IT News and Events
Jun 20th, 2022 — Jun 26th, 2022 Generate the Custom HTML Email for this Issue
IT News and Events IT News and Events
Volume 291, Issue 4 << Previous Issue | Next Issue >>
Red Hat News
Why Red Hat Is Joining The Open Programmable Infrastructure Project
As organizations strive for digital transformation, they are in reality seeking to reinvent their business, modernize their processes and push the boundaries of existing IT infrastructure.
To address that last point, we frequently see customers exploring alternatives to CPU-centric system architectures, where software running on a central CPU directly controls a set of HW peripherals that offer static functions and/or acceleration capabilities. Supporting this trend is a new class of devices, evolved from SmartNICs but lacking cohesive standards even when it comes to naming - NVIDIA and Marvell call their offerings Data Processing Units (DPU) while Intel refers to their technologies as Intelligent Processing Units (IPUs).

Red Hat firmly believes that this transformational change in compute architecture is only possible through open source and broad partner collaboration. No individual company or a "walled garden" approach could steer these efforts in the right direction, essentially requiring the creation of an open source-based architecture and the associated ecosystem behind it...

Red Hat News, June 21st, 2022
(Get More Information . .) open to premium members only

Friday Five - June 24, 2022
The Friday Five is a weekly Red Hat blog post with 5 of the week's top news items and ideas from or about Red Hat and the technology industry. Consider it your weekly digest of things that caught our eye.
  • Ericsson and Red Hat empower service providers to build multi-vendor networks
  • SDxCentral - IBM, Red Hat expand Telefonica's cloud push
  • ERP Today - Navigating global supply chain disruption
  • Business Today (India) - Edge computing can provide enterprises better control over sensitive data, says Red Hat's Ben Panic
  • Kubernetes Operators: good security practices

Read on for details

Red Hat News, June 24th, 2022
(Get More Information . .) open to premium members only

Ericsson And Red Hat Empower Service Providers To Build Multi-Vendor Networks
Service providers are uniquely positioned to serve up a new generation of immersive, personalized, ultra-reliable experiences, applications and solutions. Ericsson and Red Hat are expanding their collaboration for validation of network functions and platforms to enable service providers to bring their next generation services to market faster in a multi-vendor scenario.
Read on to find out how far we've come in de-risking service providers' expansion projects through our technical collaborations for validation of Red Hat's platforms for Ericsson's network functions.

A different plan of action is required when going multi-vendor

As service providers deploy 5G, they are focused on becoming more agile and innovative as businesses, allowing them to accelerate time to value. In undertaking this transformation, they must find the right balance between cost, risk and time to market.

Red Hat News, June 22nd, 2022
(Get More Information . .) open to premium members only

Introducing Red Hat Insights Integration With Splunk
Businesses want to make data driven decisions using data platforms and artificial intelligence (AI) to extract valuable knowledge to apply to the products and services they use and offer. Most of them rely on specialized data platforms to ingest and analyze all business sources of data in a continuous fashion.
Splunk offers an extensible data platform that supports shared data from any environment to provide all teams in an organization the visibility they need for end-to-end observability, with context, of every interaction and business process.

Red Hat Insights continuously analyzes platforms and applications to help predict risk, recommend actions and track costs so enterprises can better manage hybrid cloud environments.

Correlating Insights data with other data sources in the Splunk data platform leads to better understanding of efficiency, reliability and maintainability, and ultimately assists operations, security risk processes and compliance management. While Insights APIs are available for integrating with third party applications, we hear from users that they need quick, easy and secured solutions, as time is one of their most valuable resources.

Red Hat News, June 23rd, 2022
(Get More Information . .) open to premium members only

Red Hat Learning Community Celebrates 100,000 Members
The Red Hat Learning Community (RHLC) celebrates a monumental milestone this week as it exceeds 100,000 members!
At its launch in September of 2018, the main goal was simple: provide a collaborative space for open source learners to connect as they optimize their skills in working with Red Hat products. As the core of that mission has remained true since its launch, Red Hat has strived to provide our users what they need in order to collaborate, learn, build skills and meet their individual learning and career goals.
Red Hat News, June 24th, 2022
(Get More Information . .) open to premium members only

Security Features In Red Hat Enterprise Linux 9
Red Hat Enterprise Linux 9 (RHEL 9) is the latest version of Red Hat's flagship operating system, released at the Red Hat Summit in May 2022.
New capabilities added to RHEL 9 help simplify how organizations manage security and compliance when deploying new systems or managing existing infrastructure. This article takes a brief look at three of the new security features available in this release.

