IT News and Events
Feb 17th, 2020 — Feb 23rd, 2020 Generate the Custom HTML Email for this Issue
IT News and Events IT News and Events
Volume 263, Issue 3 << Previous Issue | Next Issue >>
IT News - CxO
disable
6 Keys To Digital Transformation Success
Nearly every enterprise is undergoing a digital transformation. Some are more successful than others. Here are 6 factors shared by the successful ones
"Digital transformation has truly arrived, with nearly all enterprise organizations are engaging in some form of transformation or else planning one," writes Jessica Davis in Information Week.

"That's according to a new survey conducted by Hanover Research and commissioned by AHEAD, an enterprise cloud provider.

But how are these transformations going? That's another question entirely. A full 36% of organizations are behind schedule, according to the survey that analyzed 293 responses to the poll of key IT decision makers at US-based companies. Yet still more were on target to hit their planned schedules at 44%. Another 14% reported being ahead of schedule. Still, 6% reported being stalled..."

Information Week, February 14th, 2020
(Get More Information . .) open to premium members only

8 Ways CIOs Can Use Technology In Meetings
Meetings can be frustrating, as they often lead to scheduling and technical complications -- but today, enterprises are utilizing technology in meeting rooms to make them more beneficial
George Lawton writes in SearchCIO, "In the workplace, meetings serve a vital role in keeping everyone on the same page, but they can also be a painful experience owing to technical glitches, scheduling challenges and lack of focus. To streamline this process, enterprises have started adopting technology in meetings..."

"Business meetings needing a makeover is not new news," said Trevor Schulze, CIO at RingCentral, a unified communications platform. "Most people feel like they're going from meeting to meeting and getting very little value out of them."

SearchCIO, February 13th, 2020
(Get More Information . .) open to premium members only

Average Tenure Of A CISO Is Just 26 Months Due To High Stress And Burnout
Report: The vast majority of interviewed CISO executives (88%) report high levels of stress, a third report stress-caused physical health issues, half report mental health issues
"Chief Information Security Officers (CISOs, or CSOs) across the industry are reporting high levels of stress," warns Catalin Cimpanu in ZDNet.

"Many say the heightened stress levels has led to mental and physical health issues, relationship problems, medication and alcohol abuse, and in some cases, an eventual burnout, resulting in an average 26-month tenure before CISOs find new employment.

The numbers, reported by Nominet, represent a growing issue that's been commonly acknowledged, but mostly ignored across the information security (infosec) community, but one that is slowly starting to rear its ugly head as once-ignored infosec roles are becoming more prominent inside today's companies..."

ZDNet, February 12th, 2020
(Get More Information . .) open to premium members only

Telltale Signs Of IT Dysfunction - And How To Fix It
Transformational success can be derailed by a dysfunctional IT culture, the roots of which often can be traced to silos, org structures and little desire or incentive to collaborate
"The role of IT is evolving, and digital transformation has brought with it a new set of responsibilities and assumptions that can lead to IT dysfunction," writes Stacy Collett in CIO.

"An explosion of new initiatives, the need to produce more quickly, constant interaction with the business, managing third-party cloud environments instead of traditional data centers - with so much coming at IT these days, it's little wonder that organizational tensions and challenges are rising..."

CIO, February 11th, 2020
(Get More Information . .) open to premium members only

Cybersecurity Is A Board Level Issue: 3 CISOs Tell Why
Recognize security as both a business risk and an opportunity
"As a venture capital investor who was previously a Chief Information Security Officer, I have noticed an interesting phenomenon: although cybersecurity makes the news often and is top of mind for consumers and business customers, it doesn't always get the attention it deserves by the board of directors," writes Oren Yunger in HelpNet Security.

"Misconceptions and knowledge gaps increase this distance between security and oversight. How can boards dive deeper into the world of security and overcome the entry barriers to collaboration?..."

HelpNet Security, February 11th, 2020
(Get More Information . .) open to premium members only

IT News - MFA
disable
What Is Multi-Factor Authentication (MFA) & How It Works
Here's an example of what multi-factor authentication (MFA) is not
Kundan Singh writes in Business 2 Community, "For instance, you head to your online bank account to login. Entering the username and password into the designated fields and click on login. From here, you've gained access to your bank information. Easy peasy and you go about your business. Wait one second! If you're one of the 54% of consumers who use five or fewer passwords for all of your online accounts, you could be setting yourself up for failure.

