News about Oracle's Solaris and Sun Hardware
System News
Oct 8th, 2012 — Oct 14th, 2012 Generate the Custom HTML Email for this Issue
System News System News for Sun Users
Volume 176, Issue 2 << Previous Issue | Next Issue >>
Sections in this issue:
click to jump to section


IT - CxO
x
Are The CIO and IT Organization Replaceable?
InformationWeek October 8, 2012
"The new conventional wisdom is that the CIO and IT organization are becoming relics, as business technology decision-making and purchasing move into marketing, sales, HR, and other departments. Who needs a big IT organization, the reasoning goes, when tech-savvy line-of-business workers and their managers can buy the server capacity, storage, applications, and devices they need with a few clicks and a credit card?"
CIO Succession Plans Lacking, Study Finds
NetworkWorld October 9, 2012
"IT pros are accustomed to handling unexpected crises, such as when hardware fails or a cloud service has an outage. But it seems many IT leaders haven't considered what will happen if they're suddenly unable to work.

More than three-quarters (79%) of CIOs polled by Robert Half Technology said they haven't identified a successor in the event they had to stop working unexpectedly. Just 20% of the 1,400 CIOs have a successor in place, and the remaining 1% are unsure..."

    The Three Most Damaging Management Behaviors That You Probably Don't Know You're Doing
    TechRepublic October 9, 2012
    "Last week I wrote a blog about how a tech can earn more money without becoming a manager. If, however, you still want to pursue the management track, please know that leadership is a skill in its own right. You may be a great tech, but that doesn’t mean you’ll be a great manager.

    In that vein, here are some behaviors that I see most often in poor leaders:.."

    SPARC
    x
    SPARC Processor Roadmap Updated
    Ranges from 2011 Through 2016
    The updated SPARC Processor Roadmap is now available. The roadmap provides data in graphic form on the M-series, the T-series and the T-4 series from 2011 through 2016. During that period the M-series is scheduled to add up to 10x throughput; and the T-series an additional 4.5x throughput. Thread strength is also set to increase in both series through that period. Dates are also outlined for expected updates to Solaris 10 OS and Solaris 11 OS.
    Running Solaris 11 as a Control Domain on a T2000
    Installing Logical Domains 1.2 Solves the Problem
    As increasing numbers of users running older T1-processor-based systems like T1000 and T2000 upgrade to Solaris 11, there are few problems since Solaris 11 runs on any T-series or M-series SPARC server. One case presents an exception, however: running Solaris 11 in a control domain on a T1000 or T2000 hosting logical domains. Jeff Savit addresses this complication in his post that, in fact, proves Solaris 11 can be installed on T2000 servers and used as a control domain by removing the preinstalled Oracle VM Server for 2.2 and installing Logical Domains 1.2 - the last version of LDoms to support T1-processor systems.
    Exadata
    x
    Oracle Introduces Exadata X3-2 Database In-Memory Machine
    Multiple Configurations Accommodate all IT Budgets
    Oracle marked a further advance on the technology underlying its Exadata solution with the debut of the Oracle Exadata X3 Database In-Memory Machine, which is available in a Full-Rack, Half-Rack, Quarter-Rack, and the new low-cost Eighth-Rack configuration.

    According to Oracle's press release, the Exadata X3-2 Database In-Memory Machine and the Oracle Exadata X3-8 Database In-Memory Machine can store up to hundreds of Terabytes (TB) of compressed user data in Flash and RAM memory, virtually eliminating the performance overhead of reads and writes to slow disk drives and providing the ideal database platforms for the unpredictably varied workloads of cloud computing.

    ESG White Paper Studies Customer Satisfaction with Oracle Exadata
    Finds Wide Range of Positive Responses to Solution's Capabilities
    The ESG report by Evan Quinn, "Oracle Exadata Covers the Bases," studies user experience with the subject solution. Quinn polled customers on several aspects of satisfaction with Exadata including database growth, performance, staff learning curve, cost, and vendor support. He also considered the efficacy of the Exadata solution in four applications: data warehousing, OLTP, OLTP and data warehousing combined, and database consolidation. Quinn concludes that, as a result of the "maturity" of the Exadata solution and its value-add match to the IT use cases studied, Exadata will become the industry leader, returning to Oracle a greater profit share than pure cloud offerings.
    Oracle Exalogic Elastic Cloud Handbook: Excerpt Explains Distinctive Features
    Engineered Solutions Approach Results in High Performance
    The excerpt from the book "Oracle Exalogic Elastic Cloud Handbook," co-authored by Tom Plunkett, TJ Palassolo and Tejas Joshi, explains the distinctive features of the Exalogic cloud and Exadata. One of the most basic stems from Oracle's "engineered solutions" approach to systems design that produces integrated machines more capable than simple appliances in their ability to be configured for several applications. Exadata has optimizations not found in existing data warehouse appliances while also providing the first optimized solutions for OLTP. Similar optimizations are found in the Oracle Exalogic Elastic Cloud, whose hardware is interconnected by an extremely high bandwidth, low latency InfiniBand network fabric.
    IT - Storage
    x
    Creating Cohesive Storage Management
    ComputerWorld October 8, 2012
    "For cash-strapped IT shops looking to get out from under manual storage management chores, storage orchestration software looks like a lifeline: It promises to let users choose from a catalog of predefined storage services and then handle the provisioning details behind the scenes.

