The today’s IT News of Computerworld , IDG & Network World at 15. August 2018

Computerworld First Look:

Blockchain phase 2: Will it scale?

As blockchain grows in popularity, so does the conundrum of how to scale it while maintaining or boosting performance so it can compete with today’s transaction networks. Read More ▶

WHITE PAPER: Hitachi ID Systems, Inc.

Securing Privileged Access with Hitachi ID Privileged Access Manager (PAM)

Privileged accounts, like their name suggests, are accounts designed to provide broad access to systems and data. They are an integral part of every IT infrastructure and play a key role in a large variety of day-to-day operations. Read More ▶

Jonny Evans: How Apple’s AI imaging vision may save lives

Apple’s developing machine intelligence platforms enable future evolution in computer imaging and healthcare Read More ▶

Bolster your cloud understanding with this AWS certification training.

Amazon Web Services is one of today’s top cloud computing platforms, so certified cloud professionals will likely run into AWS at some point in their careers. It’s never too late to be prepared and learn the fundamentals of AWS cloud computing; this AWS Solution Architect Certification Training Bundle will show you how for $49. Read More ▶

JR Raphael: A hidden Android Pie security setting everyone should enable

Give yourself added peace of mind with this powerful but buried security option in Google’s Android 9 Pie release. Read More ▶

ICYMI: First look: Office 2019’s likeliest new features

Microsoft has been fairly quiet about what’s coming in Office 2019, but features that have rolled out to Office 365 provide clues. We explore the likeliest additions to Office 2019. Read More ▶

T-Mobile low priced unlimited wireless plan is what many users want

Every user wants unlimited wireless data services. But not every user is interested in things like Netflix or international access. Now, T-Mobile introduces a lower cost unlimited wireless data plan that will save customers money by not giving them all the bells and whistles. Read More ▶




ComputerWorld Daily:

WHITE PAPER: Hitachi ID Systems, Inc.

Securing Privileged Access with Hitachi ID Privileged Access Manager (PAM)

Privileged accounts, like their name suggests, are accounts designed to provide broad access to systems and data. They are an integral part of every IT infrastructure and play a key role in a large variety of day-to-day operations. Read More ▶

GeForce GTX 2080 teased and Threadripper 2 review round up | The Full Nerd Ep. 63

In today’s Full Nerd, the gang covers Nvidia’s breaking Turing GPU, Quadro RTX and GeForce RTX 2080 news, and Gordon talks about his review of AMD’s 2nd Generation Threadripper 2990WX. Watch Now ▶

WHITE PAPER: Bronze Drum Consulting

How Powerful New Technologies are Powering a Real-Time Revolution in Capital Markets

Discover how machine learning, informed by rich, streaming data, is helping business leaders transform financial services is this white paper from Bronze Drum Consulting. By leveraging cloud services, financial service firms now have the power to put real-time streaming data to work. Read More ▶

Subscribe to Computerworld First Look

Sign up for our popular daily newsletter. You’ll get Computerworld’s top stories, first thing in the morning. We deliver breaking news and in-depth features on topics like Windows 10 and enterprise mobility, as well as authoritative analyses of moves made by tech companies like Google, Microsoft, Apple, IBM and HP. Sign up now ▶

Get the Deep Technology Insights You Need

Get ongoing access to our exclusive Insider content — in-depth articles available only to Insider members. You get access not only to Computerworld’s Insider content but to selected Insider content from InfoWorld, CIO.com, Network World, CSO, and other IDG publications. Sign up at no cost today! ▶




IDG’s Daily News:

Cloud computing 2018: How enterprise adoption is taking shape

Research: Nine out of ten companies will have some part of their applications or infrastructure in the cloud by 2019, and the rest expect to follow by 2021. Here’s how they’re making the shift  Read More ▶

WHITE PAPER: Hitachi ID Systems, Inc.

Securing Privileged Access with Hitachi ID Privileged Access Manager (PAM)

Privileged accounts, like their name suggests, are accounts designed to provide broad access to systems and data. They are an integral part of every IT infrastructure and play a key role in a large variety of day-to-day operations. Read More ▶

AI in cybersecurity: what works and what doesn’t

Much of what we hear about artificial intelligence and machine learning in security products is steeped in marketing, making it hard to know what these tools actually do. Here’s a clear-eyed look at the current state of AI & ML in security. Read More ▶

3 CRM use cases: Which is right for you?

Let’s look at the big three CRM use cases from 50,000 feet so you can see where your organization’s processes and people fit. Read More ▶

15 APIs every developer should know

>From AI and AR to transportation and telephony, these web APIs open up all kinds of intriguing possibilities to developers Read More ▶

Why you should consider crowdsourcing IT security services

Whether you need a pentesting team, a bug bounty program, or a vulnerability disclosure plan, several crowdsourcing platforms can take the risk and pain from the process. Read More ▶

12 signs your strategic partnership has gone wrong

The most successful IT partnerships are continuously evaluated. Here’s how to tell a strategic IT relationship is on the rocks — and how to get it back on track. Read More ▶

Blockchain phase 2: Will it scale?

