News about Oracle's Solaris and Sun Hardware
System News
Jul 16th, 2012 — Jul 22nd, 2012 Generate the Custom HTML Email for this Issue
System News System News for Sun Users
Volume 173, Issue 3 << Previous Issue | Next Issue >>
Sections in this issue:
click to jump to section

Oracle Study Finds Organizations Swamped by Data
Experiencing Difficulty in Turning Data into Profit
In preparing the Oracle report "From Overload to Impact: An Industry Scorecard on Big Data Business Challenges" 333 C-level executives from U.S. and Canadian enterprises spanning 11 industries were surveyed about the difficulties they face in managing the data coming into their organizations and how well they are using that information to drive profit and growth. The volume of data gathered has increased over the past two years by some 86 percent in the experience of more than 90 percent of respondents. Most also report lacking both the infrastructure and management support to translate these data into profit centers.
Oracle Exadata Database Machine X2-8 Speeds Up Neuralitic Systems Processes by a Factor of 3x
Improves Compression Rate and Scalability by 10x
Neuralitic Systems Inc. of Montreal, Canada, is a leading provider of mobile data intelligence solutions that help mobile operators unlock the value of their data to understand subscriber behaviors. SevenFlow, Neuralitic’s flagship product, turns massive amounts of unstructured data into compact and usable data sets, ready for use by multiple applications. Neuralitic deployed Oracle Exadata Database Machine X2-8 Full Rack to support SevenFlow, which collects data and batch loads it every 15 minutes and then aggregates it nightly. Oracle Exadata Database Machine enabled SevenFlow to gain 3-times faster processing time and improve its compression rate and scalability by 10 times.
Best Practices to Accelerate Oracle VM Server Deployments
Top 10 Best Practices
Learn about the top 10 tips to accelerate Oracle VM server deployments from the session replay of the July 11, 2012, webcast. With the focus on Oracle VM Server on SPARC, the recording addresses recommended practices for installation, maintenance, performance, and reliability. Topics include sizing, resource allocation, multiple I/O domain configurations for availability, secure live migration, selection of I/O backends, and I/O virtualization. Honglin Su, Director of Product Management, Oracle VM, Oracle, and Greg King, Senior Best Practices Consultant, Oracle VM Product Management conduct the hour long webcast.
IT - Storage
10 File-Sharing Options: Dropbox, Google Drive and More
ComputerWorld July 13, 2012
"Remember the first time you tried to send a 4GB video file as an email attachment? Anybody who has tried to share a large file with a friend or colleague understands all too well to the problems that are involved. Email attachments can get rejected, especially if you don't know what the upper limit on a file size is for sender or recipient. Uploads and downloads can be arbitrarily slow. And the clunkiness of the whole process makes it hard to get real work done..."
    Java Technology
    Java Spotlight Episode 90: Mike Duigou on Project Lambda
    Dalibor Topic Joins Java All Star Developer Panel
    Java Spotlight Episode 90 features Mike Duigou, a developer on the Oracle Java Core Libraries team, for a discussion of Project Lambda. Duigou's work is focused on collections and parallelism, as well as on libraries for lambda. He also collaborates on an autonomous automotive racing project with researchers at Audi and Stanford. He has previously worked on projects at Oracle and Sun for industrial automation with Java Realtime, e-commerce web services, dancing robots, peer to peer and Java operating systems. Dalibor Topic, Java Free and Open Source Software Ambassador, assumes his regular place on the Java All Star Developer Panel.
    IT - Technology
    9 Itsy-Bitsy, Teeny-Weenie Computers
    NetworkWorld July 11, 2012
    "There’s a 'tiny' revolution unfolding in the personal computer industry led by the Raspberry Pi, which has become so popular that it’s difficult to buy one right now. The idea of small computers is being driven by hardware hackers and hobbyists. Here are eight products, and a project in development, that are leading the effort to make PCs small enough to slip into your pocket..."
      Higgs Boson Discovery: Why It's Important to All of Us
      eWeek July 5, 2012
      "It's impossible to overstate the importance of the Higgs Boson, the discovery of which was announced at CERN (Conseil Européen pour la Recherche Nucléaire). Without this particle, you wouldn't exist. For that matter, the universe wouldn’t exist. That’s because the Higgs Boson creates a field that gives other particles mass, giving weight and shape to all the matter we see in the universe ..."
      Solaris 11 and Enterprise Manager Ops Center
      Engineered Systems Approach Leads to Symbiotic Combination

