News about Oracle's Solaris and Sun Hardware
System News
May 7th, 2012 — May 13th, 2012 Generate the Custom HTML Email for this Issue
System News System News for Sun Users
Volume 171, Issue 2 << Previous Issue | Next Issue >>
Sections in this issue:
click to jump to section


IT - CxO
x
Half of IT Workers Eyeing Greener Pastures
InfoWorld May 9, 2012
"With the IT job market steadily improving, tech employees are feeling more engaged with their jobs and more loyal to their organizations. However, companies ought not to confuse that commitment with unyielding devotion. More than half of IT employees are ready and willing to entertain better job offers as they arise, more so than employees from any other sector. Organizations would be well-served loosening the IT salary purse-strings and finding other ways to keep their IT staff satisfied..."
    10 Lessons From Leading Government CIOs
    InformationWeek May 7, 2012
    "More than a dozen of the federal government's top IT decision makers talked about the opportunities they see, and they challenges they face, at InformationWeek's Government IT Leadership Forum May 3 in Washington, D.C.

    The speakers included federal CIO Steven VanRoekel, federal CTO Todd Park, and Department of Defense CIO Teri Takai. An overarching theme at the Forum was how agencies must "do more with less" on a flat IT budget that stands at $79 billion. Here are 10 lessons I took away from the event..."

    10 Mistakes to Avoid When Drafting Business Proposals
    CIO Insight May 9, 2012
    "CIOs are being asked more often to contribute their unique perspective and expertise in business planning and operations. That likely means helping prepare and evaluate business proposals as you become a key member of your organization's strategic leadership team. In his new book, Persuasive Business Proposals: Writing to Win More Customers, Clients, and Contracts (Amacom/available now), author Tom Sant offers a roadmap for creating winning business plans. He also points out common mistakes and details what business plans should avoid..."
      10 Predictions for What The CIO Role Will Look Like In 2020
      IT World Canada May 3, 2012
      "We tapped industry leaders, analysts and CIOs themselves to discover what the challenges of 2020 for the CIO will be like. Here's what we found out.

      At the same time, we also know that technology will change dramatically. Who could have predicted even 10 years ago that the CIO would have to deal with complications such as cloud security and virtualization? To find out how the role will change in eight years, we tapped industry leaders, analysts and CIOs themselves to discover what the challenges of 2020 for the CIO will be like. Here's what we found out..."

      12 Critical Insights On The State Of IT In 2012
      TechRepublic May 9, 2012
      "I regularly moderate The Great Debate over on ZDNet and it's always a fun opportunity to get a couple smart commentators together and let them cross swords over a controversial topic. However, this week the debate was especially great, as TechRepublic's Justin James and ZDNet's Dana Gardner clashed on the topic of IT Department: Cost Center or Profit Center? It ended up being about the current trajectory of the IT department and how to change it..."
        A New Class of CISO Is Coming
        HelpNet Security May 4, 2012
        "A new IBM study reveals a clear evolution in information security organizations and their leaders with 25 percent of security chiefs surveyed shifting from a technology focus to strategic business leadership role.

        Overall, all security leaders today are under intense pressure, charged with protecting some of their firm’s most valuable assets – money, customer data, intellectual property and brand..."

        How Stupid Companies Treat Customers
        Baseline May 7, 2012
        "Memo to senior execs: Your customers have changed greatly over the past decade, but, in many cases, you haven't made the adjustments necessary to accommodate their expectations. At least, this is the message conveyed in the book, 'Smart Customers (Stupid Companies): Why Only Intelligent Companies Will Thrive, and How to Be One of Them'. Authors Michael Hinshaw and Bruce Kasanoff present a candid perspective on how organizations are falling far behind in recognizing and responding to the growing sophistication and empowerment of consumers..."
          Next-Generation IT Has Big Shoes to Fill
          InfoWorld May 9, 2012
          "What do 3D printers, the difference between process and practice, and the increased demand for luxury goods have to do with a 7-foot, 8-inch-tall basketball fan with size 25 feet?

          The answer: Together they provide a case study for the future of both manufacturing and information technology. For next-generation IT leaders positioned to anticipate this custom-tailored future, rich rewards on the executive team await..."

