News about Oracle's Solaris and Sun Hardware
System News
Apr 30th, 2012 — May 6th, 2012 Generate the Custom HTML Email for this Issue
System News System News for Sun Users
Volume 171, Issue 1 << Previous Issue | Next Issue >>
Sections in this issue:
click to jump to section


Features
x
Building a Virtual Data Center with Oracle Enterprise Manager Ops Center 12c
One of the Great Strengths of Ops Center 12c
Building a virtual datacenter (vDC) with Oracle Enterprise Manager Ops Center 12c is the subject that Scott Elvington tackles in a recent post on oracle.com. Elvington's vDC consists of a pair of Oracle Solaris 10 servers, a NAS share and a group of VLAN tagged networks. He shows how to set aside a portion of those resources for a QA Testing group and shows how a user can create a virtual server connected on a virtual private network.
SPARC
x
Oracle SPARC SuperCluster: An Overview
Webcast by Oracle Leaders in Developlment of Engineered Systems:
Watch "The Oracle SPARC SuperCluster: The First General Purpose Engineered System" with Ganesh Ramamurthy, Oracle Vice President of Engineering, Jennifer Glore, Oracle SuperCluster Engineering Team Lead, and Gary Combs, Oracle Principal Product Manager, who provide an overview of the unique technical and business advantages of Oracle SPARC SuperCluster and the role of engineered systems in developing an IT infrastructure capable of running a variety of applications by design.
SAP Applications Certified for Oracle SPARC SuperCluster
Certification Delivers Deployment, Management and Performance Gains
Oracle has just announced that SAP applications are now certified for use with the Oracle SPARC SuperCluster T4-4. SAP infrastructure and applications based on the SAP NetWeaver technology platform 6.4 and above and certified with Oracle Database 11g Release 2, such as the SAP ERP application and SAP NetWeaver Business Warehouse, can now be deployed using the SPARC SuperCluster T4-4, according to Oracle. What this means is that SAP applications, central services and the Oracle Database can be run securely and efficiently on a single engineered system to greatly simplify and speed deployment, management and service of SAP infrastructure.
Exadata
x
Oracle Introduces Sun ZFS Backup Appliance for Oracle Engineered Systems
Outperforms both EMC and NetApp Solutions at a Lower TCO
Oracle's Sun ZFS Backup Appliance delivers up to 20 Terabytes (TB) per hour full backup and up to 9.4 TB per hour full restore throughputs, the fastest published recovery rates among general purpose storage systems for Oracle engineered systems. This backup throughput of unique data does not require additional host-side software or CPU resources. The Sun ZFS Backup Appliance decreases recovery time by up to 4x, compared to published Oracle Database backup performance rates from NetApp and EMC at a TCO up to 3.9x lower over a three year period than comparable NetApp and EMC Data Domain solutions.
Virtualization
x
Solaris Zones: Virtualization that Speeds up Benchmarks
Zones as an Alternative to Hypervisor Virtualization

Is there a place in the world of IT for Solaris Zones as an alternative to Hypervisor virtualization? Stefan Hinker thinks so, adding that such a use costs very little in overhead. He cites the practices of the Oracle benchmark teams, who are so convinced of the advantages of Solaris Zones that they actually use them in the configurations for public benchmarking. While Solaris resource management will also work in a non-Zones environment, Zones make it just so much easier to handle, especially with some of the more complex benchmark configurations, Hinker asserts, offering benchmarking reports to bolster his argument.

IT - Storage
x
The Enigma of Benchmarking Clouds
Enterprise Storage Forum April 30, 2012
"Like it or not, cloud storage and computation is a consideration for many applications. How appropriate this is, is a question to be addressed in another time and place. The question we will address here is how do you compare various cloud providers? You could, and indeed should, look on the Internet at available offerings, talk to the sales and sales support team, and narrow the field down to a few providers that can meet your operational needs, business requirements for availability, and budget."
    The Importance of Storage Virtualization
    NetworkComputing May 2, 2012
    "With IT budgets expected to decrease 0.6% in 2012 in North America and data still growing in the 10% to 24% range, storage virtualization has become a necessity, not a luxury.

    In the first of a two-part series, Network Computing examines the various places within the IT infrastructure where storage virtualization can take place, including servers and disk arrays, and via physical and virtual appliances..."

