News about Oracle's Solaris and Sun Hardware
System News
Apr 9th, 2012 — Apr 15th, 2012 Generate the Custom HTML Email for this Issue
System News System News for Sun Users
Volume 170, Issue 2 << Previous Issue | Next Issue >>
Sections in this issue:
click to jump to section

Oracle Named #1 in RDBMS Market Segment for 2011
Gartner Report Finds 48.8 Percent Market Share
The Gartner 2011 Worldwide RDBMS Market Share Report reveals Oracle #1 in worldwide RDBMS software revenue share at 48.8 percent. Oracle holds more revenue share than its seven closest competitors combined and recorded a growth rate of 18.0 percent, exceeding both the industry average (16.3 percent) and the growth rates of its closest competitors, according to Gartner.
Oravle Virtual Assembly Builder, New Database Assemblies Ease Application Deployment to the Cloud
Applications Can Be Stored, Deployed from Enterprise Manager 12c Self-Service Interface
Oracle Virtual Assembly Builder (OVAB) used in conjunction with Oracle Enterprise Manager 12c can graphically model the topology of applications deployed to the cloud, define all dependencies and deployment constraints, and package the entire application as an application assembly that can be uploaded to the centralized software library in Enterprise Manager for self-service deployments, according to Anand Akela. Oracle Enterprise Manager 12c now also has a link to Oracle that will announce the availability of new downloadable assemblies. Customers can create a zone of Oracle VM 3.x servers and deploy these assemblies from the Enterprise Manager 12c Self-Service interface.
Using Throughput Latency 'Gaps' to Optimize Performance
'How the SPARC T4 Processor Optimizes Throughput Capacity': Oracle Technical White Paper
"How the SPARC T4 Processor Optimizes Throughput Capacity: A Case Study," an Oracle technical white paper by Ruud van der Pas and Jared Smolens, examines the architected latency-hiding features of Oracle's UltraSPARC T2+ and SPARC T4 processors, focusing on instruction-level latencies. In instances where neither caching nor prefetching work, the latency-caused "gaps" in a processor's execution pipeline can be employed to execute instructions from another application or a different thread from the same application. The latency hiding engineered into Oracle's SPARC T-series processors has this capability, and van der Pas and Smolens illustrate how this works at the application level.
Trade-in Older SPARC Servers, Get a $4,000 per CPU Allowance
Oracle's Upgrade Advantage Program Offer Expires May 31, 2012

Act now and get a trade-in allowance from Oracle on your old SPARC servers for a faster, more efficient SPARC Enterprise M8000, SPARC Enterprise M9000, or SPARC SuperCluster T4-4. The offer, which expires on May 31, 2012, and may not be combined with any other upgrade programs or promotions, includes a trade-in allowance of US$4000 per CPU. To learn more about the Upgrade Advantage Program (UAP) and other trade-ins, visit the UAP website. This is the perfect opportunity for savings and consolidation by reducing the number of systems in a datacenter or the number of datacenters in the organization.

Traffic on Oracle's SPARC Roadmap Is Accelerating
Achievements Outpace Initial Projections
"The driving time to major SPARC milestones has gotten shorter, and with the recent release of the SPARC T4 chip, Oracle is providing better-than-promised performance," writes David A. Kelly in Oracle Magazine Online. One typical company, attracted by the performance the SPARC processor delivers, is Tucson Electric Power Company, whose Senior Systems Administrator, IT Operations Group, Scott Myers, says, “We went from using more than 20 servers and a bunch of different operating systems to having everything running on Oracle Solaris 10 inside Oracle Solaris Zones. Oracle Solaris Zones allow us to consolidate more operations on a single server .... ”
Monsanto Company Implements Multiple Oracle Solutions
Improves Information Capacity and Performance, Disaster Recovery and Backup
The Monsanto Company has implemented a number of Oracle solutions in its effort to improve farm productivity and food quality. These Oracle solutions include:

  • Exadata Database Machine X2-2
  • Sun ZFS Storage Appliance
  • Oracle Active Data Guard
  • Oracle WebLogic Server
  • Oracle Real Application Cluster
  • Oracle Service Bus
  • Oracle Coherence
  • Oracle Consulting Managed Services

David Baum writes in Oracle Magazine Online that, while improving its information capacity and performance with Oracle Exadata, Monsanto has also been improving its disaster recovery and backup capabilities by implementing Oracle’s Sun ZFS Storage Appliance.

