News about Oracle's Solaris and Sun Hardware
System News
Mar 19th, 2012 — Mar 25th, 2012 Generate the Custom HTML Email for this Issue
System News System News for Sun Users
Volume 169, Issue 3 << Previous Issue | Next Issue >>
Sections in this issue:
click to jump to section

Oracle Database and Oracle Fusion Middleware Certified on Oracle Linux 6
To Be Available on Red Hat Enterprise Linux 6 Soon
Oracle Database 11g Release 2 (R2) and Oracle Fusion Middleware 11g Release 1 (R1) are certified on and immediately available on Oracle Linux 6 with the Unbreakable Enterprise Kernel. In 90 days, Oracle Database 11g R2 and Oracle Fusion Middleware 11g R1 will be available on Red Hat Enterprise Linux 6 (RHEL6) and Oracle Linux 6 with the Red Hat Compatible Kernel, according to an Oracle press release. Oracle offers direct Linux support to customers running RHEL6, Oracle Linux 6, or a combination of both, and Oracle Linux will continue to maintain compatibility with Red Hat Linux, the company reports.
Oracle Exalytics In-Memory Machine Draws Partners' Praise
Unprecedented Analytical Depths of Insight into Corporate Operations
A number of Oracle partners have high praise for the Oracle Exalytics In-Memory Machine, chiefly for the insights into corporate operations that the solution provides. The comments of David Wheeler, VP, Business Intelligence & Performance Management, Apps Associates LLC, are typical: "Our customers will now realize robust, real-time reporting coupled with proactive, forward-looking planning, modeling and predictive analysis. With Oracle Exalytics, complexity and TCO are reduced.”
Top 10 Tips to Accelerate Oracle VM Deployments
On-Demand Webcast Outlines Rapid, Reliable Process for Deployment
Server virtualization deployments need not be difficult to get up and running quickly, particularly with Oracle VM. The webcast Top 10 Tips to Accelerate Oracle VM Deployments, hosted by Adam Hawley, Senior Director for Oracle Desktop and Server Virtualization Product Management and Greg King, Senior Member of the Technical Staff, Oracle VM Best Practices Engineering, demonstrates how to deploy an Oracle VM server virtualization environment rapidly and reliably to provide an agile infrastructure for making your enterprise applications easier to deploy, easier to manage, and easier to support. Registration and log-in are required.
Virtualization at the Desktop Level: Webcast
Using Oracle Virtual Desktop Infrastructure
On this webcast Chris Martin, Product Manager, Sun ZFS Storage Appliance Use Case Solutions, and Andy Hall, Director Product Management, Oracle Desktop Virtualization, explain how Oracle’s solution -- based on Oracle Virtual Desktop Infrastructure and Oracle's Sun ZFS Storage Appliance -- can radically reduce desktop infrastructure costs while delivering unmatched protection of desktop data. They cover Oracle Virtual Desktop Infrastructure (VDI) and the problems it solves; the key role storage plays in a VDI deployment; and how the Sun ZFS Storage Appliance meets the challenge of supporting a virtual desktop infrastructure.
IT - Storage
Is It Possible to Manufacture HDDs In USA?
Storage Newsletter - March 19, 2012
"President Obama made a campaign last year in selling Made in the USA t-shirts. Like many other countries in America, Europe, and Japan, USA is trying to push consumers to buy products made in their homeland to help the local industry and to diminish unemployment. Is it possible to manufacture hard disk drives in USA? ..."
    With Tech Breakthrough, Seagate Promises 60TB Drives This Decade
    ComputerWorld - March 20, 2012
    "Seagate announced it is the first hard drive maker to achieve a density of 1 terabit (1 trillion bits) per square inch on a disk drive platter.

    The technology used to achieve the benchmark, which Seagate said it would introduce in products later this decade, will also lead to the production of 3.5-in. hard drives with up to 60TB of capacity ..."