    Java Technology
    x
    Java SE 7 Update 4 and JavaFX 2.1 for Mac OS X
    Download from Oracle Technology Network
    Oracle has released Java SE7 Update 4 and JavaFX 2.1, both for the Mac OS X. Java developers can now download Oracle’s JDK, which includes the JavaFX SDK, for Mac OS X from the Oracle Technology Network (OTN). Java SE7 Update 4 JDK includes the next-generation Garbage Collection algorithm, Garbage First (G1), which provides predictable garbage collection even for very large applications. Rich client applications using JavaFX 2.1 can be completely developed in Java, allowing users to leverage their existing knowledge of and investments in Java technologies to easily create modern, expressive graphical user interfaces and data visualizations in JavaFX.
    IT - Technology
    x
    IBM Supercomputers: 12 Ways HPC Is Leading to Scientific Breakthroughs
    eWeek April 24, 2012
    "Earlier this year, IBM announced partnerships with Rice University and Rutgers University to advance supercomputing at their institutions and in their respective home states of Texas and New Jersey. The agreements became the latest of many partnerships IBM has with academic, scientific and research institutions that use IBM supercomputers..."
    Physicist: Moore's Law As We Know It Is On Its Last Legs
    NetworkWorld May 1, 2012
    "Moore's Law -- the idea that computing power doubles roughly once every 18 months -- has proved to be surprisingly accurate since it was first outlined by Gordon Moore, a co-founder of Intel.

    However, in recent decades, high-profile pronouncements of its impending collapse have become nearly as regular. CCNY theoretical physics professor Michio Kaku has been predicting such a breakdown since at least 2003, and he reiterated his views in a recent video talk for BigThink. He said that the critical point will be reached within a decade..."

    The NFL Thrives On Big, Except In IT
    ComputerWorld April 30, 2012
    "The NFL may have big stadiums, big players and big games, but when it comes to its IT operation, Nancy Galietti, the NFL's vice president of IT, does not use the word big.

    The NFL runs three data centers of about 2,000 square feet each, or server rooms, as Galietti refers to them. The IT operation supports business functions, a growing film collection, statistics on players, and a looming foray into big data..."

    Solaris
    x
    How-to Use LiveInstall Solaris 11 from Solaris 10
    Booting Back to Solaris 10 Is an Option
    The oracle.com blog "Isaac's musings" features a how-to article that allows customers to follow a LiveUpgrade-like methodology in getting their existing Oracle Solaris 10 system to Oracle Solaris 11 while minimizing risk and still being able to boot back to Oracle Solaris 10 if they so choose. This is particularly of interest to those who have grown to appreciate the value that LiveUpgrade delivers.
    MySQL
    x
    MySQL Connector/Net 6.3.9 Is Released
    Last Release in MySQL 6.3.x Series

    The last release in the MySQL 6.3.x series, MySQL Connector/Net 6.3.9, is now available. This maintenance release contains more than 25 fixes from the 6.3.8 base. Version 6.3.9 can be downloaded in both source and binary form from http://dev.mysql.com/downloads/connector/net/6.3.html#downloads and mirror sites (not all of which are up to date at this point-if you can't find this version on some mirror, please try again later or choose another download site.) The release is of course also available for download on My Oracle Support (MOS).

    Connecting MEB and MMS through System Backup to Tape Interface
    Oracle White Paper on MySQL Enterprise Backup (MEB) and Media Management System (MMS)
    The Oracle white paper "Connecting MySQL Enterprise Backup (MEB) and Media Management System (MMS) through System Backup to Tape (SBT) Interface" describes the use of MySQL Enterprise Backup with Media Management software through System Backup to Tape interface. The white paper addresses the numerous potential issues that can arise in the course of planning for backups. Without proper guidance the further complexity inherent in using the Oracle database, MySQL, and other databases can present difficulties that can be resolved by the use of a single tool to ensure consistency of backup policy. Registration and log in are required.
    Cloud Computing
    x
    CISDI INFO Moves to the Cloud Under Oracle Power
    Oracle Exalogic Elastic Cloud, Oracle Exadata Database Machine Provide the Infrastructure
    CISDI Information Technology (CISDI INFO), a provider of solutions, experience and capabilities for the engineering and construction industries and iron and steel customers, has selected Oracle Exalogic Elastic Cloud and Oracle Exadata Database Machine for its implementation of cloud computing technology. The implementation will involve three steps: establishment of a private cloud by relocating its existing database to Oracle systems; provision of limited and mixed cloud services to its subsidiaries and partners; and movement to an industry public cloud computing platform designed to provide access to the shared computing resources pool in a self-service, dynamic, elastic and measurable way.
    IT - Cloud
    x
    5 Tips For Surviving A Cloud Outage
    IT World April 27, 2012
    "Everything fails, all the time," so says Amazon.com CTO Werner Vogels.

    "Amazon Web Services itself experienced a much publicized four-day service disruption last April, another outage in August and it had plenty of company from other cloud service companies last year. Microsoft's Windows Azure cloud platform in February had downtime problems due after the company failed to account for Leap Day, and despite improvements by cloud providers to minimize future outages, more outages will inevitably happen this year and beyond..."

