IT News and Events
VentureBeat: The Data Summit: The new oil of the digital age (March 9th)
Jan 17th, 2022 — Jan 23rd, 2022 Generate the Custom HTML Email for this Issue
IT News and Events IT News and Events
Volume 286, Issue 3 << Previous Issue
IT News - CxO
disable
IT Leadership: 4 Tips On Achieving Your Goals In 2022
CIO Rhonda Vetere shares advice on how to use the lessons of the past two years to stay motivated and focused in 2022
Dan Roberts writes in The Enterprisers Project, "We made it through another topsy-turvy year. Many technology leaders are reflecting on some pretty massive achievements over the past two years &#8210; from turning on a dime to pivot entire organizations to remote work to accelerating their digital transformation and driving business performance through collaborative, strategic efforts.

Most of us feel like we've been running a marathon for the past two years. It's not surprising that disengagement, burnout, and turnover are on the rise. But all signs point to more unpredictability ahead, and we need to make sure we and our teams have the mental and physical energy to not just tackle the next challenges but also keep an eye on what's to come..."

The Enterprisers Project, January 11th, 2022 EST
(Get More Information . .) open to premium members only

The Boardroom Isn't Ready For The Next Solarwinds
Last year, attacks such as SolarWinds and Colonial Pipeline have served as a powerful wake-up call for enterprises
"The SolarWinds supply chain attack demonstrated that cybercriminals could gain access to some of the world's most highly regarded companies", writes Brett Galloway in Security Boulevard, "while remaining undetected for months. Meanwhile, the Colonial Pipeline ransomware attack directly impacted the socioeconomic health of the United States through gas shortages and price increases, transforming ransomware into a top-tier national security threat overnight.

Coming off the one-year anniversary of the SolarWinds intrusion, concerns remain about the effectiveness of the capabilities and programs that have been put in place and the effectiveness of the board's governance of cybersecurity risk.

Security Boulevard, January 14th, 2022
(Get More Information . .) open to premium members only

Arming CISOs With the Skills to Combat Disinformation
As if chief information security officers (CISOs) did not have enough to deal with, add one more issue to their plates: information warfare.
George Platsis writes in Security Intelligence, "These operations now target private and non-governmental entities almost as often as they involve world powers. That's why it's more important than ever to know the difference between misinformation and disinformation - and how to stop them both.

Information wars are old. They date back millennia, as does the strategy of deception in warfare. Despite the age and use of disinformation, we've seen a recent uptick in discussion on the subject. Run a small experiment: perform an internet search for material from before 2016 on the word 'disinformation' and see how many fewer results there are than what you'd find today. You'll find first-page results with publish dates spanning the 2010s. Go a couple of pages in and you may see references to books from the 80s and 90s. Search that term today, though, and it takes quite a few clicks to find something that wasn't written in 2021..."

Security Intelligence, January 12th, 2022
(Get More Information . .) open to premium members only

How Do IT Leaders Plan To Overcome Remote Work Security Challenges?
Two years ago, IT leaders were forced into remote work. Many viewed it as a temporary experiment. Today, they see it for what it is: the future of work. And they've made it their top priority.
According to the results of a Citrix Systems and Pulse survey, 100 percent of 400 IT and security leaders across North America, EMEA, and APAC have adopted the hybrid model, and rank enabling it as job number one for their organizations.

'In 2020, IT was focused on survival amid the great remote work pressure test. In 2021, they overhauled their infrastructure and strategies to accommodate this new model. And in 2022, they will enact flexible technology strategies and workplace policies to deliver what is clearly the future of work,' said Meerah Rajavel, CIO, Citrix.

HelpNet Security, January 21st, 2022
(Get More Information . .) open to premium members only

How CISOs Can Address The Challenges Of Cloud Misconfigurations
Multi-cloud strategies offer CISOs an opportunity to rethink their current approach to security, says Fortinet's Rajesh Maurya
"Cloud security is a challenge CISOs face at many organizations," warns Rajesh Maurya in CXOtoday.com. "Despite conversations across senior leadership and security teams, it remains one of the primary threats facing modern businesses. According to the 2021 Verizon Data Breach Investigations Report, 73% of data breaches involved cloud assets, a year-over-year increase of 46%, marking the first year that cloud incidents surpassed on-premises ones.

