IT News and Events
SNIA: xPU Deployment and Solutions Deep Dive (Aug. 24th)
Aug 8th, 2022 — Aug 14th, 2022 Generate the Custom HTML Email for this Issue
IT News and Events IT News and Events
Volume 293, Issue 2 << Previous Issue
IT - CxO
disable
7 Traits Of Digital-Savvy CIOs
CIO, August 8th, 2022

Just as employees are upskilling in the latest tech, so too should CIOs, whose ongoing digital skills acquisition can greatly impact their organizations and their careers.

Everything CISOs Need to Know About NIST
SecurityIntelligence, August 8th, 2022

It's never been harder to be a chief information security officer (CISO). In 2021, there were 50% more attacks each week compared to 2020.

Tools For Instilling A Culture Of Digital Transformation
SearchCIO, August 10th, 2022

Communities of practice, agile methods, cross-functional teams and platform strategies rank among the methods IT leaders use to institutionalize change and create a culture of digital transformation.

7 Best Reasons To Be A CISO
CSO Online, August 9th, 2022

The role of the CISO has its challenges, but these positives are what people in the role say make it all worthwhile.

7 Skills CIOs Say Are Core To Their Jobs
The Enterprisers Project, August 10th, 2022

From self-awareness to time management, IT leaders share which non-tech skills have had an impact on their careers

Gartner Releases 2022 Storage Hype Cycle
Blocks & Files, August 12th, 2022

Gartner's latest storage and data protection hype cycle is an amazingly long report and, this being Gartner, the basic idea is treated to exhaustive analysis by a team of consultants.

Practical Guidance For Creating IT Architecture Roadmaps
Architecture & Governance, August 8th, 2022

Amidst a rapidly changing technology landscape, enterprises need to embrace and plan modernization of their IT architecture with the goal of retaining and enhancing business competitiveness. An important aspect of this planning exercise is the enterprise IT architecture roadmap.

The CIO's Hybrid Cloud Journey Incorporates Extensive Systems Thinking
CIO, August 11th, 2022

Savvy IT leaders understand the benefits of both the public cloud and private cloud, culminating in hybrid cloud implementations. Here's what's changing the cloud journey approach for CIOs and IT leaders.

The Forrester Enterprise Architecture Award Finalists For North America
Forrester, August 12th, 2022

Enterprise architecture (EA) is a strategic capability for many Forrester clients. It is essential that EA in all of its permutations be results-oriented and pragmatic.

Top 10 Customer Data Privacy Best Practices
SearchCustomerExperience, August 11th, 2022

To ensure customer data remains secure and inaccessible to bad actors, organizations should implement best practices such as frequent data audits and employee trainings.

IT - Storage
disable
FMS: Fibre Channel Industry Association Showcases FC And FC-NVMe Technology
StorageNewsletter.com, August 8th, 2022

Ahead of the first in-person FMS since 2019, the Fibre Channel Industry Association (FCIA) was demonstrating why FC is the go-to transport for business and mission critical applications at this year's show as adoption continues to grow.

Container-Based Storage Ready For Widespread Adoption
ITProToday, August 9th, 2022

Cloud-native application development works best with storage designed specifically for containers. Learn more about container-based storage technology and approaches.

5 Highlights From DCIG's SDS Object Storage Research
DCIG, August 10th, 2022

Earlier this year, DCIG announced the 2022-23 DCIG TOP 5 On-Premises SDS Object Storage Solutions report. The DCIG TOP 5 report provides guidance on the TOP 5 solutions organizations should consider for on-premises SDS object storage deployment.

Is Your Data Hot Or Cold?
Technative, August 12th, 2022

Did you know that your data has a temperature? It's true.

Storage Unicorn Report With 17 Companies
StorageNewsletter.com, August 8th, 2022

Coldago Research, a storage and data management research and analysis firm, released end of June eleventh storage unicorn report ($990) with 17 companies.

Tape (And DNA?) Needed To Meet Archive Demand By 2030
Blocks & Files, August 9th, 2022

A report has claimed that there could be a huge gap in archive data storage needs by 2030, with tape and possibly DNA storage the only viable technologies to fill it.

The 5 Best Data Observability Tools And Software To Consider For 2022
Solutions Review, August 12th, 2022

Solutions Review's listing of the best data observability tools is an annual mashup of products that best represent current market conditions, according to the crowd.

