IT News and Events
Nov 4th, 2019 — Nov 10th, 2019 Generate the Custom HTML Email for this Issue
IT News and Events IT News and Events
Volume 260, Issue 1 << Previous Issue | Next Issue >>
Cisco News
NTT East Expands Its Managed Services For Enterprises 'GigaRaku VPN' And 'GigaRaku Switch' With Cisco Meraki
Creating innovation for productivity improvement and reduction of operational burden
Cisco Systems G.K. today announced that NIPPON TELEGRAPH AND TELEPHONE EAST CORPORATION (hereinafter "NTT EAST") has selected the Cisco Meraki MX and MS series to deliver managed SD-WAN/connectivity services and managed LAN services, respectively to Enterprises. These new service offerings will be part of NTT EAST's SDx Service portfolio and will be available to customers as "GigaRaku VPN" and "GigaRaku Switch".
Cisco News, November 7th, 2019
(Get More Information . .) open to premium members only

Cisco's Game-Changing Collaboration Suite Gets Even Better With Single Platform Advantage, Great New Features And Devices Plus New Ways To Buy
Single Platform Advantage and unified modular app across call, message and meet lets CIOs leverage their existing on prem, cloud and hybrid investments and enable a modern workplace.
"At Cisco Partner Summit, Cisco has announced five major innovations to its Collaboration portfolio to help CIOs step up and speed up their workplace transformation. Most CIOs are deep in transforming their organizations but are facing huge challenges including having to make big changes while protecting their existing on-prem, cloud and hybrid collaboration investments.

In addition, CIOs are striving to provide a modern and unified experience for their employees across one single calling, messaging and meetings platform so they can improve employee productivity. With 95% of the Fortune 500 using Cisco's collaboration suite, Cisco is uniquely positioned to solve these issues and enable CIOs to deliver secure, easy-to-use and ultimately more engaging and energizing experiences for users anywhere, regardless of what devices they use..."

Cisco News, November 6th, 2019
(Get More Information . .) open to premium members only

Cisco Helps Partners Build Competitive Edge Around Software Development And Lifecycle Services
DevNet Goes Mainstream for Partners
"With CIOs increasingly focused on digital transformation, technology providers must evolve from selling products and features to delivering business outcomes. Software is at the core of this transformation, requiring new skills and competencies for partners. At its annual Partner Summit, Cisco today announced partner program innovations that give Cisco partners a competitive advantage, while enabling them to expand into profitable, new areas..."
Cisco News, November 5th, 2019
(Get More Information . .) open to premium members only

Cisco Doubles Down On Small Business Commitment
Cisco announcing commitment to the small business space
"At Cisco Partner Summit, Cisco announced a renewed commitment to Small Business by offering customers and partners a simple, secure and flexible portfolio, dedicated Cisco support, a multi-year awareness campaign and increased partner investments to capitalize on the small business opportunity.

Today, small business is big business! It represents millions of individual companies representing two-thirds of the global GDP. Now more than ever, small businesses are facing a pace of change unlike ever before. Small businesses must address an increasingly savvy customer base who expect digital experiences, amazing customer service and simple user interfaces. With the increased utilization of cloud and web-based applications, a strong and secure network is the essential life blood of any small business..."

Cisco News, November 6th, 2019
(Get More Information . .) open to premium members only

5 Questions With Cisco's CISO
Steve Martino is tasked with leading Cisco's security strategy, navigating risk in an environment where threats are ever-present and human error is assured
"There is no easy answer for securing a global workforce of 75,900 employees.

It's a challenge Cisco contends with daily, enabling a distributed remote workforce without compromising the integrity of a secure network.

CIO Dive spoke with Steve Martino, SVP and chief information security officer at Cisco, to learn more about security strategy as it has morphed into a service-based provider..."

CIODive, November 7th, 2019
(Get More Information . .) open to premium members only

IT News - CxO
10 Strategic Technology Trends For 2020
Here are the technology trends CIOs and IT leaders need to watch next year, according to Gartner
Jessica Davis writes in Information Week, "As the year 2019 gets closer to the end, we may look back at some of the hyped trends that didn't quite get over the hump this year like blockchain or AI in production at scale. But even as we look back at those slow-to-materialize mainstream trends, the time has arrived to think about the coming new year, 2020 and beyond. What major trends will shape the enterprise in the coming years? How will geopolitical factors, the economy, and looming concern about data privacy and security impact what we do in organization in 2020?..."
Information Week, November 1st, 2019
(Get More Information . .) open to premium members only

CIO Role: How The New Rules Of Competitive Advantage Empower CIOs
The CIO's role has fundamentally transformed from cost cutting and standardizing process to innovating
"It's time to help your organization study the new playbook on competitive advantage - and enjoy a refreshing change for CIOs," opines Mike Kelly in The Enterprisers Project.

