IT News and Events
Nov 21st, 2022 — Nov 27th, 2022 Generate the Custom HTML Email for this Issue
IT News and Events IT News and Events
Volume 296, Issue 4 << Previous Issue | Next Issue >>
IBM News
You Have Thanksgiving Turkey To Thank For LASIK
In November 1981, a group of IBM researchers found that it was possible to use lasers to safely cut into living tissue. Thanks to some leftover turkey, we now have corrective surgeries like LASIK.
The Thanksgiving dinner table isn't the most common place to be inspired to invent. All the turkey and sides might make most people think about dozing off rather than coming up with ways to change the lives of millions of people around the world. But 40 years ago this week, a group of IBM researchers relied on a turkey just like the one you've probably just dug into to help uncover the process that would evolve into LASIK laser eye surgery.
IBM News, November 22nd, 2022
(Get More Information . .) open to premium members only

Red Hat News
Red Hat OpenShift: How To Create And Integrate A Private Registry With Stronger Security Capabilities
A private registry can be useful for storing Linux container images for your applications in an internal, controlled (and potentially more secure) infrastructure.
Linux containers are technologies that allow you to package and isolate applications with their entire runtime environment-all of the files-necessary to run. This makes it easy to move the contained application between environments (dev, test, production, etc.).

In this article, I will show you how to create a simple SSL/TLS-ready private registry with a stronger security posture that can be used to store containers in general, as well as how to integrate it with Red Hat OpenShift, to be able to perform OCP disconnected deployments. It can also be used for cases where the OperatorHub does not have internet access.

Red Hat News, November 25th, 2022
(Get More Information . .) open to premium members only

Friday Five - November 25, 2022
The Friday Five is a weekly Red Hat blog post with 5 of the week's top news items and ideas from or about Red Hat and the technology industry. Consider it your weekly digest of things that caught our eye.
  • Code Comments Episode 2: Rethinking Networks In Telecommunications
  • The New Stack - Red Hat Helps Make Kubernetes Security More Accessible
  • ZDNet - Say hello to Red Hat Enterprise Linux 9.1
  • Enterprise Talk - Leveraging Open Source Technology to Drive Digital Transformation
  • How we use Red Hat Insights to build better products

Read on for details

Red Hat News, November 25th, 2022
(Get More Information . .) open to premium members only

Red Hat Shares - Edge Computing For 5G And Telecommunications
The Red Hat Shares newsletter helps IT leaders navigate the complicated world of IT―the open source way.
Why telcos are prioritizing edge computing

A recent Research and Markets report by Grand View Research states, 'the telecom edge is estimated to grow exponentially' by 2030. Many telecommunications service providers are making edge computing&#8213;moving workloads and services from the core toward the edge of the network, where data is used - a priority as they modernize existing infrastructure and seek new revenue streams.

Red Hat News, November 23rd, 2022
(Get More Information . .) open to premium members only

You Asked. We Acted: Three Ways To Ensure Customer Experience Success In 2023
The time for annual planning has arrived, and my team has been much like many other organizations over the past several weeks - fully heads down in planning.
While we have been thinking ahead to our priorities for next year, we have also been taking time to reflect on how we helped to improve our customers' and partners' experience this year.

I believe that taking time to reflect is important, but it's not something we prioritize enough. It always seems to fall to the bottom of the ever-bottomless to-do list. It is important to reflect on ways that your team can improve, and to listen to what your customers and partners are saying so you can adapt and evolve your approach based on this feedback.

Red Hat News, November 22nd, 2022
(Get More Information . .) open to premium members only

IT News - CxO
3 Critical IT Elements Every CIO And IT Director Must Address For Success
With nearly every company now a digital business, IT systems no longer have to simply run. They suddenly are the livelihood of the company.
Much has been written about the impacts of the pandemic on the world of business, especially the challenges associated with remote work and now the return to work and the hybrid workplace. Beyond workplace issues, perhaps the single greatest impact was how the pandemic sparked a flood of digital transformation initiatives, and that added incredible complexity to technology infrastructures at many companies, testing the limits of IT organizations to successfully implement and support this new way of doing business.
NETWORKComputing, November 15th, 2022
(Get More Information . .) open to premium members only

8 Reasons Why Digital Transformations Fail
Lack of vision, leadership support, and long-term commitment are just a few of the ways that digital transformation journeys take wrong turns or fizzle out.
Digital transformations can go off the rails in the best of times, but the past two years have wreaked additional havoc since employees began working remotely.