    It's a worthy vision, and one vendors are moving toward. However, there's currently no "single pane of glass" product that can automatically provision, resize, back up and recover storage across multiple public and private clouds, across systems from different vendors and for virtual machines running hypervisors from multiple vendors..."

    How To Choose Best SSD For Midsize Data Centers
    InformationWeek October 8, 2012
    "One consistent truth we have seen about solid state disk (SSD) is that the technology can improve performance in almost any size data center. The problem for midsize data centers beginning to explore this technology is how to best afford it. The SSD vendors have a seemingly endless set of options for data centers to consider, but which one is best for the midsize data center?.."
    When It Comes To Data Protection, Anything Goes
    ComputerWorld October 5, 2012
    "When I first started in the data protection space -- way back when Windows 95 was released, the first Toy Story movie hit the silver screen, and a series of caves was discovered in France that years later would lead to a fascinating Werner Herzog film – there weren’t a lot of choices for protecting enterprise data. You could back your data up to tape, or you could not back it up at all. They call that a Hobson’s Choice, I believe..."
    Fast SSD Storage, Slow Networks
    InformationWeek October 10, 2012
    "Systems built with solid state disks (SSD) represent the cutting edge in performance and are the "go-to" option for data centers looking to solve performance problems. So these systems should be coupled with the absolute cutting edge in storage I/O performance, too, right?

    In some cases, they do need a high-performance network. But in many cases, the server--or the application running on that server--cannot take full advantage of a high-speed network, even if they can take advantage of SSD..."

    Java Technology
    x
    Winners of the 2012 Duke’s Choice Awards
    Moving Java Technology Ahead on Many Fronts
    This year's Duke Award winners, announced at JavaOne 2012, include the following:

    • Apache Software Foundation Hadoop Project
    • AgroSense Project
    • JDuchess
    • Jelastic, Inc.
    • Liquid Robotics
    • London Java Community
    • NATO
    • Parleys.com
    • Student Nokia Developer Group – This year’s student winner: Ram Kashyap
    • United Nations High Commissioner for Refugees

    Read on for details ...

    Oracle Updates Information on Java EE 7 at JavaOne 2012
    Expected in Q213, Release Will Accommodate Many Developer Requests
    News about Java EE 7, discussed at JavaOne 2012, revealed that plans for the release, expected in Q213, include new features that will help facilitate building scalable HTML5 applications, including support for non-blocking (event-driven) I/O Servlet 3.1 API, JCache, JSON-P, WebSockets, JAX-RS 2.0 Client API, JPA schema generation and an improved security configuration, which can particularly benefit applications deployed to cloud environments. In addition, Java EE 7 is also expected to include a number of capabilities to help increase developer productivity, such as improved resource definition metadata, improved Managed Beans alignment (including transactional interceptors) and method-level validation with Bean Validation 1.1.
    Java Spotlight Episode 103: 2012 Duke Choice Award Winners
    Roger Brinkley Hosts Annual Interview Series
    Host Roger Brinkley devotes Episode 103 of the Java Spotlight to his annual interviews with the 2012 Duke Choice Award Winners. The Java Spotlight web site features a slide presentation that provides brief profiles of each winner, all of whom were announced at JavaOne 2012 held recently in San Francisco. More detailed information on the winners is available in the press release on oracle.com.
    IT - Technology
    x
    10 Technologies Shaping the Future of IT
    IT World October 10, 2012
    "Everyone is a trend watcher. But taking a hard look at the technologies that gave life to the latest buzz phrases is the only way to determine which trends will actually weave their way into the fabric of business computing.

    Here at InfoWorld, we're every bit as excited about big changes in the direction of enterprise IT, from the consumerization of IT to infrastructure convergence. But what vapor-free technologies have actually emerged to enable these IT strategies to take shape, and more importantly, which will cement these changes in your IT department in the years to come?

    Among the technologies shipping but not yet widely adopted, we see the following 10 having the greatest impact over the long haul. Get to know them..."

