News about Oracle's Solaris and Sun Hardware
System News
Jan 16th, 2012 — Jan 22nd, 2012 Generate the Custom HTML Email for this Issue
System News System News for Sun Users
Volume 167, Issue 3 << Previous Issue | Next Issue >>
Sections in this issue:
click to jump to section


Oracle
x
Now Available: Oracle TimesTen In-Memory Database 11g Release 2
Improves Performance of Oracle Communications Billing and Revenue Management, Oracle Exalytics In-Memory Machine
Oracle's application-tier in-memory database Oracle TimesTen In-Memory Database 11g Release 2 is now available. The release incorporates significant performance and scalability improvements for real-time online transaction processing (OLTP) applications and introduces new functionality to support analytic applications with real-time in-memory data management. The solution now ships with Oracle Communications Billing and Revenue Management, enabling that solution to achieve significantly faster response time, higher throughput and can support more subscribers than prior releases. Furthermore, Oracle TimesTen In-Memory Database for Exalytics will also be available for Oracle Exalytics In-Memory Machine as an application-tier in-memory database cache.
SPARC
x
Netra SPARC T4-2 SPECjvm2008 World Record Performance
The Netra SPARC T4-2 server demonstrates 41% better performance than the SPARC T3-2 server
Oracle's Netra SPARC T4-2 Server equipped with two SPARC T4 processors running at 2.85 GHz set a world record result of 454.52 SPECjvm2008 Peak ops/m on the SPECjvm2008 benchmark. This result surpassed the previous record, which was run on a similar product, Oracle's SPARC T4-2 server. This level of performance is 41% better than the SPARC T3-2 server and similar in performance to Oracle's SPARC T4-2 server. The Netra SPARC T4-2 server with hardware cryptography acceleration greatly increases performance with subtests using AES and RSA encryption ciphers. There are no SPECjvm2008 results published by IBM on POWER7 based systems.
Exadata
x
Disaster Recovery for Oracle Exalogic Elastic Cloud with Oracle Exadata Database Machine
White Paper Explains the Function of Oracle Fusion Middleware Disaster Recovery
The Oracle white paper "Disaster Recovery for Oracle Exalogic Elastic Cloud with Oracle Exadata Database Machine" deals with a subject much on the minds of users lately: disaster recovery with the Oracle Exalogic Elastic Cloud. The principles under discussion apply to deployments on an Oracle Exalogic Machine with an Oracle Database and to standalone deployments on an Oracle Exalogic Machine. Oracle Fusion Middleware Disaster Recovery -- the heart of Maximum Availability Architecture -- uses storage replication technology for disaster protection of Oracle Fusion Middleware middle tier components, supporting hot-pluggable deployments and offering compatibility with third-party vendor-recommended solutions.
Virtualization
x
PeopleSoft OVM Red Paper
PeopleSoft Oracle Virtual Machine Templates Development and Customization Guide
"PeopleSoft Oracle Virtual Machine Templates Development and Customization Guide" is an Oracle red paper intended for technical users, installers, system administrators, and programmers responsible for leveraging Oracle Virtual Machine (OVM) as a deployment infrastructure for PeopleSoft applications. It provides insight into the construction of PeopleSoft VM templates in order to help users customize and extend the delivered templates. The document can also provide guidance for the creation of VM templates needed to run on other hypervisors. The contents of the paper have not been subjected to any formal Oracle test, nor has the paper been officially reviewed.
IT - Storage
x
Too Much of a Good Thing
CIO Insight (January 12, 2012)
"Experienced CIOs see the opportunities presented by 'Big Data' in context. They know that maximizing big data to deliver real business results will require a focused strategy that leverages and protects their existing data assets, develops new capabilities that are production-ready and reusable, and is able to manage the deluge of new data that will be created in the process..."

Data is both a boon and the bane of every company; too little and you starve, too much and you drown. The secret is getting the level just right and that decision is based on business needs. Here's "What Every CIO Needs to Know to balance the needs of the company and the resources that are available.

Moving Up the Tier Ladder
Search Storage (January 16, 2012)
" Lots of IT shops use data deduplication for backups, but far fewer use the technology with primary storage. For what types of data does deduplication make sense with primary storage? ..."

