News about Oracle's Solaris and Sun Hardware
System News
Dec 31st, 2012 — Jan 6th, 2013 Generate the Custom HTML Email for this Issue
System News System News for Sun Users
Volume 179, Issue 1 << Previous Issue | Next Issue >>
Sections in this issue:
click to jump to section


IT - CxO
x
IT Executives Tap Wisdom of the Crowd
Wall Street Journal January 2nd, 2013
"A new type of cloud service is emerging which allows CIOs to solicit information or services from other community members. Startups working in this space are raising funding from venture capitalists that view the Web as a platform to more efficiently exchange goods, services and information between providers and consumers in large enterprises. But as these companies try to grow, they’re going to have to choose between marketing to IT executives, and charging for their services, or marketing themselves to a broader audience of end users, and generating revenues through value-added services..."
    IT Executives Tap Wisdom of the Crowd
    Wall Street Journal January 2nd, 2013
    "A new type of cloud service is emerging which allows CIOs to solicit information or services from other community members. Startups working in this space are raising funding from venture capitalists that view the Web as a platform to more efficiently exchange goods, services and information between providers and consumers in large enterprises. But as these companies try to grow, they’re going to have to choose between marketing to IT executives, and charging for their services, or marketing themselves to a broader audience of end users, and generating revenues through value-added services..."
      IT Executives Tap Wisdom of the Crowd
      Wall Street Journal January 2nd, 2013
      "A new type of cloud service is emerging which allows CIOs to solicit information or services from other community members. Startups working in this space are raising funding from venture capitalists that view the Web as a platform to more efficiently exchange goods, services and information between providers and consumers in large enterprises. But as these companies try to grow, they’re going to have to choose between marketing to IT executives, and charging for their services, or marketing themselves to a broader audience of end users, and generating revenues through value-added services..."
        How IT Can Keep Its Strategic Role In 2013
        InformationWeek January 4th 2013
        "Galen Gruman at InfoWorld is offering a dire warning: 2013 is the year IT may lose its "seat at the table" in helping set business strategy. Gruman's warning is worth a read, but he ignores the most important remedy: an IT focus on a company's end customers.

        Gruman is downright gloomy in asserting that IT organizations have failed to become a strategic asset:.."

        How IT Can Keep Its Strategic Role In 2013
        InformationWeek January 4th 2013
        "Galen Gruman at InfoWorld is offering a dire warning: 2013 is the year IT may lose its "seat at the table" in helping set business strategy. Gruman's warning is worth a read, but he ignores the most important remedy: an IT focus on a company's end customers.

        Gruman is downright gloomy in asserting that IT organizations have failed to become a strategic asset:.."

        How IT Can Keep Its Strategic Role In 2013
        InformationWeek January 4th 2013
        "Galen Gruman at InfoWorld is offering a dire warning: 2013 is the year IT may lose its "seat at the table" in helping set business strategy. Gruman's warning is worth a read, but he ignores the most important remedy: an IT focus on a company's end customers.

        Gruman is downright gloomy in asserting that IT organizations have failed to become a strategic asset:.."

        From Build to Buy: American Airlines Changes Modernization Course Midflight
        ComputerWorld January 2nd, 2013
        "American Airlines was well into a simultaneous revamp of its Passenger Services System (PSS) and Flight Operating System (FOS), its two most mission-critical families of applications, when the airline changed course last January.

        The plan still calls for a gradual migration off of an inflexible and outdated mainframe architecture in favor of a modern, distributed computing platform. But while the FOS focus has always been buy rather than build whenever possible, the focus for the PSS project has turned sharply away from rewriting all of the applications that make up the system in house in favor of buying existing software whenever possible and modifying it as needed.

        The ramifications of that decision are still playing out..."

        From Build to Buy: American Airlines Changes Modernization Course Midflight
        ComputerWorld January 2nd, 2013
        "American Airlines was well into a simultaneous revamp of its Passenger Services System (PSS) and Flight Operating System (FOS), its two most mission-critical families of applications, when the airline changed course last January.

        The plan still calls for a gradual migration off of an inflexible and outdated mainframe architecture in favor of a modern, distributed computing platform. But while the FOS focus has always been buy rather than build whenever possible, the focus for the PSS project has turned sharply away from rewriting all of the applications that make up the system in house in favor of buying existing software whenever possible and modifying it as needed.

        The ramifications of that decision are still playing out..."

        From Build to Buy: American Airlines Changes Modernization Course Midflight
        ComputerWorld January 2nd, 2013
        "American Airlines was well into a simultaneous revamp of its Passenger Services System (PSS) and Flight Operating System (FOS), its two most mission-critical families of applications, when the airline changed course last January.

        The plan still calls for a gradual migration off of an inflexible and outdated mainframe architecture in favor of a modern, distributed computing platform. But while the FOS focus has always been buy rather than build whenever possible, the focus for the PSS project has turned sharply away from rewriting all of the applications that make up the system in house in favor of buying existing software whenever possible and modifying it as needed.

        The ramifications of that decision are still playing out..."

        The Power of Business Rules Management
        Information Management December 27th, 2012
        There is a growing interest in business rules and business rules management systems or business rules engines. Major software vendors, from IBM, Oracle and SAP to RedHat and SAS, have or are developing business rules management systems.

        The use of these systems to support the practice of decision management to automate and manage high-volume, transactional decisions is growing rapidly. A new standard, called the Decision Model and Notation standard, is under development that will bring consistency of representation to the industry. Yet there is still a sense that this is a niche technology, and it is somewhat poorly understood outside of its traditional areas of strength. So what is a BRMS and how does it support decision management?

        The Power of Business Rules Management
        Information Management December 27th, 2012
        There is a growing interest in business rules and business rules management systems or business rules engines. Major software vendors, from IBM, Oracle and SAP to RedHat and SAS, have or are developing business rules management systems.

        The use of these systems to support the practice of decision management to automate and manage high-volume, transactional decisions is growing rapidly. A new standard, called the Decision Model and Notation standard, is under development that will bring consistency of representation to the industry. Yet there is still a sense that this is a niche technology, and it is somewhat poorly understood outside of its traditional areas of strength. So what is a BRMS and how does it support decision management?

        The Power of Business Rules Management
        Information Management December 27th, 2012
        There is a growing interest in business rules and business rules management systems or business rules engines. Major software vendors, from IBM, Oracle and SAP to RedHat and SAS, have or are developing business rules management systems.

        The use of these systems to support the practice of decision management to automate and manage high-volume, transactional decisions is growing rapidly. A new standard, called the Decision Model and Notation standard, is under development that will bring consistency of representation to the industry. Yet there is still a sense that this is a niche technology, and it is somewhat poorly understood outside of its traditional areas of strength. So what is a BRMS and how does it support decision management?

        5 Data Center Trends For 2013
        InformationWeek January 2nd 2013
        "Energy efficiency will continue to be a major focus of data center operations over the coming year, but that's not all we'll see.

        As 2013 opens with new prospects for data center operations, we'll see new looks at some old themes, especially around energy efficiency. Increased power costs and pressure from environmental groups will lead data center designers to look to new technologies to cut their traditional energy needs. But that's not all we'll see; here are five important trends you can expect to see gain strength in 2013..."

          5 Data Center Trends For 2013
          InformationWeek January 2nd 2013
          "Energy efficiency will continue to be a major focus of data center operations over the coming year, but that's not all we'll see.

          As 2013 opens with new prospects for data center operations, we'll see new looks at some old themes, especially around energy efficiency. Increased power costs and pressure from environmental groups will lead data center designers to look to new technologies to cut their traditional energy needs. But that's not all we'll see; here are five important trends you can expect to see gain strength in 2013..."

            5 Data Center Trends For 2013
            InformationWeek January 2nd 2013
            "Energy efficiency will continue to be a major focus of data center operations over the coming year, but that's not all we'll see.

            As 2013 opens with new prospects for data center operations, we'll see new looks at some old themes, especially around energy efficiency. Increased power costs and pressure from environmental groups will lead data center designers to look to new technologies to cut their traditional energy needs. But that's not all we'll see; here are five important trends you can expect to see gain strength in 2013..."

              New year, new you: The IT manager's revitalization guide
              ITWorld January 2nd 2013
              "As we say goodbye to 2012 and start looking forward to another exciting year in tech, it's a good time to pause and take stock of your professional and personal progress as an IT manager.

              Take a few moments to read through the best of Computerworld's management and career, or click a link below to skip directly to your chosen topic:"

              • Embrace big ideas
              • Build productive relationships
              • Be a better boss
              • Take care of your career
              • Make a big move
              • Try something completely different

              Read on.

              New year, new you: The IT manager's revitalization guide
              ITWorld January 2nd 2013
              "As we say goodbye to 2012 and start looking forward to another exciting year in tech, it's a good time to pause and take stock of your professional and personal progress as an IT manager.

              Take a few moments to read through the best of Computerworld's management and career, or click a link below to skip directly to your chosen topic:"

              • Embrace big ideas
              • Build productive relationships
              • Be a better boss
              • Take care of your career
              • Make a big move
              • Try something completely different

              Read on.

              New year, new you: The IT manager's revitalization guide
              ITWorld January 2nd 2013
              "As we say goodbye to 2012 and start looking forward to another exciting year in tech, it's a good time to pause and take stock of your professional and personal progress as an IT manager.

              Take a few moments to read through the best of Computerworld's management and career, or click a link below to skip directly to your chosen topic:"

              • Embrace big ideas
              • Build productive relationships
              • Be a better boss
              • Take care of your career
              • Make a big move
              • Try something completely different

              Read on.

              IT Industry Survived 2012, but Don't Expect an Innovation Boom in 2013
              eWeek January 1st 2013
              "Looking back, the year 2012 wasn’t as bad for the IT industry as it seemed it would be. The predicted Mayan Apocalypse proved to be a chimera for corporate IT as for the rest of the world. But what might be lying in wait for 2013?

              When I told my editor what my last column of 2012 would be about, I said that I would write about how glad I was that it’s over. But my response may have been colored by the fact that I’d just been writing about the apparently endless patent wars. That’s enough to make anyone feel depressed..."

                IT Industry Survived 2012, but Don't Expect an Innovation Boom in 2013
                eWeek January 1st 2013
                "Looking back, the year 2012 wasn’t as bad for the IT industry as it seemed it would be. The predicted Mayan Apocalypse proved to be a chimera for corporate IT as for the rest of the world. But what might be lying in wait for 2013?

                When I told my editor what my last column of 2012 would be about, I said that I would write about how glad I was that it’s over. But my response may have been colored by the fact that I’d just been writing about the apparently endless patent wars. That’s enough to make anyone feel depressed..."

                  IT Industry Survived 2012, but Don't Expect an Innovation Boom in 2013
                  eWeek January 1st 2013
                  "Looking back, the year 2012 wasn’t as bad for the IT industry as it seemed it would be. The predicted Mayan Apocalypse proved to be a chimera for corporate IT as for the rest of the world. But what might be lying in wait for 2013?

                  When I told my editor what my last column of 2012 would be about, I said that I would write about how glad I was that it’s over. But my response may have been colored by the fact that I’d just been writing about the apparently endless patent wars. That’s enough to make anyone feel depressed..."

                    Data Centers' Business Priorities in 2013
                    CIO Insight January 2nd, 2013
                    "They'd like to find better ways to increase the agility of their operations, to help their organizations adeptly adjust to rapidly shifting business conditions. They seek new options to do more with less--as in less energy usage. And they realize they face a talent exodus due to baby boomer retirements, and must get more creative in recruiting, retaining and training new employees. In this case, we're referring to data center professionals and the top business-focused action steps on their "to do" list for 2013, according to a recent survey from the Uptime Institute Network..."
                      Data Centers' Business Priorities in 2013
                      CIO Insight January 2nd, 2013
                      "They'd like to find better ways to increase the agility of their operations, to help their organizations adeptly adjust to rapidly shifting business conditions. They seek new options to do more with less--as in less energy usage. And they realize they face a talent exodus due to baby boomer retirements, and must get more creative in recruiting, retaining and training new employees. In this case, we're referring to data center professionals and the top business-focused action steps on their "to do" list for 2013, according to a recent survey from the Uptime Institute Network..."
                        Data Centers' Business Priorities in 2013
                        CIO Insight January 2nd, 2013
                        "They'd like to find better ways to increase the agility of their operations, to help their organizations adeptly adjust to rapidly shifting business conditions. They seek new options to do more with less--as in less energy usage. And they realize they face a talent exodus due to baby boomer retirements, and must get more creative in recruiting, retaining and training new employees. In this case, we're referring to data center professionals and the top business-focused action steps on their "to do" list for 2013, according to a recent survey from the Uptime Institute Network..."
                          New Year's Resolutions For CIOs
                          CIO Insight January 2nd, 2013
                          "It's time for another year of new challenges and new decisions for CIOs. Over the last 12 months, things have changed rapidly in the enterprise world. Mobile products, like those from Apple and Samsung, have more and more made their way into the office. And surprisingly, companies that once stood above the fray in the corporate world, including Research In Motion and Microsoft, have slipped a bit. It’s a different world for CIOs.

                          With that in mind, it's a good time to look ahead and discuss what will matter most to the average CIO over the next year. After all, it’s better to be prepared for those changes now rather than being unduly surprised later..."

                          New Year's Resolutions For CIOs
                          CIO Insight January 2nd, 2013
                          "It's time for another year of new challenges and new decisions for CIOs. Over the last 12 months, things have changed rapidly in the enterprise world. Mobile products, like those from Apple and Samsung, have more and more made their way into the office. And surprisingly, companies that once stood above the fray in the corporate world, including Research In Motion and Microsoft, have slipped a bit. It’s a different world for CIOs.

