News about Oracle's Solaris and Sun Hardware
System News
Aug 13th, 2012 — Aug 19th, 2012 Generate the Custom HTML Email for this Issue
System News System News for Sun Users
Volume 174, Issue 3 << Previous Issue | Next Issue >>
Sections in this issue:
click to jump to section

IT - Storage
CEO Vs. CIO: Big Data Security Battle
InformationWeek August 15, 2012
"Here's a scenario that may sound familiar, particularly if you're privy to the inner workings of corporate management. A company's CEO wants to deploy cloud-based data processing technology, but his CIO balks at the idea, arguing the firm's data is too important to store offsite and in the ether...
Java Technology
Java SE 7 Update 6, JavaFX 2.2 and JavaFX Scene Builder 1.0
Operating System Support now Includes Full Mac OS X Release
With the release of Java SE 7 Update 6 on Mac OS X, including the Java Runtime Environment (JRE) and the Java Development Kit (JDK), as well as the JavaFX 2.2 rich client platform and JavaFX Scene Builder users will soon be able to download the JRE for Mac OS X from, just as they do for all other operating systems, and Oracle will provide auto-updates for Mac OS X at the same time as for Windows platforms. Downloads, learning resources and tutorials for these releases are available.
IT - Technology
NFC Not Just for Mobile Payments: Six Future Uses
NetworkWorld August 14, 2012
"By now, you're probably somewhat familiar with Near Field Communications (NFC) technology. And when you hear the term NFC, the first thing that comes to mind is probably mobile payments.

That's understandable, as NFC and mobile payments have been grouped together by analysts, pundits, researchers and retailers since the short-range wireless technology first started making headlines in the early 2000s. (The first mobile phone with built-in NFC, the Nokia 6131, launched in 2007.) But the truth is NFC has a lot more to offer than just mobile payments..."

    IBM Claiming Spintronics Memory Breakthrough
    TechWorld August 13, 2012
    "IBM researchers are claiming a huge breakthrough in spintronics, a technology that could significantly boost capacity and lower power use of memory and storage devices.

    Spintronics, short for "spin transport electronics," uses the natural spin of electrons within a magnetic field in combination with a read/write head to lay down and read back bits of data on semiconductor material, and IBM will reveal their breakthrough in a paper set to be published in the scientific journal Nature...."

    The Fascinating World of the Ubiquitous Antenna
    NetworkWorld August 14, 2012
    "The antenna -- it has been around so long and is mounted and used so routinely it is rarely even noticed. But such antenna technology has changed a lot over the years and has gone into space, war, water and just about anywhere else you can imagine. Here we take a look the world of the ubiquitous antenna..."
      Free and Open Source S/W
      Proprietary Vendors Finding Open Source Development an Attractive Course
      VMware and Microsoft Are Prime Examples
      In the recent corporate behavior of VMware and even Microsoft, Jay Lyman, writing in LinuxInsider, finds a more accepting stance toward free and open source software in the proprietary community. These proprietary stalwarts, and others, says Lyman," ... talk bullishly about their integration with, contribution to, and support for open source software, which is a far cry from belittling open source as a hobby or demonizing it as not enterprise-ready." For all of that, he concludes, there remains a marked difference between VMware, for example, and Red Hat, which has been, and remains, solely open source from the start.
      Pre-Flight Checker for Solaris 11 Now Available in New Version
      Free Download at Solaris Download Page
      The Pre-Flight Checker tool designed by Stefan Schneider, et al., at Oracle Systems ISV Engineering, is now available in a new version. The tool, which is available for free download from the Solaris Download page, lets users know whether a particular app will work on Solaris 11 without modification. Included in the latest version are such features as: Fully globalized product, currently with support for English, Simplified Chinese, and Japanese; detectors for issues due to static linking of system libs and mutex alignment; kernel checker to reveal usage of private kernel interfaces (binary as well source scanner)
      Cloud Computing
      Ellison on the Oracle Cloud
      Top 10 Reasons You'll Want It
      "We’re trying to do for the data center what Apple did for the consumer," said Larry Ellison at the recent All things D conference. Oracle SVP for communications Bob Evans summarized Ellison's argument promoting adoption of the Oracle Cloud solutions in a post on, where he lists the 10 points the Oracle CEO sees as compelling reasons for customers to make the move. As Ellison sees it, Evans writes, cloud computing represents a fantastic opportunity for technology companies to help customers simplify IT.
      IT - Cloud
      10 Ways to Ease Public Cloud Security Concerns
      IT World August 13, 2012
      "For OpSource-not to mention Amazon Web Services (AWS), Rackspace, Terremark and others-the answer is a layer 2 virtual LAN. In OpSource's case, customers connect to the cloud using VPN clients or site-to-site VPN terminations. This makes the public cloud an extension of the private cloud, making it a secure, hybrid cloud..."
      Cloud Computing Plays Big Role in Small, Mid-Sized Businesses
      CIO Insight August 13, 2102
      "Cloud-based file-sharing, email and productivity applications are being widely embraced by small- and midsized businesses with or without the approval of IT, according to a survey conducted by IT social network Spiceworks on behalf of cloud solutions vendor EMC. The Spiceworks Cloud Barometer sheds light on the ongoing struggle between IT departments and the users they support..."
      Gartner: Cloud Computing's Most Over-Hyped Terms
      NetworkWorld August 14, 2012
      "The cloud" is a broad term that encompasses many different technologies, similar to the way the Web or the Internet have many different aspects to it, Gartner says. And many of the individual aspects of the cloud computing industry each have their own degree of hype surrounding them. Gartner attempts to put this all in perspective by using its Hype Cycle formula to evaluate more than three dozen specific technologies within cloud computing..."
      Mind the gaps: 3 missing pieces in cloud computing
      InfoWorld August 10, 2012
      "For many in enterprise IT, cloud computing seems like a dream come true: There's no need to spend your days negotiating with hardware and software vendors, and you don't have to worry about running out of space in the data center.

