News about Oracle's Solaris and Sun Hardware
System News
Nov 5th, 2012 — Nov 11th, 2012 Generate the Custom HTML Email for this Issue
System News System News for Sun Users
Volume 177, Issue 1 << Previous Issue | Next Issue >>
Sections in this issue:
click to jump to section


Oracle
x
How to Migrate Oracle Database 10 From Oracle Solaris 8 to Oracle Solaris 11
Using the Oracle Solaris 8 P2V (Physical to Virtual) Tool
Orgad Kimchi has created a procedure for migrating Oracle Database from Oracle Solaris 8 to Oracle Solaris 11. His procedure utilizes the Oracle Solaris 8 P2V (physical to virtual) Archiver tool to migrate a physical Oracle Solaris 8 system with Oracle Database 10.2.0.5 and an Oracle Automatic Storage Management file system located on SAN storage connected via a Fibre Channel HBA into an Oracle Solaris 8 branded zone inside an Oracle Solaris 10 guest domain on top of an Oracle Solaris 11 control domain. Kimchi demonstrates both how to preserve the host information and how to modify the host name.
SPARC
x
SPARC T5 Deep Dive
An interview with Oracle's Rick Hetherington
Rick Hetherington, Oracle’s vice president of hardware development, manages a team of architects and performance analysts who design Oracle’s M- and T-series processors. In this interview, Hetherington describes the technical details of the new SPARC T5 processor and expands on the process that is used to design these innovative chips.
Talking About the Design of the SPARC T4 and T5 Chips
Video with Engineering Team Members Who Contributed to the Designs
Two of the Oracle microelectronics engineers who worked on developing the T4 chip are interviewed by Rick Ramsey in a YouTube video. Sebastian Turrullols discusses his work on power management issues, and Rahm explains that his team worked on architecting the cache hierarchy for the T4. According to Sebastian, the T4 delivers a 5X performance increase with both great throughput and singlethreaded capacity. In Rahm's case, the elegant performance of the 64 threads in T4 is an achievement he is most proud of. Both also remarked on the binary-compatible, eight-socket capabilities of the T5 microprocessor, which customers can implement without recompiling or redesigning applications.
SPARC T4 Servers Deliver Improved Performance on PeopleSoft Combined Benchmark
CPU Utilization in Application, Web, and Database Tiers Leaves Significant Headroom for Growth
Oracle's SPARC T4-4 server running Oracle's PeopleSoft HCM 9.1 combined online and batch benchmark achieved a world record 18,000 concurrent users experiencing subsecond response time while executing a PeopleSoft Payroll batch job of 500,000 employees in 32.4 minutes. This result was obtained with a SPARC T4-4 server running Oracle Database 11g Release 2, a SPARC T4-4 server running PeopleSoft HCM 9.1 application server, and a SPARC T4-2 server running Oracle WebLogic Server in the web tier. Average CPU utilization in the web tier T4-2 server was 17%, in the application tier 59%, and in the database tier 47% (online and batch).
Exadata
x
Post Provides List of 36 Documents on Exadata
Range of Categories Covers Wide Span

There are numerous links to documents about database features on Exadata compiled by Bandan Huang, who presents information in 14 categories ranging from DBFS(Database File System) on Exadata and DBRM/IORM(Database Resource Manager, I/O Resource Manager) on Exadata to BR(Backup & Recovery) on Exadata and Consolidation on Exadata. There are 36 document links in all: a real time saver for users needing further information on the multitude of possibilities with Exadata.

A Technical Overview of the Oracle Exadata Database Machine and Exadata Storage Server
Oracle White Paper Outlines the Benefits of Implementing Exadata Database Machine
The Oracle white paper "A Technical Overview of the Oracle Exadata Database Machine and Exadata Storage Server" explains that its implementation will allow users to accelerate database performance, exploit its scalability and consolidation features, and deliver mission-critical data availability and protection. The purpose-built Exadata Database Machine delivers the utmost performance for all database workloads: OLTP, data warehousing, and mixed, consolidated workloads. Easy to deploy, the Exadata Database Machine includes all the hardware the Oracle Database requires. The unique technology incorporated in the scale-out architecture of the Exadata Database Machine enables offloads of data-intensive SQL operations into the Oracle Exadata Storage Servers.
IT - Technology
x
Past is prototype: The evolution of the computer keyboard
ComputerWorld November 2, 2012
"When Bill Buxton worked at Xerox's Palo Alto Research Center in the early 1990s, he examined the classic children's homemade telephones: two cups connected by a taut string. He wondered why that same concept couldn't improve computer keyboards.

