News about Oracle's Solaris and Sun Hardware
System News
May 21st, 2012 — May 27th, 2012 Generate the Custom HTML Email for this Issue
System News System News for Sun Users
Volume 171, Issue 4 << Previous Issue | Next Issue >>
Sections in this issue:
click to jump to section


IT - CxO
x
CIOs and Lawyers: A Match Made in Heaven or Hell?
CIO Insight May 23, 2012
"When was the last time you spoke with your company's Chief Legal Officer (CLO)? Did you even know there was one? A survey of 70 CLOs conducted by research firm Gartner reveals that the CIO’s relationship with the CLO goes a long way toward having a positive impact on company operations. If you're among those CIOs who don't communicate with their CLO or chief legal counsel, you're not alone..."
How to Align Your IT Services Strategy with the Business
IT World Canada May 22, 2012
"Today, as companies seek to both consolidate their vendor relationships and multisource, they tend to engage with a small number (typically two to nine) of preferred, very large IT services vendors that can be centrally governed. The strategic objectives of consolidation are important: Services clients can prequalify a few preferred suppliers that all users of IT services can easily and safely engage with. However, given the rapid pace of technology change, the need for agility, the new business stakeholders, and the rise of cloud services, a company's IT and innovation requirements are often best met by multiple best-of-breed suppliers..."
    Security, Funds Occupy CIOs' Minds
    Federal Computer Week May 17, 2012
    "TechAmerica's annual federal CIO survey usually does a good job of identifying what’s on the minds of federal IT professionals. The latest survey, released earlier this month, finds the IT community worried about costs as budgets dwindle and concerned about cybersecurity as threats grow.

    'I was pleased that cybersecurity was listed first, and not budget,' on the ranking of priorities, said Teri Takai, CIO at the Defense Department, in a panel discussion at a TechAmerica conference associated with the report. “At DOD, cybersecurity is the No. 1 priority."

    Want To Succeed In IT? Five Tips from The Top
    TechRepublic May 2, 2012
    "So, you want to be a top CIO? Sounds like a reasonable career aim, but how do you climb the greasy pole and reach the highest echelons of IT leadership?

    If you want best-practice career advice, it makes sense to listen to people who have already excelled - and are continuing to excel - in the technology chief position. Paul Coby is one such CIO, IT director at UK retail giant John Lewis and former technology chief at British Airways..."

    Why CIOs Who Know How to Slow Down Do Better
    The Accidental Successful CIO May 18, 2012
    "As CIO one of your most important jobs is to get as much out of your IT department as is humanly possible. You’d think that that best way to do this would be to always be pushing harder and harder. However, researchers who have been studying this very problem have come up with a different approach that they say can yield better results: go slower ..."
    Oracle
    x
    Oracle Optimized System for Oracle Unified Directory
    SPARC Hardware, Matched and Tuned for OUD Software
    OOS4OUD (Oracle Optimized System for Oracle Unified Directory) is a matched and tuned set of SPARC hardware and OUD software configured to deliver top performance, posts Darin Pendergraft on oracle.com. He explains that the OOS4OUD hardware consists of three SPARC T4-1 servers running an optimally tuned Solaris 11 configuration and using the integrated load balancer for redundancy and throughput. Each T4-1 machine uses a Sun Storage 2500-M2 array connected using two fiber channel cards. The resulting combination of high performance hardware, storage, next generation directory software and expert tuning is a highly scalable, redundant and secure directory platform, Pendergraft contends.
    Exadata
    x
    Engineered Systems (Exadata) Enable Less Complex Lifecycle Management Operations
    Cost Reductions, Performance Improvements Result
    There is a newly released white paper from Oracle entitled "Operational Impact of Deploying Engineered Systems (Exadata)" available at the Exadata Partner Community Collaborative Workspace (for community members only -- registration and log in are required). The paper considers how the traditional role of system administrators responsible for managing individual portions of the technology stack are now able, with the integrated nature of lifecycle management in an engineered system, to perform their duties more comprehensively in a less complex environment that delivers improved performance and reduced management costs.
    Virtualization
    x
    Oracle VM VirtualBox 4.1.16 Available
    Maintenance Release Especially Useful to Those Running Mac OS 10.8 Mountain Lion
    Oracle has just released Oracle VM VirtualBox 4.1.16, a maintenance release containing bug fixes and stability improvements, was just released at the community or Oracle download sites. This is particularly good news, at least in blogger Fat Bloke's eyes, for users of preview builds of Mac OS X 10.8 Mountain Lion.
    IT - Storage
    x
    60TB Disk Drives Could Be a Reality In 2016
    NetworkWorld May 22, 2012
    "The maximum areal densities of hard disk drives are expected to more than double by 2016, according to an IHS iSuppli storage space market report published Monday...

