News about Oracle's Solaris and Sun Hardware
System News
Jun 18th, 2012 — Jun 24th, 2012 Generate the Custom HTML Email for this Issue
System News System News for Sun Users
Volume 172, Issue 3 << Previous Issue | Next Issue >>
Sections in this issue:
click to jump to section


Oracle
x
Oracle Q42012 GAAP Total Revenues up 1% to $10.9 billion
FY2012 Cash Flow Grows 23% to $13.7 Billion
In its latest quarterly report Oracle shows growth in Q4 GAAP EPS up 11% TO 69 cents; Q4 NON-GAAP EPS up 10% TO 82 cents. Fiscal Year 2012 operating cash flow was up 23% to $13.7 billion. GAAP total revenues grew 4% to $37.1 billion in FY2012, while non-GAAP total revenues grew 4% to $37.2 billion. GAAP new software license revenues grew 7% to $9.9 billion. Non-GAAP new software license revenues grew 8% to $9.9 billion. GAAP software license updates and product support revenues grew 10% to $16.2 billion; non-GAAP revenues grew 9% to $16.3 billion, the report shows.
SPARC
x
Direct IO Enhancements in OVM Server for SPARC 2.2 (a.k.a LDoms2.2)
Enable Use of Metis-Q and Metis-E Cards

Some enhancements in OVM Server for SPARC 2.2 are reviewed in a post from Raghuram Kothakota, who deals specifically with added support for Metis-Q and Metis-E cards. In Kothakota's view these cards are important because they are the only cards that incorporate both FibreChannel and Ethernet, enabling a user to have both SAN storage and network access with just one card and one PCIe slot assigned to a logical domain. This reduces cost and helps when there are less number of slots in a given platform, the post asserts. Part numbers for both cards are included in the post.

Virtualization
x
VMware Cookbook, Second Edition Released by O'Reilly
Comprehensive Coverage of the Subject
The second edition of Ryan Troy and Matthew Helmke's VMware Cookbook from O'Reilly can aid readers in their use of VMware ESXi in a wide range of network environments. The text covers not only the basics—how to pool resources from hardware servers, computer clusters, networks, and storage, and then distribute them among virtual machines—but also how to overcome the stumbling blocks you’ll encounter when you monitor systems, troubleshoot problems, and deal with security.
IT - Storage
x
Disk Drive Performance Becoming Insufficient
InfoStor June 18, 2012
"The latest crop of nearly SAS enterprise drives (aka enterprise SATA drives) gets between 108 MiB/sec and 132 MiB/sec of performance, while some of the fastest RAID controllers get around 40 GiB/sec. When you do the math on this, you see that the number of disk drives required to sustain this performance equals ..."
Hybrid Drives Already Passé, As SSD Sales Skyrocket
ComputerWorld June 15, 2012
"Hybrid drives, which combine NAND flash with spinning disk, may still be a nascent technology, but their lifespan could be cut short by a lack of interest from consumers and computer manufacturers.

A new report from IHS iSuppli shows that while sales of hybrid drives are expected to double over the next year, that increase is unremarkable compared with sales of pure solid-state drives (SSDs), which are expected to skyrocket 2,660%..."

Big Data Top Storage Challenge for 71% of UK Organisations in 2012
Storage Newsletter June 15, 2012
"Amplidata announced that an independent survey found an average of 71% of organisations surveyed in the UK named big data as their top data storage challenge in 2012.

Concerns were especially high in the retail, distribution & transport sectors, with 84% rating it as their top concern, and in financial services, with 76%..."

IT - Technology
x
Games Companies Play
IT World Canada June 14, 2012
"For most of history, there has been a strict separation between work and play. But just as enterprise technology is becoming more social, it’s also becoming more fun. Today, the software in our workplace is easier to use, more visually appealing and more rewarding. It engages us more and appeals to our competitive instincts. It also encourages us to engage with others..."
    IBM, Fujitsu Top List of the World's 500 Fastest Supercomputers
    eWeek June 18, 2012
    "The United States regained the No. 1 spot on the list of the top 500 fastest supercomputers, thanks to IBM’s massive Sequoia Blue Gene/Q system installed at the Lawrence Livermore National Laboratory. The system hit a maximum performance of 16.32 petaflops, sprinting past last year’s fastest system, Fujitsu’s K Computer, which had a top performance of 10.51 petaflops..."
    Robot and Human Collaboration In Manufacturing
    IT World Canada June 14, 2012
    "MIT researchers have developed an algorithm that they say will enable robots to learn and adapt to humans so they can soon work side-by-side on factory floors.

