News about Oracle's Solaris and Sun Hardware
System News
Jan 28th, 2013 — Feb 3rd, 2013 Generate the Custom HTML Email for this Issue
System News System News for Sun Users
Volume 179, Issue 5 << Previous Issue | Next Issue >>
Sections in this issue:
click to jump to section


Features
x
Scott McNealy on How to Keep Your Balance: Lessons and Mistakes
The IT Industry on the High Wire
From the helm of his new startup, Wayin (wayin.com), Scott McNealy imparts some of the wisdom gleaned from his time at Sun in a brief Webcast. Rose Tibayan of Blackline conveys the content to viewers. He advises building quality into one's organization. Differentiate; avoid long-term contracts -- don't speculate, innovate; define a cause and pursue it; unless you are Steve Jobs, don't follow his model, foster consensus instead. Choose your directors wisely; stay in touch with your managers and don't hesitate to let the wrong people go. There's much more, and it's well worth the 14 minutes it takes to watch the whole show.
SPARC
x
OracleÂ’s SPARC T4 Servers Exhibit 4X Adoption Rate Year-Over-Year
Now Power Mission-critical Workloads in Over 3,000 Enterprises Worldwide
The Oracle SPARC T4 server featuring Oracle Solaris now powers mission-critical workloads in over 3,000 enterprises worldwide, nearly 4x the number announced one year ago in industries ranging from Financial Services and Telecommunications, to Public Sector and Retail, delivering double-digit revenue growth in Q2FY13. Unlike competitive servers, SPARC T4 servers come with Oracle Solaris, virtualization and system management featuring Oracle VM Server for SPARC, and Oracle Enterprise Manager Ops Center 12c, enabling customers to simplify cloud deployments, and automate and optimize their data centers at no additional cost. Oracle Solaris 11.1 on SPARC T4 gives customers the best platform to deploy Oracle software.
Exadata
x
Philippine Telco Globe Telecom Implements Oracle Fusion Middleware, Oracle Exalogic Elastic Cloud
Plans 5x Revenue Growth in Five Years Using Enterprise Service Bus
Globe Telecom has implemented Oracle Exalogic Elastic Cloud and Oracle Fusion Middleware solutions for its business support systems (BSS) and operations support systems (OSS) to manage the carrierÂ’s ongoing initiative to drive better integration of legacy systems and third-party applications and enable re-usable service-based connectivity in a heterogeneous IT environment that currently serves some 32 million subscribers in the Philippines. Globe Telecom, one of the leading telecommunications companies in the Philippines, plans to leverage the Enterprise Service Bus (ESB) project to support the goal of quintuple revenue growth over the next five years.
Virtualization
x
Read All About It: Oracle Virtualization Newsletter
January 2013 Edition Available Online Now
The January 2013 issue of the Oracle Virtualization Newsletter features articles on Oracle VM 3.2; Oracle desktop virtualization in the IDC Client Virtualization MarketScape; "The Value of Enterprise Desktop Virtualization from Oracle (white paper); and new Oracle VM templates for Oracle Applications on Exalogic; along with new webcasts, white papers, and customer references, Chris Kawalek posts. The issue is available on line, and interested readers can arrange to have it sent automatically to their inboxes by visiting the Oracle Communications subscription page.
New and Enhanced Virtual Desktop Client Solutions for Mobile Devices
Adds Support for Android Tablets and Microsoft Windows 8
Oracle Virtual Desktop Client 1.2 for tablets is newly available to support 4.x Android-powered mobile devices. This enhances the portfolio of Oracle Virtual Desktop Client software for iPad, Windows, Linux and Mac OS X, enabling access to Oracle Virtual Desktop Infrastructure and Sun Ray Software deployments, helping to deliver on corporate Bring Your Own Device (BYOD) initiatives. Oracle Virtual Desktop Client 1.2 for tablets also provides new and enhanced touchscreen gestures and support for Retina displays on newer iPads. Oracle has also released Oracle Virtual Desktop Client 3.2 for desktop PCs, which supports Windows 8 and provides enhanced support for USB peripherals.
IT - Storage
x
Hot Storage Technologies For 2013
CRN January 28, 2013
"CRN cut the storage industry into 10 different slices, each of which features one representative product highlighting the changes going on in the industry. Included are cloud storage, game-changing hard drive and SSD offerings, and a variety of hardware and software combinations that provide features and benefits beyond what each individual part could offer. Here's a look at some products that showcase just how dynamic and diverse today's storage market has become...

