IT News and Events
Jun 20th, 2022 — Jun 26th, 2022 Generate the Custom HTML Email for this Issue
IT News and Events IT News and Events
Volume 291, Issue 4 << Previous Issue
Cisco News
disable
Best-In-Class Learning Experiences: Combining Human And Digital Elements For Maximum Impact
The recent global pandemic and current global events, coupled with the escalating nature of digital revolution, have affected not only our working habits but also how we learn - making it increasingly difficult to deliver training that will stick. We are overwhelmed, distracted, and impatient. Flexibility in where and how we learn is increasingly important.
In Cisco Sales & Partner Global Operations, our mission is to accelerate partner transformation by driving operational readiness, productivity, effectiveness, and experience at scale. When our partners are successful, everyone wins. Delivering operational information in an easy and impactful way is key to helping them be the best at what they do, especially during times of continual change.

Our formula to INFORM, EDUCATE and ENGAGE partners has proven to be successful over the years, however it was time for us to reimagine this space to increase agility, effectiveness, and speed in delivering right information to the right audience at the right time.

Our Partner Readiness Hub's new approach to learning focuses on combining the best of human and digital elements to provide the most effective educational experience possible, while also keeping our partners engaged.

Cisco News, June 24th, 2022
(Get More Information . .) open to premium members only

Meet Rapidly Scaling Cloud Data Center Requirements with SONiC
Much like our blue furry anthropomorphic hedgehog friend who can run supersonic speeds, our networks today need to be fast and agile. Enter SONiC (Software for Open Networking in the Cloud).
In the last few years SONiC has gained strong momentum in the community, and has been battle tested within some of the world's largest and most demanding cloud networks.

SONiC is a powerful combination of scale and open source

SONiC is a free and open-source network operating system (based on Debian Linux and developed by Microsoft and the Open Compute Project) that runs on network devices such as routers and switches from multiple vendors and ASICs. A key component of SONiC is the Switch Abstraction Interface (SAI) that enables ASIC and hardware abstraction and network operating systems portability.

Cisco News, June 23rd, 2022
(Get More Information . .) open to premium members only

Per Mar Security Remains Resilient As Threats Evolve
As an early adopter of Cisco Secure Endpoint, Per Mar Security Services has seen the product evolve alongside the threat landscape.
According to Dan Turner, CIO at Per Mar, the evolution of the Cisco security portfolio has helped the company remain cyber resilient during the pandemic and beyond.

We recently spoke with Turner to discuss how Per Mar uses Cisco technology to rapidly detect and mitigate threats, while still enabling employees to work from wherever they need to - whether it's a conference, job site, or home office.

Safeguarding future success

Per Mar Security provides physical security services to both homes and businesses, protecting roughly 75,000 customers across 16 U.S. states. The company began using Cisco Secure Endpoint almost a decade ago to defend against attacks on its various devices. Today, it's the main point of defense in making sure the company's endpoints are safe. Cisco Secure Endpoint integrates with the other security products in Per Mar's environment via Cisco SecureX.

Cisco News, June 22nd, 2022
(Get More Information . .) open to premium members only

Today's High Speed Optical Links Would Fail If Not For This Technology (Part 1)
In part one of this two-part blog post, we review the basics of forward-error correction (FEC). In part two, we will discuss implementation and the impact of FEC on performance.
Today's insatiable demand for bandwidth is pushing network speeds higher and higher. Unfortunately, the faster the data rate, the greater the likelihood of transmission errors. As a result, forward-error correction (FEC) has become an essential tool for almost any network implementation, particularly those operating at 100G and above. FEC uses a combination of specialized algorithms and redundant data bits to detect and correct a certain number of errored bits in each data block. To learn more about the specifics, read on.
Cisco News, June 21st, 2022
(Get More Information . .) open to premium members only

IT News - CxO
disable
9 Top CIO Trends And Priorities For 2022
CIOs face a tough challenge in 2022 as they balance the need for technology investment and growth amid a growing call for fiscal prudence in uncertain economic conditions.
George Lawton writes in SearchCIO, "Enterprises worldwide are making massive changes to their business operations and in how they provision new services and customers as they continue to adapt to the fallout from the COVID-19 pandemic.

Meanwhile, recent market shifts are sharpening companies' focus on the bottom line and on delivering practical value rather than just growing the customer base.

As a result, CIOs find themselves having to balance two sometimes competing needs in 2022: supporting new services to gain a competitive advantage and cutting costs..."

