IT News and Events
Nov 28th, 2022 — Dec 4th, 2022 Generate the Custom HTML Email for this Issue
IT News and Events IT News and Events
Volume 296, Issue 5 << Previous Issue
Cisco News
Cisco Appdynamics Launches Business Transaction Insights In Appdynamics Cloud For Observability Of Cloud-Native Applications On AWS
Cisco AppDynamics has launched new AppDynamics Cloud capabilities that allow organizations to achieve observability over cloud-native applications correlated to business context across the entire IT estate.
Cisco AppDynamics announced today major updates to its cloud-native observability solution AppDynamics Cloud. Business transaction insights combines business transaction monitoring with AppDynamics Cloud's continuous-context experience. This allows organizations to expand observability over cloud-native applications correlated with business context across their Amazon Web Services (AWS) environment and beyond. The AIOps-derived insights enable teams to observe applications the same way customers and end users experience them and quickly take action to optimize performance and remediate issues in near real-time.
Cisco News, November 29th, 2022
(Get More Information . .) open to premium members only

Cisco SD-WAN Multi-Region Fabric Unites Distributed Enterprises
Cisco SD-WAN Multi-Region Fabric (MRF) is designed to help IT build, deploy, and manage geographically distributed SD-WAN networks that provide resiliency, redundancy, security, and control.
SD-WAN Multi-Region Fabric continues Cisco's commitment to bringing networking infrastructure innovations that enable IT to support business-critical connectivity projects in a world of increasingly distributed people, applications, and compute resources.

Implementing an SD-WAN MRF also provides the ability for enterprise IT to select multiple premium transport providers for inter-region connectivity based on performance and cost. The premium transports can be mixed with best-effort public transport over the Internet to provide flexibility in reducing transport costs while ensuring that business-critical applications can use SLA-guaranteed premium transports as needed.

Cisco News, December 2nd, 2022
(Get More Information . .) open to premium members only

Four Best Practices When Migrating to SAP S/4HANA in the Cloud
Many SAP customers are migrating their business process workloads and applications to SAP S/4HANA running in the cloud.
This is no wonder, considering the cloud's numerous benefits along with standard SAP support for ECC ending in 2027. This journey can include first conducting a 'lift & shift' of current SAP environments to the cloud and then upgrading to S/4HANA.

Especially for very large SAP customers, migrating to the cloud is a multi-year process likely involving dozens to hundreds of projects. For example, 3M began a migration to S/4HANA and AWS in 2018 and currently estimates that they will complete the journey in 2025.

Cisco News, December 2nd, 2022
(Get More Information . .) open to premium members only

SD-WAN For Utility Operational Use? Are You Sure?
Enterprises have widely deployed Software Defined WAN (SDWAN) over the past 10 years.
The solution delivers assurance for applications, both in the cloud and in the data center, especially for remote users. The migration of many enterprise applications to the cloud during the pandemic has further driven the use of SDWAN. But does it offer any real benefits for utilities? Can it help utilities with deploying WAN connectivity to substations and distributed renewable energy sites? The answer is definitely Yes! And SDWAN can even provide benefits to simplify and streamline the provisioning of WAN infrastructure to these remote operational sites.
Cisco News, December 1st, 2022
(Get More Information . .) open to premium members only

IT News - CxO
Top 7 Digital Transformation Trends To Drive Efficient Growth In 2023
A couple of years ago, the pandemic drove an urgent acceleration in digital transformation initiatives.
It pushed companies (of all sizes) to invest in advanced technologies to survive in the new normal. However, those investments were not just a few blips on the radar. The ensuing economic uncertainty, combined with changing customer needs, has led enterprises to double down on their efforts - with a renewed focus on operational efficiency, productivity and resilience.

As this trend continues, Salesforce-owned Mulesoft has identified seven digital transformation aspects that will be key to overcoming operational pressures and driving efficient and sustainable growth in 2023.