  • Pure-Play Cloud Storage: AWS Storage Gateway
  • Storage Array On A Blade: Dell EqualLogic
  • All-Flash Storage Arrays: SolidFire Storage-Based Nodes
  • OpenStack-Based Storage Clouds: Rackspace Cloud Block Storage
  • SSDs' Increasing Capacity, Performance: SanDisk
  • Converged Infrastructure-In-A-Box: SimpliVity OmniCube
  • Virtualizing Commodity Hardware: SoftNAS Virtual Storage Appliance
  • Flash-Based Storage Everywhere: QLogic's Mt. Ranier
  • Hard Drives: Helium-Filled Drives A Potentially Disruptive Tech From HGST
  • Backup Storage: VMware Embeds Avamar Into vSphere

Read on for details.

Molecular Layers of Data: the Next Frontier of Storage?
Information Management January 23, 2013
In a move that vastly trumps the computing development of Moore's Law, a group of MIT researchers have found a way to freeze and 'layer' data at the molecular level that expands storage density by 1,000 times the current capacity.

Published Wednesday in the online science journal, 'Nature,' a team of MIT researchers, led by physics scientist Jagadeesh Moodera outlined a new method of cooling physical disk storage systems at about the freezing point of water and then 'arranging' data as flat sheets of carbon atoms attached to zinc atoms in careful layers..."

    The Truth about 2013 Standards for Corporate Data Destruction
    Business 2 Community January 29, 2013
    "For over 17 years, the Department of Defense standard for data erasure – DoD 5220.22-m, often referred to in the industry as simply 'DoD wipe;' – has been accepted as the standard for data erasure.

    The DoD standard called for a three-pass approach: overwrite all locations on the drive with a character (for example, a '0'), overwrite that character with its complement (a '1'), and finally, overwrite that with a random character..."

      Wanted: 40 Trillion Gigabytes of Open Storage, Stat!
      NetworkWorld January 29, 2013
      "The world's storage needs are growing at an alarming rate, but are existing technologies ready to meet the challenge?"

      "Gigabytes and terabytes are so passe(c). It's soon going to be a zettabyte world thanks to all the digital data--images, books, music, movies, video, documents, maps, you name it--that we collect and engage with throughout our lives.

      Industry research firm IDC predicts a 50-fold increase in the total amount of digitally stored data between 2010 and 2020. This means that in the next seven years, the world's total data footprint will reach 40 zettabytes (that's 40 trillion gigabytes), and every man, woman and child on the planet will account for some 5.2 terabytes of data whether in the cloud or local storage..."

      Java Technology
      x
      Java Spotlight Episode 118: Stephen Colebourne on JSR-310
      Co-spec Leader Colebourne Has Long History of Involvement with Java
      Stephen Colebourne is the guest and JSR 310 the subject under discussion with host Roger Brinkley in Episode 118 of Java Spotlight. Colebourne is a Java Champion and JavaOne Rock Star speaker, according to Brinkley, who has been working with Java since version 1.0 and contributing to open source software since 2000. Colebourne has made major contributions to Apache Commons and created the Joda open source projects including Joda-Time. He blogs on Java topics and is a frequent speaker, including Devoxx and the JavaOne conferences. He is currently co-spec lead on JSR-310 and a contributor to discussions on language change such as Project Coin and Lambda.
      Jan/Feb Java Magazine: Java Embedded
      Sign Up Today for this Free, Online Journal
      The editorial focus of the January/February issue of Java Magazine is embedded Java, featuring Terrence Barr's piece on Java and the Internet of Things; Simon Ritter's article explaining why Java is the best language for embedded development; and Julien Ponge on demystifying invokedynamic; plus much more, including Raspberry Pi Foundation co-founder Eben Upton; Credit Suisse execs Susanne Cech Previtali and Victor Grazi; and Johan Vos on integrating Web and Java Client applications with social media. Sign up for your copy of this free bi-monthly online magazine.
      IT - Technology
      x
      Self-Assembling Silica Microwires Could Supercede Optical Fibers
      Cabling Installation & Maintenance January 24, 2013
      "Silica microwires are the tiny and as-yet underutilized cousins of optical fibers. If they could be precisely manufactured, these slivers of silica could enable applications and technology not currently possible with the relatively larger optical fiber, says a team of researchers from Australia and France who recently reported their efforts to meet this goal.

