News about Oracle's Solaris and Sun Hardware
System News
Sep 24th, 2012 — Sep 30th, 2012 Generate the Custom HTML Email for this Issue
System News System News for Sun Users
Volume 175, Issue 4 << Previous Issue | Next Issue >>
Sections in this issue:
click to jump to section

Oracle Releases Optimized Solution for Oracle E-Business Suite for Mission-Critical Environments
More Cost Effective than Both IBM and HP Solutions

The newly released Oracle Optimized Solution for Oracle E-Business Suite, optimized for the Oracle E-Business Suite is ideal for customers looking to modernize their mission-critical Oracle E-Business Suite environments, lower operating expenses and maximize user productivity. The Oracle Optimized Solution for Oracle E-Business Suite can deliver significant cost savings versus both new and existing hardware infrastructure. For example, it has an up to 56 percent lower acquisition cost versus new IBM POWER7 and HP Superdome2-based configurations, and it offers up to 40 percent lower five-year TCO when consolidating existing IBM and HP infrastructure, while reducing rackspace footprint up to 73 percent.

    ATIVAS Implements Oracle SPARC SuperCluster T4-4
    Brazilian MSP Is First in Latin America to Offer Complete Oracle Enterprise Cloud Services
    ATIVAS information technology is a Managed Service Provider (MSP) in Brazil and is the first Latin American MSP to offer complete Oracle enterprise cloud managed services using Oracle SPARC SuperCluster T4-4. This implementation enables ATIVAS to provide multi-tenant cloud hosting of multiple customer enterprise applications including Oracle Applications and other ISV applications, in addition to Oracle Database 11gR2 in a highly secure, high availability architecture. Oracle SPARC SuperCluster T4-4 gives ATIVAS customers a single point of contact for services and support, helping to accelerate time to resolution, and meet customer SLAs.
      Outsourcing Inc., Major Japanese Employment Firm, Implements Oracle SPARC SuperCluster T4-4
      Expects Significant Savings from Move to Private Cloud Infrastructure

      Outsourcing Inc., a worldwide employment outsourcing business headquartered in Japan, has implemented a private cloud using an Oracle SPARC SuperCluster T4-4 engineered system. Outsourcing, with sales for the period ending December 2011 reaching a record high 32.3 billion Yen, is the first company in Japan to implement SPARC SuperCluster T4-4, which it uses to run its manufacturing and administrative operations outsourcing businesses. With the SPARC SuperCluster T4-4, Outsourcing projects significant savings from consolidating multiple complex enterprise applications, reducing system administration and moving from an external hosted service to its own virtualized cloud infrastructure based on the SPARC SuperCluster T4-4.

        Six-minute Demo on Oracle Exalogic Elastic Cloud
        The Details Are in the Video
        Infrastructure-as-a-Service has taken giant strides with Oracle's development of the Exalogic Elastic Cloud, a milestone on the road to a private-cloud-in-a-box. The Exalogic marketing team has created a six-minute demo that explains all the facets of the Oracle Exalogic Elastic Cloud, spelling out its applications, costs, and benefits and its ability to deliver as capably in the front-office as in the back, provisioning applications up to five times faster than traditional platforms. With Oracle Exalogic Elastic Cloud, users can deploy and/or consolidate mission-critical applications and middleware with the touch of a button onto a virtualized environments. The details are in the video.
          IT - Storage
          Hitachi Targets 2015 for Data Storage That Last 100 Million Years
          NetworkWorld September 25, 2012
          "Hitachi has developed a glass-based data storage medium that is highly heat and water resistant, capable of holding data for hundreds of millions of years, and says it may be able to bring it to market by 2015.

          The company's main research lab has developed a way to etch digital patterns into robust quartz glass with a laser at a data density that is better than compact discs, then read it using an optical microscope. The data is etched at four different layers in the glass using different focal points of the laser..."