We all know abut the dramatic savings that dedupe can have on backup space and data is not often accessed. Serious questions need to be asked before we move dedupe into Tier 1 storage. There may be a place in "Primary Storage Deduplication Helping with VMs and Virtual Desktops." The questions have to do with rebuild times and vendor change.

Developing a Sound Data Strategy
TDWI (January 17, 2012)
"As data warehouse practitioners, one of our fundamental objectives is to help our organizations turn data into actionable information in order to achieve goals that include improving the decision-making process, identifying new opportunities, and recognizing issues and problems in time to take corrective action. ..."

As the old saying goes, "Hope is not a strategy". If your strategy is based on hoping you have the right data for processing, disaster recovery and business continuity you have a big problem. By the way, save everything is not a good strategy either. Here are "10 Key Elements of Your Data Strategy" that need to be addressed and incorporated sooner than later.

IT - Technology
x
Memory Breakthrough
InfoStor (January 13, 2012)
"It takes about one million atoms to store a single bit of information, unless you're a scientist with IBM Research. IBM scientists reported Thursday that they had successfully demonstrated the ability to store information in as few as 12 magnetic atoms ..."

Moore’s Law has gotten a new lease on life as "IBM Engineers Atomic-Scale Memory." How about reducing the number of atoms needed to store a single bit by 100,000 give or take a few atoms. IBM Research has demonstrated the ability to store a single bit on 12 atoms, currently this takes 1,000,000 atoms. WOW!

MySQL
x
Download MySQL Enterprise Backup 3.7.0
Available Immediately for Enterprise Customers
MySQL Enterprise Backup 3.7.0 (MEB 3.7.0) is available with several advanced features that include:

  • Redo Log only Incremental Backup
  • Incremental Backup without specifying LSN
  • Validation of Backup Image using checksums
  • Hot Backup of InnoDB .frm files
  • Performance Improvements and
  • Enhancements for Third-Party Media Managers

Users can download the MEB 3.7.0 package from the Oracle Software Delivery Cloud web site. MySQL Enterprise customers can deploy MEB 3.7.0 immediately, while users without a MySQL Enterprise license can evaluate MEB 3.7.0 free for 30 days with the request send feedback to mysql-backup_ww@oracle.com.

Linux
x
How to Add Storage Capacity to Your Oracle Linux Environment
Integrating iSCSI LUNs and Making Them Available to the Oracle Linux Server

The procedure for using Sun ZFS Storage Appliance iSCSI LUNs in an Oracle Linux environment to augment storage capacity is the subject of an oracle.com post by Andrew Ness. Ness discusses how to install the Oracle Linux iSCSI initiator on an Oracle Linux server and how to configure an iSCSI LUN on the Sun ZFS Storage Appliance so the LUN can be accessed by an Oracle Linux server using iSCSI protocol. Ness provides procedures for configuring the LUN and then describes how to prepare the LUN for use by the Oracle Linux server.

IT - Cloud
x
Hot Cloud Subjects for 2012
IT Business Edge (January 18, 2012)
"The cloud can be a godsend for enterprises struggling to keep up with burgeoning data loads and high user demand. In the blink of an eye, you gain access to all the resources you desire, and at a fraction of the cost of building out additional physical infrastructure..."

Cloud Security is finally getting attention and deservedly so. This is no fault of the Cloud as technology often outruns some of the basic protective mechanisms needed to ensure information is protected. Here are "Eight Cloud Security Predictions for 2012" that end users, Cloud providers and vendors to the Cloud will be looking at in the coming years.

A Candid Observation
Virtualization Review (January 11, 2012)
"Enough with the Truth Already: A Cloud Conversation with Jon Toigo ..."

One of the things I have learned from meeting Jon Toigo is that what you see on stage is exactly what you see in private, candid, brutally honest insights. A lot of vendors don’t care for Jon for one simple reason; he calls them as he sees them. In the extensive article "Enough With the Truth Already; A Cloud Conversation with Jon Toigo" we get a two paragraph statement that exemplifies why the cloud is never going to match up with mainframes.