215,011 HDDs Tested In 2Q22
StorageNewsletter.com, August 10th, 2022

Lifetime annualized failure rate at 1.39%, same as last quarter and down from 1.45% one year ago

IT - AI
disable
Artificial Intelligence (AI) Vs. Machine Learning (ML): Key Comparisons
VentureBeat, August 9th, 2022

Within the last decade, the terms artificial intelligence (AI) and machine learning (ML) have become buzzwords that are often used interchangeably.

MLOps Vs. DevOps: What's the Difference?
DevOps.com, August 10th, 2022

Machine learning operations, or MLOps for short, is a key aspect of machine learning (ML) engineering that focuses on simplifying and accelerating the process of delivering ML models to production and maintaining and monitoring them.

10 Top Artificial Intelligence (AI) Solutions In 2022
VentureBeat, August 10th, 2022

Among the many drivers of the tech ecosystem's rapid growth, artificial intelligence (AI) and its subdomains are at the fore.

How To Solve AI's 'Common Sense' Problem
TechTalks, August 8th, 2022

In recent years, deep learning has taken great strides in some of the most challenging areas of artificial intelligence, including computer vision, speech recognition, and natural language processing.

26 Awesome Open Datasets For Your Data Science/ML Projects
Geekflare, August 12th, 2022

The search for the right datasets could be daunting, especially when you need them for machine learning (ML) and data science projects. We reduce your research efforts by providing the ultimate list of free data sets.

Gartner: Emerging Tech That Will Accelerate AI Automation
Gartner: Emerging tech that will accelerate AI automation, August 11th, 2022

Report includes causal AI, autonomic systems and ML-powered coding models

Techstrong TV: The Use Of AI In Low-Code
DevOps.com, August 12th, 2022

In this talk, Dave Wright, Chief Innovation Officer of ServiceNow, talks about how low-code is accelerating organizations' AI journeys and is expanding into new, scalable use cases as we move into a post-COVID-19 world. The video and a transcript of the conversation are below.

IT - Technology
disable
ChromeOS: Tips, Tools, And Other Chromebook Intelligence
ComputerWorld, August 12th, 2022

Your one-stop source for ChromeOS advice, insight, and analysis - from someone who's covered Chromebooks closely since the start.

Gartner Identifies 25 Emerging Technologies In Its 2022 Hype Cycle
TechRepublic, August 9th, 2022

The technologies could enable immersive experiences, accelerated AI automation and optimized technologist delivery in the next two to 10 years, according to the firm.

Gartner Identifies Key Emerging Technologies Expanding Immersive Experiences, Accelerating AI Automation And Optimizing Technologist Delivery
Gartner, August 10th, 2022

The 25 emerging technologies to watch on the Gartner, Inc. Hype Cycle for Emerging Technologies, 2022 are enabling the evolution and expansion of immersive experiences, accelerating artificial intelligence (AI) automation and optimizing technologist delivery.

Interview: Micron likes 3D DRAM and 3D NAND - and Loves CXL
Blocks & Files, August 9th, 2022

How does Micron view the world of CXL (Computer eXpress Link)? Blocks & Files had the opportunity to talk about this with Ryan Baxter, a Micron senior director of marketing and the segment lead for the datacenter (cloud and networking) area.

These 15 Data Fabrics Made The Cut In Forrester's Wave
datanami, August 9th, 2022

If you're in the market for a data fabric, then you might be interested in a recent report from Forrester, which published a Wave report in June detailing the pros and cons of more than a dozen data fabrics offerings.

What Is PCIe 5.0, and Why Does It Matter?
How-To Geek, August 11th, 2022

With the release of Intel's Alder Lake CPUs, and the looming release of AMD's 7000 Ryzen CPUs, PCIe 5.0 hardware is finally a reality. But what is PCIe 5.0, and should you rush out to buy a PCIe 5.0 motherboard?

IT - EdTech
disable
EdTech Isn't Special Anymore, And That's A Good Thing
TechCrunch, August 11th, 2022

Edtech's day in the sun wasn't too long ago. As the pandemic struck, consumers became hungry for new virtual-first tools, Zoom school turned into a reality for millions, and it felt like every late-stage company was getting a chance to become a unicorn.