            10 Things IT Architects Should Consider When Choosing Data Storage Technologies
            TechRepublic September 18, 2012
            "Data is something that companies grapple with every day - after all, we are in the era of Big Data. How to gather it, analyze it and interpret it. But one important part of dealing with data is figuring out how and where to store it. Below are 10 things to think about when choosing the right data storage technologies for your enterprise or project..."
              Why Synchronized, Replicated File Service Makes Sense Now
              NetworkWorld September 24, 2012
              "Last time, we saw why WAN Optimization won over WAFS. This time we'll take a look at how distributed replicated file services compared to WAN Optimization as alternatives looking backwards, as well as how such file services can change the nature of the enterprise WAN going forward, particularly in conjunction with WAN Virtualization and/or Network-as-a-Service as part of the Next-generation Enterprise WAN (NEW) architecture..."
                IT - Technology
                SA Internet Faces Address Crisis
                IT Web September 27, 2012
                "South African IPv4 address exhaustion could be as close as a year away, leaving businesses facing costly and disruptive upgrade programmes, and halting the provision of new Internet services.

                IPv4 addresses are in short supply worldwide: earlier this month, RIPE NCC (the regional Internet registrar for Europe, the Middle East and parts of Asia) announced it was down to its last /8 block of available IPv4 address blocks, with emergency measures in place to minimise allocations. In Africa, matters are facing the same urgent crisis, but with a little more time to prepare..."

                  Free and Open Source S/W
                  Bossie Awards 2012: Best Open Source Application Development Tools
                  18 Apps that Bring New Levels of Power and Ease to Nnative Coding and Web Development
                  The 18 best Open Source Application Development Tools selected by InfoWorld in Bossie Awards 2012 are these:

                  • Node.js, PhoneGap, Titanium, Sencha Touch 2, Rhodes, WebKit, VirtualBox, Three.js, Bootstrap, Git, Jenkins, jEdit, Code::Blocks:, wxWidgets, Qt, Boost, Clang, FindBugs

                  Read on for details.

                    Bossie Awards 2012: The Best Open Source Data Center and Cloud Software
                    Solutions for the Data Centers of Tomorrow

                    The Bossie 2012 awards for the 16 Best Open Source Data Center and Cloud Software includes the following solutions:

                    • OpenStack, CloudStack, Eucalyptus, Ganeti, Open v Switch, Cloud Foundry, JBoss AS 7, Jclouds, Puppet, Chef, Juju, GlusterFS, Ceph, FreeNAS, Openfiler, NAS4Free

                    Read on for details.

                      OurSQL Hosts Appear on Meet the MySQL Experts
                      Offer Tips for Getting the Most out of MySQL Connect

                      MySQL Connect and OurSQL is the topic of discussion hosted by Keith Larson on Meet the MySQL Experts who are, in this episode, the hosts of the OurSQL podcast, Sheeri Cabral of Mozilla and Gerry Narvaja of Big Door. The trio review plans for the imminent MySQL Connect Conference. Cabral praised the quality of papers submitted in response for the conference call for papers. Both tout the top five sessions they plan to attend. Both also opined that the conference will be heavier in its focus on DBA-related matters rather than those directed at developers.

                        IT - Cloud
                        Making Peace with Cloud and BYOD
                        InformationWeek September 24, 2012
                        "For IT professionals, security has changed forever. Two of the most powerful trends in IT – cloud services and bring-your-own-device (BYOD) – threaten to reduce our control over computing. Enterprises have two choices: fight these trends through a ban that would restrict flexibility and productivity, or adapt IT thinking and update security architectures to reflect the new reality. The key is to give workers a sanctioned way to use cloud and BYOD resources while aligning enterprise security and architecture with the requirements of a more open environment."
                          20 Awesome Cloud Services you've Never Heard Of
                          IT World September 20, 2012
                          "Web services are quickly replacing desktop programs for routine tasks such as image editing, spreadsheet creation and more. Here are 20 such services that we think are worth your time..."
                            Exploring Private Cloud Pipes
                            NetworkComputing September 19, 2012
                            "There's very little argument when discussing the need for change in traditional data center networking to support private cloud--most all agree it's required. The real discussion typically focuses around how to implement that change. Concepts such as open APIs, SDN, OpenFlow, VXLAN and fabrics are all discussed as the solution. In some cases they may all be right, as they each have merit..."
                              IaaS Resonates in Public Cloud Boom
                              Information Management September 21, 2012
                              "The cloud infrastructure market is expected to flourish over the next four years, gaining nearly 50 percent by the end of 2012 compared with last year and rivaling SaaS in investment by 2016, according to a new market report..."
                                PaaS Promises Develops In the Cloud
                                InfoWorld September 21, 2012
                                "Platform as a service is the fastest-growing area of cloud computing: Gartner forecasts the worldwide enterprise market for PaaS platforms will grow from $900 million in 2011 to $2.9 billion in 2016, representing a 26.6 percent rise each year.