Timing being what it is, though, with organizations hyperfocused on digitization, it's more important than ever to address issues and fix problematic projects. Organizations can't afford to fail at digital transformations, given that 'we have now entered the era of the digital business, where transformation must be part of enterprise DNA,'' according to IDC's 2023 FutureScape: Worldwide CIO Agenda 2023 Predictions.

CIO, November 16th, 2022
(Get More Information . .) open to premium members only

CDO Resumes: 5 Tips For Landing A Chief Data Officer Role
Chief data officers are on the rise as businesses embrace data-driven strategies. But you'll want to follow these five tips to write the perfect CDO resume to get the job.
As companies start to adapt data-first strategies, the role of chief data officer is becoming increasingly important, especially as businesses seek to capitalize on data to gain a competitive advantage. A role historically focused on data governance and compliance, the scope of responsibilities for CDOs has since grown, pushing them to become strategic business leaders, according to data from IDC.

According to the survey, 80% of the top KPIs that CDOs report focusing on are business oriented. The top five KPIs for CDOs include operational efficiency, data privacy and protection, productivity and capacity, innovation and revenue, and customer satisfaction and success. And 87% of CXOs said that 'becoming a more intelligent enterprise is their top priority by 2025,' with 52% of CDOs reporting to a business leader.

CIO, November 17th, 2022
(Get More Information . .) open to premium members only

Why Having An Enterprise Integration Strategy Is Imperative
Few businesses have a formal enterprise integration strategy in place, despite realizing its value. Here are best practices for developing one.
Data, from customer information to vendor performance, is increasingly seen as a business asset and a key factor when making business decisions.

Effective data integration of all systems in use across the business is crucial to provide the needed analytical information that informs strategic planning, including where and how organizations can improve operations.

ITProToday, November 14th, 2022
(Get More Information . .) open to premium members only

Forrester's 2023 Predictions Indicate A Bumpy Road Ahead For CISOs
Enterprises that excel at risk management while doubling down on making their tech stacks more resilient stand the best chance of battling cyberattacks in 2023.
Forrester's Predictions 2023: Cybersecurity, Risk, and Privacy report amplifies how essential risk management, resilient infrastructure and cyber insurance will be next year.

More CROs will get promotions and a possible board seat

More chief risk officers (CROs) will report to CEOs next year, increasing risk quantification's importance to C-level executives and company boards. Forrester sees CROs as instrumental in leading their organizations, from achieving compliance to becoming more resilient.

VentureBeat, November 18th, 2022
(Get More Information . .) open to premium members only

IDC FutureScape: Top 10 Predictions for the Future of Trust
With the growing prevalence of cloud-based services greater volumes of data are being collected and analyzed, driving the need for more automation to provide insights into the data as well as artificial intelligence innovations that promise to alleviate pain points experienced by organizations and their customers.
At the same time, as cyberthreats increase in number and sophistication, consumers are more aware of and sensitive to data breaches. Privacy by Design principles are being re-evaluated as customers become more curious and cautious about how their personal information is used. And, while rules and regulations regarding where and how data is stored and transmitted are changing, businesses recognize that their customers cannot tolerate disruptions to the digital infrastructures that undergird their work and daily lives. All this uncertainty is prompting organizations to turn to "the certainty of data."
IDC, November 17th, 2022
(Get More Information . .) open to premium members only

Modern CISO: More Than A Security Officer
YL Ventures CISO-in-residence Frank Kim weighs in on the top security concerns facing CISOs in a Dark Reading interview.
Industry veteran and SANS Institute fellow Frank Kim has joined YL Ventures as its new full-time CISO-in-residence. YL Ventures connects startup entrepreneurs with CISOs to provide advice and guidance as they develop their cybersecurity solutions and grow their businesses. Kim - who founded ThinkSec, a security consulting and CISO advisory firm, and is the former CISO of the SANS Institute - brings in-depth perspective from key facets of cybersecurity to his new role, in which he will focus on the business impact of cybersecurity solutions.
DARKReading, November 15th, 2022
(Get More Information . .) open to premium members only