IT - Security
disable
Looking Back At 25 Years Of Black Hat
DARK Reading, August 10th, 2022

The Black Hat USA conference's silver jubilee is an opportunity to remember its defining moments, the impact it has made on the security community, and its legacy.

Understanding Your Attack Surface Is Key To Recognizing What You Are Defending
HelpNet Security, August 9th, 2022

In this interview with Help Net Security, Marc Castejon, CEO at Silent Breach, discusses what organizations should be worried about at the moment, and what technologies they should focus in the near future.

'Clouderati' Panel Of Industry Experts Assesses Future Of Supercloud In A Multicloud World
SiliconANGLE , August 9th, 2022

Despite the cloud's numerous benefits, enterprise frustration is building over challenges compounded by the embrace of multicloud.

Black Hat At 25: Why Cybersecurity Is Going To Get Worse Before It Gets Better
InformationWeek, August 12th, 2022

Chris Krebs, the former director of the US Cybersecurity and Infrastructure Security Agency, looked to the future of cybersecurity during his keynote speech at Black Hat USA.

Cyber Insurance Getting Harder To Obtain
ComputerWeekly, August 9th, 2022

Organisations looking to shore up their security postures face more and more barriers to obtaining cyber insurance

Cybersecurity Predictions For The Rest Of 2022
Security Boulevard, August 11th, 2022

Our cybersecurity predictions for 2022 predicted trends such as increased regulatory changes and exacerbated talent shortages.

New Open Source Tools Launched For Adversary Simulation
DARKReading, August 10th, 2022

The new open source tools are designed to help defense, identity and access management, and security operations center teams discover vulnerable network shares.

Ransomware, Email Compromise Are Top Security Threats, But Deepfakes Increase
CSO Online, August 9th, 2022

While ransomware and business email compromise are leading causes of cybersecurity threats, geopolitics and deepfakes play an increasing role, according to reports from VMware and Palo Alto.

Top 8 In-Demand Cybersecurity Jobs For 2022 And Beyond
whatis.com, August 8th, 2022

Cybersecurity is a challenging career path, filled with professional opportunities. Learn about the top cybersecurity jobs and the training and background they require.

Top Cybersecurity Products Unveiled At Black Hat 2022
CSO Online, August 11th, 2022

Here are some of the most interesting new products launched at Black Hat USA 2022, including zero trust, extended detection and response (XDR), and a host of other threat and vulnerability management offerings.

Weak Cybersecurity Is Taking A Toll On Small Businesses
DARKReading, August 8th, 2022

Life among America's nearly 32 million small businesses has never been easy. According to the Small Business Administration, about 20% of small business startups fail in their first year and half succumb to failure within five years.

36% Of Orgs Expose Insecure Ftp Protocol To The Internet, And Some Still Use Telnet
HelpNet Security, August 10th, 2022

A significant percentage of organizations expose insecure or highly sensitive protocols, including SMB, SSH, and Telnet, to the public internet, the ExtraHop Benchmarking Cyber Risk and Readiness report has shown.

Zero Trust & XDR: The New Architecture of Defense
DARKReading, August 10th, 2022

Zero trust and XDR are complementary and both are necessary in today's modern IT environment. In this article, we discuss the intersection of zero trust and XDR.

IT - Database
disable
A Major Threat To Business: SQL Injection Attack
CXOtoday.com, August 8th, 2022

Data is a shiny new toy in the hands of businesses and criminals alike. If a web application or website uses databases to store information, it is vulnerable to attack.

IT - FOSS
disable
10 Top Open Source Security Testing Tools
SearchSecurity, August 8th, 2022

From Kali Linux to Mimikatz to Metasploit, learn about 10 open source penetration testing tools organizations can use to determine how secure their network is.

Grsync - A Simple Graphical Frontend For Rsync
OSTechNix, August 12th, 2022

Backup Files And Directories Using Grsync In Linux

IT - MFA
disable
Is MFA the Vegetable of Cybersecurity?
CSO Online, August 9th, 2022

Strengthening your company's cybersecurity posture can be easy, but three trends are causing many companies to miss out. Here's how to avoid falling victim to these trends - and cyber threats.

IT - Cloud
disable
Building A Data Loss Prevention Strategy For Your Cloud
Security Boulevard, August 9th, 2022

Data breaches are becoming increasingly common and expensive. IBM estimated that the average data breach costs $3.86 million dollars. Organizations of all sizes and industries are at risk of this reality.

