IT News and Events
Mar 23rd, 2020 — Mar 29th, 2020 Generate the Custom HTML Email for this Issue
IT News and Events IT News and Events
Volume 264, Issue 4 << Previous Issue
IT News - CxO
disable
COVID-19: Three Technology Areas That CIOs Must Address
CIOs will need to consider the IT measures that will be needed to support their organisations as the government ramps up its response to the coronavirus
Cliff Saran writes in ComputerWeekly, "With employees working from home to limit the spread of the Covid-19 coronavirus, analyst Gartner has urged CIOs to ensure that everyone who can work from home is able to do so.

The Gartner report, Coronavirus (Covid-19) outbreak: short- and long-term actions for CIOs, recommends that IT departments ensure remote working is fully supported..."

ComputerWeekly, March 17th, 2020
(Get More Information . .) open to premium members only

5 Ways To Tick Off A CISO
As a venture capitalist that invests solely in seed stage cybersecurity entrepreneurs, I often ask myself what keeps CISOs up at night to inform which gaps the next round of enterprise security products needs to address
Yoav Leitersdorf writes in CIO, "YL Ventures Managing Partner Yoav Leitersdorf sat down with cybersecurity powerhouses Pete Bodine, Managing Director at AllegisCyber Capital, Mickey Boodaei, CEO & Founder at Transmit Security, Dino Boukouris, Founding Director at Momentum Cyber, Dawn-Marie Hutchinson, CISO at GSK, Jay Leek, Managing Director at ClearSky, Richard Rushing, CISO at Motorola Mobility, and Oren Yunger, VP at GGV Capital to discuss why security vendors keep CISOs up at night. However, a lot of the answers now seem to lie in mending the risks and occasional damage rendered by existing vendors and products..."
CIO, March 16th, 2020
(Get More Information . .) open to premium members only

14 Ways CIOs Can Show Leadership During The COVID-19 Crisis
What steps should CIOs be taking to help their organizations immediately weather this crisis? Fourteen CIOs share their thoughts
Myles F. Suer writes in Insider Pro, "Last week, in an informal poll by analyst Dion Hinchcliffe, 71 percent of CIOs agreed that the impact of Coronavirus was top of mind. Les Ottolenghi, CIO of Caesars, said, 'At the moment, my top two concerns are coronavirus and the possibility of economic downturn because of the virus.'

Stan Bush, CIO at VA Midwest Healthcare Network, said, 'Unfortunately, all we are doing is trying to protect the most at risk and slow its rate of spread to not overcome medical infrastructure. Once it's inside your borders it's almost impossible to stop without truly draconian measures.' We're clearly starting to see that happen in cities across the country..."

Insider Pro, March 19th, 2020
(Get More Information . .) open to premium members only

Navigating The Pandemic
Nearly every technology company - and almost every business - is desperately determining how to use its arsenal of technology to combat the increasingly severe disruption caused by coronavirus
"In an industry obsessed with disruption, suddenly, everything has been turned on its head," writes Eric Knorr in CIO.

"Reimagining processes and software and infrastructure to satisfy some McKinsey-driven mandate has screeched to a halt. Instead, nearly every tech company - and almost every business - is desperately determining how to use its arsenal of technology to combat the stunningly severe disruption caused by the coronavirus pandemic..."

CIO, March 18th, 2020
(Get More Information . .) open to premium members only

69% Of CIOs Believe COVID-19 Will Significantly Impact Business
CIO India survey reveals that while most CIOs expect an adverse impact on business, the majority believe that businesses will return to normalcy within 3 months
"CIO India's 'Business Continuity Amid COVID-19' conducted between 9-11 March polled Enterprise IT leaders from 109 organizations across the country to access their assessment of the Coronavirus on Business and the measures they are taking to counter it," reports Soumik Ghosh in CIO.

"The survey reveals that on average CIOs across India see COVID-19 having an impact magnitude of 5.5 (on a scale of 1-10) but this varies across sectors.The survey reveals that on average CIOs across India see COVID-19 having an impact magnitude of 5.5 (on a scale of 1-10) but this varies across sectors..."