    Adoption of Augmented Reality Accelerates
    NetworkWorld October 5, 2012
    "After augmented reality became over-hyped about two years ago, interest waned a bit, but recently the idea seems to have gathered traction again. Google's Project Glass, a head-mounted display that started to be tested earlier this year, gave the concept a big boost, according to Martin Herdina, CEO at augmented reality vendor Wikitude..."
    Best Practices in Adopting Emerging Technologies
    InformationWeek October 8, 2012
    "Jayantha Prabhu, Essar’s CTO, has been in the forefront of adopting several emerging technologies. In an interview with Srikanth RP of InformationWeek, he describes the key technology initiatives taken by his group, and how he chooses emerging technologies whose business value is not proven, and there are no reference cases..."
      What Are Grand Technology and Scientific Challenges for the 21st Century?
      NetworkWorld October 10, 2012
      "What are the next Big Things in science and technology? Teleportation? Unlimited clean Energy? The scientists and researchers at DARPA and the White House Office of Science and Technology Policy put out a public call this week for ideas that could form what they call the Grand Challenges - ambitious yet achievable goals that that would herald serious breakthroughs in science and technology..."
      Free and Open Source S/W
      x
      Bossie Awards 2012: The Best Open Source Networking and Security Software
      A Large and Growing Range of Offerings

      In its Best of Open Source Software (BOSSIE) 2010 awards, InfoWorld has recognized a number of tools for building a network, running a network, and ensuring that the network is secure. Nominees include:

      • DD, WRT, HTTPS, Everywhere, True Crypt, FreeOTFE, Eraser, Darik's Boot and Nuke, Vyatta, Open vSwitch, Elastix, Anti,Spam SMTP Proxy Server, iSpy, OpenNMS, Cacti, Wireshark, Snor, Sagan, Suricata, Snorby, Nmap, Metasploit, BackTrack, Burp Suite, dc3dd , Ophcrack, John the Ripper, GnuPG, FindBugs

      Read on for details.

      Bossie Awards 2012: Now for Something Completely Different
      The Year's Best in Open Source Games and Geek time-wasters
      InfoWorld's Best Of Open Source Software (BOSSIE) 2012 awards the best among open source games and geek time-wasters, jocularly labeled the "Now for something completely different category." The winners in this group include:

      • Open Remote, 0 A.D., XBMC, Stella, BZFlag, Calibre, Arduino, Assault Cub, Freeciv, Warzone 200, Naev, Lightworks

      Read on for details.

      MySQL
      x
      Oracle Solaris 11.1
      New Features Make It Better than Ever
      It has been 20 years since the introduction of Solaris 2.0, Larry Wake observes, and in this anniversary year, Oracle announces Solaris 11.1, with new provisioning and update capabilities: the integration of Oracle ZFS, Zones, and IPS -- the new network repository and update system. Solaris 11.1 is designed to tie in to Oracle Solaris and the Oracle stack and to all the third party software, and SPARC and x86 hardware that's supported on Solaris. New features also include integrated network virtualization and the connected cloud management feature.
      MySQL Cluster Infrastructure Supports More than Three Million Subscribers in Top Online Game in Latin America
      Oracle and Playful Play Collaboration Results in Performance Improvements, Reduced DBA Effort; Availability
      Oracle and Mexico-based Playful Play are providing MySQL Cluster infrastructure for the top family game on Facebook in Latin America. More than three million subscribers play "La Vecindad de El Chavo," making it one of the fastest growing social games. Playful Play required horizontally scalable database technology with very high availability and so selected MySQL Cluster Carrier Grade Edition (CGE) running on a public cloud to manage the profiles of users and avatars, data play sessions, shopping applications, and its advertising and digital marketing events. Playful Play achieved 45 percent performance improvement; 80 percent reduction in DBA administration time; and 99.999 percent availability.
      Verizon Wireless Upgrades to MySQL 5.5 for Backend Support of Internal Communications
      Mission-critical Employee Portal now Delivers Improved Availability, Reliability

      Verizon has upgraded to MySQL 5.5 on Linux as the backend, the LAMP stack for Vzweb, its mission-critical, 24x7 employee portal, with Drupal as the front end. Verizon has supported Vzweb with MySQL 5.1 since3 2010. High connection spikes caused the IT team to apply workarounds to continue service. A number of key performance indexes (KPI) for the infrastructure were identified and the operational framework redesigned to support a more robust website and conform to the 99.985% uptime SLA (Service-Level Agreement). The upgrade has enabled Verizon to scale better.