                          With that in mind, it's a good time to look ahead and discuss what will matter most to the average CIO over the next year. After all, it’s better to be prepared for those changes now rather than being unduly surprised later..."

                          New Year's Resolutions For CIOs
                          CIO Insight January 2nd, 2013
                          "It's time for another year of new challenges and new decisions for CIOs. Over the last 12 months, things have changed rapidly in the enterprise world. Mobile products, like those from Apple and Samsung, have more and more made their way into the office. And surprisingly, companies that once stood above the fray in the corporate world, including Research In Motion and Microsoft, have slipped a bit. It’s a different world for CIOs.

                          With that in mind, it's a good time to look ahead and discuss what will matter most to the average CIO over the next year. After all, it’s better to be prepared for those changes now rather than being unduly surprised later..."

                          SPARC
                          x
                          SPARC T5 Chip Performance and Bandwidth
                          Deep Dive with Rick Hetherington
                          The SPARC T5 Chip -- eight sockets, 16 cores, (total of 128) that can support eight individual threads for a a total of 1024 functional CPUs -- is the subject of a post by Rick Ramsey, who calls attention to a Q&A with Rick Hetherington that is a deep dive into the chip. Hetherington describes the technical details of the new SPARC T5 processor and expands on the process that is used to design these innovative chips.
                          SPARC T5 Chip Performance and Bandwidth
                          Deep Dive with Rick Hetherington
                          The SPARC T5 Chip -- eight sockets, 16 cores, (total of 128) that can support eight individual threads for a a total of 1024 functional CPUs -- is the subject of a post by Rick Ramsey, who calls attention to a Q&A with Rick Hetherington that is a deep dive into the chip. Hetherington describes the technical details of the new SPARC T5 processor and expands on the process that is used to design these innovative chips.
                          SPARC T5 Chip Performance and Bandwidth
                          Deep Dive with Rick Hetherington
                          The SPARC T5 Chip -- eight sockets, 16 cores, (total of 128) that can support eight individual threads for a a total of 1024 functional CPUs -- is the subject of a post by Rick Ramsey, who calls attention to a Q&A with Rick Hetherington that is a deep dive into the chip. Hetherington describes the technical details of the new SPARC T5 processor and expands on the process that is used to design these innovative chips.
                          Exadata
                          x
                          Oracle Advanced Analytics Helps Turkcell Combat Fraudulent Cell Phone Use
                          Exadata Analyzes 100 Terabytes (TB) of Data Faster than any Other Application
                          Communications fraud had become a major issue for Turkcell Hizmetleri, a leading provider of mobile communications in Turkey. The company implemented Oracle Exadata Database Machine X2-2 HC Full Rack, enabling its data analysts to build predictive antifraud models inside the Oracle Database and deploy them into Oracle Exadata for scoring, using Oracle Data Mining. According to Hasan Tonguç, Manager, Turkcell, “With Oracle Data Mining, a component of the Oracle Advanced Analytics Option, we can analyze large volumes of customer data and call-data records easier and faster than with any other tool and rapidly detect and combat fraudulent phone use.”
                          Oracle Advanced Analytics Helps Turkcell Combat Fraudulent Cell Phone Use
                          Exadata Analyzes 100 Terabytes (TB) of Data Faster than any Other Application
                          Communications fraud had become a major issue for Turkcell Hizmetleri, a leading provider of mobile communications in Turkey. The company implemented Oracle Exadata Database Machine X2-2 HC Full Rack, enabling its data analysts to build predictive antifraud models inside the Oracle Database and deploy them into Oracle Exadata for scoring, using Oracle Data Mining. According to Hasan Tonguç, Manager, Turkcell, “With Oracle Data Mining, a component of the Oracle Advanced Analytics Option, we can analyze large volumes of customer data and call-data records easier and faster than with any other tool and rapidly detect and combat fraudulent phone use.”
                          Oracle Advanced Analytics Helps Turkcell Combat Fraudulent Cell Phone Use
                          Exadata Analyzes 100 Terabytes (TB) of Data Faster than any Other Application
                          Communications fraud had become a major issue for Turkcell Hizmetleri, a leading provider of mobile communications in Turkey. The company implemented Oracle Exadata Database Machine X2-2 HC Full Rack, enabling its data analysts to build predictive antifraud models inside the Oracle Database and deploy them into Oracle Exadata for scoring, using Oracle Data Mining. According to Hasan Tonguç, Manager, Turkcell, “With Oracle Data Mining, a component of the Oracle Advanced Analytics Option, we can analyze large volumes of customer data and call-data records easier and faster than with any other tool and rapidly detect and combat fraudulent phone use.”
                          Cardinal Health Consolides 20 Legacy Databases onto Two Oracle Exadata Systems
                          IDC Case Study Identifies Numerous Gains Resulting from the Consolidation
                          IDC has published a case study entitled "Making Oracle Database Easier and Faster to Manage and Run: Cardinal Health's Consolidation on Oracle Exadata" that examines Cardinal Health's procedures in consolidating 20 legacy Unix-based RISC databases onto two Oracle Exadata X2-2 half-rack systems. Cardinal Health now runs product searches 43 times faster, and order query times have been cut from an average of 2.7 seconds to 0.17 seconds. Daily aggregate wait times now take 31 hours rather than 347. The CPUs in the legacy system typically ran at 77% of capacity. The CPUs of the two Oracle Exadata systems run at below 10%.
                          Cardinal Health Consolides 20 Legacy Databases onto Two Oracle Exadata Systems
                          IDC Case Study Identifies Numerous Gains Resulting from the Consolidation
                          IDC has published a case study entitled "Making Oracle Database Easier and Faster to Manage and Run: Cardinal Health's Consolidation on Oracle Exadata" that examines Cardinal Health's procedures in consolidating 20 legacy Unix-based RISC databases onto two Oracle Exadata X2-2 half-rack systems. Cardinal Health now runs product searches 43 times faster, and order query times have been cut from an average of 2.7 seconds to 0.17 seconds. Daily aggregate wait times now take 31 hours rather than 347. The CPUs in the legacy system typically ran at 77% of capacity. The CPUs of the two Oracle Exadata systems run at below 10%.
                          Cardinal Health Consolides 20 Legacy Databases onto Two Oracle Exadata Systems
                          IDC Case Study Identifies Numerous Gains Resulting from the Consolidation
                          IDC has published a case study entitled "Making Oracle Database Easier and Faster to Manage and Run: Cardinal Health's Consolidation on Oracle Exadata" that examines Cardinal Health's procedures in consolidating 20 legacy Unix-based RISC databases onto two Oracle Exadata X2-2 half-rack systems. Cardinal Health now runs product searches 43 times faster, and order query times have been cut from an average of 2.7 seconds to 0.17 seconds. Daily aggregate wait times now take 31 hours rather than 347. The CPUs in the legacy system typically ran at 77% of capacity. The CPUs of the two Oracle Exadata systems run at below 10%.
                          Virtualization
                          x
                          Resource Management with Parittioning, Constraints and Scheduling
                          Enabling Technologies for Virtualization

                          In the fourth article of his series on virtualization Detlef Drewanz discusses IT resource management as a technology that enables virtualization. Drewanz mentions constraints, scheduling, and partitioning as the three basic mechanisms of resource management typically used to guarantee various virtualization technologies access to limited and shared resources, explaining that these mechanisms are used for different resources based on the requirements of various workloads and virtualization technologies. The most prevalent means of controlling resources in hypervisor-based virtualization environments is partitioning. This is largely because partitioning, unlike constraints and scheduling, avoids overcommitment of CPU resources, he explains.

                          Resource Management with Parittioning, Constraints and Scheduling
                          Enabling Technologies for Virtualization

                          In the fourth article of his series on virtualization Detlef Drewanz discusses IT resource management as a technology that enables virtualization. Drewanz mentions constraints, scheduling, and partitioning as the three basic mechanisms of resource management typically used to guarantee various virtualization technologies access to limited and shared resources, explaining that these mechanisms are used for different resources based on the requirements of various workloads and virtualization technologies. The most prevalent means of controlling resources in hypervisor-based virtualization environments is partitioning. This is largely because partitioning, unlike constraints and scheduling, avoids overcommitment of CPU resources, he explains.

                          Resource Management with Parittioning, Constraints and Scheduling
                          Enabling Technologies for Virtualization

                          In the fourth article of his series on virtualization Detlef Drewanz discusses IT resource management as a technology that enables virtualization. Drewanz mentions constraints, scheduling, and partitioning as the three basic mechanisms of resource management typically used to guarantee various virtualization technologies access to limited and shared resources, explaining that these mechanisms are used for different resources based on the requirements of various workloads and virtualization technologies. The most prevalent means of controlling resources in hypervisor-based virtualization environments is partitioning. This is largely because partitioning, unlike constraints and scheduling, avoids overcommitment of CPU resources, he explains.

                          IT - Storage
                          x
                          Assessing the All-Flash Array Market
                          Storage-Switzerland December 27th, 2012
                          "ll-Flash arrays are storage systems that are 100% solid state and provide a set of storage features like snapshots and replication similar to traditional hard drive based storage systems. The recent leaks of what EMC plans to do with the technology they acquired through their XtremeIO acquisition is adding fuel to the All-Flash Array fire. This is a legitimate market. Companies like Pure Storage, Nimbus Data Systems, SolidFire, GreenBytes, Skyera, and Tegile all released products in 2012 and many have revenue customers..."
                          Assessing the All-Flash Array Market
                          Storage-Switzerland December 27th, 2012
                          "ll-Flash arrays are storage systems that are 100% solid state and provide a set of storage features like snapshots and replication similar to traditional hard drive based storage systems. The recent leaks of what EMC plans to do with the technology they acquired through their XtremeIO acquisition is adding fuel to the All-Flash Array fire. This is a legitimate market. Companies like Pure Storage, Nimbus Data Systems, SolidFire, GreenBytes, Skyera, and Tegile all released products in 2012 and many have revenue customers..."
                          Assessing the All-Flash Array Market
                          Storage-Switzerland December 27th, 2012
                          "ll-Flash arrays are storage systems that are 100% solid state and provide a set of storage features like snapshots and replication similar to traditional hard drive based storage systems. The recent leaks of what EMC plans to do with the technology they acquired through their XtremeIO acquisition is adding fuel to the All-Flash Array fire. This is a legitimate market. Companies like Pure Storage, Nimbus Data Systems, SolidFire, GreenBytes, Skyera, and Tegile all released products in 2012 and many have revenue customers..."
                          The History of the Hard Drive and Its Future
                          CRN December 20th, 2012
                          "The hard drive has been the staple of the storage industry since the first one was shipped in 1956, and will continue to remain so for the foreseeable future. Eventually, new technologies will be developed that allow higher amounts of data to be stored and accessed faster and remain archived longer than possible using hard drives.

                          CRN takes you back in time, and into the future, to explore the development of hard drive technology, much of which was centered around development at IBM thanks to that company's lock on computer technology for much of the 1950s to 1980s..."

                          The History of the Hard Drive and Its Future
                          CRN December 20th, 2012
                          "The hard drive has been the staple of the storage industry since the first one was shipped in 1956, and will continue to remain so for the foreseeable future. Eventually, new technologies will be developed that allow higher amounts of data to be stored and accessed faster and remain archived longer than possible using hard drives.

                          CRN takes you back in time, and into the future, to explore the development of hard drive technology, much of which was centered around development at IBM thanks to that company's lock on computer technology for much of the 1950s to 1980s..."

                          The History of the Hard Drive and Its Future
                          CRN December 20th, 2012
                          "The hard drive has been the staple of the storage industry since the first one was shipped in 1956, and will continue to remain so for the foreseeable future. Eventually, new technologies will be developed that allow higher amounts of data to be stored and accessed faster and remain archived longer than possible using hard drives.

                          CRN takes you back in time, and into the future, to explore the development of hard drive technology, much of which was centered around development at IBM thanks to that company's lock on computer technology for much of the 1950s to 1980s..."

