and volatility, top leaders anticipate and adapt. They build clarity out of uncertainty. They communicate a vision that inspires you to strive for more. They challenge and elevate their teams, giving people the confidence to not just persevere but step up to the big moments and make bold things happen.
The Enterprisers Project, November 9th, 2022
(Get More Information . .) open to premium members only

Evolving Landscape Of Enterprise Security Through The Eyes Of CIOs
As sophisticated cyber threats increase in volume and effectiveness, organizations across all industries are shifting from a threat-preventive approach to a cyber defense model.
The recent acceleration of digitalization has made organizations re-evaluate their cybersecurity preparedness. In today's hybrid world, we must fortify data with modern surveillance techniques that promote resilience and business continuity. More than ever, organizations must invest in a robust security infrastructure to combat cybercrimes.

Ransomware groups are becoming more sophisticated and are increasing in volume, with 35 vulnerabilities associated with ransomware during the first three-quarters of 2022 and 159 trending aggressive exploits. To make matters worse, a lack of adequate data and threat context makes it difficult for organizations to effectively tweak their systems and effectively mitigate vulnerability exposure.

CIO, November 8th, 2022
(Get More Information . .) open to premium members only

My First 90 Days As A New CIO
Tom Sweet, CIO of Industrial Refrigeration Pros, reflects on the initial three months of his first job as head of technology and security.
I set my career sights on becoming a CIO or a CTO many years ago. In 2019, I was a finalist for two C-level opportunities but was selected for neither one. I learned a lot from the experiences and am grateful for them. Though rejection feels lousy, it can also be a blessing. It is far worse to be selected for a role and then not fit in with the company culture or values.

Ultimately in 2022, a referral led to my first CIO opportunity at a private equity-backed venture. New to the Dallas-Fort Worth area and in need of an IT leader for this growing firm, the CEO reached out to an ERP consultant for some referrals.

Heller, November 9th, 2022
(Get More Information . .) open to premium members only

IT News - Storage
How To Effectively Compare Storage System Performance
Your power as a buyer is stronger before the sale closes: Ask for what's required to effectively evaluate storage vendors' system performance.
Storage vendors love to talk about their performance specifications, such as IOPS, throughput and latencies. The problem is that there's no standardization of those specifications among vendors.

There is little guidance as to how vendors measure or come up with those storage system performance numbers or how they correlate to a specific workload or application. In addition, vendors measure performance in different ways. Add in different storage types -- block, file and object -- and it gets even more complicated.

You, the IT pro, are essentially left to your own devices to figure it out. So, how should you compare performance?

SearchStorage, November 7th, 2022
(Get More Information . .) open to premium members only

A Comparison Of Distributed File Systems
There are many different distributed file systems available, so careful analysis of the options, as well as good project management, helps ensure a successful installation.
Distributed file systems enable users to access file data that is spread across multiple storage servers. Key features -- including application and platform support and storage type -- differ from one product to another, so it's crucial for organizations to make a vigilant comparison of distributed file systems.

Users must examine their requirements and the differences among distributed file systems, evaluate the many products available on the market and then commence a systematic process for selection and implementation.

SearchStorage, November 9th, 2022
(Get More Information . .) open to premium members only

IT News - AI
Building The Highway To AI Success With Cloud Infrastructure
The automotive industry continues to adopt artificial intelligence (AI) at an increasingly rapid pace to stay abreast of numerous production challenges and market opportunities.
AI delivers many engineering and manufacturing benefits, from accelerating design iterations to refining quality control on production lines. AI also helps forward thinking automotive companies adapt effectively and swiftly to rapidly changing business and industry priorities.
EnterpriseAI, November 11th, 2022
(Get More Information . .) open to premium members only

You'd Never Know AI Drew This Beautiful Comic Series
The Bestiary Chronicles is both a modern fable on the rise of artificial intelligence and a demonstration of how shockingly fast AI is evolving.
You might expect a comic book series featuring art generated entirely by artificial intelligence technology to be full of surreal images that have you tilting your head trying to grasp what kind of sense-shifting madness you're looking at.

Not so with the images in The Bestiary Chronicles, a free, three-part comics series from Campfire Entertainment, an award-winning New York-based production house focused on creative storytelling.

CNET, November 11th, 2022
(Get More Information . .) open to premium members only

IT News - Humor
Go Ahead, Be Rude. You Don't Know It Now, But It Will Cost You $350,000
Welcome again to On-Call, The Register's Friday frolic through readers' memories of support jobs that had odd endings.
This week, meet "Larry," who once worked for a company that we won't name. Just understand that this firm is a big name in the business IT world. You don't need to have the powers of a seer to figure this one out.