SSH root password login disabled by default

The default superuser account in Unix- and Linux-based systems is "root". Because the username is always "root" and access rights are unlimited, this account is the most valuable target for hackers. Attackers use bots to scan for systems with exposed SSH ports, and when found, they attempt to use common usernames and brute-force passwords to gain entry. Of course, the impact of a successful exploit would be a lot lower if the compromised user has unprivileged access. The breach would then be contained and limited to one user only.

Red Hat News, June 24th, 2022
(Get More Information . .) open to premium members only

IBM News
IBM Reveals New AI and Cloud Powered Fan Experiences for Wimbledon 2022
As the Official Technology Partner of The Championships for the past 33-years, IBM continues to accelerate innovation at Wimbledon and improve the digital fan experience
IBM and the All England Lawn Tennis Club today unveil new ways for Wimbledon fans around the world to experience The Championships digitally, powered by artificial intelligence (AI) running on IBM Cloud and hybrid cloud technologies. Co-created by the All England Club and IBM for and the Wimbledon app, the new features join a comprehensive suite of digital fan experiences - including the award-winning1 IBM Power Index with Watson, IBM Match Insights with Watson and Personalised Recommendations and Highlights Reels - all designed to help global audiences stay more informed and engaged with players, matches and the tournament.
IBM News, June 21st, 2022
(Get More Information . .) open to premium members only

IBM, Delta Air Lines, WPP, 4A's, IAB, Ad Council And Other Industry Leaders Act To Mitigate Bias In Advertising Technology
IBM Delivers Open Source Toolkit to Identify and Mitigate Bias in Advertising Technology
Leading companies committed to improving fairness in marketing campaigns. The initiative, announced at the Cannes Lions International Festival of Creativity 2022, brought together agencies, brands, and other leaders to generate awareness and take action towards mitigating bias in advertising technology. Committing organizations include IBM (NYSE: IBM), Delta Air Lines, WPP, Mindshare, 4A's, IAB and the Ad Council.

The action is the most recent effort by IBM to drive education and awareness around the impact of bias in advertising technology. In 2021, the company launched a research initiative to explore the hypothesis that bias can exist in ad technology, which initial findings confirmed.

IBM News, June 20th, 2022
(Get More Information . .) open to premium members only

IT News - CxO
9 Top CIO Trends And Priorities For 2022
CIOs face a tough challenge in 2022 as they balance the need for technology investment and growth amid a growing call for fiscal prudence in uncertain economic conditions.
George Lawton writes in SearchCIO, "Enterprises worldwide are making massive changes to their business operations and in how they provision new services and customers as they continue to adapt to the fallout from the COVID-19 pandemic.

Meanwhile, recent market shifts are sharpening companies' focus on the bottom line and on delivering practical value rather than just growing the customer base.

As a result, CIOs find themselves having to balance two sometimes competing needs in 2022: supporting new services to gain a competitive advantage and cutting costs..."

SearchCIO, June 15th, 2022
(Get More Information . .) open to premium members only

3 Ideas CIOs Can Use For Better Disruption Planning
Discover how a focus on three areas -- cybersecurity, employee experience and proactive management -- can help CIOs plan for and better manage disruptions.
"Few CIOs today can escape disruption completely but focusing on critical issues can help them better manage it," writes Guilliean Pacheco in SearchCIO.

"That was one of the takeaways shared during the "Planning for the Unknown Unknowns" panel at the MIT Sloan CIO Symposium in Cambridge, Mass., on May 23. The panelists saw opportunities for innovation at almost every level in their organizations. Their reflections may provide insight other IT leaders can use to build a resilient framework and support rapid and unexpected changes.

Here are three ideas CIOs can use for better disruption planning..."

SearchCIO, June 17th, 2022
(Get More Information . .) open to premium members only

Gartner Says The Pandemic Has Reduced Compliance Reporting 30%
Fewer Observe Misconduct Since the Pandemic and a Lower Proportion Report it
The rate of compliance reporting has dropped by 30% from before the pandemic, according to Gartner, Inc. Employees are both less likely to observe misconduct and less likely to report it when observed.