      However, as a new technology, cloud computing is missing pieces, and you must take them into account as you move forward, or not, with your cloud implementations. Right now, I see three large holes that need to be filled; let's examine each..."

      Organizations Lack Protocols to Protect Data in the Cloud
      HelpNet Security August 15, 2012
      "While sixty-two percent of survey respondents are leveraging the cloud and/or virtualization, only 33 percent of these organizations test data recovery plans regularly to ensure proper protocols are in place to protect this data, according to a survey conducted by Kroll Ontrack of 367 enterprise and services providers..."
        Side-By-Side Comparisons of IaaS Service Providers
        TechRepublic August 7, 2012
        "Earlier this year I wrote a comparison of several cloud infrastructure-as-a-service (IaaS) providers, to serve as a starting point for anyone looking to take the plunge into cloud computing. The Infrastructure as a Service (IaaS) market, however, has proven to be one of the most exciting ones in the cloud space, and there have been several important movements..."
        The Biggest Cloud Computing Security Risk Is Impossible to Eliminate
        NetworkComputing August 10, 2012
        "The past couple of years have been tough for those defending the security of cloud computing and those trying to establish secure cloud infrastructures for themselves. For the most part, there have been DDOS attacks or defacements designed to embarrass or punish site owners.

        However, even considering only websites or services from which hackers actually took over accounts, stole data or money, or planted malware to help steal data or money from others, the list of security failures is long and distinguished ..."

        The Cloud Versus the Taxi Cab
        IT World August 13,2012
        "If we all keep our data on corporate servers, the things that can go wrong are massive and horrendous, the argument goes. As if to give Wozniak an anecdotal example, web writer Mat Honan watched as his entire cloud life was destroyed and defaced.

        There are lots of lessons and next steps to take away from Honan’s experience and Wozniak’s warnings..."

          Wake Up, IT: Even CFOs See Value in the Cloud
          InfoWorld August 14, 2012
          "IT may still be wrestling with the notion of cloud computing, but chief financial officers already believe. According to a Google-sponsored study, 96 percent of CFOs believe that "cloud computing provides their business with quantifiable benefits." Almost as good, 94 percent said the cloud will be important to the success of their companies, and just over half of those agreed that cloud computing "offers better value" than traditional approaches to computing, including outsourcing..."
          Why Private Clouds Aren't Really Private
          Internet Evolution August 16, 2012
          "Anybody looking to strike up a heated debate among technologists need only ask, "Is the cloud private?" There is an old adage that, if you have to ask, the answer is "no." However, one can expect all kinds of responses to that simple question, from the technically savvy to the academic to the emotional. The simple answer: yes and no.

          The cloud privacy debate hinges in part on the question of whether data is more private when it is stored locally or encrypted remotely..."

