News about Oracle's Solaris and Sun Hardware
System News
Mar 10th, 2008 — Mar 16th, 2008 Generate the Custom HTML Email for this Issue
System News System News for Sun Users
Volume 121, Issue 2 << Previous Issue | Next Issue >>
Sections in this issue:
click to jump to section


Java Technology
x
Java SE 6 Update 5 Now Available
Security Updates Also Released to Fix Critical Java Flaws
Java SE 6 Update 5 is the latest release for this Java platform. One of its improvements is the ability to register JDK installations through Sun Connection so installed JDK instances can be tracked online along with other Sun software and hardware assets through the Sun Inventory Channel. It also contains fixes for one or more security vulnerabilities.
Sun to Build JVM for Apple iPhone, iTouch if Licensing Permits
Release Expected Some Time After June
Sun plans on building a JVM (Java Virtual Machine) for Apple iPhone and the iTouch with intentions of releasing the JVM after June, enabling Java applications to run on Apple's popular mobile devices. Eric Klein, vice president of Java marketing at Sun, said the JVM will be made available for free "as quickly as possible" after Apple releases the final version of the iPhone 2.0 software and SDK in June, if Apple's licensing permits.
Gosling Looking Forward to Blu-ray Development
Implementations of Profile 2.0, JavaFX Could Take Spec to New Level
Vice President and Sun Fellow James Gosling says Blu-ray and its Java parts are pretty substantial, and software upgradeable players, which are primarily PlayStation 3, will be implementing Profile 2.0 spec soon, adding a very compelling component: "There's actually this Profile 2.0 spec for Blu-ray, which almost all of the Blu-ray players out now don't implement ... that adds all this networking ability."
JavaLobby Highlights 10 Java Apps Deemed Amazing
Sun SPOT, JavaFX Mobile, Project Looking Glass Make the List
Here's a list of ten unusual applications the Java programming language has been put to compiled by Ryan de Laplante of Javalobby. As he says, "Java is such a great language and platform for any kind of application. It is open, fast, powerful, runs on any platform, and there are more jobs for Java than any other programming language. After reading more FUD and Java bashing from Ruby land I thought it would be fun to put together a list of truly amazing uses of Java that covers a wide spectrum."
Java Champion Cay Horstmann on Aspects of Java
Training Developers; Open Source; the Future of Java
Java Champion Cay Horstmann shared his views on the Java programming language in an interview with Janice J. Heiss.
Open-Source Java Offers Affordable Alternative for DTV Conversion
Sun and Brazil's SBTVD to Deliver Content Platform Based on Java Technology
An organization handling digital television (DTV) conversion in Brazil is joining with Sun to develop an open-source content platform based on Java technology for the conversion of television applications and services for the country. The agreement between Sun and the Forum do Sistema Brasileiro de TV Digital Terrestre (Forum SBTVD) is expected to enable global companies to use Java technology in creating and implementing interactive TV services and interface tools for Brazilian customers by adapting HDTVs and mobile devices to the Brazilian ISDB-T digital TV standard.
Servers
x
John Fowler Digs in for the Long Haul at Sun Storage and Systems
Sees Open Software, Technologies as the Key to Market Success
John Fowler, EVP of Systems at Sun, sees evidence of increasing market share in Sun's performance against its rivals in that sector and, in an interview with Mary Jander indicates that Sun will follow the course that it has set in the datacenter connectivity, tape storage and open source software.
Sun Fire X4150: Lots of Power in a 1U Chassis
PC Magazine Finds Little to Compare Among Competition's Products
PC Magazine's Oliver Rist had a go at the new Sun Fire X4150, which was equipped with two quad-core Intel E5450 Xeons running at 2.83 GHz plus 16GB of RAM and four 136GB 10,000-rpm SAS drives attached to an Adaptec RAID controller. There was room, he writes, for an additional four 2.5-inch SAS drives and RAM that was expandable to 64GB on a 1U footprint. Rist compared the X4150 in passing to the new MacBook Air and clearly favored the Sun solution.
Storage
x
Sun StorageTek Crypto Key Management System 2.0
Centrally Authorizes, Secures and Manages All Encryption Keys
Sun StorageTek Crypto Key Management System (KMS) 2.0 is the first key management solution to deliver a single, centralized key encryption architecture for multi-vendor tape drives, including the HP LTO, Sun StorageTek T9840D and Sun StorageTek T10000 products. KMS 2.0 offers enhanced network access and device support, and is designed to support up to 30 times more devices than competing solutions.
Recent Advances in Sun's Open Archive Solutions
Market Grows as Customers Discover Increasing Archival Need

