Systems News For IT Professionals
Sep 19th, 2016 — Sep 25th, 2016 Generate the Custom HTML Email for this Issue
System News System News for Sun Users
Volume 223, Issue 3 << Previous Issue
Sections in this issue:
click to jump to section

IT - CxO
5 Myths Of Managed Services
FCW, September 23rd, 2016
7 Factors That Make Security Organizations More Effective
Dark Reading, September 22nd, 2016
8 Painful Vendor Mistakes IT Pros Make (Slideshow)
InformationWeek, September 22nd, 2016
Average Data Breach Costs $200K, Not Millions
Dark Reading, September 21st, 2016
Bad Security Habits Persist, Despite Rising Awareness
Help Net Security, September 23rd, 2016
CIOs Must Step Into The Digital Leadership Void
CIO, September 22nd, 2016
CIOs Trail Cmos In Digital Transformation
Datamation, September 21st, 2016
How CIOs Should Convey Cyber-Risks to the Board (Slideshow)
CIO Insight, September 22nd, 2016
State of the CIO 2017
CIO, September 23rd, 2016
South Florida Technology Alliance vBeers @ Palm Beach (Palm Beach Gardens)
Wednesday, October 5th, 2016: 6:00 PM to 9:00 PM
South Florida Technology Alliance vBeers @ Miami
Wednesday, September 28th, 2016: 5:30 PM to 8:30 PM
IT - Storage
Data Deduplication: 7 Factors To Consider
Network Computing, September 21st, 2016
Options in Scalability With Virtual SAN
CIO Insight, September 23rd, 2016
IT - Technology
Walmart's Self-Driving Shopping Cart Magic
ComputerWorld, September 19th, 2016
U.S. Dot Lays Out Role For States In Regulating Self-Driving Cars
Government Technology, September 20th, 2016
Five Technologies That Will Change Our Lives In Five Years
ComputerWorld, September 20th, 2016
IT - Bitcoin
Bitcoin: A Legitimate Cure For A Broken Money System, September 22nd, 2016
Blockchain: The Smart Person's Guide
TechRepublic, September 19th, 2016
How Blockchain Works: An Infographic Explainer
SearchCloudComputing, September 23rd, 2016
Op-Ed: Bitcoin's Journey To Digital Reserve Currency Status
Bitcoin Magazine, September 22nd, 2016
ITPalooza 2016 - The Fifth Annual Gathering of South Florida's IT Community
Thursday, December 8th, 2016 - The Signature Grand - Ft. Lauderdale
IT - Linux
A Linux User's Guide To Logical Volume Management
Business 2 Community, September 23rd, 2016
LibreOffice wins Bossie Awards 2016
The Document Foundadtion, September 22nd, 2016
A Brief History Of Drupal From 1.0 To 8.0, September 22nd, 2016
Is Open Source Security Software Too Much Of A Risk For Enterprises?
SearchSecurity, September 22nd, 2016
LibreOffice wins Bossie Awards 2016
The Document Foundadtion, September 22nd, 2016
IT - DevOps
DevOps: How to Persuade Your Boss, September 19th, 2016
Implementing DevOps Starts With Rethinking Deeply-Rooted Processes
The Enterprisers Project, September 22nd, 2016
IT - Cloud
5 Cloud Performance Measuring Strategies (Slideshow)
InformationWeek, September 20th, 2016
7 Ways Cloud Alters The Security Equation
Dark Reading, September 23rd, 2016
9 Keys to Having a HIPAA-Compliant Cloud
Network World, September 20th, 2016
CIO at Ed Tech Company Leads the Way to the Cloud, September 22nd, 2016
Cloud Privacy For Your Enterprise's Data: Whose Choice?
Risk Management Monitor, September 20th, 2016
Explore OpenStack Management Options For Private Cloud
Business 2 Community, September 23rd, 2016
Four Tips For Better Information Security In The Cloud
CloudTweaks, September 21st, 2016
Majority Of States Have Adopted 'Cloud First' Policies For Government
Information Management, September 22nd, 2016
The Impact Of Cloud Security Gaps And How It Can Fix Them
The Datacenter Journal, September 21st, 2016
The Many Dimensions Of Cloud Value
Network World, September 19th, 2016
Why This Hospital Is Moving To Amazon's Cloud
Network World, September 20th, 2016
IT - Top 10
Top Ten Articles for last few Issues
Vol 223 Issues 1, 2; Vol 222 Issues 1, 2, 3, 4 and 5; Vol 221 Issue 4
How The Move To The Cloud Has Transformed Disaster Recovery
Business 2 Community, September 21st, 2016
Many Don't Test Disaster Recovery Plans Properly, Survey Finds
ComputerWeekly, September 22nd, 2016
What's Difference Between Project Management And Change Management?