The Rising Importance Of The CTO
As technology has become the top focus at modern businesses, the role of Chief Technology Officer (CTO) has emerged as a vital leader.
These individuals are responsible for all technology infrastructure and applications, with strong engineering and I.T. experience to allow them to drive the technology roadmap for the firm. Over recent years, this role has become more customer focused as technology has become the heart of the customer experience for most companies.
Technative, November 15th, 2022
(Get More Information . .) open to premium members only

IT News - Storage
Seagate Exos 2X18 Dual-Actuator HDD Line Gets An Upgrade
Seagate has updated its lineup of dual-actuator hard drives (named MACH.2) with the Seagate Exos 2X18.
First shipped in 2019, these HDDs owe their speedy performance to its twin actuators via the MACH.2 technology, quoting up to double the performance of competing enterprise single-actuator 3.5-inch hard drives. This makes them ideal for environments like hyperscale applications, both cloud and massive scale-out data centers, and content delivery networks.
Storage, November 14th, 2022
(Get More Information . .) open to premium members only

SSD vs HDD: What's The Difference, And Which Should You Buy?
Is there still a case to be made for the aging HDD storage technology? You bet there is.
Data storage continues to be a battle between the incumbent HDD (Hard Disk Drive) and the SSD (Solid State Drive). But on first blush, it might seem like the newer, faster SSDs are far better suited for every task than HDDs, and that there's no reason to consider HDDs anymore.

Not true.

While it's very easy to sell the merits of SDDs, there are plenty of cases where HDDs are a perfect choice, even in a modern setting.

ZDNET, November 15th, 2022
(Get More Information . .) open to premium members only

WW Video Surveillance Storage Market To Reach $10.6 Billion By 2027
According to a report from analysts from ReportLinker published on November 9, 2022, in the changed post Covid-19 business landscape, the global market for Video Surveillance Storage (VSS) estimated at $7.4 billion in the year 2020, is projected to reach a revised size of $10.6 billion by 2027, growing at a CAGR of 5.4% over the analysis period 2020-2027.
SAN, one of the segments analyzed in the report, is projected to record a 4.7% CAGR and reach $3.7 billion by the end of the analysis period. Taking into account the ongoing post pandemic recovery, growth in the DAS segment is readjusted to a revised 5% CAGR for the next 7-year period.

US Market Estimated at $2 Billion, While China Forecast to Grow at 8.9% CAGR

The VSS market in USA is estimated at $2 billion in the year 2020. China, the world's second largest economy, is forecast to reach a projected market size of $2.2 billion by the year 2027 trailing a CAGR of 8.9% over the analysis period 2020 to 2027., November 14th, 2022
(Get More Information . .) open to premium members only

Seagate Doubles 18TB Disk's Data Transfer Speed
Seagate has added a second read/write head to its Exos 16 and 18TB disk drives, more than doubling their data transfer speed.
It dubs this its Mach2 actuator technology, an actuator being a read/write head. The actuators are divided into two sets, with each applying to half the platters in the disks and capable of operating independently from the other set. Seagate has not made a formal announcement about this but the drive has sprung up in its product website pages.

Logically, the Exos 2X18 becomes two 9TB drives, and the two actuators address their own logical unit numbers (LUN0 and LUN1), which are addressed independently by the host's operating system.

Blocka&Files, November 16th, 2022
(Get More Information . .) open to premium members only

IT News - Technology
Quantum Computing: Should It Be On It's Strategic Roadmap?
Quantum computing is far from being a mature technology, but now is the time to pencil it into IT strategic roadmaps.
Quantum computing is defined by NASA as a phenomenon 'where a particle can be in many different states at once' due to quantum entanglement. If you are looking for more terms related to quantum computing, the experts at TechRepublic Premium have put together a glossary with all the definitions you'll need.
TechRepublic, November 18th, 2022
(Get More Information . .) open to premium members only