The demand for open archive solutions is growing, Leslie T. O'Neill notes in a recent " "What's New" feature that considered the changing nature of the market. Dave Kenyon, Sun's VP of Storage Product Management and Marketing Operations, characterized it as a three-faceted one that involves "...storing the exploding amounts of data generated on the network, retaining the data long enough--often forever--to comply with burgeoning government regulations and business requirements, and being able to efficiently search and retrieve that data, all within flat IT capital and operating budgets."

Top10
x
Top Ten Articles for last Issue
Volume 121 Issue 1; Volume 120 Issue 2, 3 and 4

During the last quarter (Dec 07, Jan 08, Feb 08), the web site for this newsletter had 130k unique visitors who viewed 281k pages.

Each week, we determine which articles have been most frequently referenced by logged-in subscribers to provide you with a list of the most popular articles for the last 4 issues. The top 10 articles for last week, Vol 120 Issue 4, were:

  • Sun Configuration Diagram Templates to Quickly Document a System Configuration [19306]
  • Sun Investing in Python Technology [19577]
  • Virtualization's Breakeven Point [19483]
  • Sun Elects to Support VMware on Its Hardware [19555]
  • An Introduction to the Features of Sun Integrated Lights Out Management [19554]
  • Sun's Revenue Growth for Disk Storage Systems Rises 16.1% [19597]
  • VMware Infrastructure Product Suite on Sun x64 Servers [19534]
  • Sun Modular Datacenter on United States and European Tour [19493]
  • Five Significant Advantages Virtualization Brings to Enterprises [19431]
  • Examining LDoms Virtual Disks [19424]
    Security
    x
    "Governance, Risk, and Compliance: A Practical Guide to Points of Entry"
    White Paper Suggests Taking Implementation One Step at a Time
    For an enterprise to answer and implement the numerous possible initiatives in governance, risk and compliance (GRC) it is first necessary to know what is necessary and what is possible. The authors of the white paper "Governance, Risk, and Compliance: A Practical Guide to Points of Entry" break these initiatives down into their components in order to consider them singly in the order of easiest to most difficult to plan for and implement.
    NSA to Work with Sun, OpenSolaris Community to Enhance Security
    Based on Flux Advanced Security Kernel (Flask) Architecture
    United States' National Security Agency (NSA) will be working with Sun and the OpenSolaris community to develop security enhancements to complement the security benefits of the mandatory access controls provided by the Solaris Trusted Extensions feature. The plan is to integrate an additional form of mandatory access control (MAC), based on the Flux Advanced Security Kernel (Flask) architecture.
    How Automated Role Management Can Save Businesses From Disaster
    Three Areas Identified Where ID and Role Management Can Help Enterprises
    Why is identity management infrastructure and in particular automated role management critical to businesses today? John Barco, director of product marketing and product management for Sun, and Sachin Nayyar, CEO and founder of Vaau, explain how three major business disasters can be avoided with the implementation of these types of solutions.
    Outsourcing Identity Management Infrastructure
    And Not Just Login Sessions
    Identity management infrastructure doesn't always have to live in-house, write Eve Maler and Marina Sum in a Sun Developer Network piece, where they suggest that user login sessions and even user attribute data might handily be given to an external source. In a nutshell, they are encouraging the distribution of identity information and tasks across security domains, which gives deployers the latitude to focus on their actual business.
    Trending in
    Vol 231, Issue 4
    Trending IT Articles