Speculations on the Performance Impact of Zones
Joerg Moellenkamp Looks at the Benchmarks

"What is the overhead of using Zones," ponders Joerg Moellenkamp in a recent post. He admits to never having measured any overhead caused by zones but he also contends that additional load introduced by processes wouldn't be there when only one zone is in use but, when additional monitoring daemons -- like additional daemons having a controlling or supervising job for the application that resulted in slightly longer runtimes of processes -- questions of overhead become pertinent. Moellenkamp posts links to a number of benchmarks that provide some evidence of the effect of overhead imposed by the use of zones.

IT - Storage
Is Legacy Storage Dead?
InformationWeek April 9, 2012
"Every major vendor will bring out a flash-only storage system before the end of the year--and almost every one of these products will fail. Legacy vendors have got to stop treating solid-state storage as if it were just a faster hard drive.

The spring 2012 Storage Networking World conference is all wrapped up and put away. As I mentioned in my last column and as we discussed in the updates on our site, there were a wide variety of discussions ranging from tape to SSD to cloud. In fact, the only topic usually present but missing from this year's show was legacy storage ..."

IT - Technology
15 MIT Research Projects That Will Make You Say 'Whoa'
NetworkWorld April 9, 2012
"Researchers at MIT are no strangers to the press, grabbing our attention regularly with new projects. Some in this list are potentially world-changing or life-saving breakthroughs, while others are just fun to look at. Either way, they all appear to be small previews of what life may be like within the next decade or two ..."
    Drone Helicopters In Formation (Video) April 10, 2012
    "Helicopter drones aren't new, but researchers at the University of Pennsylvania have added a neat little trick to theirs. They've made a swarm of mini quadrocopters that fly in perfect formation..."
      New Bill Lets Gov't Collect All Your Private Cyber Info
      CIO April 4, 2012
      "The Cyber Intelligence Sharing and Protection Act (CISPA) says feds can ask ISPs and others for any info they want, and no restrictions on its use are currently in place...

      The bill, like so many bad ideas, has good some intentions: It is supposed to enhance information sharing for cybersecurity purposes between the private sector and the government, and it would authorize Internet service providers and other companies to share customer communications and other personally identifiable information with government agencies ..."

        Three Futuristic Products You'll Never Own
        ComputerWorld April 7, 2012
        "The future isn't what it used to be. Futurists of yesteryear once predicted that by the year 2000 we'd be driving nuclear-powered cars, eating food in pill form and living in domed cities.

        It never happened. But why? ..."