Think about it. The cup is both a microphone and a speaker. It uses the same "hardware" for input and output of sound. Why, Buxton asked, couldn't the same principle apply to text on computers -- using a single device for both input and output of text rather than using input from a keyboard to produce output on a screen?"

    Solaris
    x
    Clustering Basics and Challenges: A Primer
    Post on Clustering Installation Is Promised
    Providing working definitions of clustering, cluster agents, quorums, voting, fencing, and split brain condition was the aim of Karoly Vegh in writing his blog post entitled "Clustering Basics and Challenges." His post includes discussion of the following aspects of clustering:

    • Cluster, HA, failover, switchover, scalability
    • Cluster architecture, interconnect, topologies
    • Cluster resource types, agents, resources, resource groups
    • Voting, Quorum, Split Brain Condition, Fencing, Amnesia

    Vegh promises a future post on cluster installation.

    'Oracle Solaris 11 System Administration: The Complete Reference'
    Co-author Harry Foxwell Discusses the New Title for SysAdmins
    Harry Foxwell, co-author of "Oracle Solaris 11 System Administration: The Complete Reference" (the others are Michael Jang, Christine Tran and Alan Formy-Duval) discusses the book in a video announced in a post by Glynn Foster. The book itself leads readers to the ability to manage a highly scalable, cloud-based computing platform and deliver unmatched performance levels at every layer of the IT stack. The book also shows how to deploy Solaris from scratch and provides up-to-date details on installation options, device configuration, virtualization techniques, network security, file encryption, and Web services. NFS, Samba, and Apache are fully covered in this Oracle Press guide.
    Cloud Computing
    x
    Get the Details on the OS Built for the Cloud: Solaris Cloud Datasheet
    A Triple-threat OS that Offers IaaS, PaaS, and SaaS
    Oracle Solaris 11 is the OS built for the cloud. The Oracle Solaris 11 Data Sheet highlights the attributes that warrant that reputation: Solaris 11 is built for the cloud; provides full cloud management; is an optimized, ready-made solution; and is widely used in production environments. Duncan Hardie's post directs users to the datasheet for a glance at the triple-threat Solaris 11 offers: an IaaS cloud; a PaaS cloud; and an SaaS cloud. Solaris 11 is an industry-first, fully virtualized OS, offering mission critical cloud infrastructure with build-in server, storage and network virtualization, simplified software lifecycle management, cloud scale data management, and advanced security.
    IT - Cloud
    x
    Are Lawyers Getting In the Way of Cloud-Based Security?
    NetworkWorld November 7, 2012
    "In an age where enterprises and their employees are being relentlessly targeted with malware-based phishing, denial-of-service and other attacks, the ability of the IT security staff to defend their networks and valuable corporate data faces yet one more obstacle, according to some: their own company lawyers..."
    IT Jobs On the Other Side of the Cloud
    ComputerWorld November 6. 2012
    "As companies turn increasingly toward the cloud, corporate IT staffers wonder if the grass is greener working for a service provider...

    According to a study released in March by cloud staffing agency Hire On-Demand (download PDF), demand for developers of cloud-based applications spiked by more than 365% between 2008 and 2011, with another 90% bump anticipated for 2012..."

      IT - CxO
      x
      Ten Gartner Predictions for 2013
      Baseline November 5, 2012
      "Businesses in China and India will begin to dominate global IT commerce. Big data will fuel demand for IT jobs, but many of those positions will remain vacant. And you'll likely have more opportunities to exhibit technology as a fashion statement. (Really!) These are among the top predictions for IT for 2013 and beyond, according to Gartner. The findings were presented at the recent Gartner Symposium/ITxpo, and cover a broad range of topics, from management policies to emerging user and enterprise trends to the latest in eye-opening innovations..."
      5 Ways to Survive the Coming IT Apocalypse
      InformationWeek November 5, 2012
      "Hurricane Preparation 101 dictates that, among other things, you make sure that your gas tank is full BEFORE the storm creates supply problems. Yet it appears that a lot of folks on or near the East Coast didn't tank up before Sandy, leading to panic buying and miles-long gas lines. Similarly, IT leaders know that massive IT storms, among them consumerization and cloud, are heading their way. Yet it appears that most of them are ignoring the warnings, continuing to do business as usual, which begs the question: Will we survive the coming IT apocalypse?"
        Heist Once Again Highlights E-Banking Vulnerabilities
        NetworkWorld November 8, 2012
        "The chief financial officer of a Missouri firm discovered that cyber thieves had withdrawn $180,000 from the company's bank accounts overnight described it as "a helluva wake-up call" to security blogger Brian Krebs.

