IT News and Events
Jul 26th, 2001 — Aug 1st, 2021 Generate the Custom HTML Email for this Issue
IT News and Events IT News and Events
Volume 280, Issue 4 << Previous Issue
IT News - CxO
7 Toxic Team Behaviors IT Leaders Must Root Out
When an IT team member begins behaving poorly, performance and productivity will likely suffer. Here's how to detect and eradicate destructive attitudes before they take root
"Just as a happy and motivated IT team tends to be efficient, innovative, and highly productive," writes John Edwards in CIO, "a toxic staff is destined to bicker, miss goals, and experience the sort of disruption that has nothing to do with positive transformation.

Toxic team behavior is an issue nearly all IT leaders will encounter at some point during their careers, most likely more than once and in various guises. Here's a rundown of seven common types of toxic team behavior and how to root each out before serious, long-term damage results..."

CIO, July 20th, 2021
(Get More Information . .) open to premium members only

Gartner Announces Rankings Of The 2021 Supply Chain Top 25
Cisco Systems Retains Top Position; Four New Companies Join Ranking
Gartner, Inc. has released the results from its annual global Supply Chain Top 25, identifying supply chain leaders and highlighting their best practices.

"In our 17th edition of the Supply Chain Top 25 we saw organizations continuing to deal with the effects of COVID-19 on their businesses. Therefore resiliency and agility capabilities became essential to survival," said Mike Griswold, vice president team manager with the Gartner Supply Chain practice. 'Our ranking highlights companies that possess these strategies and other differentiating capabilities.' - Gartner

Gartner, July 19th, 2021
(Get More Information . .) open to premium members only

The Quotable CIO: Wit And Wisdom From Top Technology Leaders, 9th Edition
Enjoy our ninth collection of CIO quotes that are worth reading and sharing.
We have been collecting and posting a 'CIO Quote of the Day' on social media for many years. Enjoy this latest collection of our favorite CIO bon mots, and follow us on Twitter and LinkedIn to see future CIO quotes as we post them.

'I am a big a fan of blurred reporting lines, because if we get wound up thinking about reporting, we lose sight of what we are trying to accomplish.'

  • Adrian Butler, CIO, Casey's General Stores

"No consultant or tool on the market can accelerate our digital transformation. We have to drive that change ourselves.'

  • Alessando Ventura, CIO North America, Unilever

Read on at Heller Search Associates

Heller Search Associates, July 21st, 2021
(Get More Information . .) open to premium members only

5 IT Leadership Mistakes To Avoid: Alabama CIO Of The Year Winners Share
What moves must rising IT leaders and seasoned CIOs alike avoid as they nurture individuals? Award-winning CIOs share their advice
"One of the most rewarding roles CIOs play is nurturing the next generation of IT leadership," opines Carla Rudder in The Enterprisers Project. "It's an opportunity to pass along the wisdom and, importantly, lessons learned from a career navigating the complexities and constantly evolving priorities of IT.

We caught up with CIOs who recently won the 2021 Alabama CIO of the Year ORBIE Awards to learn more about what it takes to be a strong IT leader today. The awards were presented by the Alabama CIO Leadership Association, a professional community that annually recognizes CIOs for their excellence in technology leadership..."

The Enterprisers Project, July 21st, 2021
(Get More Information . .) open to premium members only

The CISO: The Enabler Of Innovation
Myles Bray, senior vice-president EMEA at Forcepoint, discusses how the role of the chief information security officer (CISO) has changed, to enable innovation
"We're all still living through the personal and professional impact that the COVID-19 pandemic has had. Lives have changed and the world of office-based workers have changed with them. Business leaders needed to adapt, with technological enablement and digital transformation plans accelerated or in some cases, introduced for the first time. But one of the biggest changes we couldn't have predicted was the changing role of the CISO, which was dramatically put into the spotlight 18 months ago and has helped to enable innovation..." - InformationAge
InformationAge, July 23rd, 2021
(Get More Information . .) open to premium members only

Zoom CIO: Hybrid Work Demands Fresh Thinking
Both how we work and the purpose of the office will change dramatically as organizations begin to adopt hybrid work environments. Technology leaders have an important role to play
Harry D. Moseley writes in The Enterprisers Project, "Over the past 14 months, it has become clear that working in the future will involve a hybrid environment in which some employees work remotely while others work in the office. At Zoom, we are working hard to reimagine and support that vision by innovating and developing technologies that transform user experiences and bridge the gap between remote and in-office workers.