However, despite these threats, cloud adoption will continue to skyrocket, Gartner had predicted that global public cloud service spending will reach $332.2 billion in fiscal year 2021. With that in mind, tackling cloud security issues should be a primary cybersecurity concern for CISOs moving into 2022..."

CXOtoday.com, January 11th, 2022 EST
(Get More Information . .) open to premium members only

4 Ways The CIO Can Help Stem The Great Resignation
CIOs can take an active role in creating a positive environment that breeds loyalty, both within their organization and across the company
Roberto Torres writes in CIODIVE, "About 4.5 million Americans quit their jobs in November - or 3% of the total workforce, according to the Bureau of Labor Statistics' most recent report. The November results matched the series record reached in September, when industry reported the highest percentage of quits since the agency started keeping track 20 years ago.

The phenomenon known as the Great Resignation, the Great Reshuffle or the Big Quit has become a major concern for businesses nationwide, especially in already labor-tight industries, such as technology, healthcare and retail..."

CIODIVE, January 11th, 2022
(Get More Information . .) open to premium members only

Why Security Awareness Training Should Begin In The C-Suite
It's not just the rights and privileges that CXOs have on the network. They can also set an example of what good security hygiene looks like.
"Cybercriminals aren't only targeting your employees," warns Ashley Rose in DARKReading, "now they're also after the C-suite. The number of reported data breaches continued increasing exponentially this year, up 17% from 2020. Even more alarming is that a growing number of these attacks are aimed at high-level accounts. Business email compromise scams that are skillfully crafted to trick even the savviest of victims are on the rise, resulting in losses of $1.8 billion in 2020, according to the FBI's Internet Crime Report, and reaching unprecedented levels since. Account takeover attempts rose a staggering 671% in the third quarter of 2021, according to a study by one cloud email security provider..."
DARKReading, January 11th, 2022
(Get More Information . .) open to premium members only

IT News - Storage
disable
7 Decentralized Data Storage Networks Compared
Set to change the distributed data storage market, decentralized storage offers organizations a promising alternative to centralized cloud storage
Robert Sheldon writes in SearchStorage, "Decentralized data storage has emerged as a disruptor to traditional cloud storage and could represent a significant shift in the way organizations distribute and store data in the future. Numerous companies already offer decentralized storage options, some of which use blockchain technology to facilitate storage operations and validate transactions across a distributed network..."
SearchStorage, January 10th, 2022
(Get More Information . .) open to premium members only

Best Storage Products Of 2022
Here are the companies with the best storage products of the year as compiled by the redaction of StorageNewsLetter.com:
  • HDDs
  • SSDs
  • Tapes
  • Subsystems
  • Software
  • Online backup

Read on for details

StorageNewsletter.com, January 14th, 2022
(Get More Information . .) open to premium members only

Reduce Data Storage Waste With Planning, Retention Policies
Delete unneeded data to ensure no data storage is wasted and to save both time and money. Use retention policies, data repositories and compliance as guides to get started
"The world generates data at a staggering rate," writes Robert Sheldon in SearchStorage.

"At least 30% of an organization's unstructured data is redundant, obsolete or trivial (ROT), with some estimates pushing it much higher, according to ManageEngine.

The rise of 5G and IoT devices fuels this trend even more. Along with the massive amount of information comes an enormous amount of data waste, taxing storage and network systems more than ever. Data waste comes in a variety of forms, such as duplicate emails, outdated documents, bloated web content, unnecessary communications and poor data management. All this data requires more storage capacity, adds data management complexity and translates to higher costs..."

SearchStorage, January 11th, 2022
(Get More Information . .) open to premium members only

IT News - AI
disable
Deere CTO: Data Quality Sets Pace For Future Of AI
Data access and quality is a limiting factor for the development of future AI applications, said Deere CTO Jahmy Hindman, speaking at CES 2022 on Jan. 5. Data labeling is still mainly a manual process, which sets the pace for developing advanced models in the enterprise.
Roberto Torres writes in CIODIVE "Deere, a top manufacturer of equipment for the agriculture industry and maker of the John Deere brand, plans to use AI-based technology to revolutionize agriculture. The most recent result of the company's AI strategy is its autonomous tractor, presented during CES.

Available to farmers later this year, the company's new offering combines the 8R tractor with a GPS guidance system, self-driving capabilities and stereo cameras for obstacle detection. At the center of its development is visual data..."

