News about Oracle's Solaris and Sun Hardware
System News
Dec 17th, 2012 — Dec 23rd, 2012 Generate the Custom HTML Email for this Issue
System News System News for Sun Users
Volume 178, Issue 3 << Previous Issue | Next Issue >>
Sections in this issue:
click to jump to section


Oracle
x
Oracle NoSQL Database 2.0 Available for Download
Adds Efficient Support for Storage and Retrieval of Large Objects

Oracle has released Oracle NoSQL Database 2.0, a highly scalable,low latency, key-value database for real-time big data workloads that adds efficient support for storage and retrieval of large objects such as documents and images, as well as dynamic elasticity and automatic rebalancing for allocating storage and compute resources in response to changing production data processing requirements. Tighter integration with both Oracle Database and Hadoop environments, enables Oracle NoSQL Database 2.0 to fit seamlessly into an enterprise IT stack. Download a free evaluation version of NoSQL Database 2.0.

Exadata
x
Whitepaper: Oracle Exalogic Elastic Cloud: Advanced I/O Virtualization Architecture for Consolidating High Performance Workloads
Explains High Performance, High Availability Impact of Infiniband I/O Interconnects
One of the key enhancements in the current generation of Oracle Exalogic systems, according to Javier Puerta, is Oracle’s incorporation of virtualized InfiniBand I/O interconnects using Single Root I/O Virtualization (SR-IOV) technology. These permit the system to share the internal InfiniBand network and storage fabric between as many as 63 virtual machines per physical server node with near-native performance simultaneously, resulting in both high performance and high workload consolidation. A new white paper "Oracle Exalogic Elastic Cloud: Advanced I/O Virtualization Architecture for Consolidating High Performance Workloads,"focuses on the tightly integrated server virtualization layer in the current release of the Exalogic Elastic Cloud Software.
Nike Achieves Scalability and Performance with Oracle Coherence & Exadata
Nike+ Fuel Band Community Numbers 8 Million Users
In a brief video Nicole Otto, Senior Director, Consumer Digital Tech at Nike, explains how the company achieved scalability and performance with Oracle Coherence and Oracle Exadata for users of its Nike+ FuelBand, which measures everyday activity and turns it into NikeFuel. It tracks calories burned, steps taken, running, walking, dancing, basketball and dozens of everyday activities. Otto reports some 650,000 users daily of the FuelBand product.
Virtualization
x
Re-sizing Your VirtualBox Virtual Disk
Two Simple, "Easy" Steps, Says Fat Bloke
Here's a couple of steps that allow users running inside VirtualBox to resize the virtual disk and provide a larger disk for guest uses. Fat Bloke provides the procedure and illustrates it with screen shots. He characterizes the steps as very easy to accomplish and provides steps tailored to Linux guests, as well as Windows 7 and 8 guests and Windows XP.
IT - Storage
x
Overcoming The Challenges To All-Flash Arrays
Storage-Switzerland December 20, 2012
"All-Flash arrays are storage systems that are 100% solid state and provide a complete set of robust features like snapshots and replication, similar to traditional hard-drive based storage systems. While their performance enhancing potential is very appealing, All-Flash arrays have two basic challenges to overcome. First is the cost; an array populated entirely with (flash) storage capacity is about 10X the price of a comparable hard disk device. The second challenge is what to do with data that really shouldn't be on an All-Flash array because it can't take advantage of the performance that an All-Flash system can deliver..."
What Is Hybrid Storage?
Storage-Switzerland December 20, 2012
"Hybrid Storage is a term used to describe storage systems that are designed with a blend of flash-based solid state disk and hard disk drives to provide high performance at an affordable price. They try to address the dollar-per-IOPS vs dollar-per-GB decision that IT professionals have to grapple with. In addition they try to answer the question of how to best leverage flash by using flash as a large caching area, automatically moving the most active data into memory-based storage..."
2013 Storage Trends
Enterprise Systems Journal December 17, 2012
"As 2013 rolls out, I am still waiting to hear what really happened in terms of storage capacity growth. Readers may recall that 2011 ended with IDC telling us that external storage capacity deployed worldwide totaled about 21 Exabytes and was slated to grow at about 30-40 percent per year for the foreseeable future. That would put us at about 40 Exabytes in 2014.

By late spring, IDC revised its estimate to consider the impact of server virtualization on storage demand. They said that storage would henceforth be growing at a much more alarming rate of 300 percent per year -- a significant difference from the original estimate.

Meanwhile, Gartner, not to be out-predicted by their rival, offered an estimate of storage capacity growth in virtual server environments that more than doubled IDC's number, climbing 650 percent by 2014..."

10 Coolest Flash Storage/SSDs Products Of 2012
CRN December 13, 2012
"It used to be easy to understand flash-based storage technology back in the day when flash meant SSDs. However, as we saw in 2012, flash storage technology now takes on many forms, from SSDs to PCIe flash storage to all-flash arrays to software that ties different flash technologies together.

CRN is taking a look at significant flash storage technologies introduced in 2012. We cannot cover all the new products. But, we can pick 10 different hardware and software introductions that give an idea of the range of possible technologies that are either available now or will be soon that can significantly increase storage performance..."

The Year Ahead: Disposable Storage Infrastructure
Enterprise Systems Journal December 17, 2012
"To know what will be asked of IT and what new capabilities vendors will be providing in 2013, one need look no further than the capabilities consumers have already enjoyed for the past two years. In the same way that enterprise client-server followed the consumer personal computer revolution, enterprise storage will need to support a wide range of mobile devices from Apple, Google, and Microsoft. Just as cloud storage has made these devices more powerful, so it will for the enterprise storage..."
SSD Prices Continue To Plunge
ComputerWorld December 17, 2012
"Since 2010, solid state drive (SSD) prices for some models have plummeted from $3 to less than $1 per gigabyte.