"I've learned countless important lessons throughout my career as a CIO. But in recent years (and especially since becoming CIO of Red Hat, an open organization) I've been surprised at how much I've had to unlearn, too.

One of the most interesting things I've had to reconsider, in fact, is my understanding of the means by which companies attempt to develop and maintain competitive advantage today..."

The Enterprisers Project, October 28th, 2019
(Get More Information . .) open to premium members only

Digital Transformation Age ROI: 3 Ways To Measure
Calculating ROI is harder in the digital age. For example, dismissing wild west investments almost guarantees an established company a slow, controlled demise
"If measuring return on Investment (ROI) used to be difficult, it might be even more difficult in the age of digital transformation," warns Todd Loeppke in The Enterprisers Project.

"In the digital world, speed to market is king and the shelf life of a great product or service is much shorter. Mix in some accounting rules around capex versus opex spending, plus the social optics of an investment, sometimes referred to as social return on investments (SROI), and things get complicated real quick..."

The Enterprisers Project, October 30th, 2019
(Get More Information . .) open to premium members only

IT Teams Are Embracing Intent-Based Networking, Investing In AI Technologies
The network is vital to today's digital business. Whether maximizing employee productivity, optimizing customer experience or keeping data protected and secure, the network is foundational to business success
"At the same time, the network is in the midst of one of its biggest evolutions since the introduction of the Internet, creating an opportunity for IT leaders and their teams to innovate. Cisco asked over 2000 IT leaders and network strategists how they plan to prioritize investment and the current state of their networks..." - HelpNet Security
HelpNet Security, November 1st, 2019
(Get More Information . .) open to premium members only

IT News - MFA
Two-Factor Authentication (2FA) Or Multifactor Authentication (MFA)? That Is The Question
We, as security practitioners, need to be mindful about what we mean when we say '2FA' or 'MFA.' These terms are often used interchangeably
Sean Ryan writes in a blogs for Forrester, "The confusion is understandable, since 2FA is a subset of MFA. However, just like Halloween candy, MFA (including 2FA) comes in many flavors. Let's unpack these terms and consider the various options.

MFA offers three factors to prove identity, plus additional attributes to further support the claim:..."

Forrester, October 29th, 2019
(Get More Information . .) open to premium members only

What Is The Value Of A Data Breach That Does Not Happen?
Motherboard posted a well-researched piece recently on hackers who have been exploiting the SS7 protocol in telco networks to pillage bank accounts in the UK
"As someone who advises banks on mobile biometric authentication, I can attest to the article's accuracy. The writer not only got the facts straight, he did a masterful job of conveying the attitudes of the institutions involved. Reading between the lines of their terse statements, I saw the usual surprise, chagrin and feelings of 'why us?'

But in fairness, defending a bank, healthcare organization, online retail business, etc. against determined and capable hackers is difficult. At best, it's a running battle. We will continue to see occasional setbacks..."

Fortress Identity, November 1st, 2019
(Get More Information . .) open to premium members only

IT News - Storage
Top 10 Cloud File Sharing Services
These top 10 cloud file sharing services enable users and organizations to easily load, store and access files on a cloud-based service
"One of the most popular cloud computing use-cases for organizations of all sizes is for file sharing and synchronization," notes Sean Michael Kerner in linuxtoday.

"Cloud file sharing and synchronization services enables users and organizations to easily load, store and access files on a service from a cloud company. Synchronization can keep local, on-premises version in-sync with the cloud. Cloud file sharing services have emerged over the past decade to become mainstays for many IT users, sometimes augmenting and often replacing the need for on-premises local file storage sharing..."

linuxtoday, October 27th, 2019
(Get More Information . .) open to premium members only

How Enterprise Storage Arrays Adapting To Meet Changing Business Requirements?
How do they provide new levels of capacity, density and fast connectivity?
"Over the last 5 years, what mid-sized enterprises expect from their technology infrastructures has changed.