      Join Bill Nesheim, Markus Flierl, and Steve Wilson for a discussion of Solaris 11 and Enterprise Manager Ops Center 12c, which covers new developments in both solutions, and includes how to handle new Solaris 11 provisioning and patching features, as well as some details on what is happening with Solaris virtualization, such as OVM for SPARC.

      Some Better Disk Backend Choices
      What's Up with LDoms, Part 3
      In "What's Up with LDoms,Part 3" Stefan Hinker looks at disk backend choices, reminding readers that, in his earlier postings, he had used a ZFS volume as a backend for the boot disk of mars. In this segment, Hinker examines some of the other ways to store the data of virtual disks. These include physical LUNs, in any variant that the Control Domain supports, including SAN, iSCSI, SAS, and the internal disks of the host system; Logical Volumes like ZFS Volumes, but also SVM or VxVM; Regular Files, which can be stored in any filesystem accessible by the LDoms subsystem.
      ElectraCard Services Runs Oracle Exadata on Oracle Linux
      Ups TPX to 12,000 per Second, Improves Performance by 2x
      ElectraCard Services provides real-time, third-party credit, debit, prepaid, and smart card processing services in the U.S. and more than 30 other countries. One of the company's workshorse solutions is electraSWITCH, which processes ATMs, point-of-sale, internet, and cell phone banking transactions as either “on-us” transactions or “switching mode” transactions, where foreign transactions must be sent to electronic fund transfer networks for authorization. ElectraCard Services ported its electraSWITCH solution on Oracle Exadata Database Machine X2-2, Oracle Exalogic Elastic Cloud X2-2, and Oracle Linux, achieving processing speeds of more than 12,000 transactions per second (TPS) and a twofold improvement in performance.
      Tips for Hardening an Oracle Linux Server
      'Secure by Default' Can Be Improved Upon
      A recent article on the "secure by default" attributes of Oracle Linux explores a variety of those defaults and administrative approaches that help to minimize vulnerabilities. While Oracle Linux is configured out of the box with settings and utilities that make it "secure by default," authors Lenz Grimmer and James Moreris give system administrators some additional strategies to consider:

      • Minimize software and services
      • Tighten networking configuration and user access points
      • Safeguard applications and data by setting up devices, mounts, encryption, and file systems appropriately
      • Implement security features that enforce policies
      • Follow appropriate operational procedures
      IT - Cloud
      3 More Evils That Threaten Cloud Computing
      InfoWorld July 13, 2012
      "There's a lot of good in cloud adoption, which is why I've railed against problems that threaten to kill cloud computing. This summer, three more problems have surfaced that are raising my blood pressure -- and threatening the cloud...

      Two sins are self-inflicted by the cloud providers, while the third is an evil spawned by regulators ..."

      A Hard Rain's Gonna Fall on Cloud Services
      Internet Evolution July 9, 2012
      "The massive power outages and widespread service interruptions for cloud customers recently drove home an unpleasant lesson for cloud proponents and the Internet in general: The security and reliability of the cloud is what lawyers call a "rebuttable presumption." In other words, as the old song says, 'It ain't necessarily so.'

      This was driven home at the end of June, when storms took out part of Amazon's Datacenter East complex in Ashburn, Va ..."

      Cloud Computing Is Not IT's Enemy
      InfoWorld July 18, 2012
      "Once again, IT is going away or becoming less important or being relegated to nonstrategic support responsibilities or something. We've heard this tune for decades. It might really happen this time, though -- a consequence not of the cloud or BYOD or any of the usual suspects, but of so many companies being seriously sick.