    IHS iSuppli said the increase in densities should bode well for the continued sales of hard drives in data-intensive applications such as video and audio systems, the market research firm stated.

    Leading the way for greater disk density will be technologies such as heat-assisted magnetic recording (HAMR), which Seagate patented in 2006. Seagate has already said it will be able to produce a 60TB 3.5-in. hard drive by 2016..."

      HDD Areal Density Doubling in Five Years
      Storage Newsletter May 24, 2012
      "Maximum areal densities in HDD are expected to more than double during the five-year period from 2011 to 2016, spurring continued growth for HDDs in storage-intensive applications such as video and audio systems, according to an IHS iSuppli Storage Space Market Brief report from information and analytics provider IHS iSuppli...."
      How to Speed Up Your NAS With iSCSI
      IT World May 21, 2012
      "... how to configure and use an iSCSI target on a NAS server with Windows' built-in iSCSI initiator for fast access...

      Many technologies originally intended for the enterprise end up trickling down into the consumer market at some point. Some of these technologies (ethernet or virtualization, for instance) are more practical than others; but if businesses find a use for a specific piece of technology, then chances are good that consumers can benefit from it as well. Such is the case with iSCSI..."

      Organizations Struggling fo Enforce Policies for Managing Records
      HelpNet Security May 21, 2012
      "Despite greater investments in their information management programs, most organizations still struggle with properly implementing those programs and getting employees to comply with them, putting them at risk for information loss, regulatory non-compliance and litigation..."
      Why All Data is Small Data
      Enterprise Systems Journal May 21, 2012
      "Although everyone is talking about "Big Data" -- as though that term has any meaning beyond what a vendor says it means -- I submit that the real money in the storage business has always been and will always be made in and around an even more revolutionary concept: "small data."

      This may sound counterintuitive, but hear me out..."

      Java Technology
      x
      Java Spotlight: Live from JavaOne India - East meets West
      Episode 82
      Roger Brinkley interviewed Harshad Oak, Kevin Nilsonk Yara Senger, and Kayalvizh Jayave at JavaOne India 2012. Oak is the founder of IndicThreads & Rightrix Solutions; Nilson is a Java Champion and VP of Engineering at Just.Me; Senger is the partner and director of education and teacher Globalcode; and Jayavel is the JDuchess Chennai Lead and Assistant Professor in the Department of Information Technology, SRM University. Dalibor Topic, Java Free and Open Source Software Ambassador, and Ashwin Rao, Netbeans Product Manager, are on the Java All Star Developer Panel.
      Java Spotlight Episode 83: Scott Kovatch on the Java Port for Mac OS X
      Lead Engineer for the Mac OS Port

      In Episode 83 of the Java Spotlight, Scott Kovatch discusses Mac OS X Java development. Kovatch is the lead engineer for the Mac OS X port and, in his earlier roles, was technical lead of Apple's Java team and developer of the first implementation of Java Web Start for Mac OS X. Dalibor Topic takes his usual seat on the Java All Star Developer Panel.

      IT - Technology
      x
      12 Cool, Creative, And Just Plain Weird Gadget Concepts
      InfoWorld May 19, 2012
      "An experiment in free thinking happens every day at art schools, in the cramped workspaces of independent designers and in electronics vendors' R&D labs, where designers dream up concepts for tomorrow's mobile devices and other gadgets. How about a phone that twists into a wristwatch, or a laptop that lets you flip through files by bending the edge of the screen?

      These 12 concept designs offer a sneak peek at some intriguing blue-sky ideas for future devices ..."