      By carefully controlling the shape of water droplets with an ultraviolet laser, the researchers have now found a way to coax silica nanoparticles to self-assemble into much more highly uniform silica wires..."

        Cloud Computing
        x
        Oracle's New Resources Help Dramatically Speed Transformation to Enterprise Private Cloud
        Get into the Cloud in as Little as Half a Day
        With its new Zero-to-Cloud Resource Center Oracle has created a fast track for users. According to Patrick Rood, this collection of assessment tools, best practices, cloud-builder demos, tips, and the latest product and solution information can enable customers to deploy a fully operational, enterprise-grade private cloud environment in as little as half a day. Rood reports that establishment of the resource center comes at the same time as the launch of Oracle's Cloud Builder Summit Series, a day-long session designed for executives, cloud architects, and IT operations professionals and scheduled for presentation in as many as 100 cities worldwide.
        Critics of Oracle's Cloud Portfolio Miss the Mark
        R&D Record, Breadth of Offerings Set Oracle Apart from the Competition
        In the race to the cloud Oracle is so far ahead of its critics, writes Bob Evans in Forbes, that the laggards might as well throw in the towel. The breadth of services and applications Oracle offers to its cloud customers and its unparalleled record of R&D set Oracle so far apart from both its critics and the other runners that the race is all but won, according to Evans. The critics, Evans contends, are guilty of short-sightedness and a lack of substantial evidence in their claims that Oracle does not genuinely understand the cloud. Revenues alone dispute those claims, Evans retorts.
        IT - Cloud
        x
        Government IT's Move to Cloud Slowed By Security Concerns, Misconceptions
        IT World January 28, 2013
        "High among the barriers to the adoption of cloud computing in the government sector, right alongside concerns over security and cross-border issues, is a general confusion about what, exactly, the cloud means, according to a group of panelists speaking here at the annual State of the Net technology policy conference.

        'Cloud is well-defined,' says Robert Holleyman, president and CEO of the software trade group BSA. 'But cloud is not well understood among policymakers.'

        Cloud computing has been a hot topic among federal CIOs and their staffers in recent years..."

        5 Reasons Why Storage Is Leading In the Cloud
        CRN January 24, 2013
        "A survey of almost 200 cloud-focused executives found that storage is the most popular cloud initiative, as organizations rush to deal with escalating data growth and disaster recovery requirements.

        The promise of implementing cloud storage incrementally and increase it over time is very attractive to companies as they scale their operations.

        The survey of more than 200 people, almost all of whom attended Cloud Computing Expo in New York in June or Amazon AWS re: invent in Las Vegas in November, was conducted by TwinStrata, a cloud storage vendor..."

        • Storage Most Popular Cloud Initiative
        • Cloud Computing Gains Traction
        • Scalability Valued Highly By Cloud Users
        • Cloud Disaster Recover Gains Large Following
        • Storage Security Tops Concerns Of Executives

        Read on for more details.

        Does "Where?" trump "How?"?
        IT Director January 22, 203
        "Quocirca recently had an interesting discussion with an off-shore hosting and cloud company. Jersey-based (as in the UK Channel Islands, not the US New Jersey) Calligo is positioning itself as the right place to be for data—and for running the applications that create and consume the data.