After dropping 20% in the second quarter of 2012 alone, SSD prices fell another 10% in the second half of the year, according to data from IHS iSupply.

The better deals for SSDs are now around 80- to 90-cents-per-gigabyte of capacity, though some sale prices have been even lower, according to Ryan Chien, an IHS SSD and storage analyst.

Oversupply of NAND flash memory is primarily behind the price drops over the past couple of years, but manufacturing is now more in line with demand and prices have begun to stabilize, Chien said.

Last year, SSD prices dropped 23%, according to commerce tracking site Dynamite Data..."

So Many Files, So Little Time - Why Object Storage is Finally Catching on
Storage-Switzerland December 21, 2012
"n the file and block controversy that started as the SAN vs NAS war, it seems that files won or least have a commanding lead. File data used to be mostly end user data, office productivity files, marketing materials, etc. But now “unstructured” data (the more formal term for files) can include an entire server image and even a database. The ease of use that NAS boxes generally offered over SANs clearly helped in this shift to files, but so has the data itself. We’re creating more and more files and they’re getting bigger..."
Java Technology
x
Java Spotlight Episode 113: John Ceccarelli on Netbeans @JCeccarelli1
Head of Engineering for NetBeans Open Source Project
The current guest on Java Spotlight Episode 113 is John Jullion-Ceccarelli, head of engineering for the NetBeans open source project and for the VisualVM Java profiler. Host Roger Brinkley discusses Netbeans @JCeccarelli1 with Ceccarelli, who started with Sun Microsystems in 2001 as a technical writer and has since held a variety of positions including technical publications manager, engineering manager, and NetBeans IDE 6.9 Release Boss. He recently relocated to the San Francisco Bay Area after 13 years living in Prague, the Czech Republic.
IT - Technology
x
10 Technologies That Disappointed In 2012
NetworkWorld December 18, 2012
"Sure, 2012 saw its share of innovation and technological breakthroughs. But not every technology or product lives up to the hype they generate when they’re first announced. Here are 10 technologies that fell short of expectations in 2012..."
    Prediction Time: 2013 Will Not Be the Year of SDN
    NetworkWorld December 18, 2012
    "Well, it's hard to believe but the year is almost up and there are only a mere couple of weeks until we ring in the New Year. So that makes it prediction time for us industry analysts and I’d like to share mine with you. So, drum roll please.."
      MySQL
      x
      MySQL 5.6.9 Release Candidate Available: Download Now
      Changes Incorporate Feedback from MySQL Connect
      Responding to the feedback gathered at MySQL Connect in September, the MySQL Team has produced MySQL 5.6.9, which is now available for download, Rob Young reports. He writes that MySQL 5.6 is designed to meet the agility demands of the next generation of web apps and services and includes across the board improvements to the Optimizer, InnoDB performance/scale and online DDL operations, self-healing Replication, Performance Schema Instrumentation, Security and developer enabling NoSQL functionality.
      NoSQL Now Interfaces Directly to the InnoDB and MySQL Cluster (NDB) Storage Engines
      Writes Key-value Data Directly to MySQL Tables up to 9X Faster
      MySQL has implemented NoSQL interfaces directly to the InnoDB and MySQL Cluster (NDB) storage engines, Mat Keep reports, enabling users to bypass the SQL layer completely. Now Key-Value data can be written directly to MySQL tables up to 9x faster, while maintaining ACID guarantees. Users can continue to run complex queries with SQL across the same data set, providing real-time analytics to the business or anonymizing sensitive data before loading to big data platforms, while still maintaining all of the advantages of their existing relational database infrastructure. Keep provides a link to "Guide to MySQL and NoSQL: Delivering the Best of Both Worlds."
      IT - Cloud
      x
      5 Cloud Myths That Will Be Debunked In 2013
      HelpNet Security December 13, 2012
      "There are a lot of common misconceptions and myths related to cloud computing. Many think of the cloud as less secure and reliable than on premise solutions, when in reality the opposite is actually true. There is also a lot of talk that leads many in the industry to believe that all cloud services are the same. It’s time to start fresh in the new year, and that means busting some of the most common myths about the cloud.

      Andrew Jaquith, CTO at Perimeter E-Security, wrote up a list of 5 myths that will be debunked in 2013:..."

      Most IT Pros Do Not Trust Cloud Services With Sensitive Data
      ComputerWeekly December 13, 2012
      "Just over half of IT professionals who focus on cloud computing do not trust cloud services for any of their personal data, a survey has revealed.

      Some 86% of those polled by Lieberman Software said they do not trust the cloud for their organisation’s more sensitive data, and 88% said that they believe that there is a chance that the data their organisation keeps in the cloud could be lost, corrupted or accessed by unauthorised individuals..."

      Risk Shift: Cloud Risk Transfer
      Internet Evolution December 12, 2012
      "Why risk transfer for the cloud now?

      Cloud has moved from buzz to business critical with Gartner anticipating that spending on cloud applications will reach almost $150 billion by 2014. With enterprise poised for substantial investment, it is critical for customers, providers, and investors to have an informed view of risk, policy, governance, and above all, a strategy for remediation..."

      Top 5 Cloud Predictions For 2013
      Business 2 Community December 13, 2012
      "As 2013 approaches, businesses are preparing for the new year by allocating budgets, reorganizing resources, and launching new (or optimizing existing) strategies. During this process, a consideration for many CTOs, IT Departments, and those working to create and manage an efficient [and for most, cost-effective] virtualization infrastructure, is how to integrate and/or best use cloud technology options.

