News about Oracle's Solaris and Sun Hardware
System News
Aug 20th, 2012 — Aug 26th, 2012 Generate the Custom HTML Email for this Issue
System News System News for Sun Users
Volume 174, Issue 4 << Previous Issue | Next Issue >>
Sections in this issue:
click to jump to section

Etisalat Nigeria Implements Oracle Data Model, Exadata Database Machine X2-2
Communications Service Provider Accelerates Data Retrieval and Analysis by 99 Percent
By implementing Oracle Data Model on Oracle Exadata Database Machine X2-2 Half Rack Etisalat Nigeria, a leading Nigerian communications service provider, has accelerated its data retrieval and analysis processes by 99 percent. Etisalat can now load call detail records in near real-time, giving the company improved insight into customer behavior and the ability to prevent customer churn while delivering personalized promotions and identifying and addressing revenue leakage sources. Etisalat also implemented Oracle Business Intelligence Enterprise Edition 11g, which delivers increased efficiency in its business operations and additional contextual and actionable insight.
IT - Storage
DNA On Microchips: Big Data's Future Storage Answer?
InformationWeek August 22, 2012
"IT managers wondering how they'll ever fit enough hardware into overcrowded data centers to store all the video, social networking content, Web server logs, and other big data elements got a bit of good news last week: Storage media may be available to data centers in a few years that relies on technology millions of years old to store an unprecedented volume of data in an astonishingly small space.

In a paper published in the Aug. 16 issue of Science, a team of Harvard geneticists demonstrated a technique to store the entire 5.27 MB of content from a genetics text book in less than a thousandth of a gram of DNA layered on microchips instead of the usual metallic circuitry..."

IT - Technology
12 Cool Future Transportation Concepts
NetworkWorld August 15, 2012
"What will the planes, trains and automobiles of the future look like? Only time will tell, but many designs for concept transportation methods of the future involve using energy-efficient technology, increasing safety and mostly just making things more convenient for users. Here are a dozen concepts for the future of transportation..."
    Harvard Stores 70 Billion Books Using DNA
    ComputerWorld August 20, 2012
    "Harvard researchers have been able to use sequencing technology to store 70 billion copies of a yet-unpublished book in DNA binary code.

    The results of the project by researchers at Harvard University's Wyss Institute for Biologically Inspired Engineering at Harvard University were published last week in the peer-reviewed journal Science.

    "The total world's information, which is 1.8 zettabytes, [could be stored] in about four grams of DNA," said Sriram Kosuri, a senior scientist at the Wyss Institute and senior author of the paper, in a video presentation."

      How Police Tracked Down Steve Jobs' Stolen iPads
      NetworkWorld August 17, 2012
      "The digital breadcrumbs left behind when people use Internet-connected gadgets are what led California investigators to recover iMacs, iPads and other items stolen from the home of the late Apple CEO Steve Jobs.

      Based on the police report, obtained by the IDG News Service, here's how they did it..."

        IBM Solar Cell Semiconductors Set World Record
        CIO Insight August 20, 2012
        "In another one of its technological breakthroughs, IBM Research has set a world record for photovoltaic energy conversion.

        An article on the IBM Research blog, written by IBM Research photovoltaic (PV) scientists Teodor Todorov and David Mitzi, describes how IBM's Materials Science team has partnered with Solar Frontier, Tokyo Ohka Kogyo (TOK) and DelSolar to develop an efficient and affordable PV cell made of abundant natural materials..."

        'Talking' Smart Cars Begin Year-Long Test Aimed At Accident Reduction
        ComputerWorld August 22, 2012
        "Researchers hope they can sharply reduce the number of car accidents by enabling vehicles to communicate with each other -- and they're putting the theory to the test in Ann Arbor, Mich.

        On Tuesday, researchers at the University of Michigan launched a year-long test of what they're calling smart car technology. This project, according to the university, could reduce accidents involving unimpaired drivers by as much as 80%..."

          Technology's Dark Side: Devious Devices Designed to Harm You
          NetworkWorld August 21, 2012
          "We're accustomed to the idea of hackers trying to crack our computers, but today our TVs, cars, phones, and appliances are becoming increasingly vulnerable as we use technologies such as Wi-Fi, Bluetooth, RFID, cellular, and GPS to connect them.

