News about Oracle's Solaris and Sun Hardware
System News
Sep 3rd, 2012 — Sep 9th, 2012 Generate the Custom HTML Email for this Issue
System News System News for Sun Users
Volume 175, Issue 1 << Previous Issue | Next Issue >>
Sections in this issue:
click to jump to section


SPARC
x
The Future of the SPARC T5 in Oracle's Big Iron Lineup
Timothy Prickett Morgan Reports from Hot Chips
Reporting on this year's Hot Chips event in Cupertino, CA, Timothy Prickett Morgan speculates on the future of the SPARC T5 chip in Oracle's apparent growing interest in big iron featuring multithreaded processors in terms of cores and sockets. In his view, the scalability enhancements coming from the SPARC T5 machines, sporting faster cores that can do superior single-threaded work, will be big enough for all but the absolutely largest Solaris workloads. Prickett Morgan devotes a substantial part of his article to looking at the history of the SPARC T3, T4 and T5 chips and their family resemblances.
Virtualization
x
Oracle VM VirtualBox 4.1.20 Newly Released
Maintenance Release Fixes Bugs, Improves Stability
The Fat Bloke reports the recent release of Oracle VM VirtualBox 4.1.20, a maintenance release containing bug fixes and stability improvements. Complete details are available in the changelog.
IT - Storage
x
How Data Maps Can Control eDiscovery Costs While Recouping Storage Capacity
Enterprise Systems September 3, 2012
"Current regulatory, compliance, and legal requirements are forcing organizations to get a better understanding of their data assets, manage it according to policy and purge what is no longer required. Gartner states that "The challenge is intensifying as data grows at a rate of 40% to 60% every year." (Gartner, Organizational Collaboration and the Right Retention Policies Can Minimize Archived Data and Storage Demands, Alan Dayley and Sheila Childs, June 2012)..."
The End of Optical Storage? It's Here
NetworkWorld August 30, 2012
"I wasn't surprised to read this article in Computerworld, discussing Sony's shutting down of its optical drive (CD, DVD, and Blu-Ray) unit next year. Sony was one of the inventors of optical storage, and, having both studied and used these products throughout their history (the advent of the CD, especially for music consumed by other than purists who like the sound of scratchy phonograph records, was one of the watershed moments in the history of high fidelity audio, let alone its impact on data storage, especially in setting up the death of the once-great-itself floppy disk), I can tell you that there was at one point serious discussion of how optical would eventually replace magnetic storage..."
IT - Technology
x
Bristol Scientists Develop Quantum Chip for Un-Hackable Mobile Phones
TechWorld September 3, 2012
"An international research team based at the University of Bristol has reportedly developed a new quantum chip that could enable the creation of ultra-fast computers and unhackable mobile phones.

According to a report in the Financial Times, the quantum chip is made from silicon, and is thousands of times smaller than the glass chips used previously. This means it is compatible with modern electronics and could be integrated with conventional microelectronic circuits..."

    Fiber Optic "Magic Carpet" Network Could Help Predict Falling Injuries
    NetworkWorld September 4, 2012
    "Scientists have demonstrated a fiber optic-based "magic carpet" that can detect when someone has fallen and could be used to help predict health problems that lead to other accidents in the future.

    Scientists at the University of Manchester in the UK last week showed their magic carpet made of plastic optical fibers, that bend when anyone treads on it and relay the activity to a computer which in turn can map, in real-time, their walking patterns..."

    Ways High Tech Is Changing the NFL
    Baseline August 30, 2012
    "In the early years of football, the forward pass was considered the height of innovation. But pro football has come a long way since those humble beginnings. Indeed, with the NFL Network devoted to the game 24/7/365—and a host of streaming, mobile apps and on-demand options—football very much represents the digital age. This extends both to action on the field and the way franchises have evolved with respect to team-building and game-planning..."
      Wearable Medical Technology Set To Take Off
      InformationWeek September 4, 2012
      "Mobile health devices that track vital signs are ready to take off, IMS Research predicts. According to a report on wearable technology, which includes devices such as glucose and heart monitors, the market was worth $2 billion in 2011 and will reach $6 billion by 2016. Correspondingly, 14 million wearable devices were shipped in 2011, and that number will likely rise to 171 million in 2016..."
      When Bad IAM Kills
      Dark Reading September 4, 2012
      "In health care organizations, the log-in processes that give emergency care physicians access to critical information can be so unwieldy they can potentially lead to "death by clicking," where precious moments are lost due to inefficient IAM and patients die as a result. While this is case-specific to health care, no matter what vertical you're in, bad IAM leads to all sorts of detrimental effects on the business -- ones that technology like single sign-on (SSO) and good IAM practices can drastically reduce, IT experts say..."
      Is Your ISP Spying On You?
      NetworkWorld September 4, 2012
      "Arcticsid asked the Answer Line forum if his ISP can "sit back...watch a screen, and see everything you are doing at any given time?"