    Hot Security Subjects for 2012
    IT Business Edge (January 18, 2012)
    "The cloud can be a godsend for enterprises struggling to keep up with burgeoning data loads and high user demand. In the blink of an eye, you gain access to all the resources you desire, and at a fraction of the cost of building out additional physical infrastructure ..."

    Cloud Security is finally getting attention and deservedly so. This is no fault of the Cloud as technology often outruns some of the basic protective mechanisms needed to ensure information is protected. Here are "Eight Cloud Security Predictions for 2012" that end users, Cloud providers and vendors to the Cloud will be looking at in the coming years.

    Hype vs. Adoption
    Channel Insider (January 12, 2012)
    "While the hype around cloud computing was in full swing in 2010 and businesses stuck their toes in the water in 2011, this year looks like the one where cloud computing will become real at more companies ..."

    There is a wide chasm between vendor hype and market adoption; such was the case in 2011 for the cloud. Looking at "The State of the Cloud: Getting Real in 2012" we may find that this year is when the hype gets toned down from doses of reality and the market starts to adopt the technology for what the cloud can do along with the limitations and risks.

    IT - CxO
    x
    What's Keeping You Up at Night
    ComputerWorld (January 18, 2012)
    "Analytics and business intelligence will be the top technology priorities for CIOs this year, according to Gartner Inc.'s annual survey of IT executives ..."

    CIOs are like jugglers of glass balls; there are always items in the air and if one drops the results could be disastrous. The annual Gartner survey of "The Top 10 Tech Priorities of CIOs" show a change from last year; for one thing, the Cloud is no longer number one.

    What Goes Around Comes Around
    NetworkWorld (January 14, 2012)
    "Are you prepared as global IT outsourcers shrink onshore staff? These tips will help you keep projects moving as offshore IT service provides cut back on the on-site staff that used to work as liaisons between customer and provider ..."

    Reports from India indicate that the largest providers are cutting back; if your projects are based offshore there may be dark clouds ahead? Here are "5 Tips To Keep IT Outsourcing On Track as Global Providers Cut" back on liaisons not based in the country and other areas.

    vBeers-SF
    x
    vBeers South Florida - Dubliner, Mizner Park, Boca Raton
    Wed January 25th, 5pm to 9pm
    Join us for the next South Florida vBeers! Meet with local Virtualization enthusiasts and talk about technology, theory, politics of the industry or whatever else gets your propeller spinning.

    NO marketing blather, NO Sponsors, and NO PowerPoint but you do have to buy your own drinks!

    This is a great opportunity to meet with other virtualization enthusiasts and professionals and enjoy discussing all things virtualization, and in fact anything else that comes up in conversation…

    • The Dubliner, Boca Raton, FL
    • Mizner Park: 435 Plaza Real, Boca Raton FL 33432
    • Wednesday, January 25th
    • 5pm to 9pm — arrive and depart any time

    Relax with your technical colleagues!

    Free parking. Use parking lot A - Enter from US 1.

    Please share this invitation with your IT colleagues.

    Join the vBeers South Florida LinkedIn group to learn about future events.

      IT - Networks
      x
      One Stop IPv6 Info
      NetworkWorld (January 12, 2012)
      "Looking for practical, non-biased advice about how to deploy IPv6? The Internet Society is launching a new Web portal that will be a central resource for standards documents, best practices, case studies and other useful information for network engineers planning to adopt IPv6, the next-generation Internet Protocol ..."

      IPv6 is coming and if you aren’t looking at an implementation plan now you will be on the short end of the pier when the ship departs. Getting information is tough as everyone has a story, hype and version of what you need to know. Now there is a site that offers "Unbiased Info About IPv6" through a new portal dubbed Deploy360.

      IT - Security
      x
      When Your Partner Goofs
      Dark Reading (January 6, 2012)
      "Vendors and contractors play an important role in your business. But what happens when a partner’s systems are compromised? Here are a few tips ..."

      No company is an island unto itself; there are partners ranging from small bit players to major trusted business partners. So "What Do You Do When Your Business Partner is Breached?" Using these tips you will be able to respond when your partner calls and says "Houston, we have a problem!" Hopefully you won't be left to fend for yourself wondering how bad you are affected.