VentureBeat, November 21st, 2022
(Get More Information . .) open to premium members only

CIOs Beware: IT Teams Are Changing
As IT roles become more strategic and pivotal to organizational success, how should CIOs adapt? Consider this expert leadership advice
The pandemic accelerated a trend that CIOs long knew was coming: Technology is the linchpin of a successful organization, and it is the IT team's responsibility to manage it effectively whether the landscape is in-office, hybrid, or remote. As with any evolution, traditional IT functions such as answering support tickets, patchworking systems, and making ad hoc changes to end-user software are no longer the primary focus of their roles.
The Enterprisers Project, November 25th, 2022
(Get More Information . .) open to premium members only

IDC Futurescape: Top 10 Predictions For The Future Of Customer Experience
As we move beyond COVID-driven restrictions, IDC's Future of Customer Experience predictions for 2023 reflect how B2B and B2C businesses must confront a new set of macroeconomic challenges - inflation, global economic instability, and flattening customer growth - while still navigating new hybrid work and organizational leadership models.
Customers are demanding greater value, more memorable and immersive experiences, and greater control over how they engage with enterprises, becoming equal stakeholders in the customer experience (CX) ecosystem.

Going forward, customer-centric business resilience will require enterprises to move beyond transactional-level experiences and tie business outcomes to relationship-based experiences that will be fulfilled by delivering customer value and trusted customer outcomes. Building and scaling these desired outcomes will require CX executives to leverage strong technology foundations comprising customer data, artificial intelligence and machine learning (AI/ML), and zero trust architectures.

IDC, November 23rd, 2022
(Get More Information . .) open to premium members only

Digital Transformation: 5 Ways To Build Technical Talent
Attracting and retaining IT talent will set your organization up for success. Consider this expert advice
Many organizations are determining how to strengthen their teams amid economic uncertainty and skills shortages. Building technical talent is key to helping teams withstand the challenges of undergoing digital transformation.

Your approach can differentiate your organization and set it up for success. Whether you're focusing inward or hiring, what matters is a well-defined strategy to help make informed decisions with a positive long-term impact.

The Enterprisers Project, November 22nd, 2022
(Get More Information . .) open to premium members only

The Future Of IT: Decentralization And Collaboration
As more organizations move toward a hybrid IT model, collaboration between IT and non-IT employees is paramount. Consider this expert advice
Last year, MIT researcher Joe Peppard penned a contentious Wall Street Journal op-ed suggesting that organizations eliminate their IT departments. He explains that the IT department started as a relatively autonomous entity, existing primarily to keep corporate systems functioning and networks secure.

Today, Peppard posits, and I agree, that the digital-first landscape calls for a more pervasive, porous IT department - with tentacles throughout the org chart.

That said, I disagree with Peppard's notion that the centralized IT department is obsolete. The IT department shouldn't be dismantled; it should evolve into a hybrid model - like cloud deployment models - that fits specific business needs.

The Enterprisers Project, November 22nd, 2022
(Get More Information . .) open to premium members only

CTOs Find Faith in Evolution of IT, but Compatibility Struggles Persist
To best support the "New IT," CTOs must choose the right tech to create value, but they are finding compatibility to be a pain point.
The shift to a hybrid work environment is elevating the importance of elements of IT architecture, with chief technology officers (CTOs) noting the importance of cloud software and computing for the future of hybrid work.

These were among the findings of a Lenovo survey of more than 500 CTOs, who generally have a positive perspective on their organization's technology architecture - 43% called it "improved" and 39% said it is "easy to use."

ITProToday, November 20th, 2022
(Get More Information . .) open to premium members only

Moving On From The Mainframe To Cloud
Should CIOs start getting serious about divesting their big iron estates and prepare for a journey to the cloud?
In July, package delivery giant FedEx announced plans to shut down the last 20% of its mainframes by 2024, relying instead on its cloud-native architecture to run operations.

FedEx CIO Rob Carter said the company's aim is to transition to a "zero data center, zero mainframe" environment, the culmination of a decadelong plan to move away from the mainframe.

