IT Weekly Articles 4/30/2012

April 27th, 2012

IT Weekly Article posts are a selection of 40-60 information technology articles (no company or product reviews) culled each week from 100 on line industry sources addressing: Virtualization; Storage; Cloud; BYOD & Mobile Devices; Security; Encryption; Management; Outsourcing; Operations; Internet; Email; Technology; Social Media; Risk; Quality of Service; Availability; Response Time; Business Productivity; Servers; Networks; Data Protection, Recovery and Archiving; Regulatory Compliance; Business Continuity and more.


Articles from the week of 4-20-2012 to 4-26-2012

Click on Subject to go to Areas of Interest

Big Data
Cloud
Compliance
Disaster Recovery
Encryption
Management
Mobile Devices
Networks
Operations
Rabbit Sense
Security
Servers/Sys Admins
Storage
Tape
Virtualization

Big Data
Back to Index

How To Tackle The Big Data Challenge (Part 1)
from NetworkComputing April 23, 2012

Cloud
Back to Index

5 Tips For Negotiating Cloud Software SLAs
from InformationWeek April 20, 202

Amazon CTO: ‘You Should Be Able To Walk Away’ From Cloud Providers
from NetworkWorld April 20, 2012

Cloud Clash: Software Vendors Vs. Cloud Providers
from InfoWorld April 24, 2012

Cloud Storage Booming, But Trouble Brewing
from InfoWorld April 26, 2012

Efforts Afoot To Advance Cloud Standards
from NetworkWorld April 17, 2012

Compliance
Back to Index

Europe’s High Court Says Isps Can Hand Over Alleged Pirate Data
from cnet April 19, 2012

Disaster Recovery
Back to Index

Avoiding 9 Common Threats To Your Company
from Search Storage April 22, 2012

Encryption
Back to Index

Businesses Fail To Learn From 2011 Data Breaches
from HelpNet Security April 25, 2012

World War II Encryption Tactics: How The Enigma Failed (Video)
from IT World April 25, 2012

Management
Back to Index

Business Process Management: Ten Bold Predictions
from eWeek April 19, 2012

CEOs Plan to Invest in IT, Innovation in 2012
from CIO Insight April 20, 2012

CIOs Still Dismissed As Mere Techies By CEOs
from NetworkWorld April 17, 2012

Five Leadership Lessons From Jean-Luc Picard
from Forbes March 13, 2012

How To Lose Your Best IT Employees
from InformationWeek April 20, 2012

How to Manage Unmanageable Employees
from CIO Insight April 25, 2012

The Upside Of Shadow IT
from NetworkWorld April 34, 2012

Workers Did Not Exceed Authorization When Data Stolen, Says Appeals Court
from ComputerWorld April 19, 2012

Mobile Devices
Back to Index

Are BYOD Workers More Productive?
from NetworkWorld April 24, 2012

Data Security in the BYOD Era: 10 Big Risks Facing Enterprises
from eWeek April 17, 2012

The BYOD Era May Be Ending Already
from InfoWorld April 20, 2012

Networks
Back to Index

Apple’s Ipv6 Misstep Is A Sign Of The Times
from NetworkWorld April 24, 2012

How Cybercriminals Are Infecting Networks
from HelpNet Security April 20, 2012

How To Hack Your Own Wi-Fi Network
from NetworkWorld April 23, 2012

Mission Impossible: A Remote Network Cutover
from InfoWorld April 16, 2012

Operations
Back to Index

Boost Energy Efficiency
from Processor April 20, 2012

Five Unique Ways to Use a Log Management Solution
from IT Business Edge April 26, 2012

Large Enterprises Handing Off Data Center Builds
from NetworkWorld April 23, 2012

Stop Server Downtime Before It Occurs
from Processor April 20, 2012

Project ManagementBack to Index

6 Steps to Project Leadership Success
from Accelerating IT Success April 12, 2012

7 Programming Myths…Busted!
from InfoWorld April 23, 202

What do Abbott and Costello Have To Do with Good Project Management?
from Project Management Hut April 9, 2012

What’s the Profile of a Good Project Manager?
from Accelerating IT Success April 16, 2012

Rabbit Sense
Back to Index

Business Etiquette: 5 Rules That Matter Now
from Inc. April 17, 2012

Top 10 Ways to Protect Your Privacy and Avoid the Government’s Prying Eyes
from v3 co uk April 20, 2012

Security
Back to Index

10 Commandments Of Windows Security
from CSO Online April 23, 3012

82% Of Data Breaches Due To Staff Errors; 4% Of IT Trusts Users; IT Is Still To Blame
from IIT World April 19. 2012

Anonymous Drives Security Fears, But Not Spending
from InformationWeek April 23, 2012

Cyber Crime Not A Big Deal? Get Real
from InfoWorld April 24, 2012

Damage Mitigation As The New Defense
from Dark Reading April 5, 2012

FCC’s Ruling that Google’s WiFi Snooping is Legal Sets Horrible Precedent
from ComputerWorld April 16, 2012

How Cybercriminals Are Infecting Networks
from HelpNet Security April 20, 2012

Top Enterprise Security Concerns And IT Problems
from HelpNet Security April 25, 2012

VMware Source Code Stolen, Impact Unclear
from InfoWorld April 25. 2012

Weak Passwords Still Subvert IT Security
from ComputerWorld April 23, 2012

Web Apps Create New Security Risks
from Baseline April 18, 2012

Servers/Sys Admins
Back to Index

Log Standards: Put Up, Shut Up, Give Up, Or Throw Up?
from Dark Reading April 16, 2012

Most IT Admins Considered Switching Careers Due To Stress
from HelpNet Security April 20, 2012

Stop Server Downtime Before It Occurs
from Processor April 20, 2012

Storage
Back to Index

Cloud Storage Booming, But Trouble Brewing
from InfoWorld April 26, 2012

How To Secure Large Data Warehouses
from Dark Reading April 22, 2012

How To Tackle The Big Data Challenge (Part 1)
from NetworkComputing April 23, 2012

Tape
Back to Index

Warning: Rumors Of Tape’s Demise Greatly Exaggerated
from Business Solutions March 23, 2012

Virtualization
Back to Index

Shades of pcAnywhere in VMware Breach
from InfoWorld April 26. 2012

VMware Source Code Stolen, Impact Unclear
from InfoWorld April 25. 2012Back to Index

Leave a Reply