      Cloud Computing
      x
      Oracle Launches One-stop Zero to Cloud Site
      Features Resources to Accelerate Journey to the Enterprise Private Cloud
      At the recent Oracle Open World 2012, the company introduced its "Zero to Cloud" resource center to help organizations deploy fully operational, enterprise-grade private cloud environments in as little as half a day, accelerating the journey to the enterprise private cloud. The online "Zero to Cloud" resource center includes best practices from Oracle experts and early adopter customers as well as interviews with Oracle development executives responsible for Oracle’s private cloud solutions and roadmap. It also includes a new self-assessment quiz that can help determine readiness for a successful private cloud deployment.
      Linux
      x
      Oracle Linux Wrap: Oracle Openworld 2012
      Links to Videos of Keynotes, Presentations
      If you'd like to review some of the Oracle Linux events from Oracle OpenWorld 2012, or if you did not attend the event, here's the next best thing: A wrap-up of the chief events of OpenWorld, ranging from a catalog of Oracle OpenWorld content to Edward Screven's keynote; the interview with Wim Coekaerts ... the list goes on. The links are to videos of the talks and presentations.
      IT - Cloud
      x
      Which Freaking PaaS Should I Use?
      InfoWorld October 8, 2012
      "Most of the buzz around the cloud has centered on infrastructure as a service (IaaS). However, IaaS is no longer good enough. Sure, you can forgo buying servers and run everything virtually on Amazon's EC2 server farm. So what? You still have to manage it, and to do that you'll have a growing IT bureaucracy. Companies that want to focus on writing their code and not have to think about application servers at all are now looking to platform as a service (PaaS)..."
      IT - DR
      x
      Choosing a Data Disaster Recovery Strategy
      Continuity Central October 11, 2012
      "Having a data disaster recovery strategy in place is undeniably critical to ensure business continuity in the event of unexpected disruptions. But implementing such a strategy can often be delayed for two reasons: one, it’s complicated to evaluate business operations to find critical data that needs to be made available immediately after a disaster, and two, many believe that disaster recovery is just too expensive, particularly for small and medium-size businesses..."
      Forrester: Time to Rethink DR Plans
      IT World Canada October 1, 2012
      "Disaster recovery plans are a series of steps you take to repair damage and carry on. But a DR plan won’t work when you have no time to rebuild, says a recent report by Forrester Research Inc.

      The goal today is 100 per cent uptime. But how do you get there? According to the analyst firm, IT infrastructure has to be constructed from the ground up to be resilient. In a report titled, “Move beyond disaster recovery and prepare for business technology resiliency,” Forrester decries what it says is an outdated concept of leaving DR to storage professionals and argues it should be replaced by a comprehensive, company-wide strategy: business technology resiliency..."

      Minimize & Prepare for Data Recovery Failures
      Processor October 5, 2012
      "For a data center, data loss can either be a minor inconvenience or a large-scale catastrophe. That’s why it’s important to have backup solutions and a data recovery system in place. You may think you’re fully protected by simply having these solutions in your data center, but what if one or more of them were to fail? In order to avoid a worstcase scenario, you need to have a plan ready to go, monitor your recovery solutions at all times, and know what you’ll do if you need someone to manually recover your data."
        IT - PM
        x
        Is Agile Really Mission Impossible?
        Keeping Agile September 21, 2012
        "Acted to the theme music of Lalo Schifrin, is Agile really mission impossible? You are in a tense situation. Profits are down or non-existent. Your competition is threatening you. Your employees are unhappy. Now you are expected to get software development done much quicker with smaller development teams and less budget and it has to be done in six weeks or less. Let’s run down the impossibility checklist, Mr. Briggs (or is it Mr. Phelps?):..."
          IT - Networks
          x
          4 Must-Ask Interview Questions for Network Engineers
          NetworkComputing October 10, 2012
          "I enjoy being on an interview panel for networking candidates. My job is usually to be the technical heavy. I need to determine what the candidate knows, what the candidate doesn't know, and what I think he or she could figure out. I rely on four questions to get at this information. But first, here's some things I don't ask..."
            Addressing WAN Latency Issues in Application Performance
            NetworkWorld October 8, 2012
            "I'd like to spend the next few columns talking about which of the various technologies addresses the different issues impacting application performance over the WAN, and which technologies address which issues best. We'll cover not just the "biggest, baddest" newer networking technologies – WAN Optimization, WAN Virtualization and Network-as-a-Service ..."
            Eliminate Network Data Bandwidth Hogs
            Processor October 5, 2012
            "Even if your enterprise has adequate bandwidth to satisfy employee and customer needs, it’s important that network administrators have the ability to monitor how employees, customers, and various applications are using that bandwidth in order to monitor and set thresholds on usage should the need arise. The following tips can help in recognizing network bandwidth hogs and controlling their bandwidth habits..."
              IPv6 Transition: Key Dates, Services and Issues for the Move
              eWeek October 5, 2012
              "The Sept. 30 deadline for the IPv6 government public-facing server transition has passed, and the U.S. government is behind, costing taxpayers down the road and inviting the potential for a network disaster. The National Institute of Standards and Technology (NIST) recently released results showing 58 percent of agencies had made little-to-no progress toward moving to IPv6 from IPv4..."
              New Security Threat at Work: Bring-Your-Own-Network
              ComputerWorld October 10, 2012
              "Even as IT pros wrestle with the bring-your-own-device (BYOD) trend, corporate security is being further complicated by another emerging trend: bring your own network (BYON).