'The increase in remote and hybrid working practices has reduced the amount of misconduct and the potential to observe it,' said Chris Audet, senior director, research in the Gartner Legal, Risk & Compliance practice. 'However, what we see in the data is more complex: misconduct such as gifts and entertainment, and travel abuse is falling, but things such as intimidation and unwanted behavior are on the rise.'

Gartner, June 15th, 2022
(Get More Information . .) open to premium members only

Vulnerability Management Mistakes CISOs Still Make
Cybersecurity has become a major topic of discussion in the business world. The rising frequency of cyberattacks-combined with several high-profile breaches in the past few years-has put the spotlight on the impact a successful attack can have.
"Despite growing awareness, many businesses still don't have basic cybersecurity policies in place, putting them at greater risk of a data breach or other kind of successful attack," notes Shannon Flynn in CIOinsigjht.

"These are some of the most critical considerations for enterprise network security. Considering these tips when developing a business security policy can help managers and leaders build strong cyber defenses..."

CIOinsigjht, June 15th, 2022
(Get More Information . .) open to premium members only

CIO Interview: Morten Holm Christiansen, Haldor Topsoe
There's no point digitising if there is no benefit to the customer, says the Danish chemicals giant's head of IT
Karl Flinders writes in computerwekly, "After successfully creating commercial value through digitisation at some major Nordic companies, Morten Holm Christiansen has been tasked with doing the same at Danish chemical industry giant Halder Topsoe.

Having joined the company in November 2021, Christiansen is directing Copenhagen-headquartered Topsoe's digital transformation at a time when the company is also going through a major business change.

For more than 80 years, Topsoe has provided the energy industry with the catalyst technology used to refine fossil fuels. This includes providing catalyst technology, the substances that make chemical processes work much faster during refining, and designing the processing facilities..."

computerwekly, June 14th, 2022
(Get More Information . .) open to premium members only

CISOs Gain False Confidence In The Calm After The Storm Of The Pandemic
While CISOs may feel more confident in their security posture emerging from the pandemic, new research suggests that doesn't mean organizations are better prepared for large-scale attacks.
"Cybercrime reached heightened levels of intensity and sophistication in the past year," opines Lucia Milic&#259; in DARKReading

"We saw greater complexity in ransomware, supply chain, and critical infrastructure attacks. Despite the threat escalation, CISOs feel more confident in their security posture. But does that feeling of confidence actually translate into organizations being better prepared for large-scale attacks? New research suggests that is not the case..."

DARKReading, June 16th, 2022
(Get More Information . .) open to premium members only

IT News - Storage
Data Gravity: What Is It And How To Manage It
Data gravity can attract increasing amounts of data, and brings with it onerous management overheads. We look at how to mitigate data gravity in datacentre and cloud
Stephen Pritchard writes in ComputerWeekly, "When it comes to enterprise applications, access to data - and lots of it - is usually a good thing. And the greater the volume of required data held locally to where it is processed, the better for the business, its applications, decision-making and, in some cases, compliance.

But the need to store and manage data brings its own problems too, including higher costs, lower system performance, and management overheads. Here we are dealing with the idea of data gravity.

There is growing evidence that data-rich systems attract more data. This, in turn, attracts even more data-dependent applications, which then bring in yet more..."

ComputerWeekly, June 17th, 2022
(Get More Information . .) open to premium members only

Destination 30 TB: HDD Vendors Plan Different Routes To Hit Storage Milestone In 2023
20TB hard disk drives are soon going to be forgotten because 30TB models are on their way
Top HDD manufacturers including Seagate and Western Digital are on track to roll out their own line ups of 30TB hard drives by 2024. Capacity increase has been an ask among hard drive users for several years now and a handful of companies have been working on it a while now. Recently, Toshiba, Seagate and WD together with their partners made announcements about their roadmaps to build 30TB HDDs.
Gestalt IT, June 13th, 2022
(Get More Information . .) open to premium members only

IT News - AI
Ethical AI Lapses Happen When No One Is Watching
Just because you may not see errors on the part of artificial intelligence doesn't mean that things are fine. It's up to humans to look for ethical or other issues.
"Transparency often plays a key role in ethical business dilemmas," writes Jeff DeVerter in InformationWeek, "the more information we have, the easier it is to determine what are acceptable and unacceptable outcomes. If financials are misaligned, who made an accounting error? If data is breached, who was responsible for securing it and were they acting properly?

