News about Oracle's Solaris and Sun Hardware
System News
Jul 23rd, 2012 — Jul 29th, 2012 Generate the Custom HTML Email for this Issue
System News System News for Sun Users
Volume 173, Issue 4 << Previous Issue | Next Issue >>
Sections in this issue:
click to jump to section

Oracle Licensing and Support on VMware vSphere
Fight the FUD
Michael Webster gives users the information needed to determine exactly what they legally owe in licensing fees while continuing to receive the support Oracle has been providing, even in a virtualized environment on VMware vSphere. Webster disputes four FUDs in considerable detail, which are:

  • Oracle Licensing and Soft Partitioning

  • Oracle Sub Cluster Licensing is Not Possible

  • Oracle is NOT Certified to Run on VMware vSphere

  • Oracle Does NOT Support Running on VMware vSphere

He includes five key questions to ask Oracle.

Java Technology
Java Spotlight Episode 91: Marina Vatkina on EJB 3.2
Dalibor Topic Appears on Java All Star Developer Panel
Marina Vatkina, a Principal Engineer at Oracle and Specification Lead for EJB 3.2 under the Java Community Process (JCP), discusses EJB 3.2 with host Roger Brinkley on Episode 91 of Java Spotlight. Appearing on this episode's Java All Star Developer Panel is Dalibor Topic, Java Free and Open Source Software Ambassador. Vatkina's experience over the past decade includes responsibility for several areas in the implementation of Sun's and now GlassFish Java EE application server, including persistence, transaction manager, and EJB container.
Finding the Path from RHEL 6 to Oracle Solaris 11
Mapping Guide Shows the Way
A post on offers advice to those moving from RHEL to Oracle Solaris OS in the form of a mapping guide between RHEL 6 and Solaris 11. For each general technology area, the author lists the main features of Oracle Solaris 11, their advantages, and how the command lines and configuration files map between the two operating systems - whether it's between RPM and IPS, KVM and Oracle Solaris Zones, Upstart and the Service Management Facility (SMF). The guide is designed to give administrators familiar with Red Hat Enterprise Linux a first step on where to get more information.
IT - Cloud
Why Cloud Computing Needs To - And Will - Go Open Source
Forbes, July 30th, 2012
"Agility, flexibility and customization. They’re the “big three” buzzwords companies cite to justify their investments in cloud computing. But while today’s leading cloud players have the best technological interests in mind, financial interests are prohibiting them from delivering an open environment for cloud computing..."
    Has Trust Really Moved to the Cloud?
    CIO, July 30th, 2012
    "Ask yourself a simple question. Are you connected to more people now than you would have been without social networking websites (Face book, MySpace, Apple Ping, and Orkut), micro-blogging websites (Twitter), professional networks (LinkedIn) and blogs on Blogger, WordPress, LiveJournal and the likes etc...? Now ask yourself if the number of people you trust has gone up in the same proportion..."
      Ten Ways to Get the Most Out of the Cloud
      CIOInsight, July23rd, 2012
      "More companies are exploring the cloud as a means of cutting costs and driving IT efficiency, and enterprises are expected to spend $112 billion on software as a service (SaaS), platform as a service (Paas) and infrastructure as a service (IaaS) projects over the next several years, according to industry projections. But what’s the best strategy to take when moving to the cloud? In the book, “Is Your Company Ready for Cloud? Choosing the Best Cloud Adoption Strategy for Your Business” (IBM Press/Available now), authors Pam Isom and Kerrie Holley explore essential steps companies can take to create a cloud model ..."
        Who Ultimately Pays for Cloud Computing? It Depends
        Forbes, July 27th, 2012
        "When the department or user group of a company decides it wants to use a cloud-borne service, who ponies up the money for the service? In the case of outside services from a providers such as Amazon Web Services or, there may be discretionary funds within a line of business that are transferred via credit-card transaction. If there’s an internal service within a private cloud, well, the question of who pays gets cloudy as well...."
          The Right Mix of Policies to Promote Cloud Computing
          Thge Huffington Post, July 25th, 2012
          "With cloud computing, the opportunity is clear. Public IT cloud revenue will grow to more than $70 billion by 2015. Even more significant, innovation enabled by the cloud will generate more than a trillion dollars in revenue over the next few years according to one estimate, and will create millions of jobs around the world. The trouble is, many governments are working to seize the cloud opportunity in misguided ways, such as by walling off domestic markets so local players can operate free of international competition..."
            The Role of Standards in Cloud Security
            CIOInsight, July 30th
            "Security is often cited as a primary cause for concern when considering cloud deployments. To overcome these concerns, companies moving to public cloud services might look to some emerging standards for help. FedRAMP establishes a baseline of security requirements for government contractors interested in providing the federal government with cloud services. NIST has developed a roadmap and a reference document about cloud architecture covering interoperability and security..."
              IT - CxO
              Gartner survey says IT spending is top board-level priority
              IDG News Service, July 23, 2012
              "Corporate boards are prioritizing IT spending as highly as investments in sales operations, according to research announced Monday by analyst firm Gartner.