              BYON is a by-product of increasingly common technology that allows users to create their own mobile networks, usually through mobile wireless hotspots. Security professionals say BYON requires a new approach to security because some internal networks may now be as insecure as consumer devices..."

              IT - Operations
              x
              Data Center Operators In For A World Of Change
              NetworkWorld October 4, 2012
              "The basic tasks of running a data center will change out of all recognition in the near future, according to an expert panel speaking at Interop NY on Wednesday, and there really aren't any easy blueprints to follow.

              The challenges posed by some of the hottest trends in modern business IT, such as cloud computing and BYOD, as well as simple facts of life like increasing server density and commensurate energy costs, all point to vast increases in demand for computing resources..."

              DCIM Can Help Solve the Data Centre Disconnect: Forrester
              TechWorld October 11, 2012
              "Data centres are at risk from a fundamental lack of communication between the IT operations department and the facilities department, according to Forrester analyst Richard Fichera.

              Speaking at Emerson Network Power's DCIM Delivered event in London yesterday, Fichera said that there is a “critical organisational flaw” in a lot of companies..."

                Running Lights Out Management Without Putting Your Organization's Lights Out Permanently
                Continuity Central October 11, 2012
                "LOM is a potent technology which has its uses; however it also poses some potential risks which every enterprise must be aware of...

                Intelligent Platform Management Interface (IPMI) technology underpins lights out management (LOM) in IT departments around the world. LOM allows an IT administrator or IT security manager to manipulate and manage servers using remote control - even switching on the machines when they are ‘off’. ... LOM usually provides access to the keyboard, video, and mouse over LAN..."

                IT - Security
                x
                10 Things You Can Do To Improve Network and PC Security
                TechRepublic October 8, 2012
                "Security. It’s that which drives some administrators to early retirement, gray hair, or a permanent room in a padded cell. Okay, that’s an exaggeration… but you get the idea. Security is tops on most every administrator’s list. And with good reason. Incomplete or poor security can bring down a company’s network and/or computer resources. That equates to lost work, which affects bottom line."
                Cyberattacks in U.S. Cost an Average $8.9 Million Annually To Clean Up, Study Says
                NetworkWorld October 8, 2012
                "According to a survey of 56 corporate and governmental organizations conducted by the Ponemon Institute, the average amount they paid for all the costs associated with cyberattacks was $8.9 million during the past year. That's up 6% from the previous year's study.

                And for the first time, Ponemon expanded the survey to other countries, including the United Kingdom, Germany, Australia and Japan. Costs ascribed to cyberattacks in those locales was significantly lower: $5.9 million in Germany and $5.1 million in Japan, for example..."

                  HSTS Approved As Proposed Standard
                  HelpNet Security October 4, 2012
                  "The Internet Engineering Steering Group (IESG) has approved the HTTP Strict Transport Security protocol (HSTS) as a proposed standard, which means that we can look forward to it being ratified in the near future.

                  The HSTS is a web security policy mechanism that allows web servers to order browsers that connect to it or any of its subdomains to use a secure connection, and it does so via a HTTP response header field named 'Strict-Transport-Security'..."

                  Security Manager's Journal: I Hired a Hacker
                  IT World October 8, 2012
                  "A very important piece of my budget is the quarterly allotment for security assessments. I usually focus on physical penetration testing of our major facilities or assessments of critical applications or our own products. This quarter, though, I decided to hire a hacker.

                  A consulting firm that specializes in penetration testing finds several vulnerabilities.Action plan: Plug holes and write new procedures -- and find out why no one on the security team noticed any suspicious activity..."

                  Stay Ahead of the Security Curve -- And Keep Your Job
                  InfoWorld October 8, 2012
                  "Computer security professionals have the toughest job in the world. We have to be as smart and creative as doctors and engineers, but our field changes even faster.

                  Each month, I read 20 security-related magazines and one or two books; each day, I check out at least an hour or two of security-related news or blogs. I read computer security articles not only in the bathroom, but also while getting my hair cut and waiting at traffic lights in my car. I take any free opportunity to learn more about my field. I know I'm not alone. Heck, if you're reading this, you may be a security geek yourself..."

                  The Hacktivist Threat to Enterprise Security
                  Search Security October 8, 2012
                  "Ask Adam O'Donnell the difference between hacktivists today and those 15 years ago or more, and you won't get a simple answer. Technology has changed, social norms are different and political motivations ..."

