News about Oracle's Solaris and Sun Hardware
System News
Jun 4th, 2012 — Jun 10th, 2012 Generate the Custom HTML Email for this Issue
System News System News for Sun Users
Volume 172, Issue 1 << Previous Issue | Next Issue >>
Sections in this issue:
click to jump to section


IT - CxO
x
5 Qualities IT Leaders, Paratroopers Share
InformationWeek June 1, 2012
"Chris Drake is used to having his head in the clouds. Not only is he the founder of FireHost, a Texas-based secure cloud hosting company, but Drake served in the 82nd Airborne Division of the U.S. Army as a third-generation paratrooper.

Here, Drake describes how his 64 jumps as a paratrooper prepared him for managing techies, staving off hackers, and always landing on his feet as an IT leader.

As an IT leader, are you developing these qualities in your staff? ..."

    5 Signs Of a Lousy IT Leader
    InformationWeek May 29, 2012
    "From former FEMA director Michael Brown to Enron ex-CEO Jeffrey Skilling, history is rife with poor leaders. 'There are a lot of [people] who get into leadership positions who probably shouldn't,' says Ronald Riggio, the Henry R. Kravis professor of leadership and organizational psychology at Claremont McKenna College in California.

    While we can't always control who's in charge of an IT department, recognizing potential trouble ahead of time can help your team select and groom future leaders, and learn to deal with certain challenges that may lie ahead. Riggio cites five ways to spot a bad boss: ..."

      10 Signs of Unhealthy Company Culture
      Small Business Solution Journal May 23, 2012
      "Your employees may seem content, but you never know if they're just hesitant to voice their grievances to their higher-ups. Here are some telltale signs that they're unhappy, and how to treat your ailing culture..."
        IT as Profit Maker
        InformationWeek June 1, 2012
        "The practice of vertical integration has been on the outs for a decade or two, as companies shed or outsourced ancillary operations in order to focus on their "core" expertise. That thinking has extended to IT, especially in the era of cloud computing: Why tie up internal resources building and managing data centers, infrastructure, and applications, the argument goes, when third parties can provide that technology more efficiently and effectively?"
        Top 10 Steps Businesses Can Take To Prepare For the Olympics
        v3 co uk June 1, 2012
        "With just over 50 days until the start of the Olympics, most organisations are likely to have given some serious consideration to the impact the event could have on business. For firms that haven't, though, there's still time to put the relevant plans in place..."
          Features
          x
          How It's Done: Advice from a Practiced (and Successful) Venture Capitalist
          Vinod Khosla and the Founding of Sun Microsystems
          When Vinod Khosla pitched potential investors on Sun Microsystems, his business plan was commendably succinct and brief. In a related and similarly brief video, Khosla advises that business plans should run to no more than five or six pages that contain only information on the technology breakthrough, the people involved, the value proposition for the customer, and the marketing and sales strategy. A too-long business plan, Khosla contends, bespeaks confused thinking on the part of its authors. There is a further bit of Sun history in Arun Natarajan's article in The Startup Journey that concerns the gestation of Sun Microsystems.
            SPARC
            x
            SPARC T4 Server Seamlessly Integrates Hardware Crypto Acceleration
            Administrators No Longer Need to Assign MAUs to Domains: T4 Does It Automatically

            Not only, posts Jeff Savit, is the SPARC T4 Server blazing fast, it also features a built-in crypto accelerator. Administrators of the T4 no longer have to assign crypto accelerator units to domains as with earlier T-Series SPARC servers. Now the process is automatic. As Savit writes, "Every physical or virtual CPU on a SPARC-T4 has full access to hardware based crypto acceleration at all times." Administrators no longer have to control how they are allocated - it is available to all CPUs and virtual environments without any administrative effort, he concludes.