    Seven Ways To Free Up Drive Space
    NetworkWorld - March 20, 2012
    For most of the past decade, many people had more drive space than they knew what to do with. Hard drives got bigger and bigger while prices went lower and lower. So it probably comes as a surprise, as you prepare for spring cleaning, to realize your drive may be getting full ...

    So how can you give your data some breathing room? ..."

      Java Technology
      GlassFish 3.1.2 Screencasts & Video
      Get the Latest Info on the Most Recent GlassFish Version
      If you have not already done so, download GlassFish 3.1.2 and then enjoy the various screencasts and videos available from the GlassFish Video Channel. These include:

      • "GlassFish Server 3.1.2 Overview" presentation by John Clingan (Product Manager)
      • "GlassFish 3.1.2 Overview by Sathyan Catari", interview by Arun Gupta
      • "Cluster Management with GlassFish 3.1.2 Console (SSH & DCOM)", a screencast by Anissa
      • "Managing Application Scoped Resources from the 3.1.2 Console", a screencast by Anissa
      • "5-minute screencast", screencast by Adam Bien showing Java EE 6 with NetBeans 7.1.1 and GlassFish 3.1.2

      All GlassFish Videos and Screencasts are available from our YouTube channel.

      Java Spotlight Episode 74: Marek Potociar on JAX-RS
      Dalibor Topic and Alexis Moussine-Pouchkine Join Java All Star Developer Panel
      Oracle Principal Software Engineer Marek Potociar discusses JAX-RS with host Roger Brinkley on Episode 74 of the Java Spotlight. Potociar has been involved with web services development for the last eight years. At present, he is a specification lead of Java EE RESTful web services API (JAX-RS) and the development lead of Jersey RESTful web services framework, which also delivers the reference implementation for the upcoming JAX-RS 2.0 API release. Previously Marek was leading development on Metro - The open-source SOAP web services framework for Java. Joining the Java All Star Developer Panel are Dalibor Topic and Alexis Moussine-Pouchkine.
      Java Spotlight Episode 75: Greg Luck on JSR 107 Java Temporary Caching API
      Recorded Live at Jfokus 2012

      Java Spotlight Episode 75 was recorded at Jfokus 2012 and features an interview by host Roger Brinkley with Greg Luck discussing JSR 107, Java Temporary Caching APL. Greg Luck founded Ehcache in 2003 and has also founded and maintains the JPam and Spnego open source projects, which are security focused. Prior to joining Terracotta in 2009, Greg was Chief Architect at where he provided technical leadership as the company went from a single product startup to a billion dollar public company with multiple product lines.

      IT - Technology
      Quantum Computing No Longer A 'Distant Dream'
      Internet Evolution - March 16, 2012
      "Mark Ketchen, manager of the Physics Information Group at IBM's Watson Center in Yorktown, N.Y., doesn't even try to hide his excitement. 'It's not going to be tomorrow, but it's not going to be 50 years,' he told me this morning.

      He was talking about the quantum computer, that fabled nonpareil of reckoning machines, first described by theoretical physicists in the 1980s, but highly resistant to physical development.

      The basic principles of quantum computing are relatively easy to understand ... Classic computer bits have a binary function: They can be flipped either to 0 or 1. Quantum bits (or "qubits"), thanks to a phenomenon of quantum mechanics called 'superpositioning,' can be in more than one state at the same time ..."

