News about Oracle's Solaris and Sun Hardware
System News
Apr 23rd, 2012 — Apr 29th, 2012 Generate the Custom HTML Email for this Issue
System News System News for Sun Users
Volume 170, Issue 4 << Previous Issue | Next Issue >>
Sections in this issue:
click to jump to section

DD EMC Data Domain Boost - Oracle RMAN Integration
Using EMC Data Domain systems to deduplicate Oracle database backups
Coupling EMC Data Domain's DD Boost with Oracle's native Recovery Manager (RMAN) utility is enabling DBAs to achieve advanced integration between EMC Data Domain deduplication storage systems and Oracle RMAN for faster, more efficient backup and recovery, writes Jerome M. Wendt in Using the solutions together eliminates the isolated storage islands that can result from using Oracle RMAN alone, Wendt contends, adding that, while Oracle RMAN could already backup directly to Data Domain systems using CIFS or NFS protocols, using DD Boost as the transport protocol instead of these protocols results in backups that are up to 50% faster.
GREE Selects Oracle for Data Analysis
Sun ZFS Storage Appliance, Oracle Solaris 11 on Sun x86 Server
GREE, Inc., a global mobile social gaming company, is using Oracle's Sun ZFS Storage 7420 appliance and Sun Fire X4170 M2 server with Oracle Solaris 11 to support their social network data analysis.

GREE currently uses Oracle products to build the data analysis service for its Japanese social network, which combines social mobile games with a variety of social media services, worldwide. GREE collects terabytes of log data every day to analyze traffic and service patterns in its effort to continuously improve customer service.

The Register Reports on Aggressive SPARC Upgrade Program
Oacle Offers up to $4,000 per Controller on Older SPARC Hardware

Writing in the The Register, Timothy Prickett Morgan draws attention to Oracle's Trade In, Trade Up offer on the SPARC SuperCluster T4-4, Enterprise M8000, and Enterprise M9000 hardware. Oracle's installed base can receive up to $4,000 per processor as a trade-in on SPARC and SPARC x64 machines that have been in service for the three months prior to accepting the deal. Oracle is also extending the offer to Fujitsu users. Prickett Morgan speculates that Oracle's sales force will concentrate its efforts on the SPARC SuperCluster T4-4 setups running Solaris 11 and able to support application server and database workloads.

KyivStar, JSC Reduces Legacy Environment Storage Volumes by 85%, Boosts Performance 300-500%
Ukrainian Telco Implements Oracle Exadata Database Machine, Oracle Active Data Guard 11g
By implementing Oracle Exadata Database Machine and Oracle Active Data Guard 11g KyivStar, JSC, Ukraine's foremost mobile communications and mobile internet provider, reduced storage volume to merely 15% of its legacy environment—from 444 terabytes to 70 terabytes. KyivStar also increased its financial and analytical calculation performance by 300% to 500%. This implementation has enabled the company to effectively monitor revenues and margins, apply taxes correctly and quickly, and detect data losses due to errors or fraud by consolidating all key subsystems, such as financial reporting services or online services for subscribers, all within a year of the implementation.
Oracle Exadata Database Machine Triples GfK Group Retail and Technology Reporting Performance
Fifty Distributed Data Marts Get Consolidated onto a Single Oracle Exadata System
GfK, whose retail sales tracking solution offers powerful insights into the consumer goods market with data from the world's largest retail network, implemented Oracle Exadata Database Machine, ensuring business intelligence self-service efficiency for customers for the next two years with its highly scalable, reliable, and stable data infrastructure. Oracle Exadata Database Machine has tripled performance while maintaining low TCO by enabling the consolidation of 50 distributed data marts into one Oracle Exadata system. GfK is now able to generate its global reports at an accelerated pace and to implement reporting on mobile internet usage despite extremely large data requirements.
IT - Storage
Cloud Storage Booming, But Trouble Brewing
InfoWorld April 26, 2012
"SkyDrive, Google Drive, Dropbox, Box, and SugarSync have the same feature that got Megaupload shut down, and users still have reason to distrust providers ...

No matter how you slice it, there's only a finite number of people and companies that will put their data in the public cloud, but that hasn't stopped the competition -- for a free service, no less! -- from turning cutthroat. But the market could be in trouble if the same standards that brought down Megaupload are applied or if providers continue to abuse users' trust..."

