IT Weekly Articles 6/4/2012

June 1st, 2012

IT Weekly Article posts are a selection of 40-60 information technology articles (no company or product reviews) culled each week from 100 on line industry sources addressing: Virtualization; Storage; Cloud; BYOD & Mobile Devices; Security; Encryption; Management; Outsourcing; Operations; Internet; Email; Technology; Social Media; Risk; Quality of Service; Availability; Response Time; Business Productivity; Servers; Networks; Data Protection, Recovery and Archiving; Regulatory Compliance; Business Continuity and more.


Articles from the week of 5-25-2012 to 5-31-2012

Click on Subject to go to Areas of Interest


Backup
Big Data
Cloud
Compliance
Disaster Recovery
Disk Technology
Email
Management
Mobile Devices
Networks
Operations
Project Management
Rabbit Sense
Security
Storage
Technology



Backup

Back to Index

Adopting Cloud In Your Backup Strategy
from Continuity Central May 25, 2012

Q&A: How to Handle IT’s Cloud Backup Issues
from Enterprise Systems Journal May 28, 2012



Big Data
Back to Index

Looking Beyond the Big Data Storage Buzz
from Enterprise Storage Forum May 29, 2012



Cloud
Back to Index

10 Keys for Building Private Clouds
from NetworkWorld May 29, 2012

Adopting Cloud In Your Backup Strategy
from Continuity Central May 25, 2012

Cloud Providers Cave into More Flexible Contracts
from IT World May 29, 2012

Cloud Security: Technology, Processes, Responsibility
from TechRepublic May 30, 2012

Don’t Make Cloud Management an Afterthought
from InfoWorld May 25, 2012

Gartner: Don’t Trust Cloud Provider To Protect Your Corporate Assets
from NetworkWorld May 25, 2012

Is The Cloud Really Ready For Prime Time?
from NetworkWorld May 31, 2012

WAN Virtualization’s Benefits “Beyond the WAN” For Security, Cloud Computing
from NetworkWorld May 25, 2012

Q&A: How to Handle IT’s Cloud Backup Issues
from Enterprise Systems Journal May 28, 2012



Compliance
Back to Index

European Data Protection Authorities Failing To Comply With Cookie Law
from v3 co uk May 28, 2012

Poorly Managed Firewall Rule Sets Will Flag An Audit
from Dark Reading May 23, 2012



Disaster Recovery
Back to Index

Mobile Security Services, Cloud Key to Disaster Planning
from eWeek May 25, 2012



Disk Technology
Back to Index

Hard Drive Prices Settle In At 70 Percent above the Pre-Flood Level
from InfoWorld May 29, 2012



Email
Back to Index

10 Steps for Dealing with Dangerous Messages
from eWeek May 24, 2012



Management
Back to Index

4 Ways to Supercharge IT Training
from InformationWeek May 25, 2012

5 Ways to Lose A Malicious Insider Lawsuit
from Dark Reading May 15, 2012

10 Predictions for What The CIO Role Will Look Like In 2020
from InfoWorld May 25, 2012

10 Things Your CIO Thinks About
from Baseline May 23, 2012

TITLE
from Baseline May 24, 2012

Ten Early Warning Signs of Fraud in Organizations
from IT Business Edge May 31, 2012

Ten Ways to Find and Keep Talent
from Baseline May 25, 2012



Mobile Devices
Back to Index

BYOD Security Gotchas
from NetworkWorld May 30, 2012

Mobile Workers Can’t Disconnect
from Baseline May 30, 2012



Networks
Back to Index

Poorly Managed Firewall Rule Sets Will Flag An Audit
from Dark Reading May 23, 2012

Security Considerations for IPv6 Launch Day
from HelpNet Security May 24, 2012

WAN Virtualization’s Benefits “Beyond the WAN” For Security, Cloud Computing
from NetworkWorld May 25, 2012

With IPv6 Being Turned On, Is Keeping Ipv4 a Bad Idea?
from GCN May 25, 2012



Operations
Back to Index

How CRIS Revamped Its Data Center Power and Cooling Technologies
from InformationWeek June 1, 2012

Towards The Data Center without Walls
from InformationWeek May 26, 2012



Project Management
Back to Index

Ten Project Management Pitfalls to Avoid
from Baseline April 16, 2012



Rabbit Sense
Back to Index

10 Totally Obnoxious Office Behaviors
from Baseline May 24, 2012

10 Ways Your IT Job Can Spoil A Vacation (And Tricks To Keep It From Happening)
from TechRepublic May 25, 2012

Don’t Be the Nerdiest Person In The Room
from Dark Reading May 24, 2012



Security
Back to Index

Administration Unveils Plan for Battling Botnets
from GCN May 30, 2012

Cambridge Researchers Uncover Backdoor In Military Chip
from TechWorld May 29, 2012

Cloud Security: Technology, Processes, Responsibility
from TechRepublic May 30, 2012

Confidential Data: Delete It or Eat It, Say Security Experts
from NetworkWorld May 24, 2012

Cutting the Lag Between Detection and Action
from Dark Reading May 26, 2012

Cyber Security Policy Guidebook
from HelpNet Security May 29, 2012

Facebook, LinkedIn Used by Employers for Monitoring: Gartner
from eWeek May 30, 2012

Gartner: Don’t Trust Cloud Provider to Protect Your Corporate Assets
from NetworkWorld May 25, 2012

NSA Security Expert Worries About Mobility, Cloud
from IT World May 29, 2012

Security Considerations for IPv6 Launch Day
from HelpNet Security May 24, 2012

Security: Prepared for the EU’s New Data Protection Regulation?
from CIO May 21, 2012

Top 5 Myths about Insider Threats
from Dark Reading May 29, 2012

WAN Virtualization’s Benefits “Beyond the WAN” For Security, Cloud Computing
from NetworkWorld May 25, 2012



Storage
Back to Index

How to Whip Your Enterprise Archive into Shape for E-discovery
from Enterprise Systems Journal May 28, 2012

Looking Beyond the Big Data Storage Buzz
from Enterprise Storage Forum May 29, 2012



Technology
Back to Index

Rules Gone Wild: The Growing Need to Get Business Rules Under Control
from Insurance Technology May 21, 2012

The Fallacy of Collaboration Technology
from InfoWorld June 1, 2012

Top Technologies for the 2012 Hurricane Season
from Insurance Technology May 25, 2012

Leave a Reply