CIODIVE, January 12th, 2022
(Get More Information . .) open to premium members only

The Age of AI-ism
I recently read The Age of AI: And Our Human Future by Henry Kissinger, Eric Schmidt, and Daniel Huttenlocher. The book describes itself as 'an essential roadmap to our present and our future.'
Rich Heimann writes in TechTalks, "We certainly need more business-, government-, and philosophical-centric books on artificial intelligence rather than hype and fantasy. Despite high hopes, in terms of its promise as a roadmap, the book is wanting.

Some of the reviews on Amazon focused on the lack of examples of artificial intelligence and the fact that the few provided, like Halicin and AlphaZero, are banal and repeatedly filled up the pages. These reviews are correct in a narrow sense. However, the book is meant to be conceptual, so few examples are understandable. Considering that there are no actual examples of artificial intelligence, finding any is always an accomplishment..."

TechTalks, January 13th, 2022
(Get More Information . .) open to premium members only

10 NLP Predictions For 2022
Natural language processing (NLP) has been one of the hottest sectors in AI over the past two years.
"Will the string of big data breakthroughs continue into 2022?" asks Alex Woodie in datanami.

"We checked in with industry experts to find out. There's been a veritable arms race to develop large transformer models over the past couple of years. It started in 2020 with OpenAI's GPT-3 with 175 billion parameters. Then Microsoft and Nvidia teamed up on MT-NLG (Megatron-Turing Natural Language Generation), which sported 530 billion parameters. Finally in 2021, Google gave us its Switch Transformer with 1.6 trillion parameters..."

datanami, January 12th, 2022
(Get More Information . .) open to premium members only

IT News - Blockchain
disable
Trends In Blockchain For 2022
Hiring top IT talent is more essential - and more challenging - than ever. Consider these key high-demand roles and how to attract the right candidates
"As organizations kick off 2022 IT hiring, the demand for IT talent is not slowing down," notes Jenna Spathis in DevOps.com.

"Digital transformation leaders and IT security professionals are in particularly high demand, driven by digital transformation and the continuation of remote work.

Many companies that put digital transformation on hold during the pandemic are now prioritizing these initiatives and are seeking top IT professionals to lead them. Hand-in-hand with digital transformation initiatives is IT security. Security continues to be a top priority for organizations as phishing attempts and hacking threatens their data.

DevOps.com, January 14th, 2022
(Get More Information . .) open to premium members only

IT News - BI
disable
BI Tools 2022: Best Business Intelligence Software
BI software tools identify patterns and trends in data to assist in making strategic business decisions. Compare the top business intelligence tools to see which solution best fits your business needs.
Samuel Greengard writes in eWeek, "Business intelligence (BI) software tools enable companies to analyze events, trends and market changes to gain competitive advantage.

These BI tools collect, manage and interpret mountains of structured and unstructured data. They construct models that deliver answers and insights through reports, charts, graphics and other data representation methods. BI software is the foundation of digital transformation..."

eWeek, January 11th, 2022
(Get More Information . .) open to premium members only

IT News - HR
disable
4 Ways HR Leaders Can Reimagine The Great Resignation As An Opportunity
Companies that focus on skills over titles may gain the upper hand, write Jonathan Pearce and Michael Griffiths of Deloitte.
Jonathan Pearce and Michael Griffiths writes in HTDIVE, "Over the past year, disruptions to the global supply chain and lack of access to materials have been causing chaos across U.S. markets spanning electronics, autos, ingredients for holiday cheesecakes and everything in between. Now, amid the "Great Resignation," a major constraint to business growth today is not just the supply chain, but the supply of talent..."
HTDIVE, January 11th, 2022
(Get More Information . .) open to premium members only

Virtual Job Fairs Continue To Help Employers Cast A Wider Net
The traditional process of vying for recruiter attention may hold marginalized talent back
"Everything regarding talent hangs in the balance these days, from retention to recruitment," notes Caroline Colvin in HRDIVE.

"Many HR professionals have been throwing different techniques at the wall to see what sticks. One avenue HR departments may not be thinking about are job fairs. As omicron ramps up, in-the-flesh fairs with brochure-filled booths, winding lines and craned necks aren't on the agenda for many. But virtual job fairs continue to be popular heading into 2022, a year projected to be significant for recruiting..."