Cloud Database Security: Key Vendor Controls, Best Practices
SearchSecurity, August 10th, 2022

If your company is using a cloud database, it's critical to stay on top of security. Review the security features offered by top cloud providers, plus some best practices.

Cloud Security Best Practices
Security Boulevard, August 11th, 2022

Cloud security is one of the most important aspects of cloud computing. Read on to understand cloud security best practices your company should follow.

Gartner Highlights iPaaS and Low-code Platforms in Cloud Platform Hype Cycle
datanami, August 10th, 2022

Gartner predicts two technologies will play a central role in enterprise data and service integration in the next two years.

Understanding Cloud Reliability Is Complicated
CIODIVE, August 12th, 2022

Executives can't rely on any one metric to understand if cloud reliability is getting better or worse.

IT - DR
disable
Is Trusting Big Cloud With Your DR Strategy A Recipe For Disaster?
Solutions Review, August 9th, 2022

As part of Solutions Review's Premium Content Series-a collection of contributed columns written by industry experts in maturing software categories- Adam Stern of Infinitely Virtual breaks down why you should diversify your disaster recovery strategy and not put all your eggs in one Big Cloud basket.

IT - Networks
disable
Network Mistakes, Misconfigurations Cost Companies Millions
CSO Online, August 11th, 2022

Titania research pegs losses from misconfigurations at average of 9% of annual revenue.

SD-WAN: An Ideal Enabler of Enterprise Digital Business
Network Computing, August 11th, 2022

The rapid introduction of new technologies and an increasing emphasis on industry-backed standards will help to reduce complexity and further accelerate the SD-WAN and SASE market.

IT - IoT
disable
Complete Guide To IoT Security
Security Boulevard, August 8th, 2022

The IoT market is projected to hit the $1.5 Trillion mark by 2025. Doesn't that number look staggering?

Data Privacy Regulation A Top Three Challenge For IoT Adopters
HelpNet Security, August 8th, 2022

Fears over security have become less of a concern for organizations adopting IoT solutions than it was five years ago, according to a recent study by Wi-SUN Alliance, a global member-based association of industry leading companies driving the adoption of interoperable wireless solutions for use in smart cities, smart utilities, IoT and industrial IoT (IIoT) applications.

The Time Is Now For IoT Security Standards
DARKReading, August 11th, 2022

Industry standards would provide predictable and understandable IoT security frameworks.

IT - Email
disable
Domain-based Message Authentication, Reporting and Conformance (DMARC)
SearchSecurity, August 12th, 2022

What is Domain-based Message Authentication, Reporting and Conformance (DMARC)?

IT - Backup
disable
Magic Quadrant For Enterprise Backup And Recovery Software Solutions
StorageNewsletter.com, August 9th, 2022

This market research has been updated to include recent changes in capability, being written by Nik Simpson, Santhosh Rao, Jerry Rozeman, and Michael Hoeck, analysts, Gartner, Inc.

Top 5 Best Backup Practices
TechRepublic, August 10th, 2022

Give yourself peace of mind by implementing a new backup strategy with our tips.

IT - Big Data
disable
Data Lake Strategy Options: From Self-Service To Full-Service
IT Business Edge, August 8th, 2022

Data continues to grow in importance for customer insights, projecting trends, and training artificial intelligence (AI) or machine learning (ML) algorithms.

IT - Encryption
disable
NIST's Post-Quantum Cryptography Standards
Security Boulevard, August 8th, 2022

Quantum computing is a completely new paradigm for computers. A quantum computer uses quantum properties such as superposition, which allows a qubit (a quantum bit) to be neither 0 nor 1, but something much more complicated.

IT - Developer
disable
What Is JSON And How Do You Use It?
How-To Geek, August 12th, 2022

JSON (JavaScript Object Notation) is a standardized format for representing structured data. Although JSON grew out of the JavaScript programming language, it's now an ubiquitous method of data exchange between systems.

API Security: A Complete Guide
Security Boulevard, August 8th, 2022

We as consumers may not realize it, but APIs have revolutionized how we live and work, driving innovation and making it easier to use software in our day-to-day lives.

What Tools Do You Need to Achieve Effective DevOps?
How-To Geek, August 12th, 2022

DevOps is an approach to software delivery that integrates the development process with service operation tasks. Effective DevOps implementations facilitate greater throughput by increasing efficiency and cutting down silos between teams.