            The 24/7 CIO: Are You Really Open For Business?
            IT World Canada May 7, 2012
            "The Web offers cheap and easy access for our clients (internal or external) to access services 24/7. As a result, our Web stores and public facing sites have become “must be available” on the same basis. But how many of us actually follow through? ..."
              SPARC
              x
              Oracle Offers SPARC T4 Servers Interactive e-Book.
              18-Page PDF Available as a Download
              Oracle has created an interactive e-Book on the new SPARC T4 servers and SPARC SuperCluster. The e-Book, available as a PDF, includes such content as the SPARC SuperCluster T4-4 launch webcast; customer success stories; and 3D demos and detailed product information on all SPARC Servers.
              Exadata
              x
              Oracle Updates Its Publication on Oracle Solutions Certified for SAP
              Users Can Download 'Oracle for SAP Technology Update'
              Each year, Oracle releases its publication "Oracle for SAP Technology Update," as it has just done. Like its predecessors, the 2012 issue provides updates and information about Oracle products and services for SAP customers. The publication features content about running SAP on the Exa stack, including technical articles and customer cases. Users can download the 2012 issue as a PDF.
              IT - Storage
              x
              5 Costliest Deduplication Problems -- And How to Avoid Them
              Enterprise Systems Journal May 7, 2012
              "Deduplication has quickly moved from a hot new technology to a mature essential requirement for most enterprise data centers. In this time, several different approaches to deduplication have emerged to address the specific requirements of today's data center. Some deduplication technologies are best suited to remote/branch offices and data centers protecting smaller data volumes; others are designed for large, data-intensive environments with "big backup" requirements..."
                Thin Provisioning Block Storage  A Maturing Technology
                IT Knowledge Exchange May 6, 2012
                "Thin provisioning has become prevalent in storage systems today. As a storage system feature, it has become expected to be present when the purchase of new storage is being considered by Information Technology professionals. Product offerings from vendors continue to highlight the economic gains from the improvement in storage efficiency with thin provisioning. Understanding of the value from thin provisioning in storage systems is moving beyond the mere presence of the feature to an evaluation of the implementation and the implications of the characteristics..."
                  Forklift vs. Incremental Upgrades -- Weighing All the Factors
                  Enterprise Storage Forum May 9, 2012
                  "During the past three to five years (depending on the industry in question), IT budgets have been modest at best. There has been a great deal more Band-Aids placed on them than shiny new hardware and software purchased. At the same time, not a lot of new stuff has come on the market. Mainly, the past few years have been all about incremental improvements to the old hardware and software. What little new technology was released did not see significant adoption..."
                    How-To Match Flash Memory Solutions to Application Needs
                    CRN May 4, 2012
                    "With decades of experience storing data on hard disk drives (HDDs), the IT industry is long overdue for the type of revolutionary advantages offered by flash memory technology. Flash technology is making significant inroads to the modern data center and as those early-adopter solution providers are demonstrating, change can be a challenge without being disruptive..."
                    Java Technology
                    x
                    How do You Spell "Sesame"?
                    The Smartphone as Room Key
                    Combining Java JE2 ME and Open Ways' Crypto Acoustic Credential (CAC) is sufficient security for Hinkmond Wong, whose recent post links to a HotelChatter, which announces plans by a Holiday Inn Express Hotel & Suites property to use guests' smart phones as room keys. "OpenWays uses ... CAC and text messaging to securely deliver a unique acoustic key to the guest anywhere in the world. CAC can be retrofitted to the major electronic locks on the market. It is compatible with all 6 billion mobile phones in the world, ... and ALL Mobile OS standards [including] JAVA J2ME .... "
                    Java Spotlight Episode 81: Henrik Ståhl on Java 7 Update 4
                    Dalibor Topic and Arun Gupta are Java All Star Developer Panelists
                    Host Roger Brinkley welcomes Henrik Stahl to Java Spotlight Episode 81 to discuss Java 7 Update 4. Stahl is Senior Director of Product Management at Oracle and has extensive experience in many aspects of IT, including support, network engineering, systems development, IT security, performance engineering and product strategy. Dalibor Topic and Arun Gupta are the featured members of this episode's Java All Star Developer Panel.
                    MySQL
                    x
                    Using MySQL Enterprise Backup with Symantec NetBackup.
                    Performs a Full Range of Backup and Restore Operations