How To Secure Large Data Warehouses
Dark Reading April 22, 2012
"As more businesses consolidate sensitive data in high-capacity warehouses, the question becomes how to properly secure these potential treasure-houses. Here are some tips ...

[Excerpted from "Securing the Data Warehouse," a new report posted this week on Dark Reading's Database Security Tech Center.]

Sony. RSA. Epsilon. Aside from major security breaches, what do these companies have in common? They were all victimized by hackers looking to access large storehouses of corporate data..."

Free and Open Source S/W
Support for FOSS Components in Oracle Solaris
Available Through Oracle Premier Support for Systems
A post on points readers to a My Oracle Support knowledge article that provides background information concerning support of FOSS packages delivered with Oracle Solaris 11 and older Oracle Solaris releases. A subset of FOSS components delivered in Oracle Solaris are supported in terms of Oracle Premier Support for Systems. New version of a FOSS component will be delivered in Oracle Solaris 10 either as a patch or an update release, a new version of a FOSS component will be delivered in Oracle Solaris 11 either as part of a Support Repository Update (SRU) or in an update release.
IT - Cloud
5 Tips For Negotiating Cloud Software SLAs
InformationWeek April 20, 202
"Custom cloud service level agreements aren't the norm, but can be done. Prepare to make a business case to the cloud provider with this expert advice.

While negotiating special contract terms is not standard operating procedure in the world of software-as-a-service (SaaS), experts say companies have a much better shot at custom provisions if they know exactly what they're looking for and can frame their needs in the context of why they're critical for business..."

Cloud Clash: Software Vendors Vs. Cloud Providers
InfoWorld April 24, 2012
" has announced a new online marketplace in its Amazon Web Services that lets customers use software and services from a variety of software providers at an hourly metered rate. Software providers like IBM, Microsoft, SAP, and CA offer products for sale on the site as well. There are also free open source applications, such as Drupal and SugarCRM.'s rationale is simple: provide software to run on the AWS site to sell more AWS storage and compute units and, thus, make more money. But the move could put software providers and their customers in a difficult position..."

Efforts Afoot To Advance Cloud Standards
NetworkWorld April 17, 2012
"Launching a public cloud deployment is no "plug and play" matter for most business users, says Nicos Vekiarides, CEO of TwinStrata, one of dozens of companies that help manage cloud deployments for businesses.

TwinStrata uses APIs from each of the about a dozen IaaS providers it works with and has made a program that allows users to migrate data or workloads into the cloud.

But it doesn't have to be that way, some say..."

    Amazon CTO: 'You Should Be Able To Walk Away' From Cloud Providers
    NetworkWorld April 20, 2012
    "At an Amazon Web Services summit event in New York City on Thursday, CTO Werner Vogels said one of the core philosophies related to the company's market-leading suite of infrastructure as a service products is that customers should be able to opt out whenever they want..."
    IT - CxO
    How to Manage Unmanageable Employees
    CIO Insight April 25, 2012
    "With unemployment still high, it would make sense that only the best and the brightest would be working – but dysfunctional employees abound. IT's not that these so-called professionals don’t have the skills they need to do their jobs, whether they're networking experts or mobile app developers. They're not dummies. However, they can have some serious personality problems that no one picked up on during the interview process..."
    Business Process Management: Ten Bold Predictions
    eWeek April 19, 2012
    "Business Process Management tools enable organizations to enhance innovation, integration and the speed at which they're able to deliver products and services, helping 21st Century businesses gain an edge over the competition. And effective use of BPM tools can help CIOs with other issues like regulatory compliance and keeping up with the global marketplace by leveraging IT..."
    CIOs Still Dismissed As Mere Techies By CEOs
    NetworkWorld April 17, 2012
    "CEOs still often dismiss CIOs as too techie and not aligned business activities, according to results from the latest Gartner research...

    According to a survey of 220 CEOs across the world, business leaders expect spend on IT to rise, but without a corresponding rise in the importance of the role of the CIO within the organization..."

    Five Leadership Lessons From Jean-Luc Picard
    Forbes March 13, 2012
    "Captain Jean-Luc Picard is the model of a great 24th Century Starfleet captain. On his watch, the crew of the Enterprise successfully defended humanity against the judgement of the Q-Continuum, defeated the Borg, prevented the Romulans from installing a puppet government in the Klingon Empire, and encountered countless new species..."
      How To Lose Your Best IT Employees
      InformationWeek April 20, 2012
      "Two out of every five IT pros are looking for a new job, our 2012 U.S. IT Salary Survey data shows. Are you counting on high unemployment, or maybe that rickety foosball table in the lunchroom, to keep your best people from leaving?