      Not quite, but it's frightening close. Your Internet service provider tracks what IP addresses you contact, which effectively means they know the web sites you're visiting. They can also read anything you send over the Internet that isn't encrypted. Whether they actually do that is an open question..."

        Solaris
        x
        20 Solaris 11 How-To Articles
        Links to Solaris 11 White Papers, Solaris 11 Spotlights Pages
        In one handy page on Oracle.com readers will find links to 20 papers on managing Solaris 11 that range over such topics as installation; system configuration; data management; networking; software management; virtualization; and development. The page also includes links to the Oracle Solaris 11 White Papers page and to the Oracle Solaris 11 Spotlights page.
        'Oracle Solaris 11 System Administration: The Complete Reference'
        First Solaris 11 Book now Available for Readers
        "Oracle Solaris 11 System Administration: The Complete Reference," a book written by Michael Jang, Harry Foxwell, Christine Tran and Alan Formy-Duval for Solaris admins, Linux admins and developers, and even those somewhat unfamiliar with UNIX, is now available. Co-author Foxwell explains that the book covers the Oracle Solaris 11 11/11 release. Content is not expected to change much as a result of the next Solaris 11 release. Foxwell also writes that the book complements the extensive Oracle Solaris 11 Information Library, and covers the main system administration topics of installation, configuration, and management.
        Linux
        x
        Making Oracle Linux "Even More" Secure by Default
        A Two-part How-to by Ginny Henningsen
        Ginny Henningsen has written a two-part series on hardening the secure by default Oracle Linux defenses against exploitation by outsiders. The first part discussed hardening the OS itself by removing unused software packages and minimizing network services. In part 2 Henningsen reviews procedures and frequently used tools that administrators can employ to safeguard Oracle Linux systems, monitor potential threats, and detect compromise in the event it does occur.
        IT - Cloud
        x
        10 Keys to IT Success in the Era of Private Clouds
        SlashDot August 22, 2012
        "IT departments are reluctant to acknowledge it, but their users now expect the high levels of flexibility and immediacy associated with today’s leading cloud services. While forward-thinking IT managers are moving to meet those expectations and deploy more comprehensive private cloud services, they often encounter a number of unforeseen challenges—in particular building a collaborative service delivery relationship with users—as they try to balance the levels of control they are accustomed to with the many user demands they are trying to meet."
          Cloud Computing Confusion Reigns
          CIO Insight August 29. 2012
          "Most Americans are confused by the term "the cloud" and do not associate it with the IT business, according to a recent survey. The survey of more than 1,000 American adults was conducted in August 2012 and shows that while the cloud is widely used, it is still misunderstood.

          The national survey by Wakefield Research, commissioned by Citrix, showed that most respondents believe the cloud is related to weather, while some referred to pillows, drugs and toilet paper. However, even those who don't know exactly what the cloud is recognize its economic benefits and think the cloud is a catalyst for small-business growth, the survey showed..."

            Cloud Computing's Me-Too Problem: Little Boxes All The Same
            InfoWorld September 4,2012
            "I've been a big fan of "Weeds" on Showtime, now in its eighth season. If you're a fan, you know that the show have went back to its original theme music, "Little Boxes" by Malvina Reynolds: "Little boxes on the hillside/Little boxes made of ticky tacky/Little boxes on the hillside/Little boxes all the same."

            Although the song's lyrics are about cookie-cutter suburban developments, they remind me of the cloud computing market, whose technology seems to be becoming "little boxes all the same."

            The Cloud - Business Continuity at Affordable Pricing?
            IT Director September 6, 2012
            "Many organisations look to the cloud to provide some level of contingency against their own systems going down, be it off-site data backup, failover servers for business applications, or the use of high-availability servers and software. The level of disaster recovery (DR) and business continuity (BC) a given organisation chooses to put in place will vary according to its own risk appetite and budget.

            The degree to which cloud services are suitable for providing a safety blanket will vary from one case to another. So which one is right for your organisation?..."

            IT - CxO
            x
            12 'Best Practices' IT Should Avoid At All Costs
            InfoWorld September 6, 2012
            "What makes IT organizations fail? Often, it's the adoption of so-called industry best practices by people who ought to know better but don't, probably because they've never had to do the job.

            From establishing internal customers to instituting chargebacks to insisting on ROI, a lot of this advice looks plausible when viewed from 50,000 feet or more. Scratch the surface, however, and you begin to find these surefire recipes for IT success are often formulas for failure..."

              3 Security Mistakes Your Management Is Making Now
              InfoWorld September 5, 2012
              "One of the joys of being a traveling consultant is I get to see what does and doesn't work across a wide range of products and companies. Guess what? The same issues pop up again and again.