                                The problem is that no two PaaS offerings are alike..."

                                  Top 10 Issues Eroding Cloud Confidence
                                  HelpNet Security September 27, 2012
                                  "Findings from a joint Cloud Security Alliance (CSA) and ISACA survey show that government regulations, exit strategies and international data privacy dominate the Top 10 areas where confidence in the cloud is lowest..."
                                    IT - CxO
                                    Office Bullying on the Rise
                                    CIO Insight September 20, 2012
                                    "Office bullying incidents have grown more frequent in the last year, according to a recent survey from CareerBuilder. While CIOs may not experience the bullying first-hand, there are nasty remarks, shouting matches, heated confrontations, unfair treatment and other patterns of intimidating behavior that can be happening on your watch."
                                      Don't Waste Your Money on Cyber Breach Insurance
                                      Dark Reading September 26, 2012
                                      "As an increasing number of businesses are starting to look at cyber breach insurance as a tool to mitigate the risks of data breaches, IT security pros need to be prepared to help their organizations avoid the hazards of choosing a policy that may not pay out when the worst occurs.

                                      Chief among the biggest pitfalls? Trying to use insurance as a financial replacement for investment in sound protection of databases and other data security infrastructure..."

                                        7 Common Risk Management Mistakes
                                        CSO Online September 26, 2012
                                        "The aim of security risk management is to remove the guesswork and help the business make smarter decisions.

                                        As Jay Jacobs, vice president of the Society of Information Risk Analysts (SIRA), says, "Security risk management is simply a decision-support system for the business. It should exist to inform the decisions of the business."

                                        Unfortunately, many experts believe that most companies aren't quite there yet and that their efforts, while well-meaning, fall short and may even incorporate bad habits that can increase an organization's risk..."

                                          Innovative Strategies for Dealing with Unexpected Risks
                                          Continuity Central September 21, 2012
                                          "A new PwC US Risk in Review paper entitled ‘Coping with the unknown: Risk management strategies for an uncertain world,’ provides details of innovative strategies for dealing with unexpected risks.

                                          The report is based on a survey of more than 1,000 executives and risk management leaders of Fortune 500 companies from around the world. The findings examine the critical challenge of coping with unknown and potentially business crippling risks."

                                            Is IT Ready for a Seat at the Table?
                                            Information Management September 19, 2012
                                            "As old as IT itself is the “alignment with the business side” challenge.

                                            What keeps this particular challenge top-of-mind is that technology is always changing, forcing the role of IT leadership to change with it. In the insurance industry, as in any vertical market, the IT department is now charged with a lot more than keeping the lights on. In fact, it seems that IT leadership is focused almost as much on emerging technologies as it is on the enterprise systems they develop and maintain."

                                              IT Departments Warned: Evolve or Die
                                              TechRepublic September 24, 2012
                                              "Keeping the servers humming is no longer enough to justify the existence of the IT: it’s time for the tech team to raise their game - or risk becoming irrelevant.

                                              The IT department needs to prove to the business why it’s more than just a support function, according to Essex County Council CIO David Wilde..."

                                                Outsourcing's Five Cast-Iron Rules: Break Them at Your Peril
                                                TechRepublic September 27, 2012
                                                "How do you get the best from outsourcing contracts without them getting the better of you? One CIO who has worked on both sides of the outsourcing divide offers his key tips...

                                                Saving money should not be your only motivation, just as the outsourcer should not see your business as a potential cash cow. Photo: Shutterstock

                                                CIOs face an expanding list of business objectives, which they have to meet by implementing a cost-effective and efficient tech strategy. Some IT leaders concentrate on inhouse development, but a lot of technology money is still spent outside the organisation..."