        The IT Law of Holes: Stop Digging and Start the Technology Migration
        NetworkComputing May 21, 2012
        "IT leaders make investment decisions based on which technologies are positioned to support the business. They're faced with decreasing per-unit capex/opex costs and increasing requirements for bandwidth and computing resources. Older technologies yield to newer versions that are faster, more flexible and easier to use. But how do you know when it's time for a technology migration? ..."
          Solaris
          x
          What's New with Solaris 11 since the Launch?
          Oracle VP for Software Development Provides Update
          "What's New with Solaris 11 Since the Launch" is a summary by Karoly Vegh of the recent online forum that featured Oracle VP for Software Development Markus Flierl. Vegh provides a link through which registered users can view a rebroadcast of the webinar that includes the session Q&A. Vegh also provides links to the slide set used by Flierl and to the public SPARC/Solaris large-scale roadmap.
          How to Upgrade to Oracle Solaris Cluster 4.0
          Using Oracle Solaris Cluster Geographic Edition Software
          The path to Oracle Solaris Cluster Geographic Edition software to upgrade from an Oracle Solaris Cluster 3.3 5/11 and Oracle Solaris 10 cluster to a platform based on Oracle Solaris Cluster 4.0 and Oracle Solaris 11 with minimum downtime is outlined in a post by Tim Read, who has prepared an eight-part map to the process. Oracle Solaris Cluster Geographic Edition enables manual initiation of an automated sequence of steps that control application start and stop commands and the direction of data replication, Read explains.
          Using Oracle Enterprise Manager Ops Center 12c to Deploy and Manage Solaris 11 OS
          Post Outlines the Benefits to Users
          Oracle Enterprise Manager Ops Center 12c provides the ability to define Solaris 11 OS and Software Profiles comprised of Oracle Solaris 11 packages, user-supplied custom packages, scripts, and other files. Leon Shaner posts on how users can benefit from using this solution to create a Solaris 11 Software Update Library containing Oracle Solaris Image Packaging System (IPS) content that is synchronized with the main Oracle repository at pkg.oracle.com. The Ops Center managed Solaris 11 repository becomes the package (pkg) publisher for downstream Solaris 11 deployments and updates on all Solaris 11 systems being managed by Ops Center.
          MySQL
          x
          A Collection of FAQs on MySQL 5.6 Replication
          Includes Link to the On-demand Webinar
          Global Transaction IDs, auto-failover and self-healing, multi-threaded, crash-safe slaves ... all part of MySQL 5.6 Development Release. Mat Keep has collected FAQs on the release that were collected in a webinar held by the MySQL Development Team. The questions covered the following aspects of the release:
          • Multi-threaded slaves
          • Global Transaction iDs and HA utilities
          • Replication event checksums
          • Time delayed replication
          • Informational log events
          • Remote binlog backup

          Keep also includes links to the on-demand webinar itself and to the collection of slides used in the webinar.

          Linux
          x
          The Benefits of Using Oracle Linux
          'The Best Enterprise Linux Solution Available': Wim Coekaerts
          In his post on Oracle Linux components Wim Coekaerts explains his opinion of Oracle Linux as "... the best enterprise Linux solution available." In large part, he attributes this excellence to the over 100,000 hours of QA testing that have already been conducted on Oracle Linux. Coekaerts contends that both the excellence (and the ease of use by customers) of the Oracle support program further ensure confidence in Oracle Linux. According to Coekaerts, the focus at Oracle on Linux is twofold: enhancing Linux to run Oracle products and making Linux a better OS.
          IT - Cloud
          x
          3 Easy Steps to Creating Your Cloud Strategy
          InfoWorld May 22, 2012
          "If you have no cloud computing plan, you've essentially decided to fail. Here's how to succeed ...

          You can wing it, which is what most IT shops do. You can wait to see which way the wind blows, then create strategy around what works. But lack of planning means there will be a lot of expensive retrofitting and rework. Your risk of failure skyrockets... For those of you who hate to plan, let me provide you with three easy steps to create a cloud computing strategy. It's less painful than you think..."

          A New Dawn for Cloud Computing
          InfoWorld May 21, 2012
          "With HP and Microsoft poised to sell cloud computing by the pound, competition to lock in both public and private cloud customers begins in earnest ...

          The knock on Amazon Web Services and other IaaS (infrastructure as a service) providers is that they're not reliable enough for enterprise-class workloads. And even with recent price drops, it's cheaper over the long haul to buy and run your own infrastructure..."

          Cloud Computing Key to Fighting Data Loss
          eWeek May 16, 2012
          "The amount of data created and held by companies is increasing exponentially, and keeping it safe continues to be a major cause for concern. At the same time, cloud computing, rather than remaining a theoretical concept, is now a reality for many organizations. Data loss continues to be a huge problem for companies across North America that are looking to cloud-based platforms for a solution, according to a survey commissioned by CA Technologies, 'Insights: Data Protection and the Cloud.' ..."
          Cloud's Tough Enemy: Chargeback Pushback
          InformationWeek May 21, 2012
          "Chargeback has always been hard for IT, but cloud computing forces the issue. At the same time, pushback from business users continues...