        Why is this important? Well, organisations are beginning to wake up to the fact that even when a data centre is in a 'friendly' country, there is still potentially high risks to the intellectual property (IP) held within the data..."

          Who's Making Money in the Cloud?
          NetworkWorld January 25, 2013
          "Salesforce.com, Amazon Web Services and Microsoft are the only companies pulling in more than $1 billion in revenue annually from cloud computing, one research firm says...

          It can be tough to say for sure because most cloud computing companies don't make official revenue and earnings figures available. But, that hasn't stopped some analysts from making estimating at least the revenue results..."

          Is Your Cloud Provider Snooping?
          IT World January 24, 2013
          "The other day I stumbled on a GigaOm guest post, written by a company executive, that didn't pass the sniff test for me. In it, Allan Leinwand, ServiceNow's CTO of platform development, suggests that cloud providers like Amazon Web Services and Microsoft have a tempting incentive to snoop on customer cloud usage, if that customer is a competitor.

          Leinwand wrote 'it may be a hypothetical concern for now' and that 'in reality,' the providers may not be snooping to gain an advantage. But he sure seems to suggest that cloud users ought to be worried if their service provider is also a competitor..."

          IT - CxO
          x
          Sometimes the Best Defense is Deletion
          NetworkWorld January 23, 2013
          "Big Data is viewed as a very good thing by most enterprises. With the right analytics, it can generate meaning and business value. But like with many things there can be too much of a good thing, say a number of Information Governance (IG) experts.

          Their message is that enterprises need to do more than protect their data from theft or infection -- they need to get rid of some of it, for both economic and legal reasons..."

          Know Your Options for Managed IT Services
          Processor January 25, 2013
          "As your data center continues to grow, you may notice that time and resources are starting to shrink. ItÂ’s difficult to keep up with technology trends and manage each and every system in the data center while also maintaining a respectable budget.

          To ease the burden on IT departments and save money in the process, many companies are looking to managed IT services as a way to outsource infrastructure systems while maintaining the same level of performance. If you are considering investing in managed IT services, you'll need to compare multiple vendors, decide what types of services you should outsource, and always keep an eye on the future in terms of flexibility and technological innovation."

          AMD Suit Offers Lessons on Punishing Insider Thieves
          Dark Reading January 28, 2013
          "A long-waged a turf war in the CPU and GPU arena was tinged with allegations of dirty fighting this month when chipmaker AMD brought suit against former employees it accused of stealing sensitive information during their defection to competitor nVidia. Security industry veterans call it a classic case of insider theft.

          They say it provides a good opportunity for CISOs to educate line-of-business leaders about the importance of security controls designed not just for prevention but also for forensics that enable organizations to sic the legal dogs on thieves who still find a way to steal..."

          IT Leaders Can Use Media to Support the Business
          Baseline January 22, 2013
          "If you are in charge of your IT department, at some point you’re going to have to speak to the media. If you are like most tech people, talking to reporters is the last thing on your mind and probably ranks right up there with taking out the garbage. I felt the same way—until I found out what publicity can do for the bottom line..."
            Ten Tech Trends to Watch in 2013
            Baseline January 20, 2013
            "By now, all the buzzwords, phrases and trends—the cloud, BYOD, the mobile revolution, social media, etc.—have established themselves as part of the daily tech conversation. But what affect will they have on key business drivers—such as integration, IT service management, data centers and security - in 2013?..."

            • IT Service Management Will Have to Work Harder
            • Integration in the 'App Economy'
            • Telecoms Will Seek New Revenue Sources
            • No Obituaries for On-Premise Data Centers
            • Green IT Goes Beyond Lip Service
            • IT Security Will Be Overwhelmed
            • Enterprises Will Focus on Mobile Application Management
            • Traditional Collaboration Tools Fade in Popularity
            • Web-Delivered Content Will Dominate the Media Industry
            • BPM Won't Shift Entirely to the Cloud

            Read on for details.