                    The paper "MySQL Enterprise Backup and Symantec NetBackup" focuses on how Symantec NetBackup and MEB interact with each other. MySQL Enterprise Backup delivers online "Hot" database backup, whether full, incremental and partial backups, or Point-in-Time Recovery and backup compression. MySQL Enterprise Backup can interface with media management software (MMS) to execute backup and restore operations via System Backup to Tape (SBT) interface. SBT is the Oracle API implemented as shared library (libobk.so in Linux and orasbt.dll in Windows) to backup /restore data via 3rd party software vendors. Registration and log in are required to access the document.

                    Meet The MySQL Experts Podcast: Managing Scalability of MySQL Enterprise Edition
                    MySQL Thread Pool Is the Tool
                    On this episode of Meet the MySQL Experts Podcast, Mikael Ronstrom, senior MySQL Architect, discusses how the MySQL Thread Pool improves MySQL Scalability. Ronstrom summarizes the typical problems that commonly crop up when scalability is called for, one of them being MySQL Thread Pool itself, which was resolved in a later version. Ronstrom also notes the best use cases for MySQL Thread Pool, which are for sorting out active connections and managing long-running queries. Finally, he points out that, even with more than 64 active connections MySQL Thread Pool can produces results up to 20x better than MySQL Enterprise alone.
                    Linux
                    x
                    A Linux Command Line Primer
                    Some Helpful Advice for the Linux Novice
                    Users new to the command line feature of Linux can find a sympathetic ally in David Cardinal whose post on extremetech.com provides a helpful introduction to their structure and function. He begins with an explanation of the abbreviations commonly used in Linux, which can be fragmentary. One of the most helpful pieces of information Cardinal offers is his explanation of the wildcard as a shortcut in typing a Linux filename. This is a time- and keystroke-saver for sure. He also stresses the utility of the Linux control key sequences that, used improperly, have the potential to undo a user's intentions.
                    Building an Appliance? Oracle Enterpise Linux is the OS of Choice
                    Avoid Licensing Restrictions and Costs; Get the Support You Need

                    Companies that are building appliances with some Linux distro as the embedded OS can do better, argues Wim Coekaerts, than rely on community-based and/or community-maintained versions or even those commercial Linux distros that come with distribution and access restrictions. The alternative, Coekaerts suggests, is Oracle Enterprise Linux. Customers have complete access to the code and are able to use Oracle Enterprise Linux as they choose, without contract restrictions, nor even any license or activation key. This is one distro that can manage across all the use cases, says Coekaerts.

                    Accelerate Linux Deployments with Oracle Validated Configurations
                    Eliminates the Need for Customer Testing

                    Using Oracle Validated Configurations is strongly urged in a post by Durgam Vahia, who describes the program as offering " ... pre-tested, validated architectures, with documented best practices for software, hardware, storage, and network components. This integrated approach helps improve the performance, scalability, and reliability of solutions, with faster, lower-cost implementations." The Oracle integrated stacks free the customer from the burden of testing a stack in their respective environments. They simply choose the Oracle Validated Configuration certified for their situation. Support is available for any and all components of each of the Oracle Validated Configurations.

                    IT - Cloud
                    x
                    50% Of Businesses Feel The Cloud Is Too Risky
                    HelpNet Security May 3, 2012
                    "Despite the apparent enthusiasm around cloud computing, a Wisegate survey revealed that over 50% believe the cloud is too risky for prime time, and only suitable for commodity applications like CRM or e-mail..."
                    Cloud Is A Corporate Strategy, Not A Tactical Solution
                    GIGAOM May 6, 2012
                    "As an IT community we are still stuck in the past relative to the strategic nature of cloud. Many of us are looking at the adoption of cloud as just another technology, and are leaving the decisions on how to adopt, own, and manage the cloud up to engineers. But acquiring a cloud management platform is not an engineering decision — it's a strategic one. Do engineers need to be involved? ..."
                    Cloud-Oriented Architecture and the Internet of Things
                    InformationWeek May 9, 2012
                    "Quick quiz for all your Cloud aficionados out there: what’s missing from the NIST definition of Cloud Computing? To make this challenge easy for you, here’s the definition: 'Cloud computing is a model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction.' Give up? ..."
                    Crypto in the Cloud Secures Data In Spite Of Providers
                    Dark Reading May 7, 2012
                    "Many studies have shown a chasm between cloud service providers and their customers regarding who is responsible for the security of the customer's data: Providers put the responsibility in the hands of the customer, but the customer usually disagrees.