Recycling passwords is a big no-no. We highly advise coming up with unique passwords for all digital channels. We published a blog post discussing the importance of unique passwords and why using the same password is bad.

Let's dive right in and discuss the benefits of multi-factor authentication..."

Business 2 Community, February 12th, 2020
(Get More Information . .) open to premium members only

IT News - Storage
disable
Higher-Than-Typical Failure Rate Among Some 12TB Seagate HDDs
Regular HDD Stats readers will recall that our blog post about 3Q19 explained that we planned to take a closer look at some drive failures we were seeing at the time and report back when we knew more
"Well, we've been monitoring the situation since then and wanted to update you on where things stand. Despite the fact that HDD Stats for 2019 are just around the corner, we decided to share this information with you as soon as we could, rather than waiting for the next post. In summary, this year (and going into the next year) we expect to see higher failure rates in some of our HDDs and we will be migrating some drives to newer models. Below, we'll discuss what's going on, what we're doing about it, and why customers shouldn't worry..." - Storage Newsletter
Storage Newsletter, February 12th, 2020
(Get More Information . .) open to premium members only

Enterprise HDDs Hit 20 TB, Boost Throughput In 2020
While waiting for HAMR to drop, we have more immediate spinning disk developments to watch out for in 2020, such as dual-actuator and shingled drives
"Flash and new memory technologies don't have a stranglehold on all the storage hardware innovation," opines Carol Sliwa in SearchStorage.

"Even age-old spinning disk will see new twists in 2020 and beyond. Technologists and storage analysts predict the ramp of new hard disk drives (HDDs) with dual actuators that can boost input/output operations per second. That can help in use cases such as hard drive rebuilds and analytics applications. Experts also expect shingled magnetic recording (SMR)-enabled HDDs to become more commonplace for applications that write data sequentially. SMR HDDs have data tracks that partially overlap to increase areal density and capacity..."

SearchStorage, February 13th, 2020
(Get More Information . .) open to premium members only

IT News - AI
disable
Robot Analysts Outwit Humans On Investment Picks, Study Shows
They beat us at chess and trivia, supplant jobs by the thousands, and are about to be let loose on highways and roads as chauffeurs and couriers
"Now, fresh signs of robot supremacy are emerging on Wall Street in the form of machine stock analysts that make more profitable investment choices than humans. At least, that's the upshot of one of the first studies of the subject, whose preliminary results were released in January.

Buy recommendations peddled by robo-analysts, which supposedly mimic what traditional equity research departments do but faster and at lower costs, outperform their flesh-and-blood counterparts over the long run, according to Indiana University professors..." - Information Management

Information Management, February 11th, 2020
(Get More Information . .) open to premium members only

IT News - Technology
disable
Throwing Down The Gauntlet To CPU Incumbents
The server processor market has gotten a lot more crowded in the past several years
Timothy Prickett Morgan writes in TheNextPlatform, "It looks like it is going to be getting a little more crowded with several startups joining the potential feeding frenzy on Intel's Xeon profits.

We will be looking at a bunch of these server CPU upstarts in detail, starting with Nuvia, which uncloaked itself from stealth mode last fall and which has said precious little about what it can do to differentiate in the server space with its processor designs. But Jon Carvill, vice president of marketing with long experience in the tech industry, gave The Next Platform a little more insight into the company's aspirations as it prepares to break into the glass house..."

TheNextPlatform, February 11th, 2020
(Get More Information . .) open to premium members only

Do you know the difference between Thunderbolt 3, USB-C 3.1 Gen 2, and USB-C 3.1 Gen 1?
Don't worry if you don't, because you're not alone
Adrian Kingsley-Hughes writes in ZDNet, "While the ports look the same, the technologies have a number of key differences between Thunderbolt 3, USB-C 3.1 Gen 2, and USB-C 3.1 Gen 1.

The problem is that the port and cable connectors for all three technologies look the same, and the only difference is the labeling (or, on some devices, the lack thereof)..."