    Defining Cloud SLAs Is Critical
    NetworkComputing April 30, 2012
    "Service level agreements have been used by companies for a long time in an effort to ensure they get the right bang for their buck, but industry experts say that with IT functions increasingly being moved to the cloud, it’s important to carefully define your goals in SLAs so that corners are not cut in an effort to increase the provider’s bottom line..."
      Five Cloud Trends That Will Impact Your Business
      CRN April 25, 2012
      "It's no secret that cloud computing is transforming the technology landscape.

      The notion of shifting all or part of a company's IT resources to a cloud provider is forcing CTOs around the country to re-examine their IT shops.

      Research firm Gartner has taken a look at the market to determine five key trends in the cloud marketplace..."

      How to Negotiate A Contract With A Cloud Or SaaS Provider
      InfoWorld April 25, 2012
      "Cloud and SaaS services are rapidly gaining traction with enterprises and small businesses. Yet IT, which is usually responsible for negotiating contracts with these service providers, may fall short in critical areas of contract negotiation and legal skills.

      The stakes are high. In a worst-case scenario, you can simply realize that you made a mistake and that you must get out of a contract. In less dire cases, you can find yourself relying on a vendor that doesn't execute to your business SLAs as your internal staff would. The best way to set expectations is by laying them out clearly in the contract that you sign with your vendor. This provides a platform for ongoing discussions about service levels..."

      Hybrid Cloud Management- Understanding The Landscape
      InformationWeek April 27, 2012
      "Hybrid Cloud is defined as a multi-Cloud IT environment composed of traditional IT and multiple Private Clouds and Public Clouds in the same enterprise. The definition by National Institute of Standards and Technology (NIST) states “A Hybrid Cloud is a combination of Public and Private Clouds bound together by either standardized or proprietary technology that enables data and application portability..."
        Hybrid Cloud Model: Challenges and Opportunities
        InformationWeek April 26, 2012
        "In the global marketplace, enterprises must move quickly to capitalize on the latest growth op¬portunities and stay one step ahead of the compe¬tition. IT services play an important role in foster¬ing the innovation required to fuel new business ventures. Today, CIOs need to be in a constant state of readiness to provide their users with the technology services to enable innovative business opportunities and respond to customer demands..."
          IaaS A Bad Deal? Not So Fast
          InformationWeek April 30, 2012
          "A recent column by Art Wittmann arguing that infrastructure-as-a-service is a bad deal attracted significant controversy, largely among promoters of the public cloud. Wittmann presents detailed numbers showing that, from a capital expenditure perspective, buying your own storage hardware is significantly less expensive long term than paying an IaaS vendor to rent its hardware..."
          To Win With Cloud Computing, Change IT First
          InfoWorld May 1, 2012
          "Most organizations consider the move to cloud-based platforms as simple additions to the existing portfolio of IT systems. However, if internal IT does not change around the usage of most cloud services, enterprise IT won't get the full benefits. Indeed, many initial uses of cloud computing resources in such organizations will end up in failure. The dirty little secret is that most of the change to IT needs to occur before the first implementation to make cloud computing holistically successful..."
          Why CISPA Could Kill The Cloud
          InfoWorld April 30, 2012
          "Opponents of CISPA such as the ACLU have focused almost exclusively on the bill's potential impact on individual users' privacy, and understandably so. But a close read of CISPA's broad language reveals that Joe Internet's privacy isn't all that would be in jeopardy if the bill makes it through the Senate and past President Obama's veto pen. CISPA poses a threat to the privacy of entire organizations, from nonprofits and small business on up to the enterprise -- and even to the very future of cloud computing..."
          IT - CxO
          x
          8 Core Beliefs of Extraordinary Bosses
          Inc. April 30, 2012
          "The best managers have a fundamentally different understanding of workplace, company, and team dynamics. See what they get right...

          A few years back, I interviewed some of the most successful CEOs in the world in order to discover their management secrets. I learned that the "best of the best" tend to share the following eight core beliefs..."

          Ten Ways to Enhance Your International Leadership Skills
          CIO Insight April 27, 2012
          "According to a recent survey from Hydrogen Group, 72% of employers worldwide expect their senior executives to have international business experience and take a global approach to meeting business objectives. The book "Being Global: How to Think, Act, and Lead in a Transformed World" can help CIOs develop the business skills necessary to compete in the global marketplace..."
            CIOs And Legal Officers Must Work Closer, Says Gartner Survey
            InformationWeek May 2, 2012
            "Chief legal officers (CLOs) consider their enterprises' CIOs to be important contributors to corporate strategy and policy, but they need more in-depth interaction with their IT department, according to a survey by Gartner and ALM..."
            Innovation Drives Business
            Baseline April 26, 2012
            Avnet, which has more than 100,000 customers in more than 70 countries, prides itself on continually searching for pioneering ways of doing business.