          Though increased connectedness has been a boon to convenience and communication, a sinister flipside has emerged: More and more real-world objects are hackable, some with potentially frightening real-world consequences..."

            The Wild World of Wearable Computers
            NetworkWorld August 20, 2012
            "Imagine wearing shoes that reveal your precise weight distribution when standing, walking, or running (Moticon); a tattoo that vibrates when you have incoming calls and messages (Nokia); or an armband that tracks how many calories you've burned in a day (Nike+ FuelBand).

            Or, imagine wearing a stylish ring that converts to a Bluetooth earphone (O.R.B. 'Orbital Ring Bluetooth'); a silver lapis lazuli Bluetooth necklace (Novero); or a pair of video eyewear goggles that includes a handheld media player so you can watch movies up close..."

              IT - Cloud
              2 Cloud Computing Era Myths Debunked
              InformationWeek August 22, 2012
              "There is no doubt that IT shops are increasingly using software's built-in configuration tools rather than coding their own customizations, and there are several reasons for the move toward configuration. For starters, IT teams have been complaining for years about the burden of maintaining their ERP, CRM, supply chain management, human capital management and other enterprise apps. More than half (54%) of the 338 business technology professionals who responded to our just-released InformationWeek 2012 Enterprise Applications Survey cite "changing, upgrading or optimizing existing applications" as their most time-consuming challenge..."
              Cloud and Staff Rights: Where Does The Law Stand?
              TechRepublic August 21, 2012
              "Organisations moving processes and services to the cloud are bound to be thinking about the impact any move might have on staff rights. Employers know how existing regulations can apply to typical IT outsourcing, which often entails loss of employment or changes to staff terms and conditions, but may be wondering how those rules relate to the cloud.

              With outsourcing, a series of cross-indemnities and related provisions in contracts offer protection against the automatic transfer of employees, including the costs of dismissals and changes to terms. But it is not yet clear how the existing traditional principles will apply in the context of the cloud..."

                Cloud Computing Goes Mainstream
                Baseline August 20, 2012
                "More than eight in 10 companies currently deploy cloud computing solutions or services, and more than 50 percent plan to increase their cloud investment by 10 percent or more in 2012, according to the latest "Annual Trends in Cloud Computing" survey from CompTIA. These numbers reflect a notable rise in mainstream acceptance of cloud computing, as 85 percent of survey respondents now feel more positive about the cloud than they did last year. And IT departments are having to adjust by adding employees with cloud-friendly skill sets. "Internal IT departments are on the edge of major transformation," says Seth Robinson, director of technology analysis for CompTIA..."
                'Shadow IT' Can Be the Cloud's Best Friend
                InfoWorld August 17, 2012
                "It's easy to see why users resort to shadow IT: Employees charged with running profit centers see a need for a specific type of technology. Rather than fight through IT's red tape and endless meetings, they go out and get what they need. Indeed, a PricewaterhouseCoopers study finds as much as 30 percent of IT spending coming from business units outside the official IT budget..."
                Why Woz Is Unhappy With the Cloud
                InfoWorld August 22, 2012
                "Continuing his recent mantra, Apple co-founder Steve Wozniak (popularly known as "Woz") has more words of caution about cloud applications, warning that users lack control over these systems. But Wozniak is no anti-cloud zealot. In fact, he supports it, but anticipates a rough road ahead for cloud users.

                Wozniak says the basic issue is that users don't own anything in the cloud. People can get used to a feature in the cloud and then suddenly it is gone or changes. "Anything can change instantly. The way things work, a feature can disappear, a product can disappear on the cloud," Wozniak said at a meeting of the Churchill Club business group..."

                  IT - CxO
                  Five Reasons Why Your Top Talent Leaves, and How to Keep Them
                  CIO Insight August 7, 2012
                  "You'd think all of your employees would be holding on to their positions tightly as unemployment remains high, but for those with highly-valued skills, it is still a seekers market and companies have to compete to retain top performers. How can CIOs make sure their teams are happy and continue to put forth their best efforts instead of sending out resumes? In the book, "The 7 Hidden Reasons Employees Leave: How to Recognize the Subtle Signs and Act Before It's Too Late" (Amacom/Available in August), author Leigh Branham reveals seven of the most common remarks made at exit interviews on why employees are seeking greener pastures..."
                    9 Ways to Cut Outsourcing Consulting Costs
                    CIO August 9, 2012
                    "At a going rate of $350 per hour and up, IT outsourcing consultants don't come cheap. If IT leaders aren't careful, the cost of third-party assistance in setting up an IT services deal can quickly spiral out of control. And that's not even counting the attorneys' billable hours.