ZDNet, February 10th, 2020
(Get More Information . .) open to premium members only

IT News - Blockchain
disable
How Blockchain Regulations Will Change In 2020
As 2018 drew to a close, crypto skeptics were ready to write obituaries after the devastating bear market that year
"Talk of blockchain and cryptocurrency demise was rife among seasoned analysts. Just over twelve months later, the industry has shown remarkable resilience to rebound back," opines Andrey Sergeenkov in TechTalks.

"Regulators are a segment of stakeholders who seem to be appreciating that crypto is here to stay, with Federal agencies in the US and Chinese authorities praising the potential of this technology in their respective countries' digital future..."

TechTalks, February 12th, 2020
(Get More Information . .) open to premium members only

IT News - PM
disable
10 Of The Best Project Management Software (Reviewed + Rated)
Today's workplace is challenging, with complex marketing tasks becoming the norm
"You're expected to manage a variety of projects, like website maintenance, blogging, email marketing, and automation," writes Micah Lally in Business 2 Community. "Not to mention handling traditional deliverables, special events, and so on and so forth. It seems like you're doing more for your clients than ever before.

It's understood, though, that taking on and managing work-based projects can be a drain on resources. Often, you'll have multiple projects for multiple clients, and getting it all done can be difficult to effectively organize.

The traditional methods of project management just don't cut it anymore. Typing information into a spreadsheet or using word processing software to compile notes takes too much time away from actually completing projects.

Thankfully, we now have project management tools to keep us organized and out of deep water..."

Business 2 Community, February 9th, 2020
(Get More Information . .) open to premium members only

IT News - HR
disable
8 HR Technology Trends CHROs Should Investigate In 2020
Many emerging HR technologies are solidly in the realm of 'must-haves,' while others remain hype. Here's some advice to help you discern which is which
"The number of HR technology choices have exploded in the last few years," notes Luke Marson in SearchHRSoftware. "That means there's more pressure on HR leaders to separate what's hype from what's helpful.

As a chief HR officer, chief people officer or other HR leader, you'll need to identify which software is truly helpful and reject technology that doesn't really bring value. That means choosing the tools that support your strategy and leaving aside those that qualify as "shiny new objects."

Here are eight HR technology trends for 2020 that you'll want to research..."

SearchHRSoftware, February 14th, 2020
(Get More Information . .) open to premium members only

IT Careers: Crazy Recruitment Tactics That Worked
IT leaders and recruiters discuss the over-the-top ways they've attracted tech talent - and five lessons you can apply from them in 2020
Carla Rudder writes in The Enterprisers Project, "In a new report from Harvard Business Review Analytic Services, an anecdote from Justin Kershaw, global CIO at Cargill, demonstrated the lengths IT leaders will go to attract top talent in today's competitive market - the length of the Charles River, to be exact.

'A lifelong rower, 'Kershaw' was preparing to race in Boston's Head of the Charles Regatta last year when he and a friend rowed past the MIT boathouse,' stated the report. When they spotted the Sloan School Rowing Club on the dock, Kershaw didn't let the opportunity pass him by...

The Enterprisers Project, February 12th, 2020
(Get More Information . .) open to premium members only

IT News - Operations
disable
5 Common Errors That Allow Attackers To Go Undetected
Make these mistakes and invaders might linger in your systems for years
"Although cybersecurity technologies continue evolving to address current threats, many data breaches remain undiscovered for months or even years," notes Matt Middleton-Leal in Dark Reading.

"For instance, in one of the biggest data breaches discovered in 2018, which affected 500 million customers of the Marriott Hotel Group, hackers went undetected for four years.

How can your organization detect threats faster and reduce the chances of a breach? Unfortunately, there isn't one solution. But we can analyze the root causes of known breaches and learn from them. In this column, we'll examine five common errors that make it easier for attackers to linger in an IT network undiscovered and advice on how to mitigate the risks..."

Dark Reading, February 12th, 2020
(Get More Information . .) open to premium members only

IT News - Security
disable
Best Identity Theft Protection And Monitoring Services In 2020
Is someone applying for a mortgage in your name? Ruining your credit?
"The best identity theft protection and monitoring service can help you find out -- and fight back..." writes David Gewirtz in CNET.