      IT leaders have the advantage here, and not only because of the shaky job market. Most of those IT job seekers are only casually looking, and based on how highly our data shows they value job stability, they'd rather stay where they are. So if IT leaders understand the few, critical job elements that matter to their employees, they have a good shot at retaining them..."

        The Upside Of Shadow IT
        NetworkWorld April 24, 2012
        "First, a scary statistic: Gartner predicts that in less than three years, 35% of enterprise IT expenditures will happen outside of the corporate IT budget. Employees will regularly subscribe to collaboration, analytic and other cloud services they want, all with the press of a button. Others will simply build their own applications using readily available cloud-based tools and development platforms..."
        Workers Did Not Exceed Authorization When Data Stolen, Says Appeals Court
        ComputerWorld April 19, 2012
        "In a somewhat startling decision, the U.S. Court of Appeals for the Ninth Circuit last week ruled that several employees at an executive recruitment firm did not exceed their authorized access to their company's database when they logged into the system and stole confidential data from it..."
          CEOs Plan to Invest in IT, Innovation in 2012
          CIO Insight April 20, 2012
          "While CEOs are worried more about cutting costs than they have been in recent years, driving business growth remains a top priority, according to a recent survey of chief executives by research firm Gartner, Inc. The "2012 Gartner CEO and Senior Business Executive Survey" reveals that even as cost cutting remains a priority, companies still plan to make investments in IT..."
          IT - DR
          Avoiding 9 Common Threats To Your Company
          Search Storage April 22, 2012
          "When developing an IT disaster recovery plan, two crucial questions must be answered before considering what establishes the most efficient and cost-effective recovery strategy for your company. So what are those questions? And what high-level potential threats are IT departments exposed to day in and day out? Read this E-Guide to find out those answers and to learn more about the disaster recovery risk assessment process...
          IT - PM
          6 Steps to Project Leadership Success
          Accelerating IT Success April 12, 2012
          "Projects undertaken today are generally becoming larger, more complex and increasingly cross-cultural. The need to manage multiple stakeholders and user groups, a dispersed project team, cutting edge technology and a multi-faceted product to tight deadlines is ever-increasing.

          For project managers to be successful at navigating and delivering these types of projects, not only must they be good at managing events, processes and resources, they must also be excellent at leading people and at building relationships at all levels..."

            7 Programming Myths...Busted!
            InfoWorld April 23, 202
            "The tools are sharper, but software development remains rife with misconceptions on productivity, code efficiency, offshoring, and more ...

            Even among people as logical and rational as software developers, you should never underestimate the power of myth. Some programmers will believe what they choose to believe against all better judgment..."

              What do Abbott and Costello Have To Do with Good Project Management?
              Project Management Hut April 9, 2012
              "a scarce commodity back then and it can still creep up on me even these days but back then, woah! Look out, man. It had a hold on me. I was rich with "don’t know how to act without tripping over my own tongue, totally awkward, gangly, bumbling-ness". You could set your clock to it and you could take that to the bank! ..."
                What's the Profile of a Good Project Manager?
                Accelerating IT Success April 16, 2012
                "What makes a good project manager? Are they people centric? Business aligned? It’s easy to think about the qualities a CIO would want in a project manager, but it can be much harder to determine a set listing of attributes that define a good project manager. Ben Snyder of Systemation has been collecting information on project managers extensively, and provides his findings on pm4girls..."
                IT - Networks
                Apple's Ipv6 Misstep Is A Sign Of The Times
                NetworkWorld April 24, 2012
                "Apple's controversial decision not to support IPv6 on Version 6.0 of AirPort Utility is the latest example of a broader problem plaguing the next-gen Internet Protocol: Many network vendors are lacking the same level of features and performance in products that support IPv6 as those that support IPv4, the original Internet Protocol..."
                How Cybercriminals Are Infecting Networks
                HelpNet Security April 20, 2012
                "Research by Websense reveals the trifecta that is driving epidemic levels of data theft:

                • extremely effective social media lures
                • evasive and hard-to-detect infiltration of malware
                • sophisticated exfiltration of confidential data.