Larry was running a project to replace the laptops in an entire division of 500 staff, and decided to split the deal between two PC makers.

Users were mostly happy with their shiny new laptops, but one user brought theirs to Larry to report it wasn't working. This machine - well and truly still under warranty - was making the kind of noises that suggested a storage drive had died.

The Register, November 11th, 2022
(Get More Information . .) open to premium members only

IT News - Technology
Understanding The Power Benefits Of Data Processing Units
The use of hardware acceleration in a DPU to offload processing-intensive tasks can greatly reduce power use, resulting in more efficient data center.
The data processing unit (DPU) is a relatively new technology that offloads processing-intensive tasks from the CPU onto a separate 'card' in the server. I put 'card' in quotes as that's the form factor but in reality, a DPU is a mini server on board that's highly optimized for network, storage, and management tasks. A general CPU on board a server was never designed for these types of intensive data center workloads and can often bog down a server.

A good analogy is to consider the role of a GPU. They handle all the graphics- and math-intensive tasks, enabling the CPU to handle the types of tasks it was designed to. A DPU plays a similar role with data center tasks. Despite the strong value proposition, there are still many skeptics of DPUs, primarily because they use more power than a regular network card, but that shows a lack of understanding of workloads.

Blocks&Files, November 8th, 2022
(Get More Information . .) open to premium members only

IDC Futurescape: Top 10 Worldwide Future Of Connectedness Predictions
International Data Corporation (IDC) has announced its Future of Connectedness predictions for 2023 and beyond.
The transition to hybrid work and more distributed workforces has created greater expectations from employees, customers, and partners for seamless anytime anywhere digital interactions to mission-critical systems and processes.

As businesses look ahead to 2023 and beyond, they will face added stressors - economic uncertainty, regional conflicts, supply chain constraints, and a shortage of workers and staffing. While these challenges will play a role in key decisions, IDC data shows that 81% of organizations are still prioritizing connectivity programs. Companies are expected to continue leveraging investments to automate key processes, transform workplaces, improve customer experiences, and increase corporate resiliency.

IDC, November 10th, 2022
(Get More Information . .) open to premium members only

Solidigm Roadmap Promises 61TB SSD
Solidigm presented a detailed look of its near-term SSD roadmap at the Tech Field Day 2022 event, and tucked away in the portfolio is a 61TB drive.
There are actually two drives on the way, both built with Solidigm's fourth-generation 192-layer QLC (4bits/cell) 3D NAND, and called Essential Endurance and Value Endurance. The Essential Endurance variant has a 4KB block size and 3.84, 7.68, 15.36, and 30.72TB capacities, and a maximum 32PB written (PBW) endurance. The Value Endurance has a 16KB block size and capacities of 7.68, 15.36, 30.72, and 61.44TB with a doubled maximum endurance of about circa 65PBW.
Blocks&Files, November 7th, 2022
(Get More Information . .) open to premium members only

IT News - ERP
3 Ways Companies Can Utilize ERP As Recession Hedge
Strong enterprise resource planning (ERP) systems can help businesses prepare to survive an impending and potentially inevitable recession.
With many economists predicting an imminent recession and sluggish consumer spending, CFOs need to be prepared to weather the storm.

'We are headed into another change,' Sharon Bhalaru, partner at national accounting and consulting firm Armanino LLP, said in an interview with CFO Dive, noting that many companies are right now wrestling with a difficult period marked by volatility, uncertainty, complexity and ambiguity - the concept known as VUCA.

CIODIVE, November 9th, 2022
(Get More Information . .) open to premium members only

IT News - BI
5 Tips For Excelling At Self-Service Analytics
Organizations are accelerating their ability to make data-driven decisions by offering analytics capabilities directly to business users. Here's how to do it right.
Data-informed decision-making is a key attribute of the modern digital business. But experienced data analysts and data scientists can be expensive and difficult to find and retain.

One potential solution to this challenge is to deploy self-service analytics, a type of business intelligence (BI) that enables business users to perform queries and generate reports on their own with little or no help from IT or data specialists.