                          Are Black Holes Slowing the Evolution of Storage Technology?
                          Search Storage December 26th, 2012
                          "A recent article in Nature should have all data storage watchers breathing a little easier. The story detailed the latest theories from an astronomical study conducted by a group of researchers at Michigan State University establishing, among other things, that multiple black holes could keep company within a cluster of the Milky Way galaxy without, you know, shredding the fabric of the universe... how does black-hole behavior theory relate to storage?"
                          Are Black Holes Slowing the Evolution of Storage Technology?
                          Search Storage December 26th, 2012
                          "A recent article in Nature should have all data storage watchers breathing a little easier. The story detailed the latest theories from an astronomical study conducted by a group of researchers at Michigan State University establishing, among other things, that multiple black holes could keep company within a cluster of the Milky Way galaxy without, you know, shredding the fabric of the universe... how does black-hole behavior theory relate to storage?"
                          Are Black Holes Slowing the Evolution of Storage Technology?
                          Search Storage December 26th, 2012
                          "A recent article in Nature should have all data storage watchers breathing a little easier. The story detailed the latest theories from an astronomical study conducted by a group of researchers at Michigan State University establishing, among other things, that multiple black holes could keep company within a cluster of the Milky Way galaxy without, you know, shredding the fabric of the universe... how does black-hole behavior theory relate to storage?"
                          Object storage predictions for 2013
                          Help Net Security January 4th, 2013
                          "Object storage is primed for growth, according to Mark Goros , CEO of Caringo, a provider of object storage software. Goros predicts 2013 will include a number of advancements and revelations in cloud services, Big Data analytics and mobility thanks to wider adoption of object storage..."
                          Object storage predictions for 2013
                          Help Net Security January 4th, 2013
                          "Object storage is primed for growth, according to Mark Goros , CEO of Caringo, a provider of object storage software. Goros predicts 2013 will include a number of advancements and revelations in cloud services, Big Data analytics and mobility thanks to wider adoption of object storage..."
                          Object storage predictions for 2013
                          Help Net Security January 4th, 2013
                          "Object storage is primed for growth, according to Mark Goros , CEO of Caringo, a provider of object storage software. Goros predicts 2013 will include a number of advancements and revelations in cloud services, Big Data analytics and mobility thanks to wider adoption of object storage..."
                          What Is Software-Defined Storage?
                          InformationWeek January 2nd, 2013
                          "With increasing frequency, I'm asked for my thoughts on the emerging software-defined storage category. Whenever I'm presented with a new tech term, I ask whether it truly defines a new product category, or if it's simply an attempt to make an existing technology seem more glamorous. Software-defined storage is a little bit of both. If we really have to have a separate term for this group of products, here is what I think that definition should be..."
                            What Is Software-Defined Storage?
                            InformationWeek January 2nd, 2013
                            "With increasing frequency, I'm asked for my thoughts on the emerging software-defined storage category. Whenever I'm presented with a new tech term, I ask whether it truly defines a new product category, or if it's simply an attempt to make an existing technology seem more glamorous. Software-defined storage is a little bit of both. If we really have to have a separate term for this group of products, here is what I think that definition should be..."
                              What Is Software-Defined Storage?
                              InformationWeek January 2nd, 2013
                              "With increasing frequency, I'm asked for my thoughts on the emerging software-defined storage category. Whenever I'm presented with a new tech term, I ask whether it truly defines a new product category, or if it's simply an attempt to make an existing technology seem more glamorous. Software-defined storage is a little bit of both. If we really have to have a separate term for this group of products, here is what I think that definition should be..."
                                Source vs. Target Based Data Deduplication
                                Storage Switzerland, January 2nd, 2012
                                "Deduplication can be deployed as either a “target” based solution, where backups are pushed over the network to an appliance where deduplication takes place or a “source” based approach, where deduplication takes place at the client or server level. Some vendor offerings provide a hybrid of both source and target based deduplication to afford the greatest number of benefits for the end user. As might be expected, the decision to adopt a target, source or hybrid based approach depends largely on the business use case, the characteristics of the underlying data itself and where the particular end user is in their backup technology lifecycle. This article will examine all three approaches to data “dedupe” and provide guidance on how to determine which is the best fit for your individual requirements..."
                                  Source vs. Target Based Data Deduplication
                                  Storage Switzerland, January 2nd, 2012
                                  "Deduplication can be deployed as either a “target” based solution, where backups are pushed over the network to an appliance where deduplication takes place or a “source” based approach, where deduplication takes place at the client or server level. Some vendor offerings provide a hybrid of both source and target based deduplication to afford the greatest number of benefits for the end user. As might be expected, the decision to adopt a target, source or hybrid based approach depends largely on the business use case, the characteristics of the underlying data itself and where the particular end user is in their backup technology lifecycle. This article will examine all three approaches to data “dedupe” and provide guidance on how to determine which is the best fit for your individual requirements..."
                                    Source vs. Target Based Data Deduplication
                                    Storage Switzerland, January 2nd, 2012
                                    "Deduplication can be deployed as either a “target” based solution, where backups are pushed over the network to an appliance where deduplication takes place or a “source” based approach, where deduplication takes place at the client or server level. Some vendor offerings provide a hybrid of both source and target based deduplication to afford the greatest number of benefits for the end user. As might be expected, the decision to adopt a target, source or hybrid based approach depends largely on the business use case, the characteristics of the underlying data itself and where the particular end user is in their backup technology lifecycle. This article will examine all three approaches to data “dedupe” and provide guidance on how to determine which is the best fit for your individual requirements..."
                                      10 Storage Predictions For 2013
                                      CRN January 3rd, 2013
                                      "Cloud storage, flash storage, storage virtualization software, disaster recovery, and a whole host of technologies are no strangers to solution providers. However, 2013 will be a time of transition as customers seriously look at how to adopt and change those technologies to increase the performance, simplify the management, and squeeze the footprint of their corporate storage environments.

                                      Storage is going flash, right? But how? And what technologies? And the cloud? Watch out for the fine print, including what the actual costs are.

                                      • Climate Change? We Believe, When It Comes To DR
                                      • All-Flash Storage -- Vendors Will Be Ready
                                      • All-Flash Storage -- Market Won't Be Ready
                                      • But Flash Will Make Its Impact Felt Even So
                                      • Traditional Storage Approaches A Plateau
                                      • Software: The Biggest Winner In 2012
                                      • Proprietary Storage: The Biggest Loser In 2013
                                      • Buy! Buy! Buy!
                                      • Cloud Storage Ready, But Not Cloud Prices
                                      • Better Be Ready For BYOD And Storage

                                      These issues and more will be hot topics of discussion for solution providers and their customers in 2013. Turn the page and get the conversations started..."

                                      10 Storage Predictions For 2013
                                      CRN January 3rd, 2013
                                      "Cloud storage, flash storage, storage virtualization software, disaster recovery, and a whole host of technologies are no strangers to solution providers. However, 2013 will be a time of transition as customers seriously look at how to adopt and change those technologies to increase the performance, simplify the management, and squeeze the footprint of their corporate storage environments.

                                      Storage is going flash, right? But how? And what technologies? And the cloud? Watch out for the fine print, including what the actual costs are.

                                      • Climate Change? We Believe, When It Comes To DR
                                      • All-Flash Storage -- Vendors Will Be Ready
                                      • All-Flash Storage -- Market Won't Be Ready
                                      • But Flash Will Make Its Impact Felt Even So
                                      • Traditional Storage Approaches A Plateau
                                      • Software: The Biggest Winner In 2012
                                      • Proprietary Storage: The Biggest Loser In 2013
                                      • Buy! Buy! Buy!
                                      • Cloud Storage Ready, But Not Cloud Prices
                                      • Better Be Ready For BYOD And Storage

                                      These issues and more will be hot topics of discussion for solution providers and their customers in 2013. Turn the page and get the conversations started..."

                                      10 Storage Predictions For 2013
                                      CRN January 3rd, 2013
                                      "Cloud storage, flash storage, storage virtualization software, disaster recovery, and a whole host of technologies are no strangers to solution providers. However, 2013 will be a time of transition as customers seriously look at how to adopt and change those technologies to increase the performance, simplify the management, and squeeze the footprint of their corporate storage environments.

                                      Storage is going flash, right? But how? And what technologies? And the cloud? Watch out for the fine print, including what the actual costs are.

                                      • Climate Change? We Believe, When It Comes To DR
                                      • All-Flash Storage -- Vendors Will Be Ready
                                      • All-Flash Storage -- Market Won't Be Ready
                                      • But Flash Will Make Its Impact Felt Even So
                                      • Traditional Storage Approaches A Plateau
                                      • Software: The Biggest Winner In 2012
                                      • Proprietary Storage: The Biggest Loser In 2013
                                      • Buy! Buy! Buy!
                                      • Cloud Storage Ready, But Not Cloud Prices
                                      • Better Be Ready For BYOD And Storage

                                      These issues and more will be hot topics of discussion for solution providers and their customers in 2013. Turn the page and get the conversations started..."

                                      Java Technology
                                      x
                                      Top 10 Java Stories of 2012
                                      A Good Year for Java Technology
                                      The top 10 Java Stories of 2012 as reported by Tori Wieldt reflect the abundant number of developments in Java technology throughout the year. The stories cover everything from JavaFX to Java SE 8 to activities in the Java Community Process to the naming of six new Java Champions. Wieldt provides links to each of these most read stories, remarking that "2012 was the right mix of code, corporation, and community for Java."
                                      Top 10 Java Stories of 2012
                                      A Good Year for Java Technology
                                      The top 10 Java Stories of 2012 as reported by Tori Wieldt reflect the abundant number of developments in Java technology throughout the year. The stories cover everything from JavaFX to Java SE 8 to activities in the Java Community Process to the naming of six new Java Champions. Wieldt provides links to each of these most read stories, remarking that "2012 was the right mix of code, corporation, and community for Java."
                                      Top 10 Java Stories of 2012
                                      A Good Year for Java Technology
                                      The top 10 Java Stories of 2012 as reported by Tori Wieldt reflect the abundant number of developments in Java technology throughout the year. The stories cover everything from JavaFX to Java SE 8 to activities in the Java Community Process to the naming of six new Java Champions. Wieldt provides links to each of these most read stories, remarking that "2012 was the right mix of code, corporation, and community for Java."
                                      IT - Technology
                                      x
                                      2013: My Tech Guesstimates for the Year Ahead
                                      ZDNet January 1st, 2013
                                      "My 2012 calls were a mixed bag. Sure, Workday, Salesforce and the SaaS gang became enterprise standard platforms in many respects. But RIM didn’t become a software company completely, Microsoft's Nokia partnership is still a work in progress and ultrabooks and Windows 8 aren't exactly big hits.

                                      With those caveats, here's a look at what I'm thinking for 2013..."

                                      2013: My Tech Guesstimates for the Year Ahead
                                      ZDNet January 1st, 2013
                                      "My 2012 calls were a mixed bag. Sure, Workday, Salesforce and the SaaS gang became enterprise standard platforms in many respects. But RIM didn’t become a software company completely, Microsoft's Nokia partnership is still a work in progress and ultrabooks and Windows 8 aren't exactly big hits.

                                      With those caveats, here's a look at what I'm thinking for 2013..."

                                      2013: My Tech Guesstimates for the Year Ahead
                                      ZDNet January 1st, 2013
                                      "My 2012 calls were a mixed bag. Sure, Workday, Salesforce and the SaaS gang became enterprise standard platforms in many respects. But RIM didn’t become a software company completely, Microsoft's Nokia partnership is still a work in progress and ultrabooks and Windows 8 aren't exactly big hits.

                                      With those caveats, here's a look at what I'm thinking for 2013..."

                                      New Tech Words for the New Year
                                      ComputerWorld December 22nd, 2012
                                      "Every December, pundits predict what everyone will be talking about in the year ahead. But how can we talk about these predictions if we don't have the words?

                                      Here's my list of words for 2013 that we can all use to talk about -- and make fun of -- emerging trends in technology. Some have been around for a while, languishing in obscurity. Others are brand new:"

                                      • Pay-to-spam
                                      • Plusify
                                      • PAWN
                                      • Gangnam Style.
                                      • Hangout In Real
                                      • PMS
                                      • McAflee

                                      "I think 2013 is going to be the year when Google aggressively plusifies everything..."

                                      New Tech Words for the New Year
                                      ComputerWorld December 22nd, 2012
                                      "Every December, pundits predict what everyone will be talking about in the year ahead. But how can we talk about these predictions if we don't have the words?

                                      Here's my list of words for 2013 that we can all use to talk about -- and make fun of -- emerging trends in technology. Some have been around for a while, languishing in obscurity. Others are brand new:"

                                      • Pay-to-spam
                                      • Plusify
                                      • PAWN
                                      • Gangnam Style.
                                      • Hangout In Real
                                      • PMS
                                      • McAflee

                                      "I think 2013 is going to be the year when Google aggressively plusifies everything..."

                                      New Tech Words for the New Year
                                      ComputerWorld December 22nd, 2012
                                      "Every December, pundits predict what everyone will be talking about in the year ahead. But how can we talk about these predictions if we don't have the words?

                                      Here's my list of words for 2013 that we can all use to talk about -- and make fun of -- emerging trends in technology. Some have been around for a while, languishing in obscurity. Others are brand new:"

                                      • Pay-to-spam
                                      • Plusify
                                      • PAWN
                                      • Gangnam Style.
                                      • Hangout In Real
                                      • PMS
                                      • McAflee

                                      "I think 2013 is going to be the year when Google aggressively plusifies everything..."

                                      10 CES Trends That Matter To Business
                                      InformationWeek January 3rd, 2013
                                      "The Consumer Electronics Show, scheduled to run January 8-11 in Las Vegas, is about consumer electronics, of course. But the consumerization (terrible word, by the way) of IT has been much of what the business press has focused on over the past year, what with BYOD, cloud computing, social networks and such. So CES, which has managed to do quite well without Apple, and will again this year without a Microsoft keynote, has a lot to show the business community what is coming next for the business-to-business world.

                                      Here are 10 CES 2013 trends and products that will have a business impact..."

                                      10 CES Trends That Matter To Business
                                      InformationWeek January 3rd, 2013
                                      "The Consumer Electronics Show, scheduled to run January 8-11 in Las Vegas, is about consumer electronics, of course. But the consumerization (terrible word, by the way) of IT has been much of what the business press has focused on over the past year, what with BYOD, cloud computing, social networks and such. So CES, which has managed to do quite well without Apple, and will again this year without a Microsoft keynote, has a lot to show the business community what is coming next for the business-to-business world.

                                      Here are 10 CES 2013 trends and products that will have a business impact..."

                                      10 CES Trends That Matter To Business
                                      InformationWeek January 3rd, 2013
                                      "The Consumer Electronics Show, scheduled to run January 8-11 in Las Vegas, is about consumer electronics, of course. But the consumerization (terrible word, by the way) of IT has been much of what the business press has focused on over the past year, what with BYOD, cloud computing, social networks and such. So CES, which has managed to do quite well without Apple, and will again this year without a Microsoft keynote, has a lot to show the business community what is coming next for the business-to-business world.

                                      Here are 10 CES 2013 trends and products that will have a business impact..."