      Transitioning Existing Oracle Solaris 10 Applications to Oracle Solaris 11
      Use the Tools and Procedures Oracle Furnishes
      In his post on how to transition existing Oracle Solaris 10 applications to Oracle Solaris 11 using a standard process and tools from Oracle, Stefan Schneider notes that most applications will not cause issues to be reported by the scanning tools such as Oracle Solaris Preflight Applications Checker, and they most likely will not face the issues discussed in the "Oracle Solaris 11 ISV Adoption Guide" or the Oracle Solaris 11 EOF page. While most applications will likely work out of the box on Oracle Solaris 11, some will report problems because they use outdated and deprecated frameworks and APIs.
      Solaris 10 Features in Common with Solaris 11 Ease Migration
      Users of Solaris 10 will Find Many Familar Features

      By way of facilitating customer migrations from Oracle Solaris 10 to Solaris 11 Karoly Vegh has posted a number of features the two versions have in common. Users of Solaris 10 will find the migration less intimidating (and time consuming) when they realize the commonality that Vegh outlines, and the listed features should improve the administration experience. The post recommends Joerg Moellenkamp's PDF "Less Known Solaris Features" and provides a link to the document.

      Joerg Moellenkamp's Oracle Solaris 11 Cheatsheet
      Author of 'Less known Solaris Features'
      Joerg Moellenkamp's Oracle Solaris 11 Cheat Sheet covers a lot of ground. Among the categories for which he provides guidance are:

      • Installation
      • System Configuration
      • Users and Groups
      • Boot Environments
      • Packaging
      • File Systems: Basic ZFS Administration
      • Service Management Facility
      • Oracle Solaris Zones
      • Networking and Manual Administration
      • Networking and Automatic and Advanced Administration

      Look out for updates!

      Updating Oracle Unbreakable Enterprise Kernel
      Installing Release 2 Without Scheduled Downtime
      In his post on Oracle Unbreakable Enterprise Kernel Release 2 Lenz Grimmer describes two methods for updating Oracle Linux systems to the latest version of the Unbreakable Enterprise Kernel. With the help of Ksplice, applying future updates can even be performed without having to schedule any downtime or reboots. Switching to the latest Unbreakable Enterprise Kernel, Grimmer asserts, provides the latest innovations in mainline Linux. Switching is easy—applications and the operating system remain unchanged. There is no need to perform a full re-install; only the relevant RPM packages are replaced. The article features code samples and numerous screen shots.
      IT - Cloud
      5 Reasons You'll Have A Personal Cloud by 2014
      GCN - March 15, 2012
      "Are you ready for the era of the personal cloud? You might have to be, because by 2014, the personal cloud will replace the personal computer at the center of users' digital lives, according to Gartner Inc.

      'Emerging cloud services will become the glue that connects the web of devices that users choose to access during the different aspects of their daily life,' said Steve Kleynhans, a research vice president at Gartner ..."

      6 Tips for Secure Cloud Shopping
      InfoWorld - March 20, 2012
      "Cloud service providers are taking advantage of buyer ignorance about cloud security, pushing tantalizingly low-cost service contracts that don't meet prospective customers' security needs. The result, according to recent reports from HfS Research: Organizations unknowingly leave themselves exposed to a host of threats, while unable to easily escape their service provider's grasp ..."
      Are You Paying Too Much for Cloud Services?
      InfoWorld - March 16, 2012
      "Experts say over-provisioning cloud resources is a widespread corporate problem ...

      Knowing exactly how much and what type of cloud service a company needs is one of the more challenging aspects of deploying a cloud strategy, and most enterprises are getting it wrong, according to experts ..."

        SP: Storing 25 Petabytes of Megaupload Costs US $9,000 A Day
        ARS Technica - March 22, 2012
        "Until January, Megaupload was a major customer of Carpathia Hosting. Now Megaupload is facing a federal indictment, and its servers have become a major burden for Carpathia.

        Carpathia is the proud owners of 1,103 servers with approximately 25 petabytes of Megaupload data on them. The government seized Megaupload's assets, so the firm can't pay its bills and Carpathia has cancelled Megaupload's service contract. But Carpathia hasn't been able to reuse the servers for other customers because doing so might interfere with the Megaupload court case or invite lawsuits from Megaupload customers who lose data as a result ..."