          As cloud management tools and platforms evolve to better handle metering and chargeback, IT shops are still struggling with the practice--both from the standpoint of financial management challenges and ongoing pushback from business users..."

          Is Cloud-Based Security Really Cheaper?
          CSO Online May 21, 2012
          "Vendors hope subscription models -- and removing need to manage and update software, hardware -- will be attractive, but the jury's not in on cost ...

          As part of its marketing strategy for selling to small- and medium-size businesses (SMBs), Microsoft this week released the results of a study on the use of cloud-bases security. The survey of SMBs, whether from Microsoft or other vendors, found that they were five times more likely to have decreased spending on security over the last three years, as a percentage of their overall IT budget. They also spent 32% less time managing security than those that used on-premise software..."

          Moving to a Legal Storage Cloud
          Enterprise Systems Journal May 21, 2012
          "Can a law firm make a smooth transition to a storage cloud while meeting security and resource requirements?

          What happens when a legal firm needs to share a huge number of documents, make the move quickly and safely, and do it with minimal IT resources? We talked to Matt Donehoo, director of information systems at Segal McCambridge Singer & Mahoney, a Chicago-based law firm with approximately 150 attorneys, about his experiences moving his firm’s document storage to the cloud..."

          Patriot Act Doesn't Give Feds Special Access to Cloud Data
          ComputerWorld May 23, 2012
          "Other countries also can obtain personal data stored in the cloud, an international law firm found ...

          An often-repeated concern that the U.S. Patriot Act gives the U.S. government unequaled access to personal data stored on cloud services is incorrect, with several other nations enjoying similar access to cloud data, according to a study released Wednesday.

          The governments of several other countries, including the U.K., Germany, France, Japan and Canada, have laws in place allowing them to obtain personal data stored on cloud computing services..."

          Trying To Clear The Haze Around Cloud
          IT World Canada May 17, 2012
          "At an IT conference speakers acknowledged there's still confusion around cloud computing even as they tout the benefits

          The idea of delivering IT services over the Internet isn’t new, but attach the word ‘cloud’ to them and confusion reigns: There’s public cloud, private cloud, infrastructure as a service, platform as a service ..."

          IT - DR
          x
          How to Exercise Your Crisis Management Team
          Continuity Central May 18, 2012
          "The new chief information officer summoned two executives and myself, the BCP coordinator, to his office to be briefed on our business continuity management program. As we reviewed the latest executive dashboard report, I could sense his growing impatience. Finally he blurted out that while he appreciated the update, he really needed to know what exactly to do if disaster struck one of our data centers / centres.

          Is your crisis management team (CMT) ready for the unexpected? ..."

          How to Start a Business Continuity Program
          CSO Online May 16, 2012
          "Sometimes you pull the short straw.

          That's how one CSO felt when his former employer asked him to create a formal business continuity (BC) program for a few years ago.

          "It's hard, right?" says the CSO, who worked for a technology company at the time and asked to remain anonymous. "Any division could fall down, plants could fall down. Some divisions were good and some weren't. The top brass cared about the 20 percent that made 80 percent of the money and making sure that would continue if something happened."

          IT - Networks
          x
          Does Standardized Interoperability In Data Center Fabrics Matter?
          NetworkWorld May 19, 2012
          "Data center fabric alternatives are designed to extend or replace Spanning Tree in Ethernet networks ... Despite interoperability trials and demonstrations involving alternative data center fabric standards, a non-standard fabric technology is said by proponents to be at the front of the pack.

          Multichassis Link Aggregation (MLAG) and two percolating fabric standards, TRILL and Shortest Path Bridging (SPB), are designed to create multiple active paths to work around the limitations of Spanning Tree, reduce latency and facilitate more of an "East-West" traffic flow between server racks..."

            Preparing Your Enterprise for World IPv6 Launch
            NetworkWorld May 19, 2012
            "Last year on June 8, 2011 we all experienced World IPv6 Day. This was a 24-hour test for web sites to use both an IPv4 and IPv6 addresses simultaneously for the same URL. One June 6, 2012 there will be World IPv6 Launch in which many organizations will enable IPv6 forever. Enterprises will need to prepare for World IPv6 Launch whether or not they are actively participating and enabling IPv6..."
              US Firms Over-Reliant On Firewalls to Defend Against DDoS Attacks
              NetworkWorld May 17, 2012
              "More than half of US businesses still rely on conventional firewalls or intrusion prevention systems to shield themselves from the scourge of DDoS attacks, a survey by services firm Neustar has found.