      To prepare for the transition into the new year and better understand the direction cloud technology advancements will shift, here are some bold predictions from industry experts who have a real sense of what is to come in 2013..."

      16 Of the Most Useful Cloud Management Tools
      NetworkWorld December 17, 2012
      One of the biggest concerns users have with public cloud resources is not knowing how much they will cost, given the pay-as-you-go model.

      "IT shops are becoming cost centers for service delivery," says William Fellows, a researcher at the 451 Group. "But they're looking for ways to determine how their clouds are running, how much it's costing and whether it's a good value."

      Vendors provide some services around tracking usage. Amazon Web Services, for example, last week announced more granular data, allowing users to track their services hour by hour.

      Many Who Use the Cloud for Work, Don't Trust It for Personal Data
      HelpNet Security December 14, 2012
      "A survey by Lieberman Software revealed that half (51%) of IT experts whose job roles focus on the cloud don’t trust the cloud for any of their personal data such as contact lists, music, photos, or Webmail.

      In addition, 86% of IT experts polled don’t trust the cloud for their organization’s more sensitive data – preferring to keep it on their own network, while 88% said that they believe that there is a chance that the data their organization keeps in the cloud could be lost, corrupted or accessed by unauthorized individuals – probably explaining why they won’t use it for their company’s most sensitive data. However, 46% of survey respondents still believe that their move to the cloud has increased their organization’s IT security..."

      IT - CxO
      x
      5 Reasons Outsourcing Is Here To Stay
      InformationWeek December 14, 2012
      "Outsourcing sales fell 33% to hit a nine-year low in the third quarter, according Ovum. Meanwhile, General Motors is moving IT operations back in house, Apple will start making some Macs in the U.S., and outsourcers were painted as economic Benedict Arnolds during the election. Is this the beginning of the end of outsourcing as a staple business practice? Short answer: Not by a long shot. Here are a few reasons why..."
      4 Key Strategic IT Directions for 2013 and Beyond
      IT Director December 13, 2012
      "This article outlines 4 key underlying strategic IT business drivers that will shape the global IT industry of 2013 and beyond. No mention here of short term 'here today / gone tomorrow' products. We focus on the big things - our changing perceptions, behaviours and attitudes towards IT management, and how they will affect the way we choose, use and manage IT for strategic business advantage..."
      Employee Engagement Is (Finally) on the Upswing
      Baseline December 10, 2012
      "If the economy really is on the rebound, then senior managers will have to pay heed to the level of employee engagement within their organizations. Fortunately, that level appears to be on the upswing, according to the latest biannual research on the topic from Modern Survey. The resulting report, "The National Norms Study: Employee Engagement's Surprising Rise," contends that a high quality of engagement presents a clear competitive advantage for companies. "When employees are engaged," the authors write, "they feel a deeper connection and commitment to the organization. They're more likely to perform at optimum levels and put forth discretionary effort that fuels organizational growth."
        Identifying Red Flags in Your IT Spend
        CIO Insight December 17, 2012
        "How much money did your organization spend on IT products and services last year? What were the largest IT spend categories? Who were the top IT vendors in each category?

        These should be relatively easy and reasonable questions, but many IT executives do not have a firm grasp of the answers.

        There are three fundamental reasons behind this challenge: 1) the IT organization often does not have complete control over the entire IT spend, as some hardware, software and IT services are procured by other departments without IT’s blessing or knowledge;..."

          Seize the Customer 'Moment'...Or Lose The Customer
          ComputerWorld December 13, 2012
          "'Seize the day' was great advice for the analog world in which a finite number of things could happen in a 24-hour period. But in a digital climate, a single day poses endless possibilities, for good and ill. Seizing the day is no longer good enough -- you've got to seize the moment.

          As discussed in my previous post, the essence of IT boils down to giving your people access to comprehensive customer information within seconds in order to make “customer moments” count. Because customer moments, or points of contact between your customer and any part of your organization, can occur at any time -- and with any employee -- the infrastructure, strategy and culture required to capitalize on these instances transcend the boundaries of traditional CRM..."

          Trustworthy Systems, Trustworthy Vendors, and How to Identify Them
          NetworkWorld December 13, 2012
          "It's sad but true that some of the world's best minds in computing have dedicated themselves to creating new ways to attack information technology infrastructures. The assaults have resulted in a significant cost factor in enterprise computing, influencing the purchasing decisions both for general-purpose processing, storage and networking products and for specialized security hardware, software and services.

          This raises the question: To what extent do security concerns guide information technology investment decisions?..."

          CIOs As Rainmakers: The New Meme, Deconstructed
          InformationWeek December 6, 2012
          "When your CEO or CFO asks you to be a rainmaker, it's a call for help. Wrap it all in context and respond in a holistic way..."

          "IT is the new moneymaker! I keep reading variations on this meme, but if IT's new role is to generate revenue and profits on its own, I have a couple of snarky questions: What do the old revenue generators do? Does HR now have to make money as well? Does IT have to be good at IT anymore? Business leaders keep finding new things for IT leaders to run, so do we get to lay off the people they're replacing?"

            IT - DR
            x
            How to Create a Case for Disaster Recovery Plan
            CRN December 14, 2012
            "As we've seen with Superstorm Sandy in the Northeast and storms on the West Coast, natural disasters can happen anywhere, at any time. Even though we receive advanced warnings of these impending events, there is no way to predict when IT issues will occur due to human error or malicious acts.

            Who can predict how a lack of coffee might affect an individual's decision to flip the wrong switch on a server or if the cleaning person might accidentally unplug a server to vacuum the data center? And of course, as the service provider, you will get that middle-of-the-night call from an angry customer whose network has crashed.