                    While it may be unlikely that IT executives would set up a major outsourcing deal without third party consultation—at the very least, to incorporate current market intelligence and pricing—there are ways to cap consulting costs..."

                      6 Recruitment Rules for HR, IT
                      InformationWeek August 17, 2012
                      "Try as they might to hire just the right candidate, HR professionals can miss the mark when it comes to recruiting IT professionals. Software engineers with subpar skills, developers with the wrong certifications, network administrators who don't fit the corporate culture--they all can be the unfortunate by-products of an HR manager who doesn't find the right talent for an IT team..."
                        Coaching Employees through Strategic Changes
                        Baseline August 16, 2012
                        "Strategic change is inevitable for most businesses, but how that change is executed determines its success or failure. The key ingredient to properly executing a new company strategy is management. Unfortunately, right now most managers are approaching strategic change all wrong.

                        Often, when a company decides to make a strategic shift, the leaders gather in a boardroom, record their thoughts in a slide presentation and pat each other on the back. But then what? How does what’s in those slides get communicated across the business? How do the people who will be responsible for bringing the strategy to life find out what that strategy is and get behind it with commitment?..."

                        Investing For Transformation In 2013
                        ComputerWorld August 22, 2012
                        "For many organizations, now is the time for annual strategic planning and for identifying where to invest in IT initiatives in 2013 and beyond. One of the key questions faced every year is deciding, given a limited budget, on the most attractive investment choices to make and on the percentage of the investment that should go toward core, adjacent and transformational projects.

                        A recent Harvard Business Review article points out that a typical allocation is something like 70/20/10, with 70% of the investment going into the core business, 20% into adjacencies and 10% into new, transformational initiatives..."

                          IT Succession Planning Inconsistent Across Government
                          Federal Computer Week August 21, 2012
                          "A newly released white paper reveals federal human capital practitioners have a better understanding than IT managers of how to plan for the next generation of IT leaders.

                          The American Council for Technology and Industry Advisory Council announced Aug. 21 the results of a study that examines the state of succession planning practices across the federal government set forth by ACT-IAC's Human Capital Shared Interest Group. The study looked at why succession planning isn’t always consistently executed across government..."

                            IT Vendors: A CIO's Adversaries or Allies?
                            CIO Insight August 17, 2012
                            "It amazes me the way some CIOs treat their vendors. I totally get the need to negotiate good terms for your organization (as any vendor who has done business with me can attest). I also understand that you need to hold your vendors accountable for delivering the value for which you are paying. However, many CIOs try to squeeze the last penny of margin out of a deal and use their contracts with IT vendors like newspapers that they roll up to smack them over their noses..."
                              Top Challenges Facing Healthcare CIOs
                              NetworkWorld August 21, 2012
                              "Each vertical market presents its own challenges to CIOs, but few offer as many obstacles as the healthcare industry. They must balance stringent security and privacy regulations with a pressing need to improve IT infrastructure and a mandate to implement electronic health record (EHR) software—all amid the political firestorm of healthcare reform, increasing pressure to cut costs, general reluctance among health care professionals to trust technology and a shortage of IT talent in the industry. The 12 issues presented here all come with their own challenges and stakeholders, while the consequences for failing to address them vary tremendously..."
                              IT - DR
                              Doyenz: The Risks of Using the Cloud for Business Continuity Come Home to Roost
                              Continuity Central August 2012
                              "While discussions about the risks of using cloud-based services as business continuity strategies have tended to focus on the issues of data security and protection, the second high profile shut-down of a business continuity focussed cloud service in six months highlights a third major risk: the supplier itself.

                              Earlier in the year Continuity Central reported on Google’s decision to close its Message Continuity service. Google gave most clients a reasonable timescale to find an alternative supplier, allowing existing Message Continuity contracts to run until their expiry date..."