But what happens when we look for a clear source of an error or problem and there's no human to be found? That's where artificial intelligence presents unique ethical considerations..."

InformationWeek, June 16th, 2022
(Get More Information . .) open to premium members only

7 Ways To Bring AI To Cybersecurity
Academic researchers are developing projects to apply artificial intelligence to detect and stop cyberattacks and keep critical infrastructure secure, thanks to grants from the Digital Transformation Institute.
"New ransomware variants and deceptive techniques such as living off the land and store now, decrypt later are sidestepping heuristic analysis and signature-based malware detection," writes Shannon Flynn in DARKReading.

"Behavior-based tools can compare network activity against an established norm and flag when they detect unusual and suspicious actions and patterns. Powered by artificial intelligence (AI) and machine learning (ML), such tools represent hope in a post-Colonial Pipeline world..."

DARKReading, June 15th, 2022
(Get More Information . .) open to premium members only

11 Deep Learning Software In 2022
Deep learning software is revolutionizing the technology space by bringing in more accuracy and speed for data processing and making predictions and classifications.
Amrita Pathak writes in Geekflare, "It uses the concept of AI and ML to help businesses, organizations, research facilities, and universities gain intelligence from data and use it to drive their innovations.

The reason it's evident in this modern era is that people find solutions to ease their lives and perform tasks faster. Also, automation is taking over the world.

That said, advanced products and services created using AI, Ml, and deep learning can fulfill this demand.

Deep learning is an excellent emerging technology that can transform your business by accelerating your data analysis and predictive intelligence.

In this article, we will explore the topic more and find the best deep learning software to include in your tool kit..."

Geekflare, June 15th, 2022
(Get More Information . .) open to premium members only

Best Machine Learning Platforms 2022
The term machine learning refers to a computational system that has the ability to ingest data, analyze it and spot patterns and trends.
Samuel Greengard writes in eWeek, ""Generally considered a subset of artificial intelligence (AI), machine learning (ML) systems generate algorithms based on a set of sample data and then deliver predictions, without being expressly programmed to do so. Moreover, these algorithms change and adapt as new data appears or conditions change.

This autonomous learning capability is at the center of today's enterprise. It's increasingly used to make important decisions and drive automation. Although ML is closely related to statistical analysis and data mining-and there are often overlaps across these disciplines-what sets ML apart is the ability to spot patterns, trends and properties that would otherwise go unnoticed or remain out of reach. Typically, ML typically focuses on known knowledge and ways to put it to use more effectively..."

eWeek, June 16th, 2022
(Get More Information . .) open to premium members only

IT News - Humor
BOFH: Tech Helps HR Investigate The Boss's Devices
We're going to need a corkboard, push pins, red yarn and emails dating back to 2003
EPISODE 11 The Boss is - not to put too fine a spin on it - crapping himself.

Apparently, there's a rumour about some legal action in the wind and that the substance of his email conversations is now being asked about.

At the moment it's just some questions from HR, but who knows how far this could go?

". and so we will need to see the contents of his mailbox, including his sent, deleted and archived documents," the company's HR person tells me.

I can tell it's serious as one of the company's lawyers is pacing around in the background.

"So you want me to recover his deleted emails?" I ask.


The Register, June 17th, 2022
(Get More Information . .) open to premium members only

IT News - Technology
AT&T Breaks Major Fibre Speed Barrier
AT&T says 20Gbps services possible in the future
Steve McCaskill writes in "US broadband operator AT&T has become the first in the industry to achieve a 20Gbps symmetrical speed on a production fibre network, claiming the milestone could mean even faster speeds for consumers and businesses in the near future.

The company achieved the transmission rate on 25GS-PON in its broadband lab in Austin, Texas and says the technology can work with its existing fibre network.