      Sooner or Later You Will be In the Crosshairs
      Enterprise Systems Journal (January 16, 2012)
      "Manage the Breach or the Breach Will Manage You - Several high-profile security breaches occurred in 2012. What’s ahead for security administrators in 2012, and how will IT respond? ..."

      Thinking your company is too small to be a target can be the worse stance you can take; 9 out of 10 companies hacked are names no one would recognize. The bottom line is either you "Manage the Breach or the Breach Will Manage You." These five suggestions may just give you a heads up to either prevent or control the incident; either way you are ahead.

      Pay Me Now or Later
      NetworkWorld (January 13, 2012)
      "If your company were hit with a cyber attack today, would it be able to foot the bill? The entire bill, including costs from regulatory fines, potential lawsuits, damage to your organization's brand, and hardware and software repair, recovery and protection? ..."

      Cyber crime and data loss are becoming all to common, just last week Zappos reported the loss of 24 million customer records; at $214 per record, that comes out to almost $5 Billion. "Cyber Insurance Offers IT Peace of Mind – Or Not" looks at what you can and cannot expect if you buy insurance to cover this type of loss.

      Knee Jerk or Good Planning
      NetworkWorld (January 17, 2012)
      "Online shoe and clothing retailer Zappos has taken assertive steps after breach, but is it enough? ..."

      The release of 24 million records at Amazon’s Zappos poses a huge problem in terms of costs, reputation and lost business. Was the "Zappos Data Breach Response a Good Idea or Just Panic Mode?" We know the direct cost could be close to $5Billion (24MM x $217) but as for the reputation and lost business we will have to wait and see the public’s reaction. Have you asked yourself what is my plan if sensitive data is released? If not, you need to!

      A Lack of Consistency
      eWeek (January 11, 2012)
      "Data Recovery Services Pose Data Breach Risk Without Security Guarantees ..."

      A whopping 87 per cent of companies have used an outside source to recover data. The problem is that "Data Recovery Services Pose Data Breach Risk Without Security Guarantees." You may have very tight guidelines about you data but your third party vendor may not even come close to meeting your standards for protecting data and notifying you if there is a problem.

      IT - Careers
      x
      Become the Last One they Release
      InfoWorld (January 17, 2012)
      "12 effective habits of indispensable IT pros; Ditch the slackers, take on dirty work, do it with data -- here's how to get the inside track on a highly rewarding career in IT ..."

      No one likes to keep looking over their shoulder to see the man with the axe is closing in; the answer is to keep you head down, keep paddling and develop several of the "12 Effective Habits of Indispensable IT Pros." The most effective one in my book is number 8; you have nothing to lose and everything to gain.

      IT - Compliance
      x
      Errors Using PCI
      Dark Reading (January 16, 2012)
      "As data warehouse practitioners, one of our fundamental objectives is to help our organizations turn data into actionable information in order to achieve goals that include improving the decision-making process, identifying new opportunities, and recognizing issues and problems in time to take corrective action ..."

      If your company processes credit cards you fall under the Payment Card Industry guidelines. Failing a PCI audit can put your company at risk. Here are the "Top 10 PCI Compliance Mistakes" that will help correct problems and insure your PCI audits do not have any surprises.

      Storage
      x
      Using Deduplication as a Primary Storage Technology
      Look for Commonality of Data, Gartner VP Advises
      Deduplication as a for primary storage tool is discussed in Carol Sliwa's searchstorage.com interview with Dave Russell of Gartner Inc. In both backup and primary storage, Russell asserts, commonality of data is the chief consideration. If an embedded technology is available for dedup use in primary storage, Russell recommends its use; if not, then an attached appliance will serve the purpose. NetApp's ability to perform deduplication/compression on primary storage data makes it attractive technology, he says. When choosing vendors consider the possible need to reinflate compressed data when using one vendor for backup and another for primary storage.
      New ZFSSA firmware release
      2011.1.1.0 software release