            Virtualization
            x
            Oracle VM Server for SPARC 2.2: Improved Whole-core Allocation
            CLI Options Free Up Hard Partitioning Requirements

            Among the major new features included in Oracle VM Server for SPARC 2.2 are improvements in the capability for configuring VMs using whole-core allocation. Eric Sharakan explains the restrictions that were imposed in connection with the hard-partitioning licensing requirements by version 2.0. In the new release, Sharakan writes, the CLI options for managing whole-core allocations now permit users to enable whole-core allocation granularity without the onerous restrictions necessitated by the hard-partitioning CPU licensing requirements.

            IT - Storage
            x
            How to Update a Customer's Data Protection Plan
            CRN May 29, 2012
            "If your customers are using tape to protect their data, it's time to have a conversation on how they can best update data protection and backup plans. Here, Angerer, senior vice president and general manager, data protection at Quest software, offers five tips to help modernize antiquated data protection strategies..."
            Java Technology
            x
            Java Spotlight Episode 85: Migrating from Spring to JavaEE 6
            Ertman and Bakker of Luminis Technologies Are Guests
            Host Roger Brinkley invites Bert Ertman and Paul Bakker, both of Luminis Technologies, to discuss migrating from Spring to Java EE6 on Episode 85 of the Java Spotlight. Links to three tutorials on the subject are included in the post. Arun Gupta joins the Java All Star Developer Panel for this episode.
            MySQL
            x
            Configuring MySQL Cluster Data Nodes
            Optimizes Performance on Multi-core, Multi-thread CPU Designs
            Mat Keep posts on the configuration of data nodes in MySQL Cluster 7.2 to achieve optimum performance on the latest generations of multi-core, multi-thread CPU designs. According to Keep, the flexible configuration afforded by the multi-threaded data node enhancements means it is possible to optimize data nodes to use anything from a single CPU/thread up to a 48 CPU/thread server. Co-locating the MySQL Server with a single data node can fully utilize servers with 64 – 80 CPU/threads, and with multiple data nodes per server, but only required for very large servers with 4+ CPU sockets dense multi-core processors, he writes.
            Cloud Computing
            x
            Ellison Expounds on Oracle Cloud Strategy
            Adds Oracle Social Cloud Services
            In the words of Larry Ellison, "Oracle is the only vendor that offers a complete suite of modern, socially-enabled applications, all based on a standards-based platform." There are now several elements in Oracle's cloud offerings, each providing a particular range of services including:
            • Oracle Cloud Platform Services: database, Java, developer, web, mobile, documents, sites, and analytics services
            • Oracle Cloud Application Services: ERP, HCM, talent management, sales and marketing, and customer experience services
            • Oracle Cloud Social Services, the latest addition: Oracle Social Network, Oracle Social Data Services, Oracle Social Marketing and Engagement Services, and Oracle Social Intelligence Services

            "Almost seven years of relentless engineering and innovation plus key strategic acquisitions. An investment of billions. We are now announcing the most comprehensive Cloud on the planet Earth," said Oracle CEO, Larry Ellison.

            Mark Hurd Praises Larry Ellison's Foresight on Cloud Computing
            Oracle Keeps Its Eye on Both the Consumer and Enterprise Markets
            Oracle is headed in the right direction when it comes to cloud computing says Oracle Co-President Mark Hurd. Oracle's positioning in the SaaS sector, he contends, pulls in a billion in revenue annually. Further, Hurd continues, Oracle's is strongly positioned in the HCM market with its acquisitions of Taleo, PeopleSoft, and RightNow. BusinessCloud9 writer Stuart Lauchlan speculates that Oracle may make aggressive moves into the ERP market as well, given that Hurd praised Larry Ellison's foresight in founding NetSuite. Specifically, Hurd says Oracle will soon be a contender in the accounting and finance sectors with Fusion Cloud apps.
            Linux
            x
            Two More Oracle Linux Options
            Smart Flash Cache and cgroups
            Oracle Linux offers users two additional new features that Wim Coekaerts neglected to include in an earlier post, which are Oracle Database Smart Flash Cache (DBSFC) and assigning a conrol group (cgroup) in Oracle Linux to an Oracle database instance. DBSFC allows users to extend the Oracle Buffer Cache in memory (SGA) using secondary flash based storage, Coekaerts writes The cgroup feature lets users create resource groupings based on cpu, memory or disk parameters (or a combination), according to Coekaerts. cgroups is also the internal set of features that Linux containers (lxc) uses.
            IT - Cloud
            x
            10 Keys for Building Private Clouds
            NetworkWorld May 29, 2012
            "One of the toughest parts about implementing a cloud strategy isn't choosing the underlying technology to power the deployment; it's having the processes in place to manage an effective migration to the cloud, says Thomas Bittman, a cloud analyst for Gartner.