Data and the continuous availability of the systems that provide that data are critical to virtually all business operations. Beyond operations, we have entered a period of digital transformation where data has become a tactical and even strategic resource. Data is the foundation for value creation. Enterprise storage systems are changing in a variety of ways to address enterprise expectations for continuous availability, greater capacity, and the performance required to support critical workloads..." - Storage Newsletter

Storage Newsletter, October 31st, 2019
(Get More Information . .) open to premium members only

IT News - AI
5 Tips On How To Pick The Right AI Use Cases
Businesses may not be ready to jump all in to AI just yet, so starting with individual projects can be a good place to start. What should CIOs look for in early-stage AI projects?
"Google was one of the pioneers in using AI, and the investments paid off with the company doubling its net income year over year after only a short period of time," notes David Petersson in SearchCIO.

"Today, many companies seek to join the AI revolution. Genesys predicted that 60% of U.S. companies will be using AI by 2022, and the reason for this is simple: Not only have they seen the results, but the fear of losing the market to AI-driven competitors is a powerful source..."

SearchCIO, November 1st, 2019
(Get More Information . .) open to premium members only

Why Privacy And Artificial Intelligence Still Need Some Harmonization
Headlines proclaiming the next great application of artificial intelligence appear with a great degree of frequency
"As much that is true generally, healthcare seems to receive potentially an even greater amount of such announcements," writes Matthew Fisher in HealthData Management.

"Determining the validity behind the assertions about artificial intelligence can be difficult. There will be truthful claims and others that do not live up to the hype. The arguably more interesting question is what artificial intelligence, including both the development and use, is doing to privacy..."

HealthData Management, October 28th, 2019
(Get More Information . .) open to premium members only

IT News - Technology
Spending On Wearable Technology To Surge To $52 Billion By 2020: Gartner
Consumers are expected to take advantage of falling smartwatch price points
Charlie Osborne writes in ZDNet, "Worldwide spending in the wearable technology market will increase by close to a third to hit $52 billion in 2020, analysts estimate.

This year, spending on wearables -- including smartwatches, ear-worn gadgets, intelligent clothing, and head-mounted displays (HMDs) is set to reach $41 billion, Gartner said on Wednesday..."

ZDNet, October 29th, 2019
(Get More Information . .) open to premium members only

IT News - Blockchain
Blockchain For Business: 6 Promising Pilots
Big brands in financial services, logistics and other sectors are betting on blockchain's potential to facilitate transactions and verify provenance of products
"For all the hype, blockchain has yet to go mainstream in the enterprise," notes Clint Boulton in CIO. "But that is gradually changing as the technology's reputation for trusted transactions grows among IT leaders.

Blockchain is a shared digital ledger for recording transactions. Each transaction among the blockchain network's participants is stored in a record known as a block that is digitally signed to ensure authenticity and create consensus about the state of transactions. CIOs are intrigued by blockchain's ability to scale digital trust across businesses..."

CIO, October 31st, 2019
(Get More Information . .) open to premium members only

IT News - Humor
Now his angry emails take forever to get here
"It's a Monday morning a few years ago when this network admin pilot fish gets a phone call from the manager of one of the company's Midwestern offices. Not a nice call, mind you; the manager starts right off hollering: 'Where's our network connection so we can get our LAN connected to the corporate backbone?'..."
ComputerWorld, October 29th, 2019
(Get More Information . .) open to premium members only

Penny Wise
Well, it would be nice to have the must-haves
"The owner of a local business is a notorious skinflint, so the company's facilities are in an advanced state of ramshackle before he even thinks about moving. Naturally, everyone is amazed when they learn that the new facility is being custom-built just for them.

And during the design phase, each department manager is asked to provide a list of must-have features for the new facility. They have no problem complying, because most of them have spent years getting by with jury-rigged solutions for basic problems..."

ComputerWorld, November 1st, 2019
(Get More Information . .) open to premium members only

IT News - PM
Top 6 Agile Tools For Project Management
Keep your projects humming with these tools geared for teams committed to agile practices and workflows
Peter Wayner writes in CIO, "Much has changed since the Agile Manifesto first appeared. At the time, programmers were revolting against the tyranny of the specs document and the rigid, lock-step organization of work. Let us be free, they said, and we can work faster and more productively. But that also meant constant reorganization and a lot of Post-it notes and bulletin boards and scraps of paper and arrows pointing everywhere..."
CIO, October 29th, 2019
(Get More Information . .) open to premium members only

IT News - HR
Talent Acquisition vs. Recruitment: Key Differences And Similarities
They sound like different terms for the same process, and to some extent they are, but recruitment and talent acquisition (TA) also have some key differences
"Simply knowing the difference between these two processes can help you make better hiring decisions. Here's everything you need to know about talent acquisition vs. recruitment.