                    According to a study conducted by the Ponemon Institute last year, for example, nearly seven in 10 cloud providers put responsibility for the security of a customer's data with the customer. Only three in 10 customers surveyed by Ponemon agreed...."

                    Hostage Crisis In The Cloud: Can You Rescue Your Data Back?
                    IT World May 7, 2012
                    "Outsourcing contracts typically include detailed termination and transition assistance provisions that outline the provider's responsibilities regarding data return. Indeed, in many outsourcing contracts, the vendor agrees to provide the data promptly whenever the customer ask for it in the format that the customer requests-and the provider often covers the cost of doing so..."
                      Public-Sector Cloud Computing: The Good, the Bad and the Ugly
                      ComputerWorld May 9, 2012
                      "When the second-in-command of one of the most technologically advanced states in the country slams public-sector computing -- publicly -- it's a resounding wake-up call.

                      'Don't underestimate how far local, state and federal government is behind [in computing],' said California Lt. Gov. Gavin Newsom at a tech conference in Silicon Valley earlier this year. 'We have to wake up to the new reality..."

                        Q&A: Cloud Security 101
                        Enterprise Systems Journal May 7, 2012
                        "If you're considering a move to the cloud, security is likely a big concern. How is it different from security measures in place for your on-premise data center? What technologies are available, and what best practices should you follow? For answers, we turned to Bill Goodman, senior systems engineer at Vormetric. The company's Vormetric Data Security Manager solution encrypt's files, databases, and applications..."
                        This Just In: Cloud Computing Is Hard And Takes A Long Time
                        InfoWorld May 10, 2012
                        "Cisco Systems has surveyed more than 1,300 IT professionals to determine the top priorities and challenges they face when migrating applications and information to the cloud. Guess what? It's harder, and it takes longer than many thought.

                        Duh..."

                        IT - PM
                        x
                        Executive Alignment: Key to Business Success
                        Baseline May 8, 2012
                        "As organizations undertake large transformational programs, there is a critical need to ensure that executives are aligned to the vision, purpose and goals of the proposed change. This is often called executive alignment. While large transformational programs can fail for many reasons, executive alignment—or lack of it—is consistently cited as a major cause of failure..."
                          IT - Networks
                          x
                          What is WAN Virtualization?
                          NetworkWorld May 4, 2012
                          "I believe that we’re at the dawn of a NEW architecture that will revolutionize the enterprise WAN, enabling WAN managers to have much more bandwidth at much lower cost than their private MPLS WANs alone deliver today, with improved reliability and application performance predictability for traditional as well as newer applications, and safely and reliably enable the migration of more and more computing to the cloud – public or private – and do so in an incremental manner without forklift upgrades or breaking the bank on the WAN budget..."
                          IT - Operations
                          x
                          Building An Always-On, Always-Available Enterprise
                          IT World Canada May 2, 2012
                          "Imagine the following: You work in the Infrastructure and Operations (I&O) department of a large retailer with a significant online e-commerce presence, and at noon today, a critical component of your infrastructure failed. While you scramble to find a solution, your company's Website that brings in tens of thousands of dollars a day is greeting all of your potential customers with an error message and the social networks are starting to buzz. But to make matters worse, today is not a normal day -- it's one of the highest volume days of the year..."
                          Going Wireless in the Data Center
                          NetworkWorld May 7, 2012
                          "Bouncing information around a data center, via 60GHz Wi-Fi, can speed things up by 30% compared to using traditional cables, a group of researchers found. The technique is still being perfected, but it could yield an interesting approach for enterprises in the not-too-distant future..."
                            IT - Security
                            x
                            10 Commandments For Effective Security Training
                            InfoWorld May 4, 2012
                            "Information security people think that simply making users aware of security issues will make them change their behavior. But security pros are learning the hard way that awareness rarely equals change.