HRDIVE, January 11th, 2022
(Get More Information . .) open to premium members only

8 Key Technologies For The Future Of Work
As the hybrid workplace becomes the norm, technologies designed to accommodate, protect, and improve productivity for remote and in-office employees will be critical.
"Many would argue that the future of work is already here," writes Bob Violino in ComputerWorld.

"Enterprises in virtually every industry have had to revamp their work models in reaction to the pandemic and safety guidelines, giving employees more flexibility than they've ever had before.

As more organizations adopt the hybrid work model, in which employees work part of the time at home and part in the corporate office, that flexibility will continue, and this mode of work will likely be the way things are done for years..."

ComputerWorld, January 11th, 2022
(Get More Information . .) open to premium members only

IT News - Operations
disable
What's Next for Patch Management: Automation
The next five years will bring the widespread use of hyperautomation in patch management
"When it comes to security, there are two disciplines that every organization should follow: producing secure code and practicing good cyber hygiene," writes Srinivas Mukkamala in DARKReading.

"As the developer produces code, it's imperative to catch security weaknesses right away to avoid dealing with them downstream. For cyber hygiene, patch management will continue to be the most important proactive measure that organizations can take to protect their technology. Shift-left and shift-right principles are well understood and discussed within application security; we should extend them to device management as well..."

DARKReading, January 14th, 2022
(Get More Information . .) open to premium members only

The Evolution Of Patch Management: How And When It Got So Complicated
In the wake of WannaCry and its ilk, the National Vulnerability Database arose to help security organizations track and prioritize vulnerabilities to patch.
"If you look at the past, patch management was not a cybersecurity issue," notes Srinivas Mukkamala in DARKReading, "rather, it was an IT issue. And it wasn't until the emergence of Code Red in 2001 when Microsoft started issuing patches to plug security vulnerabilities in its software. Patch management as security came to prominence again with the massive Internet worms of 2009, 2011, and 2012, including WannaCry in 2017, which would shock entire enterprise networks. These incidents would set the stage for widespread adoption of regular patch management cycles among enterprises. Until then, there were only sporadic security incidents, but nothing large in scale where you would see viruses and malware spreading across geographies..."
DARKReading, January 10th, 2022
(Get More Information . .) open to premium members only

Top Infrastructure Monitoring Tools 2022
Infrastructure monitoring is the proactive analysis of application infrastructure that enables you to identify or predict performance issues before they become grave and ensures that network resources are functioning as intended.
Surajdeep Singh writes in IT Business Edge, "For example, a large data center operating multiple servers could face instances where servers are running and consuming electricity without using any cycles or generating traffic. Appropriate information technology (IT) infrastructure monitoring would help prevent the loss of money, space, and time associated with running and maintaining unproductive servers.

Why is Infrastructure Monitoring Important?

IT monitoring software automates the collection and analysis of information related to infrastructure components, be it on-premises or in the cloud. This allows IT teams to address the root cause of performance setbacks quicker and more efficiently..."

IT Business Edge, January 13th, 2022
(Get More Information . .) open to premium members only

IT News - Security
disable
SECNAP: What is a Security Assessment and Why is it Important
With cybersecurity threats on the rise, it's important to know that your information and overall infrastructure are secure.
But how do you really know if your data is safe? After all, new zero-day exploits and vulnerabilities are being discovered every day-a reality -that makes safeguarding your architecture and systems all the more challenging. In this climate, investing in vulnerability management has never been more crucial.

A well-executed vulnerability management process is key to keeping your systems secure and compliant. And it starts by performing a security assessment. In this article, we'll detail the different factors of security assessment, what you should be looking for, and how it can help bring your security and compliance needs in alignment with your IT spend.

SECNAP, January 10th, 2022
(Get More Information . .) open to premium members only

Top Five Vulnerabilities Attackers Use Against Browsers
Web browsers are the primary target for many attackers because so much sensitive data passes through them
From casual shopping to enterprise management systems to military operations, browsers have become the primary vehicle people use to access network-connected systems. Unfortunately, browsers have a long and storied history of vulnerabilities that have provided attackers with a lucrative and near-endless supply of victims upon which to prey. Here are the most common web browser security vulnerabilities to watch out for:
IT Business Edge, January 12th, 2022
(Get More Information . .) open to premium members only

10 Lessons Learned From The Top Cyber Threats Of 2021
2021 was a busy year for the cyber security community. Emerging threats posed many challenges to security professionals and created many opportunities for threat actors.
Picus has curated a list of the top five threats observed in 2021, detailing ten lessons defenders can learn from them.