              The survey of 1,000 US-based IT professionals across a range of industries found that only 3 percent were using DDoS mitigation systems or services, with a quarter claiming they had no protection whatsoever against the threat..."

              IT - Operations
              x
              9 Warning Signs of Bad IT Architecture
              InfoWorld May 24, 2012
              "Chances are someone at some point spent countless brain cycles planning your organization's IT architecture before handing the grand plan off to someone else to build it out, and then to someone else to maintain it as your computing environment inevitably grew. And, chances also are, somewhere along the line, best intentions faded in the face of expediency, departmental politics, and general mismanagement, eroding what was once a coherent architecture management strategy into an ongoing series of independent, case-by-base decisions about each technical component.

              How do you know if your organization has strayed from the path? Here are nine warning signs that bad IT architecture has taken hold of your organization..."

              Event Log Management Made Easy
              InfoWorld May 22, 2012
              "Most companies' log files carry too much noise. For a better log management system, turn the normal model on its head ... When it comes to log management, most administrators follow the traditional route of generating all possible events that might need to be captured, then choosing which events should create actionable alerts. The centralized log management system then picks up, centralizes, and correlates these entries. The result is information overload, much akin to the log entries generated by the average firewall..."
              IT - Security
              x
              7 Ways to Mask Your Internet Identity
              NetworkWorld May 3, 2012
              "Have you checked your online identity lately? Is it accurate or full of inconsistencies, both of which can be devastating? Accurate information can be used by stalkers and cyber criminals, while incorrect data that casts you in a bad light can cost you a promotion, a job, or even your business. Companies such as Intelius, Spokeo, MyLife, PeekYou, BeenVerified, PeopleFinder, and Radaris (to name a few) aggregate your personal information, sell it, then make it difficult, if not impossible, to get it removed. But there are ways to mask your digital identity..."
                DARPA Seeks Holy Grail: Quantum-Based Data Security System
                NetworkWorld May 17, 2012
                "Information security systems based on quantum computing techniques are one of the holy grails of the industry but the scientists at the Defense Advanced Research Projects Agency want to change that with a program that could develop such a system in 3 years.

                The main goal of the new program, called Quiness is to demonstrate that quantum communications can generate secure keys at sustainable rates of 1-10 Gbps at distances of 1,000-10,000 km..."

                Data Breaches, Attacks Still Have IT Security Worried, Survey Finds
                NetworkComputing May 21, 2012
                "First, the good news: IT has to put less effort into getting buy-in and sufficient funding for security. The bad news? Fifteen percent of organizations report being more vulnerable to attacks and data breaches--the same percentage as last year, according to InformationWeek's 2012 Strategic Security Survey..."
                Flaw Found in Common Network Security Technology
                CIO Today May 23, 2012
                "Network firewall 'middlebox' technology could unwittingly help hackers hijack an Internet connection. Middleboxes monitor the 'sequence numbers' of data packets being sent to mobile devices. Middleboxes could help hackers use the process of elimination to home in on a number in the right range, then gain access to passwords..."
                  How a Pickpocket Gets Your ATM PIN
                  InformationWeek May 22, 2012
                  "More often than not, our ATM PIN (usually a 4-digit decimal number) is either our own birth date or a family member's birth date or some important date in our lives like wedding anniversary or graduation day. The reason is plain and simple — these dates are easy to remember. And then where can a pickpocket find these dates? ..."
                    Mistakes That Led to the Massive Utah Data Breach
                    HelpNet Security May 21, 2012
                    "A little over a month ago, the largest data breach in Utah history resulted in the compromise of Social Security numbers of some 280,000 Medicaid and Children's Health Insurance Plans users and "less sensitive" information on 500,000 more of them.

                    The data was located on a Utah Department of Technology Services' computer server, and is believed to have been accessed by Eastern European hackers..."

                    Top 10 Patching Hurdles and How to Overcome Them
                    HelpNet Security May 23, 2012
                    "Patching is the most effective, efficient and simple method to mitigate malware, worms and viruses. It may not protect against advance attacks that make use of 0-day vulnerabilities, but for the most part it is an excellent cost effective and reliable solution. But many organizations have a hard time patching. This made me want to examine: what challenges exist and how can we address them? Here are some common hurdles for patching and tips that organizations can use to move toward a better patching posture..."
                      IT - Careers
                      x
                      6 Habits of Truly Memorable People
                      Inc. May 21, 2012
                      "In order to succeed, almost everyone—whether business owner or employee—must be memorable. While you don't have to be The Most Interesting Man in the World, being known is one of the main goals of marketing, advertising, and personal branding...