SearchCIO, June 15th, 2022
(Get More Information . .) open to premium members only

3 Ideas CIOs Can Use For Better Disruption Planning
Discover how a focus on three areas -- cybersecurity, employee experience and proactive management -- can help CIOs plan for and better manage disruptions.
"Few CIOs today can escape disruption completely but focusing on critical issues can help them better manage it," writes Guilliean Pacheco in SearchCIO.

"That was one of the takeaways shared during the "Planning for the Unknown Unknowns" panel at the MIT Sloan CIO Symposium in Cambridge, Mass., on May 23. The panelists saw opportunities for innovation at almost every level in their organizations. Their reflections may provide insight other IT leaders can use to build a resilient framework and support rapid and unexpected changes.

Here are three ideas CIOs can use for better disruption planning..."

SearchCIO, June 17th, 2022
(Get More Information . .) open to premium members only

Gartner Says The Pandemic Has Reduced Compliance Reporting 30%
Fewer Observe Misconduct Since the Pandemic and a Lower Proportion Report it
The rate of compliance reporting has dropped by 30% from before the pandemic, according to Gartner, Inc. Employees are both less likely to observe misconduct and less likely to report it when observed.

'The increase in remote and hybrid working practices has reduced the amount of misconduct and the potential to observe it,' said Chris Audet, senior director, research in the Gartner Legal, Risk & Compliance practice. 'However, what we see in the data is more complex: misconduct such as gifts and entertainment, and travel abuse is falling, but things such as intimidation and unwanted behavior are on the rise.'

Gartner, June 15th, 2022
(Get More Information . .) open to premium members only

Vulnerability Management Mistakes CISOs Still Make
Cybersecurity has become a major topic of discussion in the business world. The rising frequency of cyberattacks-combined with several high-profile breaches in the past few years-has put the spotlight on the impact a successful attack can have.
"Despite growing awareness, many businesses still don't have basic cybersecurity policies in place, putting them at greater risk of a data breach or other kind of successful attack," notes Shannon Flynn in CIOinsigjht.

"These are some of the most critical considerations for enterprise network security. Considering these tips when developing a business security policy can help managers and leaders build strong cyber defenses..."

CIOinsigjht, June 15th, 2022
(Get More Information . .) open to premium members only

CIO Interview: Morten Holm Christiansen, Haldor Topsoe
There's no point digitising if there is no benefit to the customer, says the Danish chemicals giant's head of IT
Karl Flinders writes in computerwekly, "After successfully creating commercial value through digitisation at some major Nordic companies, Morten Holm Christiansen has been tasked with doing the same at Danish chemical industry giant Halder Topsoe.

Having joined the company in November 2021, Christiansen is directing Copenhagen-headquartered Topsoe's digital transformation at a time when the company is also going through a major business change.

For more than 80 years, Topsoe has provided the energy industry with the catalyst technology used to refine fossil fuels. This includes providing catalyst technology, the substances that make chemical processes work much faster during refining, and designing the processing facilities..."

computerwekly, June 14th, 2022
(Get More Information . .) open to premium members only

CISOs Gain False Confidence In The Calm After The Storm Of The Pandemic
While CISOs may feel more confident in their security posture emerging from the pandemic, new research suggests that doesn't mean organizations are better prepared for large-scale attacks.
"Cybercrime reached heightened levels of intensity and sophistication in the past year," opines Lucia Milic&#259; in DARKReading

"We saw greater complexity in ransomware, supply chain, and critical infrastructure attacks. Despite the threat escalation, CISOs feel more confident in their security posture. But does that feeling of confidence actually translate into organizations being better prepared for large-scale attacks? New research suggests that is not the case..."

DARKReading, June 16th, 2022
(Get More Information . .) open to premium members only

IT News - Storage
disable
Data Gravity: What Is It And How To Manage It
Data gravity can attract increasing amounts of data, and brings with it onerous management overheads. We look at how to mitigate data gravity in datacentre and cloud
Stephen Pritchard writes in ComputerWeekly, "When it comes to enterprise applications, access to data - and lots of it - is usually a good thing. And the greater the volume of required data held locally to where it is processed, the better for the business, its applications, decision-making and, in some cases, compliance.

But the need to store and manage data brings its own problems too, including higher costs, lower system performance, and management overheads. Here we are dealing with the idea of data gravity.

There is growing evidence that data-rich systems attract more data. This, in turn, attracts even more data-dependent applications, which then bring in yet more..."