    Traditionally, robots working in factories are large, imposing and sectioned off in metal cages as they move heavy loads and perform menial, repetitive tasks.

    However, Julie Shah, the Boeing Career Development Assistant Professor of Aeronautics and Astronautics at MIT, said robots can be more than they've been in a manufacturing setting. It's time for robots to begin working more closely with humans, making workers jobs' safer and easier..."

      Free and Open Source S/W
      x
      The Defensive Patent License
      Keeping Patents Out of Court
      Simon Phipps celebrates the introduction of the Defensive Patent License (DPL) by two UC Berkeley Law School professors, Jason Schultz and Jennifer Urban. DPL was developed to counter what Phipps describes as the commoditization of patents by the venture capital industry, which enabled investors to capitalize on salable patents of a failed enterprise. DPL requires that a company agree never to use patents offensively against other signatories of the DPL, thereby rendering all patents owned by all DPL signatories "de-weaponized," as Phipps puts it. Key to the success of this proposal is the breadth of adoption by patent owners.
      Solaris
      x
      Summary of the Solaris 11 Webcast's Livechat Q&A session
      Post Selects Most Relevant, Most Frequently Asked Questions

      The recent webcast on what's new in Solaris 11 since the launch featured a Q&A session that has been edited and summarized in a post by Karoly Vegh, who has selected the most relevant and most frequently asked questions and includes them and the answers delivered. This post is the first part, covering the Q&A of Session I and II of the webcast. If sufficient requests are made for a look at the rest of the sessions, Vegh suggests they will be provided in a subsequent post.

      MySQL
      x
      MySQL Enterprise Backup v3.7.0
      New Feature Makes Backup Easier, Faster

      MySQL Enterprise Backup v3.7.0 (MEB 3.7.0 has made backing up the solution less difficult to manage, Sagar Jauhari blogs. In MEB 3.7.1 the option '-incremental-base' has been extended to allow the user to take an incremental backup as easily as possible using the '–incremental-base' option. With the new option MEB queries the backup_history table for the last successful backup and uses its end LSN as the start LSN for the new incremental backup. "Apart from ease of usability an important advantage of this option is that the user can do repeated incremental backups without changing the command line," he adds.

      Cloud Computing
      x
      Building Private IaaS with SPARC and Oracle Solaris
      Optimization with Oracle Optimized Solution for Enterprise Cloud Infrastructure
      The post "Building Private IaaS with SPARC and Oracle Solaris" comments briefly on the benefits of Oracle Optimized Solution for Enterprise Cloud Infrastructure in combination with SPARC T-series servers and Oracle Solaris, which can deliver reductions of up to 81% in TCO, increases in system utilization of up to 80%, and reductions of deployment costs of up to 50% over a five year period when compared to the competition.
      IT - Cloud
      x
      Cloud Computing Vendor Lock-In: Avoiding Security Pitfalls
      Search Cloud Security June 20, 2012
      "Most of us already know from personal experience that changing from one service provider to another can be challenging. Think about, for example, the level of frustration you may have experienced in the past changing your telephone company, Internet provider or cell phone service. The process of ending a service provider relationship is always likely to be rockier than other interactions you have with them -- that's a natural consequence of business dynamics..."
        5 Ways the Public Cloud Can Go Wrong for DOD Agencies
        GCN June 18, 2012
        "Governments around the world are taking a leap into the cloud. New deployments are popping up every day, in large part because the cloud model has the potential to help agencies save on infrastructure and storage costs, pay “on-demand” for the services they use and access computing resources from any location.

        But listing the benefits is easy. The real challenge is evaluating whether a cloud solution can provide these advantages while still meeting the unique privacy, security and compliance needs of large and complex government agencies..."

        Cloud Outage Fears Slow Global Cloud Adoption, Survey Says
        Search Cloud Provider June 20, 2012
        "Cloud service outages never fail to make headlines, and this feeds the fears of potential customers. Cloud outage and cloud performance concerns can drive away customers who demand stability and end-to-end availability for important data and applications.