                                      Training
                                      x
                                      Free Oracle VM Training for Sys Admins: January 15, 2013 and January 29, 2013
                                      Proctored Lab Setting for Hands-on Experience with Oracle Solaris, Oracle Linux and Oracle VM
                                      Oracle is offering free online training for sys admins in Oracle VM, Monica Kumar announces. The date for the Americas audience is Tuesday January 15, 2013, with various start times. For the EMEA audience, the date is Tuesday January 29, 2013, again with various start times. Kumar writes that this training will give registrants the opportunity to dirty their hands with the file systems, install images and management tools for Oracle Solaris, Oracle Linux and Oracle VM in the setting of a proctored lab. Detailed agendas for the training and a Twitter hashtag for the event are available.
                                      Free Oracle VM Training for Sys Admins: January 15, 2013 and January 29, 2013
                                      Proctored Lab Setting for Hands-on Experience with Oracle Solaris, Oracle Linux and Oracle VM
                                      Oracle is offering free online training for sys admins in Oracle VM, Monica Kumar announces. The date for the Americas audience is Tuesday January 15, 2013, with various start times. For the EMEA audience, the date is Tuesday January 29, 2013, again with various start times. Kumar writes that this training will give registrants the opportunity to dirty their hands with the file systems, install images and management tools for Oracle Solaris, Oracle Linux and Oracle VM in the setting of a proctored lab. Detailed agendas for the training and a Twitter hashtag for the event are available.
                                      Free Oracle VM Training for Sys Admins: January 15, 2013 and January 29, 2013
                                      Proctored Lab Setting for Hands-on Experience with Oracle Solaris, Oracle Linux and Oracle VM
                                      Oracle is offering free online training for sys admins in Oracle VM, Monica Kumar announces. The date for the Americas audience is Tuesday January 15, 2013, with various start times. For the EMEA audience, the date is Tuesday January 29, 2013, again with various start times. Kumar writes that this training will give registrants the opportunity to dirty their hands with the file systems, install images and management tools for Oracle Solaris, Oracle Linux and Oracle VM in the setting of a proctored lab. Detailed agendas for the training and a Twitter hashtag for the event are available.
                                      Solaris
                                      x
                                      Accelerate Oracle DB Startup and Shutdown with Solaris 11 vmtasks
                                      Solaris 11.1 Feature Benefits all Applications Requiring Fast Access to Shared Memory

                                      Solaris 11.1 includes a number of new features, one of which, vmtasks, evoked the most interest from the Solaris user group to which Orgad Kimchi presented a review of the new release and provides a link to the slide deck. vmtasks, Kimchi reported, accelerates such shared memory operations as creation locking and destruction, thereby optimizing system uptime because Oracle DB startup and shutdown are much faster. According to Kimchi every application requiring fast access to shared memory can benefit from this feature.

                                      Accelerate Oracle DB Startup and Shutdown with Solaris 11 vmtasks
                                      Solaris 11.1 Feature Benefits all Applications Requiring Fast Access to Shared Memory

                                      Solaris 11.1 includes a number of new features, one of which, vmtasks, evoked the most interest from the Solaris user group to which Orgad Kimchi presented a review of the new release and provides a link to the slide deck. vmtasks, Kimchi reported, accelerates such shared memory operations as creation locking and destruction, thereby optimizing system uptime because Oracle DB startup and shutdown are much faster. According to Kimchi every application requiring fast access to shared memory can benefit from this feature.

                                      Accelerate Oracle DB Startup and Shutdown with Solaris 11 vmtasks
                                      Solaris 11.1 Feature Benefits all Applications Requiring Fast Access to Shared Memory

                                      Solaris 11.1 includes a number of new features, one of which, vmtasks, evoked the most interest from the Solaris user group to which Orgad Kimchi presented a review of the new release and provides a link to the slide deck. vmtasks, Kimchi reported, accelerates such shared memory operations as creation locking and destruction, thereby optimizing system uptime because Oracle DB startup and shutdown are much faster. According to Kimchi every application requiring fast access to shared memory can benefit from this feature.

                                      MySQL
                                      x
                                      MySQL Workbench 5.2.45 GA Released to GA
                                      Several New Features, Bug Fixes
                                      Version 5.2.45 of the MySQL Workbench GUI tool has been released to GA. This version contains the following significant updates: support for several new MySQL 5.6 features; import recordsets from CSV file for the Inserts editor in Modeling and in the SQL Editor; and improved trigger editor, along with 72 resolved bugs. MySQL Utilities 1.1.1 has been included on the distribution as well. A post by rennox includes links to downloads, binary and source packages, and documentation.
                                      MySQL Workbench 5.2.45 GA Released to GA
                                      Several New Features, Bug Fixes
                                      Version 5.2.45 of the MySQL Workbench GUI tool has been released to GA. This version contains the following significant updates: support for several new MySQL 5.6 features; import recordsets from CSV file for the Inserts editor in Modeling and in the SQL Editor; and improved trigger editor, along with 72 resolved bugs. MySQL Utilities 1.1.1 has been included on the distribution as well. A post by rennox includes links to downloads, binary and source packages, and documentation.
                                      MySQL Workbench 5.2.45 GA Released to GA
                                      Several New Features, Bug Fixes
                                      Version 5.2.45 of the MySQL Workbench GUI tool has been released to GA. This version contains the following significant updates: support for several new MySQL 5.6 features; import recordsets from CSV file for the Inserts editor in Modeling and in the SQL Editor; and improved trigger editor, along with 72 resolved bugs. MySQL Utilities 1.1.1 has been included on the distribution as well. A post by rennox includes links to downloads, binary and source packages, and documentation.
                                      Cloud Computing
                                      x
                                      Developing a Cloud Chargeback System
                                      Reckoning Costs in Terms of Control, Visibility and Fairness

                                      No one wants to be charged at an unfair rate for IT resource usage. Developing a cloud chargeback system, argues Eric Tran-Le, VP Product Management, Oracle Enterprise Manager, that reveals costs in terms of control, visibility and fairness is the solution to assessing charges fairly and accurately. Creating a cost hierarchy that can report both in aggregate and by business unit is the key, Tran-Le maintains. Such a system must distinguish among the layers of computing services employed (server, middleware, database), and include baseline figures derived from the current workloads utilization that characterize the patterns by groups of users and types of workload.

                                      Developing a Cloud Chargeback System
                                      Reckoning Costs in Terms of Control, Visibility and Fairness

                                      No one wants to be charged at an unfair rate for IT resource usage. Developing a cloud chargeback system, argues Eric Tran-Le, VP Product Management, Oracle Enterprise Manager, that reveals costs in terms of control, visibility and fairness is the solution to assessing charges fairly and accurately. Creating a cost hierarchy that can report both in aggregate and by business unit is the key, Tran-Le maintains. Such a system must distinguish among the layers of computing services employed (server, middleware, database), and include baseline figures derived from the current workloads utilization that characterize the patterns by groups of users and types of workload.

                                      Developing a Cloud Chargeback System
                                      Reckoning Costs in Terms of Control, Visibility and Fairness

                                      No one wants to be charged at an unfair rate for IT resource usage. Developing a cloud chargeback system, argues Eric Tran-Le, VP Product Management, Oracle Enterprise Manager, that reveals costs in terms of control, visibility and fairness is the solution to assessing charges fairly and accurately. Creating a cost hierarchy that can report both in aggregate and by business unit is the key, Tran-Le maintains. Such a system must distinguish among the layers of computing services employed (server, middleware, database), and include baseline figures derived from the current workloads utilization that characterize the patterns by groups of users and types of workload.

                                      'Resilience and Reliability on AWS'
                                      O'Reilly Title Instructs on Defending Against Network Outages in the Cloud
                                      "Resilience and Reliability on AWS" by Jurg van Vliet, Flavia Pagamelli,and Jasper Geutsen, a new title from O'Reilly, instructs readers in how to build applications in the public cloud that are as network-outage proof as possible. The writers draw on their experiences at 9apps to show how to combine AWS with open source tools such as PostgreSQL, MongoDB, and Redis bolstered by advice on the top 10 tips for surviving outages in the cloud and the use of elasticsearch to build a dependable NoSQL data store. The authors also show how to combine AWS and PostgreSQL to build an RDBMS that scales well.
                                      'Resilience and Reliability on AWS'
                                      O'Reilly Title Instructs on Defending Against Network Outages in the Cloud
                                      "Resilience and Reliability on AWS" by Jurg van Vliet, Flavia Pagamelli,and Jasper Geutsen, a new title from O'Reilly, instructs readers in how to build applications in the public cloud that are as network-outage proof as possible. The writers draw on their experiences at 9apps to show how to combine AWS with open source tools such as PostgreSQL, MongoDB, and Redis bolstered by advice on the top 10 tips for surviving outages in the cloud and the use of elasticsearch to build a dependable NoSQL data store. The authors also show how to combine AWS and PostgreSQL to build an RDBMS that scales well.
                                      'Resilience and Reliability on AWS'
                                      O'Reilly Title Instructs on Defending Against Network Outages in the Cloud
                                      "Resilience and Reliability on AWS" by Jurg van Vliet, Flavia Pagamelli,and Jasper Geutsen, a new title from O'Reilly, instructs readers in how to build applications in the public cloud that are as network-outage proof as possible. The writers draw on their experiences at 9apps to show how to combine AWS with open source tools such as PostgreSQL, MongoDB, and Redis bolstered by advice on the top 10 tips for surviving outages in the cloud and the use of elasticsearch to build a dependable NoSQL data store. The authors also show how to combine AWS and PostgreSQL to build an RDBMS that scales well.
                                      Linux
                                      x
                                      Exploring the Safeguards in Loadable Kernel Modules
                                      Avoiding the Introduction of Changes in Recompiling the Kernel that Result in an Unbootable System

                                      In a post that explains how to use Oracle's Unbreakable Enterprise Kernel to protect a running Linux kernel, Robert Chase cautions against the introduction of changes in recompiling the kernel that might render the system unbootable. The key, he posts, is in using the Loadable Kernel Modules (LKM), which allows the customization of an environment without compromising the base kernel environment or the stability of your system. Chase presents several examples that demonstrate how signed modules enhance system security by checking modules upon load against the ring of keys compiled into the kernel, preventing invalidly signed modules from being loaded.

                                      Exploring the Safeguards in Loadable Kernel Modules
                                      Avoiding the Introduction of Changes in Recompiling the Kernel that Result in an Unbootable System

                                      In a post that explains how to use Oracle's Unbreakable Enterprise Kernel to protect a running Linux kernel, Robert Chase cautions against the introduction of changes in recompiling the kernel that might render the system unbootable. The key, he posts, is in using the Loadable Kernel Modules (LKM), which allows the customization of an environment without compromising the base kernel environment or the stability of your system. Chase presents several examples that demonstrate how signed modules enhance system security by checking modules upon load against the ring of keys compiled into the kernel, preventing invalidly signed modules from being loaded.

                                      Exploring the Safeguards in Loadable Kernel Modules
                                      Avoiding the Introduction of Changes in Recompiling the Kernel that Result in an Unbootable System

                                      In a post that explains how to use Oracle's Unbreakable Enterprise Kernel to protect a running Linux kernel, Robert Chase cautions against the introduction of changes in recompiling the kernel that might render the system unbootable. The key, he posts, is in using the Loadable Kernel Modules (LKM), which allows the customization of an environment without compromising the base kernel environment or the stability of your system. Chase presents several examples that demonstrate how signed modules enhance system security by checking modules upon load against the ring of keys compiled into the kernel, preventing invalidly signed modules from being loaded.

                                      IT - Cloud
                                      x
                                      Hard Truths About Cloud Differences
                                      Information Week January 4th, 2012
                                      "We're long into the hype cycle of cloud computing. That means clear criteria to assess and evaluate the different options are critical. Which of the many cloud approaches should medium to large enterprises take to optimize their data center operations?

                                      Typically, the cloud is envisioned as an accessible and low-cost compute utility in the sky that's always available. Despite this lofty promise, companies will need to select and build their cloud environment carefully to avoid fracturing their computing capabilities, locking themselves into a single, higher-cost environment, diminishing their ability to differentiate themselves and gain competitive advantage -- or all three..."

                                      Hard Truths About Cloud Differences
                                      Information Week January 4th, 2012
                                      "We're long into the hype cycle of cloud computing. That means clear criteria to assess and evaluate the different options are critical. Which of the many cloud approaches should medium to large enterprises take to optimize their data center operations?

                                      Typically, the cloud is envisioned as an accessible and low-cost compute utility in the sky that's always available. Despite this lofty promise, companies will need to select and build their cloud environment carefully to avoid fracturing their computing capabilities, locking themselves into a single, higher-cost environment, diminishing their ability to differentiate themselves and gain competitive advantage -- or all three..."

                                      Hard Truths About Cloud Differences
                                      Information Week January 4th, 2012
                                      "We're long into the hype cycle of cloud computing. That means clear criteria to assess and evaluate the different options are critical. Which of the many cloud approaches should medium to large enterprises take to optimize their data center operations?

                                      Typically, the cloud is envisioned as an accessible and low-cost compute utility in the sky that's always available. Despite this lofty promise, companies will need to select and build their cloud environment carefully to avoid fracturing their computing capabilities, locking themselves into a single, higher-cost environment, diminishing their ability to differentiate themselves and gain competitive advantage -- or all three..."

                                      7 Deadly Sins of Cloud Computing
                                      CSO Online January 2nd, 2013
                                      "Increasing your use of cloud computing? Great! Making these common security mistakes? Not great!..."

                                      "Automation, cost savings, and data redundancy—no wonder cloud adoption is tempting. The CISO can rest easy knowing there is no vice in moving to the cloud to reap these rewards. What may keep her up at night is not knowing how many missteps the enterprise is making in the process.

                                      Here CISOs and security buffs round up seven security sins that can undermine cloud computing's benefits..."