ComputerWeekly, June 17th, 2022
(Get More Information . .) open to premium members only

Destination 30 TB: HDD Vendors Plan Different Routes To Hit Storage Milestone In 2023
20TB hard disk drives are soon going to be forgotten because 30TB models are on their way
Top HDD manufacturers including Seagate and Western Digital are on track to roll out their own line ups of 30TB hard drives by 2024. Capacity increase has been an ask among hard drive users for several years now and a handful of companies have been working on it a while now. Recently, Toshiba, Seagate and WD together with their partners made announcements about their roadmaps to build 30TB HDDs.
Gestalt IT, June 13th, 2022
(Get More Information . .) open to premium members only

IT News - AI
disable
Ethical AI Lapses Happen When No One Is Watching
Just because you may not see errors on the part of artificial intelligence doesn't mean that things are fine. It's up to humans to look for ethical or other issues.
"Transparency often plays a key role in ethical business dilemmas," writes Jeff DeVerter in InformationWeek, "the more information we have, the easier it is to determine what are acceptable and unacceptable outcomes. If financials are misaligned, who made an accounting error? If data is breached, who was responsible for securing it and were they acting properly?

But what happens when we look for a clear source of an error or problem and there's no human to be found? That's where artificial intelligence presents unique ethical considerations..."

InformationWeek, June 16th, 2022
(Get More Information . .) open to premium members only

7 Ways To Bring AI To Cybersecurity
Academic researchers are developing projects to apply artificial intelligence to detect and stop cyberattacks and keep critical infrastructure secure, thanks to grants from the C3.ai Digital Transformation Institute.
"New ransomware variants and deceptive techniques such as living off the land and store now, decrypt later are sidestepping heuristic analysis and signature-based malware detection," writes Shannon Flynn in DARKReading.

"Behavior-based tools can compare network activity against an established norm and flag when they detect unusual and suspicious actions and patterns. Powered by artificial intelligence (AI) and machine learning (ML), such tools represent hope in a post-Colonial Pipeline world..."

DARKReading, June 15th, 2022
(Get More Information . .) open to premium members only

11 Deep Learning Software In 2022
Deep learning software is revolutionizing the technology space by bringing in more accuracy and speed for data processing and making predictions and classifications.
Amrita Pathak writes in Geekflare, "It uses the concept of AI and ML to help businesses, organizations, research facilities, and universities gain intelligence from data and use it to drive their innovations.

The reason it's evident in this modern era is that people find solutions to ease their lives and perform tasks faster. Also, automation is taking over the world.

That said, advanced products and services created using AI, Ml, and deep learning can fulfill this demand.

Deep learning is an excellent emerging technology that can transform your business by accelerating your data analysis and predictive intelligence.

In this article, we will explore the topic more and find the best deep learning software to include in your tool kit..."

Geekflare, June 15th, 2022
(Get More Information . .) open to premium members only

Best Machine Learning Platforms 2022
The term machine learning refers to a computational system that has the ability to ingest data, analyze it and spot patterns and trends.
Samuel Greengard writes in eWeek, ""Generally considered a subset of artificial intelligence (AI), machine learning (ML) systems generate algorithms based on a set of sample data and then deliver predictions, without being expressly programmed to do so. Moreover, these algorithms change and adapt as new data appears or conditions change.

This autonomous learning capability is at the center of today's enterprise. It's increasingly used to make important decisions and drive automation. Although ML is closely related to statistical analysis and data mining-and there are often overlaps across these disciplines-what sets ML apart is the ability to spot patterns, trends and properties that would otherwise go unnoticed or remain out of reach. Typically, ML typically focuses on known knowledge and ways to put it to use more effectively..."

eWeek, June 16th, 2022
(Get More Information . .) open to premium members only

IT News - Technology
disable
AT&T Breaks Major Fibre Speed Barrier
AT&T says 20Gbps services possible in the future
Steve McCaskill writes in techradar.pro. "US broadband operator AT&T has become the first in the industry to achieve a 20Gbps symmetrical speed on a production fibre network, claiming the milestone could mean even faster speeds for consumers and businesses in the near future.

The company achieved the transmission rate on 25GS-PON in its broadband lab in Austin, Texas and says the technology can work with its existing fibre network.