                            One fundamental problem is that most awareness programs are created and run by security professionals, people who were not hired or trained to be educators. These training sessions often consist of long lectures and boring slides--with no thought or research put into what material should be taught and how to teach it. As a result, organizations are not getting their desired results and there's no overall progress..."

                            10 Common IT Security Blunders (and How To Avoid Them)
                            RedmondMag.com May 1, 2012
                            "No matter how hard we fight, cyber threats are ever on the rise. Microsoft and the federal government are stepping up their war on organizations driving botnets. This is part of the problem. One of the biggest threats comes from within and failure to prepare for those battles is asking for trouble.

                            Even if you think your shop is doing all it can to avoid common security threats, you'd probably be surprised at how easily an outsider can find common -- even silly -- mistakes..."

                            Don't Be So Trigger-Happy For a Remote Wipe
                            InfoWorld May 4, 2012
                            "When I talk to IT pros about the proliferation of user technology, aka consumerization, it doesn't take long before the subject of remote wipe comes up. It's become almost a checklist item in any company that supports BYOD and increasingly for those who supply mobile devices. After all, regardless of who buys the device, it may contain corporate secrets that need to be kept away from prying eyes. As OS X Lion and Windows 8 bring remote-wipe capabilities to desktop computers, I'm sure we'll see IT begin to apply it to employees' home and work PCs as well..."
                            IBM: Role of Chief Security Officer Is Evolving
                            eWeek May 5, 2012
                            "An IBM study shows that CISOs are getting more pressure from top executives, but also are gaining a greater voice in their companies.

                            Senior executives in charge of security are finding their roles changing not only as they deal with the growing rates of data breaches and hacker attacks but also by the increasing interest from CEOs and others in the safety of their companies’ most valuable information, according to a survey from IBM..."

                            No Exploit Required: How Attackers Exploit Business Logic Flaws
                            Dark Reading May 4, 2012
                            "Cyberattacks don't always employ exploited vulnerabilities: Sometimes they prey on weaknesses in the business processes of an application -- so-called business-logic flaws.

                            Web application security software vendor and security-as-a-service provider NT Objectives today released a list of the top 10 business logic attack vectors out there..."

                            The Difficulties In Sizing Up Botnets
                            HelpNet Security May 3, 2012
                            "The main metric with which security researchers identify how effective and disruptive specific botnets are is the number of computers they consists of.

                            Estimating their size allows them to assess whether concentrating their efforts on the disruption of one is better than focusing on "attacking" another, and to estimate which resources they will have to dedicate to this task..."

                            Will Your Next Car Steal Itself?
                            CSO Online May 10, 2012
                            "As vehicles offer an ever-growing number of digital features, they could present several security threats—unless automakers manage these technologies effectively.

                            That's the thinking of Dave Miller, CSO at cloud-based platform vendor Covisint. Miller says that in a world of smarter cars, there are five key vehicle identity and security issues to consider. Now Miller believes that cloud services provide the answer to these threats, and given the obvious vested interest, it might be tempting to dismiss the whole concept..."

                            Your Biggest Security Threat? Your People
                            IT World Canada May 9, 2012
                            "An employee uses business credentials to shop online. Another clicks on a link in an e-mail message from a complete stranger. A systems admin goes to a forum for help with a problem and gives detailed hardware, software, network and configuration information.

                            The exploits, payloads and motives may change, but the single biggest security threat to the enterprise is still its employees..."

                            IT - Careers
                            x
                            Bad Social Media Behavior Can Ruin Your Job Search
                            Baseline May 2, 2012
                            "If you think those wild photos of you and your friends from the last Cinco de Mayo aren't a big deal, you'd better think again: They could cost you a job. A significant percentage of job seekers are passed over because of inappropriate posts on Facebook, Twitter and other social media sites, according to a CareerBuilder survey. There's a good chance your next would-be employer is doing social media research along with reading your resume..."
                              5 Tips: Get Strong IT Job References
                              InformationWeek May 7, 2012
                              "It's never entirely easy for an IT professional to leave a job. Even under the best of circumstances, feelings of anger and resentment can bubble to the surface, negatively impacting a job seeker's ability to later land a positive reference--and future employment...

                              Here are 5 things every techie needs to know about landing an excellent reference from a previous employer..."