                Traditional defenses just aren't working any more..."

                  How To Hack Your Own Wi-Fi Network
                  NetworkWorld April 23, 2012
                  "Attempting to "hack" into your own wireless network can help you spot potential Wi-Fi security vulnerabilities and figure out ways to protect against them.

                  Here are some Wi-Fi hacking techniques and the tools — nearly all free — you can use for penetration testing. These tools will help you uncover rogue access points, weak Wi-Fi passwords, and spot other weaknesses and security holes before someone else does..."

                  Mission Impossible: A Remote Network Cutover
                  InfoWorld April 16, 2012
                  "Few feats are more rewarding to a network admin than pulling off the seemingly impossible -- which is not exactly a rare request ...

                  Any network admin who's been around for a while has had this experience. It's not something you look forward to doing, nor is it arguably a good idea. You do it because it's really the only option at the time -- a remote network cutover that relies on the same access path used for the reconfiguration..."

                    IT - Operations
                    Boost Energy Efficiency
                    Processor April 20, 2012
                    "Improving your data center's energy efficiency and decreasing power consumption as much as possible are two great ways to increase the greenness of your facility, and it can save you money on energy costs, as well. This double bonus may be enough to entice data center and IT managers to do everything they can to boost their efficiency, but it can be difficult to know where exactly to get started. Here we'll provide you with multiple ways to improve your energy efficiency and ensure you are getting the necessary and expected performance from your data center equipment..."
                    Five Unique Ways to Use a Log Management Solution
                    IT Business Edge April 26, 2012
                    "In today's economy, small- and medium-sized businesses (SMBs) are constantly looking for ways to save money, yield maximum potential from deployed technologies and, ultimately, 'do more with less.' One way they can accomplish these goals is by taking advantage of a log management solution..."
                    Large Enterprises Handing Off Data Center Builds
                    NetworkWorld April 23, 2012
                    "Demand for data center space is on the rise. IT pros responsible for facility planning are juggling physical requirements for secure, power-abundant space with operational considerations, including the need to improve disaster recovery, deploy new applications and services, and handle increasingly large data volumes..."
                    IT - Security
                    Weak Passwords Still Subvert IT Security
                    ComputerWorld April 23, 2012
                    "A recent data breach that exposed the Social Security numbers of more than 280,000 people served as yet another reminder of the well-recognized, but often discounted, risks associated with using weak and default passwords.

                    In the breach of the Medicaid server at the Utah Department of Health late last month, the hackers -- believed to be from Eastern Europe -- exploited a configuration error at the authentication layer of the server hosting the compromised data, according to Utah IT officials..."

                    10 Commandments Of Windows Security
                    CSO Online April 23, 3012
                    "With the introduction of Windows 7, many PC and notebook users may feel more secure than they did using older versions of the Microsoft operating system. Newer OSs have more security features, offer better out-of-the-box security settings and have closed many of the historical security holes. Windows 7, for example, has changed the default User Account Control level so that it's harder for rogue programs to run without first explicitly gaining the user's permission..."
                    82% Of Data Breaches Due To Staff Errors; 4% Of IT Trusts Users; IT Is Still To Blame
                    IIT World April 19. 2012
                    "Here are two timely items that seem to go together:

                    • Eight out of 10 enterprise data breaches caused by employee errors
                    • Only 4% of IT staff trust users

                    The first item is based on preliminary results from an annual survey from PricewaterhouseCoopers (PwC) designed to identify characteristics major data breaches have in common..."

                      Anonymous Drives Security Fears, But Not Spending
                      InformationWeek April 23, 2012
                      "Who are the groups voted most likely to lob cyber attacks at companies over the next six months? That would be the hacktivist set, including Anonymous, LulzSec Reborn, and their ilk.

                      So said 61% of 1,900 IT and information security personnel recently surveyed by endpoint security firm Bit9..."

                      Cyber Crime Not A Big Deal? Get Real
                      InfoWorld April 24, 2012
                      "Perhaps you've read Bill Snyder's blog post based on a recent Microsoft paper disputing the high cost of cyber crime cited in many industry and vendor surveys. Unfortunately, I think too many people are taking the actuall claims of the paper and expanding the conclusion to cover all cyber crime.