CIO, March 18th, 2020
(Get More Information . .) open to premium members only

IT News - MFA
disable
Best Security Keys In 2020: Hardware-Based Two-Factor Authentication For Online Protection
While robust passwords go a long way to securing your valuable online accounts, hardware-based two-factor authentication takes that security to the next level
"Being sensible when it comes to passwords is important," opines Adrian Kingsley-Hughes in ZDNet, "and a crucial step to securing your online life. However, some of your online accounts -- for example, your Google Account or Dropbox -- might be so important and contain such a wealth of information that you might want to take additional steps to protect it.

And there's no better way to secure your online accounts than to use hardware-based two-factor authentication (2FA). Security keys are easy to use, put an end to phishing attacks, cheap, and are less hassle and much more secure than SMS-based two-factor authentication. And the good news these days is that you can get security keys in a variety of formats, from USB-A and USB-C, Lightning for iPhone users, and even keys that use Bluetooth..."

ZDNet, March 17th, 2020
(Get More Information . .) open to premium members only

A Spike In Home Workers Raises Mfa Resilience Questions
In the midst of the coronavirus pandemic, many businesses are asking, or mandating, that office-based employees work from home
"Millions of employees who have been logging in from workstations on corporate networks are now logging in from home or elsewhere on public networks," notes Sean Ryan in Forrester.

"Stronger authentication, and VPNs, that used to be required for a subset of employees at any given time now become the point of entry for your entire workforce. So what happens if your multifactor authentication (MFA) provider's infrastructure goes down? For organizations that deal with personally identifiable information (PII) and other sensitive information, having remote workers log in with only a username/password, even over VPN, is not acceptable. A critical piece of any MFA platform service is a high-availability configuration to ensure that authentication requests are processed if the infrastructure fails or parts of the network are overloaded..."

Forrester, March 17th, 2020
(Get More Information . .) open to premium members only

IT News - Storage
disable
4 Causes Of SSD Failure And How To Deal With Them
Although NVMe SSDs are a highly reliable storage technology, they are still prone to occasional failure. Here are some best practices to keep your SSDs humming along
"Compared to hard drives, SSDs are remarkably reliable; yet, no storage technology is perfect. Even the latest NVMe SSDs are susceptible to a sudden or gradual breakdown," writes John Edwards in SearchStorage.

"Knowing how to spot the signs of an imminent SSD failure, as well as understanding how to troubleshoot a malfunctioning SSD, can mark the difference between permanent data loss and a trouble-free recovery. Like any storage device, an NVMe SSD will eventually fail; the only variable is when. Unlike hard drives, SSDs can't send an audible warning that something may be going wrong. Yet, while the SSD may be dead, all is not necessarily lost.

Here's a look at four leading causes of SSD failure and how to resolve the problems..."

SearchStorage, March 19th, 2020
(Get More Information . .) open to premium members only

Bit Rot: How Hard Drives And SSDs Die Over Time
Computer storage is both a blessing and a curse. We can store terabytes of photos, documents, and more at home
"But that data is more precarious than we might assume thanks to a phenomenon known as bit rot or data degradation," writes Ian Paul in How-To Geek.

"Hard Drives and SSDs Don't Last Forever

Take a hard drive and an SSD and bury them with a book in a time capsule for 100 years. You can bet the book will be legible when it resurfaces, but the storage drives? Good luck...'"