IT - CxO Events
disable
BWGStrategy: How Cloud Detection & Response Can Help Organizations Intercept Cloud Attacks (Aug. 17th)
Wednesday, August 17th, 2022: 3:00 PM to 4:00 PM EDT

In this virtual event, we will discuss how CDR can help organizations continuously monitor their cloud environments and receive alerts when unusual activity occurs, along with recommended actions to be taken.

ITProToday: How to Be Ready for Ransomware (Aug. 18th)
Thursday, August 18th, 2022: 11:00 AM to 5:00 PM EDT

In this virtual event, presented by ITPro Today and InformationWeek, get a better picture of today's threat landscape; learn what tools and techniques can best help your organization detect and prevent these attacks; design a thorough incident response plan that will help your organization survive a successful attack intact; and be prepared with a fast answer to the age-old question: 'to pay or not to pay?'

IDC: State of the Market: IT Spending & Recession Impact by Industry (Aug. 18th)
Thursday, August 18th, 2022: 12:00 PM to 1:00 PM

This IDC Webinar provides an update on the state of the IT market and the outlook for technology budgets in 2022/23, with a focus on vertical industry trends and forecasts.

AngelBeat: Digital Transformation (NYC In Person or Virtually) (Aug. 23rd)
Tuesday, August 23rd, 2022: 7:30 AM to 12:00 PM EDT

The Angelbeat 1/2 day event on Tuesday, August 23, features expert/technical speakers from Microsoft, AWS and Google (all three at one event!), plus other leading firms

SNIA: xPU Deployment and Solutions Deep Dive (Aug. 24th)
Wednesday, August 24th, 2022: 1:00 PM to 2:00 PM

Our 1st and 2nd webcasts in this xPU series explained what xPUs are, how they work, and what they can do. In this 3rd webcast, we will dive deeper into next steps for xPU deployment and solutions

SETC: Data Analytics: Understanding Where Your Energy is Used (Aug. 30th)
Tuesday, August 30th, 2022: 3:00 PM to 4:00 PM EDT

Learn best practices, methodologies and solutions for building sustainable enterprises from the SME

DARKReading: Understanding Machine Learning, Artificial Intelligence, and Deep Learning, and When to Use Them (Sept. 7th)
Wednesday, September 7th, 2022: 1:00 PM to 2:00 PM

In this webinar, experts will discuss the differences between machine learning and deep learning, and how to evaluate and choose the right approach that can address enterprise security challenges.

IT - CxO Security Events
disable
DARKReading: How Supply Chain Attacks Work - And What You Can Do to Stop Them (Aug. 17th)
Wednesday, August 17th, 2022: 1:00 PM to 2:00 PM EDT

In this webinar, experts talk through the stages of a supply chain attack. You will also learn what tools and strategies you can start using immediately to assess your own supply chain security and put defenses in place to keep your supply chain protected.

DARKReading: Ransomware Resilience and Response: The Next Generation (Aug. 18th)
Thursday, August 18th, 2022: 1:00 PM to 2:00 PM EDT

In this webinar, experts walk you through questions and help you prepare your answers in the ransomware response playbook, so that when the infection hits your network, you have the processes and technologies necessary to bounce back.

Blackhat: An Inside Look At Defending The Black Hat Network (Aug. 18th)
Thursday, August 18th, 2022: 12:00 PM to 3:00 PM EDT

During this webinar, we will share the details that go into designing, deploying, and maintaining the technical infrastructure and network at Black Hat USA.

DARKReading: Assessing Cyber Risk (Aug. 25th)
Thursday, August 25th, 2022: 1:00 PM to 2:00 PM

In this webinar, you'll learn how to evaluate your organization's risk and security posture, and how to present that assessment to enterprise leaders who may not be technology experts or security-savvy.

InformationWeek: How To Move Beyond Passwords: The first Step Into a Passwordless Future
Thursday, August 25th, 2022: 1:00 PM to 2:00 PM EDT

Join us to learn how LastPass is enabling an end-to-end passwordless experience for the LastPass vault, and all sites stored within. Take the first step on the journey to a passwordless future when you register for this new webinar.

Mandiant: Demystifying the Tradecraft of a Threat Informed Defense (Aug. 25th)
Thursday, August 25th, 2022: 12:00 PM to 1:00 PM EDT

Register now to join the conversation and learn how to prepare your organization for any and every threat that comes your way.

