Vol. 23, #36 - September 10, 2018 - Issue #1198
WServerNews Spotlight: Your IT career
- Editor's Corner
- IT job trends/outlook
- Succeeding in your IT career
- Finding an IT job
- Tip of the Week
- Reset Windows Update Agent
- Admin Toolbox
- Admin Tools We Think You Shouldn't Be Without
- Ask Our Readers - Why are brute force crackers still used? (new question)
- EU may ditch Daylight Savings Time
- Conference calendar
- North America
- New on Techgenix.com
- Ryuk ransomware proving extremely lucrative for creators
- Security factors you cannot ignore when planning your cloud transition
- Soleo IP Relay footprint flaw discovered, being patched
- How Microsoft's ill-fated Project Andromeda may shape future mobile devices
- Using Azure Automation Inventory and Change Tracking services
- Fun videos from Flixxy
- Real Life Tricks
- Nailing To The Rhythm Of The Band
- Acrobatic Gymnastics World Champions 2018
- Range Rover Climbs 999 Steps To 'The Gate Of Heaven'
- More articles of interest
- Use SQS to trigger functions in Lambda - finally
- Evolve IT staff, skill sets for a multi-cloud strategy
- Docker and Kubernetes monitoring tools for microservices
- Jenkins Git integration: GitHub pull request via the Git plugin
- Need help from the IT pro community?
- Send us your feedback
- WServerNews - Product of the Week
- Free Tool for Monitoring Exchange Server Status & Performance
- SAVE THIS NEWSLETTER so you can refer back to it later for helpful tips, tools and resources!
- SEND YOUR FEEDBACK to [email protected] if you have any comments or suggestions!
I've been doing IT now in some shape or fashion for almost 25 years and have gone through several career changes along the way. And I'm sure many of you who subscribe to our newsletter have experienced similar changes in your careers. So we decided this week to focus on IT pro career trends, options, and tips with the hope that some of the articles we've shared below will help you prepare for the next dramatic change you're going to face, whether it's learning a new platform or technology, assuming additional responsibilities, changing your role in your company's org chart, or working for an entirely new business or organization. I encourage you to read some of these articles, and be sure to send me feedback if you have some tips or observations of your own about succeeding in IT as a career. Email me today at [email protected] with your questions and comments. And if you work in the cybersecurity field please be sure to take a look at the new Ask Our Readers question in this issue of WServerNews and shoot us a response if you have one. Thanks!
IT job trends/outlook
2018 IT Career Outlook: One-third of IT pros plan to seek new jobs (SpiceWorks)
5 top-paying IT jobs in 2018 (TechGenix)
Hottest IT jobs and job trends in 2018-19 (TechGenix)
Want to know which IT jobs are on the highway to extinction? Read on (TechGenix)
Data scientist: Yes, you can get 'the sexiest job of the 21st century' (TechGenix)
2018's most crucial job: How to hire a data protection officer (TechGenix)
Succeeding in your IT career
Career Advice for IT Professionals in 2018 (Paul Cunningham)
If not now, when? Taking your IT career to the next level (TechGenix)
7 essential soft skills you must have to excel in your IT career (TechGenix)
CCNA certification: How it can open doors and boost your career (TechGenix)
Finding an IT job
Snag that job: Top career sites for IT professionals (TechGenix)
How to Find a Job in IT With No IT Work Experience (Business News Daily)
A crazy idea: Is psychologist the next hot IT job? (TechGenix)
How to get a job in cybersecurity (TechGenix)
IT job guide: In-demand Blockchain career options for anyone with tech skills (TechGenix)
IT job guide: Want to build a successful AI career? Build up these skills first (TechGenix)
Got any IT pro tips you'd like to share with other readers of our newsletter? Email us at [email protected]
Reset Windows Update Agent
If you ever have problems downloading security fixes from Windows Update this script from the TechNet Script Repository may help. It's a shell script that resets the Windows Update Agent on the computer you run it:
Admin Tools We Think You Shouldn't Be Without
GOT ADMIN TOOLS or other software/hardware you'd like to recommend? Email us at [email protected]
Free tool – Veeam Explorer for Microsoft Active Directory – easy, fast, granular recovery of individual AD objects and entire containers.
Using VMware or Hyper-V? Grab your FOREVER Free copy of Altaro VM Backup!
WBEMTest can be used to test connectivity to remote systems, validate your WMI queries and explore WMI:
SQL Nexus is a tool that helps you identify the root cause of SQL Server performance issues:
Sysinternals Process Monitor now includes a /runtime switch to control headless capture duration, correctly shows picoprocesses, displays details for file system APIs introduced in Windows 10, and includes numerous minor improvements:
A reader named Michael has a question for those of our readers who work in the cybersecurity field:
Something that I do not understand, why brute force password crackers are still a thing. All that a website needs to do is institute a small time out between unsuccessful logins. As an example, for the first 5 login attempts, there is a 15 second delay between each attempt. After that, for the next five attempts, a 30 second delay between each attempt. You don't need to lock down the account, just keep increasing the time out delay until one is waiting a couple of minutes or more between each attempt. This gives the true owner of the account time to figure out what was miss typed, support does not need to use time to unlock accounts, and people with nefarious intentions will give up because the wait time just keeps getting longer and longer between single attempts at guessing a password. Maybe I'm naive, but perhaps some one in the security field would know why this time out strategy is not used.