        But that loss might have been avoided if the company, Primary Systems, had paid better attention to the risks of electronic banking. The warnings, and examples, of cyberheists in the hundreds of thousands -- and even millions of dollars -- have been around for years."

        IT in the Organization: Four Possible Scenarios for the Future
        HelpNet Security November 8, 2012
        "The changing shape of IT is causing CIOs to question the role of IT in the organization. As businesses confront global economic uncertainty, changing market dynamics and cultural discontinuities created by technological innovation, their different parts require different ways of interacting with IT.

        Gartner analysts at Gartner Symposium/ITxpo 2012 in Barcelona discussed future scenarios for information technology.

        These are the four dominant futures for IT in the organization. They are not mutually exclusive and may exist in combination:.."

        3 Ways to Get Executives to Listen About Risk
        Dark Reading November 2, 2012
        "Communication skills are some of the most important within a IT risk manager's tool kit. That's because if threats can't be conveyed to a business' upper-level management, it's going to be awfully hard to convince said managers to loosen the purse strings. But one shouldn't rely on choice turns of phrase or smooth talking alone to successfully communicate risks. There's also a lot of underlying homework and a fundamental attitudinal shift that needs to occur for the message to resonate with the C-suite. Here are three important tips in achieving that goal."
        Sandy's Lesson: There's No Substitute for Real Data
        Insurance Technology November 2, 2012
        "We did lots of reporting on Hurricane Sandy this week, covering catastrophe models, business continuity, claims response, coastal development, and climate change, among other things. But something CoreLogic's Tom Jeffery told me in an interview about storm surge stuck out as a sort of overarching theme:..."
        Six Myths of Risk Assessment
        ComputerWeekly November 24, 2011
        "I find it surprising that after more than 30 years of experimentation of risk assessment, many security practitioners continue to apply risk assessment in such a non-intuitive way. There seem to be some rather widespread misconceptions about the nature of the process. I cringe when I hear experienced professionals suggest that risk assessments must be objective and repeatable. Where on earth did they get that impression?"
        What Your CIO Is Focusing on Now
        Baseline November 1, 2012
        "Does your CIO seem to walk around with a bit more pep in his or her step these days? It could be because a number of negative trends of recent years are reversing themselves, according to the latest annual survey from the Society for Information Management (SIM). With a membership of more than 3,500 CIOs and IT executives, SIM conducts research to assess how CIOs feel about a range of work-related issues. As an IT professional, you may be pleased to find out that a significant share of these IT leaders expect tech budgets to go up in 2013..."
        IT - DR
        x
        Sandy Wounded Servers, Some Grievously, Say Services Firms
        NetworkWorld November 7, 2012
        "Companies that specialize in data recovery are still getting many calls for help from businesses and institutions whose equipment was damaged by the effects of Hurricane Sandy.

        There are multiple efforts underway by services firms to recover data from servers that were underwater during storm surges or were damaged by power surges in the New York metro area."

          The L'Aquila Earthquake Convictions: Food for Thought for All Business Continuity Professionals?
          Continuity Central October 26, 2102
          "Six Italian scientists and an official who previously worked for the Italian government have been sentenced to six years in prison as a result of information that they gave concerning the 2009 L'Aquila earthquake which killed over 300 people in the Italian city and comune.

          The individuals were found guilty of giving advice prior to the 6.3 magnitude earthquake that the probability of a major earthquake was very low, which, according to the prosecution, gave residents a false sense of security and impacted on their behaviour, contributing to the number of deaths that occurred..."

          From Near Disaster to Shaky Recovery in NYC
          ComputerWorld November 2, 2012
          "The classic quote from Warren Buffett about a financial crisis is also true for data centers. It's "only when the tide goes out do you discover who's been swimming naked," the multi-billionaire businessman said.

          Hurricane Sandy brought the tide in, literally. But the flooding in lower Manhattan had the same effect on data centers that, as Buffet observed, a recession has on financial services. It exposed the problems and shortcomings in the system."