            The simplest method to avoid these calls and to ensure customer happiness is to fully educate users on the need for tested disaster recovery plans that leverage automated DR and distributed data storage sites..."

            IT - Networks
            x
            What Does SDN Mean For Telecom Infrastructure?
            NetworkWorld December 11, 2012
            "Software-defined networking (SDN) has the potential to transform the telecom industry by improving the ability of carriers (both wired and wireless) to flexibly deliver bandwidth "on demand." It is critical that carriers improve both their network flexibility (improved customer value) and reduce their high operational costs as over-the-top providers (e.g., Google, Amazon, Skype, etc.) challenge the carriers' ability to grow their revenues and impact their margins.

            SDN (and OpenFlow) technology is clearly impacting the data center network, including data centers in large carriers (e.g., AT&T, SingTel, Telefonica, etc.). In the enterprise, SDN is defined as follows:.."

            Lockdown: Protecting the Corporate Network
            CIO Insight December 13, 2012
            "WHO: David Fike, Chief Technology Officer, Marsh & McLennan Companies, Inc. WHAT: Sharing his perspectives on how best to secure corporate networks

            WHERE: New York, NY

            WHY: To provide CIOs and other IT leaders with actionable advice and insights about how best to secure the corporate network during increasingly complex times

            David Fike, Chief Technology Officer of Marsh & McLennan Companies, Inc., shares his perspectives on the steps he has taken to secure his company's corporate network and the methods he uses to stay a step ahead of those who would try to compromise his corporate systems..."

              The 12 Networking Truths Applied To Information Security
              TechRepublic December 19, 2012
              "Alfonso Barreiro relates the 12 networking truths to the information security field.

              When I first learned about the fundamental truths of networking from RFC 1925, I thought it was a fun little April’s fools joke and quickly forgot about them. I was reminded recently of their existence and realized there can be some insightful lessons to be learned from them after all. And since the RFC states that security protocols are also subject to these fundamental truths, I’m going to try and correlate them to Information Security..."

              Boeing Uses 20,000lbs. Of Potatoes to Check Aircraft Wireless Network Signals
              NetworkWorld December 19, 2012
              "Boeing calls it Project SPUDS or rather Synthetic Personnel Using Dielectric Substitution - that is, using sacks of potatoes perched on aircraft seats to test the effectiveness of wireless signal in an airliner cabin.

              Boeing said it was researching an advanced way to test wireless signals in airplane and needed a way to effectively simulate say 200-300 people sitting in seats throughout the aircraft..."

                IT - Security
                x
                IT Security Implications Of Key Technology Trends For 2013
                HelpNet Security December 13, 2012
                "Automated controls are increasingly being used by organizations to manage the cost of compliance and reduce their business risk believes Turnkey Consulting.

                Their latest survey reveals that 48% of organizations have some automated controls and plan to increase the number of controls they automate, while 15% of organizations do not currently have any automated controls but plan to invest in this area.

                Turnkey’s research also outlined current technology trends and how they were viewed from a security perspective, with key findings as follows:..."

                Complexity the Worst Enemy of Security
                ComputerWorld December 17, 2012
                "Computerworld Hong Kong (CWHK): Are we actually any more secure today than we were five years ago?

                Bruce Schneier (BS): In short, no. It's interesting that every year we have new technologies, new products, new ideas, companies and research, yet people continue to ask why things are so bad with security? And the answer is that fundamentally the problem is complexity.

                The Internet and all the systems we build today are getting more complex at a rate that is faster than we are capable of matching. So while security in reality is actually improving but the target is constantly shifting and as complexity grows, we are losing ground.

                CWHK: And is this the reality that we have to accept today and for the foreseeable future? ..."

                10 Pillars of an Effective Insurance ERM Framework
                Insurance & Technology December 18, 2012
                "Insurers must evaluate risk with greater accuracy, granularity and timeliness. Ernst & Young's Bill Spinard provides a framework for the proper concepts, procedures and technology to achieve genuine enterprise risk management."

                "Insurance companies generally have demonstrated greater resilience than other financial services companies in the wake of the 2008 financial crisis, but achieving a precise understanding of the risks insurers face has become increasingly difficult..."

                5 Tips to Retain Great Security Talent
                CSO Online December 17, 2012
                "You want the best on your security team. And once you've got them, you want to keep them happy and keep them in your organization.

                Three security career and management experts weigh in on what security managers need to do to retain top-notch security talent.

                First, figure out whether you have the right team

                "Don't assume the people you currently have in place are the people you need to have on your security team," said Lenny Zeltser, a senior faculty member with SANS Institute and a product management director at NCR.

                Zeltser has hired many people over the years, and he believes the first step to retaining great talent is to ensure you have highly skilled, well-matched team members first."

                Best Practices for Creating 'The Human Firewall'
                NetworkWorld December 16, 2012
                "Clearly there is a need to do a better job educating workers about IT security risks and threats and to teach them how to be part of the security solution rather than the security problem.

                CIO and CSO magazines recently joined the consulting firm PwC to conduct a global survey and publish the report Global State of Information Security 2013. More than 9,300 executives in 128 countries provided input about the state of IT security in their organizations. The report reveals a real weakness when it comes to employee security awareness and practices. Consider:.."

                Four Steps to Show Value of IT Security
                ComputerWeekly December 18, 2012
                "As highlighted by a recent Ernst & Young survey – showing that 85% of respondents do not think information security professionals support business needs – there is a need to better define and articulate the business value of rigorous information security practices. The issue is one of communication. What may seem obvious to an information security practitioner may not be so clear to people working in other disciplines.