          Benchmarking MySQL Replication with Multi-Threaded Slaves
          Multi-Threaded Slaves Delivers 5x Higher Replication Performance when Configured with 10 Databases/schemas
          In his post "Benchmarking MySQL Replication with Multi-threaded Slaves" Mat Keep measures performance improvements achieved when enabling the Multi-Threaded Slave enhancement feature of MySQL 5.6. His apparatus included two Linux servers, one running the replication master, the other running the replication slave. Multi-threaded slaves deliver ~5x higher replication performance when configured with 10 worker threads, with the load evenly distributed across the 10 x schemas. The configuration does not scale noticeably from 5 to 9 worker threads, but, configured with 10 worker threads, scalability increases significantly, suggesting it is desirable to configure the same number of worker threads as schemas.
          EOL Comes for Linux 2.4
          Release Makes It to 11
          The news, as reported by Sean Michael Kerner in is that the end has come after 11 years for Linux 2.4. He writes that the 2.4 kernel has been in maintenance-only mode for the most part for the last six years, ever since the 2.6 kernel was first released. There has long been a subset of vendors that still relied on 2.4, but that's no longer the case, he notes. Although EOL has been officially declared, Kerner avers that, as is often the case in open source, "I suspect this isn't quite the last we've heard of Linux 2.4."
          The Linux Foundation Releases Annual Linux Development Report
          Microsoft Makes First Kernel Contribution
          The Annual Linux Development Report reveals:
          • 7,800 plus developers from almost 800 different companies have contributed to the Linux kernel since tracking began in 2005.
          • Paid developers perform 75% of all kernel development.
          • The top 10 organizations sponsoring Linux kernel development since the last report (or Linux kernel 2.6.36) are Red Hat, Intel, Novell, IBM, Texas Instruments, Broadcom, Nokia, Samsung, Oracle and Google.
          • Microsoft finally appears on list of companies contributing to the Linux kernel.
          • Since the last report between 8,000 and 12,000 patches have gone into each kernel release every two to three months.
          IT - Cloud
          10 Most Powerful IaaS Companies
          NetworkWorld April 9, 2012
          "We assembled this list with help from analysts at Cloud Technology Partners, Current Analysis, Enterprise Strategy Group, Gartner, IDC and Neovise who watch the public cloud Infrastructure as a Service scene very closely. Each was asked to name the companies they believed have the most influence -- whether that's measured in market share, mind share, revenue, existing enterprise pull or underlying technology links -- in drawing enterprise customers into the realm of public cloud infrastructure..."
          Cloud Computing Done the Netflix Way
          CIO April 5, 2012
          "What can Netflix teach enterprises about data center operations and always-on reliability? Netflix is a consumer-facing Web shop with only a few applications--a completely different infrastructure challenge, right? Wrong.'s Bernard Golden explains the lessons to be learned from Netflix's data center transformation ..."
          Face It: Cloud Services Improve IT Management
          Internet Evolution April 10, 2012
          "One of the issues in the ongoing debate over the pluses and minuses associated with cloud computing is how clouds will impact IT. From an IT management standpoint, many traditionalists believe that the proliferation of cloud services is creating chaos.

          But I firmly believe that the alternative management that comes with cloud services offers advantages that can help IT and demonstrate its value to the organization ..."

          Tracking And Measuring Cloud Providers' Security Performance
          Dark Reading April 4, 2012
          "The move to cloud computing services is a big one for most IT organizations. But nowhere is the change more profound than in security, where the use of cloud services introduces a whole new array of questions and concerns.

          While moving even in part to a cloud model is a big change for many reasons, the most significant difference is a loss of direct control... "

          IT - CxO
          Are You Being Strategic Or Desperate?
          Washington Technology April 11, 2012
          "A few weeks ago I was moderating a panel of industry executives when a member of the audience turned the tables on me and asked me a question:

          What kind of merger and acquisition activity do you think we’ll see? What is going to drive the deals? ..."

            As IT Picks Up The Pace, Can Tech Workers Keep Up?
            ComputerWorld April 9, 2012
            "There's good news and bad news on the salary front for IT professionals this year. With many businesses enjoying renewed growth following an extended period of economic gloom, IT workers saw another year of modest salary increases, and they reported significantly fewer pay cuts, hiring freezes and layoffs.

            That's the good news ..."

              Do You Know Your Customers' Top 5 Challenges?
              Washington Technology April 6, 2012
              "According to the 2011 Northern Virginia Technology Council-Washington Technology CTO Innovation Award winners, the biggest challenges facing government right now are: Money, Transformation, Oceans of data, Cyber vulnerability, Going mobile ..."
                IT Reorgs: Be Sure Of Your Reasons
                ComputerWorld April 9, 2012
                "When companies think about an IT reorganization, the first two questions raised are usually "Who?" and "Where?" Wrong on both counts! The first two questions should always be "Why?" and "How?"

                Reorganizations encompass far more than moving lines and boxes on an org chart. The process usually has a major impact on personnel and productivity. When rumors of change emerge, productivity often plummets, and it typically remains low long after the reorg ..."