            IT - PM
            x
            Ten Predictions for Project Management in 2013
            Baseline January 28, 2013
            "Project management offices (PMOs) have emerged as popular designations within organizations to address expensive project failures caused by scope creep, missed deadlines, inflated budget costs and other factors. However, many PMOs struggle due to a lack of training and other resources, and the execs in the C-suite are increasing the pressure to prove measurable, business-impacting results...

            Ten Predictions for Project Management in 2013:

            • Hard Skills Will Trump Soft Skills
            • Agile Implementation Falls Short
            • Increasing Opportunities
            • An In-House Talent Challenge
            • Metrics Will Matter
            • Feds Will Step Up Their Game
            • Focus on Vendor Issues
            • Pink Slips Are Coming
            • Portfolio Management's Key Role
            • Agile Expectations Must Align With Reality

            Read on for details.

            IT - Networks
            x
            The Next-generation Enterprise WAN: Let's Start with Why
            NetworkWorld January 21, 2013
            ""A long-time networking guy, I've been passionate about Enterprise WANs for a decade now. I became passionate about the basic idea of this Next-generation Enterprise WAN (NEW) architecture after talking with a prospective customer in 2008 about how he had leveraged server virtualization to consolidate the 40+ different applications his company was using onto four Dell superservers, which he deployed at a colocation facility. That was my 'aha!,' light-bulb-over-the-head moment..."
            All IT Pros Need to Understand TCP Windowing
            InfoWorld January 28, 2013
            "High-bandwidth replication over long distances, whether to a hot site or the cloud, requires a solid grasp of TCP to steer clear of bottlenecks...

            You fire up your laptop and FTP a large file to a Windows 2003 management server on the other side of the link. As soon as the transfer finishes, you know something's wrong -- your massive 500Mbps link is pushing about 21Mbps.

            Do you know what's wrong with this picture? If not, keep reading because this problem has probably affected you before without your realizing it. If you decide to move to the cloud or implement this kind of replication, it's likely to strike again..."

            UPnP Flaws Expose Tens of Millions of Networked Devices to Remote Attacks
            ComputerWorld January 29, 2013
            "Tens of millions of network-enabled devices including routers, printers, media servers, IP cameras, smart TVs and more can be attacked over the Internet because of dangerous flaws in their implementation of the UPnP (Universal Plug and Play) protocol standard, security researchers from Rapid7 said Tuesday in a research paper..."
            9 Bandwidth Hogs: Reality vs. Myth
            InformationWeek January 28, 2013
            "Small and midsize businesses (SMBs), many of whom rely on those same ISPs for broadband access, can experience usage and performance problems when a handful of hogs gobble up the majority of their network resources.

            Video might be the biggest culprit, but it's not the only one. Businesses do so much online these days -- voice, email, productivity, accounting and customer service -- that there are constant demands on corporate bandwidth and related resources. Although the hogs themselves might be applications, it is almost always users who are generating the bandwidth-eating activity. ..

            • Online Video: Reality
            • Videoconferencing: Reality And Myth
            • Employee Mobile Devices In Wi-Fi Mode: Semi-Reality
            • Employees Listening To Music: Reality
            • Social Media: Myth
            • Those Overstuffed Email Inboxes: Myth
            • Large File Uploads And Emails: Reality
            • Cloud Apps: Semi-Reality
            • Skype And Other VoIP Platforms: Reality

            Read on for details.

            Why You Need (A Lot) More Internet Bandwidth on Your Enterprise WAN
            NetworkWorld January 28, 2013
            "I believe the time is now ripe for a Next-generation Enterprise WAN (NEW) architecture. This time, I'd like to cover something more basic, even fundamental, which rarely seems to be considered and is almost never talked about: most enterprise networks need a lot more Internet bandwidth at their locations.