                At Gartner, we advise IT leaders and security professionals to prepare four actionable steps that clearly and effectively communicate the business value of information security to internal teams and business leaders..."

                Improving Information Security with One Simple Question
                HelpNet Security December 17, 2012
                "Anyone who has children, or has had to deal with very young children, will understand how powerful the word “why” is and how it can drive their curiosity. Innocent-sounding questions such as “why is the sky blue?” can lead to the question “but why?” to each of the answers given. A cycle of never ending “whys” is quite commonplace until it seems all the answers have been exhausted, but still they will ask “why?”

                This small and seemingly innocuous word can also be one of the most powerful tools in the vocabulary of the information security professional..."

                S.C. Security Blunders Show Why States Get Hacked
                InformationWeek December 14, 2012
                "Governor blames data breach on Russian hackers and the IRS, but states' by-the-book IT ethos shows rules and regulations are the real culprit...

                This holiday season, millions of people who live or work in South Carolina have a special treat in store: the potential for their identities and savings to get misused.

                That's thanks to the state's Department of Revenue having stored 3.3 million bank account numbers, as well as 3.8 million tax returns containing Social Security numbers for 1.9 million children and other dependents, in an unencrypted format. After a single state employee clicked on a malicious email link, an attacker -- unnamed Russian hackers have been blamed -- was able to obtain copies of those records. The state has now urged anyone who has filed a tax return in South Carolina since 1998 to contact law enforcement officials..."

                Top 7 Security Predictions for 2013
                HelpNet Security December 14, 2012
                "A seismic shift in who controls the Internet? Another Mac malware outbreak? Your smart TV being highjacked for a DDoS attack? Whatever 2013 may bring, it's sure to be an interesting year. Here's F-Secure Labs' take on what could be in store..."
                  Top Tools For Single Sign-On
                  NetworkWorld December 17, 2012
                  "We are awash in passwords, and as the number of Web services increases, things are only going to get worse. Trying to manage all these individual passwords is a major problem for enterprise security. Many end users cope by re-using their passwords, which exposes all sorts of security holes.

                  One solution is a single sign-on (SSO) tool to automate the logins of enterprise applications and also beef up password complexity, without taxing end users to try to remember dozens of different logins.

                  SSO isn't new: we have had various products for more than a decade. What is new is that several products now combine both cloud-based SaaS logins with local desktop Windows logins, and add improved two-factor authentication and smoother federated identity integration..."

                  Looking to the Future: Security Predictions For 2013
                  HelpNet Security December 17, 2012
                  "The door is closing on 2012, and it's time to look ahead to next year. As you round out your 2013 business and IT plans, cybercriminals are resolving to implement increasingly sophisticated threats targeting specific computer systems and organizations both big and small.

                  In the past year, businesses have seen several serious hacks and breaches. And as the arms race between attackers and businesses continues to evolve in 2013, IT departments and security professionals will need to stay on top of the changing tactics and approaches used by criminal hackers in order to protect their organizations. Here's our take on what security threats and trends we expect to see in the coming year:.."

                  IT - Careers
                  x
                  The Weirdest, Wackiest and Coolest Sci/Tech Stories of 2012
                  NetworkWorld December 12, 2012
                  "As we take our annual look at the year in the cool and the wacky we find a ton of high-tech goodness, from the 300,000 virtual Android-based device network being constructed by the Sandia National Laboratory to the Kansas City program that looks to give interested entrepreneurial-types free room and board to access Google's ultra-fast fiber network. There were major wacky stories as well of course. Take a look..."
                  Ten Questions to Help You Choose a Mentor
                  CIO Insight October 2, 2012
                  "No matter how high you are on the corporate ladder, there’s always a value in having a mentor or a trusted partner who can help you navigate through the twists and turns of your career. Even accomplished CEOs say they need a helping hand or some good advice every once in a while. But how to you know if a mentor or respected peer is the right kind of advisor for you? ..."
                    Top Network and IT Industry Stories of 2012
                    NetworkWorld December 12, 2012
                    "2012 has been a year of re-invention among the tech industry’s biggest players, with Microsoft overhauling many of its key product lines, most notably Windows, while also boldly entering the hardware market with Surface tablets. Google, too, got directly into the tablet game, and HP slashed its workforce as CEO Meg Whitman reshapes an industry icon that has gone through many shifts in recent years. The transformation to the cloud continued practically unabated (save for those pesky outages!) and suddenly every company seems to be a software-defined something or other, or is snapping up a company that is. Here’s a look back at the eventful year that was..."
                    IT - Social Media
                    x
                    Employee Twitter Accounts: Who Really Owns the Followers?
                    Business Management December 14, 2012
                    "If I said “tweet” to you back in 2005, you would have thought I was playing charades. But with people generating more than 340 million tweets daily, Twitter has become a social media phenomenon … and an employment liability risk.

                    One important issue: Who owns that Twitter handle? And if your employees post on their work-related Twitter accounts, can employees “take” those followers when they leave?"

                      Servers
                      x
                      Oracle Big Data Appliance X3-2 and Enhanced Oracle Big Data Connectors Are Released
                      An Engineered System for the Acquisition, Organization and Analysis of Big Data

                      Oracle's release of Oracle Big Data Appliance X3-2 and the Enhanced Oracle Big Data Connectors provides users with a cost-effective, engineered system of hardware and software upgraded to include Intel’s new processors and the latest Cloudera Distribution including Apache Hadoop (CDH) and Cloudera Manager, plus the new Oracle Enterprise Manager plug-in for Big Data Appliance. The enhanced Oracle Big Data Connectors enable greater SQL access to Hadoop from Oracle Database and more transparent access to Hadoop from R. Oracle Exadata Database Machine, Oracle Exalytics, and Oracle Big Data Appliance with Oracle Big Data Connectors provide an engineered system to acquire, organize, and analyze big data.