ITProToday, November 22nd, 2022
(Get More Information . .) open to premium members only

IT News - MFA
MFA Fatigue: Rethinking How Enterprises Authenticate
Not all forms of multi-factor authentication (MFA) are created equal and the forms that are based on one-time passcodes have turned into corporate liabilities.
One-time passcodes that are entered into malicious login pages or entered into a compromised endpoint can be harvested by an attacker and utilized to log in along with a harvested username and password.

In the case of the massive Uber breach in September, the attacker, after harvesting a username and password, utilized a form of MFA 'exhaustion attack' which means that the legitimate user is challenged over and over for a one-time passcode when the attacker attempts a login, finally entering the code to simply stop the barrage of authentication challenges which take the form of 'push notifications' usually to a mobile device.

Security Boulevard, November 21st, 2022
(Get More Information . .) open to premium members only

IT News - Storage
Distributed File System (DFS)
A distributed file system (DFS) is a file system that enables clients to access file storage from multiple hosts through a computer network as if the user was accessing local storage.
Files are spread across multiple storage servers and in multiple locations, which enables users to share data and storage resources. A DFS can be designed so geographically distributed users, such as remote workers and distributed teams, can access and share files remotely as if they were stored locally.

How a DFS works

A DFS clusters together multiple storage nodes and logically distributes data sets across multiple nodes that each have their own computing power and storage. The data on a DFS can reside on various types of storage devices, such as solid-state drives and hard disk drives.

SearchStorage, November 22nd, 2022
(Get More Information . .) open to premium members only

A Look At The Top Storage Virtualization Trends For 2023
In the past few years, data storage has moved from hardware to the cloud smoothly and rapidly.
And the latest storage virtualization trends hint at the fact that cloud storage will only get more sophisticated as we move forward.

As the world switched to remote working, organizations of all sizes turned to cloud storage as a flexible, secure, and cost-effective way to store their data.

Cybersecurity Ventures predicts that by 2025, the total global data storage will exceed 200 Zettabytes, out of which 100 Zettabytes of data will be stored in the cloud.

The storage virtualization service providers are gearing up to store this enormous amount of data in a secure and easily accessible manner.

The latest storage virtualization trends that I am discussing here are all hinting at some major changes in the data storage industry in the years to come., November 25th, 2022
(Get More Information . .) open to premium members only

What Is Storage Virtualization And How Is It Effective In Business Data Management?
Most businesses these days rely on data - it's used for everything from effective inventory management to personalizing customer interactions. But the more data you have, the more difficult and time consuming it is to manage.
That's where storage virtualization comes in, making it easier to archive and access your data as well as improving resource utilization and general efficiency.

In this post, we'll cover what storage virtualization means, and exactly how it can benefit your business., November 25th, 2022
(Get More Information . .) open to premium members only

IT News - AI
Major AI Trends For Traditional Enterprises In 2023
Post-pandemic, the demand for AI is surging, as many organizations ascertain the need for AI to keep pace with the current business landscape in the face of a looming recession.
AI can help enterprises improve business processes, increase speed and accuracy, and help make predictions to optimize their performance. In 2023, there will be many ways that enterprises can implement AI but for more traditional organizations, we suggest the following trends will play an important role. This includes the need for companies to get their data fabric in place before implementing AI, new and interesting ways to 'white-label' AI, and the need to develop a Center of Excellence to ensure the entire company is aligned with an AI strategy.
Dataversity, November 23rd, 2022
(Get More Information . .) open to premium members only

AI And The Need For Purpose-Built Cloud Infrastructure
Modern AI solutions augment human understanding, preferences, intent, and even spoken language
AI improves our knowledge and understanding by delivering faster, more informed insights that fuel transformation beyond anything previously imagined. The challenge of this rapid growth and transformation is that AI's demand for compute power is outpacing Moore's Law in computing advancements.

AI requires infrastructure that can meet the continually increasing compute power demands and specialized needs of AI applications and workloads, like natural language processing, robot-powered process automation, and machine learning and deep learning.