            "We celebrate innovation," said Steve Phillips, senior vice president and CIO of Avnet, a global distributor of information solutions, during a meeting with Baseline. "We have a program that encourages our employees to submit innovative ideas, and we recognize them for the ideas we implement..."

            Millennials at Work: Not My Generation
            CIO Insight May 1, 2012
            "What I found when I moved into the corporate world was a different, diverse mix of ability and motivation. There were plenty of talented people, but their drivers were less well defined (and aligned) than I was accustomed to. The motivational tools I was familiar with didn’t always work. In part, that’s because there has been an erosion of the connection between effort and reward in much of business..."
              Stressed Out IT Teams Can Hurt Your Bottom Line
              CIO Insight April 30, 2012
              "Are your IT administrators stressed out, working long hours and dealing with users who are driving them crazy? If so, you're not alone. According to a recent survey from GFI Software, IT admins report having stress levels off the charts, and as CIO, it's your job to pay attention and make sure your best people aren't experiencing burnout. Replacing over-stressed IT workers takes time and money you don't have..."
              Ten Things Bad Companies Tell Employees
              Baseline April 30, 2012
              "While many companies claim to embrace change, it’s hard to get people to move beyond their comfort zones. But enterprises need to embrace dynamic market changes and seek out new ways to grow as customer needs evolve. To help ensure the corporate culture evolves with the times, companies need to continually re-examine policies and procedures..."
              Troubling Truths About Hiring Practices
              Baseline April 25, 2012
              "You’ve probably sat at your 'esk on more than one occasion and asked yourself, 'How did that person ever get his/her job?” A recent survey from TEKsystems provides one likely answer. The study reveals that a lack of thoroughness during the screening process of IT job applicants may contribute significantly to these problems..."
                IT - DR
                x
                Virtualization Simplifies Disaster Recovery for Insurance Broker Myron Steves
                IT Director April 23, 2012
                "When Hurricane Ike struck Texas in 2008, it became the second costliest hurricane ever to make landfall in the U.S. It was also a wake-up call for Houston-based insurance wholesaler Myron Steves & Co., which was not struck directly but nonetheless realized its IT disaster recovery (DR) approach was woefully inadequate.

                Supporting some 3,000 independent insurance agencies in the Gulf Coast region, with many insured properties in that active hurricane zone, Myron Steves must have all it resources up and available, if and when severe storms strike..."

                IT - PM
                x
                Crash Course: Five Ways to Optimise Your Projects and Resources ASAP
                Accelerating IT Success May 3, 2012
                "In order to be successful in today’s economy, it is vital to have the competitive advantage. Having accountability of all your people and how their time is being spent will help you to create this advantage. This is imperative because, according to Mr. Finch, your competitor may have already beaten you to the punch. This article discusses five ways in which an organization can optimize their projects and resources, and in a hurry..."
                  IT Project Management: Is Experience Overrated?
                  CIO Insight April 25, 2012
                  "Experienced project managers have accumulated a store of shortcuts, workarounds and 'accelerators' that may have served them once or twice in different circumstances. These generally won't add anything to a complex, challenging situation, where attention to detail and sticking with the basics is what builds success..."
                    Project Management Phases and Processes
                    Mind Tools April 30, 2012
                    "For all but the smallest projects, experienced project managers use well-established project management methodologies. These are often published systems – such as PMBOK (Project Management Body of Knowledge) or PRINCE2 – but they can also be in-house methodologies that are specific to the organization.

                    These approaches have some differences in emphasis, and they tend to use slightly different terminology, but they generally share two key features..."

                    IT - Networks
                    x
                    iT Engineers Ponder Fix To Dangerous Internet Routing Problem
                    InfoWorld April 27, 2012
                    "IT engineers are studying what may be an easier way to fix a long-existing weakness in the Internet's routing system that has the potential to cause major service outages and allow hackers to spy on data.

                    The problem involves the routers used by every organization and company that owns a block of IP addresses. Those routers communicate constantly with other routers, updating their internal information -- often upwards of 400,000 entries -- on the best way to reach other networks using a protocol called Border Gateway Protocol (BGP)..."

                      802.11ac 'Gigabit Wi-Fi': What You Need To Know
                      IT World April 29, 2012
                      "The 802.11ac Wi-Fi standard is not yet finalized, but draft 802.11ac equipment will soon be available... Your 802.11n wireless network and devices are about to become passé. Although the official 802.11ac specification won't be finalized until sometime in 2013, wireless equipment will soon appear on store shelves sporting the faster wireless protocol.