                      IT - Compliance
                      x
                      The Records Manager's Role in Governing E-Discovery Strategy
                      Search Compliance December 14, 2012
                      "As many records managers can attest, information governance processes are vital to e-discovery. The process of collecting and preparing electronic data for litigation is right up a records manager's alley -- until resource restrictions and overzealous lawyers get in the way.

                      So how do records managers ensure they remain valuable to an e-discovery strategy? To start, it's important for them to use information governance skills to their advantage..."

                        Five Ways to Tackle Your E-Discovery Quandary
                        CIO Insight December 14, 2012
                        "A new topic has come up in the IT-related focus groups in which I frequently participate. When asked, 'What technology issues are with you concerned with right now?' my fellow CIOs offer up the usual answers: network security, disaster recovery, limited resources, etc. However, lately I've been hearing something new: e-discovery.

                        Once the responsibility of corporate legal departments and outside attorneys, CIOs and IT directors are beginning to encounter technology issues related to preserving, collecting and producing electronically stored information (ESI) during the discovery process of a lawsuit (hence the term e-discovery)..."

                        Top 10 Information Governance Strategy Tips for Compliance Pros
                        Search Compliance December 14, 2012
                        "Implementing data management strategy and processes is a huge task, and one made more complicated when compliance is taken into account. The numerous (and rapidly multiplying) compliance regulations organizations face require looking beyond just information governance strategy from a risk management perspective.

                        SearchCompliance.com is here to help. Here are our top ten tips examining the latest information governance trends to assist your data management strategy while also helping you keep pace with compliance regulations..."

                        IT - Email
                        x
                        8 Modest Proposals for Reducing Email
                        InformationWeek December 17, 2012
                        "If we really want to cut down the volume of email in our inboxes, we need to be saved from ourselves. I agree with InformationWeek's Jonathan Feldman: The email onslaught is as fierce as ever and we have only ourselves to blame. I'm just not sure willpower is going to cut it as a solution, for the same reason that most of us will have forgotten our New Year's resolutions by the time Valentine's Day rolls around: We have none.

                        We can't help it. Email is easy. Email is "free" -- perhaps not for IT budget makers, but certainly in the sense that anyone with Internet access can get a no-cost account with a nice heap of storage in about two minutes. Worst of all: Email makes us feel like we're Getting Things Done..."

                          Canada among Countries Refusing To Sign WCIT Treaty
                          IT World Canada December 13, 2012
                          "Canada, the United States and a number of other countries have hung up on a global telecom summit.

                          The countries said Thursday they won’t sign new regulations agreed to at the World Conference on International Telecommunications (WCIT) in Dubai because of concern one part could be used to undermine an open Internet.

                          “With many like-minded countries, Canada endeavoured to reach consensus on new International Telecommunication Union (ITU) regulations that recognized advances in telecommunications while maintaining an open, accessible Internet,” Industry Minister Christian Paradis said..."

                            IT - Database
                            x
                            A Guide to Practical Database Monitoring
                            Dark Reading December 17, 2012
                            [Excerpted from "A Guide to Practical Database Monitoring," a new, free report posted this week on Dark Reading's Database Security Tech Center.]

                            "Database activity monitoring, a form of application monitoring, examines how applications use data and database resources to fulfill user requests. DAM captures and records database events -- which, at minimum, includes all SQL activity -- in real time or near real time.

                            DAM is focused on the database layer, which allows for a contextual understanding of transactions, or how multiple database operations constitute a specific business function.

                            If you want to understand when administrators perform unauthorized alterations or view sensitive information, or be altered when systems are used in a manner inconsistent with best practices, DAM is a good choice..."

                            10 of the Most Useful Cloud Databases
                            NetworkWorld December 18, 2012
                            "IDC predicts that big data is growing at an annual rate of 60% for structured and unstructured data. Businesses need to do something with all that data, and traditionally databases have been the answer. With cloud technology, providers are rolling out more ways to host those databases in the public cloud, freeing users from dedicating their own dedicated hardware to these databases, while providing the ability to scale the databases into large capacities. "This is a really huge market given all the data out there," says Jeff Kelly, a big data expert at research firm Wikibon. "The cloud is going to be the destination for a lot of this big data moving forward."
                            Making Database Security Your No. 1 2013 Resolution
                            Dark Reading December 20, 2012
                            "As the IT community struggles to push itself off of the proverbial mat, bloodied and beaten by yet another 365 days of bruising data breaches, now's the time to start thinking about a new year of security resolutions. Considering that the weak state of many enterprises' database infrastructures has been the glass jaw to suffer the bulk of the knockout breaches of 2012, it makes sense to put database security at the top of the list of 2013 resolutions. The question is whether IT executives will see fit to shift their priorities to an area that has traditionally seen very little focus beyond meeting bare minimum reporting requirements..."
                            IT - Mobile
                            x
                            Mobility Management: The Bigger The Better
                            Federal Computer Week December 18, 2012
                            "Federal agencies are beginning to think big about the deployment of mobile technology.

                            It's not as if they have much choice, especially if they have adopted a bring-your-own-device policy. BYOD, which allows employees to use their personal mobile devices with agency networks, is leading to the rapid emergence of a mobile workforce.

                            In the past, federal agencies have been able to control the adoption of new technology because they controlled the procurement process. And federal acquisition has always been sufficiently slow to give agencies an opportunity to manage the pace of change.