            With Cloud Computing SLAs, Odds Favor the Housec
            Search Cloud Computing August 8, 2012
            "Companies such as Hewlett-Packard tout cloud service-level agreements to attract customers, but cloud SLAs do little to help companies recoup outage-related revenue losses.

            In fact, many cloud services vendors promise between 99.95% and 99.9% of uptime on a monthly basis, but typically only pay out on their service-level agreements (SLAs) if service falls far below those levels..."

              Wozniak Cloud Storage Worries Mirror IT Security Fears
              eWeek August 8, 2012
              "Comments from Apple co-founder and computer engineer Steve Wozniak concerning his fears about the migration to cloud storage have reopened the debate over security and privacy issues surrounding cloud storage. Wozniak's remarks—made after performing in a controversial expose on Apple’s labor conditions in China, 'The Agony and the Ecstasy of Steve Jobs' in Washington—came as enterprises and small and midsize businesses are increasingly adopting cloud-based storage platforms to deal with exploding levels of data..."
              IT - CxO
              Fewer Outsourcing Contracts Being Inked, Says Research Firm
              InfoWorld August 10, 2012
              "The number of new IT and business process outsourcing contracts worldwide dropped by 20 percent to 411 in the second quarter from 516 in the same quarter a year ago, with average contract values also sliding, a research firm said...

              Buyers in U.S. are shying away because of anti-offshoring debate in run-up to presidential elections, according to Everest Group ..."

                Financial Institutions are Losing Clients as a Result Of a Single Fraud Attack
                Dark Reading August 14, 2012
                Guardian Analytics, a leader in behavior-based fraud prevention solutions, together with independent research firm, Ponemon Institute, announced the results of the third annual Business Banking Trust Study. Nearly 1,000 owners and executives of small-and-medium-sized businesses (SMBs) in the United States participated in the study. Year over year results show that SMBs are ongoing victims of account takeover and still piling up losses due to fraudulent ACH, wire and other transactions. SMBs are not only losing confidence in their financial institutions’ fraud prevention practices (30% of responses), but are taking some or all of their banking business elsewhere (40%).
                IT Checklist: What Every CIO Should Teach New Employees
                CIO Insight August 10, 2012
                "Any time a new employee is hired -- or brought into your enterprise through an acquisition – your IT team has its hands full. Provisioning computers, enabling VPNs and network access, providing smartphones, updating security features and keeping apps up to date are just a few of the requirements to get employees up and running as quickly as possible..."
                Ten Steps to Increase Your CEO's Understanding of Cloud Benefits
                IT Business Edge August 15, 2012
                "With the introduction of x86 virtualization and the acceleration of cloud-based computing it is obvious to every techie that data center modernization is wicked cool, accessible to just about everyone, and beneficial to organizations of every size. Unfortunately, 'wicked cool' and 'beneficial' are terms that usually make CEOs cringe unless they are quantifiable with measurable benefits..."
                  The Best Tech Investment I Never Made: Four CIOs' Tales
                  ComputerWorld August 13, 2012
                  "A few years ago, when Bill Weeks was CIO at a leasing company, a big vendor pitched some software intended to manage leasing throughout Europe. Weeks was skeptical. "We noticed that half the stuff they were showing us was PowerPoint slides and not actual functionality," he says. "We decided it wasn't strong enough to run a business on."

                  He and his team decided to pass.It's the kind of decision that CIOs have to make all the time..."

                  Top Mobility Challenges Facing C-Level Executives
                  HelpNet Security August 16, 2012
                  "More than fifty percent of the companies surveyed are now planning Mobile Productivity projects to allow employees to access, sync and share documents using mobile devices, according to Copiun.

                  The survey also reveals that the biggest challenges facing C-level executives and IT decision-makers in mobility are data security and compliance management..."

                  What Your Interns Can Teach You
                  ComputerWorld August 13, 2012
                  "It's summertime, which means legions of eager, fresh-faced interns are ensconced in IT departments across the country, hoping to get real-world experience, or at least something that will look impressive on their resumes.

                  Some will have less-than-ideal experiences. Rather than coding or developing apps, they may spend the summer filing or wiping hard drives destined for recycling..."