            Hurricane Sandy's Wake: How Did Providers' Data Center DR Plans Do?
            Search Cloud Provider November 7, 2012
            "Natural disasters are a common enemy of the data center. Hurricane Sandy recently tested the limits of East Coast-based cloud providers and colocation and hosting facilities after the "superstorm" ravaged parts of New Jersey, New York, Virginia and New England -- leaving power outages, flooding and infrastructure damage in its wake.

            Regardless of their geographic location, it's critical for cloud and hosting providers to have data center disaster recovery (DR) and business continuity plans and procedures in place to ensure uptime for customers, especially when a disaster strikes."

            Sandy Highlights the Importance of Bank Disaster Recovery Plans
            Bank Systems and Technology November 5, 2012
            "As Hurricane Sandy wreaked havoc across the northeastern United States last week, many banks made sure to be in constant communication with customers regarding service updates and even providing safety tips. But just as important as customer communication is during a disaster, so too is securing important data centers and IT infrastructure that keeps banks' operations running..."
            IT - PM
            x
            Essential Skills of a Big Data Project Manager
            TechRepublic November 7, 2012
            "Big Data is breaking new ground in many businesses right now, which is driving the need for a new class of project manager. To get ready, project managers may have to gain new skills, refresh some others, and learn how to adapt to the needs of Big Data projects. Here are some foundational skills and experience you need to become an effective Big Data Project Manager."
            How to Prioritize Your Organization's Projects
            Accelerating IT Success November 7, 2012
            "Jay Rollins starts this article with a premise: let’s say you’ve put all projects into a repository and estimated cost, benefits and requirements. That’s great – but have you determined priority? This is often the point where organizations either being to struggle or they simply avoid prioritizing correctly in a hope that “good enough” will somehow work."
              IT - Networks
              x
              Caveats for VPN Users in Public Wi-Fi Hotspot Networks
              IT World October 31, 2012
              " Using non-secured public Wi-Fi hotspots can leave you vulnerable to identity theft, data theft, snooping, impersonation and malware infection. That's why so many people rely on public virtual private network services, but VPNs are no panacea. Here are five potential gotchas..."
                IPv6: It's Time to Stop Procrastinating
                Internet Evolution November 5, 2012
                "Risk-averse IT managers need to move to the latest version of the Internet protocol or suffer the consequences, which could mean rationing the amount of Internet-connected devices in their enterprises.

                Internet protocol version 6 (IPv6), the new addressing system for the Internet, isn't so new at all -- it's about 20 years old. Yet even though we're running out of addresses under the old IPv4 system (and have been for quite a while), IPv6 adoption has been deadly slow. The latest surveys show something like 3 percent of all Internet-connected devices have made the switch.

                For IT managers, the lack of early adopters is cause for concern. What's holding them back?"

                What to Do When You Need More Enterprise WAN Bandwidth
                NetworkWorld November 5, 2012
                "Moving on in our coverage of which of the various technologies – including those that are part of the Next-generation Enterprise WAN (NEW) architecture, like WAN Optimization, WAN Virtualization and Network-as-a-Service, and others – best address the different issues impacting application performance over the WAN, we now turn to the issue of what to do about limited Enterprise WAN bandwidth."
                IT - Operations
                x
                Back-Up Generators: How to Avoid Problems
                Continuity Central November 1, 2102
                "The impacts of Hurricane Sandy have focussed many people’s mind on the importance of having access to back-up generators for business continuity; but ensuring that generators work when needed requires careful planning.

                The Diesel Technology Forum has provided some useful advice to ensure that your back-up generators don’t let you down in future incidents ..."

                The Cloud as Data-Center Extension
                ComputerWorld November 8, 2012
                "A year after Oregon's Multnomah County deployed an on-premises portfolio management application, the two IT staffers dedicated to it resigned. Other staff struggled to maintain the specialized server environment. Left with no other option to guarantee support of the mission-critical tool, the county leapt into the cloud..."
                IT - Security
                x
                Passwords Are the Weak Link In IT Security
                IT World November 5, 2012
                "Passwords weren't the only fail in last summer's widely publicized "epic hack" of tech journalist Mat Honan -- Amazon, Apple and, to a lesser extent, Google and Honan himself share the blame.