        Enterprises are starting to perceive local network carriers and smaller, local cloud providers as more reliable than large, pure-play cloud providers..."

        EU Data Laws Are Latest Threat to Cloud
        IT World June 13, 2012
        "European data-sovereignty laws requiring international companies to keep data on customers in the customer's own country are not only causing headaches for database managers, they're holding back adoption of cloud computing in many large companies according to a story in GigaOm yesterday.

        Corporate IT managers have been wary of European data-privacy laws since the early 2000s, when requirements designed to limit the degree to which corporations could move or exploit the personal data of customers came into vogue on the Continent..."

        IT - CxO
        x
        5 Tips for Creating Scalable Leadership
        Forbes June 21, 2012
        "I’ve often said, “if leadership doesn’t scale neither will your organization.” Experience has led me to conclude there is no greater contribution a leader can make to the enterprise than developing a true culture of leadership. Here’s the thing – a culture of leadership can only exist when leaders understand their primary obligation is to develop other leaders. If leadership is sought after, valued, developed and rewarded, then good things will happen. In today’s column I’ll examine the value of creating a culture of leadership..."
          Chief Data Officer's Role Growing in Importance
          Wall Street Technology June 18, 2012
          "Over 60 percent of financial services firms are actively working towards creating specialized data stewards, and eventually Chief Data Officers, for their enterprise, according to survey results released by GoldenSource, an enterprise data management (EDM) technology provider..."
          CIOs Should Fear the IP Police ... Have Your Get-Out-Of-Jail Files Ready
          The Register June 20, 2012
          "Opinion: The powers that be in the copyright world continually push for ever-stricter copyright with longer terms. They seek to externalise the cost of enforcement onto society at large. Society at large, on the other hand, wants easier, quicker access to content with fewer restrictions. Regular businesses can easily be caught in the crossfire. shutterstock_must credit and link

          Copyright theft has become so habitual that it has become socially acceptable. Image via Shutterstock

          A big problem with copyright infringement is that in many regions, general social acceptance of copyright is completely out of alignment with the current legal landscape. In many ways, it is no different than the many and varied other Wars On Stuff which have sought to fundamentally change society's habits, preferences and beliefs..."

            What I Learned When I Left Security
            CSO Online June 4, 2012
            "Much has been said about the great divide that keeps business leaders from truly understanding the perspective of security professionals. One way CSOs can close that gap is to simply cross to the other side.

            We found four professionals who did just that, including three former CSOs who now hold other business roles and one former security journalist who is an editor at the renowned business publication Harvard Business Review.

            They shared with us their new perspectives on how they view security and risk management from across the chasm..."

            vBeers-SF
            x
            vBeers  South Florida: MurphyÂs@Hard Rock, Hollywood
            Wednesday, June 27th, 2012
            Join us for the next South Florida vBeers!

            Meet with local Virtualization enthusiasts and talk about technology, theory, politics of the industry or whatever else gets your propeller spinning.

            This is a great opportunity to meet with other virtualization enthusiasts and professionals and enjoy discussing all things virtualization, and in fact anything else that comes up in conversation.

            This vBeers event is sponsored by Nexenta Systems. Come meet the new South East regional manager for Nexenta, Adam Wick. Find out why the register says, “Exabyte era nigh for Nexenta”

            Location: Murphy’s Law Irish Bar

            Address: 1 Seminole Way, Hollywood, FL 33314 USA

            Date:Wednesday, June 27th

            Time: 6pm to 9pm — arrive and depart any time

            Free parking. Enter parking from State Rd 7. Park as far to the west as you can. Elevators will drop you off right next to Murphy’s.

            IT - DR
            x
            Wells Fargo Incident Manager on the Keys to Business Continuity
            Emergency Management June 11, 2012
            "Chris Terzich is the vice president of incident management for Wells Fargo and chair at the Regional Consortium Coordinating Council. He is a past president of the InfraGard Minnesota Members Alliance. Terzich founded the Minnesota Information Sharing and Analysis Center to develop homeland security relationships. He has worked in a number of capacities for Wells Fargo, including executive protection and robbery training. Terzich has provided response and management for myriad events, including a visit by former British Prime Minister Margaret Thatcher..."
            IT - Networks
            x
            8 No Cost/Low Cost Tools for Deploying 802.1X Security
            NetworkWorld June 11, 2012
            "Implementing and supporting 802.1X authentication on your network can be a challenge, but here are some tools that can help."