                  Making Numbers Meaningful: 10 Ways to Improve Your Presentations
                  CIO Insight April 6, 2012
                  "Budgeting and bean counting come with the territory for C-level executives, and often times CIOs have to build their business cases with metrics. But how you communicate that information can have a big impact on your budget and your team's projects. In his new book, "Painting with Numbers: Presenting Financials and Other Numbers so People Will Understand You" , author Randall Bolten contends that the presentation of numbers is nothing more than a communications skill, no more or less difficult than assembling a report or putting together a speech..."
                    Top Mistakes CIOs Make
                    Internet Evolution April 12, 2012
                    "Last month, I did an informal online poll to get feedback on what I believe are the top mistakes CIOs make. I based this list in part on errors I've made during my career, as well as those made by my peers in the field.

                    The following are what I consider to be the top mistakes made by CIOs ..."

                      IT - Wireless
                      802.11n: A Survival Guide
                      O'Reilly Title Shows How to Achieve a Wireless Office
                      O'Reilly's "802.11n: A Survival Guide," written by Matthew Gast, provides an in-depth look at key parts of 802.11n, showing how to achieve an Ethernet-free wireless office. Topics considered are:
                      • Learn how MIMO’s multiple data streams increase wireless speed
                      • Discover how 802.11n modifications improve MAC efficiency
                      • Examine such advanced PHY features as beanforming and space-time code block
                      • Use advanced MAC features to maintain interoperability with older devices
                      • Plan an 802.11n network by determining traffic demand, key applications, power requirements, and security
                      • Choose the architecture, select hardware, and plan coverage to design and build your network
                      IT - DR
                      How The Cloud Democratizes And Complicates Disaster Recovery
                      InfoWorld April 11, 2012
                      "Cloud computing is slowly upending the disaster recovery market. Only a few years ago, disaster recovery meant one of two things: For large organizations, it necessitated huge capital investments; for the mid-market on down, it meant backing up only the most important data to tape and shuffling it off to a secure location.

                      Actually, there's a third thing. For many organizations, even today, disaster recovery (DR) means doing the bare minimum, crossing your fingers and hoping for the best..."

                      IT - Networks
                      A Brief History of the Enterprise WAN
                      NetworkWorld April 6, 2012
                      "Before delving further into the details of the Next-generation Enterprise WAN architecture I think it will be instructive to look first at the history of the Enterprise WAN.

                      Some would argue that the X.25 networks – the first "cloud" services in widespread use – that were popular in the 1970s and 1980s for remote mainframe terminal access are the beginnings of the Enterprise WAN, but I’ll stick to the "modern" era that began with the rise of the personal computers connected via LANs in the 1980s ..."

                        Exponential Bandwidth Growth And Cost Declines
                        NetworkWorld April 10, 2012
                        "Global Internet traffic is expected to grow 32% per year from 2010 to 2015. In 2010, an average of 46 terabits/second traveled over the Internet and should surpass 199 terabits/second in 2015. But while IP traffic is growing exponentially, the budgets for network equipment are growing at less than 10% ..."
                          Monitoring, Policies Needed To Catch Rogue IPv6 Traffic
                          Dark Reading April 6, 2012
                          "The spotty support of the next-generation Internet routing protocol, IPv6, has left companies with a network security problem that has largely passed unnoticed. While IPv6 is built into many endpoint devices and supported by a majority of networking hardware, enterprise-routing and security features are typically lacking.

                          The result is that IPv6 traffic is traversing most companies' networks undetected, creating a 'shadow network' where traffic flies under the radar of security devices..."

                          IT - Operations
                          In Data Centers, Ease Vs. Risk In Net-Based Power Management
                          ComputerWorld April 12, 2012
                          "From the comfort of your couch, maybe via a tablet in hand, you can now turn on and off a data center generator that could be as large as a house.

                          This capability isn't really surprising. Remote access to data center functions, including server and network operations, are now routine in many facilities. Anyone using a cloud service to manage environments is doing it remotely..."

                            How Much Money Do You Need To Lose Before You Start Monitoring?
                            Dark Reading April 9, 2012
                            "A new blog post by Brian Krebs states that the FBI has released a cyberintelligence bulletin claiming that a series of hacks perpetrated against smart-meter installations over the past several years may cost a Puerto Rican electric utility upward of $400 million annually.