Microsoft Exchange Server Vulnerabilities

In January 2021, Volexity detected a large amount of egress data traffic on its customers' Microsoft Exchange Servers '1'. Later, it discovered that several vulnerabilities had been exploited for unauthorized data exfiltration by an APT group called HAFNIUM. In March 2021, Microsoft released several updates to patch zero day vulnerabilities found in Microsoft Exchange Server affecting versions 2010, 2013, 2016 and 2019 '2'. Details of the vulnerabilities are provided below:

Security Boulevard, January 10th, 2022
(Get More Information . .) open to premium members only

Cybersecurity Alone Is Not Enough, Systems Need Cyber Resiliency
Electronics systems today need to go beyond preparedness for an attack to resiliency during and after one.
Eric Sivertson writes in Cyber Defense Magazine, "The National Vulnerability Database reported that between 2016 and 2019 the number of firmware vulnerabilities grew over 700 percent. Industry analyst group, Gartner, reports that by 2022 '70 percent of organizations that do not have a firmware upgrade plan in place will be breached due to a firmware vulnerability"

Not only do these vulnerabilities jeopardize final products deployed in the field, but they can also impact individual components as they move through today's rapidly changing and increasingly unpredictable global electronics supply chain, from initial component manufacturing and shipment to a contract manufacturer, to system integration and on through the device's entire operating life in the field..."

Cyber Defense Magazine, January 10th, 2022
(Get More Information . .) open to premium members only

IT News - Linux
disable
Modern Alternatives To Some Of The Classic Linux Commands
When you start learning Linux, you begin with a standard set of Linux commands that have been in existence since the UNIX days
Abhishek Prakash writes in It's FOSS, "As you grow old as a Linux user, you keep on mastering the same set of standard commands.

But these standard, legacy commands were created several decades ago and while they do their intended jobs, their functionalities could be improved and the structure could be simplified.

This is why there exists 'alternative' tools that enhance the legacy UNIX/Linux commands. In this article, I am going to list some new CLI tools that you could use in place of the good old classic Linux commands..."

It's FOSS, January 14th, 2022
(Get More Information . .) open to premium members only

LUKS: Linux Hard Disk Data Encryption with NTFS Support in Linux
LUKS acronym stands for Linux Unified Key Setup which is a widely method of disk-encryption used by Linux Kernel and is implemented with the cryptsetup package.
Matei Cezar writes in TECMINT, "The cryptsetup command line encrypts a volume disk on fly using symmetric encryption key derived from supplied passphrase that is provided every time a volume disk, a partition and also a whole disk (even a USB stick) is mounted in filesystem hierarchy and uses aes-cbc-essiv:sha256 cipher.

Because LUKS can encrypt the entire block devices (hard-disks, USB sticks, Flash disks, partitions, volume groups etc) on Linux systems is largely recommended for protecting removable storage media, laptop hard-disks or Linux swap files and not recommended for file level encryption..."

TECMINT, January 10th, 2022
(Get More Information . .) open to premium members only

IT News - Careers
disable
IT Careers: 5 Flourishing And 4 Fading IT Skills For 2022
Looking for a new IT job in 2022? Explore some of the most in-demand skills
"There's no dispute: An IT talent war is afoot," opines Stephanie Overby in The Enterprisers Project. "Nearly three-quarters (73 percent) of global technology leaders surveyed for IEEE's Impact of Technology in 2022 and Beyond survey say recruiting technologists and filling open tech positions in the year ahead will be challenging.

However, both the needs of the enterprise and the capabilities of the tech talent marketplace are a mixed bag. There are red-hot and lukewarm skills and a variety of enterprise technology requirements. Determining how best to match supply and demand has become as much art as science. This year, creating 'micro career paths aligned to individual aspirations will be important,' says Yugal Joshi, a partner at Dallas, Texas-based strategic IT consultancy and research firm Everest Group..."