CIO, November 9th, 2022
(Get More Information . .) open to premium members only

IT News - HR
The Companies That Went Fully Remote - And Never Looked Back
Scrapped plans for a new headquarters. An expired lease. A coronavirus-driven shift to remote work has been seamless enough for some companies to ditch physical offices altogether.
Going into 2020, Boston-based Interactions LLC had a clear plan. The technology company would move its headquarters, doubling its total office space at a cost of more than $5 million. All seemed to be going smoothly, and the company was in the process of completing the requisite paperwork.

Then came the coronavirus - and with it, a story that anyone who has sat in an HR department over the past two-odd years likely knows all too well.

HRDive, November 7th, 2022
(Get More Information . .) open to premium members only

IT News - Operations
What Businesses Need To Know About Ransomware Removal And Recovery
Ransomware is a major threat for businesses of all sizes. According to figures from Statista, there were more than 623 million of these attacks in 2021, and the average cost of a ransomware payment reached $541,000 last year - though this only accounts for a fraction of the total cost of these incidents.
This correlates with confirmed attack statistics by BlackFog which saw a record number of attacks in 2021 and 2022.

Therefore, preventing ransomware from causing harm must be a top priority. But while efforts to prevent ransomware entering a business in the first place are vital, it's also crucial that firms have a strong response plan in place should their first lines of defense fail.

A clear strategy for ransomware removal and recovery can help minimize the costs and disruption associated with these incidents, prevent data from being exposed and reduce the chances of cybercriminals returning for repeated attacks.

ComputerWeekly, November 7th, 2022
(Get More Information . .) open to premium members only

IT News - Security
Finding and Remediating OpenSSL Vulnerabilities at Scale: The Balbix Playbook
Whenever a new critical vulnerability hits the world (like last week's high severity OpenSSL vulnerabilities), security teams have to scramble to answer:...
  • What software is impacted?
  • What systems are impacted?
  • How long will it take to patch critical systems?
  • What the impact would be from leaving the vulnerability open in systems with low exposure or impact?

This task is increasingly not a human scale problem; the number of vulnerabilities and assets that organizations like yours have to manage, are growing exponentially.

The path forward lies in automation. Automation allows you to easily find and remediate vulnerabilities at scale. With automation, you can get instant visibility of impacted assets and can easily remediate vulnerabilities to reduce their exposure from weeks and months to days.

Security Boulevard, November 11th, 2022
(Get More Information . .) open to premium members only

IT Security: 3 Areas To Prioritize For The Rest Of 2022
Even in the last weeks of 2022, there are steps you can take to bolster your organization's security. Consider this expert advice
As 2022 winds down, it's tempting to allocate all IT brain power and resources to 2023 planning. But it would be a mistake to assume that there are no remaining agenda items to address this year. The evolving cybersecurity landscape means new vulnerabilities and attack methods are continually emerging.

While combating these threats is undoubtedly a priority for the year ahead, here are three key areas that should be dealt with before you close the door on 2022.

The Enterprisers Project, November 11th, 2022
(Get More Information . .) open to premium members only

IT News - Database
Not Every Database Is The Same: Graph vs. Relational
According to IDC, the amount of digital data created over the next five years will be greater than twice the amount of data created since the advent of digital storage.
Mirroring this sentiment, Statista predicts that data creation will grow to more than 180 zettabytes by 2025, which is about 118.8 zettabytes more than in 2020. This vast, and ever-increasing, volume of data is creating havoc for organizations that need to streamline data integration, lower the cost of data storage, and power downstream analytics.

Complicating an already challenging situation is the fact that today's enterprise data landscape is increasingly hybrid, varied, and changing. IoT-generated data, increasing volumes of unstructured data, the growing reliance on outside data sources, and rising prevalence of hybrid multi-cloud environments are forcing organizations to scrutinize how they store data.

Dataversity, November 7th, 2022
(Get More Information . .) open to premium members only

IT News - FOSS
7 Best Open Source Web-Based Email Clients
Email services are here to stay, even if decentralized tech takes over the internet.
However, with big tech trying to control everything new aspect of emerging technologies, how can you take charge of your email service?

Whether a business/enterprise or an individual, a self-hosted open-source webmail service is always an option worth considering. Your server, your digital infrastructure, and your email service platform. This way, you do not have to rely on a vendor or a third party to manage your email services. You do it your way.

IT'S FOSS, November 9th, 2022
(Get More Information . .) open to premium members only

IT News - HPC
Hyperion Paints A Positive Picture Of The HPC Market
Return to normalcy is too strong, but the latest portrait of the HPC market presented by Hyperion Research yesterday is a positive one.
Total 2022 HPC revenue (on-premise and cloud) will likely wind up around $38.5 billion, roughly 10% over 2021 ($34.8 billion), and next year, 2023, is forecast to hit in the $42.7 billion range. Post-pandemic HPC is bouncing back, if perhaps a bit unevenly.