                            According to the post, the FBI said it believes former employees of the meter manufacturer and employees of the utility were altering the meters in exchange for cash and training others to do so. "These individuals are charging $300 to $1,000 to reprogram residential meters, and about $3,000 to reprogram commercial meters," the alert states...."

                              Monitor Data Center Batteries
                              Processor April 6, 2012
                              "With so many critical components to worry about in a data center, it can be easy to put smaller systems on the back burner. One example is the data center’s batteries. Even companies that have implemented battery monitoring systems sometimes do not take the proper precautions to ensure their batteries are working as they should. Mike Daffron, director of sales and marketing at API, says it's not unusual to find companies with monitoring systems that aren’t in working order, properly wired, or even turned on..."
                              Indian IT Firms Are Heading For A Fall
                              ComputerWorld April 6, 2012
                              "Response to visa-related lawsuits indicates that Indian services firms don't fully understand the American system ...

                              It is the American character not to back down, and to fight for what is right. Our children are taught this from their earliest ages. Even new arrivals, immigrants or people on work visas are quick to grasp this essential truth.

                              America's institutions reflect the national character. Our political system encourages sharp and hard contests. Our legal system facilitates a fight, as India's IT companies are now learning.

                              Three of India's largest IT outsourcing firms, Infosys Technologies, Larsen & Toubro InfoTech and Tata Consultancy Services, are involved in lawsuits filed against them by current and former employees ..."

                                IT - Security
                                Getting Ready For Data Loss Prevention (DLP)
                                Dark Reading April 6, 2012
                                "The last thing any organization wants is to make news due to a data breach, but with the evolution of security threats coupled with the unpredictable human factor, the risk of data leakage has intensified.

                                While technology provides functionality to enforce business conduct, meet regulatory requirements, and safeguard confidential data, it can't stand alone: There must be a well-defined set of policies -- standards, directives, and guidelines -- that outline exactly what data requires protecting, where data security controls will be enforced, and exactly how data will be protected.

                                That is the case with data loss prevention (DLP)..."

                                How To Make Sure That Digital Signature Is Legit
                                IT World April 11, 2012
                                "Digital signatures enable paperless contracts and can speed up business transactions. The 2001 E-Sign Act was meant to ease the adoption of electronic signatures, yet the mechanics of what makes up an e-signature were left deliberately wide open. Eleven years later, there is still widespread mistrust of e-signatures, even though they contain more evidence that a particular person signed a document at a particular time than a traditional pen-and-ink contract does..."
                                  IT Must Change Security Strategies to Keep Up With Cybercriminals
                                  CIO April 2, 2012
                                  "Businesses may have scaled back their security and risk management investments during the economic downturn, but cybercriminals continued to invest. In the coming years, criminal organizations will grow even more sophisticated. To be prepared for what's coming, organizations must adjust their approach to security now..."
                                  Screwing Up Network Changes One Of Biggest Causes For Security, Management Failures
                                  NetworkWorld April 10, 2012
                                  "According to a survey of 182 IT security and operations professionals, one of the biggest security and management challenges they face is ... how they screw up their own networks.

                                  Yes, it's internal IT screw-ups caused by unscheduled out-of-process changes to systems that are in place, especially firewalls, that have resulted in either an outage, a data breach or an audit failure, according to 77% of the survey's respondents..."

                                  The Untimely Death Of The Advanced Persistent Threat?
                                  GCN April 6, 2012
                                  "Advanced persistent threats were notable by their absence in a recent discussion of new cyberattacks.

                                  Richard Bejtlich, chief security officer of the security firm Mandiant Corp., and RSA’s Amit Yoran, former director of the Homeland Security Department’s National Cyber Security Division, discussed critical new threats during an April 4 session at the FOSE security conference in Washington, and the familiar term "APT" never came up. They talked about innovative attacks designed to circumvent traditional IT security tools and about long-term campaigns against targeted systems..."