The 2022 Tech Innovator Awards
From among more than 260 applicants, CRN staff selected products spanning the IT industry - including in cloud, infrastructure, security, storage and devices - that offer ground-breaking functionality, differentiation and partner opportunity.
The pace of change and technology innovation in the IT industry, driven by megatrends like cloud computing, automation and digital transformation, continues to accelerate. And the massive shift to hybrid work/work-from-home practices brought about by the COVID-19 pandemic has spurred rapid IT development and change in such areas as communications and collaboration software, remote access to applications and data, and security that extends to employees working outside the office security perimeter.
CRN, November 14th, 2022
(Get More Information . .) open to premium members only

IT News - BI
Top 5 BI Tools
Business intelligence (BI), a technology-driven process for data analysis and information presentation, assist managers, executives, and other end users to make wise business decisions.
Utilizing BI technologies may provide advantages over competitors in the form of faster and improved decision-making, streamlining internal business processes, boosting operational efficiency, and generating new revenues. BI systems can also assist businesses in identifying market trends and identifying issues that need to be resolved. A corporation can, in essence, observe its activities in the past, present, and future thanks to BI tools. Let's examine a few of the leading providers in business intelligence and their various offerings., November 18th, 2022
(Get More Information . .) open to premium members only

IT News - Security
Top 5 Vulnerability Scanning Tools For Security Teams
Use these five vulnerability scanning tools to find weaknesses and potential exploits in web applications, IT and cloud infrastructure, IoT devices and more.
Vulnerability scanning tools enable organizations to search for and discover potential weaknesses within their environment.

Such tools have changed since debuting about 30 years ago. In the beginning, there were two basic types of vulnerability scanners. One scanned the internal network to find hosts on the network, determine what network ports were open and potentially "fingerprint" each host by studying its network behavior to pinpoint its OS and OS version. The other type of vulnerability scanning tool ran on individual hosts, often with local administrator credentials, to get a more comprehensive picture of what software each host was running and what known vulnerabilities were in that software.

SearchSecurity, November 17th, 2022
(Get More Information . .) open to premium members only

XDR: Still Confusing After All These Years
It's time to stop debating about what XDR is and focus on how it fits in a security operations center modernization strategy.
We've been discussing extended detection and response (XDR) for years now, but a fundamental question remains: Just what the heck are we talking about, anyway?

Alarmingly, this continues to be a pertinent question. According to ESG research, 62% of security professionals claim to be 'very familiar' with the term XDR, up from just 24% in 2020. An improvement, but still 29% are only somewhat familiar, not very familiar, or not at all familiar with XDR. So, despite industry hyperbole, arm waving at the RSA conference, and cacophony of XDR talking heads, nearly one in five security professionals haven't received the message.

CSO Online, November 16th, 2022
(Get More Information . .) open to premium members only

The Fight Against Fraud Continues
A closer look at biometric authentication technology
As we recognize Cybersecurity Awareness Month, many organizations are taking the opportunity to sharpen their focus on fraud detection and prevention - and security in general. In fact, the White House Office of Management and Budget (OMB) just recently released new guidance for strengthening the security of the nation's software supply chain.

An outgrowth of a 2021 cybersecurity executive order, under this new guidance, Federal agencies 'will require software vendors to self-certify that they're following secure development practices.'

And for good reason. Software solutions are at the heart of critical infrastructure. From our healthcare platforms to utility delivery (and so much in between), software vulnerabilities can have a profound impact on our nation's resilience.

Cyber Defense Magazine, November 14th, 2022
(Get More Information . .) open to premium members only

Five Steps To Eliminate Passwords
Passwords and credentials remain the largest source of attack attempts and successful attacks, making them the biggest cybersecurity threat to organizations across all industries.
Per Verizon's 2022 Data Breach Investigations Report, 62% of successful breaches are tied to stolen credentials or phishing.

Password attacks come in many shapes and sizes and have evolved to circumvent counter measures like 2FA and traditional MFA.