                      I don't want to debate the validity of the original paper's data or conclusions. I believe my knowledgeable colleagues may even be right that certain surveys radically overstate the costs of cyber crime by relying on overly small sample sizes for a given population..."

                        Damage Mitigation As The New Defense
                        Dark Reading April 5, 2012
                        "Containing the attacker in today's persistent threat environment ...

                        Any Defense contractor -- and now, a few security vendors -- can tell you that even the best security technology and expertise can't stop a well-funded and determined attacker.

                        That new reality, which has been building for several years starting in the military sector, has shifted the focus from trying to stop attackers at the door to instead trying to lessen the impact of an inevitable hack ..."

                        Top Enterprise Security Concerns And IT Problems
                        HelpNet Security April 25, 2012
                        "A global study of more than 1,200 IT professionals in EMEA reveals that, in the last year, more than one in five enterprises has experienced a security breach and one in 10 has suffered a privacy breach..."
                        VMware Source Code Stolen, Impact Unclear
                        InfoWorld April 25. 2012
                        "VMware ESX source code has been stolen and posted online, but the company says its virtualization platform doesn't necessarily pose an increased risk to customers.

                        The stolen code amounts to a single file from sometime around 2003 or 2004, the company says in a blog post..."

                        Web Apps Create New Security Risks
                        Baseline April 18, 2012
                        "There's no debate that security is growing infinitely more complex by the day. As organizations open their networks to customers, business partners and others, the risks continue to grow. Mobile devices and open-source codes further complicate matters--all while hackers and cyber-crooks become more sophisticated and aggressive..."
                        FCC's Ruling that Google's WiFi Snooping is Legal Sets Horrible Precedent
                        ComputerWorld April 16, 2012
                        "Anyone looking for assurance that the privacy of their home wireless networks would be protected from snoopers by government regulators won't find it in the Federal Communication Commission's recent action against Google.

                        The FCC fined Google $25,000 for impeding the agency's investigation into reports that Google snooped on WiFi networks as its vehicles gathered information for its maps service..."

                        IT - Careers
                        Business Etiquette: 5 Rules That Matter Now
                        Inc. April 17, 2012
                        "The word "etiquette" gets a bad rap. For one thing, it sounds stodgy and pretentious. And rules that are socially or morally prescribed seem intrusive to our sense of individuality and freedom.

                        But the concept of etiquette is still essential, especially now—and particularly in business. New communication platforms, like Facebook and Linked In, have blurred the lines of appropriateness and we're all left wondering how to navigate unchartered social territory..."

                          Most IT Admins Considered Switching Careers Due To Stress
                          HelpNet Security April 20, 2012
                          "67% of IT administrators have considered switching careers due to job stress, according to GFI Software. Managers, users (employees), and tight deadlines were cited as the biggest job stressors. Survey results also revealed that IT professionals tend to work long overtime hours, with one third working the equivalent of 10 additional weeks per year..."
                            Top 10 Ways to Protect Your Privacy and Avoid the Government's Prying Eyes
                            v3 co uk April 20, 2012
                            "Be careful what you do online. The government is proposing web snooping plans to monitor, record and understand every site you visit, every email you send, and even every phone call you make.

                            These plans have been met with howls of derision and dissension, with everyone from the inventor of the web Sir Tim Berners-Lee and the co-founder of Google, Sergey Brin, bemoaning this growing censorship from governments..."

                            IT - Virtualization
                            Shades of pcAnywhere in VMware Breach
                            InfoWorld April 26. 2012
                            "This week, virtualization software maker VMware acknowledged that a single file posted online came from the source code to its ESX hypervisor. Dating back to at least 2004, the source code may have come from a third party. The virtualization company assured customers that the public posting of the code did not necessarily pose a security issue..."
                            IT - Compliance
                            Europe's High Court Says ISPs Can Hand Over Alleged Pirate Data
                            cnet April 19, 2012
                            "The European Court of Justice laid down a law interpretation today that could have a profound impact on the prosecution of alleged pirates in Sweden.

                            The ECJ said today that Sweden's law does not provide any barriers for Internet Service Providers (ISPs) to hand over the data of alleged pirates when rightsholders, trying to prosecute those folks, request it. The move could pave the way for Sweden's highest court to force ISPs to hand over user data upon request whenever a person is suspected of pirating music, movies, e-books, or any other form of entertainment..."