              Here are the three most common big mistakes I see senior management make regarding computer security. Some are errors of omission, others of commission. All of them tend to have severe consequences..."

              CIO Skills: Do You Have What It Takes to Lead IT Today?
              CIO Insight September 5, 2012
              "I’m so often asked about the competencies required to be a successful CIO in the 21st century that I chose to make this a main topic of my book “Lessons in IT Transformation.”

              It seems that many CIOs are more focused on acquiring the latest and greatest technology services and solutions than they are on building their personal skillsets.

              However, the skills required to be a true agent of transformation are not technical (or even business-related); rather, you need to develop skills in human dynamics..."

              How to Prepare for IT Service Delivery of the Future
              CIO August 31, 2012
              "Most people fear automation. Since the beginning of the Industrial Revolution, the "A-word" has conjured up rebellion by those who are vulnerable to replacement by machines. When you automate a job, there is a high likelihood that the machinery will reduce dependence on human interaction and may even eliminate the need for humans altogether. In the future, some IT roles will diminish in numbers and possibly disappear altogether -- but service management and automation will always need innovators and leaders..."
              How to Thank Your Employees in Only 8 Words
              Inc. June 7, 2012
              "The other day I was given the challenge to recognize 30 people by writing each one of them a note, which got me thinking about the amazing implications of recognizing employee's contributions. It shows you are paying attention. It shows you care. It makes people feel valued. And as business guru Tom Peters notes, "People don't forget kindness."..."
                The 6 Deadly "I"s of IT Managers
                Accelerating IT Success September 4, 2012
                "Using the UK’s pilot training “Error Proneness” list, this entertaining article take a look at the worst qualities that IT managers can have – qualities that lead, ultimately, to project failures. The list includes:

                Impatience, Impulsiveness, Invulnerability, Insecurity, Indecision, and “I know best”

                The list helps explain attitudes that are not conducive to successful outcomes when implementing ITIL, utilizing ITSM, or general IT project work..."

                  The Machiavellian CIO
                  IT Web September 3, 2012
                  "Getting execs and employees to do the right thing where technology is concerned is often a battle; therefore, CIOs should be fully versed in the art of war.

                  This is according to Gartner analyst Tina Nunno, whose “maverick” research into using war tactics in the boardroom has gone mainstream. Speaking at last week's Gartner Symposium, in Cape Town, she explained that these approaches are extreme, but added, “when you're in extreme situations, ordinary tactics don't work”..."

                  Worker Had Proper Access When He Snagged Corporate Data, Court Rules
                  ComputerWorld September 6, 2016
                  "The Fourth Circuit decision is identical to one in April by the U.S. Court of Appeals for the Ninth Circuit. In that case, too, the Appeals Court held that several employees at an executive recruitment firm did not exceed their authorized access to a company database when they logged into the system and stole confidential data.

                  The Ninth Circuit decision also held that the CFAA primarily applied to external hackers and violations of computer access restrictions -- not usage restrictions..."

                    Ten Tips for Pitching Winning Proposals
                    Baseline August 31, 2012
                    "Crisp, concise proposals that produce results can help elevate your standing at work, but cultivating the perfect elevator pitch isn't easy. In the book Small Message, Big Impact: The Elevator Speech Effect (www.smallmessagebigimpact.com) (Portfolio/available now), author Terri Sjodin takes readers through a step-by-step tutorial on the art of producing brief but winning pitches. Sjodin illustrates how perfecting the pitch is critical in today's business environment where executives and colleagues are busier than ever. And short doesn't mean easy. It's far more challenging to effectively present your arguments in a minute or two than it is to give an hour-long talk..."
                      IT - DR
                      x
                      How Data Deduplication Technology Can Enhance Disaster Recovery
                      InformationWeek September 7, 2012
                      "A study done by the research firm Vanson Bourne shows that 80 percent of the Indian organizations have experienced data loss or downtime in the last 12 months. Historically, businesses have been using tape-based backup solutions and storing them physically in offsite locations. However, according to Gartner, 50 percent of all tape backups fail to restore.

                      Recently, a large number of computers in the Maharashtra secretariat got damaged in a fire. The government’s failure to have a proper disaster recovery (DR) plan drew widespread mockery and criticism. But ironically, this issue is not limited to just government offices in India..."

                      Hurricane Katrina and the Lessons Learned from Mississippi's Recovery
                      Emergency Management August 29, 2012
                      "It's been seven years since Hurricane Katrina after which Mississippi then-Gov. Haley Barbour created the state’s Disaster Recovery Division and placed Jon Mabry as its chief operations officer. In that position Mabry administers more than $5 billion in federal Community Development Block Grant (CDBG) funding earmarked by Congress for recovery projects after Katrina.