The company achieved 10Gbps in lab tests earlier this year and has a commercial 5Gbps 'Hyper Gig' broadband offering in the US...", June 13th, 2022
(Get More Information . .) open to premium members only

Intel Goes Bold With Meteor Lake CPUs That Could Take Down Apple's M2
Team Blue's new lithography seems to be yielding impressive results
"Intel has given us our first proper look at its 14th-generation desktop and mobile CPUs, codenamed 'Meteor Lake', reports Christian Guyton in, "which are due to launch in 2023. These will be the first processors to utilize the new 'Intel 4' process node, which is replacing the Intel 7 design used in the company's current CPUs.

Intel 4 is a 7nm process technology, while Intel 7 was 10nm (yes, we agree that the naming convention is silly). The exciting part is that Intel 4 will use a new type of processor lithography called 'advanced extreme ultraviolet' lithography, or EUV for short. This replaces the conventional deep-UV immersion lithography used in current processor production...", June 15th, 2022
(Get More Information . .) open to premium members only

High-Bandwidth Memory (HBM) Delivers Impressive Performance Gains
Chip-level design breakthrough provides bandwidth boost for supercomputers and artificial intelligence (AI) applications
Andy Patrizio writes in Networkworld, "IT vendors typically race to deliver incremental improvements to existing product lines, but occasionally a truly disruptive technology comes along. One of those disruptive technologies, which is beginning to find its way into enterprise data centers, is High-Bandwidth Memory (HBM).

HBM is significantly faster than incumbent memory chip technologies, uses less power and takes up less space. It is becoming particularly popular for resource-intensive applications such as high-performance computing (HPC) and artificial intelligence (AI)..."

Networkworld, June 16th, 2022
(Get More Information . .) open to premium members only

Will Optics Ever Replace Copper Interconnects? We Asked This Silicon Photonics Startup
Star Trek's glowing circuit boards may not be so crazy
Tobias Mann writes in The Register, "Science fiction is littered with fantastic visions of computing. One of the more pervasive is the idea that one day computers will run on light. After all, what's faster than the speed of light?

But it turns out Star Trek's glowing circuit boards might be closer to reality than you think, Ayar Labs CTO Mark Wade tells The Register. While fiber optic communications have been around for half a century, we've only recently started applying the technology at the board level. Despite this, Wade expects, within the next decade, optical waveguides will begin supplanting the copper traces on PCBs as shipments of optical I/O products take off..."

The Register, June 18th, 2022
(Get More Information . .) open to premium members only

IT News - BI
How Can CIOs Build Business Value With Business Analytics?
Business analytics has become invaluable for CIOs of companies that want to bolster their competitiveness in the new economy
Analytics is becoming more important than ever in the world of business. Over 70% of global businesses use some form of analytics. This figure will rise as globalization, supply chain challenges and other factors increase competitiveness.

This is an important year for enterprises keeping in view that most global industries are recovering from the pandemic horror, and the era of web 3.0 is at the doorstep. For both reasons, the role of CIOs has to embrace automation and analytical thinking in strategizing the organization's initiatives. Until now, they were proactively involved to maximize IT efficiencies and accelerate cost savings in general.

SmartDataCollective, June 15th, 2022
(Get More Information . .) open to premium members only

IT News - Operations
A SaaS Evaluation Checklist To Choose The Right Provider
Replacing a legacy app with a SaaS alternative can be tedious. Create a checklist related to reliability, support and uptime to pick the right SaaS app and provider.
"Enterprise IT managers deal with a lot of legacy software," writes Steven S. Warren in SearchCloudComputing. "This software often runs on hardware that's no longer supported, risking downtime and tying up money in specialist contracts. It most likely also uses a specific programming language that makes it challenging to manage and maintain -- let alone improve.

Businesses know the time and money IT teams sink into these legacy software systems, but they're often afraid to switch to a cloud-hosted alternative. No one wants to get hacked or discover they have no support available during an outage..."

SearchCloudComputing, June 16th, 2022
(Get More Information . .) open to premium members only

The Challenges Of Managing Increased Complexity As Hybrid IT Accelerates
SolarWinds released the findings of its ninth annual IT Trends Report which examines the acceleration of digital transformation efforts and its impact on IT departments.
"The report found the acceleration of hybrid IT has increased network complexity for most organizations and caused several worrisome challenges for IT professionals.