                But passwords played a part in the perfect storm of user, service provider and technology failures that wiped out Honan's entire digital life. As he concluded in his account of the hack, "Password-based security mechanisms -- which can be cracked, reset and socially engineered -- no longer suffice in the era of cloud computing."

                4 Factors for Avoiding Cyber Espionage Attacks
                ComputerWorld November 2, 2012
                "Malware continues to change at a rapid pace, as evidenced by new types of high-tech, military-grade malicious code grabbing headlines such as Stuxnet, Duqu and Flame.

                Another category raising its ugly head is the malware developed specifically for industrial espionage, like ACAD/Medre.A, which we will be seeing more and more of in the future. Why these sudden spikes in the news? This isn't something new; these kinds of situations have happened before. But since people in general are becoming more security-aware due to the ongoing stream of information and related coverage in the media about state-sponsored malware, these anomalies are now noticed on a more regular basis and as a result of being detected more often."

                4 Long-Term Hacks That Rocked 2012
                Dark Reading November 8, 2012
                "So far, 2012 has been the year for skeletons falling out of the IT security closet. The headlines have been hopping with stories of companies whose networks and databases were thoroughly owned by hackers for months and years at a time, often undetected until government agents came to let them know they'd been compromised and had been for a while. Many organizations go to great lengths to keep news of these kinds of breaches under wraps if no regulated PII is stolen, but this year many haven't kept the light of day from shining on their deep, dark security inadequacies. Dark Reading took a look at some of the most impactful long-term compromises brought to light in the past year and what these events mean to security pros."
                Could Your Employees Detect and Deflect A Spear Phishing Attack?
                Continuity Central October 31, 2102
                "You can’t swing a dead cat without hitting a company that’s been linked to a phishing attack. Organizations such as RSA, Epsilon and the US’s Department of Energy, are just a few that have publicly held up their hands to falling victim to an attack. And it will get worse. Gartner recently stated in its 2012 Magic Quadrant for Secure Email Gateways (SEG) report that "Phishing attacks continue to oscillate, while more targeted phishing attacks increase.” Why are spear phishing attacks increasing and what can organizations do to prevent falling victim?..."
                Five Steps to Implementing Security Intelligence
                Dark Reading November 4, 2012
                "To understand security -- and the risks and threats that your organization faces -- you need information. This information, collectively known as "security intelligence," is becoming more critical to enterprises as attackers become more sophisticated in their exploits.

                What is security intelligence? In a blog posted last year, security vendor Q1 Labs offered this definition:..."

                Hacker or User? How to Tell Friend from Foe
                TechRepublic November 1, 2012
                "If you are receptive to the ideas of the Jericho Forum security thinktank, then you may well accept its view that organisations can no longer rely on the firewalls that used to mark the extent of their control over IT infrastructure.

                Of course, in most cases the firewalls are still there. But they have had to become increasingly porous as more and more of the legitimate access to IT applications takes place from beyond their limits. Furthermore, with the increasing use of software as a service (SaaS), many of the applications are themselves beyond the firewall."

                Hitting Back At Cyberattackers: Experts Discuss Pros and Cons
                IT World November 6, 12012
                "The questions are being asked more often: When a cyberattack hits your network, is it right to launch a counter-attack of some type to try to at least identify the source if not stop it? Since the wheels of justice do indeed grind slowly, should frustrated IT professionals with security skills take matters into their own hands or hire others to do so?"
                Preventing Infrastructure From Becoming An Insider Attack
                Dark Reading November 5, 2012
                "From foreign-built routers and laptops to open-source software, vulnerable technology supply chains have become a concern of security professionals as well as government officials.

                With its recommendation that U.S. companies and the government not buy communications technology from two major Chinese firms, Huawei and ZTE, the House Intelligence Committee spotlighted the lack of confidence that organizations have in their infrastructure. It's a problem not just for the United States and its companies, but for businesses in other nations and other governments, as well..."

                Security Manager's Journal: A Reality Check for the Department's Maturity
                ComputerWorld November 5, 2012
                "I thought I was a security adolescent, but I'm really just a toddler.

                Many IT managers can probably tell from that statement that I have been looking into maturity models. I did that at the request of our CIO, who asked all of his department managers to develop a maturity model and identify where we are. Perhaps the topic came up at a conference he attended, but no matter; I had never assessed the maturity of my department at my current company..."