The company achieved 10Gbps in lab tests earlier this year and has a commercial 5Gbps 'Hyper Gig' broadband offering in the US..."

techradar.pro, June 13th, 2022
(Get More Information . .) open to premium members only

Intel Goes Bold With Meteor Lake CPUs That Could Take Down Apple's M2
Team Blue's new lithography seems to be yielding impressive results
"Intel has given us our first proper look at its 14th-generation desktop and mobile CPUs, codenamed 'Meteor Lake', reports Christian Guyton in techradar.pro, "which are due to launch in 2023. These will be the first processors to utilize the new 'Intel 4' process node, which is replacing the Intel 7 design used in the company's current CPUs.

Intel 4 is a 7nm process technology, while Intel 7 was 10nm (yes, we agree that the naming convention is silly). The exciting part is that Intel 4 will use a new type of processor lithography called 'advanced extreme ultraviolet' lithography, or EUV for short. This replaces the conventional deep-UV immersion lithography used in current processor production..."

techradar.pro, June 15th, 2022
(Get More Information . .) open to premium members only

High-Bandwidth Memory (HBM) Delivers Impressive Performance Gains
Chip-level design breakthrough provides bandwidth boost for supercomputers and artificial intelligence (AI) applications
Andy Patrizio writes in Networkworld, "IT vendors typically race to deliver incremental improvements to existing product lines, but occasionally a truly disruptive technology comes along. One of those disruptive technologies, which is beginning to find its way into enterprise data centers, is High-Bandwidth Memory (HBM).

HBM is significantly faster than incumbent memory chip technologies, uses less power and takes up less space. It is becoming particularly popular for resource-intensive applications such as high-performance computing (HPC) and artificial intelligence (AI)..."

Networkworld, June 16th, 2022
(Get More Information . .) open to premium members only

Will Optics Ever Replace Copper Interconnects? We Asked This Silicon Photonics Startup
Star Trek's glowing circuit boards may not be so crazy
Tobias Mann writes in The Register, "Science fiction is littered with fantastic visions of computing. One of the more pervasive is the idea that one day computers will run on light. After all, what's faster than the speed of light?

But it turns out Star Trek's glowing circuit boards might be closer to reality than you think, Ayar Labs CTO Mark Wade tells The Register. While fiber optic communications have been around for half a century, we've only recently started applying the technology at the board level. Despite this, Wade expects, within the next decade, optical waveguides will begin supplanting the copper traces on PCBs as shipments of optical I/O products take off..."

The Register, June 18th, 2022
(Get More Information . .) open to premium members only

IT News - Humor
disable
BOFH: Tech Helps HR Investigate The Boss's Devices
We're going to need a corkboard, push pins, red yarn and emails dating back to 2003
EPISODE 11 The Boss is - not to put too fine a spin on it - crapping himself.

Apparently, there's a rumour about some legal action in the wind and that the substance of his email conversations is now being asked about.

At the moment it's just some questions from HR, but who knows how far this could go?

". and so we will need to see the contents of his mailbox, including his sent, deleted and archived documents," the company's HR person tells me.

I can tell it's serious as one of the company's lawyers is pacing around in the background.

"So you want me to recover his deleted emails?" I ask.

"Yes."

The Register, June 17th, 2022
(Get More Information . .) open to premium members only

IT News - BI
disable
How Can CIOs Build Business Value With Business Analytics?
Business analytics has become invaluable for CIOs of companies that want to bolster their competitiveness in the new economy
Analytics is becoming more important than ever in the world of business. Over 70% of global businesses use some form of analytics. This figure will rise as globalization, supply chain challenges and other factors increase competitiveness.

This is an important year for enterprises keeping in view that most global industries are recovering from the pandemic horror, and the era of web 3.0 is at the doorstep. For both reasons, the role of CIOs has to embrace automation and analytical thinking in strategizing the organization's initiatives. Until now, they were proactively involved to maximize IT efficiencies and accelerate cost savings in general.

SmartDataCollective, June 15th, 2022
(Get More Information . .) open to premium members only

IT News - Operations
disable
A SaaS Evaluation Checklist To Choose The Right Provider
Replacing a legacy app with a SaaS alternative can be tedious. Create a checklist related to reliability, support and uptime to pick the right SaaS app and provider.
"Enterprise IT managers deal with a lot of legacy software," writes Steven S. Warren in SearchCloudComputing. "This software often runs on hardware that's no longer supported, risking downtime and tying up money in specialist contracts. It most likely also uses a specific programming language that makes it challenging to manage and maintain -- let alone improve.

Businesses know the time and money IT teams sink into these legacy software systems, but they're often afraid to switch to a cloud-hosted alternative. No one wants to get hacked or discover they have no support available during an outage..."