      It's probably true that CIOs have to take IT to the next level or have it fall to a lower one. What is the next level? ..."

      Ten Critical Questions to Ask Your Cloud Provider
      IT Business Edge July 19, 2012
      "There is no question that businesses can benefit from moving data to the cloud. The cloud is elastic and efficient. It can improve user productivity and unburden IT staff, saving time and money. It can accommodate anything from simple file sharing to mission-critical data backup. The question is, just how secure is your cloud? And how do you know? ..."
      IT - CxO
      BYOD Has Americans Working Overtime
      Baseline July 18, 2012
      "Answering work-related phone calls and emails from home is eating into the off-hours of the average American, according to a recent survey by mobile security software vendor Good Technology. In fact, we're putting in close to 30 hours of extra work each month, the survey found. The line between work and personal time is growing increasingly fuzzy, and it's not without consequences..."
      CEO Confidence Shows Sharp Decline
      CIO Insight July 12, 2012
      "Has your CEO lost his swagger? Chances are he or she is not alone. The confidence level of many CEOs has taken a plunge in recent months, according to the latest report from The Conference Board. In The Conference Board Measure of CEO Confidence, overall chief executive confidence has taken a double-digit dive, and the current index has slipped under the 50-mark, indicating a trend toward pessimism..."
        Lockheed's 5 Principles for A Stronger Workforce
        Washington Technology July 12, 2012
        "We recently conducted outside perception research among a select group of our government customers.

        Our goal was to gain a deeper and better understanding about what is currently most important to them as government leaders, how to better serve their needs, and how they rank their priorities when hiring a contractor..."

          Ten Ways to Motivate Workers
          Baseline July 17, 2012
          "We recently reported on the challenges companies are facing in keeping employees happy, motivated and engaged at work. As for solutions, look beyond empty words of praise and birthday-cake celebrations for employees. Instead, help your team members recognize the inherent worth of their roles and how they contribute to organizational excellence..."
            The Problem's Not the Staff, It's The Bozos In Charge
            TechRepublic July 17, 2012
            "Evidence is mounting that technologically illiterate managers are causing more damage to corporate productivity than a shortage of IT skills among staff...

            Lacklustre IT skills among staff are often blamed for hampering corporate productivity but evidence is mounting that managers who are clueless about tech are causing greater damage...

            US firms are using IT to boost their productivity more effectively than UK companies, according to studies cited by the recent Technology Insights 2012 report by IT industry skills body e-skills UK..."

              The Rise of the IT Business Analyst
              IT World Canada July 12, 2012
              "Is it Revenge of the Suits? Business analyst is one of the hottest jobs in IT right now. Find out why everyone wants someone who can put the pieces together...

              The hottest job in IT right now might be the least "T" of them all: business analyst.

              Tech purists may shudder -- is it the revenge of the suits? -- but 23 per cent of the IT executive respondents to Computerworld's Forecast 2012 survey said they planned to hire for business analytics skills in the next 12 months, up from 13 per cent in the previous year's survey..."

              Why IT Outsourcing Often Fails
              InformationWeek July 13, 2012
              "While the general trend of more IT outsourcing (via smaller, more focused deals) continues, these engagements remain difficult to navigate. Every large IT shop that I have turned around had significant problems caused or made worse by the outsourcing arrangement, particularly large deals..."
                IT - DR
                How to Build a Data Protection Plan That Ensures Application Recovery
                CIO July 10, 2012
                "The availability of services and applications to employees and customers is more critical than ever before, but many organizations still focus their data protection objectives on data and servers rather than applications.

                A new survey of more than 200 IT professionals in North America by Quest Software reports that 73% of organizations now rank restoring critical applications alongside recovering lost data as their top backup and recovery concern..."