Lingering supply chain issues, both pandemic- and geopolitical-related, continue to cloud the outlook. There are also worries of a potential broader economic slowdown. Stir all of that altogether and these remain difficult days to be in the forecasting business. On the plus side, demand for AI technology (chips and systems and software) remains strong. Use of cloud-based HPC is surging. Sales at the top end of the market remain strong. And storage, a perennially robust HPC market, is getting an added boost driven by the data demands of AI and IoT.

HPCwire, November 8th, 2022
(Get More Information . .) open to premium members only

One New Feature For Intel's HPC Compute Engines: Contrition
It is very rare for any of the major semiconductor suppliers of the world to ever admit that things are going wrong, even when we all know that they have been.
But as part of a briefing ahead of the SC22 supercomputing conference next week and just ahead of AMD's launch of the 'Genoa' Epyc 9004 series of processors, we got a little something that looked like contrition as Intel is late delivering its 'Sapphire Rapids' Xeon SP CPUs with HBM memory and its related 'Ponte Vecchio' Xe HPC GPUs.

This may be the last time we have to type or read Xe HPC when referring to Intel's compute engines focused on HPC and AI, so let's celebrate that for a second as we contemplate the 'Max Series' branding that Intel has adopted for its HBM-goosed Xeon SP processors, its Ponte Vecchio and follow-on 'Rialto Bridge' datacenter GPUs, and the future hybrid 'Falcon Shores' hybrid CPU-GPU packages due in 2024 alongside the 'Granite Rapids' Xeon SPs. So long superscript e, we never really liked you in a brand name. Go back to the natural logarithm where you belong. . . .

The Next Platform, November 9th, 2022
(Get More Information . .) open to premium members only

IT News - Cloud
2023 Cloud Data Management Predictions
Here are five cloud data management trends to track to maximize data value.
Managing the cost and complexity of cloud infrastructure will be Job No. 1 for enterprise IT in 2023. Cloud spending will continue, although at perhaps a more measured pace during uncertain economic times. What will be paramount is to have the best data possible on cloud assets to make sound decisions on where to move data and how to manage it for cost efficiency, performance, and analytics projects.
ITProToday, November 9th, 2022
(Get More Information . .) open to premium members only

IT News - Wireless
How To Ensure 5G Wireless Network Security
5G creates opportunity for users but also for cybercriminals, so how can organisations ensure 5G wireless network security?
One thing is clear about 5G and network security- it does not involve more of the same. Organisations can't just scale-up existing practices and technologies; they need a new approach.

As Adrian Belcher, Solutions Architect at Gigamon, told me, organisations need 'to treat 5G as a paradigm shift, and they will need an open mindset'.

Information Age, November 7th, 2022
(Get More Information . .) open to premium members only

IT News - DR
Cyber Attacks Are Challenging Organizational Business Continuity Capabilities
New research shows that the majority of organizations don't have confidence that their business continuity strategies will be effective following a successful cyber attack.
This is one of the findings in 'The State of Data Security', a Wakefield Research study commissioned by Rubrik Zero Labs to gather insights from more than 1,600 security and IT leaders including CISOs, CIOs, VPs, and Directors across 10 countries.

Key findings include:

> 92 percent of respondents are concerned they will be unable to maintain business continuity if they experience a cyber attack.

> Only 5 percent of organizations were able to return to business continuity or normal operations within one hour of discovering a cyber attack.

Continuity Central, November 8th, 2022
(Get More Information . .) open to premium members only

IT News - Networks
IPv4 vs. IPv6: What's the difference?
IPv4 and IPv6 are two forms of IP addresses, but they differ in length and style. Compare the two, and find out why organizations might implement one over the other.
IP is a mechanism used to logically identify devices at the network layer of the TCP/IP model. Each device on an IP network must have a unique IP address, subnet and default gateway to perform intersubnet or intervirtual LAN communication by way of routing.

Devices on the internet currently use one of two versions of IP addresses: IPv4 or IPv6. Let's compare how these two addressing types differ.