                      It's been almost five years since 802.11n wireless routers and devices became available--also well ahead of the specification actually getting ratified. Now, IEEE is finalizing the 802.11ac standard. 802.11ac is also referred to as "gigabit Wi-Fi" and will be capable of significantly faster data transfer speeds than the current 802.11n..."

                        Gigabit WiFi Speeds On the Way, But Beware The Draft
                        GCN April 30, 2012
                        "Remember back in 2009, when the “n” was amended to the Institute of Electrical and Electronics Engineers 802.11 wireless networking standard? Over the previous five years it took to go from initial draft to final approval, we were “treated” to a veritable soap opera of patent disputes and lawsuits. A new revision would come out every other year, but neither manufacturers nor IT departments wanted to wait for the final ratification..."
                          Running The "World's Largest Temporary Network" No Easy Task
                          NetworkWorld April 26, 2012
                          "Putting on a major convention like Interop Las Vegas requires Herculean efforts on several fronts. Thousands of hotel rooms booked. Millions of miles flown. Goodness knows how many packets of airline peanuts consumed.

                          But the most critical part of the whole thing could be the network - as some of the companies working on the project are quick to point out..."

                            IT - Operations
                            x
                            8 Data Center Lessons From Facebook
                            InfoWorld May 2, 2012
                            "Facebook has opened the vault to its data center efficiency secrets like no organization before it via its open source Open Compute Project. The OCP provides detailed specs and guidelines for high-efficiency server components -- from motherboards to chassis -- as well as facilities hardware, including electrical and cooling. All the systems are implemented in Facebook's state-of-the-art data center in Prineville, Ore..."
                            IT in A Nutshell: Duct Tape and Sealing Wax
                            InfoWorld April 30, 2012
                            "Many IT projects start with an optimistic air, a feeling that no matter what's occurred in the past, this one will be different. It'll be done right the first time, no shortcuts will be taken, enough time will be available for proper planning and execution, and the result will be a shining example of IT done right. All those involved will be lauded by the rest of the company for a job well done ..."
                              IT - Security
                              x
                              90 Percent Of 'Secure' HTTPS Sites Are Vulnerable, Study Finds
                              GCN April 30, 2012
                              "One of the basic security checks when conducting an online transaction to make sure the front of the URL reads "HTTPS," which indicates that the site uses Secure Sockets Layer encryption. But up to 90 percent of those sites, including at least several at U.S. government agencies, are vulnerable to attack, according to a new survey.

                              The survey by Trustworthy Internet Movement, a nonprofit initiative formed in February to help address Internet security issues, also found that 75 percent of the most popular sites using SSL are vulnerable to a Browser Exploit Against SSL/TLS (BEAST) attack and 40 percent support weak ciphers..."

                              Anonymous and Hacktivist Attacks Keeping IT Security Pros Up at Night
                              IT Business Edge May 2, 2012
                              "Concerns over hacktivism and targeted state-sponsored attacks are at the top of security professionals' minds according to a new survey and research report sponsored by Bit9. The 2012 Cyber Security Survey of nearly 2,000 IT security experts set out to gauge the current state of enterprise security and identify the attack methods and cyber criminal groups that keep IT executives up at night.

                              According to Bit9's survey, 64% of respondents believe their organization will be the target of a cyber attack in the next six months..."

                              Cyber Crime-Fighters: A Model for International Cooperation?
                              GCN May 2, 2012
                              "The United States and the European Union have developed strong operational partnerships for fighting cyber crime despite the lack of formal frameworks for the cooperation, according to a panel of officials from both sides of the Atlantic.

                              It's amazing in law enforcement channels how well we are able to share information, said Thomas Dukes, a former cyber crime prosecutor in the Justice Department and now a policy adviser to the State Department..."

                                How To Hack The Password Problem
                                Dark Reading April 26, 2012
                                "The security industry has been predicting the death of the password for at least a decade. In 2004, even Bill Gates said we would rely less and less on passwords over time. But now it's 2012, and even though Google offers two-factor authentication and World of Warcraft fans can use the Blizzard Authenticator, the majority of the world still relies on a single password to protect their email, banking sites, and computers..."
                                How Would You Architect A New Security Monitoring Product?
                                Dark Reading April 20, 2012
                                "I came up with a simple survey question earlier this month -- "If you were to develop a new Security Information and Event Management (SIEM) or Log Management product, how would you deliver it?" -- with the hopes that my survey would be short enough to entice people to answer. FluidSurveys was used as the survey platform for this exercise because it was easy to use and, most importantly, free.."
                                Most Orgs Don't Know What Data Is Leaving Their Systems
                                HelpNet Security April 26, 2012
                                "Only 20% of IT executives say they have visibility into files and data moving inside and leaving their organization, and 29% of them perceive moving data back and forth between cloud applications as the biggest risk of data loss, say the result of a survey by Ipswitch File Transfer Division.