                  IT - Networks
                  How Internet Metering Changes Everything
                  InfoWorld July 16, 2012
                  "Bigger, better, faster, more -- those have been the main tenets of networking since the first IMP (Interface Message Processor) spat out the first packet. Just look how far we've come: from the text-centric 9600-baud UUCP connections through 10Base-2 and 10Base-T Ethernet through switched 100Mbit, gigabit, 10G, 40G, and 100G. The bandwidth limitations of fiber optics have yet to be determined, and last year, research teams cracked 100 terabits in the lab..."
                    IPv6 and Click Fraud
                    HelpNet Security July 17, 2012
                    "The good news: To accommodate the ever-increasing demand for IP Addresses around the world, every network will eventually transition to IPv6 from IPv4.

                    The bad news: Spammers are already spoofing IPv6 addresses because it is easy for them to bypass mail spam filters and launch phishing attacks on a new protocol..."

                      UK Networks Sag Under Weight of Mobile Data
                      TechWorld July 18, 2012
                      "Tablet ownership in the UK has jumped from 2% to 11% in 12 months, while every two in five adults now owns a smartphone, putting massive pressure on mobile networks.

                      According to Ofcom's latest annual Communications Market Report, almost half (42%) of users claim their smartphone is the most important device for accessing the internet, with 42% of these regularly using social networking sites and 51% using email..."

                        IT - Operations
                        The Next-Generation Data Center: What's Inside?
                        GCN July 19, 2012
                        "The Internet is dotted with stories about cool, futuristic data center designs. There are photos of thatch-covered roofs and walls that reduce cooling costs, diagrams of modular enclosures that make it easy to add space to a data center (and take it away), and aerial photos of data centers covered with solar panels. However, these design features, while exciting and innovative, are outliers..."
                          IT - Security
                          Money Transfers, Creative Scammers, and Fraud
                          CSO Online July 12, 2012
                          "In Fitness for Geeks: Real Science, Great Nutrition, and Good Health, author Bruce Perry writes of Tabata sprints, an ultra-intense exercise that has dramatic benefits. But however effective they may be, even Izumi Tabata himself felt that given their difficulty, only the most serious athletes would use them.

                          When it comes to information security, security awareness is often viewed as the lynchpin that, if done appropriately, can obviate myriad security and privacy concerns. If it were only so easy..."

                          Secure or Not? 10 Spot Checks Will Tell You
                          InfoWorld July 17, 2012
                          "I don't know about you, but I can tell in about a minute how much someone I've just met knows about computers, networks, and security. It's in what they say, how they respond, and what they think about particular subjects. I bet most of you can do the same. And like me, I bet you've found these first impressions to be surprisingly accurate.

                          The same snap judgement occurs when I'm asked to perform a thorough security survey of a network or company..."

                          Ten Basic Steps To Secure Your PC And Online Accounts
                          ZDNet July 12, 2012
                          "The explosion of malware attacks and high-profile password and data breaches serve as confirmation that resourceful hackers are determined to break into your computer and online accounts. It's time to pay attention to these issues and follow some basic steps to stay secure while using your PC and surfing the web..."
                            The Worst Security Snafus of 2012 - So Far
                            NetworkWorld July 13, 2012
                            "Could things really be this bad? From the embarrassing hack of a conversation between the FBI and Scotland Yard to a plethora of data breaches, security snafus have ruled the first half of 2012. Here's a look at some of the worst snafus month-by-month..."
                            When Employees Leave So Does Your Data
                            HelpNet Security July 19, 2012
                            "One in three (32%) employees have taken or forwarded confidential information out of the office on more than one occasion, according to Iron Mountain.

                            When people change jobs, highly sensitive information is particularly vulnerable. The study showed that many employees have no qualms about taking highly confidential or sensitive documents with them when they leave - and most believe they're doing nothing wrong..."

                              Why You Shouldn't Train Employees for Security Awareness
                              CSO Online July 18, 2012
                              "If there's one myth in the information security field that just won't die, it's that an organization's security posture can be substantially improved by regularly training employees in how not to infect the company...

                              You can see the reasoning behind it, of course. RSA got hacked from a Word document with an embedded Flash vulnerability. A few days later the entire company's SecureID franchise was at risk of being irrelevant once the attackers had gone off with the private keys that ruled the system..