Hypr, November 18th, 2022
(Get More Information . .) open to premium members only

What Is Top Of Mind For CISOs Right Now?
Security executives are leaning into the powerful twinning of XDR and automated management to reduce the risk and impact of ransomware.
CISOs have a unique perspective on the world. They see security threats to which most people are oblivious, and they face challenges keeping one step ahead of hackers who are looking to penetrate their networks. This threat landscape is outlined four times a year in the "CISO Insider" - an actionable report that explores the top three issues that are most relevant in today's threat landscape.

This quarter, rising ransomware rates, the promise of extended detection and response (XDR) in helping rapidly address emergent threats, and the need for increased automation and better tools to empower security teams to do more with limited resources have come to the forefront. Keep reading to learn how you can apply these insights to your own operations.

DARKReading, November 16th, 2022
(Get More Information . .) open to premium members only

Security And Privacy In 2023: What To Watch Out For Next Year
Back in January, few could have predicted the events that have unfolded this year. So trying to anticipate trends for the coming 12 months is always going to be fraught with risk.
That said, we can point to some clear macro-trends in the cybersecurity and privacy sphere which will help IT decision makers to steer their ship to calmer waters in 2023.

As digital investments accelerate to cushion the blow from incoming recession, organizations will look to simplify security with a focus on data protection and more efficient cyber risk management.

Security Boulevard, November 17th, 2022
(Get More Information . .) open to premium members only

GDPR - Privacy First
Let us start this by talking about why privacy is important to the business. You want to assure your customers, especially in Europe that you take their data seriously and will develop processes to protect it.
The recent companies that have been fined by the European Union are:

1. Ireland slammed WhatsApp with A 225 million Euro GDPR penalty after claiming that the messaging service had failed to properly explain its data processing practices in its privacy notice...

Security Boulevard, November 14th, 2022
(Get More Information . .) open to premium members only

IT News - Database
Databases Still Pushing More Hardware Purchasing Than Any Other App
Databases remain the largest single driver of enterprise hardware purchases, according to analyst outfit IDC.
IDC's latest Worldwide Semiannual Enterprise Infrastructure Tracker observes that in the first half of 2022, $6.3 billion of servers and storage were sold - just to support databases or data management workload.

That document also extrapolates $14.1 billion of hardware spend in 2022 across the data management industry - which IDC defines as spanning AI Lifecycle, Business Intelligence and Analytics, Structured Database/Data Management, Text and Media Analytics, and Unstructured Databases.

The Regster, November 14th, 2022
(Get More Information . .) open to premium members only

IT News - Server
Serverless Computing
Serverless computing is a cloud computing execution model that lets software developers build and run applications and servers without having to provision or manage the back-end infrastructure.
With serverless, the cloud vendor takes care of all routine infrastructure management and maintenance, including updating the operating system (OS), applying patches, managing security, system monitoring and planning capacity.

With serverless computing, developers purchase back-end services from cloud services vendors on a pay-as-you-go basis, which means they pay only for the services used. The main goal of serverless computing is to make it simpler for developers to write code designed to run on cloud platforms and to perform a specific role.

SearchITOperations, November 15th, 2022
(Get More Information . .) open to premium members only

IT News - Linux
Red Hat Introduces Latest Versions Of Red Hat Enterprise Linux
Red Hat Enterprise Linux 9.1 and 8.7 extend greater flexibility, reliability and stability as a backbone for hybrid cloud innovation, from the datacenter to public clouds to the edge.
Red Hat, the world's leading provider of open source solutions, introduced Red Hat Enterprise Linux 9.1, the latest version of the world's leading enterprise Linux platform. Along with the recently announced Red Hat Enterprise Linux 8.7, these minor versions add and refine capabilities for a wide range of enterprise IT needs, from helping to streamline complex infrastructure environments to improving the security stance of containerized applications.
AiTHORITY, November 16th, 2022
(Get More Information . .) open to premium members only

Linux Commands: Drop These Old Utilities For Modern Alternatives
These traditional Linux utilities have been revitalized with modern replacements.
Linux has a good track record for software support. There are about 60 commands in man section 1 of Unix 1st edition, and the majority still work today. Still, progress stops for no one. Thanks to vast global participation in open source, new commands are frequently developed. Sometimes a new command gains popularity, usually because it offers new features, or the same features but with consistent maintenance. Here are ten old commands that have recently been reinvented., November 17th, 2022
(Get More Information . .) open to premium members only

AlmaLinux 9.1 Released
The AlmaLinux OS Foundation, the nonprofit that stewards the community owned and governed open source CentOS replacement AlmaLinux, is releasing AlmaLinux 9.1
AlmaLinux 9.1 provides a more stable foundation for open hybrid cloud innovation, new enhancements and features to deliver workloads, applications and services for multiple environments more efficiently. Security features are focused on risk reduction and better compliance maintenance. AlmaLinux 8.7 was released last week.