                                With the proliferation of the Bring Your Own Device trend, organizations have to monitor devices such as smartphones, tablets, USB drives and sophisticated MP3 players due to file hosting capabilities..."

                                  Nissan Hack A Harsh Reminder About Protecting Data Stores From Spies
                                  Dark Reading April 26, 2012
                                  "Nissan's disclosure this week of a malware attack in which attackers stole employee user-account credentials was a chilling reminder of the reality of industrial espionage.

                                  While it may be easy to get caught up in toeing the compliance line and focusing solely on the protection of personally identifiable information (PII), at the end of the day security professionals need to remember that protecting business-critical intellectual property (IP) should be their No. 1 concern, security pundits warn..."

                                  Security May Be Too Big a Job for IT
                                  Internet Evolution May 3, 2012
                                  "Make way for a new chief in the C-suite: The chief information security officer (CISO) -- who is not necessarily a part of IT.

                                  As the Internet -- and its associated deluge of data, clouds, devices, and sites -- becomes integral to IT success, enterprises are more at risk than ever of having precious information stolen, lost, or compromised by online malfeasance. And according to a new study from IBM, many enterprises are answering the challenge by appointing a CISO..."

                                  The Slow And Steady Evolution Of Cross-Platform Malware
                                  ZDNet May 1, 2012
                                  "Malware isn't just for Windows anymore. As the number of Macs rise, the economic incentive for criminals to build cross-platform attacks rises. And so do the stakes.

                                  The rise of the global Internet in the early to mid-2000s made online crime possible and profitable. The sheer size of Microsoft's monopoly made Windows the only target that mattered for malware authors. And so for years all malware was Windows malware, which led some people to conclude that it would always be so..."

                                  WWI 'Dazzle Paint' Fools Face Recognition Scanners
                                  GCN May 1, 2012
                                  "Although it might seem a little bit like wearing a tinfoil hat to prevent the government from listening in on your thoughts, an artist has discovered a way to prevent computers from recognizing your face, or even to pick it out of a crowd at all.

                                  Oddly enough, the technique used is nothing new, at least to the history buffs out there who study World War I or even World War II. It’s called dazzle camouflage..."

                                    IT - Careers
                                    x
                                    On The Trail Of NASA's Space Potty
                                    NetworkWorld April 26, 2012
                                    "Leave it to the Smithsonian to get every detail right when laying out new exhibits.

                                    First, as part of the Space Shuttle Discovery's exhibit at its new home in the Smithsonian's Steven F. Udvar-Hazy Center in Virginia will be the spacecraft's original space toilet or waste containment system as it is more technically known.

                                    And a new exhibit in the Smithsonian's iconic Air and Space Museum in Washington, DC has its own space toilet demonstration, albeit apparently a reproduction..."

                                      Ten Ways to Read Your Colleagues' Minds
                                      Baseline April 25, 2012
                                      "Knowing what your co-workers are thinking doesn't require super powers. Knowing a few things about communication and body language can give you all the information you need to have successful interactions at work based on what your colleagues are "telling" you--no matter what words are coming out of their mouths. In the book, “Professional Presence: A Four-Part Guide to Building Your Personal Brand", author Peggy Noe Stevens weighs in on soft skills that could help you get ahead at work, as opposed to more concrete skills like knowing C++..."
                                        IT - Social Media
                                        x
                                        Do You Really Need A Social Media Will?
                                        NetworkWorld May 5, 2012
                                        "Death is never one of my favorite topics so it was with tepid interest I read an email concerning death and social media from none other than your US government. Seems they say we all need a component of our wills that stipulates how our cyber memory will be handled once we die. I cannot disagree but the idea somehow gives me the willies..."
                                          Social Media and the Enterprise: CIO as Enabler
                                          eWeek April 27, 2012
                                          "The average day is no longer divided into work time and leisure time. As CIOs, we need to ask ourselves: Are we enabling this anytime/anywhere approach to life, or are we constructing artificial barriers to this new way of living? ..."
                                            IT - Virtualization
                                            x
                                            Network the 'Next Big Thing' For Virtualization?
                                            NetworkComputing April 27, 2012
                                            "For the third installment of our examination of the current state of the virtualization market, after licensing and VMware competition, we take a closer look at the new virtualization paradigm in town: software-defined networking, also known as network virtualization. Names aside, it’s a technology that promises to be the next big thing for IT organizations, networking vendors and virtualization vendors alike..."
                                            VMware's Lost Source Code: Not A Panic Situation
                                            NetworkComputing April 27, 2012
                                            "VMware has confirmed that some of its source code to its ESX Server has been leaked. Cue the dramatic music and breathlessly worded missives claiming the sky is falling and your VMware environment will be secure only if you buy someone's stuff. There's no need to panic. Clearly, having its source code leaked is bad for VMware, but that doesn't mean it's bad for you..."
                                            IT - Database
                                            x
                                            7 Ways Oracle Puts Database Customers At Risk
                                            Dark Reading May 2, 2012
                                            "Last week Oracle bumped heads with the database security community in a communications blunder that caused a proof of concept to be released for an unpatched 4-year-old vulnerability in the database's TNS Listener service. This week Oracle released a workaround, but still no patch, reigniting critics' claims that the company is neglecting its database customers with shoddy patching practices..."
                                            IT - Backup
                                            x
                                            Don't Fall Victim to Data Loss, Backup Your Data
                                            Storage Newsletter April 27, 2012
                                            "Keeping valuables data safe and secure, tucked inside a bank vault or some other lock-down location is commonplace, say the Personal Technology Experts at Support.com, Inc.