                      Catastrophic disaster recovery planning and execution is a rare event that many professional emergency managers will never experience. Mabry agreed to participate in an interview with Emergency Management magazine to share the state's challenges, successes and what he would do differently in the future..."

                      IT - PM
                      x
                      Project Management: The 14 Most Common Mistakes IT Departments Make
                      CIO July 23, 2008
                      "Nearly 70 percent of IT projects are dogged by cost-overruns or aren't completed on schedule due to poor planning, poor communication or poor resource allocation. This story assess the impact of the 14 most common project management mistakes and offers ways IT groups can avoid them..."
                      How to Manage Successful IT Projects
                      Baseline September 7, 2012
                      "One-fourth of IT projects are outright failures, and another 44% encounter significant difficulties, such as (sing along, you know the words) blown deadlines, overspent budgets, and failure to deliver on key goals. A book called Improving Your Project Management Skills (Amacom/Available now) aims to help you do what the title says. Author Larry Richman is a certified Project Management Professional (PMP) with more than three decades’ of experience..."
                      7 Key Skills of a Project Manager
                      Enterprise PM October 24, 2003
                      "Before discussing what the key skills for a project manager might be we really need to define what we mean by project management. A definition of project management would be the planning, organizing and then management of the resources required to complete a specific task. The essential point here is that the aims and objectives for the accomplishment of the task will be highly focused requiring you to fully understand these seven key skills..."
                      IT - Networks
                      x
                      Ethernet Switch Sales Sizzle
                      Channel Register August 31, 2012
                      "The server market may have stalled a bit as Intel, AMD, IBM, Oracle, and Fujitsu work through various stages of processor transitions, but the Ethernet switch market is going gangbusters.

                      According to the box counters at IDC, the worldwide market for Layer 2 and 3 switching gear that adheres to the Ethernet protocol accounted for $5.52bn in revenues in the second quarter as companies begin the transition to from Gigabit to 10 Gigabit Ethernet switching in the data center – that's an increase of 8.5 per cent year-over-year across all Ethernet port speeds..."

                      Dell: SDN Networking Won't Make Enterprise Switches into Commodity Soon
                      TechWorld August 31, 2012
                      "Software-defined networking won't turn enterprise switches into an inexpensive commodity until three to five years from now, according to Arpit Joshipura, the former Force10 Networks executive who now manages Dell's networking products.

                      The original promise of SDN (software-defined networking), which puts most higher-level network functions into software, was to make switches into mere forwarding engines that may be interchangeable and cost far less than they do now, said Joshipura, head of product management and marketing at Dell Networking..."

                      Survey Finds Most Networks Are Out of Control
                      NetworkWorld September 4, 2012
                      "Do you know what software is in use on your network? A survey released today by Avecto found that three out of four IT professionals have no idea what unauthorized software might be running on their networks.

                      The simplest scenario to manage and protect is one that is completely homogenous and locked down. If every single endpoint uses the exact same hardware and software, and everything is configured the exact same way for every user, and the users have no ability to install software or modify the settings of the operating system or software already installed, then the IT admins job is much easier..."

                        IT - Operations
                        x
                        Top Things to Consider When Buying Pre-Owned Equipment - A Buyers Guide
                        NetworkWorld September 4, 2012
                        "Businesses of all sizes rely on increasingly sophisticated network architectures to transform their businesses, all while maximizing the value of IT investments. With today's economic pressures and elevated operational costs, refurbished equipment can be a safe way for organizations to keep pace with the latest technologies without the stress of increased expenses.

                        To be clear, refurbished equipment and used equipment are not one and the same. Though both terms imply previous ownership, refurbished equipment complies with quality standards, often with the same warranty options as new..."

                          Outsourcing's New Reality: Choice Beats Cost
                          InformationWeek August 29, 2012
                          "Outsourcing. It's the hottest of hot-button issues this electoral season. Small wonder. Along with "the 99%" and "entitlements," it's a loaded, often misrepresented or misunderstood term that encapsulates many of the political, economic, and social issues of the day--including class, foreign policy, immigration, employment, and national security.

                          Critics lambaste outsourcing as a way for big corporations to replace workers with less-expensive contractors, sometimes (but not always) located in offshore locations with much lower wages..."

                          IT - Security
                          x
                          Cybercrime Costs Consumers $110 Billion
                          HelpNet Security September 5, 2012
                          "With findings based on self-reported experiences of more than 13,000 adults across 24 countries, the 2012 edition of the Norton Cybercrime Report calculates the direct costs associated with global consumer cybercrime at US $110 billion over the past twelve months.

                          In the United States, it is estimated that more than 71 million people fell victim to cybercrime in the past twelve months, suffering $20.7 billion in direct financial losses..."