                                  Weak Passwords Still The Downfall Of Enterprise Security
                                  ComputerWorld April 12, 2012
                                  "A recent data breach that exposed the Social Security numbers of more than 255,000 people in Utah has once again highlighted the longstanding but often underestimated risks posed to organizations by weak and default passwords.

                                  The breach, involving a Medicaid server at the Utah Department of Health, resulted from a configuration error at the authentication layer of the server hosting the compromised data, according to state IT officials..."

                                  IT - Careers
                                  Ten Ways Employers Check You Out
                                  Baseline April 5, 2012
                                  "The process of finding a job has changed in the digital age, and human resources managers and other hirers are using new tools to screen potential job candidates, according to recent research from SHL, which specializes in talent-measurement solutions. While résumés and other traditional means of candidate-employer interaction remain standard, many hiring managers want a more complete picture of their applicants ..."
                                    Stupid Tech Support Tricks: IT Calls Of Shame
                                    NetworkWorld April 9, 2012
                                    "Working in tech support is a bit like teaching preschool: You're an educator who provides reassurance in troubling times. You share knowledge and help others overcome their obstacles. And some days, it feels like all you hear is screaming, crying, and incoherent babble.

                                    Tech support is no cakewalk -- there's no question about that -- but boy, does it lead to entertaining anecdotes ..."

                                      Ten Questions That Will Reveal Your Character
                                      Baseline April 10, 2012
                                      "Nothing is as important to a professional as his or her reputation, and while it can take a lifetime to build a good one, a few moments can destroy it.

                                      It's important to realize that you and your organization are judged by the quality of your character. In the new book "The Power of Reputation: Strengthen the Asset That Will Make or Break Your Career", author Chris Komisarjevsky contends that a workplace reputation should be treated as an asset with tangible value. And it’s not a matter of simply playing nice, he cautions..."

                                        IT - Social Media
                                        The Social Web: Who Owns Your Data?
                                        ZDNet April 9, 2012
                                        "Opening Statements: It's yours -- until you upload it ...

                                        Emil Protalinski: You own your data. After all, it's your data. You will always own your data, but so will whatever firm, company, or organization you have allowed to also own your data.

                                        You are the exclusive owner of your data right up until the point where you hand it over to a party and agree they also own your data. Facebook is one such service..."

                                          IT - Virtualization
                                          I/O Virtualization (IOV) Revisited
                                          ToolBox April 12, 2012
                                          "Like server virtualization, IOV involves servers, storage, network, operating system, and other infrastructure resource management areas and disciplines. The business and technology value proposition or benefits of converged I/O networks and I/O virtualization are similar to those for server and storage virtualization..."
                                          IT - Email
                                          Email Etiquette: Peers, Professors And Professionals
                                          ZDNet April 9, 2012
                                          "Summary: How can you email your employers, peers and professors professionally?

                                          The Generation Y. Known for smiley faces, overly-enthusiastic use of exclamation marks, and doubtlessly the odd typographic mistake or two.

                                          It is easy for a less formal style of communication to creep into emails that should reflect a more professional image, however, it can make an individual look unprofessional or lazy — and may confuse the recipient if they cannot ‘translate’ slang or text-speak.

                                          How can you impress a future employer, professor or professional peer through email, and create a good impression? ..."

                                            How to Tell If an Email Is a Phishing Scam
                                            CSO Online April 10, 2012
                                            "Email phishing scams have grown more sophisticated since they first began popping up in corporate inboxes in the 1990s. Early phishing emails were relatively easy to detect as they were characterized by poor grammar and spelling. No legitimate business would send an email to customers chockfull of typos.

                                            As email users grew wary of phishing attempts, cybercriminals have had to change their tactics and their lures ..."