We are focused on making it inclusive, collaborative, equal, safe, and exciting so people will see that working in the office can have distinct benefits over working remotely for specific things, like ideation, new product creation, new service offerings, and the like..."

The Enterprisers Project, July 20th, 2021
(Get More Information . .) open to premium members only

IT News - Storage
Storage-As-A-Service: Consumption Models From The Big Six
We look at the big six storage makers' consumption model offers, which allow customers to pay for on-prem hardware and cloud storage capacity on a pay-per-use basis, within limits
"The cloud has affected IT much more broadly than simply bringing easy-to-consume remote compute and cloud storage. It has brought a whole new way of procurement and consumption, with pay-as-you-go and as-a-service becoming the new norm.

That desire to only pay for what you use has now spread to IT hardware and storage in particular, with the key array makers offering consumption models that allow customers to pay for their equipment according to what is used..."

ComputerWeekly, July 19th, 2021
(Get More Information . .) open to premium members only

Apply Hyperscale Data Center Design Principles To IT Storage
Storage admins in large enterprises can borrow infrastructure design principles from the major hyperscale cloud providers to optimize their own storage systems and operations
"The data centers and systems that power hyperscale cloud platforms represent the pinnacle of IT infrastructure design and implementation. They offer levels of scalability, reliability and throughput beyond what any average enterprise will ever need.

That said, enterprise IT teams -- including storage admins -- have much to learn from Google, AWS and other major public cloud providers. Through the application of certain hyperscale data center design principles, admins can work toward more scalable, resilient and automated IT storage systems..."

SearchStorage, July 19th, 2021
(Get More Information . .) open to premium members only

Are You Ready For The Unstructured Data Explosion?
Over the last decade, unstructured data has exploded - and so have the use cases for this treasure trove of information
"It's growing and it's complex. According to Statista and data from IDC, the total volume of data created, captured, copied, and consumed worldwide by 2024 will cross 149 zettabytes every year-and much of it will be unstructured.

Every organization stands to benefit from unstructured data-to power modern apps, for next-gen insights, and to make business breakthroughs. But first, they need a way to get a handle on it. And when it comes to modern unstructured data, many of the traditional storage architectures, technologies, best practices, and principles of structured data won't apply. This is new territory..."

Business 2 Community, July 23rd, 2021
(Get More Information . .) open to premium members only

How Do I Select A Data Recovery Solution For My Business?
Ransomware attacks have been hitting hard lately, with over half of organizations experiencing at least one this year, according to a recent study.
"Recovering data often means negoitating with cybercriminals, but why put an organization in such position when there are ways of preventing it?

To select a suitable data recovery solution for your business, you need to think about a variety of factors. We've talked to several industry professionals to get their insight on the topic..."

HelpNet Security, July 20th, 2021
(Get More Information . .) open to premium members only

What Is NAS (Network-Attached Storage) And How Does It Work?
Improvements in network-attached storage density and performance target unstructured data workloads. Here's how a NAS server works, how it is different from a SAN, and what IT buyers want in file-level storage
"Network-attached storage (NAS) is a category of file-level storage that's connected to a network and enables data access and file sharing across a heterogeneous client and server environment.

'Ideally, NAS is platform- and OS-independent, appears to any application as another server, can be brought online without shutting down the network and requires no changes to other enterprise servers,' says research firm Gartner in its definition of NAS..."

Networkworld, July 23rd, 2021
(Get More Information . .) open to premium members only

IT News - AI
What AI Experts Fear from AI
Rogue AIs. Algorithmic bias. Job losses. These are some of the outcomes that AI developers fear will come from their work, according to a new report issued today by the Deloitte AI Institute and the U.S. Chamber of Commerce.
Titled 'Investing in trustworthy AI,' the 82-page report from Deloitte and the Chamber Technology Engagement Center sought to identify the concerns that technology experts have when it comes to the adoption of AI, as well as highlight the impact that government investment in AI can have on the emerging technology.