EnterpriseAI, November 25th, 2022
(Get More Information . .) open to premium members only

IT News - Security
Leveraging the NIST Cybersecurity Framework For Business
The NIST cybersecurity framework is a powerful tool to organize and improve your cybersecurity program.
Today many businesses see cybersecurity with a kind of laissez-faire attitude where they purchase few tools and assign some people to look after their overall IT department. The cybersecurity funding request has got a pushback due to the SMB's limited resources. Around 32% of SMB security teams find budget their biggest hurdle on the path of following strict cybersecurity measures.
Security Boulevard, November 23rd, 2022
(Get More Information . .) open to premium members only

Deloitte Reveals 10 Strategic Cybersecurity Predictions For 2023
Cybersecurity isn't easy. Over the past few months, organizations including Uber, Cisco, Twilio and Rockstar Games have all fallen victim to data breaches as a result of cyber attacks.
Recently, some of Deloitte's leading analysts spoke with VentureBeat to share their top strategic cybersecurity predictions for 2023.

Deloitte's analysts reveal a range of predictions, including the importance cybersecurity and future-forward readiness and organizational resilience will play in helping enterprises to better control their exposure to threat actors in future.

Below is an edited transcript of their responses.

VentureBeat, November 21st, 2022
(Get More Information . .) open to premium members only

4 Critical Proactive Cybersecurity Measures You Need In 2023
Would you rather deal with the aftermath of a raging fire in your business, or install fire extinguishers and a sprinkler system?
The choice is obvious: The proactive measure is by far the better option of the two. You should take this same approach to your cybersecurity efforts.

In the face of a cybersecurity event, your organization could face challenges like lost profits, lost customer trust, and lost resources. A recovery plan is needed in the event of a breach, but you should also be enacting proactive cybersecurity measures to prevent a breach from occurring in the first place.

Security Boulevard, November 22nd, 2022
(Get More Information . .) open to premium members only

From Edge To Core: Security In The Data Center
Most organizations recognize the data center as the most essential and critical element of the network.
After all, it serves as the repository for sensitive data that allows business functions to operate. However, maintaining the overall security of data centers is a complex problem with no one-size-fits-all solution. Compounding the issue is the distributed architecture of most data centers today - facilities might be in-house, in the cloud, at a rented colo site, in a company-owned remote data center or any combination thereof.
Cyber Defense Magazine, November 23rd, 2022
(Get More Information . .) open to premium members only

Creating A Culture Of Security Awareness Training
As part of Solutions Review's Premium Content Series-a collection of contributed columns written by industry experts in maturing software categories- Mike Fleck of Cyren examines three keys to building a business culture with security awareness at the center.
Security Awareness Training (SAT) has long been a fundamental part of an organization's security program. Undoubtedly, employees are a massive target and a critical line of defense when it comes to effective cybersecurity practices. If your workforce isn't aware of their security responsibilities, there will always be a vulnerability within your security infrastructure.

Even though organizations in recent years have significantly invested in SAT, it's still not having the desired impact on their overall security posture. In fact, account takeover is still the origin of most breaches, resulting in rising phishing attacks every year since 2017. Clearly, the current approaches to SAT aren't enough to keep attacks at bay, let alone reduce them. It's time organizations re-evaluate their awareness training strategy and transition towards building a sustainable culture of effective security awareness.

Solutions Review, November 21st, 2022
(Get More Information . .) open to premium members only

Cybersecurity In 2023: Five Predictions Revealed
With the end of 2022 fast approaching, Forescout's research team, Vedere Labs, has looked ahead to what the cybersecurity landscape will look like next year.
Here are the top five predictions for 2023:

  • Ransomware groups will expand into more IoT devices and continue evolving their extortion campaigns
  • Hacking groups that appeared or became more active during the war in Ukraine will continue to act, regardless of what happens with the war
  • State-sponsored actors will continue to expand their arsenal with new sophisticated malware
  • Medical device cybersecurity challenges will persist
  • Attacks on critical infrastructure will continue to increase

vDaniel dos Santos is Head of Security Research at Vedere Labs.

TechNative, November 24th, 2022
(Get More Information . .) open to premium members only

IT News - Linux
Windows Subsytem For Linux Is Now Available For Everyone
WSL is now available in the Microsoft Store for Windows 10 and 11 Linux fans
Microsoft has announced the general availability of the Windows Subsystem for Linux (WSL), which is now available in its full form in the Microsoft Store.