AlmaLinux 9.1 is 1:1 binary compatible with RHEL, and the distributed Linux kernel version is 5.14.0-160.el9. AlmaLinux 9.1 supports 4 architectures: x86_64, aarch64, ppc64le and s390x. AlmaLinux 9.1 is ready for production installations.

HPCWire, November 17th, 2022
(Get More Information . .) open to premium members only

Red Hat Enterprise Linux 8.7 Is Officially Out With New Capabilities And System Roles
Red Hat released Red Hat Enterprise Linux 8.7 as the latest update to their Red Hat Enterprise Linux 8 operating system series to bring more new features, updated components, and other changes.
Red Hat Enterprise Linux 8.7 is here six months after Red Hat Enterprise Linux 8.6 and introduces new capabilities like the ability to view and manage system-wide crypto policies for consistency and reduction of risk, support for editing custom firewall services, as well as to label and encrypt data in sosreports.

This release also improves the kernel live patching workflow by allowing you to install only kpatch updates in the web console, and makes it possible to download the Red Hat Enterprise Linux installation media when you try to create a new virtual machine in the web console.

9to5linux, November 13th, 2022
(Get More Information . .) open to premium members only

IT News - FOSS
It's Official - Open Source Software Has Never Been More Important
Nearly all apps around today are using open source software
New research has indicated that the majority of today's apps are built using open source software (OSS), once again demonstrating its importance

According to GitHub's Octoverse 2022 report(opens in new tab) on the state of open source software, 90% of the Fortune 100 companies use OSS to some capacity, compared to the findings of the company's first report in 2012 where companies were only using OSS to run their web servers., November 14th, 2022
(Get More Information . .) open to premium members only

IT News - Cloud
What Is Public Cloud? Everything You Need To Know
A public cloud is a third-party managed platform that uses the standard cloud computing model to make resources and services available to remote users around the world.
Public cloud resources typically include conventional IT infrastructure elements such as virtual machines, applications or storage.

Services can include an array of workloads including databases, firewalls, load balancers, management tools and other platform-as-a-service (PaaS) or software-as-a-service (SaaS) elements. Users then assemble resources and services to build an infrastructure capable of deploying and operating enterprise workloads. Public cloud services can be free or offered through a variety of subscription or on-demand pricing schemes, including pay-per-usage or pay-as-you-go (PAYG) models.

SearchCloudComputing, November 17th, 2022
(Get More Information . .) open to premium members only

6 Tips For Understanding 3rd-Party Risk In The Cloud
If you're like most modern organizations, you rely on third-parties to help you run and grow your business.
Yet the vendors, partners and suppliers that make up your supply chain are also a significant component of your cloud environment attack surface. While you can't (and shouldn't) cut third-parties off completely, you can (and should) enforce the principle of least privilege when providing them with permissions into your single and multicloud environment. Read on to learn how to implement this essential modern security practice and tips for getting started.
Security Boulevard, November 16th, 2022
(Get More Information . .) open to premium members only

IT News - Tape
SC22: Versity Deploys 60PB System On Tapes For National Center For Supercomputing Applications
To automate HPC workflows with scalable, modular, and efficient data management platform
Versity Software, Inc. announced that the 60PB mass storage solution for NCSA at the University of Illinois Urbana-Champaign, has been procured, tested, and deployed. This project is part of a long-term storage project called Granite.

The new storage system is driven by Versity's next gen Scale Out Archive Manager (ScoutAM) platform. The system provides researchers with seamless access to archival data using open standard protocols and automates complex workflows while enabling responsive metadata searches and queries., November 16th, 2022
(Get More Information . .) open to premium members only

Sections in this issue:
click to jump to section