The Enterprisers Project, January 11th, 2022
(Get More Information . .) open to premium members only

IT Talent: 3 Hot IT Roles In 2022 And Beyond
Hiring top IT talent is more essential - and more challenging - than ever. Consider these key high-demand roles and how to attract the right candidates
Jenna Spathis writes in The Enterprisers Project, "As organizations kick off 2022 IT hiring, the demand for IT talent is not slowing down. Digital transformation leaders and IT security professionals are in particularly high demand, driven by digital transformation and the continuation of remote work.

Many companies that put digital transformation on hold during the pandemic are now prioritizing these initiatives and are seeking top IT professionals to lead them. Hand-in-hand with digital transformation initiatives is IT security. Security continues to be a top priority for organizations as phishing attempts and hacking threatens their data..."

The Enterprisers Project, January 14th, 2022
(Get More Information . .) open to premium members only

Information Age's Guide To Tech Leadership Roles
Our guide to tech leadership roles will explore four of the most prominent positions: the chief technology officer (CTO), chief information officer (CIO), chief data officer (CDO), and chief product officer (CPO)
"Leadership in the ever-evolving tech sector is paramount to the success of organisations," opines Aaron Hurst in Information Age.

"Businesses in nearly every vertical have a tech-focused leadership team that oversees technological operations inside and outside the company. With the ongoing COVID-19 pandemic rendering innovation more important than ever in maintaining a high standard of customer service and experience, tech leadership positions and duties are often prone to change. With this in mind, we present a guide to the four biggest tech leadership roles: the CTO, CIO, CDO and CPO..."

Information Age, January 10th, 2022
(Get More Information . .) open to premium members only

The Future Of Work Is Here
The COVID-19 pandemic washed away the old ways of working in a deluge of change. As the waters recede, professionals find themselves questioning everything about where we go from here.
"Everyone is talking about the future of work and for good reason. It's already here," suggests Mike Elgan in Computerworld.

"The nature of work, and the technology that we rely on to do that work, always changes. But the COVID-19 pandemic radically accelerated change, forcing organizations large and small into embracing remote work.

In 2020, millions of people found themselves working from home. And that group includes not just self-directed freelancers, consultants, developers, and marketers who were willing and able to work remotely before the crisis; it now includes managers, CEOs, HR professionals, team leaders, and IT professionals...."

Computerworld, January 13th, 2022
(Get More Information . .) open to premium members only

IT News - Big Data
disable
What Is Data Visualization? Benefits, Types & Best Practices
Data Visualization is the visual representation of information, making it an easier and better source for learning and data analysis.
Yousef Fatehpour writes in eWeek, "At the core of digital transformation lies data democratization, the practice of making data accessible throughout all departments of a business, not simply the C-suite and IT team.

Datasets are growing fast. Forget data analytics - business leaders are struggling just to visualize and map out data to begin with. Data visualization works to fix this..."

eWeek, January 14th, 2022
(Get More Information . .) open to premium members only

The insideBIGDATA IMPACT 50 List for Q1 2022
The team here at insideBIGDATA is deeply entrenched in following the big data ecosystem of companies from around the globe.
We're in close contact with most of the firms making waves in the technology areas of big data, data science, machine learning, AI and deep learning. Our in-box is filled each day with new announcements, commentaries, and insights about what's driving the success of our industry so we're in a unique position to publish our quarterly IMPACT 50 List of the most important movers and shakers in our industry. These companies have proven their relevance by the way they're impacting the enterprise through leading edge products and services. We're happy to publish this evolving list of the industry's most impactful companies!
insideBIGDATA, January 10th, 2022
(Get More Information . .) open to premium members only

Big Growth Forecasted For Big Data
These are heady times to be in the big data business, with big growth predicted for the foreseeable future across several measures, including data generation and storage, market spending, and data analytics hiring.
Alex Woodie writes in datanami, "First, the growth of data shows no signs of slowing down. In fact, data creation leaped forward in 2020 thanks to the COVID-19 pandemic, according to IDC's DataSphere and StorageSphere reports.

However, out of the to 64.1 zettabytes (ZB) of data created in 2020, only 2% was saved or retained into 2021, IDC says. From 2020 to 2025, IDC forecasts new data creation to grow at a compound annual growth rate (CAGR) of 23%, resulting in approximately 175ZB of data creation by 2025..."

datanami, January 11th, 2022
(Get More Information . .) open to premium members only

Sections in this issue:
click to jump to section