                              The 10 Commandments of Emergency Management
                              Emergency Management August 15, 2012
                              "It was Sunday morning and my wife and I had skipped church. I was in the backyard pruning a burning bush when a voice came into my head and suggested that I could do penance by writing about the ten commandments of emergency management. The woman’s voice said she would show me the way. The conversation went something like this:..."
                              Full circle?
                              Continuity Central August 2012
                              "The one thing that almost all business continuity professionals agree upon is that business continuity management originated in IT disaster recovery (ITDR). Until very recently I would have argued that ITDR was no longer a core issue for business continuity practitioners in multi-national or global organizations. Although the risks of IT failure were extensive and the potential impact massive, the probability of those risks being manifest was very much under control. The sheer expenditure and sophistication of ICT in major organizations should have designed resilience into the infrastructure so that IT failures were largely invisible to customers and other external stakeholders..."
                              IT - PM
                              What Do You Do When a Stakeholder Is Not Honest?
                              Bright Hub PM October 30, 2011
                              "Are you suffering from dealing with dishonest stakeholders whether they are clients, vendors or team members? If so, you need to learn where the dishonesty is coming from and stop it in its path. Some of the reasons people lie may surprise you.

                              There are a number of reasons why stakeholders may not be so truthful. To start off, for those new to project management, let’s remember stakeholders can be a team member, management, vendors or suppliers and clients—or anyone involved in the project at hand that has a “stake” in the project..."

                              IT - Networks
                              11 Ways around Using More Spectrum for Mobile Data
                              NetworkWorld August 17, 2012
                              "Despite widespread calls for more spectrum to carry mobile data, there is a wide range of technologies already being used or explored that could help to speed up networks or put off the day when more frequencies need to be cleared.

                              Spectrum is the lifeblood of mobile services. The planned purchase by Verizon Wireless of 20MHz of spectrum from a group of cable operators, which the U.S. Department of Justice approved on Thursday, is the latest sign of how important this invisible resource is to mobile operators..."

                                Eight Trends That Are Changing Network Security
                                IT Business Edge August 22, 2012
                                "Technology in the network security space has been through many dramatic changes recently. New mobile operating systems, growing use of personal devices, and Software-as-a-service (SaaS) delivery make securing the network a growing challenge. Enhancements in the network infrastructure that connect devices within or across the network make all these developments possible. We’re seeing ever faster network connections, more remote users, and extensive upgrades to mobile networks. We need to think about security policies and where and how to provide protection. The slideshow features eight trends, identified by Sophos, they think will impact network security and your security strategy..."
                                SDNs: Love 'em or Leave 'em?
                                NetworkWorld August 20, 2012
                                "Are Software Defined Networks (SDN) on your short list yet? Two recent surveys suggest it depends on where you work. I say that given our recent experiences with SDN, within five years and everyone will adopt or have definitive plans to adopt SDN technology. Here’s why: ..."
                                  Thoughts from the SIP Trunking Road Show
                                  No Jitter August 20, 2012
                                  "SIP Trunking proved to be a popular topic at the recent Enterprise Connect four-city Road Show and Virtual Event. The tour attracted enterprises that were considering this "new" technology but hadn't yet deployed it. At three of the four tour stops, I presented a session on the status of the SIP Trunking world and facilitated a panel of industry providers. (At the fourth Tour stop, Las Vegas, these sessions were handled by Jim Allen, who has delivered a portion of the SIP Trunking tutorial at the past 2 Enterprise Connect Orlando shows.).."
                                  Self Service: The Most Understated Reason Why SDNs Will Rock Your World
                                  NetworkWorld August 21, 2012
                                  "As I noted previously, two surveys give different pictures about SDNs. My take: every enterprise will adopt SDNs, but lower hardware prices will not be the biggest reason. Here’s why:

                                  To hear proponents tell it, Software Defined Networks (SDNs) are going to commoditize switching and routing, moving all the expensive intelligence software created by the infrastructure vendors into open software running on a server. While I think there’s some truth to it, an upheaval in the switch and routing market due to lower physical switch and router price isn’t the major benefit for many enterprises..."

                                  IT - Operations
                                  Why Facebook's New-Gen Data Center Leads by Example
                                  eWeek August 16, 2012
                                  "In the midst of the wide open spaces of farm and grazing land surrounding this central Oregon town of 9,253 has been born a new type of farm: one that produces Web services that interconnect people. And like horses, cows and sheep on the grasslands, this one also requires water, fresh air and plenty of space.

