News about Oracle's Solaris and Sun Hardware
System News
Feb 6th, 2012 — Feb 12th, 2012 Generate the Custom HTML Email for this Issue
System News System News for Sun Users
Volume 168, Issue 2 << Previous Issue | Next Issue >>
Sections in this issue:
click to jump to section

Oracle's SPARC T4-1B Server Module
For Sun Blade 6000 Infrastructure
Oracle's SPARC T4-1B Server Module runs Oracle Solaris on the Oracle Sun Blade 6000 chassis to provide an integrated platform that delivers deployment flexibility and high performance for single- and multi-threaded enterprise and mission-critical applications. The SPARC T4-1B features up to 10 single-socket SPARC T4-1B blades, enabling it to deliver extreme compute density and deliver a 5x increase in single-thread performance and 7x increase in floating point performance over previous generation. 10 Gigabit Ethernet (GbE) is part of the package. In addition, the SPARC T4-1B features 100% Oracle SPARC/Solaris binary compatibility for easy migration and ongoing investment protection.
Advice on Which Exadata Storage Drive to Choose
High Performance vs. High Capacity Drives
An post provides measures enabling Exadata users to decide between high performance 600 GM 15K RPM SAS drives or high capacity 3 TB 7.2K RPM SAS drives. The post suggests using throughput or IOPS drive the choice rather than capacity alone. The post discusses the results of using the RunCalibrate command on both throughput in MB per second and IOPS. High capacity drives showed slightly over 100MBPs per drive, while the high performance drives come in around the 150MBPs mark. High capacity drives deliver under 200 IOPS per drive while high performance drives delivered over 400 IOPS.
Quick Start Guide for the VirtualBox Template for Oracle VM Manager
for Oracle VM Manager
The "Quick Start Guide for the VirtualBox Template for Oracle VM Manager" deals with the following software components:

  • Oracle Linux 5 update 7 with the Unbreakable Enterprise Kernel (2.6.32)
  • Oracle VM Manager 3.0.3 demo installation
  • Oracle WebLogic Server 10.3
  • Oracle Database 11g Express Edition

The screen shots and code samples involved with this guide are included.

Oracle Virtual Desktop Infrastructure: A Design Proposal for Hosted Virtual Desktops
White Paper Considers Design Proposal to Host and Deliver 500, 1000, and 1500 User Windows 7 Desktops
"Oracle Virtual Desktop Infrastructure: A Design Proposal for Hosted Virtual Desktops," an 18-page Oracle white paper, outlines and discusses a design proposal to host and deliver Windows 7 virtual desktops to 500, 1000, and 1500 users based on Oracle Virtual Desktop Infrastructure software. The paper considers the design's high level architecture, explains capacity planning and discusses design decisions involving scalability, availability, and security, and then suggests some performance optimizations. The paper explains three aspects of Oracle Virtual Desktop Infrastructure (complete, open and integrated) and how these elements fit in the proposed implementation.
IT - Storage
The In-Depth Guide to Data Destruction
CSO Online February 6, 2012
"A critical part of securing intellectual property is the timely elimination of records and data you no longer need. Here's the scoop on overwriting, degaussing and physical destruction of media.

A key part of any information security strategy is disposing of data once it's no longer needed. Failure to do so can lead to serious breaches of data-protection and privacy policies, compliance problems and added costs ..."

IT - Technology
6 NASA Technologies In Play At the Super Bowl
GCN February 2, 2012
"The first Super Bowl, pitting the Green Bay Packers against the Kansas City Chiefs, wasn’t even called the Super Bowl. It was the AFL-NFL Championship Game, played at Los Angeles Memorial Coliseum, and only two-thirds of the available tickets were sold.

Things have changed a bit ..."

    9 Security Technologies for Super Bowl and Beyond
    InfoWorld February 3, 2012
    "Securing a major sporting event can be a nerve-wracking task for public safety agencies. The threat of terrorism looms large, of course, but so do unexpected scenarios that can quickly spiral out of control, such as the Feb. 1 soccer riot in Cairo, Egypt that claimed the lives of more than 70 people.