                                              IT - Database
                                              10 SQL Injection Tools For Database Pwnage
                                              Dark Reading April 11, 2012
                                              "Black hat hackers and pen testers alike use these tools to dump data, perform privilege escalations, and effectively take over sensitive databases: BSQL Hacker, The Mole, Pangolin, Havij, Enema SQLi, Sqlninja, sqlsus, Safe3 SQL Injector, SQL Poizon


                                              IT - Big Data
                                              Storage's 'Big' Overkill: Truth About The Trend
                                              InformationWeek April 12, 2012
                                              "A new trend has been showing up in our briefing calls lately: practically everything is Big. Big Data, Big Backups, Big Archive, Big Cloud. Being from Texas I'm accustomed to the overuse of the word, but as usual the storage industry is taking this to new extremes. Don't let talk of Big This and Big That lead you down the wrong path, waste your meeting time, and maybe even waste your budget ..."
                                              IT - Mobile
                                              Is Mobile Security A Losing Game?
                                              Federal Computer Week April 6, 2012
                                              "The surge of network-connected mobile devices has introduced a new kind of threat to an already crowded cyber landscape, and with it a new kind of concern: mobile security. With an increasing number of workers from both the federal and private sectors using their Blackberries, iPhones, Androids and iPads to conduct business, it's a critical threat to address – and one that will require a step away from traditional cyber defense, according to industry insiders ..."
                                              IT - BYOD
                                              Employees Who BYOD Leave Basic Security Behind, Study Finds
                                              GCN April 9, 2012
                                              "Eighty-one percent of people surveyed in a new study say they use a personal device for work — and more than half of them fail to take the most basic steps to secure their devices and data.

                                              And they’re using those devices for work whether their employers have officially OK'd it or not. Sixty-six percent of those using a personal device for work say their organization does not have a 'bring your own device' policy.

                                              The survey, conducted online in February by ESET and Harris Interactive, included 1,320 employed U.S. adults, sought to determine the extent of BYOD practices and how well, or poorly, those devices are being secured, according to a by ESET security researcher Cameron Camp ..."

                                              Estimating The Economics Behind BYOD Security
                                              Dark Reading April 5, 2012
                                              "Even as bring your own device (BYOD) policies and programs have opened up a world of opportunity for organizations, the risks and additional operational burdens imposed have changed the economic realities of mobility more than many in IT realize. As organizations weigh the costs and opportunities offered by BYOD compared to issuing company devices, they need to be aware of the hidden costs of BYOD -- particularly within high-risk environments ..."
                                              Top Ten Articles for last few Issues
                                              Vol 170 Issue 1; Vol 169 Issues 1, 2,3 and 4; Vol 168 Issues 3, 4 and 5
                                              We track how frequently each article is viewed on the web site to determine which the readers consider the most important. For last week, the top 10 articles were:

                                              • New Location for Java Tutorials
                                              • Eclipse RCP vs. NetBeans Platform
                                              • Synchronous Writes and ZIL Explained
                                              • BNP Paribas Has Glowing Response to Oracle Exadata V2 Implementation
                                              • Tape Technology Leaps Forward in The 3rd Era
                                              • PC/SC-Lite 1.3 Released for Sun Ray Server Software
                                              • Oracle VM Manager
                                              • Ready for Business: Oracle GlassFish Server
                                              • Rival Hardware Vendors Get OK to Resell Three Oracle Operating Systems
                                              • A How-to on Using ISC DHCP for the OpenSolaris Automated Installer

                                              The longer version of this article has list of top ten articles for the last 8 weeks.

                                                The Document Foundation Releases LibreOffice 3.5.2
                                                Hackers Continue to Join the Ranks
                                                The Document Foundation has released LibreOffice 3.5.2, which fixes an additional large number of the bugs identified by TDF QA experts and LibreOffice users worldwide. Further TDF news is that LibreOffice has recently been selected as a mentoring organization for Google Summer of Code. Students are invited to look at the GSoC Ideas Wiki Page to get inspired for their next task. One of 2011 GSoC projects, the MS Visio Import Filter, has been integrated in LibreOffice 3.5, and the author, Eilidh McAdam, has already found a LibreOffice development related employer: Lanedo. The increasing popularity of LibreOffice is reflected in the growth of on-board hackers, which now numbers 429.
                                                Trending in
                                                Vol 235, Issue 2
                                                Trending IT Articles