                                  The new farm, of course, is mechanical and needs electricity -- lots of electricity. That's why Facebook, the world's largest social network with close to 1 billion registered users, decided about four years ago to build its first wholly owned data center in Prineville, about 140 miles east of Portland..."

                                    The 5 Common Failures of Equipment Management
                                    Emergency Management August 16, 2012
                                    "I have been asked by six different emergency management systems to examine why their equipment management processes have failed and to make recommendations for change. In all cases it has boiled down to five reasons. Here's what I found out. The good news was that all five reasons have solutions..."
                                    IT - Security
                                    Security Manager's Journal: At Budget Time, You Ask and Hope to Receive
                                    NetworkWorld August 13, 2012
                                    "It's budget time again, which is a good chance to assess our information security defenses and decide which areas we can best afford to beef up. Here's a look at what I think we'll be able to add this year..."
                                    Changing Risk Assessment Practices
                                    HelpNet Security August 23, 2012
                                    "Avoiding the use of software as a service (SaaS) for critical or sensitive data remains a significant form of risk control for many organizations, according to Gartner. But those that do use SaaS for such data are more likely to use it for sensitive data than for mission-critical data.

                                    These findings are based on Gartner's latest annual survey of the state of risk management programs globally, which questioned 425 respondents from IT risk management disciplines in the U.S., U.K., Germany and Canada from December 2011 to January 2012..."

                                    60-Minute Security Makeover: Prevent Your Own 'Epic Hack'
                                    ComputerWorld August 23, 2012
                                    "How's this for a digital nightmare? Your Twitter account hijacked; racist and homophobic tweets posted in your name. Your Apple account breached; data wiped from your iPhone, iPad and Mac laptop. Your Gmail password reset by hackers and your Google account deleted.

                                    That's what happened to Wired journalist Mat Honan recently. And while news coverage of his "epic hack" may be easing, you can bet there's an army of would-be imitators who, as you read this, are trying to duplicate that attack..."

                                    How to Secure Data by Addressing the Human Element
                                    CIO August 15, 2012
                                    "Regardless of the security expertise and resources you apply to securing your assets, you are unlikely to achieve much unless you focus on the most vulnerable element of your organization: your employees.

                                    "Computers have become much more secure over the past 15 years, but humans have not," says Lance Spitzner, training director for the Securing the Human program at SANS Institute, a cooperative research and education organization focused on security certification. "The human really has become the weakest link..."

                                    Porous Network Perimeters Sometimes Caused By People
                                    Dark Reading August 16, 2012
                                    "Maybe it's a stretch, but I see definite parallels in the recent news stories about Daniel Castillo, the jet skier who successfully evaded John F. Kennedy International Airport's $100 million security system, and this week's discovery of a man-in-the-browser attack using the Citadel Trojan that had compromised the virtual private network (VPN) of a major international airport hub.

                                    The common factors that bind both events? Insufficient security measures and inattentive employees..."

                                    The Privacy Cat Is Out Of the Bag
                                    NetworkWorld August 17, 2012
                                    "There comes a point in many situations where you have to recognize that the cat is not only out of the bag, it has stolen your wallet and your car keys and has taken the I-15 to Vegas.

                                    And such is the case when it comes to monitoring and privacy. For example, The New York Times reports that German legislators have reopened their investigation into Facebook (do they call it "GesichtBuch" there? Probably not)..."

                                    Tips To Keep Kids Safe Online
                                    HelpNet Security August 16, 2012
                                    "Malware is just a step-away when children click on games, free shoes, Justin Bieber videos or gift cards offered on social networks. Hackers use social engineering techniques to exploit kids’ curiosity and easily convince them to click on appealing surveys and videos. These may expose computers to malware, which grabs sensitive information and sends it to a remote machine controlled by cyber criminals..."
                                      Your Biggest Risk: People with Good Intentions (But Bad Education)
                                      Dark Reading August 20, 2012
                                      "In case you didn't see the recent report by CNNMoney's Stacy Cowley from the Def Con 20 hacker convention in Las Vegas, "How a lying 'social engineer' hacked Wal-Mart," Cowley reports on the contest winner who captured every data point possible in a 20-minute conversation with a small-town store manager.