Can anyone respond by answering that? Email us at [email protected]
Last week's factoid and questionwas this:
Fact: SMS seems to be undergoing a revival
Question: Would you say this is true? Why or why not?
This one generated a couple of responses from our readers. For example Antonio, a Systems Administrator in Sydney, Australia said:
I have to agree with this. My office network is not WhatsApp friendly, it means I would not be able to receive WhatsApp messages while in the office, unless I connect to mobile data all the time instead. By the time I am out of the office coverage, I am already behind the wheel and won't be reading text messages until I arrive to my next destination. There were incidents that people sent me WhatsApp messages about the change of arrangement and did not bother to check if I did receive them at the right time at all, and I only found that messages at the time of arrival. Since then, I insisted all changes must be communicated via SMS (or email) on the same day of the activity.
Fascinating, thanks for sharing. And another reader named Don responded more humorously as follows:
I would say an astounding yes. I use it every day sometime hourly for accessing servers and websites with two factor authentication. Until they come up with something better it's a must-have for me. Although I wish I could shut it off when the boss texts "Where are you?"
Yep! When it comes to your work as an IT pro you can run but you can't hide ;-)
Now let's move on to this week's factoid:
Fact: The European Commission is going to ask the EU parliament and member states to ditch the system of twice-yearly changes of Daylight Savings Time.
Question: This one is directed to you readers who are IT pros living in EU countries: Are you looking forward to having to deal with the consequences of such a change?
Email your answer to [email protected]
>> Got an IT conference happening in North America that you'd like to promote in our newsletter? Email us at [email protected]
Microsoft Ignite -- September 24-28, 2018 in Orlando, Florida USA
IoT Security Summit -- Oct 15-18 in Dallas, Texas
IT/Dev Connections -- Oct 15-18 in Dallas, Texas USA
Gartner Catalyst Conference -- Sept 26-27 in London, England
VMworld Europe -- Nov 5-8 in Barcelona, Spain
Cybersecurity Leadership Summit -- Nov 12-14 in Berlin, Germany
European SharePoint, Office 365 & Azure Conference -- Nov 26-29 in Copenhagen, Denmark
>> Got an IT conference happening in Australia or Asia that you'd like to promote in our newsletter? Email us at [email protected]
No conferences listed at present.
Ryuk ransomware proving extremely lucrative for creators
Ryuk is a ransomware that is doing significant damage in a short time-frame. It is understandable considering that it is an offspring of Hermes.
Security factors you cannot ignore when planning your cloud transition
So you're finally planning your cloud transition! Before you depart, make sure you take into account these security factors to ensure a safe trip.
Millions of disabled Canadians are at risk due to a severe flaw in the Soleo IP Relay, a technology they rely on for telecommunication.
How Microsoft's ill-fated Project Andromeda may shape future mobile devices
Project Andromeda was Microsoft's next attempt to make noise in the smartphone market. Andromeda is probably dead, but its concepts will live on.
Using Azure Automation Inventory and Change Tracking services
While the complexity of deploying Azure Change Tracking service is removed when using a cloud approach, admins still must understand how the service works.
Real Life Tricks
Nailing To The Rhythm Of The Band
What do you do, when the wedding celebration has started, but the roof still needs to be nailed?
Acrobatic Gymnastics World Champions 2018
An incredible gold-medla winning performance by the Russian team at the Acrobatic Gymnastics World Championships in Antwerp (Belgium).
Range Rover Climbs 999 Steps To 'The Gate Of Heaven'
A Range Rover hybrid electric car has become the first vehicle to reach the summit of Tianmen Mountain in China, climbing up 999 steps to Heaven's Gate:
Use SQS to trigger functions in Lambda - finally
The wait is over, as you can now trigger Lambda functions with SQS messages. Follow these steps to get up and running with this new capability.
Evolve IT staff, skill sets for a multi-cloud strategy
To effectively implement and manage a multi-cloud architecture, enterprises first need IT team members who hold a unique mix of technical and business skills.
Docker and Kubernetes monitoring tools for microservices
Learn more about what it takes to manage your containers, and explore a wide range of monitoring tools specifically suited for Docker and Kubernetes.
Jenkins Git integration: GitHub pull request via the Git plugin
This Jenkins Git integration tutorial demonstrate how to create a freestyle build job that performs a Jenkins GitHub pull request. It's an example of the Jenkins Git plug-in in action.
WServerNews goes out each week to more than 500,000 IT pro subscribers worldwide! That's a lot of expertise to tap into. Do you need help with some technical problem or are looking for expert advice on something IT-related? Ask Our Readers by emailing your problems and/or questions to us at [email protected]
>> Got feedback about anything in this issue of WServerNews? Email us at [email protected]
Free Tool for Monitoring Exchange Server Status & Performance
WServerNews - Editors
Mitch Tulloch is Senior Editor of WServerNews and is a widely recognized expert on Windows administration, deployment and virtualization. Mitch was lead author of the bestselling Windows 7www.mtit.com.Resource Kit and has been author or series editor for almost fifty books mostly published by Microsoft Press. Mitch is also a ten-time recipient of Microsoft's Most Valuable Professional (MVP) award for his outstanding contributions in support of the global IT pro community. Mitch owns and runs an information technology content development business based in Winnipeg, Canada. For more information see
Ingrid Tulloch is Associate Editor of WServerNews and was co-author of the Microsoft Encyclopedia of Networking from Microsoft Press. Ingrid is also manages research and marketing for our content development business and has co-developed university-level courses in Information Security Management for a Masters of Business Administration program.