          Use A Tiered Cloud Strategy to Skirt Outages
          InfoWorld - March 21, 2012
          "Two seemingly unrelated events in the cloud computing space should make you think about taking a different approach to your sourcing strategy for the cloud. The first event: Cloud outages, such as the recent Microsoft Azure failure, have shown us that no single cloud is infallible. The second event: Google,, and Microsoft have all dropped their cloud services' prices ..."
          IT - CxO
          Outsourcing Shrinks Number of IT Jobs, Study Says
          ComputerWorld - March 21, 2012
          "The number of IT jobs at large corporations is declining significantly, but within 10 years, this exodus may end as companies run out of jobs suitable for moving to low-cost countries, a new study says.

          The Hackett Group, a management consulting firm, examined services occupations in the bull's-eye of offshoring -- finance, human resources, procurement and IT. What it found is that only about 4.5 million of the 8.2 million jobs in these fields that existed in the U.S. and Europe at the start of 2002 will still exist in 2016 .."

          Business Analyst: Why the CIOs Future Depends On Them
          CIO Insight - March 20, 2012
          "Business analysis is the absolute most important competency for an IT organization. It is the very heart and soul of the value IT is meant to bring to the business. Despite the best intentions, many CIOs have lost this critical skill in their organization and they are quickly forgetting what it really entails ..."
            From Coca-Cola: How To Empower IT
            NetworkWorld - March 15, 2012
            "As the CIO of the Coca-Cola's Bottling Investments Group, Javier Polit has strong ideas about how to ensure that IT is in sync with the company's business needs.

            Polit brings a particularly aggressive style of IT leadership to one of the most globally recognized U.S. companies.

            He has mandated that business unit general managers bring IT leaders into the broader decision-making process. In other words, he wants IT to have a proverbial seat at the table ..."

            Ten Ways To Build Repeatable Success
            CIO Insight - March 20, 2012
            "Repeatability: Build Enduring Businesses for a World of Constant Change" (Harvard Business Review Press/Available in March) ... "offers an alternative perspective. According to authors Chris Zook and James Allen, the majority of new growth initiatives fail - at best 25% are successful ..."
              Who Should the CISO Report To?
              CSO Online - March 16, 2012
              "It seems like a simple question. After all, there seems to be little debate about where other C-suite officers should report. While there have been some discussions about the reporting structure for such C-level executives as the chief privacy officer and the chief compliance officer, these are relatively tame compared to the heated debate that I have witnessed and been a part of over the past few years.

              The fact that this question is asked at all is an indication of the growing acceptance of the CISO role and function ..."

                IT - Networks
                How Much Traffic Does Streaming Video Streaming Generate?
                NetworkWorld - March 19, 2012
                "Do you know how much traffic the act of streaming video to a user's device generates? Chances are you don't, and you don't particularly care. But you should, because lively video surfing by lots of users can affect your work and home life. When you multiply the traffic that video surfing generates over the course of a month by the number of users doing the surfing, it can add up to a helluva lot! This can congest your corporate WAN ..."
                  'Insatiable Demand' for Streaming Video Puts Pressure on Providers
                  NetworkWorld - March 15, 2012
                  "Just as enterprise network managers brace for the flood of bandwidth-consuming content stemming from the NCAA men's basketball tournament, content delivery providers put in a significant amount of time preparing to meet the meteoric rise in demand.

                  This kind of preparation is something that many believe content delivery providers will need to get used to, as demand for live streaming of major events is growing far beyond the confides of March Madness ..."

                    ISP Group Warns Olympics Could Cause ;Massive Hit on nfrastructure
                    V3 co uk - March 21, 2012
                    "The Internet Service Providers Association (ISPA) has warned the London Olympics could cause a "massive hit on infrastructure" because of the unprecedented amount of content that will be shared over the internet.

                    Many Olympics' spectators will be using their smartphones while watching the event to share details on social networks such as Facebook and Twitter. Meanwhile the internet will be used to stream huge amounts of video, with the BBC providing live coverage from 24 locations during the event, the most live video it has ever streamed ..."