            I'm referring here mostly to branch offices and smaller sites, as opposed to data centers and headquarters locations. Don't get me wrong - it's quite possible that some of these larger sites need more bandwidth, too. But data center pipes are usually sized appropriately – at least relative to the size of the rest of the WAN links in the network – and headquarters, being where both execs and IT staff are located, more often that not will have "reasonable" sized Internet connections, whether or note they are ideal/optimal..."

              IT - Operations
              x
              Cooling that's Effective, Affordable & Energy-Saving
              Processor January 25, 2013
              "One of the big names in server manufacturing recently released a new generation of servers that will work very well under the new ASHRAE TC 9.9 guidelines for data center design and operation.

              This new generation of servers can handle temperature extremes of up to 45 degrees Celsius, or 113 degrees Fahrenheit, for up to 90 hours per year. One of the rationales behind marketing the server at those conditions was to allow fresh air cooling in virtually the entire continental United States. Other research has indicated that the servers can operate 87% of the year in Washington, D.C., using fresh air cooling alone..."

                Employees Put Critical Infrastructure Security at Risk
                NetworkWorld January 25, 2013
                "... the Department of Homeland Security's Industrial Control Systems Cyber Emergency Response Team (ICS-CERT) detailed two separate incidents where IT systems connected directly to key energy industry assets were found to be infected with malware that had been deployed using infected USB drives, highlighting gaps in the organizations' basic security controls..."
                Lower the Data Center's TCO
                Processor January 25, 2013
                "Lowering data center-related costs is a goal of pretty much every company that owns its data center. Depending on the resources available, there are numerous methods for doing so, including approaches directly related to the data centerÂ’s physical or facility aspects and not necessarily the IT equipment running inside it. Such possibilities include taking advantage of natural resources to help cool equipment, an approach that can simultaneously lower utility costs. The following explores this possibility and others aimed at lowering a data center's overall TCO.

                In a document called 'Data Center Energy Efficiency Framework' that Daniel Skutelsky, Green Data Center Alliance co-founder, helped write and that provides a 'set of best practices for reducing data center energy consumption,' 30-plus measures are detailed crossing five domains, including IT, process, governance, finance domains, and FA, or facility design and engineering..."

                  IT - Security
                  x
                  Combatting Advanced Threats In 2013 Through Basics
                  Dark Reading January 28, 2013
                  "As most on the pointy end of investigating and cleaning up compromises have known for some time, despite all of the hype over next-generation this and big-data that, 2012 was another great year for cyberespionage and state-sponsored adversaries.

                  As with past years, many of the most egregious compromises in 2012 occurred in organizations with some of the biggest security budgets and the best toys, fresh off of the show floor of your favorite security product conference. It remains, as has always been the case, that money buys good security -- but that money has to be well-spent..."

                  Lacking Privacy Laws Aid Growing CISO Role in Data Privacy Management
                  Search Security January 29, 2013
                  "According to a group of data privacy experts, enterprise information security teams are increasingly being asked to take on challenging data privacy management responsibilities, but technicalities in outdated data privacy laws are helping diligent organizations avoid legal entanglements..."
                  How to Conduct an Effective IT Security Risk Assessment
                  Dark Reading January 22, 2013
                  "Many security and compliance projects begin with a simple idea: assess the organization's risk of vulnerabilities and breaches. Indeed, implementing an IT security risk assessment is absolutely critical to the overall security posture of your organization.

                  An effective security risk assessment can prevent breaches, reduce the impact of realized breaches, and keep your company's name from appearing in the spotlight for all the wrong reasons..."

                  6 Steps to Better Customer Data Protection
                  InformationWeek January 29, 2013
                  "Monday was Data Privacy Day. Do you know where your customer information is? If your answer is somewhere in the "no" to "sort of, for the most part" range, you've got work to do. Even if your answer is a resounding "yes," it might be time to revisit how you handle and protect customer information -- especially if those processes were developed a couple of years ago or more...