Algorithmic bias and a lack of humans in decision loops are concerns for about two-thirds of the 250 people who participated in the survey. Another 60% identified 'rogue or unanticipated behavior' of autonomous agents as a threat, while 56% said the lack of explainability of algorithms was a concern.

datanami, July 21st, 2021
(Get More Information . .) open to premium members only

3 Ways To Make Conversational Ai Work For Your Organization
There's little doubt that conversational AI is gaining momentum. The question is this: How can you use it to deliver real business value?
Conversation is fundamentally human. Conversations reveal our personalities and let us express our values. They also underpin productivity in the workplace, as well as connections between brands and customers.

In short, good conversation is not an 'add-on.' It's the lifeline of your business and a measure of how well it's doing.

As more consumers demand always-on communications, businesses are turning to artificial intelligence (AI) to help facilitate some of these interactions. From 2020 to 2025, the global market for conversational AI is expected to grow from $4.8 billion to $13.9 billion -- and industry analysts predict that by 2022, 70% of customers interactions will involve emerging technologies compared to 15% in 2018.

InformationWeek, July 20th, 2021
(Get More Information . .) open to premium members only

7 Ways AI And ML Are Helping And Hurting Cybersecurity
In the right hands, artificial intelligence and machine learning can enrich our cyber defenses. In the wrong hands, they can create significant harm
"Artificial intelligence (AI) and machine learning (ML) are now part of our everyday lives, and this includes cybersecurity. In the right hands, AI/ML can identify vulnerabilities and reduce incident response time. But in cybercriminals' hands, they can create significant harm.

Here are seven positive and seven negative ways AI/ML is impacting cybersecurity..."

Dark Reading, July 19th, 2021
(Get More Information . .) open to premium members only

IT News - Technology
A Little Bigger Than The Raspberry Pi, But A Lot More Powerful (And Expensive!)
Most of the time, the Raspberry Pi is enough, but there are times when you need a lot more power.
"The Raspberry Pi has created a whole ecosystem of SBCs (Single Board Computers), and while the Pi -- especially the new Pi 4 B -- is more than enough for most applications, sometimes you want something that's more powerful.

Sometimes a lot more powerful.

The Aaeon PICO-TGU4 offers just that..."

ZDNet, July 20th, 2021
(Get More Information . .) open to premium members only

DNA Storage Promises 10 Million X Storage Capacity Boost
A datacentre that fits in the palm of your hand? However, right now, DNA storage is an expensive chemical process that researchers are trying to make a practical proposal
"Suggest to a chief information officer that they could soon store 10 million times as much data as the capacity of a single hard drive, and at the very least, they are likely to be sceptical.

But such advances could be possible - and within the next few years. The reason is DNA storage. Instead of using hard drives, magnetic tape or flash memory, DNA storage holds data using the code of life itself.

With today's science, a DNA storage system can hold 10 zettabytes of data in a device the size of a shoebox, according to John Monroe, vice-president and analyst at industry researcher Gartner..."

ComputerWeekly, July 22nd, 2021
(Get More Information . .) open to premium members only

Arm Researchers Have Created A Flexible 32-Bit Computer Chip Made From Plastic
Researchers from Arm Holdings Ltd. and PragmatIC Semiconductor Ltd. say they have created the first true computer chip that uses plastic rather than silicon as its base material
"By using plastic, the researchers said, the chip is more flexible and could potentially usher in a new era called the 'internet of everything' where microprocessors are used in everyday objects such as clothes and food packaging.

The research, published today in the journal Nature, notes that silicon has been the base element of semiconductors since the earliest days of digital computing. That's thanks to two fundamental characteristics - silicon is the second-most common element on the planet, meaning it's both cheap and in plentiful supply, and it can function as both an energy conductor and an energy insulator, depending on how it's implemented..."

si;oconANGLE, July 22nd, 2021
(Get More Information . .) open to premium members only

What Faster And Smarter HBM Memory Means For Systems
If the HPC and AI markets need anything right now, it is not more compute but rather more memory capacity at a very high bandwidth
"We have plenty of compute in current GPU and FPGA accelerators, but they are memory constrained. Even at the high levels of bandwidth that have come through the use of two and a half generations of 3D-stacked High Bandwidth Memory, or HBM, we can always use more bandwidth and a lot more capacity to keep these massive compute engines fed with data.

There are a couple of ways to deal with the memory bandwidth issue, and memory makers SK Hynix and Samsung Electronics are taking two very different approaches with their future HBM stacked memory..."