                            Do Authentication Questions Really Protect You?
                            IT World September 3, 2012
                            "What is your mother's maiden name? It seems like that question has been used as secondary authentication to verify identity since the dawn of time. Over time, the authentication questions have become much more diverse. Sites now ask for things like what city you went to high school in, or who was your favorite teacher, or what was your first car.

                            The problem with most authentication questions, though, is that the information can often be found with a simple Google search or two. Ten years ago, or even five years ago it might have been much harder to learn the answers to such obscure questions. But, in the current age of oversharing on social networks it's entirely possible all your intimate details are out there somewhere..."

                            How Integrating Physical and Information Security Mitigates Risks
                            ComputerWorld September 4, 2012
                            "The night watchman and the IT security guy rarely work together even though their jobs, at the core, are similar: to protect the company. At many organizations, physical and information security remain separate entities by happenstance and by history. By integrating the two, however, companies can better protect the assets, employees and valuable data that keep the business going.

                            The integration is a first step towards assessing the overall corporate risks that threaten a company. Yet enacting a plan that conceives security as a cohesive, whole means overcoming entrenched resistance to integrating physical and information security, says Jonathan Ross, president and CEO of Austin Recovery, a drug and alcohol treatment center that recently finished such an integration..."

                            How Malware Defeats Strong Security Controls
                            NetworkWorld August 30, 2012
                            "The 2012 Verizon Data Breach Investigations Report shows that organizations often don't know for weeks, months, or sometimes years that they've been breached. The report indicates that 92% of organizations with a significant incident learned of the breach through notification from an external party, while only 6% of breaches were uncovered through internal monitoring, such as reading security logs..."
                            How To Handle A Data Breach: 5 Tips For SMBs
                            InformationWeek September 5, 2012
                            "Another day, another massive data breach.

                            Tuesday's news that AntiSec has published 1 million Apple Unique Device Identifiers (UDIDs) online--from a trove of 12 million such UDIDs--joins a long list of large-scale data breaches involving customer information. Other recent cases include the LinkedIn password breach and the Dropbox hack.

                            High-profile examples like these generate the headlines, but similar, smaller-scale breaches can happen to SMBs with alarming ease. AntiSec claimed those 12 million UDIDs were pilfered from a FBI agent's laptop, after all--if that's true, do your employees stand a chance? ..."

                              One Poor Security Choice Results In $250,000 Bitcoin Heist
                              InfoWorld September 6, 2012
                              "Bitcoin exchange Bitfloor reportedly suffered a virtual heist of 24,000 BTCs, worth a cool quarter-million U.S. dollars. The incident not only raises questions about the long-term viability of the digital currency but also highlights how seemingly minor lapses in IT security judgment can have devastating implications.

                              For the uninitiated, Bitcoins are a form of virtual currency that's been around since 2009. They have zero government backing; rather, they're backed by the continued actions of the computing power within the Bitcoin network. Investors can acquire them as payment or purchase them through exchanges such as Bitfloor, which is the largest of its kind in the United States and the fourth largest on the planet..."

                              Solving the Portable Data Security Headache
                              HelpNet Security September 6, 2012
                              "Protecting intellectual property and sensitive information is a major security concern for any business today - especially against the backdrop of workers needing to share documents and files with their colleagues, customers, and partners on a daily basis.

                              The problem facing IT professionals is that all-too-frequently these items contain confidential information, mandating the need for effective file encryption.

                              But a good data leak prevention platform will go several steps further down the security trail than adding simple file encryption to the smorgasbord that modern IT security systems have become – we have found that there is now a pressing need to create a secure platform for co-workers to collaborate..."

                              The Inevitability of a Data Breach
                              InfoSec Island September 5, 2012
                              "The genesis of this blog post is a presentation and follow-up conversation with a group of executives from one of the Fortune 100 companies my various teams support.

                              This team is in a very interesting position, having an opportunity to build an information security organization completely from ground zero.

                              This is a unique opportunity very few of us ever experience in such a large environment, but it's also a position I don't envy due to the extremely complex nature of the undertaking.

                              This group was a loose collection of architects, C-level technology executives, and directors who didn't quite have a firm grasp of their roles in the soon-to-be-formed organization..."

                              When IT Security Goes Awry, Whose Head Will Roll?
                              CRN September, 6, 2012
                              "And now it's time to plaaaaaay ... "Whose Head Will Roll?" an imaginary new game show brought to you by Symantec, which ran an impromptu survey of attendees at VMworld 2012 in San Francisco. Contestants were given a quick scenario involving good things gone bad and asked to give their opinions on (you guessed it) "Whose Head Will Roll?"

                              While accountability for gaffes, mistakes, hurricanes and intermittent squalls can vary from one organization to the next, "contestants" were asked to give their opinion of who was ultimately responsible for each problem..."