                    Ten Leadership Traits Learned from Jazz
                    CIO Insight August 13, 2012
                    "IT involves intense collaboration with other highly qualified professionals in pursuit of creation, and keen instincts for adaptability when the tempo changes. And the whole becomes something greater than a collection of parts. We're talking about the classic jazz and clever improvisation that defined masters such as John Coltrane and Miles Davis. CIOs could take a cue from these maestros in cultivating their own leadership skills. In the book, 'Yes to the Mess: Surprising Leadership Lessons from Jazz', author Frank Barrett draws intriguing connections between music and the business world."
                      IT - DR
                      Disaster Recovery Weaknesses Are Pervasive
                      Baseline August 8, 2012
                      "According to a new study conducted by Quantum, 90 percent of IT decision-makers believe their data is vulnerable in a disaster. What's more, 27 percent experienced some type of data security incident during the last year, but only 15 percent of these breakdowns were due to natural disasters..."
                      IT - PM
                      Time Management for Project Success
                      Way2PM July 21, 2012
                      "Taming time – one of the three primary project constraints, is a skill which every one of us wishes we could excel in. Once ‘time management’ is addressed we can say that we are in a better position to control the rest of the project dependencies. This article tries to capture some of the winning steps that project managers can take to be better managers and lead the project towards success.

                      Time management tips for project managers:..."

                      Oracle OpenWorld 2012 and JavaOne 2012
                      September 30 - October 4, 2012
                      Oracle OpenWorld 2012 and JavaOne 2012 scheduled, respectively, for September 30 - October 4, 2012, at the Moscone Center in San Francisco and September 30 - October 4, 2012, at the Zone (Hilton Union Square, Hotel Nikko, and Parc 55 Wyndham) in San Francisco, will feature more than 2,000 educational sessions - led by Oracle experts, customers and partners - on the hottest topics driving business growth and success, including analytics, big data, cloud, customer experience, and human capital management. Some 400 partners will exhibit at this year’s show, providing a content-rich networking and learning environment. Register now.
                      IT - Networks
                      Can SIP and IPv6 Co-Exist?
                      NetworkComputing August 14, 2012
                      "SIP and IPv6 will get along, but the transition from IPv4 will be a challenge, as running a dual-stack environment will not always work on devices with limited memory and operating systems that support only one version of IP..."
                      Fix Your Wi-Fi Network: 7 Tips
                      PCWorld August 10, 2012
                      "Wireless Internet networks afford us the luxury of browsing the Web cable-free, but a connection that relies on radio waves is subject to failure due to interference, signal range limits, hardware problems, and operator error. With that in mind, we've put together a quick guide to the most common Wi-Fi troubles and how to fix them..."
                        Make the Transition from IPv4 to IPv6
                        Processor August 10, 2012
                        "The Internet has a problem in that the roughly 4.3 billion unique Internet addresses that IPv4 makes available globally ( are expected to run completely dry by 2014. Enter IPv6 and the 340 trillion trillion trillion unique addresses it provides, along with other improvements over IPv4. On June 6, IPv6 officially launched on what was dubbed World IPv6 Launch Day with reportedly 3,000 Web sites, five home router manufacturers, and 65 network operators making the leap. In coming years, enterprises must also make the transition. The following details where to start and how to proceed..."
                          IT - Operations
                          EU Electronic Waste Legislation Now Compulsory
                          TechWorld August 14, 2012
                          A European Union law that will require all large electronic retailers to take back old equipment came into force this month.

                          "The new rules are part of a shake-up of the Waste Electrical and Electronic Equipment Directive and will gradually be implemented across the EU over the next seven years.

                          Waste electrical and electronic equipment, or WEEE, is one the fastest growing waste streams in the EU, but currently only one-third of electrical and electronic waste is separately collected and appropriately treated..."

                            Save Money On Data Center Cooling
                            Processor August 10, 2012
                            "All data centers are looking to cut costs in some capacity, whether it is through consolidation and colocation or other potentially money-saving measures. But if you aren’t looking at the cooling efficiency of your data center, then you might not be looking in all the right places. 'Effective cooling is preventative maintenance, says Mike Paulson, president of AmeriCool..."
                              What the Software-Defined Data Center Really Means
                              InfoWorld August 13, 2012
                              "You know the story of how the Internet was created: The military wanted a redundant "network of networks" and figured out how to do it with a new protocol using existing networking equipment.

                              Something nearly as historic is happening now, again using existing infrastructure: the software-defined data center...