    Preparing for an event that draws tens--and sometimes hundreds--of thousands of often unruly fans requires a skillful blend of human and machine surveillance. Digital technology is increasingly playing a major role in sports security operations ..."

    IT - Cloud
    3 Secrets to Creating a Business Case for Cloud Computing
    InfoWorld February 7, 2012
    "If you hope to convince management about the cloud -- with successful results -- follow these key steps ... We've all seen the PowerPoint presentations that show the business advantages of cloud computing: the ability to avoid hardware and software purchases (opex vs. capex), speed to deployment, elasticity, and so on. However, unless you're prepared to provide real numbers that define real value, that's so much fluff to those in the executive suite ..."
    Plan Ahead for Your Security Needs in the Cloud
    DefenseSystems February 6, 2012
    " A variety of tools can help identify security considerations for agencies looking to move to the cloud -- Who is responsible for security in the cloud? It depends on whom you’re asking, according to Ponemon Institute's Security of Cloud Computing Providers Study.

    The April 2011 report found that 69 percent of the 127 cloud providers surveyed said that cloud users are the ones responsible for security ..."

    The Cloud's Quantum Future
    Baseline February 1, 2012
    "Its impact on today's business decisions and strategies is prime fodder for articles, blogs, and research reports all over the Web. But what about the 'beyond' part? Where could the cloud go from here?

    One of the issues with cloud computing is the security of data. Well, researchers at the Vienna Center for Quantum Science and Technology (VCQ) at the University of Vienna and the Institute for Quantum Optics and Quantum Information (IQOQI) think they are on to a solution, and it comes in the form of quantum computing ..."

    IT - CxO
    IT Consolidation: What Every CIO Needs to Know
    CIO Insight February 2, 2012
    "The IT team at Northeastern Illinois is severely overburdened with the challenge of managing existing IT services while also addressing new educational and operational requirements, says Kim Tracy, Executive Director of the school's University Technology Services. Enter cloud computing. "By moving IT services to the cloud, we can offload the complexity of the current IT environment and improve services to our faculty and students and provide the best learning experience possible," he says ..."
    The New IT Rulebook: Not for the Faint of Heart
    InformationWeek February 2, 2012
    "Smaller, lighter, and more agile are more than just industry buzzwords. IT organizations that fail to lead those charges will get relegated to cost centers ... In an industry where innovation threatens to tear down legacy systems and practices (and vendors) just as it generates new opportunities, IT organizations are nonetheless resistant to change. It's natural to fear the unknown, question the unproven, be skeptical of the latest and greatest ..."
      Managing Information in Litigation: How to Avoid Spending a Fortune
      CIO Insight February 2, 2012
      "The costs of preserving, searching and reviewing information in litigation can be staggering. What costs a dollar to store on a hard drive can easily cost hundreds of thousands of dollars to search and review for a lawsuit. Ignoring or destroying salient information prior to or during a lawsuit can lead to losing a case—regardless of the merits of the actual claim—and spending a small fortune litigating the issue of whether you have met your discovery obligations. The solution? Take steps to budget, hire and manage information properly on the front end; corral discovery costs; and avoid Luddite lawyers ..."
        When 'Nice' Bosses Fail
        InformationWeek February 3, 2012
        "IT is a service business, where nice guys often finish first. But you'd better be effective too, because scorched-earth leaders are just waiting to pounce ... My column last week, Why Bully IT Bosses Lose The Game, hit a nerve with readers, judging by the emails and comments that followed. Some readers were complimentary, but others took me to task for extolling the virtues of "nice bosses." Their feedback amounted to: 'What good is being nice if you're completely ineffective?' Well, I couldn't agree more ..."
          CIOs At Risk: Four Areas To Watch
          CIO Insight February 8, 2012
          "The velocity of technological change is providing improved business functionality for organizations that have previously operated with a smaller internal IT footprint. But this change comes at a cost, creating a new set of risks that CIOs must effectively manage to be successful ..."
            5 Strategies to Fail Fast on IT Projects
            InformationWeek January 19, 2012
            "Failing fast can can save your organization millions of dollars, but it isn't easy to do.

            Even if our resumes and LinkedIn profiles portray us as superhuman, we all fail. And nowhere are those failures more apparent than on some of the big IT projects we lead and manage.