                                                  The Six Key Roles for CIOs to Succeed
                                                  Accelerating IT Success September 27, 2012
                                                  "Today’s business environment integrates information technology in products, services, and supporting business processes. The CIO is no longer the executive managing a cost center comprised of servers, switches, and routers. He or she is a business executive who must collaborate with C-Level business peers to achieve business outcome. No longer will technology expertise be the prevailing success criteria..."
                                                    This Is the Biggest Reason Talented Young Employees Quit Their Jobs
                                                    Business Insider September 18, 2012
                                                    "The biggest reason young, talented workers leave for new jobs? They’re not learning enough, writes Diane Stafford of the Kansas City Star:

                                                    Hirers often complain that their young workers jump ship quickly. A study published this summer in the Harvard Business Review confirmed that young top performers—the workers that organizations would most like to stick around—are leaving in droves..."

                                                      How To Build A High-Performance IT Team
                                                      InformationWeek September 21, 2012
                                                      "Despite a national unemployment rate of more than 8%, the IT job market remains tight, with less than 4% unemployment. The jobless rates for IT specialties such as networking, security, and database management are even lower. Meantime, IT pros are less likely to switch companies than they once were, making it all the more difficult for employers to fill open positions and find new talent. So how do you build or sustain your high-performance IT team?"
                                                        Ten Questions to Inspire Innovation
                                                        CIO Insight September 18, 2012
                                                        "CIOs are constantly being asked to push the envelope and come up with creative, unconventional ways to run business processes and make teams more productive. And as businesses become more agile and move more quickly, IT managers need to be quick on their feet and capitalize on the spontaneous innovations dreamed up by their teams..."
                                                          IT - DR
                                                          DR In the Cloud: Vendors Jump In; Enterprises Wade
                                                          NetworkWorld September 27, 2012
                                                          "Disaster recovery and the cloud should be a match made in heaven. Take a function that enterprises love to hate and address it with an outsourced, efficient cloud service that makes it easier and less expensive to reach recoverable nirvana, and presto - instant success. Well, not so fast.

                                                          During the past 12 to 18 months, analysts say the disaster recovery as a service (DRaaS or RaaS) market has exploded..."

                                                            IT - PM
                                                            12 Common Project Management Mistakes--and How to Avoid Them
                                                            NetworkWorld September 26, 2012
                                                            "So many projects, so much mismanagement. That's the refrain of many IT executives. Indeed, even with project management software, IT projects often wind up taking longer (much longer) than planned and costing more than budgeted.

                                                            Why do good projects go bad? surveyed dozens of IT executives and project managers and came up with a list of 12 Common Project Management Mistakes -- along with ways to avoid these often time-consuming and potentially costly problems..."

                                                              A Tale of Two Audits: Numerous Government IT Problems in Australia and Scotland
                                                              IEEE Spectrum September 4, 2012
                                                              "For the past several years I have covered the on-going payroll system problems at Australia’s Queensland Health Service which saw an estimated A$6.19 million (fixed price) IT project morph into one that will likely end up costing over A$530 million to get right. The debacle, which helped spur the defeat of Queensland’s long-ruling Labor government earlier this year, also unsurprisingly prompted an audit of Queensland’s governmental IT projects by the incoming LNP-led government."
                                                                Early Warning Signs of a Project in Trouble
                                                                Project September 20, 2012
                                                                "...As a project manager it is your duty to keep an eye on warning signs that your project might be hitting a snag which could result in full on combustion.

                                                                Luckily, there are a few warning signs which are common in project management; and knowing what they are can save you a massive headache down the road. Below are some early warning signs of your project being in trouble."

                                                                  The Ins And Outs of IT Project Portfolio Management
                                                                  InfoWorld September 25, 2012
                                                                  "Do companies sometimes have to estimate what projects will cost and how long they'll take, even though they have no foundation for their estimates? Yes, they do. As RobertRadina pointed out in a comment on last week's Advice Line, companies typically plan their project portfolios as part of their annual budgeting cycle, when many of the projects are nothing more than concepts. What do you do?"
                                                                    You Don't Measure ROI on IT Projects Now, You'll Hate Yourself Later
                                                                    Business 2 Community September 3, 2012
                                                                    "According to, only 46% of companies calculate ROI on IT projects. The question is, why do over half of us ignore it?