            • FreeRADIUS server
            • TekRADIUS
            • ClearBox
            • Elektron
            • AuthenticateMyWiFi
            • SU1x
            • XpressConnect
            • ClearPass QuickConnect

            Read on ...

              IT - Operations
              x
              20 IT Gotchas: How to Avoid These Common Big Blunders
              InfoWorldJune 18, 2912
              "Cost overruns, missed deadlines, lost jobs -- we all like to think we learn from mistakes, whether our own or others'. While the technical landscape advances quickly, one thing remains the same: IT's capacity to fall prey to misguided practices, given the complexity of the responsibilities involved.

              So in the spirit of "forewarned is forearmed," we bring you 20 mistakes IT managers would do well to avoid. Names have been changed to protect the guilty, but the lessons learned are plain to see. Don't get caught in these all-too-common blunders..."

                Green IT Enables a Thriving Technology Center
                Baseline June 14, 2012
                "Meeting the demands of a growing and thriving technology center requires a strong, efficient and agile IT foundation. Once a small suburb of Seattle, Bellevue is now the fifth largest city in Washington state, with a population of more than 122,000, and it has been called one of the most livable cities in America. Incorporated in 1953, Bellevue is a high-tech hub that delivers content-rich services to its citizens—from online access to permitting processes to video capture for community events to an online traffic-flow map—driving the need for a robust technology infrastructure..."
                Olympic Park Set To House Giant Government Datacenter
                v3 co uk June 12, 2012
                "The Olympic Park could become home to a massive datacentre as part of a government consolidation project, which could save taxpayers millions by providing a shared service for all 33 London boroughs.

                Geoff Connell, currently the joint head of ICT at the London boroughs of Newham and Havering, was appointed to lead the datacentre consolidation project for London around two weeks ago..."

                  IT - Security
                  x
                  BYOD: The Great Small Biz Security Headache
                  Channel Register June 18, 2012
                  "After surveying more than 1600 IT professionals late last year, the analyst firm Freeform Dynamics concluded that the consumerisation of IT is a real thing, and it is not just down to those pesky young people and their shiny iPads.

                  Company founder Dale Vile says the trend is driven not just by the so-called digital natives, but by more senior staff who have the disposable income to afford cool devices, and the seniority to override rules and use them at work if they want to..."

                    Defenders Take the Offensive
                    Dark Reading June 15, 2012
                    "Talk to any penetration tester who has been at the job for a few years, and he will tell you that breaking in is easy -- it is the defense against today's burgeoning threat landscape where you'll find the real difficulty. Why? It's simple. From the attackers' perspective, they only have to be successful with one exploit, and they are in. Defenders, on the other hand, have to get it right every time, which is why layered defense and planning for failure has become necessities for keeping data secure..."
                      Do As I Say, Not As I Do...
                      Continuity Central June 21, 2012
                      "Could you bring your company to its knees?

                      There’s a saying ‘do as I say, not as I do’ which seems to resonate in the executive corridor of far too many organizations. In this cautionary tale, we use the saying to create a fictitious scenario. This is created to illustrate just how dangerous double standards can be. Our unfortunate protagonist is the managing director, who believes the rules don’t apply to them..."

                        Older Means Wiser To Computer Security
                        HelpNet Security June 21, 2012
                        "A new Dimensional Research and ZoneAlarm report found that 18 – 25s are more confident in their security knowledge than 56 – 65s, but have experienced more security issues in the past two years compared to older users.

                        78% of 18 – 25s respondents do not follow security best practices, while cybercriminals are launching new and more sophisticated attacks on consumers. In comparison, 56 – 65s are more concerned about security and privacy and are twice as likely to protect their computers with additional security software..."