                              Yahoo Password Breach: 7 Lessons Learned
                              InformationWeek July 13, 2012
                              "Stop the password breach madness: If it seems as if every week brings a new password breach to light, that's because hackers have been hard at work, releasing passwords with aplomb.

                              Recently, an attacker uploaded a subset of hashed passwords from LinkedIn to an online security forum, requesting help with cracking them. That was swiftly followed--apparently, by the same attacker--with similar requests for passwords purloined from dating website eHarmony and music-streaming website"

                              IT - Careers
                              15 Amazing Tech Feats And World Records
                              NetworkWorld July 16, 2012
                              "Supercomputers with ever more blazing speed, transistors that are smaller than ever and thousands of URLs where you can never lose them. These are the techiest records, the kind of accomplishments that keeps Guinness pumping out volumes of world records year after year..."
                                Four Mistakes You Probably Don't Know You're Making In Your Resume
                                TechRepublic July 17, 2012
                                "You think you've got all the typos out of your resume but you might not know about some of the other common errors that can be made...

                                There are an awful lot of people out there who view grammatical rules as just more useless restrictions from under the thumb of “the man.” And it may be that eight out of 10 hiring managers won’t care that your participle is dangling, but those other two might be the ones in charge of the jobs you really want. No one is ever going to complain that your syntax is too correct..."

                                  Say Goodbye to the 9-to-5 Workday
                                  Baseline July 13, 2012
                                  "No matter what time they show up in the office, many employees have been hard at work since they woke up, according to new research from data protection and availability firm Mozy. Mobile technologies—including smartphones, apps and cloud services—are helping workers stay connected day and night, turning them into productivity machines, according to the report, "The New 9 to 5". Around the world, the survey finds that the average worker first checks his or her work email at 7:42 a.m., gets into the office at 8:18 a.m., leaves at 5:48 p.m. and stops working completely at 7:19 p.m..."
                                    Three Odd Criteria For Apple Job-Seekers
                                    IT World Canada July 12, 2012
                                    "Apple Inc.'s hiring managers are required to answer three unusual questions on each candidate referral form in order to determine whether the potential employee will provide the high standard of customer service Apple is known for.

                                    Forbes' Carmine Gallo, the author of 'The Apple Experience: Secrets to Building Insanely Great Customer Loyalty,' reports that the first question is: 'Do they display grit?' ..."

                                      Oracle Aligns x86 Rackmount and Blade Server with Oracle Engineered Systems Naming Conventions
                                      Changes also Apply to Netra Carrier Grade Servers
                                      Oracle has renamed its Sun x86 servers and Netra servers to align them with the naming conventions of Oracle’s Engineered Systems, which have always used Oracle’s x86 rackmount systems as the basis of its integrated and optimized solutions. Thus, for example, the former Sun Fire X4170 M3 Server is now the Sun Server X3-2 and above; the Sun Netra X4270 M3 is now Netra Server X3-2; the Sun Blade X6270 M3 is now the Sun Blade X3-2B, and so on.
                                      IT - Compliance
                                      A Common-Sense Secret for Cheaper PCI Audits
                                      Dark Reading July 18, 2012
                                      "There are plenty of legitimate reasons why PCI compliance efforts can cost an enterprise a bundle. Legacy systems may need to be rearchitected, new technologies have to be purchased, and improved business processes must be implemented. Those types of activities take capital, but they often offer ROI in terms of improved security.

                                      But there's one PCI expense that's guaranteed to offer zero return: disorganization..."

                                      Risks Deferred Are Risks Accepted
                                      Dark Reading July 18, 2012
                                      "Decisions to delay compliance and security efforts do not delay the risks ...

                                      The client did something I’ve seen many times before. The staff considered addressing obvious compliance and security issues, and then decided to postpone that work. While they said they were simply going to push the work back a few months, as typically happens, the postponement became indefinite..."