                              Enhanced Sun ZFS Storage 7420 Appliance Beats NetApp Results on SPECsfs2008 NFS Benchmark
                              Sets Two-Node World Record

                              The enhanced Sun ZFS Storage 7420 Appliance can support up to 64x more memory and up to 10x more cores than a NetApp FAS3270 controller. With the Oracle VM Storage Connect Plug-in, customers can provision and manage Sun ZFS Storage Appliance LUNs, executing advanced data protection features directly from the Oracle VM Storage Connect Console. Using the Sun ZFS Storage Appliance Plug-in, customers can pass data on system performance, health and configuration to the Oracle Enterprise Manager console from a single pane of glass. The Sun ZFS Storage Appliances now offer larger three Terabyte (TB) capacity-optimized SAS-2 hard disk drives.

                              iBridge Selects OracleÂs Pillar Axiom 600 Storage System
                              Cuts Costs by up to 70%, Greatly Expands Storage Capacity
                              iBridge, an information management and data services company in the legal, healthcare, manufacturing, government and financial services sectors, has implemented Oracle’s Pillar Axiom 600 Storage System as the foundation of its new data center. The implementation has enabled iBridge to reduce administrative overhead costs by up to 70 percent compared to legacy storage environments in its other data centers. Exploiting the ability of the Pillar Axiom 600-based storage environment to scale rapidly and cost effectively to 1.6 Petabytes (PB) of capacity and up to eight controllers for performance, iBridge has also gained the flexibility to rapidly respond to customer needs.
                              IT - Big Data
                              How To Tackle The Big Data Challenge (Part 1)
                              NetworkComputing April 23, 2012
                              "Big data is a term getting bandied about a lot these days. It describes the phenomenon of information that keeps growing in organizations, thanks in part to the growth in social media. According to the InformationWeek Research: The Big Data Management Challenge survey of technology professionals, regardless of industry, the five top data drivers are financial transactions, email, imaging data, Web logs, and Internet text and documents..."
                              IT - BYOD
                              Are BYOD Workers More Productive?
                              NetworkWorld April 24, 2012
                              "Bring-your-own-device, or BYOD, is a movement blurring the line between work and personal life. After all, BYOD is all about employees using personal smartphones and tablets for business purposes. So does this mean people check Facebook when they should be working or read job-related emails on weekends? ..."
                              Data Security in the BYOD Era: 10 Big Risks Facing Enterprises
                              eWeek April 17, 2012
                              "Rogue and shadow IT have been problems for data and network security and compliance officers for a long time, but the rising number of bring-your-own-device (BYOD) proponents is threatening to become a much larger overall issue. Most organizations do not have the tools to ensure security of their data on just any device, especially when those devices will be by definition either partially or totally unmanaged. In addition, organizations are grappling with the challenges these pose for the enterprise network..."
                              The BYOD Era May Be Ending Already
                              InfoWorld April 20, 2012
                              "In 2010, the bring-your-own-device notion was derided; in 2012, it became normal; in 2014, it may be seen as an odd exception ...

                              Few technology trends have forced their way into business as fast as the bring-your-own-device (BYOD) movement, which started weakly in 2007 with the release of the iPhone but gathered momentum in mid-2010 when Apple added corporate-class management and security features in iOS 4. A year later, IT's "no way will user devices get into my network" policies were in tatters, with a majority of companies having accepted BYOD for at least a portion of the employee base and for iOS devices..."

                              Top Ten Articles for last few Issues
                              Vol 170 Issues1, 2 and 3 Vol 169 Issues 1, 2,3 and 4; Vol 168 Issue 5
                              We track how frequently each article is viewed on the web site to determine which the readers consider the most important. For last week, the top 10 articles were:

                              • The Single UNIX Specification: Keeps UNIX Vital
                              • Updating Oracle Solaris 11 Systems Using Support Repository Updates
                              • Sun ZFS 7420 Storage Appliance Outdoes IBM on SPC-2 Benchmark Throughput Performance
                              • 7000 appliance VM in VirtualBox
                              • Sun Fire X4270 M3 Server Achieved 8,320 SAP SD Benchmark Users
                              • Oracle's StorageTek Tape Analytics Software Automates Tape Management Operations
                              • New MySQL 5.6 Development Milestone Release
                              • Best Practices for JavaFX 2.0 Enterprise Applications
                              • Sample Chapter from 'Java EE 6 with GlassFish 3 Application Server'
                              • Java Spotlight Episode 79: Dr Fujio Maruyama on Japanese Java User Community

                              The longer version of this article has list of top ten articles for the last 8 weeks.