                                      It was the third year for the hacking contest that uses only social engineering, not technology, to get the information needed to breach security at large corporations..."

                                      IT - Careers
                                      How I Organize Everything with Plain-Text Notes
                                      IT World August 20, 2012
                                      "Like everyone else, I need to keep track of lots of bits of information. Some of those bits are as simple as the brand of salad dressing my wife likes; others are as complex as an outline for a multi-year project at work. Whatever the size, origin, and purpose of these bits, I keep track of them all by saving them in a reliable system of plain-text notes--a system that enables me to find any bit of information whenever I need it, in a form that makes sense to me when I do.

                                      This system is based on two simple principles: All notes are saved in plain-text files, and I follow some basic but strict guidelines for creating and storing them..."

                                        Ten Surefire Ways to Get Promoted
                                        Baseline August 16, 2012
                                        "Do you feel like you've hit the proverbial glass ceiling, promotion-wise? The reality is that advancing in an organization involves far more than just being extremely competent at your job. Politics will play a role, of course, but you'll gain an even more advantageous position by finding ways to make yourself more well-rounded and valuable to your entire company—as opposed to just being the resident tech whiz. Creating this edge inevitably involves taking part in interdepartmental meetings and projects and attending industry events..."
                                          The Five Hottest IT Trends of 2012, So Far
                                          TechRepublic August 15, 2012
                                          "As part of what we do at TechRepublic we talk to a lot of CIOs who are planning budgets, IT professionals who are planning projects, and IT vendors who are selling products. That gives us a lot of valuable insights into which way the winds are blowing in IT. With that in mind, it’s time to take a look at the IT trends that have the most momentum behind them so far in 2012.

                                          Let’s count them down..."

                                            Top 12 Recession-Proof IT Jobs
                                            Global Knowledge August 2012
                                            "According to the U.S. Bureau of Labor Statistics, the most recent recession began in December, 2007 and ended in June, 2009. While that may technically be true, many of the statistics that describe the current economy have yet to return to their pre-recession values. Today, a number of IT professionals question whether job stability within IT is a thing of the past, based on current trends.

                                            Recession-proof? Recession resistant? The idea is that certain skills exist for which demand outweighs supply..."

                                              IT - Social Media
                                              6 Tips for Avoiding a Social Media Debacle
                                              Insurance Technology August 17, 2012
                                              "Insurance executives in IT and marketing know that social media is a double-edge sword. It is a fantastic way to build customer engagement, communicate in a timely manner and to enhance the brand, but it also can enable miscommunications, complaints and a poor image. The blowback against Progressive Insurance when a series of cold-hearted-sounding “robotweets” it issued regarding its responsibilities toward a deceased policyholder angered the customer’s brother – and his followers in the blogosphere – shows how easily social media prowess can turn into clumsiness..."
                                                Are Social Media e-Discovery's Next Nightmare?
                                                IT World August 21, 2012
                                                "People who have been involved in the challenges of e-discovery for a while remember when email arrived on the scene nearly two decades ago. It changed the way people collaborate and left companies with mounds of digital information that was costly and time-consuming to sort through when litigation struck.

                                                The arrival of social media is in many ways a repeat of those challenges. As was true of email, social media comes with new metadata and formats. But because of the similarities, there is an opportunity to avoid the mistakes made with email. One thing is clear: Companies that dive into social media without the right policies and solutions to govern usage will encounter information governance and e-discovery nightmares down the road..."

                                                  IT - Virtualization
                                                  Crisis Malware Infects VMware Virtual Machines, Researchers Say
                                                  NetworkWorld August 21, 2012
                                                  "The Windows version of Crisis, a piece of malware discovered in July, is capable of infecting VMware virtual machine images, Windows Mobile devices and removable USB drives, according to researchers from antivirus vendor Symantec.

                                                  Crisis is a computer Trojan program that targets Mac OS and Windows users. The malware was discovered by antivirus vendor Intego on July 24 and can record Skype conversations, capture traffic from instant messaging programs like Adium and Microsoft Messenger for Mac and track websites visited in Firefox or Safari..."