Previously available in Preview form, WSL allows developers using their favourite laptop for programming to run a GNU/Linux environment without the overheads of a traditional virtual machine or dualboot setup, according to Microsoft.

"Our goal is to move as many people as we can to use the Store version of WSL, as it gives the best experience with the latest features," Windows Developer Platform Program Manager Craig Loewen wrote in a blog post(opens in new tab) announcing the news., November 23rd, 2022
(Get More Information . .) open to premium members only

IT News - HPC
@HPCpodcast-44: SC22 Postview
In this SC22 postview, we go over what happened at the show in Dallas
Topics include: the energy and attendance at the show, liquid cooling, PCIe, CXL, AI Chips, Open Standards, Storage, Future of Supercomputing, global players, and yes, where SC23 will be held and what its tagline is!


OrionX, November 23rd, 2022
(Get More Information . .) open to premium members only

IT News - Cloud
Sealing Off Your Cloud's Blast Radius
Migrating to the cloud? Cloud security requires a shift in mindset from traditional on-premises security.
Implementing relevant principles and practices, like for permissions management, can mitigate vulnerabilities and significantly reduce the blast radius of an attack. In this blog post, we dive into the differences between on-premises and cloud security, outline the main challenges in securing the cloud and provide solutions for security teams to implement.

This blog post is based on a discussion between Rafal Los, of the 'Down the Security Rabbithole' podcast and Arick Goomanovsky, Ermetic CBO and co-founder, on the topic of the biggest risk in cloud infrastructure.

Security Boulevard, November 23rd, 2022
(Get More Information . .) open to premium members only

Gartner Highlights 10 Common Cloud Strategy Mistakes
Cloud Strategy Must Coexist with Other Strategic Efforts
A cloud strategy is a concise viewpoint on the role of cloud computing in the organization. However, business and IT leaders continue to make 10 common mistakes when crafting their cloud strategy, according to Gartner, Inc.

'A good cloud strategy should be a short and consumable document, consisting of 10 to 20 pages or slides,' said Marco Meinardi, Vice President Analyst at Gartner. 'In addition, the business strategy should drive the cloud strategy and provide guidance to those who will implement it. It must coexist with other strategic efforts, not try to redo them.'

Gartner, November 22nd, 2022
(Get More Information . .) open to premium members only

Cloud Security Is Hard Because Multi-Cloud Is Complex
In today's multi-cloud world, security-as-a-service is growing as a strategic means of standardizing security practices that span all applications, no matter where they are deployed.
A recent report from Venafi found that 80% of companies have experienced a security incident in the cloud over the past year. Many other reports will also sound the alarm about API security incidents, the use of stolen credentials to gain unauthorized access, and the unfortunate successful rate of phishing attacks.

The state of security is, to be frank, a constant nearly Sisyphean battle uphill while the sword of Damocles continues to swing overhead. Too many Greek mythology references? Yeah, probably.

NETWORKComputing, November 23rd, 2022
(Get More Information . .) open to premium members only

Breaking Analysis: Re:Invent 2022 Marks The Next Chapter In Data & Cloud
The ascendency of AWS under the leadership of Andy Jassy was marked by a tsunami of data and corresponding cloud services to leverage data.
Those services mainly came in the form of primitives - i.e. basic building blocks that were used by developers to create more sophisticated capabilities.

AWS in the 2020s, led by CEO Adam Selipsky, will be marked by four high level trends in our view:

1) A rush of data that will dwarf anything previously seen;

2) Doubling down on investments in the basic elements of cloud - compute, storage, database, security, etc;

3) Greater emphasis on end-to-end integration of AWS services to make data accessible to more professionals and further accelerate cloud adoption; and

4) Significantly deeper business integration of cloud, beyond IT, as an underlying element of organizational transformation.