                    Pocket Guide to Routing and Switching
                    HelpNet Security - March 19, 2012
                    "Go beyond layer 2 broadcast domains with this in-depth tour of advanced link and internetwork layer protocols, and learn how they enable you to expand to larger topologies. The Packet Guide to Routing and Switching dissects several of these protocols to explain their structure and operation.

                    This isn’t a book on packet theory. Author Bruce Hartpence built topologies in a lab as he wrote this guide, and each chapter includes several packet captures ..."

                      IT - Operations
                      Five Enterprise Project Management Mistakes to Avoid
                      CIO Insight - March 15, 2012
                      "It's all about 'faster, cheaper, better' to survive competitively in today's economy. This puts much pressure on CIOs and their teams when undertaking high-profile enterprise projects. The book 'Enterprise Project Governance: A Guide to the Successful Management of Projects Across the Organization' (Amacom/available in March), takes an in-depth look at a number of classic pitfalls of project execution and establishes best practices to circumvent them ..."
                      'NoOps' Debate Grows Heated
                      ComputerWorld - March 20, 2012
                      "The dust-up over the term 'NoOps' escalated this week, with high-profile IT executives from Netflix and Etsy issuing dueling blog posts about the evolution of IT organizations.

                      The debate often has been heated, which some experts say may reflect the reactions of people whose jobs are threatened by a shift in the way IT groups work.

                      In his blog post, Adrian Cockcroft, director of cloud systems architecture for Netflix, described his IT organization as having little need for operations staff, partly because the company has shifted to the cloud, where it can automate many former functions of the staff ..."

                        IT - Security
                        DARPA: Dump Passwords for Always-On Biometrics
                        GCN - March 21, 2012
                        "The Defense Advanced Research Projects Agency wants to eliminate passwords and use an individual’s typing style and other behavioral traits for user authentication.

                        Creating, remembering and managing long, complex passwords is 'inherently unnatural,' the agency said on its Active Authentication site. And most active sessions don't have mechanisms to identify that the current user is still the one originally authenticated ..."

                          Most 2011 Attacks Were Avoidable
                          ComputerWorld - March 22, 2012
                          "Despite rising concern that cyberattacks are becoming increasingly sophisticated, hackers used relatively simple methods 97% of data breaches in 2011, according to a report compiled by Verizon.

                          The annual Verizon report on data breaches, released Thursday, also found that in a vast majority of attacks (80%), hackers hit victims of opportunity rather than companies they sought out ..."

                            Privacy Regulators: U.S. and EU Will Take Different Approaches
                            ComputerWorld - March 19, 2012
                            "Both governments push for new online privacy standards, but EU officials question US enforcement efforts ...

                            The development of online privacy protections is at a critical moment as policy makers in both the U.S. and European Union push for changes to their privacy rules, but coordination of enforcement across the Atlantic Ocean may be tricky, several privacy experts said Monday.

                            The U.S. and the E.U. have very different approaches to privacy enforcement, with the U.S. focused on enforcing privacy promises that companies make and the E.U. enforcing privacy rights even when companies make no promises ..."

                              Security's New Reality: Assume the Worst
                              Dark Reading - March 15, 2012
                              "A more fatalistic view that attackers have already infiltrated the organization presents a different way of looking at -- and marketing -- security ...

                              Tucked away on the sprawling show floor at the recent RSA Conference was a newly commercialized appliance that sits inside the network and spies on attacks already in progress. Its mission isn't to stop the attacker from getting in, but instead to stealthily observe the attacker's moves while gathering intelligence and ultimately containing any damage ..."