                                      7 Deadly Sins of Cloud Computing
                                      CSO Online January 2nd, 2013
                                      "Increasing your use of cloud computing? Great! Making these common security mistakes? Not great!..."

                                      "Automation, cost savings, and data redundancy—no wonder cloud adoption is tempting. The CISO can rest easy knowing there is no vice in moving to the cloud to reap these rewards. What may keep her up at night is not knowing how many missteps the enterprise is making in the process.

                                      Here CISOs and security buffs round up seven security sins that can undermine cloud computing's benefits..."

                                      7 Deadly Sins of Cloud Computing
                                      CSO Online January 2nd, 2013
                                      "Increasing your use of cloud computing? Great! Making these common security mistakes? Not great!..."

                                      "Automation, cost savings, and data redundancy—no wonder cloud adoption is tempting. The CISO can rest easy knowing there is no vice in moving to the cloud to reap these rewards. What may keep her up at night is not knowing how many missteps the enterprise is making in the process.

                                      Here CISOs and security buffs round up seven security sins that can undermine cloud computing's benefits..."

                                      Gartner: Cloud Storage Viable Option, But Proceed Carefully
                                      ComputerWorld January 3rd, 2013
                                      "Storing information in the public cloud from a growing market of vendors is a viable alternative to on-premise, traditional storage options for some use cases, research firm Gartner says.

                                      But cloud-based storage providers vary widely in their ability to meet the requirements of enterprise IT, which is why customers should rigorously plan and vet vendors before first engaging in a pilot and then deciding if mission-critical data should be moved into the cloud-based storage service..."

                                      Gartner: Cloud Storage Viable Option, But Proceed Carefully
                                      ComputerWorld January 3rd, 2013
                                      "Storing information in the public cloud from a growing market of vendors is a viable alternative to on-premise, traditional storage options for some use cases, research firm Gartner says.

                                      But cloud-based storage providers vary widely in their ability to meet the requirements of enterprise IT, which is why customers should rigorously plan and vet vendors before first engaging in a pilot and then deciding if mission-critical data should be moved into the cloud-based storage service..."

                                      Gartner: Cloud Storage Viable Option, But Proceed Carefully
                                      ComputerWorld January 3rd, 2013
                                      "Storing information in the public cloud from a growing market of vendors is a viable alternative to on-premise, traditional storage options for some use cases, research firm Gartner says.

                                      But cloud-based storage providers vary widely in their ability to meet the requirements of enterprise IT, which is why customers should rigorously plan and vet vendors before first engaging in a pilot and then deciding if mission-critical data should be moved into the cloud-based storage service..."

                                      Top 6 Cloud and Storage Predictions for 2013 by Symform
                                      Storage Newsletter December 25th, 2012
                                      "The combined forces of digital data growth and the consumerization of IT will come to a head in 2013, and create a wave of increased investment and moves by IT to take back control of corporate data.

                                      Symform, Inc. predicts companies of all sizes will demand that vendors and service providers improve on-ramps to the cloud and SLAs (SLAs) around cloud services. The company expects larger investments in data management, big data, and distributed systems, and believes the use of rogue cloud services in the enterprise will come under increased governance..."

                                      Top 6 Cloud and Storage Predictions for 2013 by Symform
                                      Storage Newsletter December 25th, 2012
                                      "The combined forces of digital data growth and the consumerization of IT will come to a head in 2013, and create a wave of increased investment and moves by IT to take back control of corporate data.

                                      Symform, Inc. predicts companies of all sizes will demand that vendors and service providers improve on-ramps to the cloud and SLAs (SLAs) around cloud services. The company expects larger investments in data management, big data, and distributed systems, and believes the use of rogue cloud services in the enterprise will come under increased governance..."

                                      Top 6 Cloud and Storage Predictions for 2013 by Symform
                                      Storage Newsletter December 25th, 2012
                                      "The combined forces of digital data growth and the consumerization of IT will come to a head in 2013, and create a wave of increased investment and moves by IT to take back control of corporate data.

                                      Symform, Inc. predicts companies of all sizes will demand that vendors and service providers improve on-ramps to the cloud and SLAs (SLAs) around cloud services. The company expects larger investments in data management, big data, and distributed systems, and believes the use of rogue cloud services in the enterprise will come under increased governance..."

                                      5 Cloud App Trends To Expect In 2013
                                      Information Week January 2nd, 2012
                                      "We'll see more mobile options and embedded analytics, of course, but surprises will include growth in financial apps and big-data insights.

                                      Some of the trends we'll see in cloud-based enterprise applications in 2013 are obvious, while some might surprise. Here's my take on five trends to expect in the new year, along with examples and advice on how to ride each wave..."

                                      5 Cloud App Trends To Expect In 2013
                                      Information Week January 2nd, 2012
                                      "We'll see more mobile options and embedded analytics, of course, but surprises will include growth in financial apps and big-data insights.

                                      Some of the trends we'll see in cloud-based enterprise applications in 2013 are obvious, while some might surprise. Here's my take on five trends to expect in the new year, along with examples and advice on how to ride each wave..."

                                      5 Cloud App Trends To Expect In 2013
                                      Information Week January 2nd, 2012
                                      "We'll see more mobile options and embedded analytics, of course, but surprises will include growth in financial apps and big-data insights.

                                      Some of the trends we'll see in cloud-based enterprise applications in 2013 are obvious, while some might surprise. Here's my take on five trends to expect in the new year, along with examples and advice on how to ride each wave..."

                                      More Cloud Means More Worries For Enterprise Users
                                      CSO Online January 4th, 2013
                                      "The enterprise's reliance on the cloud is expected to increase in the coming years. And most CIOs, seeing that trend, are trying to determine--if they haven't already--whether it's a good idea to follow it and move some services to the Web.

                                      In a new study from identity-management company SailPoint, the cloud's importance is by no means being discounted. However, SailPoint found in its survey of 400 IT and business leaders at organizations across the U.S. and U.K. that while cloud reliance is important to many firms, risk related to the cloud and other trends is growing..."

                                      More Cloud Means More Worries For Enterprise Users
                                      CSO Online January 4th, 2013
                                      "The enterprise's reliance on the cloud is expected to increase in the coming years. And most CIOs, seeing that trend, are trying to determine--if they haven't already--whether it's a good idea to follow it and move some services to the Web.

                                      In a new study from identity-management company SailPoint, the cloud's importance is by no means being discounted. However, SailPoint found in its survey of 400 IT and business leaders at organizations across the U.S. and U.K. that while cloud reliance is important to many firms, risk related to the cloud and other trends is growing..."

                                      More Cloud Means More Worries For Enterprise Users
                                      CSO Online January 4th, 2013
                                      "The enterprise's reliance on the cloud is expected to increase in the coming years. And most CIOs, seeing that trend, are trying to determine--if they haven't already--whether it's a good idea to follow it and move some services to the Web.

                                      In a new study from identity-management company SailPoint, the cloud's importance is by no means being discounted. However, SailPoint found in its survey of 400 IT and business leaders at organizations across the U.S. and U.K. that while cloud reliance is important to many firms, risk related to the cloud and other trends is growing..."

                                      Amazon's Dec. 24th Outage: A Closer Look
                                      Information Week January 4th, 2012
                                      "On Christmas Eve, Amazon Web services experienced an outage at its Northern Virginia data center. In a prompt follow up, it issued an explanation on Dec. 29, apologized to customers and said it wouldn't happen again. It was the fourth outage of the year in its most heavily trafficked data center complex.

                                      Explanations in the press of what happened, based on the Dec. 29 statement, were relatively brief. The Wall Street Journal, for example, stated that Amazon spokesmen blamed the outage "on a developer who accidentally deleted some key data ...

                                      Amazon said the disruption affected its Elastic Load Balancing Service, which distributes incoming data from applications to be handled by different computing hardware."

                                      Amazon's Dec. 24th Outage: A Closer Look
                                      Information Week January 4th, 2012
                                      "On Christmas Eve, Amazon Web services experienced an outage at its Northern Virginia data center. In a prompt follow up, it issued an explanation on Dec. 29, apologized to customers and said it wouldn't happen again. It was the fourth outage of the year in its most heavily trafficked data center complex.

                                      Explanations in the press of what happened, based on the Dec. 29 statement, were relatively brief. The Wall Street Journal, for example, stated that Amazon spokesmen blamed the outage "on a developer who accidentally deleted some key data ...

                                      Amazon said the disruption affected its Elastic Load Balancing Service, which distributes incoming data from applications to be handled by different computing hardware."

                                      Amazon's Dec. 24th Outage: A Closer Look
                                      Information Week January 4th, 2012
                                      "On Christmas Eve, Amazon Web services experienced an outage at its Northern Virginia data center. In a prompt follow up, it issued an explanation on Dec. 29, apologized to customers and said it wouldn't happen again. It was the fourth outage of the year in its most heavily trafficked data center complex.

                                      Explanations in the press of what happened, based on the Dec. 29 statement, were relatively brief. The Wall Street Journal, for example, stated that Amazon spokesmen blamed the outage "on a developer who accidentally deleted some key data ...

                                      Amazon said the disruption affected its Elastic Load Balancing Service, which distributes incoming data from applications to be handled by different computing hardware."

                                      IT - DR
                                      x
                                      Data Loss, Outages and Disaster Recovery
                                      CIO Insight January 3rd, 2013
                                      "When it comes to IT priorities, much of the day-to-day focus is on the cloud, productivity, and lately, mobility. Security is a large concern, but it’s typically viewed as a secondary concern after a particular technology or solution is introduced into the company. For many IT professionals, trying to keep every project on target, and determining exactly what’s needed next or when, is a chore. And keeping the company’s assets securing during that process is a daily challenge.

                                      Unfortunately, the idea of suffering a natural or human-made disaster and being able to quickly recover from it is often overlooked by companies. In fact, a new study conducted by IDG Research and FalconStor Software explores the issue of disaster recovery and finds the efforts of many companies to be inadequate. For instance, most of the respondents say their disaster recovery plans are tested only once a year. Nearly 200 qualified respondents participated in the survey...:

                                      Data Loss, Outages and Disaster Recovery
                                      CIO Insight January 3rd, 2013
                                      "When it comes to IT priorities, much of the day-to-day focus is on the cloud, productivity, and lately, mobility. Security is a large concern, but it’s typically viewed as a secondary concern after a particular technology or solution is introduced into the company. For many IT professionals, trying to keep every project on target, and determining exactly what’s needed next or when, is a chore. And keeping the company’s assets securing during that process is a daily challenge.

                                      Unfortunately, the idea of suffering a natural or human-made disaster and being able to quickly recover from it is often overlooked by companies. In fact, a new study conducted by IDG Research and FalconStor Software explores the issue of disaster recovery and finds the efforts of many companies to be inadequate. For instance, most of the respondents say their disaster recovery plans are tested only once a year. Nearly 200 qualified respondents participated in the survey...:

                                      Data Loss, Outages and Disaster Recovery
                                      CIO Insight January 3rd, 2013
                                      "When it comes to IT priorities, much of the day-to-day focus is on the cloud, productivity, and lately, mobility. Security is a large concern, but it’s typically viewed as a secondary concern after a particular technology or solution is introduced into the company. For many IT professionals, trying to keep every project on target, and determining exactly what’s needed next or when, is a chore. And keeping the company’s assets securing during that process is a daily challenge.

                                      Unfortunately, the idea of suffering a natural or human-made disaster and being able to quickly recover from it is often overlooked by companies. In fact, a new study conducted by IDG Research and FalconStor Software explores the issue of disaster recovery and finds the efforts of many companies to be inadequate. For instance, most of the respondents say their disaster recovery plans are tested only once a year. Nearly 200 qualified respondents participated in the survey...:

                                      Minimize & Prepare For Data Recovery Failures
                                      Processor December 28th, 2012
                                      "For a data center, data loss can either be a minor inconvenience or a large-scale catastrophe. That’s why it’s important to have backup solutions and a data recovery system in place. You may think you’re fully protected by simply having these solutions in your data center, but what if one or more of them were to fail? In order to avoid a worst case scenario, you need to have a plan ready to go, monitor your recovery solutions at all times, and know what you’ll do if you need someone to manually recover your data..."
                                        Minimize & Prepare For Data Recovery Failures
                                        Processor December 28th, 2012
                                        "For a data center, data loss can either be a minor inconvenience or a large-scale catastrophe. That’s why it’s important to have backup solutions and a data recovery system in place. You may think you’re fully protected by simply having these solutions in your data center, but what if one or more of them were to fail? In order to avoid a worst case scenario, you need to have a plan ready to go, monitor your recovery solutions at all times, and know what you’ll do if you need someone to manually recover your data..."
                                          Minimize & Prepare For Data Recovery Failures
                                          Processor December 28th, 2012
                                          "For a data center, data loss can either be a minor inconvenience or a large-scale catastrophe. That’s why it’s important to have backup solutions and a data recovery system in place. You may think you’re fully protected by simply having these solutions in your data center, but what if one or more of them were to fail? In order to avoid a worst case scenario, you need to have a plan ready to go, monitor your recovery solutions at all times, and know what you’ll do if you need someone to manually recover your data..."
                                            Do You Understand Business Continuity Planning?
                                            CIO Insight January 3rd, 2013
                                            "Despite what many CIOs think, business continuity planning isn’t the same as disaster recovery.

                                            One of my responsibilities at the United States Tennis Association over the past few years has been to develop and test the organization’s business continuity plan (BCP). After researching this topic and discussing it with many of my peers I am fascinated to learn how few people understand what this process is really all about!

                                            Most CIOs that I’ve spoken with confuse two important but very different things. The first is disaster recovery (DR). When I speak with most CIOs about business continuity planning what they usually talk to me about is DR. While both are important, they are very different things..."