Hybrid and remote work have amplified the impact of distributed and complex IT environments. Running workloads and applications across both cloud and on-premises infrastructure can be challenging, and many organizations are increasingly experiencing-and ultimately hindered by-these pain points..." - HelpNet Security

HelpNet Security, June 16th, 2022
(Get More Information . .) open to premium members only

IT News - Security
7 Hottest Programming Languages Of 2022
Some of the programming languages on this list have been popular for quite a while; others are just beginning to win the favor of developers.
Christopher Tozzi writes in ITProToday, "But all are worth familiarizing yourself with.

What's the most important programming language to learn in 2022? That's an open question, but one way to answer it is to look at languages that are currently trending.

Some of them are well-established coding languages that have long been popular. Others are newer languages that are just now entering their heyday. Either way, they're languages worth familiarizing yourself with..."

ITProToday, June 15th, 2022
(Get More Information . .) open to premium members only

How To Build Cybersecurity Resilience
Cybersecurity has been changing rapidly over the past couple of years, due in no small part to the COVID-19 pandemic. In response, organizations have digitized at an unprecedented rate and, in the process, created new opportunities for cybersecurity shortfalls
A.N. Ananth writes in Security Boulevard, "Here are four trends that, in addition to the anticipated rise in ransomware, should affect how you practice cybersecurity and how you build resilience in your organization.

Work From Home, Remote Access and an Expanded Attack Surface

Around 62% of employees between the ages of 22 and 65 said they work remotely at least occasionally, according to research by Owl Labs. It's evident that remote work and remote access are here to stay. Now is the time to ask yourself whether you are adjusting your security strategy to match these workforce trends..."

Security Boulevard, June 16th, 2022
(Get More Information . .) open to premium members only

It's Time To Rethink Breach Management
By combining and automating all the elements required to handle a breach, it's possible to gain control over potentially devastating events.
Security breaches and breakdowns have become an unfortunate fact of life. With the average cost of a security breach reaching $4.24 million, it's critical to find ways to automate detection and ratchet up protection. What's more, any breach detection and remediation framework must support a growing array of regulatory obligations, such as GDPR, CCPA, HIPAA, PHI and PCI.
eWeek, June 17th, 2022
(Get More Information . .) open to premium members only

Once Is Never Enough: The Need For Continuous Penetration Testing
If you Google 'How often should I do penetration testing?', the first answer that pops up is 'once a year.'
Miri Adjiashvili opines in HelpNet Security, "Indeed, even industry-leading standards like PCI-DSS dictate that external penetration testing be conducted annually (or after significant changes to infrastructure or applications), while internal penetration testing takes place annually, with segmentation testing occurring every six months.

Yet today's cybercriminals don't work on annual schedules. They don't wait until pen testing time rolls around and the vulnerabilities found are rectified. They strike fast, they strike hard, and they use advanced AI-powered and automated tools to exploit vulnerabilities many organizations don't even know exist, let alone exist in their own networks..."

HelpNet Security, June 14th, 2022
(Get More Information . .) open to premium members only

12 Best Practices For Wireless Network Security
The importance of wireless network security cannot be understated. With the proliferation of mobile devices and the popularity of public Wi-Fi hotspots, the potential for data breaches and other cybersecurity threats has increased exponentially.
"While there are many different steps that can be taken to secure a wireless network," opines Anas Baig in Solutions Review, "these 12 best practices are essential for ensuring that your data and devices are safe from malicious actors.

1. Enabling Two-Factor Authentication (2FA)

Two-factor authentication adds an extra layer of security to the login process. It requires users to enter both a username and password, as well as a code that is generated by an authenticator app. This makes it more difficult for someone to gain unauthorized access to the network..."

Solutions Review, June 17th, 2022
(Get More Information . .) open to premium members only

If You Really Want To Improve Cyber Resilience Stop Letting Employees Create Their Own Passwords
A fundamental change of attitude to access credentials is required to give organizations a chance of regaining control over cyber security says Julia O'Toole, Founder and CEO of MyCena Security Solutions.
"In mid-March, the Cybersecurity and Infrastructure Security Agency (CISA) released a report highlighting how cyber actors routinely exploit poor security configurations, weak controls, and other poor cyber hygiene practices to gain access and compromise user systems. These included not enforcing multifactor authentication, primarily with remote desktop access, the use of vendor-supplied default login usernames and passwords, and the failure to detect and block phishing attempts.