Wikibon, November 26th, 2022
(Get More Information . .) open to premium members only

IT News - DR
Resilient Companies Have A Disaster Recovery Plan
Historically, disaster recovery (DR) planning focused on protection against unlikely events such as fires, floods and natural disasters.
Some companies mistakenly view DR as an insurance policy for which the likelihood of a claim is low. With the current financial and economic pressures, cutting or underfunding DR planning is a tempting prospect for many organizations. That impulse could be costly.

Unfortunately, many companies have adopted newer technology delivery models without DR in mind, such as Cloud Infrastructure-as-a-Service (IaaS), Software-as-a-Service (SaaS) applications and managed infrastructure services. As a result, the lack of a formal DR program with an emphasis on the human side of recovery, updated documentation, planning for relevant scenarios and effective management of a disaster response is a risk for any organization

Security Intelligence, November 21st, 2022
(Get More Information . .) open to premium members only

IT News - Networks
Why Organisations Must Adopt Wi-Fi 6 Now
Organisations have had to undergo a tremendous digital evolution in a short number of years - some quickly, others with greater reluctance.
However, the past three years in particular have shown that the pace of change required for everyone has gone into hyper speed.

No one could have foreseen the global and granular changes to everyday life brought on by the pandemic. Even two-and-a-bit years on, it is still difficult to correctly predict the longer-term impact that it will have on everyone's life and work., November 21st, 2022
(Get More Information . .) open to premium members only

10 Most Powerful Network Management Companies
Innovative vendors have expanded beyond monitoring networks and are building full-stack, SaaS-based observability platforms.
Network management has never been easy, and the proliferation of IoT devices, the shift to remote work, and the migration of applications to multi-cloud environments have added new levels of complexity to enterprise networks.

IT execs are dealing with network management tool sprawl and employee skills gaps. They are also struggling to gain visibility across increasingly distributed networks, including SaaS instances that are not under their direct control.

NETWORKWORLD, November 25th, 2022
(Get More Information . .) open to premium members only

Top Network Segmentation Trends In 2022
Network segmentation is a security strategy based around dividing a large network into smaller sections, each one isolated from the other.
These distinct network segments are there to limit damage during a breach. If one fails and the bad actors enter, the theory is that the remainder of the network will stand strong.

It is a good strategy, but it may not be infallible. The segments are there to limit damage during a breach. If one is penetrated, the others remain afloat - unless the equivalent of a cyber-iceberg is unleashed.

At the moment, cybercriminals gaining enter to one segment can cause damage there. But they are learning ways to infiltrate the other segments once they have established a beachhead in the initial segment. Still, segmentation is an important safeguard and will at least slow the bad actors down considerably, perhaps giving security enough time to prevent further encroachment once the initial breach is uncovered.

Datamation, November 20th, 2022
(Get More Information . .) open to premium members only

IT News - Virtualization
Virtualbox 7.0.4 Released With Initial Support For Rhel 8.7 And Sles 15.4 Kernels
Oracle released today VirtualBox 7.0.4 as the second maintenance update to the latest and greatest VirtualBox 7.0 series for this open-source, cross-platform, and free virtualization software.
VirtualBox 7.0.4 comes only a month after VirtualBox 7.0.2, which added initial support for the upcoming Linux 6.1 kernel series, and introduces initial support for the kernel versions used in the recently released Red Hat Enterprise Linux 8.7, AlmaLinux 8.7, Red Hat Enterprise Linux 9.2, CentOS Stream 9, and SUSE Linux Enterprise Server 15 SP4 operating systems.

The Linux Guest Additions have also been updated to fix the rebuild behavior of kernel modules on system shutdown and to fix progress indication during automatic installation of Linux Guest Additions. On top of that, the new VirtualBox release adds general improvements in startup scripts for both Linux hosts and guests.

9to5linux, November 21st, 2022
(Get More Information . .) open to premium members only

IT News - Compliance
The Role Of Compliance In Cybersecurity
Cybersecurity compliance is essential as it contributes to cyberspace safety in meaningful ways
Cybersecurity is a complicated yet essential system - one that needs clearly defined rules, limits, regulations, and guidelines. A strict framework is essential for cybersecurity practices to function and fulfill their objectives of making cyberspace safe for the users, organizations, businesses, etc. These regulations make cyberspace resilient, dependable, and cohesive through compliance.