                            But not in this case. Once agencies allow employees to use their own devices, the race is on to put in place the policies, technologies and management strategies needed to get the full benefit of mobile technology — and avoid any potential pitfalls..."

                            IT - Big Data
                            x
                            Big Data: An Explosion in Our Digital Universe With Business Opportunities
                            Business 2 Community December 14, 2012
                            "As websites, banking transactions, online flight reservations, image applications, social networks, mobile devices, apps, etc. are flooding all areas of information and communications, a new concept is born: Big Data. This term refers to data sets that are so disproportionately large that it is impossible to treat them with conventional database tools and analytical applications.

                            The current explosion in our digital universe is transforming, as the size of Big Data is constantly changing and growing rapidly. For example, in 2012, it scaled from a dozen terabytes to multiple petabytes of data in a single data set. This increase has generated a large number of contents, requiring new systems and tools for their optimization and protection..."

                            Big Data Is Big-Time Important In the Enterprise
                            Baseline December 17, 2012
                            "Big Data is no longer just something that major companies are talking about. In fact, in a new study from GigaSpaces, an organization that provides application virtualization services to the enterprise, Big Data’s importance to a growing number of firms is made abundantly clear.

                            For many CIOs, that’s not a big surprise. The sheer amount of data being created in the corporate world today is immense. And an increasing number of companies are trying to find ways to handle all of that data and analyze it in a manner that would make decisions both easier to make and better. In many cases, companies are using software like Hadoop to handle their data. And, typically, that Hadoop installation is central to business processes and decisions. Simply put, Big Data is really, really important..."

                            Less Than 1 Percent of World's Data Is Being Analyzed
                            InformationWeek December 13, 2012
                            "Only a tiny fraction of the world’s Big Data potential is being realized, though the amount of useful data is expanding, according to EMC-sponsored IDC Digital Universe study

                            Despite the unprecedented expansion of the digital universe due to the massive amounts of data being generated daily by people and machines only 0.5 percent of the world’s data is being analyzed, as per the EMC-sponsored IDC Digital Universe study, Big Data, Bigger Digital Shadows, and Biggest Growth in the Far East.

                            The proliferation of devices such as PCs and smartphones worldwide, increased Internet access within emerging markets and the boost in data from machines such as surveillance cameras or smart meters has contributed to the doubling of the digital universe within the past two years alone to a mammoth 2.8 ZB. IDC projects that the digital universe will reach 40 ZB by 2020, an amount that exceeds previous forecasts by 14 percent.

                            In terms of sheer volume, 40 ZB of data is equivalent to 57 times the amount of all the grains of sand on all the beaches on earth. If we could save all 40 ZB onto today’s Blue-ray discs, the weight of those discs (without any sleeves or cases) would be the same as 424 Nimitz-class aircraft carriers..."

                            You Are the Big Data
                            Dark Reading December 15, 2012
                            "As the art and science of security monitoring have grown, so has the trend that the subject of the monitoring is people.

                            I’m not just talking about buying habits and the infamous story of Target, which figured out that a teenager was pregnant before her father did. And I’m not including discussions about governments monitoring dissident activity and capturing citizen data within or outside of the bounds of law. It has become much bigger than that..."

                            What's Your Big Data Worth?
                            InformationWeek December 14, 2012
                            "Business leaders who want to start valuing their data with the same rigor and discipline they apply to physical assets are being stymied by out-of-date accounting practices, a panel of experts told a meeting of the prestigious Executives' Club of Chicago earlier this week. Information has a discernible value -- one that should be accounted for on a company's books, according to Doug Laney, VP, analytics & information management at Gartner. Laney is best known for his influential research note in 2001 that framed big data in terms of the three V's: Volume, Velocity and Variety..."
                            IT - BYOD
                            x
                            BYOD: It's More Complicated than You Might Think
                            Federal Computer Week December 13, 2012
                            "IT experts have a simple message for IT managers about bring-your-own-device (BYOD) policies: Don’t underestimate what you are getting yourself into.

                            On the one hand, that’s hard to imagine. Since agencies first started exploring the idea of allowing employees to bring their own mobile devices onto agency networks, they have been working through the ramifications in such areas as infrastructure operations, device management and, of course, security.

                            But there’s more to BYOD than they might suspect, both for better and for worse..."

                            Are BYOD Employees Decommissioning Mobile Devices Properly?
                            NetworkWorld December 13, 2012
                            "Sales of mobile devices are expected to surge this holiday season. Whether your firm has embraced bring-your-own-device (BYOD) or elected to look the other way that means many of your employees can be expected to upgrade their tablets and smartphones. But what about their old devices? Will they be decommissioned properly?

                            With BYOD, data breaches just waiting to happen

                            According to a new survey by Harris Interactive--on behalf of Fiberlink, a provider of mobile device management (MDM) and mobile application management (MAM) solutions--the answer is probably not..."

                            One Reliable Prediction for 2013: BYOD Still a Bear for IT
                            ComputerWorld December 14, 2012
                            "Next year could well be the year that many IT leaders finally start to get their mobile computing management house in order.

                            The process of integrating consumer smartphones, tablets and other devices into the workplace has been chaotic for many organizations, although there have been some notable accomplishments. Or at least, there have been some accomplishments in setting strategy, if not actual practice.

                            Nobody in IT boasts they have figured out the world of mobile computing with its constant influx of new smartphones and tablets that raise security and other management worries and pose the long-term potential need for storing data in the cloud..."

                            There Is More to IT than BYOD
                            ComputerWeekly December 14, 2012
                            "CIOs should stop worrying about BYOD according to analyst Gartner. Instead they should focus on technology transformation.

                            The analyst company is urging CIOs to focus on technology-led business transformational change, instead of pandering to user demands for supporting the gadgets they bring to work.