                                10 Reasons IT Pros Get A Bad Rap
                                TechRepublic May 6, 2012
                                "It's no secret that IT pros aren’t too popular with some clients and end users. Alan Norton considers some of the underlying reasons for the bad press.

                                Why are IT professionals perceived so poorly by some? I am not going to try to prove or disprove the merits of the reasons listed below. Suffice it to say, the bad rap IT gets is justified if the client believes it to be true..."

                                  Be a Winner by Asking Power Questions
                                  Baseline May 9, 2012
                                  "We often think that we convey intelligence by coming up with clever responses to questions. But that's only half of the equation. When attending conference calls or meetings with executive superstars, have you ever noticed how insightful and engaging their questions are? It's not by accident. In the book 'Power Questions: Build Relationships, Win New Business, and Influence Others'), the authors demonstrate how work colleagues, managers and executives, customers and business partners notice you based on your phrasing of inquiries..."
                                    IT - Social Media
                                    x
                                    Facebook 'Likes' Not Protected As Free Speech, Judge Rules
                                    Federal Computer Week, May 7, 2012
                                    "In the social media era, most people likely consider their Facebook "Likes" to be the ultimate in free expression — a statement that says something fundamental about their values and tastes. But employers may not see it that way, and now ZDNet reports that a judge has ruled that employees who are fired for liking something on Facebook have no legal remedy under the First Amendment..."
                                      Facebook Privacy: 5 Most Ignored Mistakes
                                      InformationWeek May 4, 2012
                                      "Facebook no longer represents that it offers privacy as a matter of policy, like some other companies do. It states outright that it will use your data. It has a Data Use Policy instead of a Privacy Policy.

                                      But consider the dictionary definition of privacy: 1) The state or condition of being free from being observed or disturbed by other people; 2) The state of being free from public attention..."

                                        Gartner Says Half of Enterprises Are Wasting Money on Social Media
                                        ComputerWorld May 4, 2012
                                        "Getting a positive return on investment from a social media campaign is about more than tracking the number of your Facebook fans and Twitter followers. It's about linking the social strategy to measurable business objectives, according to Gartner, which says most businesses aren't doing this.

                                        A new study released this week from the technology consultancy says that half of Fortune 1000 companies will not receive a worthwhile ROI on their social media strategies this year..."

                                        Social Media and Employee Recruitment: A Good Idea or a Waste of Time?
                                        CIO Insight May 2, 2012
                                        "Social media sites serve many purposes. Your employees go onto sites such as Facebook and Twitter to communicate with friends. Your company may use to the sites for brand promotion and marketing, as well as to gather customer data. Like it or not, social media has become an integral part of our lives. Still, there are some uses for social networks that many companies look past..."
                                          IT - Virtualization
                                          x
                                          Bare-Metal Clouds Trade Virtualization For Performance
                                          InfoWorld May 1, 2012
                                          "Sometimes, for either performance or security reasons, customers don't want to use a public or a private cloud with virtualized infrastructure. Service providers are increasingly responding to this, and one analyst says there is increasing demand for bare-metal clouds.

                                          Internap, the cloud, managed hosting, and co-location service provider, is the latest to jump into the arena with its Agile Hosting offering announced last week. In a bare-metal cloud offering, customers get automated provisioning of dedicated managed hosting environments, meaning they are not taxed by a hypervisor virtualization platform that can cause performance lag..."