            The important question is: How quickly can we fail at something before we make a big investment in it? Failing fast, one of the themes of InformationWeek's upcoming report on IT project management, is a practice that can save an organization millions of dollars ..."

            vBeers  South Florida: MurphyÂs@Hard Rock, Hollywood
            Wednesday, February 22nd, 2012
            Join us for the next South Florida vBeers!

            Meet with local Virtualization enthusiasts and talk about technology, theory, politics of the industry or whatever else gets your propeller spinning.

            NO marketing blather, NO Sponsors, and NO PowerPoint but you do have to buy your own drinks!

            This is a great opportunity to meet with other virtualization enthusiasts and professionals and enjoy discussing all things virtualization, and in fact anything else that comes up in conversation ..

            Location: Murphy’s Law Irish Bar

            Address: 1 Seminole Way, Hollywood, FL 33314 USA

            Date:Wednesday, January 22nd

            Time: 6pm to 9pm — arrive and depart any time

            Free parking. Enter parking from State Rd 7. Park as far to the west as you can. Elevators will drop you off right next to Murphy’s.

              Sun System Software Stacks
              Get the Latest OS, Software, Firmware, Middleware, Drivers and Apps for Your Servers
              In the interests of enabling its customers keep their respective software stacks current, Oracle has put together "The Software Stack and How to Keep Your Oracle Sun Server System Up to Date With the Latest Software," which displays the most recent versions of operating systems, software, firmware, middleware, drivers and applications for the several server series Oracle produces.

              These are: SPARC T-Series Servers, SPARC Enterprise M-Series Servers, Sun Blade Systems and Sun Netra Carrier-Grade Servers

              IT - DR
              Emergency Notification Systems: 10 Factors To Consider When Buying One
              eWeek February 1, 2012
              "2011 is being commonly referred to as "The Year of Disasters." The United States set a record with 12 separate billion-dollar weather/climate disasters in 2011, with an aggregate damage total of approximately $52 billion, according to the National Oceanic and Atmospheric Administration. These incidents have prompted many organizations to reconsider the human element during a crisis or major news event and evaluate how they communicate with employees, suppliers, investors and customers. Emergency and mass notification systems are designed to help organizations communicate to stakeholders during an incident or disruption ..."
                IT - Networks
                5 Basic Switch Settings You Must Know
                NetworkComputing January 30, 2012
                "There are five configurations a network administrator should apply to a newly provisioned switch or router. Although application of these configurations may seem like common sense, 90% of devices I see are missing at least one of these settings, and about 75% are missing two or more ..."
                  Planning for IPv6
                  HelpNet Security February 7, 2012
                  "With IPv4 network addresses close to depletion, moving to IPv6 is now business critical. This concise book helps you plan for IPv6 integration by providing a high-level overview of the technical—and nontechnical—steps involved.

                  Many of the challenges for your enterprise are on the organizational level, and solutions differ from company to company.

                  IPv6 Essentials author Silvia Hagen, a protocol analysis and directory service expert who's worked with IPv6 international groups and forums for 10 years, supplies answers to the issues most frequently discussed by the clients she consults ..."

