3/19/2012

March 21st, 2012

IT Weekly Article posts are a selection of information technology articles (no company or product reviews) culled each week from 400+ on line industry sources addressing: Data, Backup, DR, BC, Risk; Quality of Service; Availability; Response Time; Productivity; Servers; Storage; Operations, Networks; Security; Compliance; Audits; Costs, Business Solutions, futures, and a myriad of other subjects that help the IT Professional reduce risk; increase productivity; increase revenue and increase profits.

Articles from the week of 3-8-2012 to 3-15-2012

Big Data

5 Ways to Prepare for Big Data with Scale-Out NAS
from NetworkWorld March 12, 2012

The Myth of Big Data
from InformationWeek March 8, 2012

The Promise of Big Data
from InfoWorld March 15, 2012

Business Continuity

Does My Company Need Business Continuity Software?
from CSO Online March 7, 2012

CIO – CTO – CSO

10 Ways to Avoid Organizational Dysfunction
from CIO Insight March 8, 2012

Why CFOs and Cloud Computing Have A Love-Hate Relationship
from CIO March 13, 2012

Cloud

5 Signs That You’ve Lost Control Over Your Cloud Apps
from ComputerWorld March 12, 2012

Cloud Storage Prices Drop, but Experts and Users Say Hidden Fees Exist
from Search Cloud Computing March 12, 2012

ISACA Sets Six Principles for Cloud Rollout
from IT World March 11, 2012

Think You’re Not Using the Cloud? Your Sys Admin May Know Differently
from TechRepublic March 9, 2012

Why CFOs and Cloud Computing Have A Love-Hate Relationship
from CIO March 13, 2012

Compliance

Five Tips for Easier Data Governance
from IT Business Edge March 15, 2012

Keeping Compliance Costs Down with Data Classification
from Dark Reading March 12, 2012

PCI Compliance: The Risks Banks Can Miss
from Bank Systems and Technology March 11, 2012

Encryption

Mobile’s Cryptography Conundrums
from Dark Reading March 8, 2012

Ron Was Wrong, Whit is Right, And What You Need to Know
from Dark Reading March 12, 2012

Internet

ISPs and Mobile Operators Regularly Throttle Traffic, Report Finds
from V3 co uk March 12, 2012

Mobile Devices

BYOD Movement Challenges IT
from Baseline March 7, 2012

Security Managers Split on BYOD, Skeptical of Android Devices
from IT World March 14, 2012

Networks

Controlling Your March Madness Traffic Outbreak
from NetworkWorld March 8, 2012

March Madness: Will IT Bother to Block NCAA Tournament Traffic?
from InfoWorld March 14, 2012

Network Security Breaches: 10 Things to Do Immediately After
from eWeek March 7, 2012

Operations

10 Ways to Avoid Organizational Dysfunction
from CIO Insight March 8, 2012

Outsourcing

Is Your Outsourcer Agile Enough?
from ComputerWorld March 12, 2012

Rabbit Sense

How to Turn Awful Meetings Into Awesome Meetings
from Baseline March 24, 2012

Security

3 Key Issues for Secure Virtualization
from CSO Online March 7, 2012

5 Big Security Mistakes You’re Probably Making
from InfoWorld March 13, 2012

Getting A Good Metrics Program Off the Ground
from Dark Reading March 9, 2012

ISACA Sets Six Principles for Cloud Rollout
from IT World March 11, 2012

Network Security Breaches: 10 Things to Do Immediately After
from eWeek March 7, 2012

Security Managers Split on BYOD, Skeptical of Android Devices
from IT World March 14, 2012

Social Media

Can an Employer Ask for Your Facebook Login and Password?
from TechRepublic March 13, 2012

Storage

5 Ways to Prepare for Big Data with Scale-Out NAS
from NetworkWorld March 12, 2012

Cloud Storage Prices Drop, but Experts and Users Say Hidden Fees Exist
from Search Cloud Computing March 12, 2012

The Myth of Big Data
from InformationWeek March 8, 2012

The Truth About SLC vs. MLC
from Search Solid State Storage March 9, 2012

What Is the Next Big Thing in Storage
from InfoStor March 13, 2012

Technology

Robot Cars Get the Green Light in Nevada
from GCN February 28, 2012

What’s Up With These Solar Storms?
from NetworkWorld March 9, 2012

Virtualization

3 Key Issues for Secure Virtualization
from CSO Online March 7, 2012

Leave a Reply