IT Weekly Articles 2/6/2012

February 3rd, 2012

IT Weekly Article posts are a selection of information technology articles (no company or product reviews) culled each week from 400+ on line industry sources addressing: Data, Backup, DR, BC, Risk; Quality of Service; Availability; Response Time; Productivity; Servers; Storage; Operations, Networks; Security; Compliance; Audits; Costs, Business Solutions, futures, and a myriad of other subjects that help the IT Professional reduce risk; increase productivity; increase revenue and increase profits.

Articles from the week of 1-27-12 to 2-2-12

CIO – CTO – CSO

10 Business Lessons from the Super Bowl
from Baseline January 30, 2012

10 Ways To Build Lean, Agile Teams
from CIO Insight January 27, 2012

How Proctor and Gamble Maximizes Business Analytics
from CIO Insight January 30, 2012

How to Make IT Irreplaceable
from NetworkWorld January 26, 2012

Time to Shut Up About the Death of The CIO
from silicon.com January 27, 2012

Why Bully IT Bosses Lose the Game
from InformationWeek January 26, 2012

Cloud

Big Data Could Create Compliance Issues
from Dark Reading January 30, 2012

Cloud Appliances: The Cloud That Isn’t the Cloud
from InfoWorld January 31, 2012

Cloud Apps: The Seven Deadly Sins
from IT Business Edge February 1, 2012

Cloud Security, Costs Concern Federal IT Pros
from InformationWeek January 31, 2012

Feds Plan to Destroy MegaUpload Data
from Fierce Content Management February 1, 2012

Is the Cloud Really Cheaper?
from InfoWorld February 2, 2012

Virtualization, Cloud Having Little Impact on Databases
from NetworkComputing January 29, 2012

Compliance

Big Data Could Create Compliance Issues
from Dark Reading January 30, 2012

Databases

Virtualization, Cloud Having Little Impact on Databases
from NetworkComputing January 29, 2012

Email

Five Ways to Protect Your Email At Work
from IT World January 30, 2012

Encryption

Poisoning the Data Well
from Dark Reading February 1, 2012

Survey: Majority of IT Pros Not Encrypting Customer Data
from CRN January 25, 2012

Mobile Devices

BYOD: User Policy Considerations
from IT Business Edge February 2, 2012

Lesson Learned from a Bring Your Own Device Project
from No Jitter January 30, 2012

Managing Mobility in the Enterprise
from CIO Insight January 31, 2012

Mobile Revolution Threatens IT Security
from Baseline January 25, 2012

Networks

Correcting Network Packet Loss
from No Jitter January 31, 2012

IPv6 Firewall Security: Fixing Issues Introduced by the New Protocol
from Search Enterprise WAN February 2, 2012

Operations

DARPA Takes Aim at ‘Achilles Heel’ of Advanced Computing; Power
from NetworkWorld January 27, 2012

Do You Need a Security Operations Center
from Dark Reading January 28, 2012

More of the World’s Coolest Data Centers
from NetworkWorld January 25, 2012

Perform A Data Center Overhaul
from Processor January 27, 2012

Ten Ways to Master Metrics
from Baseline January 18, 2012

Rabbit Sense

10 Things IT Pros Do That Lead To Burnout
from TechRepublic January 28, 2012

Nine Tips to Help You Work Smarter and Avoid Workplace Overload
from IT Business Edge January 27, 2012

Why Bully IT Bosses Lose the Game
from InformationWeek January 26, 2012

Security

10 SharePoint Security Mistakes You Probably Make
from ComputerWorld January 30, 2012

10 Tips for Offsite Meeting Security
from CSO Online February 1, 2012

Cybersecurity Report: All Countries Lag Behind the Bad Guys
from ComputerWorld January 30, 2012

Do You Need a Security Operations Center
from Dark Reading January 28, 2012

How to Prevent Thumb Drive Security Disasters
from NetworkWorld January 27, 2012

IPv6 Firewall Security: Fixing Issues Introduced by the New Protocol
from Search Enterprise WAN February 2, 2012

Mobile Revolution Threatens IT Security
from Baseline January 25, 2012

Security Best Practices Pay Off
from Baseline February 1, 2012

The Mechanics of Breach Notification
from Dark Reading January 27, 2012

Three Steps to Properly Protect Your Personal Data
from CSO Online February 1, 2012

Storage

Are There Too many Storage Solutions
from InformationWeek January 30, 2012

Big Data Could Create Compliance Issues
from Dark Reading January 30, 2012

Big Data – How Proctor and Gamble Maximizes Business Analytics
from CIO Insight January 30, 2012

In Memory Computing Is Big Data’s Best Friend, At Least for Some Enterprises
from Smarter Technology January 30, 2012

Poisoning the Data Well
from Dark Reading February 1, 2012

Solid State Can Save You Money
from InformationWeek January 26, 2012

Which Storage Conferences Are Worth Attending?
from InfoStor February 1 , 2012

Virtualization

The Rise of Virtualization Coexistence
from Enterprise Systems Journal January 30, 2012

Virtualization, Cloud Having Little Impact on Databases
from NetworkComputing January 29, 2012

Leave a Reply