                              As network virtualization matures, the software-defined data center will establish an open-ended environment for innovation ..."

                              IT - Security
                              Businesses Should Pressure Software Vendors to Meet New Microsoft Encryption Requirements
                              NetworkWorld August 13, 2012
                              "Businesses should start leaning on vendors now to upgrade applications that use less than 1024-bit encryption before it's too late.

                              What is currently a voluntary upgrade request from Microsoft is likely to become mandatory within a few months, meaning that apps using weaker encryption keys won't work with a range of Microsoft platforms, says Paul Henry, a security and forensic analyst with Lumension..."

                              DLP Tools Deliver Strong Endpoint Protection
                              NetworkWorld August 13, 2012
                              "With serious data breaches occurring on almost a daily basis, concerns about data protection have skyrocketed. While some experts believe endpoint breaches may no longer comprise the majority of data leaks, the intentional or unintentional release of sensitive data from endpoints within an organization, whether by employees, contractors or guests, remains a serious problem that data loss prevention (DLP) products seek to address..."
                                Internal Audits Are Key to Security Strategy
                                Dark Reading August 14, 2012
                                "Most companies have security controls in place, but they often do nothing to find out whether these protocols are being followed -- and the controls often overlook new threats, according to a study published earlier this week.

                                The study on internal security auditing, published this week by PriceWaterhouseCoopers, offers a look at the impact of internal security auditing procedures..."

                                9 Popular IT Security Practices That Just Don't Work
                                InfoWorld August 13, 2012
                                "When it comes to IT security, FUD (fear, uncertainty, and doubt) is more than just the tool of overhyping vendors hoping to sell their next big thing. It is the reality that seasoned IT security pros live in, thanks in large part to the -- at times gaping -- shortcomings of traditional approaches to securing IT systems and data.

                                The truth is most common IT security products and techniques don't work as advertised, leaving us far more exposed to malicious code than we know."

                                10 Steps to Ensure Users Only Access What They Need
                                HelpNet Security August 10, 2012
                                "Every organization faces one challenge to their IT security position – the user. It doesn’t matter how much security training and advice a person is given - if they want, and can, do something then they will. Unfortunately, a user with admin rights – wittingly or unwittingly – is akin to a loose cannon..."
                                10 Ways to Defend Against Data Breaches
                                eWeek August 14, 2012
                                "In health care, doctors and hospitals need to strike a balance between being able to access and share critical patient data while also keeping electronic health records secure. Data sharing is essential as doctors look to collaborate on patient care as part of accountable care organizations under the Patient Protection and Affordable Care Act (ACA)..."
                                Huge Jump in Number of Fines for Data Breaches
                                HelpNet Security August 15, 2012
                                "The Information Commissioner's Office (ICO) has revealed a huge increase in the number of penalties handed out for organisations in breach of the Data Protection Act. Over the last year, ICO has issued 68 warning notices for data security lapses, which is up 48 percent from the same point last year. Its fines reached nearly £2m over the last year..."
                                The Hacking of @mat
                                IT Web August 10, 2012
                                "Mat Honan, a US-based technology journalist, had his digital life turned inside-out when hackers seized control of his accounts with iCloud, Amazon, Twitter, and Google, remote-wiped his iPad, iPhone and Macbook, and destroyed his data. Why? Because he has a cool Twitter handle (@mat) and they wanted it..."
                                The Security Game Changes When the Bad Guys Are Backed By Foreign Governments
                                NetworkWorld August 13, 2012
                                "Fidelis Security Systems has an interesting perspective on the world of security, working, as it does, with the U.S. government to keep other countries from prying into some of our nation's most critical networks. Now that many of those same countries are after intellectual property housed by enterprise shops, commercial customers are knocking at Fidelis' door looking for help. Network World Editor in Chief John Dix talked to Fidelis CEO Peter George about the shifting threat landscape and what companies are doing to cope..."
                                Mastering Your Data Flow Mojo
                                Dark Reading August 14, 2012
                                "Regulatory bodies tightening the screws on compliance and line-of-business executives better versed in the risks of big data breaches have pushed the use of database protections significantly during the past few years. But even with robust database protection technology, such as database activity monitoring and database encryption, in place, enterprises could be open to audit troubles or breaches if they fail to extend protection from production databases out to some easy-to-miss secondary data sources..."
                                IT - Careers
                                10 Cool Ways to Get More From WORD's Find and Replace Feature
                                TechRepublic August 8, 2012
                                "Find and Replace is one of Word’s most powerful and flexible features — but it’s considerably underused. Most people use it to find specific content, but they don’t realize it can also run rings around many tedious tasks. Start with these 10 easy-to-implement ways to use advanced Find and Replace settings and see what they inspire for your own day-to-day chores..."
                                  Ten Signs Your Company Is in Trouble
                                  Baseline August 14, 2012
                                  "Are you starting to get a bad feeling about your company's future? For certain, these are not times for the faint-of-heart or weak-of-stomach. In fact, only 44% of businesses last beyond their first four years, according to published research. And even if your organization is surviving the up-and-down economy, there's always the scary prospect of a merger or acquisition that could render your position obsolete..."
                                    12 Tasks That Killer Employees Always Finish Before Noon
                                    Business Insider August 9, 2012
                                    "A recent study published in an American Psychological Association journal, Emotion, suggests that early birds are generally happier than night owls.