                      But if your only goal is to be known for professional reasons, you're missing out. People who are memorable for the right reasons also live a richer, fuller, and more satisfying life. Win-win!

                      So forget the flashy business cards and personal value propositions and idiosyncratic clothing choices. Here's how to be more memorable—and have a lot more fun..."

                        12 Tips to Cut Your Cell Phone Bill
                        IT World May 19, 2012
                        "See that cell phone next to you? Unfortunately, you're paying too much money for it--every month. If overpaying for what you need sounds like a bad idea to you, stop doing it. We've assembled 12 simple actions that you can take to reduce your cell phone bill, so that some of the cash you now spend for service--maybe even half of it--remains in your possession. So check out our tips, and use one or more of them to save big bucks on your bill..."
                          The End of Multitasking As You Know It
                          InfoWorld May 23, 2012
                          "Multitasking doesn't work, yet it's a prized ability. Instead, learn how to manage interruptions so that they become part of your schedule ...

                          When you start work on an assignment, move it to a second column, to the right of the first one. Add the expected completion date, then (very important) notify both the assigner and beneficiary that you've started to work on it and when you expect to be done.

                          In comes an interrupter with a new top priority ..."

                            Servers
                            x
                            How to Benefit from Optimizing Hardware with Oracle Database
                            Ten Minute Webinar Explains the Process of Selecting Optimal Implementations
                            In less than 10 minutes, learn more about how to benefit from optimizing Oracle hardware with Oracle Database. Oracle Performance Expert Randal Sagrillo's technical overview shows how the Oracle Optimized Solution for Oracle Database provides extensive guidelines for architecting and deploying complete database solutions using Oracle's powerful SPARC M-Series and SPARC T-Series servers together with Oracle Solaris and Oracle's SAN, NAS, and flash-based storage to deliver optimal performance and availability while minimizing the risks associated with deploying and consolidating large mission-critical database systems.
                            IT - Virtualization
                            x
                            Four Ways IT Can Avoid Wasting Resources
                            Enterprise Systems Journal May 21, 2012
                            "The shift to virtualization and private cloud computing is helping IT departments become more efficient, but that efficiency is masking a less visible waste of resources that threatens return on investment as well as performance levels. The source of that resource drain includes virtual machine (VM) sprawl, excessive proliferation of snapshots and over-provisioned machines.

                            IT professionals know this is happening, and they want to preserve their resources. How can they do that? Here are four steps IT administrators should take to avoid depleting resources..."

                            IT - Compliance
                            x
                            Manage Risk as A Strategy, Comply With Regulations as a Tactic
                            Dark Reading May 17, 2012
                            "Compliance alone should never be the only goal...

                            Good business management makes it easier and safer to run a business correctly. And as a benefit, this makes compliance with applicable regulations and laws easier and natural, not merely a huge distraction.

                            I have a prospective client I have met with occasionally for a couple of years. They are in constant agony about how they can meet regulation requirements, deal with the associated cost, and find the time required to focus on compliance..."

                            IT - Email
                            x
                            How to Avoid 5 Common Email Management Mistakes
                            NetworkWorld May 21, 2012
                            "Email managers have a lot at stake. After all, the volume of global electronic messages sent via email dwarfs all other forms of electronic communication, including social networking. Since the inception of electronic mail, which, according to some Internet historians, can be traced to a small mainframe app called 'MAILBOX' from the mid-1960s, human-to-human messages have been created, transmitted and stored in electronic format. But early email administrators could hardly have envisioned the complexity of current email infrastructure and the concomitant maze of technical, security, business and regulatory challenges..."
                            Writing Effective Email: Resist These 10 Cardinal Sins
                            CIO Insight May 22, 2012
                            "There are more than 294 billion emails sent and received globally every day, according to published research. In the U.S., 2.5 billion texts messages are dashed off daily. By 2013, there will be nearly 1.2 billion mobile employees worldwide. So, yes, it's a virtual world these days. Even if a CIO has to go to an office, it's a safe bet that the vast majority of communications takes the form of emails and/or texts. In the book The Virtual Executive: How to Act Like a CEO Online and Offline (McGraw-Hill/available now), author Debra Benton encourages professionals to build a "virtual executive presence" so they can present ideas and engage colleagues, customers and partners just like they do when they're face-to-face..."
                            OpenStorage
                            x
                            Open Storage SSD Array Delivers Record-Setting Price / Performance
                            Over 250,000 write IOPS sustaining 2.8GBps throughput with less than 2ms of latency
                            Nexenta Systems and EraStor, a new European-wide provider delivering Nexenta certified solutions, announced that they achieved a record-setting level of storage performance with NexentaStor and STEC solid-state drives (SSDs). The EraStor 25S all-SSD appliance Powered by NexentaStor uses 24 STEC SSDs and can achieve 253,469 sustained write IOPS at low latency.