                                            Do You Understand Business Continuity Planning?
                                            CIO Insight January 3rd, 2013
                                            "Despite what many CIOs think, business continuity planning isn’t the same as disaster recovery.

                                            One of my responsibilities at the United States Tennis Association over the past few years has been to develop and test the organization’s business continuity plan (BCP). After researching this topic and discussing it with many of my peers I am fascinated to learn how few people understand what this process is really all about!

                                            Most CIOs that I’ve spoken with confuse two important but very different things. The first is disaster recovery (DR). When I speak with most CIOs about business continuity planning what they usually talk to me about is DR. While both are important, they are very different things..."

                                            Do You Understand Business Continuity Planning?
                                            CIO Insight January 3rd, 2013
                                            "Despite what many CIOs think, business continuity planning isn’t the same as disaster recovery.

                                            One of my responsibilities at the United States Tennis Association over the past few years has been to develop and test the organization’s business continuity plan (BCP). After researching this topic and discussing it with many of my peers I am fascinated to learn how few people understand what this process is really all about!

                                            Most CIOs that I’ve spoken with confuse two important but very different things. The first is disaster recovery (DR). When I speak with most CIOs about business continuity planning what they usually talk to me about is DR. While both are important, they are very different things..."

                                            IT - Networks
                                            x
                                            A Short History of NFC
                                            IT World December 19th, 2012
                                            "Near Field Communication (NFC) is a short-range wireless communication technology that can be used to pay for retail transactions and other digital exchanges.

                                            NFC is already appearing in many smartphones and some tablets, and has been widely deployed for years in Japan and South Korea for tasks including transit rides and small retail purchases. Early NFC trials for purchases are underway in Europe, India and the U.S..."

                                              A Short History of NFC
                                              IT World December 19th, 2012
                                              "Near Field Communication (NFC) is a short-range wireless communication technology that can be used to pay for retail transactions and other digital exchanges.

                                              NFC is already appearing in many smartphones and some tablets, and has been widely deployed for years in Japan and South Korea for tasks including transit rides and small retail purchases. Early NFC trials for purchases are underway in Europe, India and the U.S..."

                                                A Short History of NFC
                                                IT World December 19th, 2012
                                                "Near Field Communication (NFC) is a short-range wireless communication technology that can be used to pay for retail transactions and other digital exchanges.

                                                NFC is already appearing in many smartphones and some tablets, and has been widely deployed for years in Japan and South Korea for tasks including transit rides and small retail purchases. Early NFC trials for purchases are underway in Europe, India and the U.S..."

                                                  NFC Is Catching On -- Just Not for Payments Quite Yet
                                                  IT World December 19, 2012
                                                  "Near Field Communication (NFC) is steadily making headway in the U.S. for sharing data and music among smartphones, but the technology faces years of slow growth as a replacement for physical wallets.

                                                  NFC will take a minimum of three more years to grab hold as a technology that enables so-called mobile wallets as a replacement for credit cards and cash in the U.S., according to a consensus of five analysts. And by "grab hold," these analysts mean being used by only 10% of mobile phone users to make digital purchases.

                                                  Gartner analyst Avivah Litan predicts that NFC payments will hit the 10% threshold in 2015, compared to the process of SMS (texting) payments that is expected to represent 50% of mobile payment volume globally in that same year..."

                                                  NFC Is Catching On -- Just Not for Payments Quite Yet
                                                  IT World December 19, 2012
                                                  "Near Field Communication (NFC) is steadily making headway in the U.S. for sharing data and music among smartphones, but the technology faces years of slow growth as a replacement for physical wallets.

                                                  NFC will take a minimum of three more years to grab hold as a technology that enables so-called mobile wallets as a replacement for credit cards and cash in the U.S., according to a consensus of five analysts. And by "grab hold," these analysts mean being used by only 10% of mobile phone users to make digital purchases.

                                                  Gartner analyst Avivah Litan predicts that NFC payments will hit the 10% threshold in 2015, compared to the process of SMS (texting) payments that is expected to represent 50% of mobile payment volume globally in that same year..."

                                                  NFC Is Catching On -- Just Not for Payments Quite Yet
                                                  IT World December 19, 2012
                                                  "Near Field Communication (NFC) is steadily making headway in the U.S. for sharing data and music among smartphones, but the technology faces years of slow growth as a replacement for physical wallets.

                                                  NFC will take a minimum of three more years to grab hold as a technology that enables so-called mobile wallets as a replacement for credit cards and cash in the U.S., according to a consensus of five analysts. And by "grab hold," these analysts mean being used by only 10% of mobile phone users to make digital purchases.

                                                  Gartner analyst Avivah Litan predicts that NFC payments will hit the 10% threshold in 2015, compared to the process of SMS (texting) payments that is expected to represent 50% of mobile payment volume globally in that same year..."

                                                  IT - Operations
                                                  x
                                                  How IT Departments Can Prepare for a Software License Audit
                                                  HR solution journal December 7th, 2012
                                                  "As revenue for new software licenses is down, software vendors are focusing more on licensing audits to recover some of that lost income. Here's a look at some of the steps a corporate IT organization can take before the auditors arrive to maintain compliance and limit potential damage..."
                                                    How IT Departments Can Prepare for a Software License Audit
                                                    HR solution journal December 7th, 2012
                                                    "As revenue for new software licenses is down, software vendors are focusing more on licensing audits to recover some of that lost income. Here's a look at some of the steps a corporate IT organization can take before the auditors arrive to maintain compliance and limit potential damage..."
                                                      How IT Departments Can Prepare for a Software License Audit
                                                      HR solution journal December 7th, 2012
                                                      "As revenue for new software licenses is down, software vendors are focusing more on licensing audits to recover some of that lost income. Here's a look at some of the steps a corporate IT organization can take before the auditors arrive to maintain compliance and limit potential damage..."
                                                        Move a Data Center
                                                        Processor December 28th, 2012
                                                        "Moving a data center can be a stressful process. Not only do you have to manage a large-scale shift of equipment and software to a new location, you also have to make sure you aren't impacting the productivity of employees at your current facility. And once everything arrives at the location, the installation and implementation of solutions is a seemingly insurmountable task in its own right..."
                                                          Move a Data Center
                                                          Processor December 28th, 2012
                                                          "Moving a data center can be a stressful process. Not only do you have to manage a large-scale shift of equipment and software to a new location, you also have to make sure you aren't impacting the productivity of employees at your current facility. And once everything arrives at the location, the installation and implementation of solutions is a seemingly insurmountable task in its own right..."
                                                            Move a Data Center
                                                            Processor December 28th, 2012
                                                            "Moving a data center can be a stressful process. Not only do you have to manage a large-scale shift of equipment and software to a new location, you also have to make sure you aren't impacting the productivity of employees at your current facility. And once everything arrives at the location, the installation and implementation of solutions is a seemingly insurmountable task in its own right..."
                                                              IT Shifts From Owning To Outsourcing Data Center Space
                                                              ComputerWorld December 24th, 2012
                                                              "There is increasing demand for data center space in multi-tenant facilities driven by a number of trends, according to a new report.

                                                              In the top 20 markets in the U.S., which include Northern Virginia, New York, Boston, Seattle and Silicon Valley, there is a total of 22.1 million square feet of data center operational space, according to 451 Research. Operational space is revenue-producing space in a data center.

                                                              The amount of data center space is growing, on average, about 9% a year, the market research firm said..."

                                                              IT Shifts From Owning To Outsourcing Data Center Space
                                                              ComputerWorld December 24th, 2012
                                                              "There is increasing demand for data center space in multi-tenant facilities driven by a number of trends, according to a new report.

                                                              In the top 20 markets in the U.S., which include Northern Virginia, New York, Boston, Seattle and Silicon Valley, there is a total of 22.1 million square feet of data center operational space, according to 451 Research. Operational space is revenue-producing space in a data center.

                                                              The amount of data center space is growing, on average, about 9% a year, the market research firm said..."

                                                              IT Shifts From Owning To Outsourcing Data Center Space
                                                              ComputerWorld December 24th, 2012
                                                              "There is increasing demand for data center space in multi-tenant facilities driven by a number of trends, according to a new report.

                                                              In the top 20 markets in the U.S., which include Northern Virginia, New York, Boston, Seattle and Silicon Valley, there is a total of 22.1 million square feet of data center operational space, according to 451 Research. Operational space is revenue-producing space in a data center.

                                                              The amount of data center space is growing, on average, about 9% a year, the market research firm said..."

                                                              IT - Security
                                                              x
                                                              What DDoS Attacks Reveal About Your Security Infrastructure
                                                              HelpNet Security December 31st, 2012
                                                              "As we close out 2012, there is no doubt that this year will go down as epic in the history books of information security professionals. Looking back on the year it’s not hard to find a laundry list of security programs that have been overrun by nefarious perpetrators or to see how dramatically different the risk landscape is today than just a year ago. Taking stock of it all, the following are some of the most notable attacks:..."
                                                              What DDoS Attacks Reveal About Your Security Infrastructure
                                                              HelpNet Security December 31st, 2012
                                                              "As we close out 2012, there is no doubt that this year will go down as epic in the history books of information security professionals. Looking back on the year it’s not hard to find a laundry list of security programs that have been overrun by nefarious perpetrators or to see how dramatically different the risk landscape is today than just a year ago. Taking stock of it all, the following are some of the most notable attacks:..."
                                                              What DDoS Attacks Reveal About Your Security Infrastructure
                                                              HelpNet Security December 31st, 2012
                                                              "As we close out 2012, there is no doubt that this year will go down as epic in the history books of information security professionals. Looking back on the year it’s not hard to find a laundry list of security programs that have been overrun by nefarious perpetrators or to see how dramatically different the risk landscape is today than just a year ago. Taking stock of it all, the following are some of the most notable attacks:..."
                                                              Postal Service Pilots Next-Gen Authentication Tech
                                                              Information Week January 4th
                                                              "The U.S. Postal Service will be the guinea pig for a White House-led effort to accelerate government adoption of technologies that allow federal agencies to accept third-party identity credentials for online services. The program involves using services from organizations like PayPal and Google through standards like OpenID rather than requiring users to create government usernames and passwords..."
                                                              Postal Service Pilots Next-Gen Authentication Tech
                                                              Information Week January 4th
                                                              "The U.S. Postal Service will be the guinea pig for a White House-led effort to accelerate government adoption of technologies that allow federal agencies to accept third-party identity credentials for online services. The program involves using services from organizations like PayPal and Google through standards like OpenID rather than requiring users to create government usernames and passwords..."
                                                              Postal Service Pilots Next-Gen Authentication Tech
                                                              Information Week January 4th
                                                              "The U.S. Postal Service will be the guinea pig for a White House-led effort to accelerate government adoption of technologies that allow federal agencies to accept third-party identity credentials for online services. The program involves using services from organizations like PayPal and Google through standards like OpenID rather than requiring users to create government usernames and passwords..."
                                                              7 Top Information Security Trends for 2013
                                                              InformationWeek December 31st, 2012
                                                              "What's in store for security in 2013?

                                                              On the information security front, 2012 was notable in numerous ways: for Muslim hacktivists launching distributed denial-of-service (DDoS) attacks against U.S. banks, the FBI busting alleged LulzSec and Anonymous leaders, eccentric antivirus founder John McAfee's flight from justice, the apparent data security missteps of the former director of the CIA, as well as a nonstop stream of website hacks, defacements, and data breaches..."

                                                              7 Top Information Security Trends for 2013
                                                              InformationWeek December 31st, 2012
                                                              "What's in store for security in 2013?

                                                              On the information security front, 2012 was notable in numerous ways: for Muslim hacktivists launching distributed denial-of-service (DDoS) attacks against U.S. banks, the FBI busting alleged LulzSec and Anonymous leaders, eccentric antivirus founder John McAfee's flight from justice, the apparent data security missteps of the former director of the CIA, as well as a nonstop stream of website hacks, defacements, and data breaches..."

                                                              7 Top Information Security Trends for 2013
                                                              InformationWeek December 31st, 2012
                                                              "What's in store for security in 2013?

                                                              On the information security front, 2012 was notable in numerous ways: for Muslim hacktivists launching distributed denial-of-service (DDoS) attacks against U.S. banks, the FBI busting alleged LulzSec and Anonymous leaders, eccentric antivirus founder John McAfee's flight from justice, the apparent data security missteps of the former director of the CIA, as well as a nonstop stream of website hacks, defacements, and data breaches..."

                                                              How To Talk Security So People Will Listen (And Comply!)
                                                              ComputerWorld January 3rd, 2013
                                                              "The statistics are staggering: Last year, Symantec blocked a total of over 5.5 billion malware attacks, an 81% increase over 2010, and reported a 35% increase in Web-based attacks and a 41% increase in new variants of malware.

                                                              If those findings, documented in the company's latest annual Internet Security Threat Report, cause IT leaders to wonder if they've done everything possible to protect their companies, they might consider looking in the mirror.

                                                              That's because security folks, in struggling to establish policies and procedures that are both effective and easy to use, often forget a third and crucial step, experts say: Communicating their security goals in such a way that the broad corporate population not only understands but responds..."

                                                              How To Talk Security So People Will Listen (And Comply!)
                                                              ComputerWorld January 3rd, 2013
                                                              "The statistics are staggering: Last year, Symantec blocked a total of over 5.5 billion malware attacks, an 81% increase over 2010, and reported a 35% increase in Web-based attacks and a 41% increase in new variants of malware.

                                                              If those findings, documented in the company's latest annual Internet Security Threat Report, cause IT leaders to wonder if they've done everything possible to protect their companies, they might consider looking in the mirror.

                                                              That's because security folks, in struggling to establish policies and procedures that are both effective and easy to use, often forget a third and crucial step, experts say: Communicating their security goals in such a way that the broad corporate population not only understands but responds..."