                                      Oracle Storage Portfolio Demonstrates Strong Sales Growth
                                      Pillar Axiom Attains Growing Adoption Rate

                                      Over the past year Oracle's Storage Portfolio, spanning NAS, SAN and tape, has experienced remarkable growth. Sun ZFS Storage Appliances sales have more than doubled over the past year, and have been purchased by 40 percent of the Global Fortune 100. The Oracle Pillar Axiom Storage Systems have seen significant international growth since joining Oracle and have been adopted by more than 100 new customers in over 25 new countries. Oracle has also shipped over 2 exabytes of media for its StorageTek T10000C Tape Drives since its launch in January 2011, and doubled the capacity shipped in just six months.

                                      IT - Database
                                      7 Hard Truths about the NoSQL Revolution
                                      InfoWorld July 16, 2012
                                      "The NoSQL buzzword has been metastasizing for several years. The excitement about these fast data stores has been intoxicating, and we're as guilty as anyone of seeing the groundbreaking appeal of NoSQL. Yet the honeymoon is coming to an end, and it's time to start balancing our enthusiasm with some gimlet-eyed hard truths..."
                                        Oracle ZFSSA Hybrid Storage Pool Demo
                                        How to Accelerate Performance of Oracle Storage 7000 Series
                                        In a video running something under eight minutes, the impact of the ZFSSA hybrid storage pool on storage performance is demonstrated by Darius Zanganeh. He shows how high DRAM cache capacity and both write-optimized ssd and read-optimized ssd enable users to achieve large increases in drive performance of the Oracle 7000 Storage Series.
                                        IT - Mobile
                                        The Ten Commandments for Mobile Manners
                                        Kim Komando Show July 19, 2012
                                        "(1) Thou shalt give top priority to those who are with you.

                                        Listen intently when you are with friends, family members and coworkers. When you constantly check messages, you send the message that other people and things are more important to you..."

                                          IT - Big Data
                                          Big Data Security Is Inevitable
                                          NetworkWorld July 12, 2012
                                          "There's been a fair amount of discussion about the fact that security analytics is becoming a big data problem. I participated on a big data security panel at RSA and I believe there were a few others on this topic as well.

                                          Based on some recent ESG Research, I'm now convinced that its no longer a question of if security analytics are classified as big data but merely when this trend will become mainstream..."

                                          Health Care Organizations Not Ready for Big Data Deluge
                                          CIO Insight July 18, 2012
                                          "IT managers aren't prepared to handle the deluge of data in health care, Oracle revealed in its new report "From Overload to Impact: An Industry Scorecard on Big Data Business Challenges," released on July 17.

                                          Of 333 U.S. and Canadian C-level executives from health care and 10 other industries, 77% of health care executives gave their organization a "C" or below for managing the "data deluge." For all industries, 60% of the executives assigned organizations a "C" or lower for managing the flood of data..."

                                          6 Tips for Avoiding a Data Deluge with Real-Time Analytics Tools
                                          Washington Technology July 12, 2012
                                          "While the prospect of real-time analytics tools is creating a serious buzz among business users, it's important to avoid a data deluge. Consider these tips for successful adoption of real-time business intelligence:..."
                                          IT - BYOD
                                          For BYOD Best Practices, Secure Data, Not Devices
                                          ComputerWorld July 17, 2012
                                          "When it comes to things that keep CIOs up at night, mobility, particularly bring your own device (BYOD), is at the top of the list or near it. Mobile device management (MDM) products and services are often the reflexive response to the need for more secure mobile computing, but in many ways that's like using a chainsaw rather than a scalpel to perform surgery. A growing number of secure mobile solution providers say the answer to BYOD is not to control the device, but to control the data..."
                                          How to Become A BYOD Guru
                                          InfoWorld July 18, 2012
                                          "Five resource areas to help you master the technical, legal and security ramifications of BYOD..."

                                          "We were out in front of the BYOD movement so there weren't as many resources available as there are today to become a BYOD guru," says Jeremy Pollack, director of IT at the Business School. "In some ways, I wish we were just starting out now so we could have benefited from all the information out there."