            'While cloud technologies are just now maturing, that's one of the easier challenges to solve,' Bittman said during a webinar sponsored by Gartner discussing how to build private clouds..."

            Cloud Computing's Sad State: Innovation Is In Scarce Supply
            InfoWorld June 1, 2012
            "There are two prominent cloud technology strategies these days. First: Let's copy everything Amazon Web Services (AWS) is doing. (You know who you are!) Second: Let's rebrand our old technology as a private cloud.

            The lack of innovation and creativity in cloud computing is beginning to bug me, and it should bug those of you in enterprise IT. Here's how to spot technology providers that are, er, innovation-challenged..."

            Cloud's Thorniest Question: Does It Pay Off?
            InformationWeek June 4, 2012
            "Public cloud infrastructure, the pay-as-you-use server and storage services sold by the likes of Amazon, Microsoft, and Rackspace, is getting some serious test-drives this year. About one-fourth of IT execs in our Global CIO Survey say they plan a major project this year to bring the public cloud into their IT infrastructure, compared with just 11% who have such services in place now..."
            Consider Cloud Computing Services before Your Users Do
            NetworkComputing May 21, 2012
            "Every day that goes by that IT isn't meeting the features and services offered in the cloud, users are moving there on their own. No office collaboration environment? They're on Google Docs. No file-sharing option? They're using Dropbox. No solid backup or recovery options for their laptops? Carbonite is handling it. Now your data is outside your corporate walls, outside your control and outside of compliance..."
            Does The 'Private Cloud' Make Sense?
            InfoWorld June 4, 2012
            "Last week Jason Bloomberg of ZapThink wrote a funny, cutting piece that was meant to rip the notion of the private cloud to shreds.

            I actually found myself agreeing with some of it -- but not with the blanket conclusion that 'private clouds suck.'"

              Ready to Sell Your Cloud? Answer These Questions First
              Internet Evolution June 5, 2012
              "As more enterprises gain comfort with private clouds, a logical next step is to consider monetizing these assets.

              The situation most often comes up when an enterprise has a well developed application and a portal to it; there is excess capacity; and there are other organizations that need the app and are willing to pay for it. The provider then can extend a private cloud as a software-as-a-service (SaaS) offering to other companies for a fee..."

              Six Misconceptions about Infrastructure as a Service (IaaS)
              InformationWeek June 7, 2012
              "Companies have progressed beyond the initial euphoria about cloud into experimenting with some form of cloud in their IT portfolio. This has been accompanied by concerns about potential teething troubles that have been reported in the media about this powerful transformation for IT. Many of the perceived problems have been caused by misconceptions about cloud computing. Here are six of the most common myths about infrastructure-as-a-service cloud computing: ..."
              The Hybrid Cloud: What Is It, and How Do You Get There?
              NetworkComputing June 1, 2012
              "Hybrid cloud. You're all aiming for it--that's what vendors, analysts and respondents to a soon-to-be-released private cloud survey are saying. The upcoming InformationWeek survey found that 61% of those building a private cloud and currently using public cloud plan to adopt a hybrid-cloud approach. Let's see what needs to be done before you get there."
                IT - DR
                x
                Business Continuity: Dealing With Disaster
                Baseline June 4, 2012
                "Over the last few years, more than a few organizations have discovered how swiftly and profoundly a disaster can impact business. One of the worse tornado outbreaks in history rampaged across the Midwest and South regions of the United States in the spring of 2011, causing an estimated $27 billion in damage..."
                  IT - PM
                  x
                  10 More Classic Mistakes That Can Wreck a Software Development Project
                  TechRepublic May 30, 2012
                  "It turns out there are more dev project mistakes than one 10 Things post can hold. Justin James revisits the topic with input from TR members.

