IT Weekly Articles 1/23/2012

January 21st, 2012

IT Weekly Article posts are a selection of information technology articles (no company or product reviews) culled each week from 400+ on line industry sources addressing: Data, Backup, DR, BC, Risk; Quality of Service; Availability; Response Time; Productivity; Servers; Storage; Operations, Networks; Security; Compliance; Audits; Costs, Business Solutions, futures, and a myriad of other subjects that help the IT Professional reduce risk; increase productivity; increase revenue and increase profits.

Articles from the week of 1-13-12 to 1-19-12

CIO – CTO – CSO

● What’s Keeping You Up at Night
The Top 10 Tech Priorities of CIOs
from ComputerWorld (January 18, 2012)

Cloud

● Hot Subjects for Security in 2012
Eight Cloud Security Predictions for 2012
from IT Business Edge (January 18, 2012)

● A Candid Observation:
Enough With the Truth Already; A Cloud Conversation with Jon Toigo
from Virtualization Review (January 11, 2012)

● Hype vs. Adoption
The State of the Cloud: Getting Real in 2012
from Channel Insider (January 12, 2012)

Compliance

● Errors Using PCI
Top 10 PCI Compliance Mistakes
from Dark Reading (January 16, 2012)

Data

● Developing a Sound Data Strategy
10 Key Elements of Your Data Strategy
from TDWI (January 17, 2012)

● Too Much of a Good Thing
What Every CIO Needs to Know
from CIO Insight (January 12, 2012)

Database

● A Huge Oracle Problem
Fundamental Oracle Flaw
from InfoWorld (January 17, 2012)

Data Breach

● Sooner or Later You Will be In the Crosshairs
Manage the Breach or the Breach Will Manage You
from Enterprise Systems Journal (January 16, 2012)

De-Dupe

● Moving Up the Tier Ladderr
Primary Storage Deduplication Helping with VMs and Virtual Desktops
from Search Storage (January 16, 2012)

Mobile Devices

● Adapting to BYOD’s
BYOD Movement is Forcing IT to Adapt
from InfoWorld (January 16, 2012)

Networks

● One Stop IPv6 Info
Unbiased Info About IPv6
from NetworkWorld (January 12, 2012)

Outsourcing

● What Goes Around Comes Around
5 Tips To Keep IT Outsourcing On Track as Global Providers Cut
from NetworkWorld (January 14, 2012)

Rabbit Sense

● The Art of War…NOT
10 Less-Than-Ethical Ways to Get Ahead
from TechRepublic (January 13, 2012)

● Become the Last One they Release
12 Effective Habits of Indispensable IT Pros
from InfoWorld (January 17, 2012)

Security

● Pay Me Now or Later
Cyber Insurance Offers IT Peace of Mind – Or Not
from NetworkWorld (January 13, 2012)

● Hot Subjects for the Cloud 2012
Eight Cloud Security Predictions for 2012
from IT Business Edge (January 18, 2012)

● A Lack of Consistency
Enough With the Truth Already; A Cloud Conversation with Jon Toigo
from eWeek (January 11, 2012)

● Sooner or Later You Will be In the Crosshairs
Manage the Breach or the Breach Will Manage You
from Enterprise Systems Journal (January 16, 2012)

● When Your Partner Goofs
What Do You Do When Your Business Partner is Breached?
from Dark Reading (January 6, 2012)

● Knee Jerk or Good Planning
Zappos Data Breach Response a Good Idea or Just Panic Mode?
from NetworkWorld (January 17, 2012)

● Developing a Sound Data Strategy
10 Key Elements of Your Data Strategy
from TDWI (January 17, 2012)

● Moving Up the Tier Ladder Moving De-Dupe Up the Tier Ladder
Primary Storage Deduplication Helping with VMs and Virtual Desktops
from Search Storage (January 16, 2012)

● Too Much of a Good Thing
What Every CIO Needs to Know
from CIO Insight (January 12, 2012)

Technology

● Memory Breakthrough
IBM Engineers Atomic-Scale Memory
from InfoStor (January 13, 2012)

2 Responses to “IT Weekly Articles 1/23/2012”

  1. Too many businesses believe their General Liability insurance policy will cover them for Cyber Risks. General Liability, Property, and Professional Liability policies do not address many critical information security exposures, statutory notification and credit monitoring costs, regulatory fines and penalties and class action lawsuits associated with privacy breaches. In fact, many forms now affirmatively exclude “cyber risk.” Protect your interests and click here for more information and a quick quote from Marshall & Sterling Insurance*: http://www.marshallsterling.com/leeds/547-leeds-cyber-security-a-privacy

    *Marshall & Sterling Insurance was est. in 1864 and is one of the nation’s largest independently owned insurance agencies with expertise in cyber risk solutions.

  2. Beatriz Fafard says:

    I love this thing. I recently bought a 3600 mah battery for my phone and although that did help I still could not go about my day without carrying my wall charger. This little guy easily fits in my pants pocket and frees me to go about my day without constantly looking for a wall socket to plug my phone into.

Leave a Reply