"Your personal information is precious, and our directory of the best identity theft protection and monitoring services can help you proactively monitor suspicious activity and protect your identity as well as assist in recovering if you're a victim of a data breach that leads to identity fraud and theft. Unfortunately, you may need one of these protection services soon, if you don't already. That's because identity theft is a massive and growing problem, with more enormous data breaches hitting victims with increasing regularity..."

CNET, February 15th, 2020
(Get More Information . .) open to premium members only

Password Security Best Practices In 2020
Concerned about protecting your financial transactions and private data stored online?
Rakesh Soni writes in Business 2 Community, "A strong password policy is your front line of defense against security threats, scammers and hackers. Implementing the best password security practices is as important at work as it is at home.

You need to understand the severity that easy-to-guess passwords bring. Also no, you cannot have the same password for twenty different accounts, only because it is easy to remember. Let's get straight to the point and go through some of the best policies that will help you create reliable, secure passwords online..."

Business 2 Community, February 9th, 2020
(Get More Information . .) open to premium members only

Intrusion Prevention System (IPS)
An intrusion prevention system (IPS) is a network security and threat prevention tool
Margaret Rouse writes in SearchSecurity, "The idea behind intrusion prevention is to create a preemptive approach to network security so potential threats can be identified and responded to swiftly. Intrusion prevention systems are thereby used to examine network traffic flows in order to find malicious software and to prevent vulnerability exploits..."
SearchSecurity, February 12th, 2020
(Get More Information . .) open to premium members only

Mac-Based Security Threats Outpacing Windows
Security threats targeting Apple endpoints are growing more quickly than those targeting Windows machines, according to Malwarebytes
Alex Scroxton writes in ComputerWeekly, "Organisations running Mac-based systems are increasingly at risk of compromise, with the volume of threats targeting the environment now growing more rapidly than those targeting Windows, according to Malwarebytes' latest annual State of malware report, which has just been released.

Over the course of 2019 - besides overarching trends such as an increased focus on targeted attacks, the resurgence of threats such as Emotet and TrickBot, and the emergence of new ransomware families such as Ryuk and Sodinokibi - Malwarebytes said it saw nearly twice as many Mac threats detected per endpoint as Windows ones..."

ComputerWeekly, February 11th, 2020
(Get More Information . .) open to premium members only

IT News - Database
disable
New Database Innovations Deliver A Single Database That Supports All Data
The future is data driven, and effective use of data will increasingly determine a company's competitiveness
"During his keynote at Oracle OpenWorld London, Oracle Executive Vice President Juan Loaiza announced the latest innovations which further strengthen Oracle's strategy of providing a single converged database engine able to meet all the needs of a business. The new database features enable customers to take advantage of new technology trends-such as employing blockchain for fraud prevention, leveraging the flexibility of JSON documents, or training and evaluating machine learning algorithms inside the database..." - AiTHORITY!
AiTHORITY, February 12th, 2020
(Get More Information . .) open to premium members only

IT News - Server
disable
Hyper-Converged Data Center Vendors Innovate, Evolve Products
Review notable hyper-converged, HCI 2.0 and composable disaggregated product news to gain insight into data center convergence technology as you make infrastructure decisions
James Alan Miller writes in SearchConvergedInfrastructure, "The hyper-converged data center has been around for years now, going back to at least when pioneer Nutanix helped jump-start the market with its first appliances in 2013. A lot has changed since then. Continued product innovation has advanced hyper-convergence.

Today, hyper-converged technology has gone mainstream, and big and small organizations have adopted hyper-converged infrastructure and its descendants to meet the storage and processing requirements of their data and mission-critical workloads..."

SearchConvergedInfrastructure, February 12th, 2020
(Get More Information . .) open to premium members only

IT News - HPC
disable
What's New In HPC Research: Quantum Clouds, Interatomic Models, Genetic Algorithms & More
In this bimonthly feature, HPCwire highlights newly published research in the high-performance computing community and related domains
"Optimizing irregular-shaped matrix-matrix multiplication on GPUs..."