                    Say Goodbye To Fast Ethernet
                    InfoWorld January 26, 2012
                    "10G Ethernet is expected to make up the majority of revenue in Ethernet switching by 2016 due to data center requirements for the higher-speed ports ... The Layer 2-3 Ethernet switch market is forecast to approach $28 billion in 2016, with future growth driven primarily by sales of Ethernet switches optimized for larger data center deployments ..."
                      Time To Buckle Down and Start An IPv6 Project
                      NetworkComputing February 8, 2012
                      "While the Internet Society (ISOC), a global Internet standards-setting group, has seen a pickup in adoption of IPv6 by some measures, conversion from the IPv4 standard is still relatively slow. The ISOC has scheduled another IPv6 Day for June 6, hoping to build on the momentum for adoption of the new Internet Protocol from IPv6 Day on June 8, 2011. In a three-part series, Network Computing will look at how companies can develop a road map for IPv6 conversion, the technical implications of running IPv6 on an existing IPv4 network, and what compliance and security issues have to be addressed in a transition ..."
                      IT - Operations
                      Should the Help Desk Be the Place to Start IT Requests?
                      Accelerating IT Success February 7, 2012
                      "In Part 1, I questioned a fundamental assumption around IT services and how they are supported: that the Help Desk should be the place to start all IT requests. I used “request” in the most general form, meaning it could be reporting an incident, all the way to initiating a request for a new service. This assumption is practically a sacred cow in many IT shops. I even confessed to subscribing to this school of thought for a long time myself ..."
                        Time To Reconsider the Data Center
                        NetworkComputing January 4, 2012
                        "As enterprises push out data centers into cloud-based computing and virtual applications, traditional data center planning and practices haven't necessarily kept pace. Is it time to reshape definitions of classic brick-and-mortar data centers into a new computing concept with different performance and total cost of ownership expectations? If nothing else, the business cases now driving data center services are beginning to demand it ..."
                        U.S. To Use Climate To Help Cool Exascale Systems
                        ComputerWorld February 8, 2012
                        "In a picturesque spot overlooking San Francisco Bay, the U.S. Department of Energy's Berkeley Lab has begun building a new computing center that will one day house exascale systems. The DOE doesn't know what an exascale system will look like. The types of chips, the storage, the networking and the programming methods that will go into these systems are all works in progress ..."
                        IT - Security
                        4 Best Practices for Mitigating DDoS Effects
                        Enterprise Systems Journal February 6, 2012
                        "The IT security community has followed the appearance of Internet-based distributed denial of service (DDoS) attacks over the past 10 to 12 years. Y2K saw the appearance of the first widespread DDoS attacks, disrupting "anchor" Internet sites of the time, and 2004 to 2006 saw the onset of widespread criminal extortion under threat of DDoS attack, initially targeting online gaming sites. Starting in 2009, we've begun to experience the third wave of DDoS attack activity. Attacker motivations have become more diverse, going beyond the pursuit of illicit financial gain; unfair business advantage, ideological activism, and political activism now drive these types of cyber-attacks ..."
                        4 Keys for Intellectual Property (IP) Protection
                        CSO Online February 6, 2012
                        "Do you think data breaches are up or down in 2011 compared to 2007 or 2008? The official answer may surprise you. According to DatalossDB and the 2011 Data Breach Investigations Report [PDF link] by Verizon, the number of records compromised per year has been decreasing since its 2008 peak. But these reports are missing something very important. It all comes down to what is reported. Last year I met with more than 450 CIOs and CSOs, and almost all of them said that incidents are way up. New breaches are constantly making headlines, so why is there a discrepancy between our perception and what these reports are finding? ..."
                          Can You Trust Data-Recovery Service Providers?
                          ComputerWorld January 11, 2012
                          "Data-recovery service providers are supposed to be saving important data for you when something goes wrong -- a drive crashes or storage device is dropped, and no backup is available. But do you trust them with the important data you let them recover or could they actually be a source for a data breach? ..."
                            Data Breach Blame Your Third Party's Remote Access Systems
                            InfoWorld February 7, 2012
                            "Three-quarters of the time, third-party responsible for system support, maintenance introduced the security deficiencies exploited by attackers, study finds ... An in-depth study of data-breach problems last year where hackers infiltrated 312 businesses to grab gobs of mainly customer payment-card information found the primary way they got in was through third-party vendor remote-access applications or VPN for systems maintenance ..."
                            Have Your Users' Passwords Already Been Hacked?
                            Dark Reading February 7, 2012
                            "If employees use their same password at work and in their personal lives, another company's breach may weaken your own security. Five steps to mitigate the risk ... Following the hack of the global intelligence firm Stratfor, hackers published the stolen password file containing the usernames and hashes for more than 860,000 accounts. An effort to use typical password breaking techniques on the file yielded quick results: About 1 in every 10 accounts had a trivial password ..."
                            Quick Response, Quick Risk?
                            HelpNet Security February 6, 2012
                            "You don’t have to look far these days to spot a QR code. From their humble beginnings in labeling and tracking parts used in vehicle manufacturing, these blocky little barcodes-on-steroids are being placed everywhere from product packaging, to posters and billboards, to magazines and newspapers ..."
                              IT - Careers
                              10 Ways to Work with People You Hate
                              Baseline February 3, 2012
                              "You know who we’re talking about -- that one coworker who just gets under your skin. Working alongside someone you can't stand can undermine your own effectiveness, but uncomfortable relationships are part of life. 'There are always other people — be they relatives, fellow commuters, neighbors, or coworkers — who we are at risk of tangling with,' said Robert Sutton, a professor of management science and engineering at Stanford University and author of Good Boss, Bad Boss and The No Asshole Rule, to the Harvard Business Review ..."
                              Programmer Personality Types: 13 Profiles In Code
                              InfoWorld February 6, 2012
                              "Coding culture offers no shortage of character. Here are the specs for determining your developer breed"