                How (and Why) To Surf the Web In Secret
                IT World November 7, 2012
                "They say no one can hear you scream in space, but if you so much as whisper on the Web, you can be tracked by a dozen different organizations and recorded for posterity. Simply visiting a website can allow its operators to figure out your general physical location, identify details about your device information, and install advertising cookies that can track your movements around the web..."
                  IT - Careers
                  x
                  10 Signs It May Be Time to Quit Your Job
                  NetworkWorld October 31, 2012
                  "Working as an IT professional is a demanding and competitive role, and like anything in life has its ups and downs. How many employers does the average IT pro work for in his or her career? It seems like a straight-forward question, but the answer is surprisingly complex because the Bureau of Labor Statistics (BLS) doesn't track this data. Even if it did, you'd have to ask what constitutes a career change? Suffice to say the average IT pro will at least change employers a few times over a 20-30 year career."
                    2013 IT Salaries: 15 Titles Getting the Biggest Pay Raises
                    NetworkWorld November 7, 2012
                    "Mobile application developers and wireless network engineers can expect a 9% and 7.9% increase in starting salaries, respectively, says recruiting and staffing specialist Robert Half Technology...

                    Certain IT titles will be getting sizable salary hikes, according to data from recruiting and staffing specialist Robert Half Technology. At the top of the heap, based on percentage gains, are mobile application developers and wireless network engineers, who can expect a 9% and 7.9% increase in starting salaries, respectively, RHT reports..."

                      Ten Ways to Run a Successful Meeting
                      Baseline November 1, 2012
                      "Tired of spending your valuable hours at meetings that have no apparent purpose? Join the club. Most professionals attend more than 60 meetings a month, research shows, and more than one-half of that time is wasted. Assuming those meetings run about an hour, that's more than 30 hours of unproductive time each month—the majority of an entire work week. The book No More Pointless Meetings: Breakthrough Sessions That Will Revolutionize the Way You Work, presents a how-to guide to get the most out of these group sessions..."
                        IT - Compliance
                        x
                        Risks and Rewards of Disaster Recovery in the Cloud
                        Bank Systems and Technology November 2, 2012
                        "One of the fastest-growing areas of cloud migration for banks, especially smaller institutions, is disaster recovery. Banks are seeing big advantages to moving their disaster recovery operations to the cloud, a recent survey by Computer Services Inc. (CSI), a Paducah, Ky.-based technology provider for financial institutions, indicates. Of those banks surveyed that had implemented cloud services, 27 percent said they have seen the greatest benefits from the cloud in disaster recovery..."
                        IT - Big Data
                        x
                        6 Lies About Big Data
                        InformationWeek October 31, 2012
                        "To paraphrase an old saying, if you torture data long enough, it'll tell you what you want to hear. And putting big data through that torture only lets us tell bigger lies. Marketing can justify crazy ad campaigns: "Sentiment analytics shows our latest campaign is actually a huge hit with the under-25-urban-vegan demo!" The supply chain team can use it to get more funding..."
                        8 Real-World Big Data Deployments
                        NetworkWorld November 1, 2012
                        "The amount of data in the world is increasing exponentially; it doubles every 18 months. There's much discussion of big data, both in terms of the problems it causes and the potential utility it represents. But some people are doing more than talking. Here are eight real-world big data deployments..."
                        Big Data Analytics: Where's The ROI?
                        InformationWeek November 1, 2012
                        "In some ways, big data analytics is like trickle-down economics. Only the biggest healthcare providers with the deepest pockets can afford the kind of analytics platforms required to get useful intelligence from tens of thousands of patient records. But in theory, those benefits will trickle down to smaller providers that either don't have the financial support or the large patient populations to do this type of data crunching on their own..."
                        Big Data Talent War: 7 Ways to Win
                        InformationWeek November 2, 2012
                        "The just-released InformationWeek 2012 State of IT Staffing Survey reveals that 40% of those who cite big data and analytics as a top hiring priority say they'll increase staffing in these areas by 11% or more during the next two years. At the same time, 53% of these companies say it will be hard to find big-data-savvy analytics experts. Respondents expect to try a mix of retraining of existing people, hiring of new employees and contracting of consultants and temporary employees to fill the gap."
                        IT - Mobile
                        x
                        What Do 100% of Mobile Users Want? No Fails!
                        NetworkWorld November 5, 2012
                        "The rush to make everything mobile has generated new ways to do business, new ways to organize ourselves and new ways to communicate, but mobile apps aren't your father's mainframe, desktop or laptop applications.