                                            Yet when it comes to keeping data safe and secure, well, common sense seems to go out the window. .."

                                              OpenStorage
                                              x
                                              Keynote Speaker Line-up for OpenStorage Summit EMEA 2012
                                              May 22-24, 2012, at the Mercure Hotel, Amsterdam, Netherlands
                                              The Nexenta OpenStorage Summit EMEA 2012, which will be held from May 22-24, 2012, at the Mercure Hotel, Amsterdam, Netherlands, will feature an impressive list of world-class, industry leading keynoters who will participate in panels, present case studies, and provide technical vendor presentations. Focusing on OpenStorage, industry keynote speakers will cover cloud, virtual desktop infrastructure, data corruption, and the storage technologies that are accelerating innovation and how they are poised to replace costly legacy storage technologies. To register and see the full Nexenta OpenStorage Summit EMEA 2012 agenda visit the Nexenta web site.
                                              In-depth look at OpenStorage, Nexenta certification, Top-class Speakers and Exhibitors
                                              Second-annual OpenStorage Summit EMEA
                                              Nexenta is hosting the second-annual OpenStorage Summit EMEA in Amsterdam, The Netherlands.

                                              Much like last year's EMEA Conference, this year's event will feature a who's who in the OpenStorage industry participating in panels, case studies and technical vendor presentations.

                                              Three Reasons Why You Should Attend

                                              • In-depth look at OpenStorage
                                              • Nexenta certification = free conference
                                              • Top-class Speakers and Exhibitors

                                              Classes offered include NexentaVSA for View (22nd -23rd), Architecture and Design of Nexenta Solutions (22nd -23rd) and Installing Nexenta Appliances (1 day class on 22nd and 23rd)

                                              Space is limited. Sign up now!

                                              IT - Mobile
                                              x
                                              Are Boy Scouts Prepared for the iPad?
                                              CIO April 20, 2012
                                              "When venturing into new terrain, Boy Scouts pride themselves on being prepared for all sorts of dangers. For Clint Andera, IT director for the Northern Star Council Boy Scouts of America in Minnesota, new terrain comes in the form of bring-your-own-device iPads, along with the danger of data loss.

                                              "With more managers working from out of the office than ever before, it's important we provide remote employees with instant access to the network without compromising on security," Andera says...

                                              Mobile Security and Identity Management in The Cloud
                                              HelpNet Security April 20, 2012
                                              "Executive-level security officers at some of the largest global companies have identified four main concerns for 2012: mobile device security, identity management for cloud computing, threat management and profiling, and increasing regulatory pressures, according to Stonesoft..."
                                              We Need More Secure Mobile Devices
                                              ComputerWorld April 30, 2012
                                              "When you combine the words 'mobile device' and 'security,' you get an oxymoron. That's the state of security in the mobile world, and it's been that way since day one.

                                              That has to change. Smartphones and tablets are increasingly doing heavy lifting in the corporate world, and are ever more likely to be repositories of sensitive data. But where do we start in making them more secure? ..."

                                              Where Do Insurers Stand on Mobile Security Today?
                                              Insurance Technology May 3, 2012
                                              "Insurers need to develop their mobile security strategies, as PwC's Chris Potter note earlier this week, and for which he offered suggestions. I asked Novarica partner Chad Hersh where insurers stand in implementing mobile security strategies...."
                                              IT - BYOD
                                              x
                                              BYOD Catches CIOs Off Guard
                                              Federal Computer Week May 1, 2012
                                              "A prize goes to any CIO whose strategic planning document two years ago had "develop security policy for employee-owned mobile devices" as a top priority in 2012.