              IT and sales were tied as the top two priorities among 175 board members, mostly in the U.S. and U.K., polled in March and April for the Gartner-Forbes 2012 Board of Directors Survey. Sixty-four percent said IT spending would rise during their companies' fiscal 2012..."

                We've Got Regulatory Fatigue
                Dark Reading, Jul 25, 2012
                "... As I work with our clients and talk with business peers about their clients, it has become clear that most organizations suffer from a similar kind of fatigue: regulatory fatigue. The ever-changing and constantly growing list of laws and regulations that may apply to an organization is not only a financial tax on the business. If not handled well, then it can be an emotional burden, too..."
                  Risks Deferred Are Risks Accepted
                  Dark Reading, Jul 18, 2012
                  "The client did something I’ve seen many times before. The staff considered addressing obvious compliance and security issues, and then decided to postpone that work. While they said they were simply going to push the work back a few months, as typically happens, the postponement became indefinite.

                  Or perhaps more accurately, the postponement will be indefinite until a costly problem exposes these ignored risks as real, costly and immediate..."

                    CIOs Must Master Human Side of IT Implementation
                    Wall Street Journal, July 24, 2012
                    "What if I were to tell you that, as chief information officer, your job had very little to do with technology?

                    That’s right. The CIO’s role is less about the software, the servers, the networking tools and the IT infrastructure than it is about business strategy execution and leadership skills. It’s also those skills—not technical knowledge—that are most crucial during a large-scale technology implementation like an ERP software upgrade or a sales funnel tracking system overhaul..."

                      Three Key Steps to Alignment.and Success
                      Baseline, July 25th, 2012
                      "As corporate and technology leaders continue their struggle to align, they must find a way to knock down the barriers that prevent them from collaborating.

                      Innovation, differentiation and collaboration are key to remaining competitive in this economic environment. In simpler terms: Success requires everyone in the organization to work together toward a common goal. This concept is not new, but it needs to be frequently reviewed to ensure that everyone is engaged and working as effectively as possible toward achieving the corporate vision...."

                        CIOs Make the List of Top 10 Most 'Always-On' IT Jobs
                        CIOInsight, July 23rd, 2012
                        "Exactly how demanding is your IT position, in the opinion of your peers? Certainly a statement like that one is hard to qualify at best, but wouldn't you be a smidgen curious to know where you rank on the IT job difficulty scale?

                        Well, Emerson Network Power, which makes physical and software infrastructure for data centers, was interested in this. So it recently sanctioned a research team, and it came back with "The Most Always-On IT Jobs," a report specifying what it contends are the most demanding IT jobs in the industry..."

                          IW 500 Conference CIOs Take Different Paths
                          InformationWeek, July 30th, 2012
                          "You weren't hoping for a cookie-cutter strategy to fix your IT problems, were you? Good, because you won't get one from the powerhouse lineup at this year's InformationWeek 500 conference. For example, General Motors CIO Randy Mott will take the stage to discuss why he's cutting nearly all of the company's IT outsourcing, and then Procter & Gamble CIO Filippo Passerini will explain his company's sweeping data analytics strategy--which relies on outsourcing many run-the-business IT functions...."
                            IT - Networks
                            First strain on Olympic networks seen
                            Network World, July 30, 2012
                            "It didn't take long to see the first signs of strain on communication networks at the Olympics when overloaded infrastructure on the first day of competition caused organizers to request that spectators scale back their use of Twitter for "non-urgent" messages, according to Reuters.