                  Recently, I wrote about 10 classic mistakes that plague software development projects — and I received a pile of great comments from readers on it. Today, I will look at 10 more of these mistakes... compiled from reader feedback..."

                    10 Steps to Creating a Project Plan
                    Project Times May 17, 2012
                    "One of the critical factors for project success is having a well-developed project plan. This article provides a 10-step approach to creating the project plan, not only showing how it provides a roadmap for project managers to follow, but also exploring why it is the project manager's premier communications and control tool throughout the project..."
                      How to Keep Cloud Projects Agile, Simple
                      IT World June 4, 2012
                      "Now it's time to work on an issue that underlies all of those problematic behaviors: saying "Yes" too often.

                      Saying "No" will keep a project on track and your credibility intact. (Image courtesy of Zazzle.com.

                      Of course this is heresy. User-centered design is at the core of good UI. It would be political suicide for IT to say "No" to powerful users. IT engineering exists to serve the business, not order it around..."

                        Project Management Is No Popularity Contest
                        IT Web May 12, 2012
                        "Observing the decision-makers who select an enterprise resource planning (ERP) solution is something of a study of the human condition. From the highs of imagined benefits and anticipated advantages, to the lows of failed expectations and ballooning costs, all the emotions of life can play out. That's because a great deal of ERP projects aren't delivered on time, on deadline and within budget..."
                          The Latest 10 Things about Project Management I Learned From Dogs
                          Project Times May 9, 2012
                          "In the pressure filled world of managing programs and projects, it is a healthy thing to take a break, look at the world around us, and reflect. One major source of reflection can be the approach our beloved pets take to life, and the tasks they look to tackle. Like project leaders, dogs are almost constantly communicating (albeit in their own unique way.) Through continued empirical research, interactive testing and more direct observation, compiled below are the latest techniques for project management learned from dogs. Open your mind, reflect on the dogs you have encountered and take a look..."
                          IT - Networks
                          x
                          60% of ISPs to Roll-Out IPv6 by End of 2012
                          HelpNet Security June 5, 2012
                          "In anticipation of World IPv6 Day – June 6, 2012 – Nominum released results of a survey of the world's leading ISPs regarding their plans and concerns regarding the transition from IPv4 to IPv6.

                          Nominum surveyed 67 top ISPs throughout North America, Japan, Europe and Latin America with a combined reach of 110 million households. The survey found that 97 percent of these ISPs have either already implemented or plan to implement IPv6..."

                            Abort Your Ipv6 Launch If You're Not Prepared
                            InfoWorld June 6, 2012
                            "It's IPv6 Launch Day -- but don't panic if your organization isn't fully IPv6 compliant. Yes, advocates of a mass migration to IPv6 make some compelling arguments. Compared to IPv4, IPv6 offers nearly unlimited addresses, enhanced mobility, better performance, superior security features, and plenty more..."
                            IPv6 Transition: Observations from a Name Server Perspective
                            NetworkWorld June 4, 2012
                            "As the operator of some of the core Internet name servers, including the DNS root, .com and .net, Verisign has a unique view into the challenges of transitioning to IPv6 and progress to date..."
                              Rehearsals Over, IPv6 Goes Prime Time June 6
                              NetworkWorld June 1, 2012
                              "IPv6 will go fully live on June 6. That's the date when 50-plus access networks and more than 2,500 websites -- including Google, YouTube, Facebook and Yahoo -- will turn on support for the long-anticipated upgrade to the Internet's main communications protocol and leave it on for good..."
                              IT - Operations
                              x
                              Gartner: Top 10 Emerging Infrastructure Trends
                              NetworkWorld June 5, 2012
                              "Gartner kicked off its Infrastructure & Operations Management Summit here today with a "top 10" list of the most significant emerging trends that will impact data centers and information technology used by businesses and government from now into the next four or five years.