                                                                    There are a number of different factors that play into the answer, but the most notable include: fear, cost, and difficulty..."

                                                                      IT - Networks
                                                                      6 Signs That the U.S. Is Overtaking the World at IPv6
                                                                      NetworkWorld September 24, 2012
                                                                      "Having invented the Internet 40-odd years ago, the United States has had the first-mover advantage when it comes to selling products and services that run on this ubiquitous communications platform. Now the United States is pulling ahead of its global rivals on next-gen Internet services built around the emerging IPv6 standard."
                                                                        802.11ac Will Be Faster, But How Much Faster Really?
                                                                        ComputerWorld September 21, 2012
                                                                        "Six months from now, enterprise IT groups will be facing a big change for their Wi-Fi networks: the shift to 802.11ac, which promises wireless data rates that start at 433Mbps.

                                                                        But what's on paper and what happens in the real world are two different things..."

                                                                          Impact of Network Security in the SDN-Enabled Data Center
                                                                          IT World September 24, 2012
                                                                          "Security is one of the leading challenges for IT professionals. And securing the data center (and related applications) in the era of public, hybrid and private clouds presents a complex set of problems for IT. The rise of SDN technologies will change the dynamics around securing the data center network, offering opportunities for improved automation and as well as new security concerns."
                                                                            IPv6: What You Need to Know About the Move From IPv4
                                                                            eWeek September 21, 2012
                                                                            "The Number Resource Organization said the world officially ran out of IPv4 addresses in February 2011, and according to the Internet Society, the reasons for moving to IPv6 vary from community to community. For example, IPv6 will unlock a range of opportunities for network operators in terms of service provision continuity, growth and innovation. In addition, it will result in network management efficiencies and savings."
                                                                              Need For Increased Network Bandwidth Is IT's Biggest Datacentre Pain-Point
                                                                              ComputerWeekly September 26, 2012
                                                                              "A majority of IT executives have said that a growing demand for increased network bandwidth is one of the most critical issues facing their datacentres, with more than half looking to deploy 100Gb ethernet by 2016 to improve input/output (I/O) performance in the datacentre..."
                                                                                IT - Operations
                                                                                5 Steps to Transform IT Operations with Service Assurance
                                                                                InformationWeek September 21, 2012
                                                                                "Here’s how IT managers can ensure more efficient operations, optimized application performance, and satisfied end users and customers..."
                                                                                  Business Taps into Green Opportunities
                                                                                  Baseline September 18, 2012
                                                                                  "Over the last few years, the idea of operating a green company—and promoting green IT—has undergone a remarkable transformation. Companies have discovered that it makes sense and saves dollars to design and build more efficient data centers, servers and software applications... Nevertheless, it's clear that many organizations have only begun to embrace more energy-efficient business and IT practices."
                                                                                    IT - Security
                                                                                    How to Prevent A Botnet Infection?
                                                                                    HelpNet Security September 26, 2012
                                                                                    "The research team at e-mail security provider Eleven, published five tips today to help users prevent a botnet infection on their computer.

                                                                                    Botnets are groups of hijacked private and corporate computers controlled remotely and which are used, among other things, to send spam, usually without the user’s knowledge. Undetected, the installed malware often only runs in the background, making it more difficult for users to identify the risk and react accordingly. It is currently estimated that over 90% of all spam e-mails are distributed via botnets..."