Beyond IOCs: Validate security controls with quality threat intelligence
Wednesday, September 21st, 2022: 11:00 AM to 12:00 EDT

Leave Your IOC's at the door and learn to validate security controls with quality threat intelligence.

IT - CxO Podcasts
disable
Digital Transformation: A Practitioner's Guide (with TIAA)
CXOTalk, August 11th, 2022

Digital transformation is no longer an option for most organizations.

Techstrong TV: Scratching the Surface of Testing Through AI
August 12th, 2022

Mark, Torsten and Alan discuss the findings of the 'Disrupting the Economics of Software Testing Through AI' report.

Techstrong TV: Making Building Container Applications Simpler
Container Journal, August 11th, 2022

Slim.AI CEO John Amaral explains what it will take to make building container applications simpler. The video and a transcript of the conversation are below.

Cisco News
disable
Count On Webex For Your Data Locality And Sovereignty Needs
Cisco News, August 12th, 2022

Covid has accelerated adoption of modern collaboration services by the public sector.

The Path to Cisco SD-WAN Mastery
Cisco News, August 12th, 2022

Cisco recently expanded its Cisco SD-WAN training portfolio with the Implementing Cisco SD-WAN Security and Cloud Solutions (SDWSCS) course. This new SDWSCS course covers critical Cisco SD-WAN solutions and the foundational knowledge necessary to implement those solutions in the real world.

HP News
disable
LNK's Awakening: Cybercriminals Moving From Macros To Shortcut Files To Access Business PCs
HP News, August 10th, 2022

HP Wolf Security report highlights the latest techniques and phishing lures targeting employees and putting companies at risk

AWS News
disable
How Amazon Is Building Its Drone Delivery System
AWS News, August 9th, 2022

Amazon drone delivery will enable even faster deliveries to customers, with the potential to increase overall safety and efficiency in the transportation network.

VMware News
disable
VMware Report Warns Of Deepfake Attacks And Cyber Extortion
VMware News, August 8th, 2022

Burned out security teams fight back against geopolitically motivated attacks and lateral movement inside networks

Oracle News
disable
Adept Builds A Powerful AI Teammate For Everyone With Oracle And NVIDIA
Oracle News, August 10th, 2022

Flexible natural-language computing interface built on Oracle Cloud Infrastructure (OCI) and NVIDIA technology enables people and computers to work together creatively

Anaconda Announces Strategic Cloud Partnership With Oracle To Enable Seamless, Secure Open-Source Innovation In The Cloud
Oracle News, August 9th, 2022

Anaconda and Oracle partner to help secure the open-source pipeline in high-performance machine learning on Oracle Cloud Infrastructure (OCI)

Oracle Extends AT&T Cloud Agreement With New Five-Year Deal
Oracle News, August 10th, 2022

Leading telecommunications provider accelerates cloud transition with Oracle apps and infrastructure

Stadium Goers Root For High-Tech Outings
Oracle News, August 9th, 2022

New Oracle survey shows fans want tech to cut waits and boost interactions with favorite teams and artists

Tovala Selects Netsuite To Heat Up The Meal Subscription Service Market
Oracle News, August 9th, 2022

Founded in 2017, Tovala is the product of a graduate student looking to make eating healthy work with his busy schedule.

Dell News
disable
APEX: Delivering Customer Choice And Partner Opportunity
Dell Technologies, August 10th, 2022

APEX for partners: momentum of enhancements/expansion, optimism for future growth and consistency in delivering on our promises.

Modernizing While Running The Business - Yes, It's Possible
Dell Technologies, August 9th, 2022

IT leaders have options as they seek to modernize their organizations and the business. Learn how Dell's IT organization does it.

The OTEL Secret Sauce: Take a Sip
Dell Technologies, August 10th, 2022

Bringing innovation to the table, Dell Technologies Open Telecom Ecosystem Lab's Solution Integration Platform is ready to serve.

Lenovo News
disable
Lenovo Delivers Ninth Straight Quarter Of Improved Revenue And Profitability As Diversified New Growth Engines Drive Sustained Strong Performance
Lenovo News, August 10th, 2022

Lenovo Group announced strong first quarter results for the Group, improving both revenue and profitability for the ninth consecutive quarter.