                                          Move Over, VDI: It's Time for IDV
                                          InfoWorld May 9, 2012
                                          "Like an 'emperor's new clothes' scenario, VDI (virtual desktop infrastructure) seems to offer so much but at a price tag that's hard to justify. That's not to say VDI has had little or no value for IT: VDI was born of issues IT managers faced around centralized desktop management, migration issues, and support frustrations, and no one is denying the need to centralize management or address management support issues. However, VDI fails us in many ways, starting with the fact that devices require high-bandwidth connectivity to access user systems..."
                                          IT - Compliance
                                          x
                                          10 Symptoms of Check-Box Compliance
                                          Dark Reading May 7, 2012
                                          "Security and risk pundits have long lamented the practice of going through the motions just to satisfy security regulations and standards like PCI, SOX, and HIPAA. Phoning it in may keep the auditors in check, but it won't mitigate the risks of attack. According to security and compliance pundits, the following are some of the telltale signs an organization is falling into the trap of check-box compliance..."
                                          Tight Integration Between Risk Management and Compliance Sounds Great, But .
                                          Accelerating IT Success May 4, 2012
                                          "While the idea of integrating risk management and compliance has never been completely discarded, it has yet to be widely accepted. In this article, Kenneth Hardin analyzes this concept and provides his own understandings. Hardin references the expansion overview piece from Thomson Reuters and also the outcomes of the TSAM Europe 2012 Conference ..."
                                          What Works for One Does Not Work For Two
                                          Dark Reading May 2, 2012
                                          "My wife, Doris, is the founder and president of a company in the real-estate industry. I once heard her explaining how systems and processes must be rebuilt for each new scale of a business. "What works for one does not work for two. What works for two does not work for three," she said.

                                          What a great concept. Whether you are adding more staff, more locations, more servers, or more processes, we must realize that doing the same things harder or smarter is rarely enough. We must accept that the scale of the business has changed, requiring that all associated tasks and systems maintain the same scale..."

                                            In Tough Times, Compliance Efforts May Seem Optional
                                            Dark Reading May 8, 2012
                                            "I have a healthcare-related client for which we develop custom software and database programs. It is a relatively small company, but it has a growing national presence. Nice people.

                                            The CEO is what I consider an accidental entrepreneur. She has a great work ethic, knows her industry, and has innovative services of great value to her clients. But she never prepared to run and grow a business. As with many leaders of small and midsize businesses, knowing how to do something can be very different from knowing how to run a business that does that thing..."

                                            Storage
                                            x
                                            IOPS, Capacity, Bandwidth: Finding the Right Balance
                                            Make Sure the Folks in Purchasing Understand, says Moellenkamp
                                            As one of the comments on Joerg Moellenkamp's note concerning IOPS, storage capacity and bandwidth there is more to " ... storage than capacity, particularly IOPS and bandwidth." Moellenkamp pithily explains how the uneven progress among these three aspects of storage makes it essential to consider storage in as wide a context as possible in order not to wind up with massive storage on the other side of a bandwidth bottleneck.
                                            OpenStorage
                                            x
                                            Second-annual OpenStorage Summit EMEA
                                            In-depth look at OpenStorage, Nexenta certification, Top-class Speakers and Exhibitors
                                            Nexenta is hosting the second-annual OpenStorage Summit EMEA in Amsterdam, The Netherlands.

                                            Much like last year's EMEA Conference, this year's event will feature a who's who in the OpenStorage industry participating in panels, case studies and technical vendor presentations.

                                            Three Reasons Why You Should Attend

                                            • In-depth look at OpenStorage
                                            • Nexenta certification = free conference
                                            • Top-class Speakers and Exhibitors

                                            Classes offered include NexentaVSA for View (22nd -23rd), Architecture and Design of Nexenta Solutions (22nd -23rd) and Installing Nexenta Appliances (1 day class on 22nd and 23rd)

                                            Space is limited. Sign up now!

                                            IT - Mobile
                                            x
                                            8 Priorities for More Effective Mobile Security
                                            Insurance Technology May 4, 2012
                                            "Smartphone shipments are expected to reach 1.7 billion in 2017, forecasts telecommunications analyst Ovum – more evidence that the growth of the mobile channel presents opportunities for insurance companies in areas as diverse as distribution, claims and customer service. However, security remains a huge concern – especially as the bring-your-own-device movement means increasing volumes of sensitive corporate and client information are handled on mobile devices. To help insurers optimize the mobile channel while minimizing risks, here are some words of warning, insights and recommendations about how to address mobile security challenges..."
                                            IT - Big Data
                                            x
                                            Wall Street Firms Are Not Prepared for Big Data
                                            Wall Street Technology May 4, 2012
                                            "New data sources, including social media and mobile devices, can provide valuable information and insights into customer tendencies and trends. But firms do not have the infrastructure or skills to handle the deluge of unstructured data...

                                            With the technology and information economy in full swing, financial firms should be in a good (if not a great) position to capitalize on the growth of digital information. After all, data has been the name of the game for financial services firms for decades — who better to benefit from the leap in availability and usage of data? ..."