Recruitment is becoming more challenging as we head into the future of work - for several reasons. One, the labor market is tight due to the low unemployment rate. Two, not many candidates have the skills companies need to fill gaps in their business process. Three, there is still a lack of synergy between business heads and recruitment and talent acquisition specialists about merging talent requirements with business goals..." - HR Technologist

HR Technologist, November 1st, 2019
(Get More Information . .) open to premium members only

IT News - Security
The 8 Scariest Cybercrime Tricks Of 2019
Cyberattacks are rapidly evolving - with plenty of scary cybercrime tricks to watch out for as we near the end of 2019
"The success of WannaCry, NotPetya, GandCrab and others have inspired a new generation of hackers looking for a quick lucrative score," notes Marcus Chung in Information Management.

"While it's impossible to predict the next attack scheme and whether you'll be a target, Cybersecurity Awareness Month is a perfect time to review the threat landscape and make sure defenses are ready for the challenge.

Here's a list of the top threats that all organizations should be prepared to defend against in 2019 and beyond..."

Information Management, October 31st, 2019
(Get More Information . .) open to premium members only

5 Security Oversights To Avoid With IAM Configurations
IAM provides the granularity organizations need to secure their cloud workloads, but only if it's properly implemented. Refrain from making these common IAM mistakes
Stephen J. Bigelow writes in SearchCloudSecurity, "Public cloud resources can be extremely secure when permissions are configured properly, but doing so requires careful consideration and forethought. Mistakes could expose sensitive workloads and data, placing a business at risk.

Cloud security revolves around the notion of permissions -- the mechanisms used to assign granular approval to entities that access cloud resources. These entities can include users, customers, partners, services and applications. Permissions are typically assigned and managed through vital cloud services such as AWS Identity and Access Management (IAM), Microsoft Azure Active Directory and Google IAM..."

SearchCloudSecurity, October 29th, 2019
(Get More Information . .) open to premium members only

IT News - DevOps
DevOps Chat: From 0 To 1,000 Deploys Per Month With Redbox
Many organizations want to implement the latest DevOps/SRE practices, but many struggle with transforming the existing processes over to new streamlined processes
"How does an organization transform from zero automated deploys to 100s/1000s a month? Most importantly, how do you show the value of Spinnaker to your business as a whole?" asks Mitchell Ashley in

"November's Spinnaker Summit 2019 in San Diego allows us an opportunity to hear and learn from DevOps engineers, developers and practitioners using Spinnaker open source software. Joel Vasallo, manager of Cloud DevOps at Redbox, shares a preview of his talk where he shares his experience about using Spinnaker open source to increase the number of deploys into production. Joel found Spinnaker so useful because it is very extensible, covers AWS well, strong support for Kubernetes, different deployment types and has the automation to create the software delivery platform that fits the need...", October 29th, 2019
(Get More Information . .) open to premium members only

IT News - Cloud
Big 3 Cloud Infrastructure Earnings Reach Almost $22B This Quarter
Amazon, Microsoft and Google are often referred to as the Big 3 in the cloud infrastructure market, and if you had any doubt about the growth potential of the cloud, take a look at this quarter's eye-popping revenue numbers from these three companies
Ron Miller writes in TechCrunch, "Before we get into each company's specific numbers, it's important to note that it's difficult to get a firm grip on what the cloud numbers actually mean and what each company includes in that cloud revenue category. What's more, Google didn't even report specific cloud revenue this quarter, so we are left to rely on comments from July.

It's also important to note that we are talking about the cloud infrastructure, not SaaS revenue, so Microsoft earned additional money from their SaaS business, but Google combines SaaS and infrastructure into a single number..."

TechCrunch, October 29th, 2019
(Get More Information . .) open to premium members only

10 Cloud Migration Process Tips CIOs Need To Consider
Cloud migrations are never easy, especially for CIOs and IT leaders moving workloads to the cloud. To ensure your migration is a success, consider these 10 tips from cloud experts
"Enterprise IT leaders continue to migrate to the cloud in search of various benefits, but studies found that many still struggle to get the returns they expected when moving workloads during the cloud migration process," opines Mary K. Pratt in SearchCIO.