                  (free membership required)

                    Three Ways to Defeat a ReverseMe
                    INFOSEC Institute October 3, 2012
                    "Disassembling or debugging commercial programs is usually prohibited by international laws. When practicing reversing and when we need to study a kind of software protection, reverse engineers usually make some stand alone applications which implement only the protection, in other words it simulates the behavior of a software protection, nothing more nothing less!..."
                      Turning Tables: ID'ing The Hacker Behind The Keyboard
                      Dark Reading October 2, 2012
                      "Even if you learn the name and get a photo of the Chinese hacker sitting behind the keyboard and siphoning your valuable intellectual property, it's unlikely to lead to his arrest. But there are ways to use that information to put the squeeze on the attacker and his sponsors.

                      After years of focusing mainly on the malware used in data breaches and financially motivated hacks, some security experts have begun to turn the spotlight on the attacker himself, attempting to profile the bad actors stealing your blueprints or customer credit card numbers, or leaking your usernames and passwords on Pastebin. Leading that charge is CrowdStrike, the startup that aims to aggressively profile, target, and, ultimately, help unmask sophisticated cyberattackers..."

                      Find and Fix These Seven Security Slips
                      TechRepublic October 8, 2012
                      "First thing first: IT security leaders do an incredible number of things right when it comes to protecting the enterprise, the employees within it, and the organizational data. But we all have room for improvement, especially with our security. These are areas that upon closer reflection, don’t really service the security mission — even if some of those very things have become accepted as “best practice” approaches over time.

                      Likewise, there probably are some steps we haven’t taken that improve security, due to time pressures, no budget, or a lack of management support..."

                      Is Your Organization Doing Good Things Or Doing The Right Things?
                      Dark Reading October 4, 2012
                      "Organizations are spending significant resources on security and still getting compromised. The problem is that they are doing good things that will help build a solid security foundation, but they are not solving the right problems that will actually stop attacks.

                      The problem is that many organizations are misaligned with risk. The general formula for calculating risk is: risk = threat x vulnerabilities..."

                      IT - Careers
                      x
                      Computing Advice That Can Stand the Test Of Time
                      NetworkWorld October 5, 2012
                      "Technology never stops moving foward. Hardware gets faster, and operating systems gain new features and (we hope) finesse. This is natural computing law. But just because computers are one big exercise in evolutionary progress, that doesn't mean certain computing maxims ever go out of style. Take, for example, the nuggets of wisdom in the following list. All of these things are as true today as they were 2, 5, and in some cases even 10 or 20 years ago..."
                        10 Noncertified IT Skills That Pay a Premium
                        CIO October 4. 2012
                        "The economic down turn that began in 2008 prompted many companies to rethink their employee-hiring requirements and practices---which largely involve acquiring employees with unique IT skill-sets. Many of these skills and areas of expertise do not require certifications and are more about experience and IT acumen."
                          Five Free Adobe Reader Replacement PDF Viewers
                          TechRepublic October 2, 2012
                          "The Portable Document Format (PDF) is one of the most oft-used document types in business. Not only are they a more universal solution to creating well-designed documents, they can also be interactive and secure. So PDFs are a no-brainer for businesses looking for a professional-looking document.

                          When it comes to viewing those documents, most users believe there to be only one solution - Adobe Reader. However, in many instances, that solution is far and away from the best. It's bulky, slow, and is known to cause issues. To that end, why not use a more lightweight viewer for PDF documents? They exist and many of them are quite good..."

                            The True Legal Vulnerability of Linux
                            IT World October 8, 2012
                            "A recent focus on the problem of software patents raises the question: could Linux be sued off the face of the Earth?

                            The not-so-random thought came up this weekend when I read the New York Time's special report, "The Patent, Used as Sword." This article, which I highly recommend you read when you get a chance, comprehensively examines the broad landscape of software patents without really coming down too hard on one side or the other. It does, I should add, leave you with the sense that something is wonky with this whole idea that billions can be spent and companies can go down just because one side's lawyers are quicker on the draw than others..."

                            5 Things You Need to Know About Risk Management
                            NetworkWorld October 11, 2012
                            "Commercial espionage. Compliance. Crazy weather. Credit default swaps. Risk is everywhere and if you're just trying to minimize it within IT, you're missing the point.

                            Instead, learn to be a "risk intelligent" CIO who can help your organization wisely take--and profit from--risks..."

                            IT - Social Media
                            x
                            California Passes Strict Social Media Privacy Law
                            Security InfoWatch October 3, 2012
                            "California, home to many of the world's social media companies, now has the nation's strictest privacy laws preventing your boss or college from surfing through the personal information you post on sites like Facebook.

                            It will be illegal for companies or universities to ask for access to your personal social media or email accounts under two bills signed Thursday by Gov. Jerry Brown..."

                            Social Media Presents Risk of Data Overload
                            ComputerWeekly October 5, 2012
                            "Employees are at risk of information overload as social media technologies are increasingly used in the workforce, CEOs of small and medium-sized businesses heard at The Exchange 2012 conference.

                            Social media will increasingly replace email as the communication method of choice within organisations, delegates heard at the event in London..."