                                            What Does 'Big Data' Really Mean?
                                            InfoWorld May 10, 2012
                                            "Big data is an IT buzzword nowadays, but what does it really mean? When does data become big?

                                            At a recent Big Data and High Performance Computing Summit in Boston hosted by Amazon Web Services (AWS), data scientist John Rauser mentioned a simple definition: Any amount of data that's too big to be handled by one computer..."

                                            Wide-Open Search
                                            IT World Canada May 9, 2102
                                            "Twitter, Facebook, the Library of Congress -- all of these institutions have mind-numbing amounts of structured and unstructured data that must be indexed and searched quickly. In Twitter's case, that's about 300 million new pieces of information to index every day.

                                            So it's not surprising that such institutions would venture into the seemingly untamed world of open-source search applications, not just for the cost savings, but also for the ability to customize and modify applications quickly. Plus, open source has an active community that can help solve related problems..."

                                            IT - BYOD
                                            x
                                            BYOD Will Revive Network-Access Control Idea
                                            InfoWorld May 8, 2012
                                            "Is the BYOD craze going to bring a revival of NAC (network-access control), the policy-based network-access control that was hyped a decade ago but didn't end up widely adopted for endpoint security?

                                            Gartner, for one, is predicting the bring your own device (BYOD) phenomenon, in which employees are being allowed to use their own personal Apple iPads, iPhones, Google Android devices, and other mobileware for business purposes, will lead to a revival of NAC..."

                                            Why Security Isn't A BYOD Showstopper
                                            InformationWeek May 8, 2012
                                            "In a webinar on BYOD that I just did, a survey of the 500-plus participants showed that security is the way-out-in-front, lead concern of IT managers when it comes to implementing a bring-your-own-device program. More than 60% of those people voting reiterated what I hear every day. 'Is it safe? Can we really trust users and their personal handsets with enterprise secrets?' ..."
                                            Top10
                                            x
                                            Top Ten Articles for last few Issues
                                            Vol 171 Issue 1; Vol 170 Issues1, 2 ,3 and 4; Vol 169 Issues 2,3 and 4;
                                            We track how frequently each article is viewed on the web site to determine which the readers consider the most important. For last week, the top 10 articles were:

                                            • Oracle Introduces Sun ZFS Backup Appliance for Oracle Engineered Systems
                                            • How-to Use LiveInstall Solaris 11 from Solaris 10
                                            • Building a Virtual Data Center with Oracle Enterprise Manager Ops Center 12c
                                            • Oracle SPARC SuperCluster: An Overview
                                            • Sun ZFS Storage 7420 Appliance Achieves 2-Node World Record SPECsfs2008 NFS Benchmark
                                            • ZFS feature flags update
                                            • NexentaVSA for VMware View Certified for Deployment
                                            • Microsoft Clarifies Licensing Policies for VDI, VDA, and RDS
                                            • Standing up SmartDataCenter
                                            • TLC for Your Backup Tapes

                                            The longer version of this article has list of top ten articles for the last 8 weeks.

                                              LibreOffice
                                              x
                                              LibreOffice 3.4 Writer Guide
                                              By LibreOffice Documentation Team
                                              Users of LibreOffice (and prospective users) can now purchase "LibreOffice 3.4 Writer Guide," which documents the use of LibreOffice's, a freely-available, full-featured office suite that runs on Windows, Linux, and Mac OS X. The book is for beginners to advanced users of Writer, the word processing component, which covers setting up Writer to suit the way you work. This book was written by volunteers from the LibreOffice community. Profits from the sale of this book will be used to benefit the community. Free PDFs of this book and its individual chapters are available from the LibreOffice site.
                                              Security
                                              x
                                              T4 Crypto Cheat Sheet
                                              Lists Changes in T3; T4/Solaris 10; and T4/Solaris 11
                                              An update on T4 crypto acceleration for Oracle TDE is available in tabular form in a post from Stefan Hinker. He posts the changes that have occurred while the patch for Solaris 10 has been in the works. The changes are listed in terms of T3 and earlier; T4/Solaris 10; and T4/Solaris 11.
                                              Trending in
                                              Vol 232, Issue 2
                                              Trending IT Articles