                              When Online Attacks Are Beneficial
                              Smarter Technology - March 20, 2012
                              "Although hacking attacks threaten company data and expose confidential information, they also reveal weaknesses in IT security and help businesses better prepare for future attacks. Recent hacking events have highlighted how companies can use hacking incidents to their advantage ..."
                              IT - Careers
                              10 Hottest Tech Certifications
                              CIO Insight - February 13, 2012
                              "Your next round of hiring should include IT professionals who know their way around project management, tech-support, network oversight and security. The longstanding proof of expertise in these and other areas, of course, remains certification programs. To find out which certifications are most in demand, check out this list from Hiring talent with the right credentials requires significant compensation upgrades ..."
                              10 Reasons Actions Speak Louder Than Words
                              Baseline - March 12, 2012
                              "If you ever wondered if you're paid to talk about doing things rather than actually do them, you're not alone. Many businesses suffer from the same ailment – stifling innovation by running good ideas through the ringer. Hours of meetings about the same topics and endless email chains can kill good ideas before they ever get off the ground ..."
                                IT Proposals: Getting Your Plans Past the 'Kitchen Cabinet'
                                CIO Insight - March 19, 2012
                                "You might think you know the senior management team that's judging and approving or denying your IT proposals. But do you really? There’s an additional 'shadow' group that has a hand in decision-making in many corporations—the CEO's highly-trusted advisors, or 'kitchen cabinet.' In the book 'Who's in the Room?: How Great Leaders Structure and Manage the Teams Around Them', author Bob Frisch depicts how easily organizations can unravel because of the lack of transparency and clarity that this dynamic often creates ..."
                                Judge Stands Up for Commonsense Privacy Laws in Cellphone Case
                                NetworkWorld - March 19, 2012
                                "Bravo to the Texas judge who ruled that if the government wants 60 days of cellphone location records in a criminal investigation it must first obtain a warrant after showing probable cause.

                                The Electronic Frontier Foundation has details ...

                                'The Supreme Court ruled earlier this year in United States v. Jones that the GPS tracking of a vehicle without a warrant violates the reasonable expectation of privacy guaranteed by the Fourth Amendment to the Constitution. This is a very similar situation, ...'"

                                  IT - Virtualization
                                  The Pros and Cons of Desktop Virtualization Infrastructure
                                  NetworkWorld - March 22, 2012
                                  "Many organizations continue to run Windows XP on many or all of their desktop PCs, either because migration typically requires costly hardware upgrades, time-consuming transfers of settings, and user retraining, or because there's simply no compelling reason to move users to a new OS and the new application software that goes along with it. In some cases, both justifications apply ..."
                                  IT - Compliance
                                  $1.5 Million Fine Marks A New Era in HITECH Enforcement
                                  Dark Reading - March 21, 2012
                                  "Enforcement actions from the U.S. Department of Health and Human Services (HHS) Office for Civil Rights (OCR) just reached a new level of reality last week when the department announced a $1.5 million settlement with BlueCross BlueShield of Tennessee over a 2010 data breach, making the organization the first to pay out penalties since the Health Information Technology for Economic and Clinical Health Act (HITECH) went live in 2009. The question now is whether such tangible examples of financial fallout will convince healthcare IT to invest in better security measures ..."
                                  Nobody Cares About HIPPA
                                  Dark Reading - March 15, 2012
                                  "Compliance in many organizations is seen as only a costly inconvenience ...

                                  Sometimes clarity comes out of the blue, including clarity about compliance issues. Recently I was meeting with friend and business associate Ben Drake. His company works with networking and data protection technology for a number of businesses.

                                  I mentioned how some organizations with obvious HIPAA compliance issues seem uninterested in putting forth the effort to resolve them. Some won’t even acknowledge they have issues. Ben shrugged and matter-of-factly said, 'Nobody cares about HIPAA.' ..."

                                  Download the ZFS Storage Appliance Simulator
                                  A No-risk Introduction to this Powerhouse Solution
                                  If you'd like to have a idea of just how the ZFS Storage Appliance works, Steen Schmidt suggests having a look at Oracle's ZFS Storage Appliance Simulator, and he helpfully provides a link to a download of the simulator. The simulator is said to deliver the following information:

                                  • A graphical interface that guides your choice of replication profile

                                  • Oracle's Solaris DTrace analytics

                                  • Support for various data protocols, including CIFS, NFS, iSCSI

                                  Users can install and manage a virtual storage system on any laptop or desktop and experience the power of NAS Storage.