How-To Geek, March 18th, 2020
(Get More Information . .) open to premium members only

Achieving Fast, Accurate NAS Migrations In 5 Key Steps
Gartner estimates 83 percent of data migration projects either fail or exceed their budgets and schedules
"This is likely due to the fact that many companies still operate without the aid of dedicated migration software. Trying to navigate a Network-Attached Storage (NAS) migration with outdated and incompetent tools means:

  • High cost of both internal and external personnel
  • Increased risk across all aspects of the project from data integrity to reputation of the migration team
  • Increased number of switchover events with extended outage durations
  • Disruption to the business
  • Lack of proper reporting and governance
  • Skilled staff distracted by migrations instead of working on strategic initiatives

All these challenges can be avoided or significantly mitigated by following a solid migration process..." - StorageReview.com

StorageReview.com, March 19th, 2020
(Get More Information . .) open to premium members only

Software-Defined-Storage Market To Reach $86 Billion By 2023
The software-defined-storage (SDS) market is expected to register a 28% CAGR from 2019 through 2023
"As storage capacity grows due to the accumulation of data for video, big data, data analytics, AI and ML, an increasing portion of data center storage- spend is expected to shift towards SDS storage, which is suited for this new type of data retention and processing.

The SDS market comprises hyper-converged infrastructure (HCI) and standalone SDS products..." - Storage Newsletter

Storage Newsletter, March 19th, 2020
(Get More Information . .) open to premium members only

Ceph Gets Fit And Finish For Enterprise Storage
Ceph, the open source object storage born from a doctoral dissertation in 2005, has been aimed principally at highly scalable workloads found in HPC environments and, later, with hyperscalers who did not want to create their own storage anymore
Jeffrey Burt writes in The Next Platform, "For years now, Ceph has given organizations object, block, and file-based storage in distributed and unified cluster systems well into the tens of petabytes and into the exabyte levels, storage that takes high levels of expertise to deploy, run, and manage. Building and managing these massive object storage clusters takes the kind of skills that HPC, hyperscaler, cloud builder, and other service providers tend to have. But large enterprises and many Tier 2 and Tier 3 service providers do not have such skills.

And the workloads they need to run - either themselves or on behalf of clients - is driving demand for object storage among more mainstream enterprises, who want to leverage artificial intelligence, analytics, containers, and similar advanced technologies but who do not have the expertise to manage complex Ceph environments..."

The Next Platform, March 18th, 2020
(Get More Information . .) open to premium members only

IT News - Technology
disable
The 6 Best Free Video Conferencing Apps
If you suddenly find yourself working from home or another remote location, you're going to miss those interactions with other people
Tim Brookes writes in How-To Geek, "Video conferencing can help by allowing you to talk face-to-face, even if it is via a screen.

  • Google Hangouts
  • CISCO Webex Meetings
  • Zoom Meetings
  • Skype
  • FreeConference
  • Jitsi

Fortunately, there are plenty of free video conferencing apps you can use to connect.

How-To Geek, March 16th, 2020
(Get More Information . .) open to premium members only

Building A More Accurate Time Service At Facebook Scale
Almost all of the billions of devices connected to the internet have onboard clocks, which need to be accurate to properly perform their functions
Oleg Obleukhov writes in a Facebook Engineering blog, "Many clocks contain inaccurate internal oscillators, which can cause seconds of inaccuracy per day and need to be periodically corrected. Incorrect time can lead to issues, such as missing an important reminder or failing a spacecraft launch. Devices all over the world rely on Network Time Protocol (NTP) to stay synchronized to a more accurate clock over packet-switched, variable-latency data networks..."
Facebook Engineering, March 20th, 2020
(Get More Information . .) open to premium members only

IT News - CRM
disable
Machine Learning Is Your Secret Weapon For Customer Acquisition
If you're looking for a strategy to get ahead when it comes to customer acquisition, Machine Learning can be your secret weapon
"While Machine Learning does fall under the larger category of Artificial Intelligence (AI), it's a bit more specific and can be an extremely effective technology to pair with your customer and prospect database," writes Chad Ruff in AiTHORITY.

"True AI can think for itself like Lieutenant Commander Data from Star Trek. Machine Learning, however, can automate tasks and apply predictive analytics that drive meaningful growth. Machine Learning is the AI focal point for your Customer Relationship Management (CRM) tool and can be the key to boosting your customer acquisition..."