                                              The truth is that mobile’s sudden rise has caught many CIOs off guard, and most agencies lack provisions to manage and secure personal devices’ access to government networks and information. But such safeguards in the form of codified bring-your-own device policies are needed — and soon..."

                                              BYOD Policy Bites Vacationing CEO
                                              NetworkWorld April 30, 2012
                                              "Mimecast CEO Peter Bauer recently found himself at the intersection of consumerization and IT management, falling victim to personal data loss as the result of the internal management policy he himself helped establish.

                                              While on a family vacation in South Africa, Bauer's 5-year-old daughter tried to use his smartphone. After she entered the incorrect PIN code five times, the corporate-installed remote wipe capability kicked in and Bauer lost all of the photos he had taken through the first half of the trip..."

                                              Employees, Businesses Divided Over BYOD Programs
                                              CIO Insight April 30, 2012
                                              "While employees value consumerization of IT, businesses are hesitant due to perceived risks of BYOD programs... While bring-your-own-device programs continue to grow and find favor among businesses of all sizes, issues like security still remain, according to a survey by Mimecast, a supplier of cloud-based email archiving, continuity and security for Microsoft Exchange and Office 365. ..."
                                              Pick Your Strategy for BYOD
                                              InfoWorld May 1, 2012
                                              "Two main schools of thought guide the adoption of BYOD in the enterprise. One is to reduce the risk of the devices themselves by managing them closely through policy and software. The other is to reduce the risk to data that may be exposed or lost through mobile devices.

                                              The latter is happening by default in most companies while everyone considers whether the former can be done. All organizations need to decide on which overarching BYOD strategy will guide all their individual BYOD projects -- or agree that different pockets will use different strategies (which usually isn't optimal)..."

                                              Top10
                                              x
                                              Top Ten Articles for last few Issues
                                              Vol 170 Issues1, 2 ,3 and 4; Vol 169 Issues 1, 2,3 and 4;
                                              We track how frequently each article is viewed on the web site to determine which the readers consider the most important. For last week, the top 10 articles were:

                                              • The Register Reports on Aggressive SPARC Upgrade Program
                                              • 7420 SPEC SFS Outperforms EMC/Isilon, Netapp, HDS Solutions
                                              • Simplify Software Development with Solaris 11 Zones, ZFS etc
                                              • Enhanced Sun ZFS Storage 7420 Appliance Beats NetApp Results on SPECsfs2008 NFS Benchmark
                                              • Modern Software Packaging For Enterprise Developers (IPS)
                                              • DD EMC Data Domain Boost - Oracle RMAN Integration
                                              • Support for FOSS Components in Oracle Solaris
                                              • Oracle Exadata Database Machine Triples GfK Group Retail and Technology Reporting Performance
                                              • KyivStar, JSC Reduces Legacy Environment Storage Volumes by 85%, Boosts Performance 300-500%
                                              • JavaOne Russia Demo Grounds

                                              The longer version of this article has list of top ten articles for the last 8 weeks.

                                                IT - Encryption
                                                x
                                                No, Encryption Is Not Enough to Protect Your Data
                                                Internet Evolution May 3, 2012
                                                "If you don't think your data is vulnerable, just search Google for 'data breach,' and limit the search to news in the last month. You'll get more than 2,000 results. And while most may be redundant, there are enough unique stories to demonstrate that if your company network is accessible via the Internet, it is potentially under attack..."
                                                IT - Server
                                                x
                                                Unassuming IT Hero Saves The Day
                                                InfoWorld May 2, 2012
                                                "This is a story back from the early days of my IT career. It was in the '90s, and I'd been out of school a couple of years and working at a VAR that provided hardware, software, and service. Recently, I'd been promoted to senior field support engineer and transferred to the corporate division, which served small business and enterprise customers on a variety of platforms..."
                                                  Sysadmin
                                                  x
                                                  Creating and Configuring Virtual Ports Controlled by a Virtual Machine
                                                  A Feature of Oracle Solaris 11

                                                  Alexandre Chartre explains how to configure a SAN environment (such as zoning, LUN masking or QoS) using virtual (NPIV) instead of physical ports. This provides flexibility as you can then easily transfer a configuration from one physical HBA to another by just configuring a new HBA with the appropriate N_Port ID. In a virtual environment, it can be convenient to associate a virtual port with a virtual machine, and to have all LUNs visible through this virtual port assigned to the virtual machine. You can then manage the association of LUNs and virtual machines through the configuration of your SAN.

                                                  Trending in
                                                  Vol 234, Issue 2
                                                  Trending IT Articles