                              "To the world at large, computers are scary machines that are impossible to understand, and programmers are the mysterious geniuses who know how to manipulate them even if they are never able to fix yours for whatever reason. Anyone who has worked with the machines knows that programmers aren't just one undifferentiated group, but a club with a wide variety of subspecies. From those who will go to any length to avoid documentation to those who deploy code like duct tape, refuse to use libraries, or can't help but rewrite their apps in the latest experimental programming language, programmers are a colorful lot -- particularly in their perspectives and habits -- though collectively comrades in code ..."

                              IT - Virtualization
                              New Options for Never-Say-Die IT
                              Federal Computer Week February 3, 2012
                              "Many federal agencies can confidently proclaim “mission accomplished” for using virtualization to reduce the number of computer servers they operate, thereby saving on hardware, administration and power costs.

                              However, server consolidation should not be the first and last stop on the virtualization tour. The technology — which breaks the one-server-to-one-computer bind by enabling multiple virtual servers to run on a single physical machine — offers a similarly compelling set of benefits when applied to business continuity: the provisions that get IT operati

                              IT - Email
                              Lawsuit Raises Questions About Email Privacy at Work
                              NetworkWorld February 3, 2012
                              "FDA whistleblowers say agency violated their rights by extensively monitoring personal communications ... A recent lawsuit filed against the U.S. Food and Drug Administration is drawing attention to the question of whether employees have a reasonable expectation of privacy when using personal email accounts on workplace computers.

                              The lawsuit was filed last week by six whistleblowers at the FDA who allege that their private emails were extensively monitored after they began complaining to lawmakers about serious irregularities in the agency's medical device review process ..."

                              IT - Big Data
                              Making the Most of Big Data: Four Key Technology Considerations
                              CIO Insight February 1, 2012
                              "We have two factors intersecting: a never-before-seen wealth of data from transactions and interactions, plus a new level of technology innovation to drive down costs. There are four key technology considerations for today’s CIO looking to capitalize on big (and diverse) data."
                              What You Need to Know About Big Data
                              GCN February 7, 2012
                              "For the past several years, the buzzword was "the cloud." Now it's "big data."

                              "Thanks to the exploding use of sensors, mobile devices and social networks, coupled with broadband communications, the amount of data collected by government, private enterprise and individuals has far outstripped our ability to analyze it effectively and even to store it."

                              When Shopping for a 'Big Data' Analytics Platform, Talk the Talk
                              Search Business Analytics January 27, 2012
                              "The term big data is typically defined as data multiplying in volume, velocity and variety. According to new research by the Milford, Mass.-based Enterprise Strategy Group, big data analytics platforms are mimicking that definition: Vendor product releases are growing in number, product enhancements are multiplying rapidly and a variety of deployment options are now available."
                              Managing Big Data: Six Operational Challenges
                              CIO Insight February 1, 2012
                              "It’s interesting to note that the performance of today's comparatively larger storage arrays isn’t intrinsically much better than I was getting in 1980 -- maybe twice as fast for data retrieval. There's just a lot more data being stored, and the cost per stored bit is way down. Some of the same operational challenges are still around, too."
                              IT - Mobile
                              Mobile Devices Set To Become Company Policy
                              ComputerWeekly February 2, 2012
                              "About 30% of UK IT departments are incorporating smartphone and tablet initiatives in their strategies for 2012 as workers increasingly use the devices for work purposes.