                            On Saturday during a women's bicycling race, broadcasters from BBC had trouble receiving GPS tracking signals from the race course because of an overloaded communications network. Reports then emerged that the number of fans along the race course using Twitter may have contributed to the network strain..."

                              Hosted IP telephony maturing for mainstream enterprise adoption
                              Network World, July 27, 2012
                              "IP telephony adoption has progressed slowly for more than a decade, but with hosted voice vendors now offering modular consumption models and shifting away from simply viewing hosted voice as a way to sell broader unified communications (UC) solutions, organizations can now pursue IP telephony services as a highly scalable stand-alone service.

                              While a comparison of the financial cases for customer-owned or vendor-hosted IP telephony service should be performed on a case-by-case basis, recent market developments, enhanced service offerings, and deployment methodologies have created a significant opportunity for mainstream corporate adoption of hosted voice services..."

                                IT - Operations
                                Maybe it is easy being green
                                Network World July 24, 2012
                                "IT professionals implementing energy efficient solutions in the data center are realizing big savings, and many report it has been easier to do than they thought it would be. In its fourth year, the CDW Energy Efficient IT Report found that implementing energy efficient solutions is easier than the typical organization perceives. Even better, "green" initiatives are gaining respect in the IT world, with 43% of survey respondents identifying green initiatives as a top driver for data center consolidation...."
                                  Netflix uncages Chaos Monkey disaster testing system
                                  Network World, July 30, 2012
                                  "Netflix has released Chaos Monkey, which it uses internally to test the resiliency of its Amazon Web Services cloud computing architecture, making available for free one of the tools the video streaming company uses to keep its massive cloud computing architecture running.

                                  Chaos Monkey is a free download available from GitHub as of today. It works by randomly terminating instances of virtual machines in applications, simulating what would happen during a disaster event. "The best defense against major unexpected failures is to fail often," Netflix officials wrote in the blog post titled "Chaos Monkey released into the wild." ...

                                    Cloud driving DevOps transformation, importance
                                    ZDNet, July 30, 2012
                                    "Cloud computing has placed additional emphasis on communication and cooperation between enterprise developers and IT operations in order for the DevOps model to work and for business needs to be met effectively, analysts say.

                                    Michael Azoff, principal analyst at Ovum, noted that broadly speaking, DevOps refers to the collaboration, communication, and coordination between developers and IT operations. The DevOps movement first emerged around 2009 and while many companies have already adopted the methodology, there are as many organizations which still find it a new concept, he added..."

                                      IT - Security
                                      5 Black Hat Security Lessons For CIOs
                                      InformationWeek, July 27th
                                      "There is no 'one size fits all' strategy when it comes to enterprise IT. Listen and learn as a powerhouse lineup of CIOs at the InformationWeek 500 conference describe the tactics they used to help their companies stay ahead..."
                                        Persistent router botnets on the horizon, researcher says at Defcon
                                        IDG News Service, July 30, 2012
                                        "Security researcher Michael Coppola demonstrated how small and home office (SOHO) routers can be compromised and turned into botnet clients by updating them with backdoored versions of vendor-supplied firmware.

                                        Coppola, who is a security consultant at Virtual Security Research (VSR), gave a crash course in router firmware backdooring -- a complicated process that requires reverse engineering skills -- at the Defcon hacker conference on Sunday..."

                                          Researcher wows Black Hat with NFC-based smartphone hacking demo
                                          Network World July 25, 2012
                                          "At the Black Hat Conference in Las Vegas Wednesday, Accuvant Labs researcher Charlie Miller showed how he figured out a way to break into both the Google/Samsung Nexus S and Nokia N9 by means of the Near Field Communication (NFC) capability in the smartphones.

                                          NFC is still new but it’s starting to become adopted for use in smartphone-based purchasing in particular. The experimentation that Miller did, which he demonstrated at the event, showed it’s possible to set up NFC-based radio communication to share content with the smartphones to play tricks, such as writing an exploit to crash phones and even in certain circumstances read files on the phone and more..."

                                            Getting the most out of IPS
                                            Network World, July 23, 2012
                                            "Intrusion prevention systems (IPS) — security tools designed to stop problems even before they crop up — have emerged as indispensable components of defense-in-depth security strategies.