      ZFSSA software release 2011.1.1.0 is available, Steve Tunstall blogs. Users will need 2010.3.2.1 or greater to upgrade to 2011.1.1. This major software update contains numerous bug fixes and important firmware upgrades, Tunstall reports, then lists the various new features in the release, among which are:

      • Significant cluster rejoin performance improvements
      • Significant AD Domain Controller failover time improvements
      • Significant zpool import speed improvements
      • Significant NFS, iSER, iSCSI and Fibre Channel performance improvements due to elimination of data copying in critical datapaths
      • ZFS RAIDZ read performance improvements
      • Significant fairness improvements during ZFS resilver operations
      IT - Database
      x
      A Huge Oracle Problem
      InfoWorld (January 17, 2012)
      "A design decision made by Oracle architects long ago may have painted some of Oracle's largest customers into a corner. Patches have arrived, but how much will they correct? ..."

      InfoWorld has been sitting on story before revealing a "Fundamental Oracle Flaw" so that Oracle could fix the problem. The patch was released at 1pm PT on January 17. The problem had to do with what’s called the Systems Change Number (SCN), this is the linchpin that makes sure all information is synced and current within one database or several databases sharing information. All Oracle DBAs must apply the hot-backup patch, for older databases this may mean an upgrade.

      IT - Mobile
      x
      Adapting to BYOD
      InfoWorld (January 16, 2012)
      "IT departments in the age of mobile computing must adapt to newly empowered users who select not only their own devices but their applications as well. This adapation -- as difficult as it may seem -- has a strong benefit: Enabling a modern workforce ..."

      IT has one of two options for BYODs; adapt or die. The reason is that employees are going to use whatever tool(s) they have (approved or not) to get their jobs done effectively and efficiently. To that end the "BYOD Movement is Forcing IT to Adapt." The question is one of attitude and the successful IT departments will view BYOD’s as true benefits to be exploited with one huge advantage…IT did not have to pay for the devices.

      Top10
      x
      Top Ten Articles for last few Issues
      Vol 167 Issues 1 and 2; Vol 166 Issues 1, 2, 3 and 4; Vol 165 Issue 4 and 5
      We track how frequently each article is viewed on the web site to determine which the readers consider the most important. For last week, the top 10 articles were:

      • The Oracle Big Data Appliance
      • Activity of the ZFS Adaptive Replacement Cache
      • Ops Center 11g Update 3 Is Released
      • How to Use Oracle Solaris 11 Network Virtualization and Resource Management
      • New SPARC T4-Based Carrier-Grade Servers Deliver 5x Performance Boost
      • Automated Diagnosis for Sun SPARC Servers Offered by My Oracle Support
      • 2012 Virtualization Review Reader's Choice Awards
      • Anatomizing an Oracle Solaris Binary File
      • Nexenta Trashes Win8 Storage Spaces
      • Oracle Database Firewall Extended to Support MySQL

      The longer version of this article has list of top ten articles for the last 8 weeks.

        LibreOffice
        x
        LibreOffice 3.4.5 Available for Download
        Newest Release Features Improved Program Stability
        In its latest release LibreOffice 3.4.5 includes several bug fixes and an improved level of stability. The Document Foundation, the parent organization of LibreOffice, reports that the solution won InfoWorld's BOSSIE Award 2011 as the Best of Open Source Software and the Open World Forum Experiment Award of Most-Popular Software. Downloads of LibreOffice 3.4.5 are immediately available, as are extensions.
        Security
        x
        Solaris 11 Compliance with DISA Security Guidance
        Jim Laurent Satisfied with Compliance Effected by Release of Solaris 11
        In his post on Solaris 11 compliance with DISA Security guidelines Jim Laurent cautions readers not to construe his comments as a declaration of compliance by either Oracle or DISA but rather a casual review of Solaris 11 against current DISA Security Guidelines. Laurent notes that an issue raised in his review a year ago has now -- with the release of Solaris 11 -- been fixed. That was the inability to mount /var as a separate file system as the scripts require. The default installation now automatically sets of /var as a separate ZFS data set, Laurent writes.
        Trending in
        Vol 235, Issue 2
        Trending IT Articles