                        Password Security: 11 Common Sense Steps That Help Protect Personal Data
                        eWeek June 19, 2012
                        "June has been a bad month for data breaches, and the month is only half over. Over the last two weeks or so, the industry has seen the business social networking site LinkedIn get hacked and some 6.45 million hashed but unsalted passwords posted on a Russian Web forum. Soon after, the online dating site eHarmony suffered a similar incident, with about 1.5 passwords stolen and posted on a similar Web forum. Streaming music site last.FM reported another incident in which 2.5 million passwords were put at risk..."
                          Security: An Inconvenient Truth
                          NetworkWorld June 19, 2012
                          "One of the things I dislike about being a security person is the stigma that "we are the people who say no or make it harder than it has to be." For many people, the security team is composed of people who just seem to live to make it harder. We don't let them use wireless, surf websites they want to go to, engage in social media activities, install applications, change their passwords, etc. etc. I get it. No one wants to be told what to do and sometimes the reasons we do things may not be readily apparent to everyone. But just because security is inconvenient sometimes is not a reason to scrap it. On the other hand, not all security has to inconvenient. There is a balance to be struck..."
                          Security Threats Loom Even for Cloud-Free Businesses
                          CIO Insight June 15, 2012
                          "The COO of the Cloud Security Alliance warned attendees of a cloud computing conference that businesses are mistaken if they say they don t use the cloud because individual employees may be doing it on their own...

                          There's a lot that businesses still have to ask their cloud service providers before signing up for service, especially about how secure their cloud environment is, the chief operations officer of the Cloud Security Alliance said at a cloud conference here..."

                          IT - Careers
                          x
                          The Next Consumerization Revolution: Your Personal Data
                          InfoWorld June 15, 2012
                          "Privacy groups want to lock away your personal data. A better option is to let you sell it for what it's really worth...

                          When Facebook's much-vaunted IPO fell flat a couple weeks ago, conventional wisdom said the dot-commers' belief that almost any online business can make billions through advertising was not a realistic business model after all. Advertising fees online trail those of other media, and multiple studies show that when people are engaged in social networks, they tune out ads precisely because they are so focused on their interactions..."

                            Techies Should Enter, Influence Government
                            IT World Canada June 14, 2012
                            "Renowned security expert and hacker Edward Felten's time as the first chief technologist of the U.S. Federal Trade Commission has been "highly educational," he said at a USENIX conference keynote address in Boston Tuesday, urging fellow computer scientists to follow in his footsteps.

                            Technologists should seek out government posts because it gives them the opportunity to affect public policy, which often affects their jobs, Felten said..."

                            Would You Recommend Your Kid Go Into IT?
                            InfoWorld June 18, 2012
                            "The era of the tech hero died with the dot-com bust, but an IT career can still be rewarding, especially if you learn your way around the business side ...

                            Yesterday was Father's Day, so I found myself wondering what I'd say to my son if he asked me whether he should go into IT.

                            Now, obviously, I'm going to be supportive about almost any legal activity he really wants to pursue. But say he was in college, on the fence, and asking my advice (not necessarily a realistic assumption). What would I reply?..."

                              Your Inconvenience Powers High-Tech Profits
                              InfoWorld June 18, 2012
                              "A few weeks ago, I wrote about how the U.S. government gets the highest of high technology when it suits it, but somehow still can't figure out how to procure accurate and reliable voting machines to further the cause of democracy. Clearly, there are no technological hurdles here, just skewed priorities.

                              But the government isn't alone in neglecting the interests of its constituents -- so do many high-tech companies. They don't bother to hide it, either. It's as plain as their stock ticker symbol..."

                                IT - Compliance
                                x
                                The Compliance Officer's Dirty Little Secret
                                Dark Reading June 18, 2012
                                "At many organizations, chief compliance officers (CCOs) conclude the price of achieving compliance is more than the expense of a regulatory fine. So they roll the dice, attempting to save money by forgoing serious compliance efforts, thinking they’ll simply absorb the fines for noncompliance if they're ever caught. Unfortunately, that gamble is made on flawed assumptions: Most of these initial calculations are based on numbers that don't figure in the long tail of cost incurred from noncompliance and data breaches.

                                This faulty calculation is the dirty little secret of today's typical CCO, says Bob Janacek, CTO at cloud-based information delivery company DataMotion..."

                                  You Want the Cloud? You Can't Have Proper Copyright, Then
                                  The Register June 20, 2012
                                  "UK law makers and the judiciary should take note of new research that has claimed that a narrow reading of copyright law exceptions can result in an erosion of investment in new technologies, an expert has said.