                  • Make Customer Data More Than An IT Problem.
                  • Reevaluate Your Data Encryption Practices.
                  • Consider Data Loss Prevention (DLP) Technologies.
                  • Include Customer Privacy In Cloud Vendor Negotiations.
                  • Address The BYOD Issue.
                  • Retain Data Logs For Longer.

                  Read on for details.

                  Can You Spot the 10 Security Mistakes in This Workspace?
                  IT World January 25, 2013
                  "What do you notice about this workspace?

                  Most desks hold sensitive documents and information that you don't want to get into the wrong hands. A little care and a few good habits can go a long way toward keeping everything secure..."

                  Cybersecurity, Private Clouds, Privacy: Guidance on Top 2013 Trends
                  IT Business Edge January 31, 2013
                  "Global nonprofit IT association ISACA recently issued guidance on managing three top trends expected to pose major challenges to businesses in 2013: cybersecurity threats, private vs. public clouds and data privacy. As part of its role as a provider of best practices and expertise, ISACA helps its 100,000 constituents worldwide navigate the shifting IT landscape in order to build trust in and value from enterprise information..."
                    Escape From Password Hell
                    CIO Insight January 28, 2013
                    "You know a system is broken when almost nobody can use it. This is currently the case with online passwords. The situation has deteriorated to the point of absurdity. Every day, there's an article somewhere warning individuals to avoid stupid passwords like "password" or "123456."

                    No question, these are really dumb passwords. But it's not as stupid as the system we currently have in place. Consider: We all log into dozens or hundreds of sites every week and, theoretically, we're supposed to have a different password for each site. Worse, we're supposed to memorize all these passwords and change them periodically..."

                      Events That Defined the European Information Security Landscape In 2012
                      HelpNet Security January 28, 2013
                      "The past 12 months have been, to say the least, an active time for the information security landscape in Europe.

                      Hacktivism stories dominated mainstream media outlets, the public has been learning more about the privacy implications of their actions, and governments realized the complications that can arise from a cyber conflict.

                      We've reached out to a number of information security professionals all over Europe and here are some of the comments regarding the past 12 months that we've received..."

                      "Hammered Asinine Requirements": Now There's a Secure Password
                      NetworkWorld January 24, 2013
                      "You're best off forgetting your grammar lessons when it comes to creating passphrases, according to new research out of Carnegie Mellon University and MIT.

                      The researchers say that using grammar – good or bad – can clue in hackers about the words in a multi-word password. And they’ve built an algorithm as a proof-of-concept to show it (The team, led by software engineering Ph.D. student Ashwini Rao of CMU’s Institute for Software Research, will present its research at the Association for Computing Machinery’s Conference on Data and Application Security and Privacy on Feb. 20 in San Antonio.)..."

                      Security Threats to Expect in 2013
                      Baseline January 29, 2013
                      "Few would argue that Internet-based security risks are growing, but there's some disagreement about what type of attacks represent the biggest risk. Many have predicted that cloud exploits, mobile device attacks and all-out cyber war could occur in the not-too-distant future. However, Verizon Communications' "Verizon Data Breach Investigations Report" (DBIR) paints a somewhat different picture..."
                      Top Five Hurdles to Security and Compliance in Industrial Control Systems
                      HelpNet Security January 24, 2013
                      "For many decades, Industrial Control Systems (ICS) have been the operational systems relied upon to safely and reliably deliver the essentials of daily life. Sometimes referred to as a Critical Infrastructure, they are the backbone of a modern economy. With these systems generally working well, there has been little need to make major changes to them. There has been innovation and some incremental changes, but in the ICS world, it has largely been 'business as usual.'

                      That's very different than other industries and sectors, such as enterprise IT.."

                      The Three Worst Words In The English Language: Can't We Just?
                      Dark Reading January 25, 2013
                      "When learning something new, especially a technical something, it's great to hear the words "for example" because you're about to see something more concrete that helps the abstract make more sense.

                      Conversely, when doing design and development work, it's awful to hear the words "can't we just" because you're about to hear a defense of kicking the can down the road -- more status quo. 'