News about Oracle's Solaris and Sun Hardware
System News
Oct 15th, 2012 — Oct 21st, 2012 Generate the Custom HTML Email for this Issue
System News System News for Sun Users
Volume 176, Issue 3 << Previous Issue | Next Issue >>
Sections in this issue:
click to jump to section

Database Insider - October 2012
Stay Up to date on Database Technology with Oracle Newsletter
The October 2012 issue of Oracle's Database Insider Newsletter is now available. Contents include the following news articles:

  • "Newly Launched Oracle Exadata X3 Redefines Extreme Performance"
  • "Oracle OpenWorld Revelations Top Agendas at Regional User Group Meetings"
  • "FAQ: Label-Based Access Controls in Oracle Database 11g"

The issue also includes links to a video feature on analyzing big data, as well as links to a variety of webcasts and podcasts, news from the Oracle Database 11g Resource Center, reader responses, and a calendar of events.

'Maximizing Your SPARC T4 Oracle Solaris Application Performance'
Talk by Darryl Gove at Oracle OpenWorld 2012
The slide set for Darryl Gove's talk Maximizing Your SPARC T4 Oracle Solaris Application Performance, which he delivered at Oracle OpenWorld is now available to download. His presentation addresses four topics: hardware, correctness, performance, and parallelism, and he concludes with four recommendations on optimizing for the T4 processor:

  • Profile and remove inefficient code
  • Explore benefits of increased optimization
  • Identify opportunities for parallelization
  • Profile and tune parallel code
  • Watch for hitting hardware limits

Darryl Gove is Senior Principal Software Engineer at Oracle.

Exadata X3 Hardware Upgrade Expands Flash Memory Capacity
Oracle also Releases Exadata, Giving Compute Nodes UEK Kernel

Oracle's release of the hardware update for Exadata X3 makes only minor changes to the overall architecture but the storage capacity has been enormously enhanced with hardware refreshes that provide each cell with 1600 Gigabytes (GB) of flash. An X3-2 full rack will therefore have 20.3 Terabytes (TB) of total flash, R. Kundersma blogs. There is also a new Exadata release,, that can be applied to existing installations. Both the storage cell patch and the patch for the compute node can be applied using YUM. By default, all compute nodes that will be updated to will have the UEK kernel.

Consolidating Oracle E-Business Suite R12 on Oracle's SPARC SuperCluster
Using Oracle Solaris Cluster and Oracle Real Application Cluster for High Availability Performance
The Oracle Optimized Solution for Oracle E-Business Suite R12 12.1.3 is now available on, Giri Mandalika reports. The post provides a brief explanation of optimized solutions and provides a link to business and technical white papers available to download once a user has registered and logged on. Mandalika also explains, and provides a detailed graphic to make his point, how when Oracle e-Business Suite R12 is consolidated on SPARC SuperCluster, it is Oracle Solaris Cluster and Oracle Real Application Cluster that deliver the high availability required for E-Business Suite.
IT - Storage
Solid-state drives: 10 questions, 10 solid answers
IT World October 15, 2012
"As solid-state drives (SSDs) are becoming more and more mainstream, with 64GB-128GB models well below the $100 price point, it's time to go behind the scenes, solve some mysteries, and give you some answers on how to treat SSDs right.

Here, in no particular order, are answers to your burning questions around flash storage..."

Getting Real with MDM
Information Management October 15, 2012
"Since the first survey from The Information Difference in 2008, much has changed in master data management, both in technology and in implementation expertise and experience. In particular, MDM has graduated from a novel innovative technology to become relatively mature and accepted. It is increasingly being adopted by multinational organizations to tackle their data inconsistency nightmares and deliver reliable, trusted business information..."
IT - Technology
How It Works: The Technology of Touch Screens
ComputerWorld October 17, 2012
"Here's a question: What is a technology that you can't see, but is essential to smartphones, tablets and other mobile devices -- and is estimated to generate $16 billion in revenues this year (according to DisplaySearch)? The answer is multitouch touch screens -- which have sparked the explosive growth of the mobile device market..."
    How Self-Driving Cars Will Revolutionize Business
    Internet Evolution October 16, 2012
    "I've become obsessed with self-driving cars. They're coming soon -- Google's Sergey Brin hopes to see the first consumer models on the road in five years. Expect them to become ordinary in a decade. You might own one yourself, and even if you don't, you won't find it remarkable when one goes by. In less than 30 years, according to experts, three-quarters of the cars on the road will be robocars..."
    Oracle Solaris Videos on YouTube
    Get the Picture; It's Free
    There are 23 videos on YouTube dealing with a number of Oracle subjects ranging from Conor Nolan's three presentations on ZFS boot environments, branded zones on Solaris 11, and ipkg zones and beadm on zones. Others include several Oracle executives presenting overviews of the company's plans for its various offerings; Glenn Brunette on Oracle SPARC Supercluster data protection; the Geek Fest discussion of the T4 and T5 SPARC processor design; Oracle Solaris 11 zone provisioning with Oracle Enterprise Manager Ops Center; the two-part video on moving from Solaris JumpStart to Automated Installer ... the list grows weekly. Check out this accessible, free resource.
    Cloud Computing
    Cloud Architecture Patterns: New Title from O'Reilly
    Explains Utility of 11 Platform-agnostic Patterns; with Examples
    "Cloud Architecture Patterns" by Bill Wilder, Principal Consultant at Development Partners Software, is a new title from O'Reilly that introduces 11 architecture patterns designed to help teams investigating ways to design applications for the cloud. The book shows readers how each of these platform-agnostic patterns works, when they might be useful in the cloud, and what impact they’ll have on application architecture. Wilder includes an example of each pattern applied to an application built with Windows Azure. He divides the book into four major topics: scalability, big data, handling failure, and distributed users.
    IT - Cloud
    Expect To Save Millions In The Cloud? Prove It
    InformationWeek October 12, 2012
    "The General Services Administration, in justifying its decision two years ago to adopt Google's cloud services for email and collaboration, projected it would save $15 million over five years. Now, an internal audit has found that evidence of those anticipated savings is lacking..."
    Managing Cloud Downtime
    Enterprise Systems Journal October 15, 2012
    "One of the key benefits of moving to the cloud are the economic advantages the technology offers, until downtime seriously affects your customers’ ability to interact with your enterprise. We asked Joe Graves, chief information officer at Stratus Technologies (a high-availability solutions provider) what your enterprise can do to ensure that such service disruptions don’t cripple your business..."
      Red Flags in Cloud Vendor Management
      Bank Systems and Technology October 15, 2012
      "In their latest statement on managing cloud computing risks, the FFIEC has made it clear that cloud vendors must adhere to the same due diligence, contract and monitoring guidelines as any other vendor. In other words, the decision must be consistent with the strategic goals of the institution, the vendor must still address information security concerns and must satisfactorily recover and resume operations in the event of a disaster..."
      IT - CxO
      CIOs and CSOs Have Costly Disconnect
      ComputerWorld October 12, 2012
      "When it comes to securing business-technology systems, CIOs face a challenge that won't go away.

      The problem isn't necessarily new attack techniques, insecure software or even the latest government regulations. Rather, it's the challenge of seeing eye-to-eye with the CSO about how much security is enough..."

      CIOs Get No Respect From the C-Suite
      CIO Insight October 15, 2012
      "Do you feel left out of the most critical conversations between top executives in your organization? You're not alone. The vast majority of CIOs say they're not part of their company's business planning, according to a recent survey from CA Technologies..."
        How a Great CIO Is Like a Great Quarterback
        CIO Insight October 2, 2012
        "The values and differences between public and private cloud approaches and offerings is certainly a timely and important issue and CIO Insight will help readers compare and contrast the pros and cons of both approaches. I however want to take a different slant on the whole cloud conversation..."
        IT Departments Warned: Evolve or Die
        TechRepublic September 21, 2012
        "Keeping the lights on is no longer enough: IT departments need to meet business demands or risk being demoted to a minor support role.

        Keeping the servers humming is no longer enough to justify the existence of the IT: it’s time for the tech team to raise their game - or risk becoming irrelevant.

        The IT department needs to prove to the business why it’s more than just a support function, according to Essex County Council CIO David Wilde..."

        IT Organizations Shift Focus Toward the Fundamentals
        IT Business Edge October 18, 2012
        "With the economy stuck in a slow grind, the latest survey from The Society of Information Management (SIM) is focused mostly on business productivity and cost reduction. That’s not necessarily coming at the expense of other goals, such as the alignment of business and IT, but it does indicate that tactical issues are getting a lot more attention from IT leaders who are concerned about being able to demonstrate measurable IT values..."
        Making Meetings Less Awful
        Baseline May 25, 2011
        "Meetings can be torture. The average worker spends 5.6 hours every week in meetings, yet 71% of participants say it’s pretty much a waste of time, according to a Microsoft survey. Meetings themselves are not the problem, however; it’s the folks running the meetings. That’s the theme of "Boring Meetings Suck: Get More Out of Your Meetings, or Get Out of More Meetings" (Wiley/available now), a book by Jon Petz..."
        Recruiting Star Talent? Do This First
        Inc. September 28, 2012
        "When it comes to top hires, the questions people ask tell you far more than the answers they give. When I interview, I don't ask many questions. Instead, I simply open with, "What can I tell you about the company?" It forces candidates to think of questions to ask me, rather than inviting them to recite canned, rehearsed responses about their background and goals..."
          Ten Ways to Bring Out Your Samurai Leadership Skills
          CIO Insight October 16, 2012
          "Is it possible to take on ruthless competitors, formidable market change, cut-throat office politics, and still maintain integrity? Yes, it certainly is, according to the book, "Samurai Business: The Way of the Warrior for Professionals in the Digital Century. (Meghan-Kiffer Press/available now). Author Joris Merks posits that in our digital age of great transparency, honesty and compassion are admirable qualities in CIOs and others in leadership roles..."
            What Are the Requirements CIOs Expect from a Tier 1 Service Provider?
            Gartner October 16, 2012
            "It's October. It’s Orlando. It must be time for Gartner Symposium. This year’s event represents a pivotal time for CIOs and IT particularly as the world makes the transition between a focus on IT and a broader focus on Technology. The Nexus of forces (Cloud, Mobile, Social and Information) is a focus of the event, but there is much more to technology than just new things you buy and stick into the infrastructure.

            IT is coming off of a decade of devaluation , where the primary question CIOs had to answer was: How to manage the cost of IT?..."

            Why Risk Management Fails in IT
            NetworkWorld October 16, 2012
            "It is frustrating to see the amount of budget allocated to compliance when you consider that most of the money goes to documenting security controls, not improving defenses. One of the biggest reasons is that risk management, a carry-over from the bigger world of business, does not work in IT security..."
            Why Business Doesn't Look To IT for Innovation
            InformationWeek October 8, 2012
            "Remember when the IT department was the group that saved your bacon time and again? Computer crashes that everyone was convinced wiped out precious corporate data turned into miraculous recoveries. Critical applications that suddenly stopped working were just as suddenly revived. Even the ill-conceived, snarky "reply all" email that was deleted before corporate-wide distribution. Windows upgrades, network upgrades, database upgrades, everything upgrades were handled with aplomb..."
            IT - DR
            5 Tips for Effective Disaster Recovery
            HelpNet Security October 11, 2012
            "David Mount, technical director at NetIQ, has highlighted 5 tips that will help businesses implement effective disaster recovery plans for their all important IT assets..."
            IT - PM
            11 Tips to Get the Most Out of Project Management Software
            CIO October 10, 2012
            "The best project management software in the world will not help your organization complete projects faster or more efficiently if employees don't or won't use it. So how do you choose the right project management solution (software) for your business? surveyed dozens of IT executives and project management experts to find out. Following are their tips for getting the most out of project management software..."
            PPM - Why Now More Than Ever?
            Business Management October 13, 2012
            "The success of any business is directly influenced by the value delivered by their IT organization. And for those IT leaders who are charged with making those results happen, they know that a focused commitment to a formalized PPM initiative is a critical success factor.

            In fact, an August 2008 Gartner survey of IT leaders stated that "IT leaders who responded to an August 2008 Gartner survey indicated that more than half of their organizations are "currently undertaking" major initiatives for portfolio management, the introduction of program management, IT governance implementation or enhancement and/or project management office (PMO), and enterprise PMO formation."

            IT - Networks
            How to Set Up a Business-Grade Wi-Fi Network
            CIO October 9, 2012
            "The Bring Your Own Device (BYOD) trend means the number of smartphones and tablets are making their way onto corporate networks will only rise. An increasing number of these devices, including the Amazon Kindle Fire and Google Nexus 7 tablets, are Wi-Fi only; this inevitably puts a strain on existing Wi-Fi networks. For businesses that are either (very) late to the Wi-Fi bandwagon or looking to overhaul an anarchic wireless infrastructure, here are several important points to consider..."
            Network Complexity Causes Security Incidents
            HelpNet Security October 16, 2012
            "Complex network security policies, such as those found in multi-vendor environments, are directly related to system outages and security breaches, according to AlgoSec.

            The survey found that more than 50 percent of respondents reported a security breach, system outage, or both, due to complex policies..."

            IT - Operations
            Don't Touch That Cable If You Know What's Good For You
            InfoWorld October 15, 2012
            "If there's a single common element to most successful data centers, it's at least one admin with a touch of OCD. At some level, obsession and compulsion are necessary to keep things running smoothly and reducing the propensity for the situation to go haywire.

            It's not just about keeping a close and detail-oriented eye on the software and systems, but also paying attention to how the data center is constructed and maintained..."

              18 Strange Things Spotted Inside A Google Data Center
              IT World October 17, 2012
              "Google on Wednesday published a video showing off some of the insides of its Lenoir, N.C., data center (see the video in my ITworld.TV post here), offering a peek-behind-the-curtain of the inner workings one of the biggest companies in the world (at least their data center operations).

              But Google being Google, that's not cool enough. Why not take a whole bunch of pictures via the Street View mechanism, and allow people to tour the site on their own? So that's what they did..."

              A Tour of DreamWorks Studios' Data Center
              ComputerWorld October 18, 2012
              "With all the computer-generated (CG) imagery that DreamWorks Imagination Studios produces, you'd think their data center infrastructure would be cloud-enabled, virtualized and fat with solid-state storage. You'd be mostly wrong..."
              Today's Datacentres Run at Much Lower Temperatures than Necessary
              ComputerWeekly October 17, 2012
              "Datacentres are still running at below 20ºC wasting electricity although the optimum temperature for operating them is 25-26ºC, experts have said.

              “Many datacentres operate at cooler temperatures than necessary because customers are not comfortable running IT facilities at higher temperatures for fear that the systems will fail,” said Jim Hearnden, product technologist for datacentre power and cooling at Dell..."

              Six Habits of Highly Efficient Data Centers
              InfoWorld October 15, 2012
              "Data center operators don't bandy the word "green" around as much these days compared to a couple of years ago. That doesn't mean companies have abandoned projects aimed at boosting energy efficiency while making better use of their IT resources, both for the sake of slashing operating costs and reducing their environmental impacts.

              Research Company 451 Group has put together "Highly Energy-Efficient Data Centers in Practice," a comprehensive report that examines six green practices..."

                IT - Security
                Most Believe Free Wi-Fi Can Lead To Identity Theft
                HelpNet Security October 18, 2012
                "A new study by the Identity Theft Resource Center (ITRC) and PRIVATE WiFi, revealed that 79% of respondents believe that using a free Wi-Fi connection can lead to identity theft.

                45% of respondents said they were concerned about their security when using a public hotspot and 15% indicated that they were "very concerned." 44% of respondents weren't aware that there is a way to protect their sensitive information while using a public hotspot..."

                5 Signs You've Been Hit With An Advanced Persistent Threat
                InfoWorld October 15, 2012
                "Hackers who employ APTs (advanced persistent threats) are a different breed. A real and constant threat to the world's companies and networks, APT hackers tend to be well organized, working together as part of a professional team. Their goal, typically, is to steal valuable intellectual property, such as confidential project descriptions, contracts, and patent information..."
                  A False Sense of Security
                  Dark Reading October 15, 2012
                  "To say these are interesting times in IT security would be an understatement. Innovative security technologies, including some impressive advances in analytics, can help enterprises detect anomalies, fix vulnerabilities, and mitigate attacks that in the past might have crippled an organization. Yet as impressive as developments in network and data security are, an increasingly sophisticated class of attackers is finding new ways to exploit vulnerabilities and breach a business or public sector institution's IT resources..."
                  Cyber-Security Threats Unaddressed by Small Businesses: Symantec
                  eWeek October 17, 2012
                  "When it comes to security, small and midsize businesses are largely unaware of the risks they face, according to a survey of 1,015 U.S. SMBs by the National Cyber Security Alliance (NCSA) and security specialist Symantec. The report found more than three-fourths (77%) of respondents said their company is safe from cyber-threats, such as hackers, viruses, malware or a cyber-security breach, yet 83% have no formal cyber-security plan..."
                  Does Your CEO's New iPad Create A Security Hole?
                  Business 2 Community October 11, 2012
                  "Yes, your CEO’s new iPad creates a security hole. Our security consultant recently demonstrated this very clearly. He casually stepped out of our offices and, using his laptop, easily intercepted data streaming from our unencrypted laptops and iPads scattered around the office. Yikes!!!!!!!"
                  Draft Data Communications Bill a Security Risk, Says Jimmy Wales
                  ComputerWeekly October 12, 2012
                  "The UK’s Draft Data Communications Bill – aimed at making it easier for authorities to spy on electronic communications – will be useless and quite dangerous if enacted, says Wikipedia founder Jimmy Wales.

                  “It will force many relatively small companies to hang on to data that they would not otherwise retain, which puts the data at risk,” he told attendees at the RSA Conference Europe 2012..."

                    Pacemaker Hack Can Deliver Deadly 830-Volt Jolt
                    CSO Online October 17, 2012
                    "Pacemakers from several manufacturers can be commanded to deliver a deadly, 830-volt shock from someone on a laptop up to 50 feet away, the result of poor software programming by medical device companies.

                    The new research comes from Barnaby Jack of security vendor IOActive, known for his analysis of other medical equipment such as insulin-delivering devices..."

                    How to Get Promoted In IT Security
                    HelpNet Security October 16, 2012
                    "Not only has landing a job become more difficult; it's also getting harder to get promoted once you have the job. Here are some tips to getting ahead in today's competitive, cutting-edge world of IT security..."
                    IT - Careers
                    Advance Your Career with the Art of Negotiation
                    CIO Insight January 13, 2012
                    "You're a tough negotiator when it comes to working with vendors to make sure your company gets the best technology it can for its money. But, how well do you negotiate when it comes to advancing your own career? Whether you're looking to move on to a new organization, or to get a raise and acknowledgement for your hard work and success at your current job, knowing what to say and how to say it can make the difference between getting what you want and being left out in the cold..."
                      Ten Ways to Be Happy at Work
                      Baseline October 11, 2012
                      "Do you wonder what it takes to feel truly content with your job and career? It's a puzzle, as research shows that less than half of employees are satisfied at work. In fact, less than one-third of professionals consider themselves engaged, which is a key happiness driver. Given that you're spending most of your waking hours at work, it would be nice to actually look forward to going there, wouldn't it?..."
                        What Does Your Degree Matter? Millions of Dollars Over Time
                        NetworkWorld October 12, 2012
                        "Over the course of a working career, the type of degree you have can be worth millions of more dollars to your bottom line.

                        The US Census Bureau this week came out a with a couple of first-time studies that show people with higher level technical or engineering degrees can on average make over $3 million more during their lifetimes than those who graduated with majors in the arts, humanities and education..."

                          IT - Social Media
                          Nine Tips for Building a Solid Mobile Website
                          MarketingProfs October 15, 2012
                          "For many people, mobile devices have become the primary way of accessing the Internet. In fact, in some parts of the world, mobile internet usage has surpassed desktop internet usage. In short, your audiences are fast becoming mobile... but is your website mobile yet? Grab a smartphone. Key in your website or blog URL. If what you see is jumbled or distorted, you are likely losing tons of traffic—and conversions..."
                            IT - Compliance
                            Cloud Provider Assurance: Trust But Verify
                            HelpNet Security October 11, 2012
                            "Can an organization trust an IT service provided through the cloud? A survey by KuppingerCole showed that “Cloud security issues (84.4%) and cloud privacy and compliance issues (84.9%) are the major inhibitors preventing organizations from moving to a private cloud.”"
                            IT - Backup
                            TLC NAND Could Penetrate Biz with Flash-To-Flash Backup
                            The Register October 11, 2012
                            "Violin co-founder and CTO Jon Bennett identified a potential enterprise role for three-level cell (TLC) flash at VMworld Barcelona today: flash-to-flash backup. TLC is currently seen as pure consumer technology.

                            The first TLC NAND SSD has been announced by Samsung. But TLC NAND has a short working life, with 500 - 750 phase/erase cycles, rendering it unfit for enterprise flash storage which is reckoned to need program-erase cycles of 2,500 and up at least. Bennett suggested that TLC flash could be used for backup..."

                            Disks from the Perspective of a File System
                            Of Necessity, a Jaundiced View
                            Dr. Marshall Kirk McKusicK takes a critical look at disk-based storage in terms of the shortcuts it takes and the remedies file systems must employ to overcome them. The upshot of this, the author concludes, is that file systems must be aware of the disk technology on which they are running to ensure that they can reliably deliver their promised semantics. Users need to be aware of the constraints that different disk technology places on file systems and select a technology that will not result in poor performance for the type of file-system workload being used.
                            IT - Big Data
                            Batman versus the Evil Definitions
                            InformationWeek October 12, 2012
                            "It can be a daunting task to define a simple term, such as “Customer,” but it could be a lot easier (and maybe just as effective) to instead define what these terms do. So can we define something in terms of what that something does, instead of what something “is”?"
                              How To Bridge Big Data's Information Gap
                              InformationWeek October 12, 2012
                              "There is a growing information gap in U.S. businesses, but surprisingly it's not between those using sophisticated analytics and those that do not.

                              The gap is between those who gather and analyze customer behavior or business process data and those who can put the analysts' findings to practical use, according to a survey conducted in September by the MIT Sloan Management Review, house publication for MIT's Sloan School of Management..."

                              Human Generated Big Data
                              HelpNet Security October 12, 2012
                              "Human generated content is comprised of all the files and e-mails that we create every day, all the presentations, word processing documents, spread sheets, audio files and other documents our employers ask us to produce hour-by-hour. These are the files that take up the vast majority of digital storage space in most organisations—they are kept for significant amounts of time and they have huge amounts of metadata associated with them..."
                                Mike Lynch: Big Data May Be Big But Is It Clever?
                                TechWorld October 17, 2012
                                "The biggest change the IT industry is facing is that machines are getting cleverer, and that means moving beyond the limitations of the traditional database, according to Mike Lynch, entrepreneur and former CEO of British software firm Autonomy.

                                Speaking at the IT Expo in London today Lynch said that, in the 1960s, people realised that computers could be used to carry out tasks, but that the real world was far too complicated for machines to deal with. They therefore looked for easily defined tasks that could be turned into structured information, and went on to build relational databases..."

                                  Big Data, Meet the Huge Data That Will Shape Your Future
                                  Information Management October 12, 2012
                                  "Bill Kramer is the deputy director of the National Science Foundation’s Blue Waters supercomputer project at the University of Illinois’ National Center for Supercomputing Applications. In that role, the veteran of 20 supercomputer implementations has been part of an administrative team that expects to take the world of computing another leap forward with its one-petascale machine, Blue Waters..."
                                    Where M2M and Big Data Are Headed
                                    InformationWeek October 15, 2012
                                    "Machine-to-machine (M2M) devices, working in conjunction with big data analytics platforms, wireless Internet, and cloud computing, will fundamentally transform business in the 21st Century. Companies that fail to implement these technologies are at risk of becoming also-rans in their respective fields, according to a new report on M2M technology by research firm Mind Commerce..."
                                    IT - Mobile
                                    Mobile Carriers Are Widely Despised by Customers: 10 Reasons Why
                                    eWeek October 11, 2012
                                    "Mobile carriers have long been among the most despised companies in the technology world. Consumers and even enterprise users have said that carriers like Verizon Wireless, AT&T, Sprint and T-Mobile just don’t seem to care about customers. It seems that carriers have done little to reverse their customers’ opinions of them. The status quo is the name of the game..."
                                      Getting Forensics Data Off of Smartphones and Tablets Can Be Tough, Experts Say
                                      ComputerWorld October 12, 2012
                                      "Trying to get computer forensics data out of mobile smartphones and tablets in order to conduct investigations is hard -- often much harder than on PCs, laptops or Macs -- and experts say that forensics tools need to improve..."
                                        Mobile Application Use Rising, but Security Remains an Issue
                                        eWeek October 16, 2012
                                        "Businesses are turning to mobile applications to boost productivity, but IT departments still have concerns over app security and implementation.

                                        More than three-quarters (76 percent) of enterprise IT decision makers plan to adopt mobile business apps in the next 12 months, but security, potential loss of data and compliance remain key concerns about business application implementation, according to a survey..."

                                        IT - BYOD
                                        5 Steps to Ensure BYOD Doesn't Backfire
                                        Internet Evolution October 15, 2012
                                        "If your company plans to avoid the bring your own device phenomenon by ignoring it and hoping it goes away, good luck with that. You can't ignore it, and it's not going away.

                                        Consider this: Seventy percent of IT workers bring their own tablets to work without IT's permission, according to Forrester Research..."

                                        The "Mobile Elite" Risk Getting Fired for BYOD
                                        Baseline October 11, 2012
                                        "A new breed of employee is quickly evolving—a "mobile elite." These people command a more sophisticated knowledge and understanding of technology, even if they don't work in IT. They are early adopters of personal devices, applications and cloud services, and their personal preferences---not IT policies—drive usage. Even if their organization bans the use of certain technologies, mobile-elite professionals will risk a potential termination to stick with their own tech tools..."
                                          What Employees Are Hiding About Their Mobile Habits
                                          CIO Insight October 17, 2012
                                          "Mobile devices have become integral at today’s best and brightest companies. Without help from smartphones, tablets, and even lightweight notebooks, like Ultrabooks, there’s no telling what the enterprise would look like today. Mobile devices make employees more productive, they can work wherever they are, and all the while, their employers benefit. But mobile devices aren't a business panacea..."
                                            Top Ten Articles for last few Issues
                                            Vol 176 Issues 1 and 2; Vol 175 Issues 1, 2, 3 and 4; Vol 174 Issue 4 and 5
                                            We track how frequently each article is viewed on the web site to determine which the readers consider the most important. For last week, the top 10 articles were:

                                            • SPARC Processor Roadmap Updated
                                            • Oracle Solaris 11.1
                                            • Oracle Introduces Exadata X3-2 Database In-Memory Machine
                                            • Running Solaris 11 as a Control Domain on a T2000
                                            • The JavaFX Community Creates Its Own Site on
                                            • Winners of the 2012 Duke’s Choice Awards
                                            • Oracle Linux Wrap: Oracle Openworld 2012
                                            • Oracle Launches One-stop Zero to Cloud Site
                                            • Java Spotlight Episode 103: 2012 Duke Choice Award Winners
                                            • Oracle Exalogic Elastic Cloud Handbook: Excerpt Explains Distinctive Features

                                            The longer version of this article has list of top ten articles for the last 8 weeks.

                                              IT - Encryption
                                              5 Rules for Reining in Key Sprawl
                                              Enterprise Systems Journal October 15, 2012
                                              "Lock it up and throw away the key. It's a satisfying notion to imagine the peace of mind you would have if you could secure something forever. Unfortunately, that's not a realistic solution when it comes to data security -- not when stored data must be accessed and acted upon in real time.

                                              In the real world, where keys safeguard and provide access to encrypted data, it's surprising how careless some organizations can be. Take, for example, a recent Symantec survey in which 40 percent of respondents said their enterprises are less than "somewhat confident" they can retrieve keys, and 34 percent have lost a key..."

                                              A Funny Thing Happened On the Way to Encrypting the VA
                                              NetworkWorld October 16, 2012
                                              "Back in 2006 the Department of Veterans Affairs had one of the "mothers of all data breaches." A laptop was stolen that contained 26.5 million records of confidential and/or personally identifiable information (PII).

                                              Among the data stolen were the records of over 1 million military members. Of course, this kind of incident attracts headlines like moths to the flame. With all of the bad publicity it was not long until the VA announced that it was buying encryption software to encrypt all data stored on VA computers... Now, six years on an OIG report says only about 16% of those licenses have ever been used and over 84% of the VA computers don't use the encryption software. What went wrong here?"

                                              Trending in
                                              Vol 235, Issue 3
                                              Trending IT Articles