The Next Platform, July 21st, 2021
(Get More Information . .) open to premium members only

IT News - Security
7 Hot Cyber Threat Trends To Expect At Black Hat
A sneak peek of some of the main themes at Black Hat USA next month.
"After a year of virtual-only conference attendance, at least part of the security community is ready to reconvene at security summer camp," notes Ericka Chickowski in Dark Reading "This year's Black Hat USA is bringing a hybrid format forward to offer something for everyone-in-person presentations and trainings (and parties!) as well as a healthy slate of virtual offerings for those who aren't quite ready to add travel to their repertoire. The content will be robust as ever, with a lot of new vulnerabilities, security tools, and attack techniques expected to be unveiled by the show's stable of security researchers. The following are some of the threat and vulnerability trends that attendees or viewers at home should expect to see during the conference..."
Dark Reading, July 22nd, 2021
(Get More Information . .) open to premium members only

Deepfakes: The Next Big Threat
A number of mobile apps give anyone with a smartphone and a few minutes of time on their hands the ability to create and distribute a deep fake video
Sue Poremba writes in Security Boulevard, "All it takes is a picture of, say, yourself that you'd swap with an actor in a movie or a television show. The apps do the hard part by recognizing the facial structure of the actor, so when your image is added to the movie or show, it is a pretty seamless recreation.

Chances are no one will actually mistake you for Brad Pitt or Reese Witherspoon, but what these apps-downloadable from the Apple App Store or Google Play-do isA show how simple it is for the average person to make a fake image look legitimate. And while these apps are meant for entertainment purposes, deep fakes are becoming a new category of cybercrime that are not just a problem for networks and data, but could also have a life-or-death impact..."

Security Boulevard, July 20th, 2021
(Get More Information . .) open to premium members only

The Top 7 Identity And Access Management Risks
An IAM system introduces risks to the enterprise, but the consensus is the benefits of IAM outweigh the drawbacks. What are some of the issues that might arise?
"When evaluating an identity and access management platform," writes Andrew Froehlich in SearchSecurty, "the benefits far outweigh any drawbacks. That said, you must consider a few identity and access management risks when designing an IAM implementation and ongoing maintenance processes. Let's look at some of the more common risks associated with IAM deployments:

1. Centralized management creates a single, centralized target. As you begin to centralize the management of usernames and authentication mechanisms, the process creates a much bigger and centralized security target. Thus, great care must be taken to properly secure an IAM platform using various network-based security tools..."

SearchSecurty, July 19th, 2021
(Get More Information . .) open to premium members only

How NIST Is Changing Password Creation In 2021
We're living in an era where almost everything is just a few clicks away, and the internet is becoming the second home for all of us.
"Whether it's entertainment or essential purchasing, we're catered to everything online in the digital world," writes Deependra Singh in Security Boulevard.

"But with the increase in the use of the internet, the risk of security breach and identity thefts have augmented substantially.

Businesses are compromising sensitive user data and consumer identities that not only cause losses worth millions but eventually tarnish brand repute.

To cope with the increasing number of cyber frauds and data thefts, the National Institute of Standards and Technology (NIST) has issued certain requirements along with controls for digital user identities..."

Security Boulevard, July 21st, 2021
(Get More Information . .) open to premium members only

How AI Will Transform Data Security
I've often wondered whether artificial intelligence (AI) in cybersecurity is a good thing or a bad thing for data security.
"Yes, I love the convenience of online stores suggesting the perfect items for me based on my search history, but other times it feels a bit creepy to have a pair of shoes I looked at stalking me around the internet. But I've realized as a consumer that the answer is a little bit of both.

I've recently been researching and writing on the increase of AI-based attacks. In brief, the premise of AI is the quick analysis of large amounts of data and then using the data to make predictions. I learned that both the good guys and the bad guys can use AI. What does that mean for the future of data security?..."

SecurityIntelligence, July 23rd, 2021
(Get More Information . .) open to premium members only

IT News - Cloud
Google Cloud Rolls Out New Security Tools As Threat Landscape Heats Up
New tools for the public sector will help agencies comply with President Joe Biden's cybersecurity executive order, while other tools give Google Cloud customers more automated security operations and access to Palo Alto Networks' threat detection technologies
"Google Cloud on Tuesday is introducing a range of new security products, for both its private and public sector customers, as they look to respond to the quickly-evolving threat landscape. The new public sector tools will help agencies comply with President Joe Biden's cybersecurity executive order. Meanwhile, other Google Cloud customers will have access to more automated security operations, as well new threat detection capabilities powered by Palo Alto Networks technology.