SearchNetworking, November 9th, 2022
(Get More Information . .) open to premium members only

Network Monitoring Requirements: 3 Keys For Modern Network Architectures
The editors at Solutions Review strategize modern network monitoring requirements in this curated piece based on a guide from our partners at Broadcom.
In the age of Bring-Your-Own-Device (BYOD) and work from home, the enterprise network has expanded far beyond the corporate office walls to any device, on any network, anywhere in the world. Connectivity is more important than ever before. Any potential degradation in network performance, reduction in availability, or even an outage must be proactively prevented to ensure continued revenue growth and an engaging customer experience. This is why IT teams must focus on modernizing their network monitoring requirements and strategy.

There are many ways to dissect your approach to NetMon. However, these are the three keys for building modern network architectures.

Solutions Review, November 7th, 2022
(Get More Information . .) open to premium members only

Cloud Networking vs. Cloud Computing: What's The Difference?
Organizations might sometimes consider cloud computing and cloud networking as interchangeable due to their similarities. But the two strategies have different goals and processes.
Cloud computing and cloud networking are related but distinct ideas.

Cloud computing is concerned about how applications run. Cloud networking covers how connectivity to and among applications is managed and delivered.

Cloud computing

Cloud computing shifts enterprise workload hosting from traditional in-house or colocated data centers to a cloud service provider (CSP)'s data center. The enterprise customer has no access to or direct control of the computing infrastructure underlying the services the workload runs on.

SearchNetworking, November 11th, 2022
(Get More Information . .) open to premium members only

IT News - Careers
6 ITOps Skills That Will Never Be Automated
While automation has transformed the way IT operations team work, there remains a variety of ITOps tasks that are just not possible or feasible to automate.
From NoOps to AIOps, the IT industry is abuzz with buzzwords focused on automating IT operations processes. Work that used to involve lots of time and toil can, we're told, be automated away by algorithms and AI.

But that doesn't mean automation will dominate every part of IT operations work. There will always be tasks that even the smartest AI can't handle.

ITProToday, November 9th, 2022
(Get More Information . .) open to premium members only

IT News - Email
Business Email Compromise: Low-Tech, High-Impact Threat
One of the least technologically sophisticated cyberattacks, business email compromise (BEC), is also one of the most damaging.
According to the FBI's Internet Crime Complaint Center (IC3), there were 241,206 business email compromise incidents between 2016 and 2021, with combined global business losses of $43,312,749,946. In its 2021 internet crime report, the FBI cited BEC as the top internet crime in terms of victim loss for the seventh year in a row, totaling almost $2.4 billion in 2021. That was about a billion dollars more than the second-ranked crime.
Security Boulevard, November 7th, 2022
(Get More Information . .) open to premium members only

IT News - Backup
Ransomware Resiliency For Storage & Backup: Trends, Threats & Tips
Ransomware attacks have been in the public eye for quite a while now. Growth is propelled not only by the surge in the number of cybercrime groups specializing in ransomware, but to a large extent, also by the continual increase in attack sophistication.
Ransomware has evolved into a fully-fledged industry, with competing groups that continually introduce new capabilities and techniques.

Some of the new trends in data crimes, such as data leak, threat of data exposure and shaming techniques have ignited the media attention, though other, potentially even more devastating are still not widely discussed, which we'll attempt to correct here., November 7th, 2022
(Get More Information . .) open to premium members only

IT News - Encryption
Understanding Bring Your Own Encryption And Keys (BYOE)
The main argument against cloud computing put forward by its detractors is security. BYOE ensures the security of all your cloud services. Let's see how.
In cloud computing, the owner of the data has no direct control over it and is forced to rely on the cloud service provider to keep it safe from unauthorized access. The most commonly accepted solution for protecting information residing in clouds is to encrypt it.

The problem with data encryption is that it not only prevents unauthorized users from accessing the data but also adds complications to using the data for legitimately authorized users.

Geekflare, November 10th, 2022
(Get More Information . .) open to premium members only

All Means All When It Comes To Encryption
Nigel Thorpe, technical director at SecureAge, makes the case for encrypting everything all of the time when it comes to protecting data
The traditional and well-established approach to cyber security is to build multiple layers of defences to stop hackers or rogue insiders getting unauthorised access to data.

But you only have to follow the news headlines to see this does not always work. Determined criminals, hacktivists, or simply lucky hackers have a habit of finding a way through. It's just a case of when. If we cannot keep people out nor trust the people around us, we must rethink the traditional 'castle and moat' methods of protection and adopt a data-centric approach, where security is built into data itself.

ComputerWeekly, November 10th, 2022
(Get More Information . .) open to premium members only

Sections in this issue:
click to jump to section