"According to technology consultants, researchers and experienced CIOs, one of the reasons is that organizations are still moving applications, capabilities and services to the cloud without first fully evaluating whether they'll work efficiently in the environment and without planning how best to modernize and optimize them..."

SearchCIO, October 28th, 2019
(Get More Information . .) open to premium members only

IT News - Wireless
It's not Wi-Fi 6 vs. 5G -- it's Wi-Fi 6 and 5G
Wi-Fi 6 and 5G have similarities and differences. Enterprises want to know how the two can work together. Vendors, for their part, will need an integration strategy
"As new wireless and cellular standards emerge in Wi-Fi 6 and 5G, enterprises don't want one or the other," notes Luke O'Neill in SeachNetworking. "They want both, according to IDC analysts. Now, enterprises and vendors alike are trying to figure out how the two technologies can work together.

Specifically, IDC said, enterprises are asking how they can co-manage, provision, track or oversee multiple access services in Wi-Fi and cellular. As a result, networking vendors that sell both Wi-Fi 6 and 5G services need to tell customers how they plan to integrate both technologies..."

SeachNetworking, November 1st, 2019
(Get More Information . .) open to premium members only

IT News - DR
Data Replication Technologies: What They Are And How To Use Them
Data replication can play a big role in a disaster recovery plan, so make sure you're familiar with the different types of replication and where they work best
Dave Raffo and Erin Sullivan write in SearchDisasterRecovery, "Data replication is the process of copying data from one location to another so you have multiple up-to-date copies. For disaster recovery, replication usually occurs between a primary storage location and a secondary off-site location, which can be hosted by a cloud provider.

Replication is a key technology for disaster recovery and often works in combination with data deduplication, virtual servers, snapshots or the cloud to carry out its role in a disaster recovery..."

SearchDisasterRecovery, October 29th, 2019
(Get More Information . .) open to premium members only

IT News - IoT
5 Steps For Securing IoT Deployments
Focusing the right people, processes and technology on IoT cybersecurity is a win-win; it can improve security operations and the success of IoT initiatives
"IoT represents a cybersecurity vulnerability that organizations can address with five steps to create an IoT-specific security strategy," writes Johna Till Johnson in IoT Agenda.

"Organizations risk security when groups outside of IT deploy IoT without informing IT admins, as well as when their IoT initiative is a formal project in pursuit of defined business goals..."

IoT Agenda, October 28th, 2019
(Get More Information . .) open to premium members only

IT News - Careers
Developer Ranks To Gain 250,000 Jobs By 2026, Driven By AI, Disruptive Technologies
In an era where technological advances are evidently making our lives easier, enabling many employees to spend less hours at work and more time doing things they enjoy; it begs the question: What will this mean for the future job market?
"Artificial intelligence has already advanced into aiding financial, transportation and energy management sectors," writes David Weldon in Information Management.

"Although the benefits are apparent, they come hand-in-hand with fears that jobs which currently exist now, may not become part of our future workforce.

A recent study by the PewResearch Center revealed that 48 percent of Americans are somewhat worried that their job could be taken over by a robot and 25 percent are very worried at this prospect..."

Information Management, October 29th, 2019
(Get More Information . .) open to premium members only

IT News - Backup
Object Storage In The Cloud: Is Backup Needed?
Block storage in the cloud that is not properly backed up can result in lost data, and while object storage in the cloud is more resilient, it pays to be careful
"The failure to back up data that is stored in a cloud block-storage service can be lost forever if not properly backed up," warns W. Curtis Preston in Networkworld.

"This article explains how object storage works very differently from block storage and how it offers better built-in protections.

Each cloud vendor offers an object storage service, and they include Amazon's Simple Storage Service (S3), Azure's Blob Store, and Google's Cloud Storage..."

Networkworld, October 27th, 2019
(Get More Information . .) open to premium members only

IT News - Big Data
How Big Data Keeps Businesses Secure
Big data has become almost ubiquitous in the world of business
"From supply chain and inventory management to HR processes like hiring, big data has proven itself to be a valuable tool. However, big data can do much more than simply improve how a business conducts its operations; it can protect businesses from a huge variety of threats when used properly.

Useful Analytics

At its core, big data empowers businesses and enables them to make informed and intelligent decisions based on analytics..." - insideBIGDATA

insideBIGDATA, November 1st, 2019
(Get More Information . .) open to premium members only

Sections in this issue:
click to jump to section