                                            But a key success factor for the technology is it hasn’t stopped evolving over the years, and security experts expect this evolution to continue as security threats become ever more sophisticated and targeted..."

                                              Advance Malware Protection: Network or Host?
                                              Network World, July 30, 2012
                                              "Large organizations have legitimate cause for concern. Malware creation and proliferation is increasing rapidly as cybercriminals and state-sponsored organizations create the next round of APTs, botnets, Trojans, and rootkits. What's more, we've entered the era of micro attacks designed to compromise a targeted organization, business unit, or individual.

                                              Legacy security technologies are no match for this onslaught, so enterprises are investing in new tools. For example, ESG Research found that 77% of enterprise organizations (i.e. more than 1,000 employees) are increasing their security investments as a direct result of APTs..."

                                                Black Hat Survey: 36% Of Information Security Professionals Have Engaged In Retaliatory Hacking
                                                Dark Reading, Jul 26, 2012
                                                "...the results of a survey of 181 attendees of the Black Hat USA 2012 security conference in Las Vegas, Nevada.

                                                When asked “Have you ever engaged in retaliatory hacking?” 64% said “never”, 23% said “once”, and 13% said “frequently”.

                                                The information security community is divided on the practice of retaliatory hacking. Some information security professionals believe retaliatory attacks may discourage further attacks, while others believe these attacks are only likely to escalate hostilities, and increased attacks have the potential to do irreparable damage..."

                                                  Five Steps To Protecting Intellectual Property
                                                  Dark Reading, Jul 31, 2012
                                                  "Intellectual property takes many forms, including design documents, marketing plans, source code, budgets, and communications. IP is the information that differentiates an organization from its competitors, and its loss can have devastating effects.

                                                  Companies often make the mistake of underestimating the risks involved, wrongly believing that they don’t have anything worth stealing just because they don’t hold the secret formula for Coca-Cola or the schematics for a microprocessor that will power millions of devices..."

                                                    IT - Careers
                                                    The 9 most endangered species in IT
                                                    ITWorld, July 30th, 2012
                                                    "Darwinism is no stranger to IT. Given the pace of innovation, today's plum post is almost always one shift away from becoming tomorrow's pink slip. But the trends currently taking hold of IT organizations may have a broader impact on IT employment than we've seen in years.

                                                    It's no secret that the cloud computing revolution and the infusion of consumer devices into the workplace has wrought massive changes in IT. Job titles that were once considered secure are suddenly on the verge of extinction, thanks in part to a world where business users no longer have to go through IT to get to the technology they need to do their jobs..."

                                                      How to Be a Leader Even If You're Not in Charge
                                                      Baseline, July 26th, 2012
                                                      "Stringent corporate hierarchies are rapidly becoming a thing of the past, and you don’t have to worry about climbing the corporate ladder anymore if you want to have a rewarding career. Showing yourself to be a solid team leader can take you far. In her new book, “The Titleless Leader: How to Get Things Done When You're Not in Charge” author Nan S. Russel asserts that building influence without regard to formal position is now a workplace necessity..."
                                                        7 Steps to Happy Hires With Longterm Potential
                                                        Network World, July 30, 2012
                                                        "Finding good talent is a major challenge for IT leaders, and the answer seems to be to recruit and retain. But are any companies doing this really well? Reed Technology is, and it's ranked a best place to work in IT.

                                                        "For any business that is healthy or growing in a difficult economy, there's still this persistent resource constraint," says Dave Ballai, CIO and vice president of commercial solutions at Reed Technology, a LexisNexis business unit. "Your choices are: steal from other projects, outsource if time permits, or hire additional positions and try to get them up the curve." ...