                                                                                      Watch The Watchers: 'Trusted' Employees Can Do Damage
                                                                                      Dark Reading September 24, 2012
                                                                                      "Many aspects of insider attacks have remained constant over nearly the past decade. Roughly half of all companies record an insider incident, about three-quarters do not report the event to law enforcement, and firms typically are split about whether their insider attacks are more damaging than their external compromises..."
                                                                                        Enforcing Data Security
                                                                                        IT Toolbox September 26, 2012
                                                                                        "Most attempts to secure data are flawed because they rely on developers and administrators doing their job properly. Administrators apply security at the level of whole files or database tables. Inside applications, programs have access to the entire database and it is up to the developer to implement security rules. If the administrator or developer makes mistakes or are acting dishonestly the security of the data is compromised..."
                                                                                          Protect Your Company with a CSIRT
                                                                                          Baseline September 20, 2012
                                                                                          "An effective computer security incident response team (CSIRT) can help your organization protect critical assets and data and lower risks by increasing awareness and creating controls..."
                                                                                            Security Engineering: A Needed Profession
                                                                                            TechRepublic September 24, 2012
                                                                                            "We know what we want when it comes to our digital well-being. Policy makers know what they want. The problem is they’re not close to being the same thing. Michael Kassner interviews two advocates who are trying to fix that..."
                                                                                              Most 5 Year Olds Already Use an Internet Enabled Device
                                                                                              HelpNet Security September 26, 2012
                                                                                              "Children as young as five have easy access to an internet enabled device. A One Poll study of 2,000 parents of children aged 5 to 15 also shows six parents in ten frequently let their child surf the web without any adult supervision...."
                                                                                                Security Intelligence = Table Stakes
                                                                                                Dark Reading September 25, 2012
                                                                                                "Evidently you can't be a player in the security market without some kind of security "intelligence," which is a fancy term for research. Two or three threat reports hit my inbox every week, many coming from vendors I've never heard of. If I wanted to read all of the reports issued each week, I wouldn't have time for anything else..."
                                                                                                  IT - Careers
                                                                                                  7 Ways to Win Any Negotiation
                                                                                                  Business Insider September 27, 2012
                                                                                                  "No matter how much you may hate to negotiate yourself into a deal—or even out of one—negotiating is a very legitimate business skill to acquire.

                                                                                                  It's even more crucial if you're a smaller business trying to get off the ground. You will have to make your arguments against much bigger, more powerful entities so it's essential that you know the science behind negotiation skills and how they affect the other party's psyche.

                                                                                                  Based on psychological research, here are some negotiation tips that will help you to get what you want..."

                                                                                                    IT - Social Media
                                                                                                    10 Social Media Methodologies That Are Changing How IT Works
                                                                                                    TechRepublic September 20, 2012
                                                                                                    "IT has assisted marketing, administration, and business operations with their implementations of social media and networking. Now, it has discovered some ways to make social-style communications deliver value to the IT department."
                                                                                                      IT - Database
                                                                                                      Encrypted Query Processing
                                                                                                      Dark Reading September 20, 2012
                                                                                                      "Encrypting data is one of the most basic -- and most effective -- data security measures we have at our disposal. But when used with relational databases, encryption creates two major problems..."
                                                                                                        IT - Backup
                                                                                                        Dissatisfaction With The Current State Of Backup
                                                                                                        HelpNet Security September 26, 2012
                                                                                                        "ExaGrid Systems announced the results of a survey of 1,200 IT managers which shows widespread dissatisfaction with the capabilities of many existing backup systems to keep up with requirements for faster backups with permanently short backup windows as data grows, disaster recovery, virtual server backup and recovery, and backup system costs."
                                                                                                          IT - Big Data
                                                                                                          Big Data Analytics for Big Business Value: Is This Real?
                                                                                                          Information Management September 25. 2012
                                                                                                          "Today, a typical enterprise can access enormous amounts of data, and the huge volumes of data keep growing. The very high volume, velocity and variety of this data make the enterprise business data environment highly chaotic, complex and dynamic.

                                                                                                          Navigating the tremendous quantities of data and driving visible business results can be a complex challenge..."

                                                                                                            Big Data Analytics Computing Requires A 'Maverick Fabric' Network
                                                                                                            NetworkWorld September 26, 2012
                                                                                                            "In the scientific/academic sector, it is typical to use proprietary solutions to achieve the best performance in terms of latency and bandwidth, while sacrificing aspects of standardization that simplify support, manageability and closer integration with IT infrastructure. Within the enterprise the use of standards is paramount, and that means heavy reliance upon Ethernet. But plain old Ethernet won't cut it. What we need is a new approach, a new "maverick fabric." ..."
                                                                                                              Big Data Brings Big Academic Opportunities
                                                                                                              ComputerWorld September 21, 2012
                                                                                                              "Colleges and universities are moving swiftly to create advanced degree programs in analytics to manage Big Data.