Oliver Peckham writes in HPCWire, "Linear algebra is a common application in big data and computational science on HPC. These operations are well-optimized when handling regularly shaped matrix inputs with GPUs, but comparatively little literature has discussed irregularly shaped matrix inputs with GPUs. In this paper (written by a team from the University of Alabama, Oak Ridge National Laboratory, the University of California, Riverside, and the University of Sydney), the authors propose two matrix-matrix multiplication algorithms for irregularly shaped inputs on GPUs. They demonstrate a speedup of up to 3.5x along with greater efficiencies in resource usage..."

HPCWire, February 14th, 2020
(Get More Information . .) open to premium members only

IT News - Wireless
disable
Watch For These 6 Wireless Networking Trends In 2020
No doubt you've heard about 5G and Wi-Fi 6. But don't forget other wireless trends emerging in 2020, such as CBRS, dynamic spectrum sharing and Open RAN
"It is clear wireless is now poised to become the leading networking option for many enterprise use cases," writes Lee Doyle in SearchNetworking.

"It's also clear that advancements in 5G networks, the introduction of edge computing options, the advent of Citizens Band Radio Service and the improvements available with Wi-Fi 6 will gradually change the way networks are built and IT services are delivered.

Below are six wireless networking trends Doyle Research expects will drive mobile operator and enterprise IT architectures in 2020 and beyond..."

SearchNetworking, February 14th, 2020
(Get More Information . .) open to premium members only

IT News - IoT
disable
Securing The Internet Of Things In The Age Of 5G
The next generation of mobile communications is upon us and it promises not only drastically increased speed but connectivity for a wide variety of devices that have been gaining popularity in recent years
Jonathan Tanner writes in Information Management, "The increasing adoption of IoT (Internet of Things) devices and industrial automation through ICS (Industrial Control Systems) is a key focus area for 5G in addition to simply supporting mobile phones, as was the focus of previous generations of mobile communications.

5G is already being deployed in parts of the U.S. with plans for more widespread availability in 2020 by major carriers. Meanwhile, widespread coverage is already available in parts of Europe and Asia, putting pressure on carriers in other countries to hurry deployment..."

Information Management, February 14th, 2020
(Get More Information . .) open to premium members only

IT News - Compliance
disable
Why 67% Of Companies Fear They Can't Sustain Privacy Compliance
True privacy depends on where and how data travels
"Data privacy management and protocol got a facelift with the enactments of the General Data Protection Regulation and the California Consumer Privacy Act," writes Samantha Ann Schwartz in CIO Dive.

"Many companies failed to meet compliance standards in time for GDPR. And for companies that met the deadline, 67% fear they won't be able to sustain compliance, according to Tanium.

"People realize that they can be compliant one time - you can get ready for that audit and pass that audit. But the day after that audit is done, people go back to their day jobs," Chris Hallenbeck, CISO for the Americas at Tanium, told CIO Dive..."

CIO Dive, February 12th, 2020
(Get More Information . .) open to premium members only

IT News - Email
disable
Ignore Email At Your Own Peril [Infographic]
There are lots of people out there who think that email is dead
Brian Wallace notes in Business 2 Community, "As it turns out, nothing could be further from the truth, and believing in the myth of email's death could be costing your business - BIG TIME. Would it surprise you to learn that businesses with email response rates of less than an hour are significantly more successful than even those who take two hours? Responding to email is a nonverbal cue that build trust with your clients, and if you're dropping the ball chances are you're losing a lot of business because of it..."
Business 2 Community, February 15th, 2020
(Get More Information . .) open to premium members only

IT News - Developer
disable
Sprint Plans Are Worthless, But Sprint Planning Is Everything
Dwight D. Eisenhower, the World War II leader and U.S. President, wrote: "'.' plans are of no particular value, but '.' planning is indispensable"
"It's a powerful phrase that aligns all so well with Scrum. Contrary to a myth that there is no planning in Scrum, planning is actually everything: we plan our work not only in Sprint Planning but also every day at Daily Scrum," writes Daria Bagina in Business 2 Community.

"However, it is the plans that we make that are less important: we use them to guide our decisions initially, but we do not stick to them if it doesn't make sense. Daily Scrum is there to make sure we replan at least once every 24 hours.

So to continue this analogy, I'd like to talk about a common myth that gets brilliant teams stuck in their Sprint Planning feeling overwhelmed..."

Business 2 Community, February 13th, 2020
(Get More Information . .) open to premium members only

Sections in this issue:
click to jump to section