                                  Harvard Business School Professor Josh Lerner has published a new report (32-page/300KB PDF) that claims that venture capital investment in cloud computing companies in France and Germany has fallen in relation to elsewhere in the EU as a result of court judgments on copyright issues in those countries..."

                                  Ironman and Captain America Fight Over Compliance
                                  Dark Reading June 18, 2012
                                  "The big movie hit this year, "Marvel's The Avengers," is a fun, action-packed film. As most of you know, The Avengers are an ensemble cast of superheroes brought together to save the world when all else has failed.

                                  A strength of this movie is the time it spends watching these superheroes as they work out their differences and learn how to work together. The movie is more a story about people, egos, and relationships than about heroes and alien attackers. How do we see ourselves? Who is important and why? Why should we work together instead of alone? ..."

                                    OpenStorage
                                    x
                                    IDC WW Storage Software Revenue Increased Only 3% Y/Y in 1Q12
                                    Slower Rate of Growth than any Time in Last Two Years
                                    As reported in the Storage.com Newsletter, results of the International Data Corporation Worldwide Storage Software QView reveal a slower rate of growth in the storage software market than at any time in the last two years. Revenue during 1Q12 increased 3.3% year over year to $3.5 billion, the survey further shows. EMC, IBM, and Symantec were once again the top ranking storage software suppliers with 24%, 15.7%, and 14.8% market shares, respectively, and data protection and recovery and archiving software were the two fastest growing sub-markets with year-over-year growth rates of 5.5% and 5.0% respectively.
                                    IT - Mobile
                                    x
                                    Mobile Security: The Old Ways Don't Cut It
                                    GCN June 19, 2012
                                    "Establishing a viable and secure mobile device program is about the details: creating the infrastructure and the policies necessary to issue and deploy handhelds and apps — and realizing that mobile security is a different game than traditional network security.

                                    A key place to start is with setting policies, said Jon Oltsik, senior principal analyst of the Enterprise Security Group (ESG), said at an online session with industry experts June 14. Security is an important part of this process because organizations need to think about users, groups, rules and responsibilities..."

                                    Security Tips To Combat Mobile Device Threats to Healthcare
                                    HelpNet Security June 14, 2012
                                    "Mobile devices are increasingly exposing protected health information (PHI) in the healthcare space, with threat risks growing, according to the Department of Homeland Security...

                                    Mobile devices pose significant risks for privacy incidents for healthcare organizations, providers and entities responsible for safeguarding protected health information (PHI) under Federal HITECH and HIPAA regulations..."

                                    IT - Big Data
                                    x
                                    The Big Data Challenge: How to Develop a Winning Strategy
                                    CIO June 14, 2012
                                    "Developing a winning Big Data strategy is challenging because it is as much about getting ahead of the trend and acquiring talent as it is about investing in new technology. To be successful you will need Data Scientists on your team, professionals who are adept with the analytical and visualization tools required to process and recognize patterns in data and who are equally comfortable with business concepts and operations. EMC's Howard Elias recommends three steps to help ensure your organization has the people it needs..."
                                    IT - BYOD
                                    x
                                    BYOD Is Top Concern for Enterprise Mobile Security: Gartner Survey
                                    InformationWeek June 15, 2012
                                    "According to the survey, the top security issues are use of privately owned devices and deployment of new enterprise mobile platforms ...

                                    The rapid proliferation of consumer mobile devices is changing the traditional IT environment in enterprises, as 90 percent of enterprises have already deployed mobile devices, with smartphones being most widely deployed, according to a survey by Gartner. Eighty-six percent of enterprises surveyed said that they plan to deploy media tablets this year..."

                                    BYOD: It's Time to Throw Out the Rule Book
                                    Continuity Central June 13, 2012
                                    "Employees have differing views when it comes to what they like - not everyone wants a Volkswagen Golf, and many company car schemes take this into consideration. As a concept it works fantastically – instead of having a pool of company owned cars, employees are given an allowance to offset against their own vehicle. Genius!..."
                                      Young Employees Say BYOD A 'Right' Not 'Privilege'
                                      NetworkWorld June 19, 2012
                                      "A survey that asked thousands of young "20-something" workers their attitudes about bring-your-own-device"policies found slightly more than half view it as their "right" to use their own mobile devices at work, rather than BYOD being just a "privilege."