                                                  IT - Compliance
                                                  7 Reasons the FTC Could Audit Your Privacy Program
                                                  ComputerWorld August 21, 2012
                                                  "The Federal Trade Commission's $22.5 million settlement with Google last month over its user-tracking practices woke up enterprise-risk managers around the country. With penalty thresholds hitting this new range of pain, publicly traded companies now have to ask whether data privacy should be included in their Securities and Exchange Commission filings as a key risk.

                                                  What would it take, though, for the FTC to open up an investigation of your company?"

                                                  Community Cloud Not a Cure-All for Cloud Compliance
                                                  Search Cloud Security August 22, 2012
                                                  "Use of cloud technology continues to grow, but compliance and regulatory factors are still a concern. According to Information Security magazine and’s 2012 Priorities survey, almost 52% of 811 respondents said meeting industry-specific standards and regulations is a top compliance/legal concern. One increasingly popular strategy to help address compliance-related issues is the community cloud deployment model."
                                                  Oracle Solaris Cluster 4.0 and Oracle Solaris 11 Software Supported on Third Party Storage
                                                  Partners Seek Certification; EMC, Hitachi Data Systems, HP/3PAR, IBM and NEC Already Certified

                                                  Oracle Solaris Cluster 4.0 Oracle Solaris Cluster software has a validation tool called OSCATE (Oracle Solaris Cluster Automated Test Environment) that is used to verify that the storage under test meets all the requirements for successful integration with Oracle Solaris Cluster. This means that Oracle Solaris Cluster can be safely used with different storage technologies such as FC, SCSI, iSCSI and NAS on Oracle storage and third party storage. Oracle's third party storage partners are diligently working towards certification with Oracle Solaris Cluster 4.0 and Oracle Solaris 11 software. Partners now certified are EMC, Hitachi Data Systems, HP/3PAR, IBM and NEC.

                                                  Oracle IT Storage Is Edging Out NetApp, EMC
                                                  Sun ZFS Storage Appliance Surpasses the 100PB Mark
                                                  In its continuing storage upgrade program to outpace NetApp and EMC, Oracle has reached 103 Petabytes (PB) of IT storage on Sun ZFS Storage Appliances. With Oracle Customer IT and On Demand "cloud" alone, customers can experience ~3.2 billion business critical database transactions per hour. Oracle IT realized 3:1 consolidation of existing NAS platforms, and 12x faster compute farm workload benchmarks using the industry-leading performance and efficiency of ZFSSA. Readers can find complete details in the white paper "Oracle IT Reaps the Benefits of Storage Modernization," which claims the Sun ZFSSA can deliver three times the throughput of a NetApp system.
                                                  IT - Big Data
                                                  4 Questions to Ask Before Starting a Big Data Initiative
                                                  NetworkWorld August 21, 2012
                                                  "Through many surveys, executives have identified that big data initiatives rank high on the projects lists for 2012 and 2013. It's not surprising, since the promise that big data can improve and streamline presentations, gain insights to consumer purchasing habits and, in the healthcare industry, even help save lives is simply too important to ignore.

                                                  However, several key questions must be answered:..."

                                                  Big Data: We've Got Big Plans, Say CIOs
                                                  TechRepublic August 21, 2012
                                                  "Over the past decade, most organisations have become experts in creating - and hoarding - huge amounts of raw data, but less good at actually squeezing out any useful information.

                                                  But now big data holds the promise of taking the huge reservoir of unstructured data that every company holds and finding the hidden gems within it, in near to real time.

                                                  And while big data is still an emerging technology and is most often associated with the biggest organizations, in fields such as pharmaceuticals and banking, it seems there is pent-up demand from organizations of all sizes keen to get more benefit out of their vast data stores..."