                              Why Training Users in Enterprise Security May Not Be Effective
                              Internet Evolution September 5, 2012
                              "Conventional wisdom tells us that training corporate employees in good security practices will improve the company’s overall network security. After all, if employees are trained not to click on unknown URLs, not to install unknown USB thumb drives into their computers, and not to visit dodgy Websites, then the company has a lower possibility of getting breached -- right?.."
                              How to Securely Erase Your Hard Drive
                              NetworkWorld September 4, 2012
                              "The siren has sung and you've finally succumbed to her call: You're the proud owner of a shiny new PC; a faster, better SSD; or a bigger, better hard drive. It's time to toss your old equipment in the trash and start playing with your new toys, right? Not so fast.

                              First you need to clean the data off your old drives so you don't become a victim of identify theft. Simply deleting the data off your hard drive doesn't actually delete it; it basically just hides it from immediate view. To truly hide the data on your storage device and protect yourself against identity theft, you need to take much more drastic (and time-consuming) measures that overwrite your drive space with ones and zeroes. That's where this guide comes in..."

                              IT - Careers
                              x
                              5 Dangerous Online Behaviors
                              Internet Evolution August 29, 2012
                              "We all know not to let our children give out their full names, addresses, or schools on the Internet, but when it comes to our own safety, we have the mentality of invincible teenagers. We don't think anything can happen to us competent adults, so we blithely meet strangers offline, check in to our locations on Facebook, and accept friend requests from strangers.

                              Thus, our virtual activities put us at risk for all sorts of injuries in meatspace, ranging from identity theft to robbery and even murder. Here, in no particular order, are the top five Internet-based behaviors that I think are most likely to result in bodily harm:..."

                                The IT Profession: A Labor of Love
                                InfoWorld September 3, 2012
                                "Labor Day is a great opportunity for us to remember that whatever you may think of labor unions today, without their courageous efforts in the late 19th and early 20th centuries, we wouldn't have health benefits, safe working conditions, or a 40-hour workweek.

                                Oh, that last part -- fuggedaboutit.

                                In response to "How's it going?" almost every IT pro I know, whether a developer, admin, consultant, or whatever responds, "It's crazy. You wouldn't believe..." Then I hear a litany of things that broke, boneheaded moves by know-nothing bosses, horrific vendor support tales, and so on..."

                                Think Twice Before Accepting a Job Counteroffer
                                Business Journal August 27, 2012
                                "When you’ve secured a job offer, you may believe your search is over. But you’re not done yet.

                                After you receive an offer, your employer may make a counteroffer. HR and recruitment experts say that accepting a counteroffer is career suicide, period. But in the last several quarters, many recruiters have seen an above-average number of counter offers..."

                                  What Do Business, Government and Sports Have In Common: Numbers
                                  ComputerWorld September 4, 2012
                                  "'Numbers never lie.' This mantra has become the all-encompassing truth that business executives, government technology leaders, security analysts, academic gurus and even sports historians universally accept.

                                  Experts tell us to focus on 'just the data.' Acceptance into college, current salaries, future promotions, global investments, political campaigns and even our selection of sports heroes are dependent on a few all-important statistics. In some cases, a small percentage can mean the difference between world-class success and embarrassing failure..."

                                  IT - Social Media
                                  x
                                  Cyber Deceptions
                                  IT Web September 2, 2012
                                  "While the Web offers great opportunities for publishers and advertisers alike, its real value is also marred by fraud, malware and sockpuppetry.

                                  A new study has found that a massive portion of mobile clicks on ads are actually worthless. This is according to mobile app marketing platform Trademob, which shared the findings of its most recent study with GigaOM, showing that 40% of mobile clicks on ads are the result of fraud or users clicking on ads by mistake..."

                                    IT - Virtualization
                                    x
                                    When Virtualization Becomes Your Worst Enemy
                                    InfoWorld September 4, 2012
                                    "Try as we might to keep chaos at bay, there will come a time when the perfect storm hits and everything falls apart. Usually a confluence of elements triggers total meltdown, but sometimes one overlooked weak link fails and causes a cascade of problems that takes an entire network offline.

                                    These situations are never easy to deal with and are generally compounded by the fact that admins are feverishly working to fix problems while being bombarded with alarms from other systems that are also failing due to the initial outage. It’s like trying to rebuild a house while it's falling down on top of you..."

                                      IT - Compliance
                                      x
                                      Cloud Providers Struggle to Offer Regulatory Compliance
                                      Internet Evolution September 5, 2012
                                      "Public cloud providers have been fighting a battle about their lack of preparedness for enterprise compliance, and it is costing them revenue opportunities and credibility gains.