                        Nope, mobile apps exist in a world where not only is the underlying network transport anything from great to non-existent (which leads to all sorts of complexities), but also the polish and brio of leading mobile apps has created user expectations that, if I were to hazard a guess, are an order or two of magnitude greater than enterprises are used to delivering!"

                          What, Why and How: An Enterprise MDM Quiz
                          Search Consumerization November 5, 2012
                          "Mobile device management is often the first tool IT pros look at when they're trying to get a handle on the smartphones and tablets in their organization. The ins and outs of different tools and technologies, however, can get confusing.

                          Test your knowledge of mobile device management (MDM) with this quiz. We'll score it for you, and then provide you with resources to find additional information..."

                          IT - BYOD
                          x
                          Top Tools for BYOD Management
                          NetworkWorld November 5, 2012
                          "When we tested mobile device management (MDM) last year, the products were largely focused on asset management. What a difference a year makes. The products we compared in this round of testing have much stronger controls of specific smartphones and mobile operating systems, plus features like location-based tracking, usage tracking, two-factor authentication and sandboxing of personal and corporate identities..."
                          BYOD: Risks, Rewards, and How to Deal With It
                          TechRepublic November 1, 2012
                          "If you work in a corporate IT environment, then the terms “consumerization of IT” or “Bring your own device (BYOD)” are phrases you have heard many times. People own more gadgets than ever before, and as a result, bring their own smartphones, tablets, and even laptops into work and don’t rely only on equipment issued by the company. This, in turn, can cause a number of issues, some positive and some negative, and pose a challenge to IT administrators. It’s not a new phenomenon, but in the past few years it has become very widespread..."
                          Can BYOD Bury the Hatchet Between IT and Business?
                          NetworkWorld November 7, 2012
                          "In the last 18 months, Cisco has witnessed some 13,000 iPads enter its "Bring Your Own Device" program-and this is just the beginning.

                          Once iPads connect more easily to projectors, and the App Store gains better content-creation software, BYOD floodgates will burst open, according to Sheila Jordan, senior vice president of communication and collaboration IT at Cisco."

                          Top10
                          x
                          Top Ten Articles for last few Issues
                          Vol 176 Issues 1, 2, 3, 5 and 5; Vol 175 Issues 2, 3 and 4
                          We track how frequently each article is viewed on the web site to determine which the readers consider the most important. For last week, the top 10 articles were:

                          • Oracle Plays SPARC Cards Close to the Vest
                          • Larry Ellison Has a Passion for Microchips
                          • Talking about Java Security Update @spoofzu
                          • Why 4K? – George Wilson’s ZFS Day Talk
                          • Overview of Oracle Private Cloud Solutions
                          • Some Advice on Updating to Solaris 11.1
                          • Getting Started with Automated Installer in Oracle Solaris 11
                          • Oracle VM VirtualBox 4.2.2 Released
                          • Security Capabilities and Design in Oracle Solaris 11
                          • Oracle Solaris Cluster 4.1 Now Available

                          The longer version of this article has list of top ten articles for the last 8 weeks.

                            LibreOffice
                            x
                            The Document Foundation Announces LibreOffice Certified Developers
                            Appointees Peer-reviewed by Engineering Steering Committee

                            LibreOffice Certified Developers have been peer reviewed by the Engineering Steering Committee, which has appointed Bjoern Michaelsen, Jan Holesovsky and Stephan Bergmann to manage the certification process for developers. The newly certified developers include Bjoern Michaelsen (Canonical), Caolan McNamara (RedHat), Cedric Bosdonnat (SUSE), Christian Lohmaier (Volunteer), David Tardon (RedHat), Eike Rathke (RedHat), Eilidh McAdam (Lanedo), Fridrich Strba (SUSE), Jan Holesovsky (SUSE), Kohei Yoshida (SUSE), Lionel Elie Mamane (Volunteer), Lubos Lunak (SUSE), Markus Mohrhard (Volunteer), Michael Meeks (SUSE), Michael Stahl (RedHat), Petr Mladek (SUSE), Rene Engelhard (Volunteer), Stephan Bergmann (RedHat), Thorsten Behrens (SUSE), Timár András (SUSE) and Tor Lillqvist (SUSE).

                            Trending in
                            Vol 235, Issue 2
                            Trending IT Articles