                            In its CIO Resolution 2013 research note, the analyst company warned; “With so much at stake, why are many IT departments obsessing about issues like bring your own device (BYOD)? After all, if you had a magic wand that solved all those end-user device issues completely, it probably wouldn't shift your company's annual financial result.”

                            BYOD: Not So Inevitable After All
                            Federal Computer Week December 13, 2012
                            "So far, the debate over bring-your-own-device policies has focused on device management, security and trustworthy apps for accessing and sharing agency data. But there’s an even more fundamental question: Once you have a BYOD environment, what is it good for?

                            That determination should be the main driver for any agency seeking to institute a BYOD policy. Despite all the talk about how inevitable BYOD is, if allowing employees to use their own smart phones and tablet PCs at work doesn't benefit the agency, why go through the pain of developing and securing such an environment?"

                            Top10
                            x
                            Top Ten Articles for last few Issues
                            Vol 178 Issue 1 and 2 ; Vol 177 Issues 1, 2, 3 and 4; Vol 176 Issues 3, 4 and 5
                            We track how frequently each article is viewed on the web site to determine which the readers consider the most important. For last week, the top 10 articles were:

                            • DTrace for Oracle Linux Brings Powerful New Tool to Customers
                            • A Primer on ZFS Transaction Groups
                            • New Kid in the Cloud: Oracle RightNow CX Cloud Service
                            • StorageTek LTO 6 Tape Drives Now Available in StorageTek SL3000 and SL8500 Tape Libraries
                            • Oracle Releases Amazon Web Services (AWS) Plug-in for Oracle Enterprise Manager
                            • Database Insider - December 2012 Issue Available Now
                            • Oracle's Big Data Page Offers Users Guidance, Insight
                            • Oracle Exadata Gives PayPal 10X Improvement in Processing Speed
                            • Documentation Changes Accompany Release of JavaFX 2.2.4
                            • Replication and Cloning Software Licenses No Longer Mandatory with Sun ZFS Backup Appliance

                            The longer version of this article has list of top ten articles for the last 8 weeks.

                              IT - Encryption
                              x
                              Encryption: Debunking the Top 10 Myths about This Data Defense
                              eWeek December 13, 2012
                              "Encryption of business and personal data has long been irritating for those who have to administer it. However, new applications have come a long way in helping to modernize and simplify this important facet of data security. In reality, when deployed correctly, encryption does not need to be a headache and can instead be an enabler to achieve the flexible, compliant protection that is required in today's environments. For example, email encryption is an essential component of securing sensitive government information; a recent study found 47 percent of agencies say better email policies are necessary, but it also found that 45 percent report that employees do not follow existing policies.

                              More troubling is the indication that agencies may be unable to enforce email policies unless their email gateways explicitly decrypt and scan desktop-encrypted email, despite meeting these policies. Enterprises are experiencing the same issues..."

                              Why One Retailer Is Migrating Away Encryption to Protect Customer Data
                              NetworkWorld December 20, 2012
                              "For retailers, protecting customer payment-card information is critical, and encryption is the typically the way to do that today. But Crutchfield Corp, which sells electronics and other goods online and through catalogs, has decided to migrate away from encryption in favor of an alternative security technology known as tokenization in order to shield sensitive customer data..."
                              Developer
                              x
                              Underground PHP and Oracle Manual Available on OTN
                              Download this Free PDF with the Latest Information on PHP OCI8 Extension, Oracle Database 11g R2
                              The Underground PHP and Oracle Manual has been updated for Oracle Database Express Edition 11g Release 2, co-author Christopher Jones announces. He and Alison Holloway wrote the manual for PHP programmers developing applications for Oracle Database. According to Jones, the manual, which contains unique, updated material about PHP's OCI8 extension for Oracle Database XE 11g, bridges the gap between the many PHP and Oracle books available. The revised edition contains new chapters about using PHP with Oracle TimesTen, NetBeans and Oracle Tuxedo, along with a new chapter about installing PHP on Oracle Solaris. This free 347-page pdf is available for download on OTN.
                              Sysadmin
                              x
                              The USE Method: SmartOS Performance Checklist
                              Comprehensive System Performance Analysis Tool: Cloud, Physical Resources and Software

                              The USE Method, as Brendan Gregg describes it, provides a strategy for performing a complete check of system health, identifying common bottlenecks and errors. For each system resource, metrics for utilization, saturation and errors are identified and checked. Identified issues are then investigated further. Gregg provides check lists for cloud limits, physical resources and software resources. His example employs a USE-based metric list for use within a SmartOS SmartMachine (Zone), such as those provided by the Joyent Public Cloud. These use the illumos kernel, and so this list should also be mostly relevant for OmniOS Zones, and to a lesser degree, Solaris Zones.

                              Analyst Report - Oracle Enterprise Manager 12c : The First Year of Adoption
                              Solution Matures to Become Application-to-Disk Management Tool
                              A year out, Oracle Enterprise Manager 12c is scrutinized by IDC Link's Tim Griesler, who describes the solution as a comprehensive multifunction full-stack, application-to-disk hardware and software manager featuring a broad set of cloud-enabling and management capabilities. Oracle Enterprise Manager is, he writes, a key part of the Oracle strategy to produce integrated hardware and software systems engineered to work together in appliance-like integrated system solutions. A competitive differentiator for Oracle versus competing integrated systems, Oracle Enterprise Manager provides the key management functions for Oracle's integrated, engineered solutions, becoming the foundation for defining Oracle platforms and messaging, Griesler concludes.
                              Trending in
                              Vol 234, Issue 2
                              Trending IT Articles