                                      And why wouldn’t it be? No corporate executive wants to face his board trying to explain why a particular cloud vendor was not certified for compliance, or why a major data breach occurred on the cloud network that is going to cost the company millions..."

                                        Storage
                                        x
                                        Preparing a Sun ZFS Storage Appliance to Serve as a Storage Device
                                        How-to Employs Oracle Enterprise Manager Ops Center 12c

                                        Barbara Higgins configures a Sun ZFS Storage Appliance to serve as a storage library for a server pool using Oracle Enterprise Manager Ops Center 12c. The procedure is divided into Section One which involves steps taken from the Sun ZFS Storage Appliance's user interface and involves configuring the appliance to use both the FC and the iSCSI protocols. The the user creates an account for Oracle Enterprise Manager Ops Center. In Section Two, from the Oracle Enterprise Manager Ops Center, one creates a discovery profile for the Sun ZFS Storage Appliance to discover the storage appliance, creating a dynamic storage library.

                                        IT - Big Data
                                        x
                                        Big Data Is Important, but Open Data Is More Valuable: Gartner
                                        eWeek August 24, 2012
                                        "Businesses of all sizes continue to struggle to find a solution for dealing with the growing volume of information flowing into their databases—a mountain of files and figures known as big data. Although that load of information can make businesses smarter, open data will be far more consequential for increasing revenue and business value, analysts at Gartner maintain. Open data, according to the research firm, refers to the idea that certain data should be freely available to everyone to use and republish as they wish, without restrictions from copyright, patents or other forms of control..."
                                        Big Data: The Perils of Past Performance
                                        TechRepublic September 5, 2012
                                        "One of the great and often ignored challenges of Big Data is whether or not historical data is actually relevant to answering a given question. Anyone who has ever glanced at the fine print of their stockbroker’s web page or an investment prospectus has likely noticed the old quip that “Past performance does not guarantee future results.” Despite a century of increasingly complex analytics and reporting, this disclaimer has largely held true; otherwise we’d all happily pick yesterday’s market winner, then begin researching which island to buy as the returns poured in..."
                                        Business Analytics: Six Steps to Getting Results
                                        Baseline September 6, 2012
                                        "Although reams have been written about analytics, and opinions abound about its potential to change how businesses think and behave, analytics in the end is an important and valuable driver in achieving decision-making success.

                                        Discussions on analytic software and tools are certainly useful, but technology is just one piece of the analytics puzzle. To apply analytics effectively, businesses should think beyond technology to consider how an analytical approach affects many aspects of their operations..."

                                        Getting Started with Big Data
                                        IT Business Edge August 28, 2012
                                        "The hype and information overload around Big Data is in full swing, causing confusion for the many executives chartered with the task of leveraging Big Data for their organizations. The approach toward Big Data implementation may seem daunting, but early adoption of this new disruptive technology can provide serious competitive advantages. Big Data helps enterprises enhance their ability to scale seamlessly and handle the avalanche of data coming at them from a variety of sources, such as internal teams, public entities, social media, web applications, data centers, etc., and analyze these data sets quickly with greater efficiencies and lower support costs..."
                                        Think Small Data before Big Data, Healthcare Gurus Argue
                                        InformationWeek August 31, 2012
                                        "Big data has become increasingly attractive to healthcare providers seeking to prepare for accountable care. But, in a recent post in The HealthCare Blog, consultants David C. Kibbe, MD, and Vince Kuraitis--both respected observers of health IT--argue that instead of succumbing to the siren song of big data analytics, providers should focus on using "small" data better. In other words, concentrate on the clinical data already available in digitized form and use only those health IT tools that are directly applicable to care management..."
                                        IT - Mobile
                                        x
                                        Will Your Smartphone Become your Wallet?
                                        InfoSec Island September 6, 2012
                                        "Fifty years ago, no one would have believed you if you predicted that computers would completely change the modern workplace. Typewriters are a thing of the past as are rotary dial phones and Dictaphones.

                                        But what will the workplace look like in 50 years? With more people telecommuting, the modern workplace may disappear. What about the world of commerce?

                                        You’ve probably heard some hard-to-imagine stories as to how technology will evolve. One story is the advance of mobile payments. With the increased use of smartphones, it’s only natural that people will be able to use their smartphones to make payments..."