                                IT - Server
                                Log Standards: Put Up, Shut Up, Give Up, Or Throw Up?
                                Dark Reading April 16, 2012
                                "Syslog was developed in the 1980s, and it probably took roughly five minutes of use before someone started complaining about how it wasn't capable enough. When the IETF drafted RFC3164 in 2001, essentially declaring syslog the de facto standard for log transmission, people immediately started talking about how to make a different and "better" standard..."
                                  Stop Server Downtime Before It Occurs
                                  Processor April 20, 2012
                                  "A Few Simple Steps Can Help Keep Servers Performing At Their Best & Prevent Costly Outages ...

                                  Everyone who owns a car knows that changing the oil and replacing the tires on a regular basis will help the vehicle run better and last longer, protecting your investment. In a similar way, taking a few preventive steps can also help your data center servers run better and last longer. Even more importantly, these activities can help prevent server downtime, which in some cases can quickly lead to thousands or even millions of dollars in losses..."

                                    IT - Encryption
                                    Businesses Fail To Learn From 2011 Data Breaches
                                    HelpNet Security April 25, 2012
                                    "While data breaches perpetuated during 2011 clearly demonstrated the need for more comprehensive encryption of business and customer data, a survey of over 170 IT managers with security responsibilities in UK businesses revealed that valuable and sensitive data held inside the perimeter walls of many systems are not necessarily being secured by effective and comprehensive encryption strategies..."
                                    World War II Encryption Tactics: How The Enigma Failed (Video)
                                    IT World April 25, 2012
                                    "The wonderful "ArtOfTheProblem" YouTube channel has a great 10-minute video highlighting the encryption methods used during World War II, specifically focusing on the Enigma machine. While going through why the encryption is so difficult, the video then reveals two mistakes that German operators and the machine's designer made, allowing the Allies to crack the codes created by the device..."
                                    IT - Tape
                                    Warning: Rumors Of Tape's Demise Greatly Exaggerated
                                    Business Solutions March 23, 2012
                                    "Earlier this year, I would have predicted that 2012 would have been the year tape media made the same transition that film-based picture cameras made a few years ago. At a couple of trade shows I attended, storage vendors offered up analyst stats that further confirmed this hunch, with some claiming '42% of data restores from tape fail' and others claiming that number to be as high as 71%. Further adding to the tape demise theory is the fact that disk-based backup is growing at a compound annual growth rate (CAGR) of nearly 17% per year, according to a recent report from IDC..."
                                    Simplify Software Development with Solaris 11 Zones, ZFS etc
                                    Webinar from Oracle's Solaris 11 Developer Webinar Series
                                    Oracle University has made a replay available of Matthew Hosanee's webinar "Simplify Software Development with Solaris 11 Zones, ZFS, etc." The replay is free to all OTN members as part of Oracle University's Oracle Solaris 11 Developer Webinar Series.
                                    Modern Software Packaging For Enterprise Developers (IPS)
                                    From Oracle's Solaris 11 Developer Webinar Series
                                    A replay of Eric Reid's webinar "Modern Software Packaging for Enterprise Developers (IPS)" is available from Oracle University and is free to OTN members. Registration and log in are required. On April 24, Matthew Hosanee presented the webinar "Managing Application Services, Using SMF Manifests in Oracle Solaris 11." Here is a link to the Oracle Solaris 11 Developer Webinar Series.
                                    Oracle Optimized Solution for Oracle Unified Directory
                                    A Way to Faster, More Secure Approach to Application Tuning
                                    The Oracle Optimized Solution for Oracle Unified Directory implements Oracle Unified Directory software on Oracle's SPARC T4 servers to provide highly available and extremely high performance directory services for the entire enterprise infrastructure and applications, posts Mark Wilcox of Oracle's Optimized Solutions team. This solution, more than a simple generic tuning guide, has been run through the tuning steps and the configuration has been tested, resulting in faster, simpler deployment as a result of the reduced time it takes to run a tuning exercise from scratch.
                                    Trending in
                                    Vol 235, Issue 2
                                    Trending IT Articles