As blockchain grows in popularity, so does the conundrum of how to scale it while maintaining or boosting performance so it can compete with today’s transaction networks. Read More ▶

Looking to upskill IT staff? An LMS may be key

Learning management systems (LMS) are moving out of the academic realm and finding a niche within enterprise IT departments to improve skills acquisition and boost engagement. Read More ▶

WHITE PAPER: Bronze Drum Consulting

How Powerful New Technologies are Powering a Real-Time Revolution in Capital Markets

Discover how machine learning, informed by rich, streaming data, is helping business leaders transform financial services is this white paper from Bronze Drum Consulting. By leveraging cloud services, financial service firms now have the power to put real-time streaming data to work. Read More ▶




Networld Daily:

Intel continues to optimize its products around AI

Intel made a series of processor and memory announcements aimed at the data center and artificial intelligence, including new Xeon chips and its Intel Optane DC persistent memory. Read More ▶

White Paper: Bronze Drum Consulting

How Powerful New Technologies are Powering a Real-Time Revolution in Capital Markets

Discover how machine learning, informed by rich, streaming data, is helping business leaders transform financial services is this white paper from Bronze Drum Consulting. By leveraging cloud services, financial service firms now have the power to put real-time streaming data to work. Read More ▶

High-speed Ethernet bargains help meet data center needs

Cisco, Juniper, Arista, and HPE vie to sell more enterprise data-center high-speed Ethernet, which is needed to handle traffic generated by smarter applications, IoT devices, and video. Read More ▶

$29 For Two Etekcity Smart Plugs With Alexa Compatibility – Deal Alert

Turn your appliances on/off remotely from your mobile device, or with your voice via Alexa. Or automate with a schedule. The plug also monitors and helps control energy usage, and the slow drain that occurs even when devices aren’t in use. Read More ▶

What is DHCP, and why might its days may be numbered as IPv6 grows?

Dynamic host configuration protocol (DHCP) still assigns dynamic addresses for IPv4 networks, but two newer protocols – SLAAC and DHCPv6 – are vying to do the job for IPv6. Read More ▶

Efficient container use requires data-center software networking

In software-defined data centers, software networking can help container environments talk to each other and maintain network policies without needing admins to respond to each change. Read More ▶

What is data deduplication, and how is it implemented?

By eliminating redundant blocks of data within a dataset – deduplication – enterprises can reduce the size of backups 90-99%. Read More ▶

Examining partitions on Linux systems

Linux systems provide many ways to look at disk partitions. Here’s a look at commands you can use to display useful information — each providing a different format and with a different focus. Read More ▶

Data center power efficiency increases, but so do power outages

An Uptime Institute survey finds the power usage effectiveness of data centers is better than ever. However, power outages have increased significantly. Read More ▶

Get 3 Years of NordVPN Service for Just $2.75 Per Month

Safeguard yourself against snoops, and access blocked content with this no-log VPN service. NordVPN is just $2.75 per month for 3 years, if you sign up right now. Read More ▶

Are microservices about to revolutionize the Internet of Things?

Microservices have helped reinvent software development, and now a new startup says it’s going to combine them with edge computing to transform the Internet of Things (IoT). Read More ▶

White Paper: Sophos

Firewall Best Practices to Block Ransomware

Recent ransomware attacks like Wanna and Petya have spread largely unchecked through corporate networks in recent months, extorting money to restore your data and regain control of your computers. Modern firewalls are purpose-built to defend against these kinds of attacks, but they need to be given an opportunity to do their job. Read More ▶

Join the Network World Communities

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World’s LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).
Network World on Facebook ▶
Network World on LinkedIn ▶

Get the Deep Technology Insights You Need

Get ongoing access to our exclusive Insider content — in-depth articles available only to Insider members. You get access not only to Network World’s Insider content but to selected Insider content from Computerworld, CIO.com, InfoWorld, CSO, and other IDG publications. Sign up at no cost today! ▶

https://i1.wp.com/diewebservisten.com/wp-content/uploads/2018/08/ITnews-3.jpg?fit=1024%2C576https://i1.wp.com/diewebservisten.com/wp-content/uploads/2018/08/ITnews-3.jpg?resize=150%2C150MichaelNewsaccess,accounts,apple,blockchain,hitachi,more,privileged,read,scale,systemsThe today's IT News of Computerworld , IDG & Network World at 15. August 2018 Computerworld First Look: Blockchain phase 2: Will it scale? As blockchain grows in popularity, so does the conundrum of how to scale it while maintaining or boosting performance so it can compete with today's transaction networks. Read...The world own the knowledge