                                          IT - BYOD
                                          x
                                          10 Tips for Implementing BYOD Securely
                                          NetworkWorld September 4, 2012
                                          "BYOD is another technology trend that moves a company from a position of risk avoidance to risk management. Where many IT organizations get it wrong is they focus on only one piece of the puzzle - like the device. If organizations want to minimize the risks of BYOD, they need to assess the impact on the network security ecosystem and understand the big and small weaknesses it creates."
                                          Five Bad Arguments for Bring-Your-Own-Device
                                          Insurance Technology September 5, 2012
                                          "Bring-Your-Own-Device (BYOD) is all the rage these days. Companies see several potential advantages to adopting the policy, and research has been cited to support it. For example, a study by Redwood Shores, Calif.-based enterprise Wi-Fi access firm iPass found that a third of mobile enterprise workers never fully disconnect, and that many employees are working up to 20 additional hours per week unpaid as a result of BYOD policies. But CEB's TowerGroup research director Jason Malo disagrees. "Everybody's saying 'How do I do it?' I say, 'Don't.'"
                                          Is Mandatory BYOD Coming?
                                          IT World September 4, 2012
                                          "Last week the White House, along with the Digital Services Advisory Group and the Federal Chief Information Officers Council, released a toolkit to help guide federal agencies considering implementing BYOD programs. As our colleagues at CITEworld describe, the toolkit offers case studies, sample policies and a general rundown of the issues involved with BOYD so federal agencies can make informed decisions about whether and how to implement such a program. It’s an excellent resource, not just for government agencies, but for any organization considering BYOD..."
                                          The Problem with Social Collaboration on IT Projects
                                          InformationWeek September 3, 2012
                                          "I was just putting the finishing touches on our company's bring- your-own-device policy when Sam, our CEO, dropped by for a chat. I eventually got around to the BYOD strategy, mentioning the planned move from company-issued BlackBerrys to employee-paid, personally owned devices of choice. "This is going to be a big change for some of our staff," he said. "You better socialize this."

                                          "Socialize" is one of the Über-buzzwords of the day. To socialize an intention is different from communicating, explaining, or discussing it.."

                                          The True Cost of BYOD
                                          NetworkWorld September 4, 2012
                                          "Remember the days when only your executive suite had mobile devices? Or when your company had a "BlackBerry-only" policy? Now BYOD has swept across your company, with little regard to whether or not IT is on board. And while you're coming to grips with management and security issues, you may have realized that mobility is eating up your IT budget. New devices, data plans, apps, software — what is the true cost of BYOD?

                                          Working with companies of all sizes and across many industries to define mobile strategies and policies, we've been able to identify the constant threads that drive successful enterprise mobility. Here are the five best practices for developing mobile policies to avoid pitfalls that often translate to increased IT expenses..."

                                          Top10
                                          x
                                          Top Ten Articles for last few Issues
                                          Vol 174 Issue 1,2,3, 4 and 5; Vol 173 Issues 2, 3 and 4
                                          We track how frequently each article is viewed on the web site to determine which the readers consider the most important. For last week, the top 10 articles were:

                                          • The Role of Oracle VM Server for SPARC in a Virtualization Strategy
                                          • Revision to SPARC Architecture Released
                                          • Oracle Collaborates on Drafting Specifications for Cloud Management Standards
                                          • Oracle's SPARC T4-2 Produces World Record Oracle Essbase Aggregate Storage Benchmark
                                          • Blog Explains Parallel Backup Operations in MySQL Enterprise Backup v3.8.0
                                          • Creating an Active/Active IPMP for Solaris 11
                                          • The Document Foundation Announces LibreOffice 3.6.1
                                          • Licensing Open Source Code in the Modern, Post-revolutionary Era
                                          • Best Practices for Securely Deploying the SPARC SuperCluster T4-4
                                          • Release of Java SE 7 Update 7 and Java SE 6 Update 35 Announced

                                          The longer version of this article has list of top ten articles for the last 8 weeks.

                                            IT - Server
                                            x
                                            Twenty Tricky SysAdmin Tasks. And How to Approach Them
                                            IT Business Edge September 6, 2012
                                            "A SysAdmin has an almost endless list of tasks they must complete on a regular basis. Some are so routine that they can be done while multitasking, others require careful attention to detail and a laser-like focus to ensure that things are done well and completely. While many admins may look at most of the tasks on this list as run of the mill, they frequently present a challenge to others. In this slideshow, Christina Goggi, writing for GFI Software, provides some tips on how to approach them..."
                                              IT - Encryption
                                              x
                                              Calculating the Cost of Full Disk Encryption
                                              NetworkComputing August 30, 2012
                                              "Is full disk encryption (FDE) worth it? A recent study conducted by the Ponemon Institute shows that the expected benefits of FDE exceed cost by a factor ranging from four to 20, based on a reduction in the probability that data will be compromised as the result of the loss or theft of a digital device.

                                              The report, "The TCO for Full Disk Encryption," was conducted independently by Ponemon and sponsored by WinMagic. The stated purpose of the study was to learn how organizations are deploying software and hardware FDE systems, as well as to determine the total cost of ownership of such deployments across different industries..."

                                              Trending in
                                              Vol 235, Issue 2
                                              Trending IT Articles