                                  IT - Mobile
                                  MDM: Part of the Mobile Security Solution?
                                  CSO Online - March 19, 2012
                                  "The good news for enterprises: Mobile devices are packed with power. A new iPhone is 100 times lighter, 100 times faster, and 10 times less expensive than the luggable notebooks of the early 1980s.

                                  What's good news for enterprises is also bad news for CISOs. Mobile devices can store substantial quantities of data, the applications are powerful, and their network speeds are forever increasing. And, oh yeah, users are bringing their own devices, downloading their own apps, surfing the Web from whatever connections they choose—all with little to no direct control by the enterprise ..."

                                    IT - Big Data
                                    Why You Might Want to Start Hiring Big Data Experts
                                    Smarter Technology - March 21, 2012
                                    "You know Big Data has arrived. You know Big Data is revolutionizing business from marketing to risk compliance. But do you know it may be very hard to find people with the required expertise, people who understand the business drivers as well as the technologies propelling Big Data forward?

                                    Here’s the bad news first: The skills required for good return on investment aren’t simple and they’re not just tech-centric. It’s not a matter of calling up that trusted consulting firm either, as they’re likely in the same boat as most companies today in trying to find the experts to make Big Data pay off ..."

                                    Top Ten Articles for last few Issues
                                    Vol 169 Issues 1 and 2; Vol 168 Issues 1, 2, 3, 4 and 5; Vol 167 Issue 4;
                                    We track how frequently each article is viewed on the web site to determine which the readers consider the most important. For last week, the top 10 articles were:

                                    • Considering Oracle Solaris 11?
                                    • Solaris Automated Install and Repository on One Image
                                    • Sun Storage 7320 Appliance Outperforms NetApp in Midrange Systems on SPECsfs2008 NFS Benchmark
                                    • Two Dozen Papers and Links for the ZFSSA
                                    • White Paper An Architect’s Guide to Big Data
                                    • Compilation of Links to Solaris 11 Resources
                                    • Java Tutorials Now Available as eBooks
                                    • Tape vs. Disk: Clipper Group Studies the TCO
                                    • Create Solaris 10 Branded Zones on Exalogic
                                    • Mobile Tornado Adopts Oracle Solaris Cluster, ZFS File System, Solaris Zones

                                    The longer version of this article has list of top ten articles for the last 8 weeks.

                                      Release of LibreOffice 3.5.1 Provides Additional Security and Stability
                                      Developer Community Shows Remarkable Pace of Growth
                                      The majority of the most-important bugs identified by users have been fixed in the release of LibreOffice 3.5.1 which includes improvements in security and stability. LibreOffice 3.5.1 is available for immediate download. According to Italo Vignoli, member of The Document Foundation Board of Directors, “During the last month, the number of TDF hackers has overtaken the threshold of 400 code developers, with a large majority of independent volunteers and several companies paying full time hackers. In any case, the project is independent, as none of these companies employs more than 7% of the developers."
                                      How Memory Allocation Affects Performance in Multithreaded Programs
                                      Sniffing Out Lock Contention with Several Tools
                                      If your new server has an alarmingly lower transaction rate than you had anticipated, Rickey C. Weisner suggests that you look first at lock contention in the memory allocator. His article demonstrates the use of prstat to determine whether there is lock contention. Demonstrated as well is the use of Professor Emery Berger's MT-hot allocator named Hoard, and of the mtmalloc (both old and new), and the libumem memory allocators. The question of which is best is answered by Weisner's use of a test harness, which appears to give the edge to the new mtmalloc.
                                      Trending in
                                      Vol 234, Issue 2
                                      Trending IT Articles