                            The EraStor 25S all-SSD appliance is available today and supported by key partners within the EraStor alliance. The EraStor 25S starts from 4.5TB raw capacity and scales up to 17.6TB (raw capacity) of pure performance storage in a single high-density 2U appliance.

                            NexentaStor is the only solution available on the market today that allows customers:

                            • The choice of underlying hardware free from the lock-in proprietary business models of legacy vendors;
                            • The ability to unify SSD, disk and hybrid use cases that combine SSDs and disks via one scalable system; and
                            • The management of all leading storage protocols via one system, including FC, NFS, iSCSI, CIFS and objects for cloud use cases.

                            With the award-winning NexentaStor, it is possible to utilize SSD technologies in a manner that is appropriate for each business.

                            IT - Mobile
                            x
                            Smartphone Security is Heading for 'Apocalypse'
                            IT World May 20, 2012
                            "The meteoric rise in the smartphone market is creating a dangerous vulnerability in smartphone security - one that may not be patched until the problem expands into what has been dubbed an 'apocalypse.'

                            Dan Auerbach, a staff technologist at the Electronics Frontier Foundation, points to outdated encryption standards and the inherent vulnerabilities of the baseband processor found on modern smartphones as the makings for a security hole through which users can be exploited at large..."

                            IT - Big Data
                            x
                            Big Data in The Cloud: It's Time To Experiment
                            InfoWorld May 18, 2012
                            "Big data is not data warehousing or BI, so there are no proven paths --which is why you need data scientists ...

                            The lure of big data has many people in enterprise IT moving quickly to consolidate and mash up their data assets with other relevant information. The tools are here right now, including big data engines based on Hadoop, public clouds that provide rental access to a huge number of servers, and external cloud-delivered data resources to make better sense of your info..."

                            What Security Wants Most from Big Data
                            HelpNet Security May 22, 2012
                            "More than two thirds of IT people think Big Data should be a strategic priority, according to Varonis.

                            More than half expect Big Data to be a strategic initiative over the next five years, but fewer than half of the respondents felt there was a clear definition of Big Data, even fewer felt they had adequate knowledge of Big Data products."

                            IT - BYOD
                            x
                            7 Tips for Establishing a Successful BYOD Policy
                            NetworkWorld May 18, 2012
                            "This pressure might leave you wondering the keys to developing a BYOD policy and how best to implement it. These seven core ideas should be a part of any good Bring Your Own Device program. Each idea comes with many important questions to ask yourself, your IT associates and your executive team while developing a BYOD policy..."
                            BYOD Requires Integration with IT Infrastructure
                            Baseline May 21, 2012
                            "A survey by Amdocs indicates service providers supporting BYOD programs need support for business and operational support systems (B/OSS)...

                            Wireless service providers are aware of the growing trend of bring your own device (BYOD) programs among businesses, according to a survey sponsored by customer services provider Amdocs, but results indicate the need for converged business and operational support systems (B/OSS) to provide an end-to-end view of the customer..."

                            Cisco on BYOD: Get Used to It
                            NetworkWorld May 21, 2012
                            "Last week Cisco released some news about the tech topic du jour, BYOD. The main message: companies are less weary of employees using personal devices in the workplace, but security is still a concern.

                            Is anyone surprised here? ..."

                            Top10
                            x
                            Top Ten Articles for last few Issues
                            Vol 171 Issues 1, 2 and 3; Vol 170 Issues1, 2 ,3 and 4; Vol 169 Issue 4
                            We track how frequently each article is viewed on the web site to determine which the readers consider the most important. For last week, the top 10 articles were:

                            • Oracle VM 3.1
                            • A Highlights Review of ZFS
                            • Price Comparison for Big Data Appliances
                            • Oracle Solaris Zones Preflight System Checker
                            • Oracle Virtual Desktop Infrastructure
                            • How to Deploy Oracle RAC On Zone Clusters
                            • How to Set Up a Cluster of x86 Servers with Oracle VM 3
                            • Solaris and IPv6: Is Solaris Compliant?
                            • Updating Your Oracle Solaris 11 System from the Oracle Support Repository
                            • NexentaVSA for VMware View Automates Deployment of VDI

                            The longer version of this article has list of top ten articles for the last 8 weeks.