SearchCloudComputing, June 16th, 2022
(Get More Information . .) open to premium members only

The Challenges Of Managing Increased Complexity As Hybrid IT Accelerates
SolarWinds released the findings of its ninth annual IT Trends Report which examines the acceleration of digital transformation efforts and its impact on IT departments.
"The report found the acceleration of hybrid IT has increased network complexity for most organizations and caused several worrisome challenges for IT professionals.

Hybrid and remote work have amplified the impact of distributed and complex IT environments. Running workloads and applications across both cloud and on-premises infrastructure can be challenging, and many organizations are increasingly experiencing-and ultimately hindered by-these pain points..." - HelpNet Security

HelpNet Security, June 16th, 2022
(Get More Information . .) open to premium members only

IT News - Security
disable
7 Hottest Programming Languages Of 2022
Some of the programming languages on this list have been popular for quite a while; others are just beginning to win the favor of developers.
Christopher Tozzi writes in ITProToday, "But all are worth familiarizing yourself with.

What's the most important programming language to learn in 2022? That's an open question, but one way to answer it is to look at languages that are currently trending.

Some of them are well-established coding languages that have long been popular. Others are newer languages that are just now entering their heyday. Either way, they're languages worth familiarizing yourself with..."

ITProToday, June 15th, 2022
(Get More Information . .) open to premium members only

How To Build Cybersecurity Resilience
Cybersecurity has been changing rapidly over the past couple of years, due in no small part to the COVID-19 pandemic. In response, organizations have digitized at an unprecedented rate and, in the process, created new opportunities for cybersecurity shortfalls
A.N. Ananth writes in Security Boulevard, "Here are four trends that, in addition to the anticipated rise in ransomware, should affect how you practice cybersecurity and how you build resilience in your organization.

Work From Home, Remote Access and an Expanded Attack Surface

Around 62% of employees between the ages of 22 and 65 said they work remotely at least occasionally, according to research by Owl Labs. It's evident that remote work and remote access are here to stay. Now is the time to ask yourself whether you are adjusting your security strategy to match these workforce trends..."

Security Boulevard, June 16th, 2022
(Get More Information . .) open to premium members only

It's Time To Rethink Breach Management
By combining and automating all the elements required to handle a breach, it's possible to gain control over potentially devastating events.
Security breaches and breakdowns have become an unfortunate fact of life. With the average cost of a security breach reaching $4.24 million, it's critical to find ways to automate detection and ratchet up protection. What's more, any breach detection and remediation framework must support a growing array of regulatory obligations, such as GDPR, CCPA, HIPAA, PHI and PCI.
eWeek, June 17th, 2022
(Get More Information . .) open to premium members only

Once Is Never Enough: The Need For Continuous Penetration Testing
If you Google 'How often should I do penetration testing?', the first answer that pops up is 'once a year.'
Miri Adjiashvili opines in HelpNet Security, "Indeed, even industry-leading standards like PCI-DSS dictate that external penetration testing be conducted annually (or after significant changes to infrastructure or applications), while internal penetration testing takes place annually, with segmentation testing occurring every six months.

Yet today's cybercriminals don't work on annual schedules. They don't wait until pen testing time rolls around and the vulnerabilities found are rectified. They strike fast, they strike hard, and they use advanced AI-powered and automated tools to exploit vulnerabilities many organizations don't even know exist, let alone exist in their own networks..."

HelpNet Security, June 14th, 2022
(Get More Information . .) open to premium members only

12 Best Practices For Wireless Network Security
The importance of wireless network security cannot be understated. With the proliferation of mobile devices and the popularity of public Wi-Fi hotspots, the potential for data breaches and other cybersecurity threats has increased exponentially.
"While there are many different steps that can be taken to secure a wireless network," opines Anas Baig in Solutions Review, "these 12 best practices are essential for ensuring that your data and devices are safe from malicious actors.

1. Enabling Two-Factor Authentication (2FA)

Two-factor authentication adds an extra layer of security to the login process. It requires users to enter both a username and password, as well as a code that is generated by an authenticator app. This makes it more difficult for someone to gain unauthorized access to the network..."

Solutions Review, June 17th, 2022
(Get More Information . .) open to premium members only

If You Really Want To Improve Cyber Resilience Stop Letting Employees Create Their Own Passwords
A fundamental change of attitude to access credentials is required to give organizations a chance of regaining control over cyber security says Julia O'Toole, Founder and CEO of MyCena Security Solutions.
"In mid-March, the Cybersecurity and Infrastructure Security Agency (CISA) released a report highlighting how cyber actors routinely exploit poor security configurations, weak controls, and other poor cyber hygiene practices to gain access and compromise user systems. These included not enforcing multifactor authentication, primarily with remote desktop access, the use of vendor-supplied default login usernames and passwords, and the failure to detect and block phishing attempts.