                              The list was presented by Gartner Chief of Research Dave Cappuccio in a keynote address, in which he explained there's often a cascading effect as one trend such as employee mobile devices and cloud use affects others such as helpdesk operations..."

                              IT - Security
                              x
                              5 Flame Security Lessons For SMBs
                              InformationWeek June 5, 2012
                              "Flame, also known as Flamer, Skywiper (sKyWIper), and Wiper, wasn't created with SMBs in mind, but it can still teach them a thing or five about IT security.

                              "These sorts of things provide us with teachable moments because they are high-profile," said Kevin Haley, Director of Symantec Security Response, in an interview. "They grab people's attention, and they may listen for a little bit..."

                              Could Security Breaches Cost Lives?
                              HelpNet Security June 1, 2012
                              "Over a quarter of companies believe that if their sites go down or they suffer a major security breach it could potentially cost customers' their lives, according to AlienVault.

                              When asked who they most feared would violate their privacy, the answer was overwhelmingly the Chinese, with 40% of respondents admitting this was the country that worried them the most..."

                              Making Data Leak Prevention Work In The Enterprise
                              Dark Reading June 1, 2012
                              "One of the most common misconceptions about data loss prevention (DLP) technology is that it is owned and implemented by IT security teams. DLP isn't strictly a security project -- it's part of a broad data protection program that demands a co-existence of people and process with technology.

                              In Part 1 of this series, we examined the benefits of establishing organizational policies prior to implementing security controls for internal use of data..."

                              Over 50% Use Unauthorized File Sharing Apps at Work
                              HelpNet Security June 7, 2012
                              "While BYOD and free, cloud-based file-sharing is on the rise, IT administrators are largely unable to police the use of these tools within their organizations, according to SkyDox.

                              The study surveyed more than 4,000 employees who handle or distribute information in the United States and the United Kingdom, in a wide array of work environments, vertical sectors and job functions..."

                              Over-55s Pick Stronger Passwords Than Youngsters
                              HelpNet Security June 4, 2012
                              "Joseph Bonneau, a computer scientist and researcher at Cambridge University, has recently shared the results of his analysis of passwords of nearly 70 million Yahoo! users with the audience at the 2012 IEEE Symposium on Security and Privacy, and among the results of his analysis are some that come as a surprise, but also some that don't: ..."
                              Undergrad Suspected In Massive Univ. Of Nebraska Breach
                              ComputerWorld May 21, 2012
                              "Officials at the University of Nebraska in Lincoln (UNL) have identified an undergraduate student they say is responsible for a recent intrusion into a university database containing personal information on more than 650,000 students, parents and employees..."
                                IT - Careers
                                x
                                37 Tech Shortcuts from the Experts
                                IT World May 26, 2012
                                "Your time is valuable. On the Gmail team, we work hard to offer a user ex­­perience that won't bog you down. But we also want to share some tips for be­­ing even more productive with Gmail..."
                                  How to Conquer Your To-Do List
                                  CIO May 31, 2012
                                  "If you have a to-do list a mile long with items that never get accomplished, you're not alone: According to a new LinkedIn survey, only 11 percent of respondents across the globe complete all of the tasks they plan to do. The reason for the low number: unplanned events like phone calls, emails and meetings that derail their priorities..."
                                    How to Prepare for the Coming IT Skills Revolution
                                    InfoWorld June 4, 2012
                                    "Call it the tech industry's version of a riddle wrapped in a mystery inside an enigma: Businesses have job openings, but IT professionals are struggling to land jobs or move to better ones.

                                    What phenomenon could knock the hallowed laws of supply and demand off-kilter? Two words: 'skills gap.'"