                              Top Ten Articles for last few Issues
                              Vol 171 Issues 1, 2 and 3; Vol 170 Issues1, 2 ,3 and 4; Vol 169 Issue 4
                              We track how frequently each article is viewed on the web site to determine which the readers consider the most important. For last week, the top 10 articles were:

                              • Oracle VM 3.1
                              • A Highlights Review of ZFS
                              • Price Comparison for Big Data Appliances
                              • Oracle Solaris Zones Preflight System Checker
                              • Oracle Virtual Desktop Infrastructure
                              • How to Deploy Oracle RAC On Zone Clusters
                              • How to Set Up a Cluster of x86 Servers with Oracle VM 3
                              • Solaris and IPv6: Is Solaris Compliant?
                              • Updating Your Oracle Solaris 11 System from the Oracle Support Repository
                              • NexentaVSA for VMware View Automates Deployment of VDI

                              The longer version of this article has list of top ten articles for the last 8 weeks.

                                IT - Server
                                x
                                10 Command-Line Tools That Refuse To Die
                                TechRepublic May 20, 2012
                                "Despite the abundance of GUIs, the command line still offers more power, flexibility, and control for certain tasks.

                                Some people think the command line is an outdated mode of usage and administration. Others say they couldn't live without it. I'm caught somewhere in the middle. There are certain commands for which I have faithful GUI tools. But there are other commands I will never be without, so long as there is a command prompt to take them..."

                                  The Two Sides of an IT Admin: Dr. Jekyll and Mr. Hyde
                                  InfoWorld May 21, 2012
                                  "Few professions have the propensity to go from normal to obscene as rapidly and thoroughly as IT does ...

                                  I'm not sure many other occupations can go from normal to obscene as rapidly and thoroughly as IT. There's something to be said for having a job that presents new challenges and situations on a constant basis, but let's be honest, when the fit hits the shan in IT, it's generally an epic event..."

                                    IT - Tape
                                    x
                                    Tape Data Storage Remains an Enterprise IT Workhorse After 60 Years
                                    eWeek May 18, 2012
                                    "Despite vocal naysayers from the spinning-disk school, tape storage—which turns 60 years of age in 2012—continues to hold its own, by and large, throughout enterprise IT. This, of course, is due to its significant cost advantages, reliability and continued improvement in capacity, speed and ease of use. While many organizations are already familiar with tape’s traditional uses—backup, disaster recovery and compliance—most probably don't realize that modern applications now enable tape to be used as an active file archive and as low-cost network-attached storage for latency-tolerant data..."
                                    Developer
                                    x
                                    The Top 10 Programming Languages
                                    Java Tops List Once Again
                                    There is a fashion trend in programming languages. While some come and go, others come and stay, according to a survey by TIOBE software. Among the currently popular -- one might more correctly say enduring -- languages, according to TIOBE's survey are these:

                                    • Java; C; C+; C++; Objective-C; PHP; Visual) Basic; Python; Perl; JavaScript

                                    The survey includes a brief definition of each and an assessment of their respective importance along with the recommendation that as many as possible of the 10 should be in every developer's tool kit.

                                    Sysadmin
                                    x
                                    Solaris 11: DNS Client Configuration Using Svccfg
                                    An Alternative to Using Configuration Files

                                    Using DNS Client Configuration Using Svccfg in Solaris 11 is the subject of Matthew Mattoon's post on ITNNewsCast, which he wrote in response to the increasing frequency of users moving configurations from configuration files into the Service Management Framework. Mattoon provides the code for four steps:

                                    • View existing DNS client configuration
                                    • Update existing DNS client configuration
                                    • Review changed DNS client configuration
                                    • Export DNS client configuration
                                    Networking
                                    x
                                    How to Get Started Configuring Your Network in Oracle Solaris 11
                                    Changes bring a more consistent and integrated experience
                                    With changes in implementation and the names of network interfaces and the commands and methods for administering and configuring them, the Oracle Solaris 11 network architecture is significantly different from previous releases of Oracle Solaris. Andrew Walton's article describes some of the new features for basic Oracle Solaris 11 network configuration and shows how to use them to add a new system to a simple but typical corporate network. His instructions cover both manual and automatic network configuration. Walton recommends that administrators use network configuration profiles to simplify complex configurations and apply them as a single unit of change.
                                    Trending in
                                    Vol 232, Issue 2
                                    Trending IT Articles