CIO, September 19th, 2016
IT - Networks
Can Wi-Fi and LTE-U Live Together? The Tests are Ready
ComputerWorld, September 21st, 2016
The Evolving Enterprise WAN
Network Computing, September 22nd, 2016
Virtualizing WAN Capabilities
Network World, September 21st, 2016
IT - IoT
Consortium Issues Security Framework for Industrial IoT
eWeek, September 21st, 2016
Enterprise IoT Momentum Builds: Survey
Datamation, September 22nd, 2016
If You're Not Planning For IoT, You're Already Behind
CIO, September 23rd, 2016
IoT Assault, Connected Devices Increasingly Used For DDoS Attacks
SC Magazine, September 23rd, 2016
Open Source Projects For The Internet Of Things, From A To Z, September 21st, 2016
The Internet Of Things Is Broken. We Need Better Security To Fix It
ITProPortal, September 23rd, 2016
Google's Go Language Ventures Into Machine Learning
JavaWord, September 19th, 2016
IBM Shows How Fast Its Brain-Like Chip Can Learn
ITWorld, September 22nd, 2016
MOA: Machine Learning For The Internet Of Things
jaxenter, September 22nd, 2016
Q&A: Artificial Intelligence, Advancements And Applications
ITProPortal, September 23rd, 2016
Video: The Deep Learning Ai Revolution
insideHPC, September 22nd, 2016
IT - Operations
5 Things Your in-House IT Staff Doesn't Have Time for
Business 2 Community, September 22nd, 2016
Epic Snafu Takes Australian Securities Exchange Offline
The Register, September 19th, 2016
IT - Security
What Smart Cities Can Teach Enterprises About Security
Dark Reading, September 19th, 2016
The Hidden Cost Of The Insider Threat
HelpNet Security, September 19th, 2016
2016 On Track To See Over 1 Billion Records Breached
Dark Reading, September 20th, 2016
6 Expert Tips To Better Secure Third-Party Network Access (Slideshow)
CSO Online, September 23rd, 2016
An Introduction To Passwordless Logins
Business 2 Community, September 20th, 2016
Five Social Engineering Scams Employees Still Fall For
CSO Online, September 21st, 2016
Five Strategies For Creating A Culture Of Data Security
Information Management, September 22nd, 2016
How To Keep IT Security At The Forefront During A Merger
CSO Online, September 19th, 2016
How To Protect Your Mission-Critical Information
CIO, September 21st, 2016
On-Premises & In The Cloud: Making Sense Of Your Cybersecurity Ecosystem, September 23rd, 2016
Data Breaches: This Time it's More Personal
Network World, September 20th, 2016
Lack of Funding Stymies State CISOs
Dark Reading, September 20th, 2016
IT - Careers
15 Tricky Job Interview Questions And How To Answer Them (Slideshow)
CIO, September 20th, 2016
Do IT Workers Lie About Tech Certifications? (Slideshow)
CIO Insight, September 23rd, 2016
Free And Cheap Ways To Study For IT Certifications
ComputerWorld, September 19th, 2016
Government CIOs and the IT Talent Gap
Datamation, September 23rd, 2016
Informationweek 2016 Salary Survey: 10 Best-Paying IT Jobs (Slideshow)
InformationWeek, September 23rd, 2016
IT Certifications Report Card: What Are They Worth Now? Which Ones Pay Off The Most?
ComputerWorld, September 23rd, 2016
It IS A Candidate Marketplace
Business 2 Community, September 23rd, 2016
Secrets Of People With All The Time In The World
Fast Company, September 20th, 2016
IT - Social Media
The 10 Nastiest Social Media Marketing Mishaps Of 2016
CIO, September 21st, 2016
IT - Virtualization
Cloud Foundry Foundation Makes Case For Containers
Container Journal, September 22nd, 2016
The Best (And Worst) Parts Of Server Virtualization Products
ComputerWorld, September 20th, 2016
IT - Backup
These Ransomware Situations Can Result In Colossal Outcomes (Slideshow)
CSO Online, September 20th, 2016
IT - Mobile
7 Things You Need To Know About Optimizing For Mobile In 2016
Dark Reading, September 23rd, 2016
BYOD And Social Media Biggest Internal Security Threats To Organisations
ITProPortal, September 23rd, 2016
Mobile Devices Are Hindering IT Departments And Costing Companies
Information Age, September 21st, 2016
IT - Big Data
Smart Data Is Changing The Future Of Big Data
Information Age, September 23rd, 2016
IT - Encryption
How Quantum Computing Could Unpick Encryption To Reveal Decades Of Online Secrets
TechRepublic, September 19th, 2016
IT - Tape
Overcoming The Tape Negatives
Storage-Switzerland, September 22nd, 2016
IT - Java
Oracle pledges continued support for Java and NetBeans
ZDNet, September 20th, 2016
Popular Articles in Vol
223, Issue 3