                                                                                                              The schools have all seen the McKinsey Co. report warning of a mega shortage in analytical talent of as many as 190,000 people by 2018. They have also heard about the need directly from big employers, such IBM and SAS..."

                                                                                                                Big Data Grows As Data Security Shrinks
                                                                                                                HelpNet Security September 24, 2012
                                                                                                                "A report published by PricewaterhouseCoopers (PwC) has revealed that despite the growing issue of "Big Data," most organisations are actually keeping looser tabs on data today than in previous years.

                                                                                                                Less than 35 percent of respondents said they have an accurate inventory of employee and customer personal data, and only 31 percent reported they had an accurate accounting of locations and jurisdictions of stored data."

                                                                                                                  Executives Push Big Data Projects, Not Sure Why
                                                                                                                  InformationWeek September 20, 2012
                                                                                                                  "There are a lot of challenges to be overcome before most companies will be able to take full advantage of a big-data facility, or even a single project, according to a recently published study by VAR and reseller-training organization CompTIA. Few companies are run by executives who understand either the technicalities or purpose of big data well enough to help their companies profit from it..."
                                                                                                                    Seven Ways to Get Started With Big Data
                                                                                                                    IT Business Edge September 27, 2012
                                                                                                                    "Big Data enables organizations to target audiences much more precisely and at a much more personal level, thereby increasing customer loyalty. Many companies are beginning to realize the benefits of Big Data and are starting to use their customer data more effectively, leading to much better insight on consumer buying patterns/preferences etc..."
                                                                                                                      Two Datas
                                                                                                                      Information Management September 21, 2012
                                                                                                                      "The big data phenomenon has given rise to a lot of discussion. I think that there is general consensus that big data is something more than just ultra-large scale data at the petabyte level. It is somehow different..."
                                                                                                                        Watching Big Data Grow Up
                                                                                                                        Business 2 Community September 25, 2012
                                                                                                                        "Big data is a term that marketers and pundits use to label everything, says author Alistair Croll in a recent blog post.

                                                                                                                        After all, muses Croll, everything is on the Internet, the Internet has a lot of data, and therefore, everything is big data.

                                                                                                                        The blog post, entitled Big Data Grows Up: Three Spaces to Watch Once the Hype Subsides, shares Croll’s best 'bet' as to where big data will have the biggest impact in the near future..."

                                                                                                                          IT - Mobile
                                                                                                                          Mobile Is Not A Sideshow
                                                                                                                          InformationWeek September 21, 2012
                                                                                                                          "Some businesses at GigaOm Mobilize conference report that mobile is 25% of their Web traffic, yet many enterprises still don't have mobile-optimized websites.

                                                                                                                          Throughout the day on Thursday at GigaOm Mobilize, a conference devoted to mobile technology that's being held in San Francisco, moderators asked tech industry panelists whether mobile projects should be prioritized over desktop projects..."

                                                                                                                            5 Mobile Security Lessons from the Department of Defense
                                                                                                                            NetworkWorld September 26, 2012
                                                                                                                            "Given that money is no object-bear with me on this point-you'd probably develop a hardened security communications capability that will provide impenetrable voice and data communications for devices that support the technology. True, your people will only be able to use devices that contain this proprietary technology, but at least you'll be able to sleep easy knowing that hackers can't compromise your sensitive communications..."
                                                                                                                              Managing Quality in a Mobile World
                                                                                                                              Baseline September 21, 2012
                                                                                                                              "As mobile devices transform the needs of employees, customers and business partners, organizations are examining how they can retool their quality assurance strategies and testing practices. Capgemini's fourth edition of the World Quality Report provides a global assessment of the state of enterprise application quality and testing practices. "
                                                                                                                                Top 5 Deadliest Mobile Malware Threats Of 2012
                                                                                                                                InformationWeek September 25, 2012
                                                                                                                                "While the amount of malicious software focused on the growing number of mobile devices on the market remains a drop in the bucket next to the amount targeting PCs, attackers are steadily turning the devices in consumers' pockets into targets.