CISA suggested that organizations can help strengthen their network defences against commonly exploited practices by adopting a zero-trust security model, which enables users to be assigned only the access rights required to perform their assigned tasks. Access control can limit the actions of malicious cyber actors and reduce the chance of user errors..."

Continuity Central, June 15th, 2022
(Get More Information . .) open to premium members only

IT News - Database
The Future Of Database Management Systems
As the amount of data generated globally grows exponentially, data-driven businesses are increasingly turning to more innovative database management systems to store, manage, and process all that data.
This article provides an overview of database management, how it has evolved - especially during the COVID-19 pandemic - and the future of database management systems.

What Is a Database?

Before learning more about database management systems, it's essential to understand what a database is and how various kinds of databases are used.

Dataversity, June 16th, 2022
(Get More Information . .) open to premium members only

IT News - Networks
3 SD-WAN Challenges And Solutions
Points to consider when selecting an SD-WAN solution include WAN/LAN branch architecture, deployment and service provisioning, and centralized management.
"Software-Defined Wide Area Networking (SD-WAN) uses the concept of Software Defined Networking (SDN) to distribute network traffic over a wide area network (WAN). SD-WAN automatically determines the most efficient way to route application traffic between branch offices and data centers based on pre-configured policies," writes Sagar Nangare in CIO.

"SD-WAN is managed by a central controller that sends policy information to all connected devices. The software allows network operations teams to remotely program network edge devices using zero-touch or low-touch provisioning. This minimizes, and in some cases eliminates, the need to manually configure routers in branch offices..."

CIO, June 14th, 2022
(Get More Information . .) open to premium members only

IT News - Careers
3 Certification Tips For IT Leaders Looking To Get Ahead
CIOs share key best practices for IT leaders looking to level up with a mix of technical and business credentials aimed at growing their CIO role.
"With the technology landscape in constant flux, getting certified on the latest tools and techniques can be a valuable way to advance your career - even for IT leaders," opines CIO.

"Typically, CIOs consider certifications as a means for training up IT staff on vital skills around key initiatives such as cybersecurity, data analytics, AI, or the cloud. But certificates, even technical ones, can be an important part of any IT leader's career journey, giving them hands-on experience, strategic insights into emerging technologies and methodologies, and the possibility to grow their peer network..."

CIO, June 17th, 2022
(Get More Information . .) open to premium members only

Top 2022 IT Certifications To Advance Your Career
One tried and true way for IT professionals to differentiate themselves from the rest of the pack is to earn certifications in critical infrastructure technologies.
Salvatore Salamone writes in InformationWeek, "While opportunities abound in today's dynamic job market, the volume of competition for any given IT opening can be enormous. Job sites such as LinkedIn can be humbling. Who wants to be just in the top 20% of the 750 candidates that have already applied for a job? One tried and true way for IT professionals to differentiate themselves from the rest of the pack is to earn certifications in critical infrastructure technologies.

That point was hammered home in a recent 'Upskilling IT 2022' report by the DevOps Institute. 'IT professionals ultimately control and manage their own upskilling journeys - and recruiting trends show that building critical skill sets is a worthy personal investment,' said Jayne Groll, CEO of DevOps Institute..."

InformationWeek, June 17th, 2022
(Get More Information . .) open to premium members only

The 4-Day Workweek: 3 Things Development Team Leaders Should Prioritize Instead
A shorter workweek is not necessarily the key to reducing team stress. Consider addressing these underlying problems first
"The pandemic has forever changed the workplace, causing many in the tech industry to now question the traditional five-day workweek," writes Brett Stevens in The Enterprisers Project.

"One proposed solution is a four-day workweek, which some believe promises to redefine workplace productivity and employee happiness. Research shows those working four days per week report higher well-being, less burnout, and improved productivity.

But the four-day workweek is not a one-size-fits-all model, and adopting one could be detrimental to teams that overlook underlying issues in their workplace culture. In cases where teams experience high friction in their development processes, compressing the workweek and removing flexibility may exacerbate burnout..."

The Enterprisers Project, June 17th, 2022
(Get More Information . .) open to premium members only

Sections in this issue:
click to jump to section