                                                          Training ROI: How to Make Sure Training Is Worth Your Money
                                                          Baseline, July 27th, 2012
                                                          "All workers can benefit from professional development and training courses, but when times are tough, training is often one of the first things cut from the budget. Whether they’re to stay on top of industry changes or sharpen their skills, workers benefit from training, and it can be one of a company’s best investments. But managers and executives have to insist on training and show how a company will benefit from the investment. How can managers do this?..."
                                                            CIOs, IT Pros Face Salary, Benefits Slump
                                                            CIO Insight, July 16h, 2012
                                                            "CIOs and other top IT executives at large enterprises have a pay cut this year, according to the findings of a recent salary survey from Janco Associates, a management consulting firm focusing on IT systems. At smaller enterprises, senior IT managers have received minimal pay increases. The decline can be blamed on continuing concerns about the overall health of the economy as corporate leaders try to contain costs in the event of another downturn..."
                                                              Steve Blank tells why not lying on resumes works best
                                                              ITWorld, 31 July 2012
                                                              "Retired entrepreneur and Stanford professor Steve Blank writes about a recruiter suggesting he "make up" a college degree to get a plum job.

                                                              Blank writes on his blog how tempted he was to fake the degree, because he really wanted the job and the recruiter said the company, Convergent Technologies, was big on degrees. Instead he listed his Mensa membership, gotten at the urging of his older sister. It worked. He got the job, and to this day, has never listed education on his resume, letting work experience carry the freight..."

                                                                IT - Social Media
                                                                Build a private social network that employees will actually use
                                                                Computerworld, July 30, 2012
                                                                "NASA could land humans on the moon and put exploratory rovers on Mars, but in the last three years, the agency just couldn't find a way to build an internal social network that would encourage its employees to collaborate.

                                                                Initially launched in early 2009, "SpaceBook" was supposed to be a place where NASA workers could go online anytime to get feedback, learn from others' experiences, collaborate on projects and get to know each other better. But NASA ultimately squashed the effort this June, taking it offline for good..."

                                                                  Social Media for the Innovative CIO
                                                                  Wall Street Journal, July 26, 2012
                                                                  "As Twitter, Facebook, Google Plus and other social networks gain popularity, many CIOs are uncertain how to become involved. Aside from work pressures that hardly allow time to breathe, they raise security concerns and even question the basic value of engaging. Nonetheless, many innovative CIOs have started to embrace the broad professional dialog that social networks make possible.

                                                                  For the CIO, participating in social media requires balancing time, politics and security against the unique value that engagement can bring..."

                                                                    IT - Virtualization
                                                                    Why Hasn't Hyper-V Achieved World Domination Yet?
                                                                    InformationWeek, July 31st, 2012
                                                                    "Despite ongoing innovation by seated virtualization giant VMware, Microsoft continues to match core hypervisor features while competing strongly on price. No surprise, then, that Hyper-V is gaining market share. But I must confess that I'm a bit disappointed in Redmond's performance, in light of its track record for mercilessly crushing the competition, even in established markets where it previously held no competency..."
                                                                      Navis Expands Oracle Footprint; Deploys OracleÂs Pillar Axiom Storage System
                                                                      Enhances Performance and Consolidation Capabilities

                                                                      Navis, the global technology leader for managing cargo movement through terminals, has replaced its NetApp storage solutions with Oracle’s Pillar Axiom 600 storage systems to support the engineering and development environments for its SPARCS N4 terminal operating system. The Pillar Axiom 600 storage system’s patented Quality of Service (QoS) architecture provides the predictable performance and consolidation capabilities that are helping Navis meet ever increasing customer demands. By leveraging the replication and multi-system management features of the Pillar Axiom 600 storage system, Navis is able to maintain peak performance of its virtual machines, regardless of the types of environments it provisions.

                                                                      Buying Intention Survey Finds Fibre Channel SAN Declining in Popularity
                                                                      iSCSI SANs Make Gains by Comparison
                                                                      There are apparently some changes afoot in the relative popularity of fibre channel SAN, NAS, and iSCSI SAN, a survey reported in SearchStorageChannel has found. Francesca Sales writes that the survey of buying intentions determined that only 43% of 687 respondents said that they’re running a Fibre Channel SAN, behind NAS at 58% and with iSCSI SANs (42%) trailing both. Still, Sales writes, in a server virtualization environment specifically, meanwhile, FC is still the most popular choice, at 34%. At the same time, there’s been an increase in Ethernet-based storage to support virtual servers.
                                                                      IT - Big Data
                                                                      7 Deadly Sins Of Big Data Users
                                                                      InformationWeek, July 30, 2012
                                                                      "We're swimming in a vast sea of data that's rising every year. And according to Josh Williams, president and chief science officer of Kontagent, a social and mobile analytics company, companies that collect, analyze, and interpret data accurately--and act upon it quickly--have a significant competitive advantage.