The new products follow a series of dramatic cybersecurity incidents, including the Colonial Pipeline ransomware attack that shut down gas and oil deliveries throughout the southeast, the SolarWinds software supply chain attack and an extensive hack on Microsoft Exchange servers..."

ZDNet, July 20th, 2021
(Get More Information . .) open to premium members only

3 Steps To Boost Your Enterprise Cloud Security
Organizations must keep a check on security implications associated with multiple cloud environments. Companies should build robust cloud security policies to defend against evolving cloud risks.
"Cloud computing has already revolutionized the way businesses operate. Several organizations jumped the bandwagon of deploying multiple cloud environments into their IT infrastructure. Organizations are using various cloud services to store confidential corporate data. According to a survey, nearly 90% of organizations use cloud services like Amazon Web Services (AWS), Microsoft Azure, and Google Cloud. Over 77% of businesses have been using at least one cloud application..."
CISO MAG, July 20th, 2021
(Get More Information . .) open to premium members only

4 Best Practices For Big Data Security In Cloud Computing
When dealing with vast amounts of data in the cloud, enterprises need to be proactive with security. Don't wait for a threat to happen; apply these best practices first.
"Any big data project will involve a significant amount of data which can include sensitive or personally identifiable content. Tackling big data security in cloud computing requires various best practices.

Every business that stores data must be concerned with issues that can impact the following:

Data security. Is the data set protected against snooping or theft? What happens to the business if any data leaks to unauthorized concerns?

Data integrity. Is the data set protected against alteration or deletion? What happens to the business if any data is changed, causing an unexpected or inaccurate result of a big data analysis?

Data processing. Is the data set protected within the computing infrastructure? Can any part of the computing infrastructure be hacked to potentially expose data or results?

SearchCloudComputing, July 20th, 2021
(Get More Information . .) open to premium members only

It's Time To Double Down On Cloud Adoption
Jack Watts, EMEA leader, AI at NetApp, discusses the need to double down on cloud deployments when it comes to the AI journey
"It's safe to say our world has changed over the last year. How we shop, work, and socialise has been reimagined in a multitude of different ways so that we can carry on throughout national and regional lockdowns. Many of these changes will disappear once COVID-19 is a memory. But others are here to stay.

The acceleration of technology is one change that'll be with us forever. Businesses across the world have increased their technological investments both to keep afloat during the pandemic, to keep pace against in an increasingly competitive market..."

InformationWeek, July 19th, 2021
(Get More Information . .) open to premium members only

Hybrid Cloud Success: 5 Things To Forget About, 4 Things To Remember
Prepping for hybrid cloud relies on essentials like developing in-house expertise and careful analysis that proves out what the cost benefits will be
"OK, let's say you're a CIO who's promoted hybrid cloud computing in your company. Then along came all these news stories that call into question the whole notion of cloud economies. Do you send some covert IT team to block the news from the CFO's computer, or do you deal with it? Hopefully, the latter.

I've examined audits of over four-dozen cloud projects, and the good news is that most cloud applications make the business case. The bad news is that a lot, a worrisome lot, don't. If you want yours to succeed, there are some strategies that will help, in the form of five 'forgets' and four 'remembers'..."

Networkworld, July 21st, 2021
(Get More Information . .) open to premium members only

Windows 365: The Vision For Delivering A CloudPC
The news of Windows 365 and the CloudPC piqued my interest this week. For some time I have been hoping for a persistent virtual desktop experience in the cloud that is unique for me.
"My vision for what it should look like was that I could use my existing Office 365 credentials, login to a desktop spec'd to my choosing and use my Office 365 within the desktop, as well as consume the other 3rd party apps that are important to me. Most importantly though, I would like to pay a predictable flat price subscription each month just like I do for Spotify or Netflix.

The Windows 365 offering looks like it will partially meet my vision. CloudPC will be a flat fee subscription per month. No more trying to guess how much compute you will use month to month to predict your bill..."

Rorymon, July 19th, 2021
(Get More Information . .) open to premium members only

Sections in this issue:
click to jump to section