                                                  Does Big Data Mean Big Security Issues?
                                                  InformationWeek August 17, 2012
                                                  "The volume of data that businesses collect is exploding exponentially: financial transactions, location-based data, customer interactions, the supply chain, etc. Apart from that, there is data created by employees, contractors, partners and suppliers with the use of social networking sites, intranets, extranets, corporate wikis and so on. The amount of bytes being created on a daily basis is truly mind boggling. In 2011, IDC estimated that 1.8 billion Terabytes of data was created, 90 percent of which was created in a non-structured fashion. IDC further projects that unstructured data will grow at more than 60 percent compounded annually..."
                                                  IT - BYOD
                                                  BYOD 2.0 and Spotting the Next Big Trend
                                                  HelpNet Security August 22, 2012
                                                  "In the 1960s and 70s the IT department was seen as a secret place ruled by powerful niche experts. They had total control of the department and who could access systems. The PC and its software allowed people to spread their wings. At first, some in the IT department viewed the PC with derision. It certainly wasn't going to threaten their jobs. It wasn't networked. It couldn't connect to the outside world and it had a tiny memory, comedic floppy disks and a screen!"
                                                    BYOD: What We Can Learn From China
                                                    InfoWorld August 23, 2012
                                                    "Most of us won't buy the latest iPhone until our two-year wireless contract is up. The smartphone costs too much without the wireless carrier subsidizing it. But that's not true in major Chinese cities such as Hong Kong, Beijing and Shanghai, says Stanley Li, CEO of San Francisco-based Netswitch.

                                                    Li has worked overseas for years and watched mobile hysteria consume young professionals. Smartphones from the likes of Samsung, Apple, HTC, Sony Ericsson, and others are gobbled up as soon as they hit the market. Consumers are prepared to pay full price, he says, and will buy a new phone every year..."

                                                    Top Ten Articles for last few Issues
                                                    Vol 174 Issue 1,2 and 3; Vol 173 Issues 1, 2, 3 and 4; Vol 172 Issue 4
                                                    We track how frequently each article is viewed on the web site to determine which the readers consider the most important. For last week, the top 10 articles were:

                                                    • illumos tools for observing processes
                                                    • Pre-Flight Checker for Solaris 11 Now Available in New Version
                                                    • Ellison on the Oracle Cloud
                                                    • LibreOffice 3.6 Released by The Document Foundation
                                                    • Oracle Virtual Desktop Infrastructure Aligns with the Experts.
                                                    • Oracle Secure Global Desktop 4.7 Released to General Availability
                                                    • Oracle Exalogic Elastic Cloud Handbook
                                                    • Top 10 New Features in NetBeans IDE 7.2
                                                    • Java SE 7 Update 6, JavaFX 2.2 and JavaFX Scene Builder 1.0
                                                    • Proprietary Vendors Finding Open Source Development an Attractive Course

                                                    The longer version of this article has list of top ten articles for the last 8 weeks.

                                                      IT - Server
                                                      5 Systems You're Forgetting To Patch
                                                      Dark Reading August 22, 2012
                                                      "While many security advocates would likely argue that today's organizations still have lots of work to do with their endpoint patch management practices, many organizations have automated their Windows system updating procedures and are slowly dialing in their third-party application patching. But even with that progress being made, there is a whole rag-tag class of systems--many of them extremely critical--that frequently run unpatched and ridden with vulnerabilities..."
                                                      Before, During and After Patch Tuesday: A Survival Guide
                                                      IT Business Edge August 22. 2012
                                                      "It’s been said that there are only two types of companies left in the world: those who know they’ve been hacked and those who don’t. We have to hope that there’s still a third group: those who have not been hacked. You can be sure those who belong to the third group are those who are rigorously implementing security features and, more importantly, keeping them updated..."
                                                      The Technology Economics of the Mainframe
                                                      Wall Street Technology August 14, 2012
                                                      "Contrary to conventional wisdom, mainframe computing is growing. In fact, financial services has been passed by only a few sectors in terms of growth in mainframe MIPS, or million instructions per second. But maybe this is good news: Multiyear results show that "mainframe-heavy" organizations are more economically efficient in supporting business computational demands and have more upward scalability than distributed-server-heavy organizations..."
                                                        Managing the Solaris 11 Firewall in the Cloud
                                                        Blog Provides Script that Eliminates Need for Expensive Security Hardware

                                                        The firewall feature included in Oracle Solaris 11 precludes the need, in the cloud, for expensive network hardware while it also makes possible changes to network configurations that can be made quickly and easily. Orgad Kimchi provides the script that allows users to manage the Solaris 11 firewall. The script, Kimchi writes, runs on Solaris 11 (global zone) and Solaris 11 Zone with exclusive ip stack (the default).

                                                        Trending in
                                                        Vol 235, Issue 2
                                                        Trending IT Articles