                                    More than 700 respondents, ranging from ages 17 to 79, were surveyed and asked about their emotional state, health, and preferred time of day..."

                                    Leave Your Job on Good Terms
                                    Baseline August 10. 2012
                                    "Successful executives usually accept and leave jobs on their own terms. Being terminated from a position is often a new experience for them—and almost always difficult. But landing the next big job may depend on how you leave the last one. Despite whatever pain and anger accompanies being forced out of a job, it’s critical to consider the following pointers as you move on: ..."
                                      Steve Jobs' Lessons on Risk (Video)
                                      Risk Management Monitor July 16, 2012
                                      "The video above re-aired last night on 60 Minutes. It features an in-depth account of Steve Jobs from his authorized biographer Walter Isaacson, whose book Steve Jobs was the second-highest selling non-fiction work of 2011, despite not being published until just before Halloween. (The segment has a Part II)..."
                                        10 Things I've Learned From Working In IT
                                        TechRepublic August 12, 2012
                                        "I’ve been a part of the IT industry (in one capacity or another) for nearly 20 years now. During those years, I’ve seen all sorts of trends, thoughts, and events come and go like the wind. I’ve experienced people with a vast range of skills and interests, and I’ve seen and heard dog and pony shows from more companies than I care to remember... I’ve learned a few random things about the industry itself that I wanted to share with all the good readers of TechRepublic. "
                                          IT - Social Media
                                          In Social Media, The Customer Really Comes First
                                          InformationWeek August 13, 2012
                                          "The customer is always right. Any organization that has paid only lip service to that adage will find itself at a distinct disadvantage as social networking platforms give customers not only a louder voice, but also one that can be heard far and wide in a matter of seconds.

                                          Real-time compliments, complaints, questions, leads, support … Welcome to the age of social CRM..."

                                            IT - Compliance
                                            5 Hidden Benefits of IT Compliance Programs
                                            Dark Reading August 13, 2012
                                            "The security community spends a lot of time worrying over the hidden costs of compliance and risk management programs--but what about the hidden returns? Creative technology executives can often find ways to gain far more value beyond risk mitigation or regulatory conformance from the monitoring and policy enforcement technology and procedures they put in place to support an IT security compliance program..."
                                            IT - Big Data
                                            Big Data Projects: 6 Ways to Start Smart
                                            InformationWeek August 13, 2012
                                            "There are three solid rules describing how to successfully introduce big data into an organization. Unfortunately, to paraphrase W. Somerset Maugham, no one knows what they are... Big data projects require more precision if they're to succeed in delivering analytic tools or frameworks with enough power to handle the volume, variety, and timeliness required to qualify as "big" data..."
                                            Data Scientist: Hot Big Data Job
                                            InformationWeek August 13, 2012
                                            "IT managers who have weathered a paradigm shift or two could be forgiven if they haven't taken to heart the many warnings of a critical, impending skills shortage in the market for big-data specialists.