                                          How to Have BYOD and Security, Too
                                          InfoWorld July 10, 2012
                                          "I've been working with quite a few companies over the last two years, helping them craft sensible BYOD policies. One fact is abundantly clear: BYOD will require a different security framework than traditional computing.

                                          Last week I discussed many of the challenges of BYOD. This week I'm presenting my solution, which is basically a framework any organization can use to gain insight into the heart of the BYOD problem..."

                                          IT Groups Eschew BYOD, Issue Company-Owned Tablets
                                          NetworkWorld July 12, 2012
                                          "After several years of struggling to accommodate personally-owned smartphones, many corporate IT groups are taking the opposite tack with tablets: they're issuing corporate-owned iPads and Android tablets. And partly as a result, at least some are seeing a jump in costs for mobile end user support, redesigned custom applications, and device administration..."
                                            Litigation Costs of BYOD Programs
                                            CSO Online July 13, 2012
                                            "While I hope no business reading this blog is or becomes the subject of a litigation, the reality is that litigation is an everyday occurrence for many businesses. The costs of litigation can be crushing, and not just with regard to damages that may be paid in the event of an adverse judgment. Rather the cost of running the litigation, itself, can be substantial. In particular, identifying, gathering and producing evidence stored electronically (e.g., Word files, e-mail, instant messages, etc.) can run into the six and, possibly, seven figures in some cases. It is that cost of responding to discovery requests in litigation that I would like to focus on in this entry..."
                                              Top Ten Articles for last few Issues
                                              Vol 173 Issues 1, 2; Vol 172 Issues 1, 2, 3 and 4; Vol 171 Issues 4 and 5
                                              We track how frequently each article is viewed on the web site to determine which the readers consider the most important. For last week, the top 10 articles were:

                                              • Using the VBoxHeadless Tool to Run Virtual Machines With VirtualBox 4.1
                                              • Four New Podcasts Available on SPARC T4
                                              • What's up with LDoms: Part 2
                                              • What's the Truth about Open Source
                                              • Choosing the Best Tool to Manage Various Virtualization Technologies
                                              • Register for the Oracle Optimized Storage Launch
                                              • Tape Storage Technology Comes of Age
                                              • Oracle Solaris 11: Tools For System Archival and Image Creation
                                              • Oracle ESSO Reduces Videotron Help Desk Call Volume
                                              • Delegation of Solaris Zone Administration

                                              The longer version of this article has list of top ten articles for the last 8 weeks.

                                                IT - Encryption
                                                Best Practices for Data Encryption, Part 1
                                                NetworkWorld July 6, 2012
                                                "In my recent conversation with Dr. Eric Cole of the SANS Institute (see "New approaches to combat 'sources of evil' and other security issues"), Cole stressed the importance of data encryption, especially as organizations migrate data into the cloud. His advice: Encrypt the data and manage the keys in such a way that no one but you has access to the keys..."
                                                Best Practices for Data Encryption, Part 2
                                                NetworkWorld July 12, 2012
                                                "In last week's article, I covered four basic best practices for data encryption:

                                                No. 1: Understand your business and security objectives.

                                                No. 2: Understand the impact of cloud architectures on encryption.

                                                No. 3: Consider alternative obfuscation techniques.

                                                No. 4: Ask your vendor about the encryption algorithm.

                                                This week we'll add to the list..."

                                                The Document Foundation Releases LibreOffice 3.5.5
                                                Many New Features, Bugfixes
                                                LibreOffice 3.5.5, the current version of the free office suite, is now available with stability enhancements and bugfixes, improvements in Calc, Impress, font handling and compatibility to third-party formats. The Document Foundation has made the download available. This release of LibreOffice is the best version available for corporate and enterprise adoption. The worldwide LibreOffice Conference will take place in Berlin, Germany, from October 17th to 19th, 2012. It is supported by the German Federal Ministries of the Interior and of Economics and Technology, with the Call for Papers running until August 15th.
                                                Trending in
                                                Vol 234, Issue 3
                                                Trending IT Articles