Some choose to see compliance requirements as an obligation. But for most industry experts, compliance is the key to staying ahead of the game, preventing destabilizing attacks, and having the upper hand when navigating cyberspace and providing your clients with the cybersecurity they deserve. Before we dive into a detailed look at the role of compliance, let us define what compliance means in cybersecurity.

Cyber Defense Magazine, November 23rd, 2022
(Get More Information . .) open to premium members only

IT News - Email
Proton Mail And Calendar Are Getting Even Better
Proton's privacy and security-focused products are awesome. And if you use Proton Mail and/or Proton Calendar, they're about to get way better, as Proton has announced a handful of new features for both of those services.
There are six new features coming to ProtonMail, including schedule send, which lets you schedule delivery of emails at specific times and tracking protections to cut down on email trackers, keep senders from knowing when you opened an email, and more. You'll be able to set reminders to check and reply to emails, keep them categorized, and search for message content.

Proton has been slowly merging all of its services together with similar branding and features, and more of that is on the way. The company said in its blog post, 'one of our goals for 2023 is to build stronger cross-product integrations within the Proton ecosystem. '.'

How-To Geek, November 25th, 2022
(Get More Information . .) open to premium members only

Email Security As A Service
Email security is one of the most important aspects of any business.
Why? Because email is the go-to method of communication for scheduling meetings, sending internal team memos, and conversing with clients.

Email and business go together like peanut butter and jelly - steadily increasing the number of emails sent and received globally since 2017.

And there's no slowing down, with models predicting 376.4 billion daily emails worldwide by 2025.

More often than not, your team is sharing sensitive data or proprietary company information that should never see the light of day outside of your inbox.

Security Boulevard, November 23rd, 2022
(Get More Information . .) open to premium members only

IT News - Tape
The Slow Mo Guys Choose Symply LTO-9 Solutions to Store 810TB
Channel that Gavin Free started in 2010 has had 2.4 billion views and now over 14.6 million subscribers.
If you've managed to navigate YouTube over the past decade without watching at least one of the many fantastically fun (and very informative) films by The Slow Mo Guys then you're in limited company. The channel that Gavin Free started in 2010 has had almost 2.4 billion views and now has over 14.6 million subscribers.

Gavin started out in the industry as a Digital Imaging Technician (DIT) before specializing in the use of high-speed Phantom cameras. He later enlisted the assistance of fellow slow mo fanatic Dan Gruchy and The Slow Mo Guys were born, November 22nd, 2022
(Get More Information . .) open to premium members only

IT News - Developer
Rust Tutorial: Get Started With The Rust Language
Here's how to get your feet wet with Rust, from using Rust's toolchain to creating projects, working with third-party code, managing libraries, and more.
Over the last few years, Rust has evolved from a curiosity brewed up in a Mozilla employee's lab to a strong contender for the next generation of native applications and bare-metal solutions. Those advances come from Rust providing its own toolchain and component management system-along with certain popular features and quirks.

This article is for developers new to Rust, or considering it for future projects. We'll walk through setting up a working environment in Rust, configuring an IDE, and making the most of Rust's excellent application development toolset.

InfoWorld, November 21st, 2022
(Get More Information . .) open to premium members only

Best IDEs (Code Editors) for Linux
Recently, most developers prefer to use Linux as their alternative or even primary OS because Linux provides a secure environment, a plethora of customization options, reliability, and a stable environment.
Arguably, Linux is the best open-source operating system which provides a safer and more reliable environment as compared to other operating systems, like Windows.

If you're a developer and you're using Linux, you'll need an IDE (Integrated Development Environment).

Just like any other operating system, Linux has a ton of IDEs for developers. Since the introduction of IDEs, developers can now develop brilliant software with numerous features and tools installed in the various IDEs themselves that help their workflow.

LinuxStans, November 26th, 2022
(Get More Information . .) open to premium members only

Sections in this issue:
click to jump to section