Lenovo Partners With Organizations Across Asia Pacific To Upskill Youth With Future-Ready Tech Skills
Lenovo News, August 12th, 2022

In line with the goals of International Youth Day 2022, observed on August 12, Lenovo is partnering with youth organizations across Asia Pacific to provide future-ready tech skills and access to technology to underrepresented youth.

Microsoft News
disable
Barclays Deploys Microsoft Teams Globally As Its Preferred Collaboration Platform To Enable Better Connectivity For Its Employees Worldwide
Microsoft News, August 9th, 2022

Multiyear agreement represents one of the largest deployments of Teams in the financial services industry

Microsoft And Unity Partner To Empower Digital Creators, 3D Artists And Game Developers Everywhere Through The Power Of Azure
Microsoft News, August 8th, 2022

Unity selects Azure as its cloud partner; companies will work together to enable creators to reach their audiences on Xbox and PC

Fortinet News
disable
Life After Death - Smokeloader Continues To Haunt Using Old Vulnerabilities
Fortinet News, August 8th, 2022

Vulnerability management and remediation are some of the most difficult problems to tackle within an organization. Multiple solutions, watchlists, and warnings are designed to ensure that companies and end users patch their software against known security vulnerabilities.

Q&A With Chris Nguyen, Fortinet Channel Sales Engineer
Fortinet News, August 9th, 2022

A channel sales engineer is the face of Fortinet to many of our channel partners. Fortinet channel sales engineers (SEs) are responsible for technical enablement with our channel partners, helping them maximize the opportunity with Fortinet's Security Fabric solutions.

The Swan Song For Driver Signature Enforcement Tampering
Fortinet News, August 12th, 2022

Code Integrity is a threat protection feature first introduced by Microsoft over 15 years ago. On x64-based versions of Windows, kernel-mode drivers must be digitally signed and checked each time they are loaded into memory.

Training The Cybersecurity Workforce To Help Protect Global Organizations
Fortinet News, August 11th, 2022

The Fortinet Training Institute is made up of various programs aimed at closing the skills gap through the company's award-winning training and certification

Red Hat News
disable
Convert2RHEL: Extended Update Support (EUS) Conversions
Red Hat News, August 12th, 2022

Until now, Convert2RHEL only supported conversions of systems that were in their most recent minor release versions, meaning your system always has to be up to date to make the conversion to Red Hat Enterprise Linux (RHEL).

Friday Five - August 12, 2022
Red Hat News, August 12th, 2022

The Friday Five is a weekly Red Hat blog post with 5 of the week's top news items and ideas from or about Red Hat and the technology industry. Consider it your weekly digest of things that caught our eye.

Implementing Security Benchmarks With Red Hat Ansible Automation Platform
Red Hat News, August 10th, 2022

This article is the first in a two-part series. Here we take a step back and look at the evolving IT security risk landscape and how it is impacting organizations, after which we'll look at a suggested automated compliance architecture.

Red Hat Application Services For The Edge
Red Hat News, August 9th, 2022

Branch offices and stores, the manufacturing floor, remote sensors, ships and planes - all of these locations represent the vast and distant frontier known as "the edge."

The Software Defined Programmable Logic Controller: An Introduction To Red Hat's Predictable Latency / Realtime Capabilities
Red Hat News, August 11th, 2022

The software-defined industrial control system is a huge opportunity for open source technologies.

Citrix News
disable
DaaS Or VDI: Which Is Best For Your Organization?
Citrix News, August 8th, 2022

Organizations everywhere are trying to decide between desktops as a service (DaaS) and virtual desktop infrastructure (VDI).

Seven Principles Of The Zero Trust Security Model
Citrix News, August 11th, 2022

The reality of today's fast-paced, increasingly remote work environment positions your business as vulnerable to security breaches.

ShareFile Product Highlights: Improvements To Sharing Flow And Experience
Citrix News, August 8th, 2022

Citrix ShareFile is all about sharing and collaborating on content. To that end, ShareFile is making the sharing experience and flow even easier, allowing you to share the way you want, with whom you want, faster than ever.

Your Guide To Citrix Graphics Workload Deployments With Citrix HDX 3D Pro
Citrix News, August 9th, 2022

Over the last year, I've worked with customers to deploy and tune 3D graphics Citrix workloads leveraging graphics processing units (GPUs).

Sections in this issue:
click to jump to section