                                                                                                                                So far this year, several pieces of malware have popped onto the radar and underscored the growing sophistication of cybercriminals targeting mobile devices..."

                                                                                                                                  IT - BYOD
                                                                                                                                  BYOD: IT Must Tackle Printer Security
                                                                                                                                  ComputerWeekly September 25, 2012
                                                                                                                                  "As staff bring their own devices to work, IT will need to rethink its printing and scanning policies, a study commissioned by Canon has reported.

                                                                                                                                  The pan-European survey of 729 users and decision-makers across Europe found that employers wanted more flexible, mobile working practices..."

                                                                                                                                    It's War! BYOD Exposes IT's Deep Distrust of Users
                                                                                                                                    InfoWorld September 25, 2012
                                                                                                                                    "Users: Yes, IT really does think you're stupid and/or naive, and therefore not to be trusted. IT: Yes, users really do think you're clueless about their needs and so have decided to act on their own.

                                                                                                                                    That in a nutshell is what Unisys's new survey (conducted by Forrester Research) of IT and users around the topic of consumerization of IT has shown..."

                                                                                                                                      Top Ten Articles for last few Issues
                                                                                                                                      Vol 175 Issues 1, 2 and 3; Vol 174 Issue 1, 2, 3, 4 and 5
                                                                                                                                      We track how frequently each article is viewed on the web site to determine which the readers consider the most important. For last week, the top 10 articles were:

                                                                                                                                      • Best Practices for Building a Virtualized SPARC Computing Environment: White Paper
                                                                                                                                      • Oracle Quarterly Results Show 41 Cent EPS
                                                                                                                                      • VirtualBox 4.2…
                                                                                                                                      • Shopping for Open Source Solutions?
                                                                                                                                      • ZFSBuild 2012 Due Soon
                                                                                                                                      • Automating the Installation and Setup of Oracle Solaris Cluster 4.0
                                                                                                                                      • Bossies 2012: The Herd Grows in Number
                                                                                                                                      • Attention CIOs: Shop Open Source First
                                                                                                                                      • Security Inside Out: Oracle's Security Newsletter
                                                                                                                                      • Bossies 2012: The Best Open Source Business Applications

                                                                                                                                      The longer version of this article has list of top ten articles for the last 8 weeks.

                                                                                                                                        Applying DoD Guidelines to Oracle SPARC SuperCluster
                                                                                                                                        Process Confirms Both Performance and Functionality
                                                                                                                                        Jim Laurent posts on the vetting of Oracle SPARC SuperCluster under the terms of the Defense Department's Security Technical Implementation Guides (STIGs). Laurent reports on configuring a SPARC SuperCluster in terms of DoD security guidance, which confirmed both the system's functionality and performance. He provides a link from which readers can download the Oracle white paper "Oracle SPARC SuperCluster Security Technical Implementation Guide (STIG) Validation and Best Practices on the Database Servers." Laurent also mentions that, although there is no Defense Information Systems Agency (DISA) STIG documentation for Solaris 11, the DISA Field Security Office approves it for use.
                                                                                                                                          Oracle SPARC T4 Systems Cut Complexity, Cost of Cryptograplhic Tasks
                                                                                                                                          On-chip Design Eliminates Need for Additional Hardware and Cards
                                                                                                                                          The Oracle SPARC T4 system, Rob Ludeman points out, offers wire-speed, on-chip cryptographic support. The SPARC T4 has been redesigned with new crypto instructions to eliminate some of the performance overhead associated with earlier T-series designs, resulting in much higher performance for encrypted workloads. Ludeman points out that the on-chip design overcomes the performance degradation inherent in other compute-intensive systems and does so without costs for additional hardware or add-on cards. Furthermore, the elimination of these add-on cards eliminates as well the additional complexity associated with these cards and the process of leveraging load balancers to perform encryption tasks.
                                                                                                                                            Trending in
                                                                                                                                            Vol 235, Issue 2
                                                                                                                                            Trending IT Articles