                                                              How To Talk Security So People Will Listen (And Comply!)
                                                              ComputerWorld January 3rd, 2013
                                                              "The statistics are staggering: Last year, Symantec blocked a total of over 5.5 billion malware attacks, an 81% increase over 2010, and reported a 35% increase in Web-based attacks and a 41% increase in new variants of malware.

                                                              If those findings, documented in the company's latest annual Internet Security Threat Report, cause IT leaders to wonder if they've done everything possible to protect their companies, they might consider looking in the mirror.

                                                              That's because security folks, in struggling to establish policies and procedures that are both effective and easy to use, often forget a third and crucial step, experts say: Communicating their security goals in such a way that the broad corporate population not only understands but responds..."

                                                              Mr. Mitnick, I Presume? Africa's Coming Cyber Crime Epidemic
                                                              IT World December 27th, 2013
                                                              "For much of the past quarter century, computer crime has been a decidedly First World problem. But that's about to change, security experts say...

                                                              Africa has one of the world's fastest growing middle classes. And, with that growing prosperity comes a growing reliance on technology and the Internet. The result: developing nations, including those in Africa, are set to experience an explosion in cyber crime, as more and more of their citizens connect to the Internet and the web using smart phones high capacity 3G and 4G cellular networks, according to numerous reports from public and private research groups..."

                                                              Mr. Mitnick, I Presume? Africa's Coming Cyber Crime Epidemic
                                                              IT World December 27th, 2013
                                                              "For much of the past quarter century, computer crime has been a decidedly First World problem. But that's about to change, security experts say...

                                                              Africa has one of the world's fastest growing middle classes. And, with that growing prosperity comes a growing reliance on technology and the Internet. The result: developing nations, including those in Africa, are set to experience an explosion in cyber crime, as more and more of their citizens connect to the Internet and the web using smart phones high capacity 3G and 4G cellular networks, according to numerous reports from public and private research groups..."

                                                              Mr. Mitnick, I Presume? Africa's Coming Cyber Crime Epidemic
                                                              IT World December 27th, 2013
                                                              "For much of the past quarter century, computer crime has been a decidedly First World problem. But that's about to change, security experts say...

                                                              Africa has one of the world's fastest growing middle classes. And, with that growing prosperity comes a growing reliance on technology and the Internet. The result: developing nations, including those in Africa, are set to experience an explosion in cyber crime, as more and more of their citizens connect to the Internet and the web using smart phones high capacity 3G and 4G cellular networks, according to numerous reports from public and private research groups..."

                                                              Why Hire a Hacker?
                                                              HelpNet Security January 2nd, 2013
                                                              "I'm not advocating the hiring of computer criminals. If you are being held to ransom by someone claiming to have control of your infrastructure, and demanding payment to prevent further damage or exposure, then you need to contact the relevant authorities.

                                                              However, if you want to prevent criminals from hijacking your systems then perhaps a hacker is exactly the person you need for the job. At AlienVault, we pride ourselves in working with hackers and having them as part of our team..."

                                                              Why Hire a Hacker?
                                                              HelpNet Security January 2nd, 2013
                                                              "I'm not advocating the hiring of computer criminals. If you are being held to ransom by someone claiming to have control of your infrastructure, and demanding payment to prevent further damage or exposure, then you need to contact the relevant authorities.

                                                              However, if you want to prevent criminals from hijacking your systems then perhaps a hacker is exactly the person you need for the job. At AlienVault, we pride ourselves in working with hackers and having them as part of our team..."

                                                              Why Hire a Hacker?
                                                              HelpNet Security January 2nd, 2013
                                                              "I'm not advocating the hiring of computer criminals. If you are being held to ransom by someone claiming to have control of your infrastructure, and demanding payment to prevent further damage or exposure, then you need to contact the relevant authorities.

                                                              However, if you want to prevent criminals from hijacking your systems then perhaps a hacker is exactly the person you need for the job. At AlienVault, we pride ourselves in working with hackers and having them as part of our team..."

                                                              IT - Careers
                                                              x
                                                              10 Signs That You Aren't Cut Out for IT
                                                              TechRepublic December 20th, 2012
                                                              "It's a tough world out there. Anyone who’s ever worked in IT knows just how tough it is. And if you’re not totally up for the challenge, there will always be someone else who is. But for anyone considering getting into the world of IT, or for those considering getting out of IT… how do you know? How do you know whether you are really cut out for the career that chews up and spits out its young? Well, I have a handy list of signs that maybe IT isn't the best fit for you."
                                                                10 Signs That You Aren't Cut Out for IT
                                                                TechRepublic December 20th, 2012
                                                                "It's a tough world out there. Anyone who’s ever worked in IT knows just how tough it is. And if you’re not totally up for the challenge, there will always be someone else who is. But for anyone considering getting into the world of IT, or for those considering getting out of IT… how do you know? How do you know whether you are really cut out for the career that chews up and spits out its young? Well, I have a handy list of signs that maybe IT isn't the best fit for you."
                                                                  10 Signs That You Aren't Cut Out for IT
                                                                  TechRepublic December 20th, 2012
                                                                  "It's a tough world out there. Anyone who’s ever worked in IT knows just how tough it is. And if you’re not totally up for the challenge, there will always be someone else who is. But for anyone considering getting into the world of IT, or for those considering getting out of IT… how do you know? How do you know whether you are really cut out for the career that chews up and spits out its young? Well, I have a handy list of signs that maybe IT isn't the best fit for you."
                                                                    Well, I Guess THEY Were Wrong! Ten False Predictions
                                                                    Accelerating IT Success December 30th, 2012
                                                                    "Before looking at all the great predictions and announcements people are going to make about 2013, why not take a look back at a few predictions people have made in the past – predictions that have turned out to be incredibly wrong. From disbelief at computers to outrage at the suggestion of space travel, this list of some of the biggest prediction blunders is sure to put a smile on your face ( and let you take the predictions for 2013 with a grain of salt)..."
                                                                      Well, I Guess THEY Were Wrong! Ten False Predictions
                                                                      Accelerating IT Success December 30th, 2012
                                                                      "Before looking at all the great predictions and announcements people are going to make about 2013, why not take a look back at a few predictions people have made in the past – predictions that have turned out to be incredibly wrong. From disbelief at computers to outrage at the suggestion of space travel, this list of some of the biggest prediction blunders is sure to put a smile on your face ( and let you take the predictions for 2013 with a grain of salt)..."
                                                                        Well, I Guess THEY Were Wrong! Ten False Predictions
                                                                        Accelerating IT Success December 30th, 2012
                                                                        "Before looking at all the great predictions and announcements people are going to make about 2013, why not take a look back at a few predictions people have made in the past – predictions that have turned out to be incredibly wrong. From disbelief at computers to outrage at the suggestion of space travel, this list of some of the biggest prediction blunders is sure to put a smile on your face ( and let you take the predictions for 2013 with a grain of salt)..."
                                                                          9 IT Career Resolutions for 2013
                                                                          CIO December 26th
                                                                          "The New Year is almost here. 2012 proved to be a tumultuous year for IT pros and 2013 is looking to be just as challenging. However, the IT job market has been slowly gaining strength and as more companies start growing and adding staff, employees who have been waiting for this turnaround are getting ready to spring into action.

                                                                          Even if you are happy with your current IT job or role, there is a chance you might find yourself looking for a new position this year due to downsizing, outsourcing or reorganization..."

                                                                          9 IT Career Resolutions for 2013
                                                                          CIO December 26th
                                                                          "The New Year is almost here. 2012 proved to be a tumultuous year for IT pros and 2013 is looking to be just as challenging. However, the IT job market has been slowly gaining strength and as more companies start growing and adding staff, employees who have been waiting for this turnaround are getting ready to spring into action.

                                                                          Even if you are happy with your current IT job or role, there is a chance you might find yourself looking for a new position this year due to downsizing, outsourcing or reorganization..."

                                                                          9 IT Career Resolutions for 2013
                                                                          CIO December 26th
                                                                          "The New Year is almost here. 2012 proved to be a tumultuous year for IT pros and 2013 is looking to be just as challenging. However, the IT job market has been slowly gaining strength and as more companies start growing and adding staff, employees who have been waiting for this turnaround are getting ready to spring into action.

                                                                          Even if you are happy with your current IT job or role, there is a chance you might find yourself looking for a new position this year due to downsizing, outsourcing or reorganization..."

                                                                          IT Hiring Market Heats Up for 2013
                                                                          ComputerWorld December 31st, 2012
                                                                          "IT professionals may find themselves sitting in the driver's seat when it comes to the job market. The vast majority of hiring managers say they expect to increase tech staffing over the next six months, with many indicating that the increase in available positions will be "substantial," according to a recent survey report from Dice. That said, it's taking longer to fill jobs, due to continued challenges in finding the right candidates. Maybe that's why those receiving offers are leveraging their opportunity, often asking for more money and/or counter-offering the initial proposal. Overall, Dice reports that IT workers should interpret the results with what it calls "tempered optimism." Says Alice Hill, managing director of Dice.com..."
                                                                            IT Hiring Market Heats Up for 2013
                                                                            ComputerWorld December 31st, 2012
                                                                            "IT professionals may find themselves sitting in the driver's seat when it comes to the job market. The vast majority of hiring managers say they expect to increase tech staffing over the next six months, with many indicating that the increase in available positions will be "substantial," according to a recent survey report from Dice. That said, it's taking longer to fill jobs, due to continued challenges in finding the right candidates. Maybe that's why those receiving offers are leveraging their opportunity, often asking for more money and/or counter-offering the initial proposal. Overall, Dice reports that IT workers should interpret the results with what it calls "tempered optimism." Says Alice Hill, managing director of Dice.com..."
                                                                              IT Hiring Market Heats Up for 2013
                                                                              ComputerWorld December 31st, 2012
                                                                              "IT professionals may find themselves sitting in the driver's seat when it comes to the job market. The vast majority of hiring managers say they expect to increase tech staffing over the next six months, with many indicating that the increase in available positions will be "substantial," according to a recent survey report from Dice. That said, it's taking longer to fill jobs, due to continued challenges in finding the right candidates. Maybe that's why those receiving offers are leveraging their opportunity, often asking for more money and/or counter-offering the initial proposal. Overall, Dice reports that IT workers should interpret the results with what it calls "tempered optimism." Says Alice Hill, managing director of Dice.com..."
                                                                                IT - Social Media
                                                                                x
                                                                                Some CEOs Disregard Social-Media Reputation
                                                                                CIO Insight December 31st 2012
                                                                                "Are your organization's executives providing little more than lip service to social media? Prior surveys presented here have indicated that high-performing companies take a pro-active approach to the monitoring, analyzing and responding of the comments of social media users. Still, a surprising number of CEOs aren't considering social-media reputation in making decisions, and some still simply ignore critical posts, according to a recent survey from Zeno Group.."
                                                                                Some CEOs Disregard Social-Media Reputation
                                                                                CIO Insight December 31st 2012
                                                                                "Are your organization's executives providing little more than lip service to social media? Prior surveys presented here have indicated that high-performing companies take a pro-active approach to the monitoring, analyzing and responding of the comments of social media users. Still, a surprising number of CEOs aren't considering social-media reputation in making decisions, and some still simply ignore critical posts, according to a recent survey from Zeno Group.."
                                                                                Some CEOs Disregard Social-Media Reputation
                                                                                CIO Insight December 31st 2012
                                                                                "Are your organization's executives providing little more than lip service to social media? Prior surveys presented here have indicated that high-performing companies take a pro-active approach to the monitoring, analyzing and responding of the comments of social media users. Still, a surprising number of CEOs aren't considering social-media reputation in making decisions, and some still simply ignore critical posts, according to a recent survey from Zeno Group.."
                                                                                IT - Mobile
                                                                                x
                                                                                7 Enterprise Mobility Predictions For 2013
                                                                                InformationWeek January 3rd, 2013
                                                                                "Smartphones and tablets fueled the rise of BYOD in 2012, but better management of those devices is top of mind in 2013...

                                                                                The proliferation of user-owned smartphones and tablets across the workplace isn't going to stop, so it's likely BYOD-related terms will continue to pepper the IT lexicon a year from now. Many of the practices and technologies that surround these devices are primed for a shake-up, however. What will 2013 mean to enterprise mobility strategies? We break down seven trends to watch in the new year..."

                                                                                7 Enterprise Mobility Predictions For 2013
                                                                                InformationWeek January 3rd, 2013
                                                                                "Smartphones and tablets fueled the rise of BYOD in 2012, but better management of those devices is top of mind in 2013...

                                                                                The proliferation of user-owned smartphones and tablets across the workplace isn't going to stop, so it's likely BYOD-related terms will continue to pepper the IT lexicon a year from now. Many of the practices and technologies that surround these devices are primed for a shake-up, however. What will 2013 mean to enterprise mobility strategies? We break down seven trends to watch in the new year..."

                                                                                7 Enterprise Mobility Predictions For 2013
                                                                                InformationWeek January 3rd, 2013
                                                                                "Smartphones and tablets fueled the rise of BYOD in 2012, but better management of those devices is top of mind in 2013...

                                                                                The proliferation of user-owned smartphones and tablets across the workplace isn't going to stop, so it's likely BYOD-related terms will continue to pepper the IT lexicon a year from now. Many of the practices and technologies that surround these devices are primed for a shake-up, however. What will 2013 mean to enterprise mobility strategies? We break down seven trends to watch in the new year..."