                                                                      At the Kontagent Konnect user conference in late May, Williams made a presentation called the "7 Deadly Sins of Data Science," in which he outlined the common mistakes that organizations make when processing large amounts of data...."

                                                                        Most Firms Have No Big Data Plans, Survey Finds
                                                                        Computerworld, July 30, 2012
                                                                        "A majority high-level IT managers and data storage professionals have no plans to deploy big data analytics, according to a new data storage survey by market research firm TheInfoPro.

                                                                        56% of respondents indicated they will not be deploying big data analytics applications even beyond 2013, the survey of 255 IT professionals found. Half of those surveyed were data storage professionals at the analyst level; the other half comprised IT mangers, vice presidents and CIOs..."

                                                                          Big Data Means Big Storage Choices
                                                                          InformationWeek, July 27, 2012
                                                                          "It's tough to keep up with what big data you'd like to store, especially when much of the data is unstructured text from outside--perhaps from blogs, wikis, surveys, social networks, and manufacturing systems.

                                                                          Big data can improve the operational efficiency of companies using it by as much as 26%, according to a report released this month from Capgemini North America. That's a huge leap that will grow even larger--to 41%--within three years, if opinions of the 600 C-level executives and senior IT people Capgemini surveyed for the report are to be believed...."

                                                                            PROS Survey Identifies Big Data as Biggest Challenge for Service Parts Companies
                                                                            Businesswire, July 30, 2012
                                                                            ".... announced results of a global survey of more than 100 service parts executives that sheds light on the strategic business challenges faced by these organizations. More than 65% of the participants identified the inability to leverage, acquire and integrate big data as their most significant business challenge.

                                                                            Participants identified themselves as representatives from the automotive, heavy-duty equipment and aerospace industries. The group was evenly split between the manufacturing and distribution service parts supply chain..."

                                                                              How Hadoop Cuts Big Data Costs
                                                                              InformationWeek, July 30, 2012
                                                                              "Managing prodigious volumes of data is not only challenging from a technological standpoint, it's often expensive as well. Apache Hadoop is a data management system adept at bring data processing and analysis to raw storage. It's a cost-effective alternative to a conventional extract, transform, and load (ETL) process that extracts data from different systems, converts it into a structure suitable for analysis and reporting, and loads it onto a database..."
                                                                                IT - BYOD
                                                                                IDC: Enterprise Mobility - Only a Matter of When, Not If
                                                                                CIO, July 30, 2012
                                                                                "IDC analysts who spoke at the Computerworld IT Roadmap event, held across the three cities of Mumbai, Bangalore and Delhi unequivocally emphasized the importance of enterprise mobility and the benefits an organization can hope to derive from it.

                                                                                "The debate is no longer around whether to enable a mobile workforce. It's more about deciding which devices to support, who gets access to what, and how to develop the infrastructure that is needed to support these devices," said Venu Reddy, Research Director, IDC India..."

                                                                                  The Mobile Monitoring Mess
                                                                                  Dark Reading, Jul 23, 2012
                                                                                  "At what point did “their device” become “my device”? Probably as soon as I started taking personal calls on the brick I called a mobile phone around 1990. I never saw a bill because my employer was paying for every call -- even the international ones where I had to talk to a non-native English speaker in a loud data center on another continent through a reboot and fsck while at the same time navigating the Chicago freeway system. Good times...."
                                                                                    Wi-Fi, mobile data, BYOD and tablets -- an interesting puzzle
                                                                                    Network World July 03, 2012
                                                                                    "Many of us are participating in the BYOD trend, using our personal smartphones to send and receive business calls, check our email, and schedule appointments on the phone that can sync with our business calendar. Others use a company-issued smartphone for the same purposes. And a growing number of business users are "cutting the cord" by replacing a landline desktop phone with a smartphone. But what we haven't seen yet is a wide-scale replacement of computers by tablets in the home or the office. But we surmise that the trend to "bring your own tablet" (BYOT) is beginning to emerge..."
                                                                                      For BYOD Best Practices, Secure Data, Not Devices
                                                                                      CIO July 17, 2012
                                                                                      "When it comes to things that keep CIOs up at night, mobility, particularly bring your own device (BYOD), is at the top of the list or near it. Mobile device management (MDM) products and services are often the reflexive response to the need for more secure mobile computing, but in many ways that's like using a chainsaw rather than a scalpel to perform surgery. A growing number of secure mobile solution providers say the answer to BYOD is not to control the device, but to control the data...."
                                                                                        Tech chiefs still split on the benefits, concerned about security
                                                                                        TechRepublic, July 24, 2012,
                                                                                        "While bring your own device might be an idea that appeals to staff, CIOs are not so sure, as concerns about data security remain.