CISA suggested that organizations can help strengthen their network defences against commonly exploited practices by adopting a zero-trust security model, which enables users to be assigned only the access rights required to perform their assigned tasks. Access control can limit the actions of malicious cyber actors and reduce the chance of user errors..."

Continuity Central, June 15th, 2022
(Get More Information . .) open to premium members only

IT News - Database
disable
The Future Of Database Management Systems
As the amount of data generated globally grows exponentially, data-driven businesses are increasingly turning to more innovative database management systems to store, manage, and process all that data.
This article provides an overview of database management, how it has evolved - especially during the COVID-19 pandemic - and the future of database management systems.

What Is a Database?

Before learning more about database management systems, it's essential to understand what a database is and how various kinds of databases are used.

Dataversity, June 16th, 2022
(Get More Information . .) open to premium members only

IT News - Networks
disable
3 SD-WAN Challenges And Solutions
Points to consider when selecting an SD-WAN solution include WAN/LAN branch architecture, deployment and service provisioning, and centralized management.
"Software-Defined Wide Area Networking (SD-WAN) uses the concept of Software Defined Networking (SDN) to distribute network traffic over a wide area network (WAN). SD-WAN automatically determines the most efficient way to route application traffic between branch offices and data centers based on pre-configured policies," writes Sagar Nangare in CIO.

"SD-WAN is managed by a central controller that sends policy information to all connected devices. The software allows network operations teams to remotely program network edge devices using zero-touch or low-touch provisioning. This minimizes, and in some cases eliminates, the need to manually configure routers in branch offices..."

CIO, June 14th, 2022
(Get More Information . .) open to premium members only

IT News - Careers
disable
3 Certification Tips For IT Leaders Looking To Get Ahead
CIOs share key best practices for IT leaders looking to level up with a mix of technical and business credentials aimed at growing their CIO role.
"With the technology landscape in constant flux, getting certified on the latest tools and techniques can be a valuable way to advance your career - even for IT leaders," opines CIO.

"Typically, CIOs consider certifications as a means for training up IT staff on vital skills around key initiatives such as cybersecurity, data analytics, AI, or the cloud. But certificates, even technical ones, can be an important part of any IT leader's career journey, giving them hands-on experience, strategic insights into emerging technologies and methodologies, and the possibility to grow their peer network..."

CIO, June 17th, 2022
(Get More Information . .) open to premium members only

Top 2022 IT Certifications To Advance Your Career
One tried and true way for IT professionals to differentiate themselves from the rest of the pack is to earn certifications in critical infrastructure technologies.
Salvatore Salamone writes in InformationWeek, "While opportunities abound in today's dynamic job market, the volume of competition for any given IT opening can be enormous. Job sites such as LinkedIn can be humbling. Who wants to be just in the top 20% of the 750 candidates that have already applied for a job? One tried and true way for IT professionals to differentiate themselves from the rest of the pack is to earn certifications in critical infrastructure technologies.

That point was hammered home in a recent 'Upskilling IT 2022' report by the DevOps Institute. 'IT professionals ultimately control and manage their own upskilling journeys - and recruiting trends show that building critical skill sets is a worthy personal investment,' said Jayne Groll, CEO of DevOps Institute..."

InformationWeek, June 17th, 2022
(Get More Information . .) open to premium members only

The 4-Day Workweek: 3 Things Development Team Leaders Should Prioritize Instead
A shorter workweek is not necessarily the key to reducing team stress. Consider addressing these underlying problems first
"The pandemic has forever changed the workplace, causing many in the tech industry to now question the traditional five-day workweek," writes Brett Stevens in The Enterprisers Project.

"One proposed solution is a four-day workweek, which some believe promises to redefine workplace productivity and employee happiness. Research shows those working four days per week report higher well-being, less burnout, and improved productivity.

But the four-day workweek is not a one-size-fits-all model, and adopting one could be detrimental to teams that overlook underlying issues in their workplace culture. In cases where teams experience high friction in their development processes, compressing the workweek and removing flexibility may exacerbate burnout..."

The Enterprisers Project, June 17th, 2022
(Get More Information . .) open to premium members only

Sections in this issue:
click to jump to section