                                                                                Cloud Exploits and Mobile Device Attacks on the Horizon
                                                                                HelpNet Security December 20th, 2012
                                                                                "Although many security experts predict that the most likely data breach threats organizations will face in 2013 include cloud exploits, mobile device attacks and all-out cyber war, "Verizon Data Breach Investigations Report" researchers have reached a far different conclusion: the most likely threats involve authentication attacks and failures, continued espionage and "hacktivism" attacks, Web application exploits and social engineering..."
                                                                                Cloud Exploits and Mobile Device Attacks on the Horizon
                                                                                HelpNet Security December 20th, 2012
                                                                                "Although many security experts predict that the most likely data breach threats organizations will face in 2013 include cloud exploits, mobile device attacks and all-out cyber war, "Verizon Data Breach Investigations Report" researchers have reached a far different conclusion: the most likely threats involve authentication attacks and failures, continued espionage and "hacktivism" attacks, Web application exploits and social engineering..."
                                                                                Cloud Exploits and Mobile Device Attacks on the Horizon
                                                                                HelpNet Security December 20th, 2012
                                                                                "Although many security experts predict that the most likely data breach threats organizations will face in 2013 include cloud exploits, mobile device attacks and all-out cyber war, "Verizon Data Breach Investigations Report" researchers have reached a far different conclusion: the most likely threats involve authentication attacks and failures, continued espionage and "hacktivism" attacks, Web application exploits and social engineering..."
                                                                                IT - Big Data
                                                                                x
                                                                                5 Big Data Predictions for 2013
                                                                                InformationWeek December 31st, 2012
                                                                                "What will 2013 bring for big data vendors and users? Hey, your guess is as good as ours. But 'tis the season for pugnacious prognosticators to don their soothsayer caps, and it seems some companies have a predilection for prophecy, or something like that.

                                                                                Anyway, we've compiled a prediction-palooza of five 2013 big data projections that have come our way in the past week or so. What do you think? Are these shrewd speculations, obvious observations, or foolish forecasts?..."

                                                                                5 Big Data Predictions for 2013
                                                                                InformationWeek December 31st, 2012
                                                                                "What will 2013 bring for big data vendors and users? Hey, your guess is as good as ours. But 'tis the season for pugnacious prognosticators to don their soothsayer caps, and it seems some companies have a predilection for prophecy, or something like that.

                                                                                Anyway, we've compiled a prediction-palooza of five 2013 big data projections that have come our way in the past week or so. What do you think? Are these shrewd speculations, obvious observations, or foolish forecasts?..."

                                                                                5 Big Data Predictions for 2013
                                                                                InformationWeek December 31st, 2012
                                                                                "What will 2013 bring for big data vendors and users? Hey, your guess is as good as ours. But 'tis the season for pugnacious prognosticators to don their soothsayer caps, and it seems some companies have a predilection for prophecy, or something like that.

                                                                                Anyway, we've compiled a prediction-palooza of five 2013 big data projections that have come our way in the past week or so. What do you think? Are these shrewd speculations, obvious observations, or foolish forecasts?..."

                                                                                Stay Tuned: Big Data's Big Hits are Coming
                                                                                Information Management December 29th, 2012
                                                                                "Let's imagine that big data can be compared to TV. This may sound far-fetched, but it might prove to be a good analogy, and at least it will break the monotony surrounding big data.

                                                                                If we believe the many blogs, tweets and Web seminars that contemplate big data, it’s about little more than heavyweight technology. Worse yet, when authors do mention uses of big data analysis, they typically fail to distinguish such use cases from whatever we were supposed to have gained before..."

                                                                                Stay Tuned: Big Data's Big Hits are Coming
                                                                                Information Management December 29th, 2012
                                                                                "Let's imagine that big data can be compared to TV. This may sound far-fetched, but it might prove to be a good analogy, and at least it will break the monotony surrounding big data.

                                                                                If we believe the many blogs, tweets and Web seminars that contemplate big data, it’s about little more than heavyweight technology. Worse yet, when authors do mention uses of big data analysis, they typically fail to distinguish such use cases from whatever we were supposed to have gained before..."

                                                                                Stay Tuned: Big Data's Big Hits are Coming
                                                                                Information Management December 29th, 2012
                                                                                "Let's imagine that big data can be compared to TV. This may sound far-fetched, but it might prove to be a good analogy, and at least it will break the monotony surrounding big data.

                                                                                If we believe the many blogs, tweets and Web seminars that contemplate big data, it’s about little more than heavyweight technology. Worse yet, when authors do mention uses of big data analysis, they typically fail to distinguish such use cases from whatever we were supposed to have gained before..."

                                                                                Why You'll Need A Big Data Ethics Expert
                                                                                Information Week January 4th, 2012
                                                                                "Big data is a big deal for companies in 2013. The prospect of outdistancing your competition by leveraging your company's data with huge data sources such as NASA, the government, video and demographic services is compelling.

                                                                                But there's evidence that technology is advancing faster than companies and governments can manage it. Along with big data technology developers, your company should be thinking about adding a "big data ethicist."

                                                                                Why You'll Need A Big Data Ethics Expert
                                                                                Information Week January 4th, 2012
                                                                                "Big data is a big deal for companies in 2013. The prospect of outdistancing your competition by leveraging your company's data with huge data sources such as NASA, the government, video and demographic services is compelling.

                                                                                But there's evidence that technology is advancing faster than companies and governments can manage it. Along with big data technology developers, your company should be thinking about adding a "big data ethicist."

                                                                                Why You'll Need A Big Data Ethics Expert
                                                                                Information Week January 4th, 2012
                                                                                "Big data is a big deal for companies in 2013. The prospect of outdistancing your competition by leveraging your company's data with huge data sources such as NASA, the government, video and demographic services is compelling.

                                                                                But there's evidence that technology is advancing faster than companies and governments can manage it. Along with big data technology developers, your company should be thinking about adding a "big data ethicist."

                                                                                Big Data 101: New Vendor-Neutral Guide
                                                                                Information Week January 3rd, 2012
                                                                                "What exactly is big data? Explanations vary, of course, but Gartner's popular 3V model -- essentially that big data is high-volume, high-velocity, and high-variety information that requires new tools to manage -- is the most commonly quoted definition. Still, a haze of ambiguity surrounds big data, an issue that the Open Data Center Alliance (ODCA) hopes to resolve with its new "Big Data Consumer Guide," a handbook for enterprises that want to know what big data is, why it matters, and how to gain from it..."
                                                                                Big Data 101: New Vendor-Neutral Guide
                                                                                Information Week January 3rd, 2012
                                                                                "What exactly is big data? Explanations vary, of course, but Gartner's popular 3V model -- essentially that big data is high-volume, high-velocity, and high-variety information that requires new tools to manage -- is the most commonly quoted definition. Still, a haze of ambiguity surrounds big data, an issue that the Open Data Center Alliance (ODCA) hopes to resolve with its new "Big Data Consumer Guide," a handbook for enterprises that want to know what big data is, why it matters, and how to gain from it..."
                                                                                Big Data 101: New Vendor-Neutral Guide
                                                                                Information Week January 3rd, 2012
                                                                                "What exactly is big data? Explanations vary, of course, but Gartner's popular 3V model -- essentially that big data is high-volume, high-velocity, and high-variety information that requires new tools to manage -- is the most commonly quoted definition. Still, a haze of ambiguity surrounds big data, an issue that the Open Data Center Alliance (ODCA) hopes to resolve with its new "Big Data Consumer Guide," a handbook for enterprises that want to know what big data is, why it matters, and how to gain from it..."
                                                                                IT - BYOD
                                                                                x
                                                                                BYOD Era Needs Diligent Monitoring of Security Incidents
                                                                                InformationWeek December 26th, 2012
                                                                                "In an exclusive interview, Sanjay Poonen, President and Corporate Officer, Global Solutions and Head of Mobility Divisions, SAP shares how enterprises can ride the BYOD wave, while ensuring security. He also talks about the opportunities emerging in the mobility space..."
                                                                                BYOD Era Needs Diligent Monitoring of Security Incidents
                                                                                InformationWeek December 26th, 2012
                                                                                "In an exclusive interview, Sanjay Poonen, President and Corporate Officer, Global Solutions and Head of Mobility Divisions, SAP shares how enterprises can ride the BYOD wave, while ensuring security. He also talks about the opportunities emerging in the mobility space..."
                                                                                BYOD Era Needs Diligent Monitoring of Security Incidents
                                                                                InformationWeek December 26th, 2012
                                                                                "In an exclusive interview, Sanjay Poonen, President and Corporate Officer, Global Solutions and Head of Mobility Divisions, SAP shares how enterprises can ride the BYOD wave, while ensuring security. He also talks about the opportunities emerging in the mobility space..."
                                                                                Top10
                                                                                x
                                                                                Top Ten Articles for last few Issues
                                                                                Vol 178 Issue 1, 2,3 and 4 ; Vol 177 Issues 1, 2, 3 and 4
                                                                                We track how frequently each article is viewed on the web site to determine which the readers consider the most important. For last week, the top 10 articles were:

                                                                                • Oracle Exalogic vs. IBM PureApplication System: A Dramatic Comparison
                                                                                • What's up with LDoms: Part 6 - Sizing the IO Domain
                                                                                • Top 10 OTN Tech Articles for 2012
                                                                                • Cloud Reference Architecture: White Paper
                                                                                • Oracle Enterprise Manager Cloud Control 12c: Managing Data Center Chaos'
                                                                                • Libre Office: Linux Journal Best Office Suite 2012
                                                                                • Oracle Secure Global Desktop Ensures Employee Productivity During Environmental Challenge
                                                                                • Access and Analyze Big Data at Lower Cost with Oracle Big Data Appliance X3-2
                                                                                • Securing the Cloud for Public Sector: Webcast
                                                                                • Java Spotlight Episode 114: Holiday Greetings 2012

                                                                                The longer version of this article has list of top ten articles for the last 8 weeks.

                                                                                  Top Ten Articles for last few Issues
                                                                                  Vol 178 Issue 1, 2,3 and 4 ; Vol 177 Issues 1, 2, 3 and 4
                                                                                  We track how frequently each article is viewed on the web site to determine which the readers consider the most important. For last week, the top 10 articles were:

                                                                                  • Oracle Exalogic vs. IBM PureApplication System: A Dramatic Comparison
                                                                                  • What's up with LDoms: Part 6 - Sizing the IO Domain
                                                                                  • Top 10 OTN Tech Articles for 2012
                                                                                  • Cloud Reference Architecture: White Paper
                                                                                  • Oracle Enterprise Manager Cloud Control 12c: Managing Data Center Chaos'
                                                                                  • Libre Office: Linux Journal Best Office Suite 2012
                                                                                  • Oracle Secure Global Desktop Ensures Employee Productivity During Environmental Challenge
                                                                                  • Access and Analyze Big Data at Lower Cost with Oracle Big Data Appliance X3-2
                                                                                  • Securing the Cloud for Public Sector: Webcast
                                                                                  • Java Spotlight Episode 114: Holiday Greetings 2012

                                                                                  The longer version of this article has list of top ten articles for the last 8 weeks.

                                                                                    Top Ten Articles for last few Issues
                                                                                    Vol 178 Issue 1, 2,3 and 4 ; Vol 177 Issues 1, 2, 3 and 4
                                                                                    We track how frequently each article is viewed on the web site to determine which the readers consider the most important. For last week, the top 10 articles were:

                                                                                    • Oracle Exalogic vs. IBM PureApplication System: A Dramatic Comparison
                                                                                    • What's up with LDoms: Part 6 - Sizing the IO Domain
                                                                                    • Top 10 OTN Tech Articles for 2012
                                                                                    • Cloud Reference Architecture: White Paper
                                                                                    • Oracle Enterprise Manager Cloud Control 12c: Managing Data Center Chaos'
                                                                                    • Libre Office: Linux Journal Best Office Suite 2012
                                                                                    • Oracle Secure Global Desktop Ensures Employee Productivity During Environmental Challenge
                                                                                    • Access and Analyze Big Data at Lower Cost with Oracle Big Data Appliance X3-2
                                                                                    • Securing the Cloud for Public Sector: Webcast
                                                                                    • Java Spotlight Episode 114: Holiday Greetings 2012

                                                                                    The longer version of this article has list of top ten articles for the last 8 weeks.

                                                                                      IT - Tape
                                                                                      x
                                                                                      Jon Toigo Suggests SSD, Tape for Reeling In Data Center Power Costs
                                                                                      Search Storage December 18th, 2012
                                                                                      "In this 2012 Storage Decisions Chicago presentation, Jon Toigo, CEO and managing principal of Toigo Partners International, and chairman of the Data Management Institute, discusses the Linear Tape File System and solid-state drives, two technologies that can provide next-generation storage performance at a fraction of the power consumption seen in data centers today. Watch the video above or read the transcript below to learn more..."
                                                                                      Jon Toigo Suggests SSD, Tape for Reeling In Data Center Power Costs
                                                                                      Search Storage December 18th, 2012
                                                                                      "In this 2012 Storage Decisions Chicago presentation, Jon Toigo, CEO and managing principal of Toigo Partners International, and chairman of the Data Management Institute, discusses the Linear Tape File System and solid-state drives, two technologies that can provide next-generation storage performance at a fraction of the power consumption seen in data centers today. Watch the video above or read the transcript below to learn more..."
                                                                                      Jon Toigo Suggests SSD, Tape for Reeling In Data Center Power Costs
                                                                                      Search Storage December 18th, 2012
                                                                                      "In this 2012 Storage Decisions Chicago presentation, Jon Toigo, CEO and managing principal of Toigo Partners International, and chairman of the Data Management Institute, discusses the Linear Tape File System and solid-state drives, two technologies that can provide next-generation storage performance at a fraction of the power consumption seen in data centers today. Watch the video above or read the transcript below to learn more..."
                                                                                      Trending in
                                                                                      Vol 232, Issue 2
                                                                                      Trending IT Articles