                                                                                        The bring your own device (BYOD) trend continues to gain momentum as execs at the top of businesses, and younger workers at the bottom, demand the right to use their own smartphones, tablets and laptops in the office..."

                                                                                          Getting out in front of BYOD
                                                                                          Network World, July 30, 2012
                                                                                          "It wasn't long ago that BYO was something you'd find on a party invitation. But with the wave of employees bringing their own smartphones and tablets into the workplace and expecting to use them for email, network access and mobile apps, BYOD -- or "bring your own device" -- now represents a promising but formidable business trend that doesn't leave IT in the mood for celebration.

                                                                                          "There are a huge number of risks if people bring in their own mobile devices in an unregulated, unmanaged fashion," says Jack ..."

                                                                                            Top Ten Articles for last few Issues
                                                                                            Vol 173 Issues 1, 2, 3; Vol 172 Issues 1, 2, 3 and 4; Vol 171 Issue 5
                                                                                            We track how frequently each article is viewed on the web site to determine which the readers consider the most important. For last week, the top 10 articles were:

                                                                                            • New features in open source ZFS
                                                                                            • Oracle Aligns x86 Rackmount and Blade Server with Oracle Engineered Systems Naming Conventions
                                                                                            • The Document Foundation Releases LibreOffice 3.5.5
                                                                                            • Tips for Hardening an Oracle Linux Server
                                                                                            • Solaris 11 and Enterprise Manager Ops Center
                                                                                            • Oracle Introduces StorageTek SL150 Modular Tape Library
                                                                                            • Oracle ZFSSA Smashes IBM XIV Running Oracle ERP On Oracle RAC DB
                                                                                            • Some Better Disk Backend Choices
                                                                                            • Best Practices to Accelerate Oracle VM Server Deployments
                                                                                            • Lots of packages for SmartOS, soon for OpenIndiana

                                                                                            The longer version of this article has list of top ten articles for the last 8 weeks.

                                                                                              Oracle Releases NetBeans IDE 7.2
                                                                                              Features Faster Development Cycles, Better Code Quality
                                                                                              Oracle has released NetBeans IDE 7.2, a free, open source IDE available for Windows, Mac, Oracle Solaris, Oracle Linux, and other Linux distributions, that enables developers to rapidly create web, enterprise, desktop and mobile applications for the Java platform, PHP and C/C++. New in Release 7.2 are:

                                                                                              • Enhanced Developer Productivity featuring native integration with FindBugs
                                                                                              • Improved Performance by up to 60 percent with smarter project scanning
                                                                                              • Expanded Support, featuring interoperability with the early access release of JavaFX Scene Builder with Java FX Scene Builder.

                                                                                              NetBeans IDE 7.2 also includes FXML and CSS3 enhancements.

                                                                                              Oracle Identity Management 11g Release 2 Now Available
                                                                                              First Identity Management Platform Optimized to Secure the New Digital Experience

                                                                                              Oracle has announced the availability of Oracle Identity Management 11g Release 2, whose new and enhanced features optimized to secure the new digital experience enable organizations to securely embrace cloud, mobile and social infrastructures and reach new user communities to help further expand and develop their businesses. Oracle Identity Management 11g Release 2 consolidates elements of Oracle’s entire portfolio of Identity Management offerings into three main categories designed to help customers reach a new equilibrium in performance and operational scale.

                                                                                              The categories include: Oracle Identity Governance; Oracle Access Management; and Oracle Directory Services

                                                                                              Trending in
                                                                                              Vol 234, Issue 2
                                                                                              Trending IT Articles