                                      IT - Virtualization
                                      x
                                      Let's Kick 'Virtual' To the Curb
                                      InfoWorld May 29, 2012
                                      "At some point, novel and forward-thinking concepts and practices become standard and commonplace, and the terms associated with them go by the wayside. Where special terminology had been in use to differentiate the old from the new, the new becomes the old, and the specific qualifiers drop from the conversation. When was the last time you heard someone ask for unleaded gas?"
                                        IT - Compliance
                                        x
                                        5 Ways You're Wasting Compliance Dollars
                                        Dark Reading June 4, 2012
                                        "Fighting redundancy and ineffectual practices leaves more money for meaningful security ...

                                        Sure, the cost of compliance has been driven higher and higher by increased regulatory burdens over the years. But that's not all to the story. Many organizations spend more because they're wasting compliance dollars on piecemeal compliance programs, ineffective products, and expensive consultants when things go wrong..."

                                        Data Protection Officer Role Will Be Key If You Operate in the E.U.
                                        ComputerWorld June 1, 2012
                                        "Organizations that operate in the European Union (E.U.) may soon be searching for candidates for a new role mandated by law: the Data Protection Officer (DPO). As currently described by the proposed legislation, the DPO role would require a seasoned professional with credentials in the security trenches, reporting directly to the board of directors. With the potential for a land grab of qualified candidates, organizations may want to begin defining their needs now..."
                                        Dealing with Compliance Challenges
                                        Baseline June 4, 2012
                                        "The complexities of running a business have grown exponentially over the last several years. Yet, despite massive investments in information management systems, most organizations continue to struggle with implementing these programs and getting employees to comply with them. This puts enterprises at risk for information leaks, regulatory noncompliance and litigation..."
                                        Systems Are Not Compliant; Organizations Are Compliant
                                        Dark Reading June 1, 201
                                        "Computer systems do not operate in a vacuum. They are neither isolated from people, disconnected from other computers, nor are they sealed off from the outside world. Rather, computer systems are tools your staff uses to run your organization. Companies are operated by people using their tools to perform tasks, create products, and provide services..."
                                          OpenStorage
                                          x
                                          Nexenta CEO Positive at OpenStorage Summit
                                          Sees Revenue Overtaking NetApp in Five Years
                                          Nexenta CEO Eval Powell projects $1 billion in partner sales in 2013 and $2 billion in 2014, reports Chris Mellor for The Register. Powell expects the company will reap revenues of $100 million and $200 million respectively in those years. Recently qualified STEC SSDs are expected to exceed a nearly double sustained write IOPS performance -- 500,000 IOPS -- at low latency, Powell noted. Version 4.0 of Nexenta Elastic Framework is expected in Q312 and version 5.0 in 2013. Nexenta technology, says Powell, is ready for exadata levels of data. Within five years, Powell predicts, Nexenta will overtake NetApp.
                                          IT - BYOD
                                          x
                                          10 Mobile Device Management Apps to Take Charge of BYOD
                                          NetworkWorld May 29, 2012
                                          "Managing devices in a BYOD environment is no mean feat, and the right mobile device management (MDM) product can be a key component in making it work. Here are 10 leading MDM products on the market today..."
                                          BYOD Drives Communism Out of IT
                                          CIO May 31, 2012
                                          "Freedom of choice when it comes to technology decisions has traditionally ended at the doors of the enterprise, where IT tells you what hardware and software you can use. But BYOD and consumerization of IT may be the new Glasnost..."
                                          BYOD Finds Fans in IT
                                          CIO Insight June 5, 2012
                                          "The bring-your-own-device (BYOD) trend is something that just about every CIO in the world is contending with right now. You’re probably cringing at the very thought of the growing number of personal smartphones and tablets you have accessing the corporate network right now. But a recent study from Cisco shows that IT resistance to BYOD is beginning to weaken. In fact, IT departments are increasingly viewing BYOD in a positive light ..."
                                          BYOD: Time to Adjust Your Privacy Expectations
                                          CIO May 30, 2012
                                          "Some employees thought they were pretty sneaky downloading confidential data from corporate computers to thumb drives days before they turned in their resignations and bolted to a competitor.