AiTHORITY, March 18th, 2020
(Get More Information . .) open to premium members only

IT News - Security
disable
Security Is Leaving The Data Center And Moving To The Edge
The traditional network security model, in which traffic is routed through the data center for inspection and policy enforcement, is for all intents and purposes obsolete
Derek Gabbard reports in HelpNet Security, "A 2019 study by research firm Gartner found that 'more users, devices, applications, services and data are located outside of an enterprise than inside.'

Driven by the adoption of multi-cloud infrastructure and applications, mobility and distributed workforces, the focal point for security has shifted to users and devices. As a result, the current data center-centric approach to network security is struggling to support a load it was not designed to bear..."

HelpNet Security, March 18th, 2020
(Get More Information . .) open to premium members only

Exploring The Risky Behavior Of IT Security Professionals
Almost 65% of the nearly 300 international cybersecurity professionals canvased by Gurucul at RSA Conference 2020 said they access documents that have nothing to do with their jobs
"Meanwhile, nearly 40% of respondents who experienced bad performance reviews also admitted to abusing their privileged access, which is double the overall rate (19%)..."

'We knew insider privilege abuse was rampant in most enterprises, but these survey results demonstrate that the infosecurity department is not immune to this practice,' said Saryu Nayyar, CEO of Gurucul. 'Detecting impermissible access to resources by authorized users, whether it is malicious or not, is virtually impossible with traditional monitoring tools. That's why many organizations are turning to security and risk analytics that look at both employee and entity behaviors to identify anomalies indicative of insider threats.' - HelpNet Security

HelpNet Security, March 18th, 2020
(Get More Information . .) open to premium members only

IT News - Server
disable
Top Hyper-Converged Infrastructure Tco Factors To Consider
A lot of factors for estimating hyper-converged total cost of ownership are fairly straightforward, others less so. Follow these guidelines to get started on this complex process
"Determining the true hyper-converged infrastructure total cost of ownership is perhaps one of the biggest challenges you'll face when assessing hyper-converged appliances," opines Robert Sheldon in SearchConvergedInfrastructure.

"Not only must you take into account the cost of the appliance itself, but also what it takes to deploy, maintain and scale the system over the long term.

The cost of the product itself will depend on whether you purchase it outright or take a consumption-based approach. With consumption-based pricing, you have fewer upfront costs, but the ongoing fees can add up quickly. You must also take into account any optional components or services you want to include, as well as the level of support when opting for a hyper-converged infrastructure appliance that requires additional fees. Also be sure to factor in software licenses and any hidden costs that might come with the system..."

SearchConvergedInfrastructure, March 20th, 2020
(Get More Information . .) open to premium members only

IT News - Linux
disable
How I Migrated From A Mac Mini To A Raspberry Pi
Learn more about Linux by turning a Raspberry Pi Model 2 into a workable desktop computer
"Some time ago, I decided to move my computing environment from a Mac Mini PowerPC to a Raspberry Pi Model 2," recalls Peter Garner in opensouce.com.

"This article describes my reasons for doing so and how I did it. While it is quite technical in places, if you're considering switching from an existing system to something decidedly lean and mean, there are things that you need to know before making that leap. There are lots of links to click as well, which will lead you to the software and apps that I mention..."

opensouce.com, March 16th, 2020
(Get More Information . .) open to premium members only

IT News - Cloud
disable
7 Tips To Manage Cloud Sprawl In Your Enterprise
Cloud sprawl can lead to all sorts of unwanted surprises. Review these recommendations to get control over all the cloud resources across your business
"Organizations run into all sorts of problems when there is a lack of visibility and control over their cloud resources. Cloud sprawl is one of the biggest pitfalls associated with minimal oversight," opines Will Kelly in SearchCloudComputing.

"Cloud sprawl refers to the unchecked proliferation of an organization's cloud instances, services and service providers. It can lead to unexpected costs, security vulnerabilities and management nightmares.

It's critical for businesses to put controls in place to monitor their assets and prevent things from getting out of hand. Follow these tips to help manage cloud sprawl in your organization..."