                                            Every major new technology that comes along--which happens about ever two or three years--causes a skills shortage in the IT hiring market, according to Alice Hill, managing director of IT job-ad site"

                                              IT - BYOD
                                              BYOD Hype: What IT Leaders Really Think
                                              CIO Insight August 9, 2012
                                              "Enterprises are scurrying to develop BYOD policies and some IT leaders are actively embracing the trend. However, a recent study from telecom industry organization CCMI and mobile expense management company Xigo provides some insight into what IT leaders really think about BYOD. Despite the hype, a surprisingly large percentage of the 116 IT and telecom professionals surveyed nationwide in May 2012 said that BYOD isn't nearly the unstoppable force that so many industry observers claim it to be."
                                              BYOD Cost Sharing: Who Pays For What?
                                              Search Consumerization August 13, 2012
                                              "An effective bring-your-own-device strategy and implementation must consider the issue of BYOD cost sharing. To avoid misunderstandings about who pays for what, it's vital to set policies, educate users and put the necessary systems and support in place to ensure that funds flow quickly, smoothly and accurately..."
                                              Create A BYOD Policy
                                              Processor August 10, 2012
                                              "A BYOD policy should detail which employees are entitled to use the program and who will enforce the policy.

                                              Consider limiting the types of devices and OS versions you’ll support.

                                              Seek employee input when creating a BYOD policy to fully understand what employees need to do their jobs."

                                              Weak BYOD Security Endangering Company Data
                                              eWeek August 15, 2012
                                              "As more employees bring their smartphones, tablets and notebooks to work and businesses implement bring-your-own-device, or BYOD, initiatives to increase worker productivity, they may also be putting corporate data at risk due to a lack of adequate security controls and employee education, according to a survey conducted by Coalfire, an IT governance, risk and compliance services company.

                                              The majority of individuals are remain lax when it comes to mobile device security, especially how they store passwords, according to the study..."

                                              BYOD Improves Productivity, but Comes With Security Concerns
                                              CIO Insight August 10, 2012
                                              "The booming bring-your-own-device (BYOD) trend is bringing with it increases in employee productivity, but also continues to be a security headache for enterprises, according to two surveys from security software maker Trend Micro.

                                              The two surveys, released Aug. 8, reinforce what similar studies and reports have found: That the BYOD trend, fueled by the rise of smartphones and tablets, is not going away, and that businesses are increasingly accommodating it despite concerns about security and network management..."

                                              Top Ten Articles for last few Issues
                                              Vol 174 Issue 1 and 2; Vol 173 Issues 1, 2, 3 and 4; Vol 172 Issues 3, 4
                                              We track how frequently each article is viewed on the web site to determine which the readers consider the most important. For last week, the top 10 articles were:

                                              • Cloud Architecture for Dummies
                                              • Basic and Advanced System Services Administration in Oracle Solaris 11
                                              • The Offspring of OpenSolaris Continue to Emerge: OmniOS Is among the Latest
                                              • Getting to Know the Oracle StorageTek SL150 Modular Tape Library
                                              • Enabling 2 GB Large Pages on Solaris 10 8/11
                                              • White Papers for Applications on Engineered Systems
                                              • illumos and ZFS Training from Joyent
                                              • Oracle Virtualization Newsletter
                                              • Adam's new DTrace Favorite
                                              • Intermediate Perl: 2nd Edition: New from O'Reilly

                                              The longer version of this article has list of top ten articles for the last 8 weeks.

                                                LibreOffice 3.6 Released by The Document Foundation
                                                New Features, Tweaks Abound
                                                The Document Foundation has announced the release of LibreOffice 3.6, which provides a number of new features and incremental improvements over previous versions. Innovations range from features such as improved performance and interoperability to user interface tweaks, where theming has improved to more closely match current design best-practice. A full list with screenshots is available. Some of the innovations are a new CorelDRAW importer; integration with Alfresco via the CMIS protocol and limited SharePoint integration; color-scales and data-bars in spreadsheet cells; improved auto-format function for tables in text documents; high quality image scaling; and Microsoft SmartArt import for text documents.
                                                Top 10 New Features in NetBeans IDE 7.2
                                                By Geertjan Wielenga
                                                Geertjan Wielenga writes, "Start spreading the news! NetBeans IDE 7.2 is out with, as always, its clean and neat user interface."

                                                Here's are some of the top 10 features you'll find in this release:

                                                Static code analysis support, in particular, FindBugs integrtion; Smoother startup and faster project scanning; New, better, and faster tools throughout the Java Editor; Enhancements for Java EE developers, such as JPA code completion and PrimeFaces 3.2.

                                                Read on for all 10.

                                                Trending in
                                                Vol 234, Issue 2
                                                Trending IT Articles