                              IT - Virtualization
                              x
                              Desktop Virtualization No Cost Saver?
                              NetworkComputing October 4, 2012
                              "An industry consultant has a message for IT organizations looking to bring the benefits of virtualization to the PC: Don't believe the hype when it comes to VDI.

                              Don Krueger, principal consultant at GlassHouse Technologies, said that while Virtual Desktop Infrastructure (VDI) can bring lots of benefits to the enterprise and to knowledge workers, cost savings isn't one of them..."

                              Do the Virtualization Math: When Four CPUs Aren't Four CPUs
                              InfoWorld October 8, 2012
                              "One of the major advantages of virtualization is the ability to dynamically add CPU and RAM to running virtual machines. Have a box that gets a sudden spike? Add more RAM on the fly and let it go. It's a fantastic way to deal with certain compute issues, and it can make a tough decision disappear due to the fact that downtime and reboots aren't required.

                              However, allocating CPU and RAM with the click of a mouse -- dynamically or otherwise -- can have deleterious effects on your servers in some circumstances. You really need to understand your workload and your OS..."

                                IT - Compliance
                                x
                                Companies Take Risks With Compliance
                                Baseline October 9, 2012
                                "Over the last decade, compliance has emerged as an enormous challenge for organizations large and small. Amid a spate of regulations and requirements, many companies are struggling to manage policies and regulations. A study of 200 North America IT and business executives conducted by DataMotion, provider of cloud-based data delivery services, indicates the severity of the problem. Nearly one in three respondents admitted that their organization knowingly takes compliance risks..."
                                  Information Lifecycle Governance: Aligning Information Stakeholders to Improve Information Economics
                                  Bank Systems and Technology October 8, 2012
                                  "To address numerous problems stemming from paper-based governance processes, BNY Mellon has embraced a cross-functional Information Lifecycle Governance program. Here’s how the initiative is transforming the institution’s legal, records and IT practices to improve information economics while reducing risk..."
                                    Privacy Law to Cost Billions
                                    IIT Web October 8, 2012
                                    "Implementing the Protection of Personal Information (PPI) Bill’s requirements around data will cost local companies large amounts of money, if they have not already sorted out their databases to make sure the information is accurate.

                                    The Bill, which is expected to come into law towards the end of this year, or early next year, will be the first consolidated piece of privacy legislation in the country. It dictates how and what personal information can be used, and how it must be stored securely, and forces companies to tell people if their information has been breached..."

                                      IT - Email
                                      x
                                      Email as a Service Not As Easy As It Sounds
                                      CIO October 3, 2012
                                      "When the government tried to implement email as a service, it had to balance security concerns with free trade policies that sparked a contentious discussion about where in the world email servers could be located. Your firm's EaaS plans won't be as complex, but you can still learn from the government's efforts..."
                                      Email Regulation a Major Concern for IT Departments
                                      eWeek October 8, 2012
                                      "While IT departments are worried about muddy policies on email archiving and regulation, many businesses don’t have clear policies in place.

                                      Businesses are leaving themselves exposed to potential litigation or compliance issues due to a lack of clear-cut corporate email archiving and retention policies, according to a Loudhouse Research survey sponsored by cloud-based email management Mimecast of IT decision makers across a range of company sizes and industry sectors and regions. The sample consisted of 200 U.S. respondents, 200 from the U.K. and 100 from South Africa..."

                                      IT - Database
                                      x
                                      Dodging 5 Dangerous Database Default Settings
                                      Dark Reading October 11, 2012
                                      "Out-of-the-box settings and weak configuration of databases make it easier for thieves to break into data stores and harder for IT to quickly detect breaches ...

                                      Even as enterprises spend buckets of cash on data defenses at various layers of IT infrastructure, many of them sabotage their efforts by ultimately storing that information in poorly configured databases. Whether due to legacy application logistics, convenience to administrators, or lack of awareness by DBAs, databases set up with out-of-the-box settings are all-too-common within the enterprise..."

                                      IT - Mobile
                                      x
                                      Cloud Security Alliance Outlines Top Mobile Threats
                                      HelpNet Security October 5, 2012
                                      "The Cloud Security Alliance (CSA) Mobile Working Group released findings from a new survey that calls out the specific security concerns enterprise executives say are the real and looming threats as it relates to mobile device security in the enterprise environment.

                                      The new report, titled Top Mobile Threats, is a result of a survey of more than 200 enterprise participants representing 26 countries globally. The survey serves as an important first step in a larger effort to provide industry guidance on where enterprises should place their resources and focus when it comes to addressing mobile security threats..."