                                          More often than not, they didn't get away with it. Armed with forensic computer analysis—namely, the USB port registry—managers confronted these employees during the exit interview..."

                                            BYOD's Phone Number Problem
                                            NetworkWorld June 1, 2012
                                            "Would you allow top salespeople to use personal smartphones for work?

                                            BYOD, or bring your own device, makes a lot of sense for these road warriors. Client-facing mobile workers have the most to gain from popular BYODs such as iPhones and iPads. Yet some CIOs don't let salespeople use their smartphones on the job-it's the dirty little secret of BYOD.

                                            It all boils down to the phone number. Who owns this critical corporate asset?"

                                            Top10
                                            x
                                            Top Ten Articles for last few Issues
                                            Vol 171 Issues 1, 2, 3, 4 and 5; Vol 170 Issues 2,3 and 4
                                            We track how frequently each article is viewed on the web site to determine which the readers consider the most important. For last week, the top 10 articles were:

                                            • Server Virtualization for Dummies eBook
                                            • Oracle Solaris 11 Simplified Installation
                                            • Oracle VM for SPARC 2.2 Newly Released
                                            • Is Linear Tape File System (LTFS) Best For Transportable Storage?
                                            • Oracle VM: A Brief Review
                                            • LibreOffice 3.5.4
                                            • Whatever You've Heard, Repositories Don't Bite
                                            • Oracle's Pillar Axiom 600 Storage: A Better Choice than EMC
                                            • Solaris 11 VNICs on SR-IOV Virtual Functions
                                            • Cross-CPU Live Migration in Oracle VM Server for SPARC 2.2

                                            The longer version of this article has list of top ten articles for the last 8 weeks.

                                              Developer
                                              x
                                              Improved Throughput and Response Time of SPARC T4-2
                                              Running a Java EE Application Server Cluster
                                              In a well documented post on how he achieved improved performance on a SPARC T4-2 Server Jeff Taylor explains that, as a result of running a Java EE Application Server Cluster by deploying the cluster members into Oracle Solaris Containers and binding those containers to cores of the SPARC T4 Processor, both throughput and response times improved appreciably. The post includes both "before" and "after" results of tests with and without processor binding.
                                              Sysadmin
                                              x
                                              Don't Overlook the Potential of the Oracle Solaris 11 Service Management Facility
                                              Making Migration Worthwhile

                                              Users still in the throes of migrating to Solaris 11 will find a procedure for migrating from older Oracle Solaris releases ... to the Service Management Facility in Oracle Solaris 11 by Suzanne Zorn a useful tool. Zorn describes how to migrate a service controlled via legacy /etc/rc* scripts written for older Oracle Solaris releases or other UNIX environments to the Service Management Facility (SMF) in Oracle Solaris 11. While, as Zorn writes, Oracle Solaris 11 continues to allow legacy /etc/rc* scripts to start and stop its services, not employing SMF deprives users of its many productive features.

                                              Using Oracle Solaris Zones Physical-to-Virtual (P2V)
                                              Simple, Robust, Flexible Tool for Building an Image, then Migrating from Physical to Virtual Environments

                                              The Physical to Virtual (P2V) feature of Oracle Solaris Zones and its capability for creating and installing a Solaris 10 image built in a physical system and migrating it into a virtualized operating system environment is Orgad Kimchi's subject in an oracle.com post that lists the three steps in the use of P2v:

                                              • Image creation on the source system
                                              • Preparing the target system
                                              • Image installation on the target system

                                              Kimchi devotes the balance of the post to the code samples necessary to creating the image used to distribute the software; ZFS integration; resource management; and DTrace integration.

                                              Trending in
                                              Vol 232, Issue 3
                                              Trending IT Articles