SearchCloudComputing, March 20th, 2020
(Get More Information . .) open to premium members only

IT News - Networks
disable
VPN Usage Surges As More Nations Shut Down Offices
As social distancing becomes the norm, interest in virtual private networks has rocketed, with some providers already seeing a doubling in users and traffic since the beginning of the year
"The use of virtual private networks (VPNs), a staple technology for remote work, has more than doubled in some countries impacted by the Cononavirus pandemic, as offices close, governments mandate social distancing, and workers move to remote work.," reports Robert Lemos in Dark Reading.

"One provider of VPN services, NordVPN, says it has seen 165% growth in the number of average daily users, up from an expansion of 40% just last week. Google has marked a six- to tenfold increase in searches for VPN-related queries since the beginning of the year. And other VPN providers, such as Atlas VPN, have seen a massive rise in the amount of data flowing through their networks, with Italian users more than doubling their use of that provider's network..."

Dark Reading, March 19th, 2020
(Get More Information . .) open to premium members only

The 3 Best VPN Services For 2020
A VPN (virtual private network) service is a great way to ensure you have a secure network connection while online
Suzanne Humphries writes in reviewgeek, that VPNs "also allows you to protect your browsing history, torrent, and access content that is blocked or regionally restricted.

What Does a VPN Do?

Each of your devices (your computer, smartphone, etc.) have their own unique IP address, which tells services who, what, and where you are. A VPN sits in between your device and however it connects to the internet, spoofing your device's IP address. Anything you do online goes first through the VPN, then to the router, causing your router (and everything outside of your device) to think you have a different identity..."

reviewgeek, March 20th, 2020
(Get More Information . .) open to premium members only

IT News - Careers
disable
Tech Won't Save You From Lockdown Disaster: How To Manage Family And Free Time While Working From Home
Tips from El Reg hack with two decades of WFH experience
"If you aren't already," warns Kieren McCarthy in The Register, "chances are that your home will soon become a prison of sorts as efforts to contain the spread of the coronavirus force, or at least encourage, us to 'shelter in place' with only very occasional trips out for food, medicine, and fresh air.

From California and New York in the US to Europe and the UK, citizens are being told to keep their distance from one another, work from home if possible, close schools and universities, and to avoid pubs, bars, restaurants, gyms, hairdressers, clubs, and similar places..."

The Register, March 21st, 2020
(Get More Information . .) open to premium members only

IT News - Java
disable
Java 14 - 'It Feels Like The Early Days Of Java'
For the release of Java 14 we talked to Java expert Dr. Heinz Kabutz. What does he like and dislike about Java 14? What is he currently working on? What does he still find disturbing in 2020?
"JAXenter: What do you think is the most important new feature in Java 14?

Dr. Heinz Kabutz: A few months ago, Brian Goetz complained on the Java Champion mailing list that they were not getting enough feedback on their preview features. As a result, I decided to from now on always run my JavaSpecialists.eu website on the latest preview version of Java. If you look at the website right now, you will see 'Running on Java 14-ea+29-1384 (Preview)' at the top. It is a bit of work to do this. Besides my master branch, I have three other branches for the Java 14 features: java14-preview, jep359 (records) and jep368 (text blocks). I generally work in master, but then rebase the three other branches off that..." - jaxenter

jaxenter, March 17th, 2020
(Get More Information . .) open to premium members only

IT News - Developer
disable
My Top 6 Open Source Frameworks For Web Development
A detailed rundown of the backend frameworks most used by custom web developers
"There are a lot of backend frameworks that are open source and easily available, but not all of them offer great features," opines Amit Dua in opensouce.com. "Backend frameworks are an essential part of website development, as they work as the nuts and bolts of a website. Basically, they handle everything behind the scenes of a website.

Backend frameworks have extensive libraries, APIs, web servers, and a lot more. They are responsible for the database, ensuring it makes proper communication with the front end and generates backend functionality.

As promised, what follows is a rundown of my top 6 backend frameworks..."

opensouce.com, March 19th, 2020
(Get More Information . .) open to premium members only

Sections in this issue:
click to jump to section