                                      IT - Big Data
                                      x
                                      Big Data Shakes Traditional BI Perspectives
                                      Information Management October 5, 2012
                                      "Is big data more than just lots and lots of data ? Is big data unstructured and not-so-big data structured? Malcolm Chisholm explored these questions in his recent Information Management column, where he posited that there are, in fact, two datas..."
                                      Big Data Advice from Big Names, Coca-Cola and Lastminute.Com
                                      ComputerWeekly October 4, 2012
                                      "Speakers at the recent Big Data Europe event in London advised businesses not to cross the creepy line and to be aware that data is rotten fruit.

                                      Speaking in a personal capacity as a subject matter expert, Katherine Fithen, chief privacy officer at Coca-Cola, put forward a “privacy by design approach” at the event..."

                                      Predictive Analytics Go To Work
                                      ComputerWorld October 8, 2012
                                      " The Orlando Magic's analytics team spent nearly two years honing its skills on the business side.

                                      "Eighteen to 20 months ago, we knew virtually nothing about predictive analytics," says Anthony Perez, director of business strategy for the National Basketball Association franchise. While his team members were in fact working on predictive analytics well before that, Perez adds, their tools weren't powerful enough to give them the insights they needed, and the group had to scale up its efforts. So Perez brought in new, more powerful software from SAS and began climbing the learning curve..."

                                      Why Big Data Security in the Cloud is No Small Matter
                                      Enterprise Systems Journal October 11, 2012
                                      "Big data is getting bigger all the time. Cloud computing is garnering increasing interest from IT. Are these two technologies bound to come together, and if so, what benefits to they offer the data center?

                                      To learn more about the convergence of Big Data and the cloud, we turned to Rand Wacker, vice president of product management for CloudPassage, where he helps enterprises adopt disruptive cloud computing services by solving the security and compliance problems that arise when IT moves from private data centers to public cloud services..."

                                      Why Doesn't Governance Lead to Data Freedom?
                                      Information Management October 5, 2012
                                      "There was lots of feedback on my last blog that clearly indicates the divide between definitions in trust and quality. It is a great jumping off point for the next hot topic, data governance for big data.

                                      The comment I hear most from clients, particularly when discussing big data, is, “Data governance inhibits agility.” Why be hindered by committees and bureaucracy when you want freedom to experiment and discover?..."

                                      IT - BYOD
                                      x
                                      3 Tips to Keep BYOD from Killing Your Network
                                      NetworkComputing October 4, 2012
                                      "Much of the coverage around BYOD focuses on the complexities of data protection and policy enforcement on user devices that don't necessarily belong to the employer. But BYOD also has network implications. In my own environment, on a university campus, the number of people who use the network is the same, but they routinely use multiple devices. As more smartphones and tablets connect to the WLAN, that means increased load and stress on network resources such as DHCP and authentication servers. Here are three tips to help you manage the network side of the BYOD challenge..."
                                      Legal and Technical BYOD Pitfalls Highlighted At RSA Conference
                                      ComputerWorld October 11, 2012
                                      "Allowing employees to bring their own devices to work is causing new challenges, including what happens when a device needs to be wiped or employees want to sell their smartphone or tablet.

                                      Mobile security and BYOD (bring your own device) are main themes at the European edition of RSA's security conference, which takes place this week in London..."

                                      Top10
                                      x
                                      Top Ten Articles for last few Issues
                                      Vol 176 Issue 1; Vol 175 Issues 1, 2, 3 and 4; Vol 174 Issue 3, 4 and 5
                                      We track how frequently each article is viewed on the web site to determine which the readers consider the most important. For last week, the top 10 articles were:

                                      • Oracle Solaris 11.1
                                      • Roadmap for Java SE and JavaFX at JavaOne 2012
                                      • Oracle Introduces Exadata X3 Database In-Memory Machine
                                      • What's up with LDoms: Part 4 - Virtual Networking Explained
                                      • Oracle Solaris ZFS: An Overview
                                      • Java Spotlight Episode 102: Freescale on Embedded Java and Java Embedded @ JavaOne
                                      • MySQL 5.6 Release Candidate Now Available for Download
                                      • SPARC T4-4 Delivers World Record First Result on PeopleSoft Combined Benchmark
                                      • Oracle Announces NetBeans IDE 7.3 Preview Release
                                      • Oracle Anounces Development Mileston Release of MySQL Cluster 7.3

                                      The longer version of this article has list of top ten articles for the last 8 weeks.

                                        Security
                                        x
                                        Latest Security Inside Out Newsletter Now Available
                                        Follow the Happenings at Oracle OpenWorld; Get Links to Podcasts and Videos
                                        The September/October 2012 edition of "Security Inside Out Newsletter" includes information on Oracle OpenWorld and the database security sessions held there; hands-on labs; label-based access controls in Oracle Database 11g; Privileged Account Manager; webcasts on database security and identity management; links to podcasts and videos; and more, blogger Troy Kitch announces. Kitch provides a link to the current issue and to the subscription sign-up page.
                                        Trending in
                                        Vol 231, Issue 3
                                        Trending IT Articles