                                      Fortinet, which sponsored the survey, says it decided to focus the BYOD-related questions specifically on college-educated employees between the ages of 20 and 29 because this younger segment -- the future of the workforce -- is digitally savvy, and their first phone may be a smartphone..."

                                      Top10
                                      x
                                      Top Ten Articles for last few Issues
                                      Vol 172 Issues 1 and 2; Vol 171 Issues 1, 2, 3, 4 and 5; Vol 170 Issues 3 and 4
                                      We track how frequently each article is viewed on the web site to determine which the readers consider the most important. For last week, the top 10 articles were:

                                      • Networking in VirtualBox: An 11-Step Procedure
                                      • Virtualization at Oracle - Six Part Series
                                      • Three Recommended Methods for Moving Files Between Unix and Windows Systems
                                      • Procedure for Setting Up a Load-Balanced Application Across Two Oracle Solaris Zones
                                      • Jumpstart Enterprise Toolkit 4.9.4 Now Available for Download on OTN
                                      • Samsung to Join Linux Foundation
                                      • What is DevOps? Infrastructure as code
                                      • Oracle Enterprise Manager 12 c
                                      • Big Data Needs Strong Analytics, Says Mark Hurd
                                      • Java Spotlight Episode 86: Tony Printezis on Garbage Collection

                                      The longer version of this article has list of top ten articles for the last 8 weeks.

                                        IT - Server
                                        x
                                        How to Restrict Developers' Admin Rights
                                        InfoWorld June 18, 2012
                                        "Security must dial down the number of people with system administrator rights -- including developers, even if their productivity suffers ...

                                        Almost every customer I deal with has unhappy developers who feel constrained. Not only are they being forced to develop applications in which users will not always have admin rights, but the dastardly system administrators aren't letting developers run with full administrator rights all the time, either..."

                                        Top 5 Reasons to Use Load Balancers
                                        Enterprise Systems June 18, 2012
                                        "You might ask why it is necessary to use load balancers as part of your business at all. Surely if you are concerned about content servers being overloaded, just get bigger servers. That should solve the problem, shouldn't it?

                                        Load balancers play a vital role in any organization where server uptime, client and staff connectivity, and performance are considered essential. Here are five reasons you need to use a load balancer in your enterprise..."

                                        IT - Tape
                                        x
                                        10 Reasons Tape Storage Is Better Than Disk
                                        InfoStor June 15, 2012
                                        "Far from sitting back as their name is smeared in the mud by disk-based rivals, tape companies have adopted an aggressive slant to set the record straight on the technology's value proposition. Tape storage providers such as BDT, Crossroads Systems, FujiFilm, HP, IBM, Imation, Iron Mountain, Oracle, Overland Storage, Quantum, Spectra Logic and Tandberg Data are banding together with a message that has morphed from "tape isn't so bad" to "tape is better than disk."

                                        Here are the top 10 reasons tape not only isn't dead, but is thriving, and it might even be better than disk -- in certain instances, of course..."

                                        Developer
                                        x
                                        Survey says: Java Technology the Top Developer Choice in Eclipse Survey at 79%
                                        C/C++ is Second but at only 7%
                                        Seventy-six percent of the respondents to the Eclipse Open Source Developer Report and Survey for 2012 claimed Java as the programing language they used most in development. Coming second was C/C++ with a mere seven percent, a pretty clear margin of victory for Java, says Hinkmond Wong in his blog.
                                        Sysadmin
                                        x
                                        z/Scope Anywhere v7.0 Delivers Secure Web Access to IBM Mainframes, AS/400, and Unix Systems
                                        Cybele Software's Cross-Device, Cross-OS Terminal Emulator Connects Through any Browser, OS or Device
                                        WSJ's Market Watch announces the Beta release of z/Scope Anywhere v7.0 that provides secure access to IBM Mainframes, AS/400, and UNIX systems through any browser, operating system, or device. This new cross-device, cross-OS terminal emulator from Cybele Software Inc. enables HTML5-based terminal emulation, providing secure host access from any OS or device, including PCs, MACs, Chromebooks, smart phones, and tablets, Market Watch reports. Because z/Scope Anywhere is a pure HTML5/Javascript client there is no ActiveX or Java applet to install, making z/Scope Anywhere native-firewall friendly.
                                        Trending in
                                        Vol 234, Issue 2
                                        Trending IT Articles