                              A Computer Weekly and TechTarget survey of more than 2,500 IT professionals worldwide revealed that 28.9% plan to introduce initiatives to use smartphones in the business, while 30.3% will enable the use of tablet PCs.

                              The results are evidence that 2012 promises to be a big year in the maturity of mobile technology in business..."

                                Virtualization No Silver Bullet for Macs or Mobile
                                InfoWorld February 3, 2012
                                "As employees bring non-Windows devices into the business, vendors tell IT to impose Windows via virtualization -- and miss the point ...

                                In 2006, Apple's Intel-based Macs opened the door to running Windows via desktop virtualization; suddenly users could have their personal Macs and business PCs in one box. It's a big reason, I believe, that Mac market share has continued to grow faster than overall PC market share for the last five years. The shift to Intel and the accompanying ability to run Windows gave people the security blanket they needed to make the switch ..."

                                Top Ten Articles for last few Issues
                                Vol 168 Issue 1; Vol 167 Issues 1,2,3 and 4; Vol 166 Issues 2, 3 and 4
                                We track how frequently each article is viewed on the web site to determine which the readers consider the most important. For last week, the top 10 articles were:

                                • Sun ZFS Storage Appliances Earn Highest Ratings for Enterprise and Midrange NAS Systems
                                • SPARC T4 Server Momentum Expands Demand for SPARC System
                                • Oracle Sun Ray 3 Series Clients Capture 2011 Good Design Award
                                • SPARC T4 Servers Find Favor with Telecommunications Service Providers
                                • How to Manage the ZFS Storage Appliance with JavaScript: Three Approaches
                                • Oracle Ships Over 1 Exabyte of Media for StorageTek T10000C Tape Drives
                                • Exactly What Is Big Data?
                                • Building a Secure Cloud with Identity Management
                                • Oracle Secure Global Desktop Allows Simplified, Anywhere, Access to Applications
                                • Migrating from SUSE Linux to Oracle Linux 5.5

                                The longer version of this article has list of top ten articles for the last 8 weeks.

                                  IT - Server
                                  How to Implement Storage Virtualization Technology at the Server Level
                                  Search Virtual Storage February 7, 2012
                                  "This is the second of a four-part series on block-based storage virtualization technology. In the first story, “Block-level storage virtualization: Reasons to implement it,” we explain the reasons why IT departments would want to implement storage virtualization. In this story, we explain how to implement it at the server level ..."
                                    IT - Encryption
                                    Encryption, Data Centric Approach Needed To Secure Cloud, Mobile Users
                                    NetworkComputing February 8, 2012
                                    "The ever-growing mobile workforce with its head in the cloud has created what seems like an endless list of IT challenges to overcome, and with anywhere, anytime access to information a necessity for many enterprises, the new IT world is having an impact on the kind of encryption enterprises need to protect their sensitive and proprietary data.

                                    InformationWeek's "Data Encryption: Ushering In a New Era" report found that cloud and mobility are adding new challenges to security, but only 47 per cent of 506 IT professionals that responded to a survey on data encryption stated that have mobile-device encryption has been made a priority ..."

                                    Satellite Telephony Encryption Cracked
                                    HelpNet Security February 8, 2012
                                    "Satellite telephony was thought to be secure against eavesdropping. Researchers at the Horst Görtz Institute for IT-Security (HGI) at the Ruhr University Bochum (RUB) have cracked the encryption algorithms of the European Telecommunications Standards Institute (ETSI), which is used globally for satellite telephones, and revealed significant weaknesses ..."
                                    IT - Tape
                                    Q&A: Extracting the Mystery Out of Backup Tapes
                                    Enterprise Systems Journal February 6, 2012
                                    "Over the years, IT has built up a collection of tapes, especially for backup. The problem is -- what's on all those tapes and why is it important to find out? What are the risks of not knowing -- and the legal risk of holding on to tapes you longer need. To learn more, we talked with Jim McGann, vice president of information discovery at Index Engines, an enterprise discovery technology company based in Holmdel, NJ ..."
                                      Trending in
                                      Vol 235, Issue 2
                                      Trending IT Articles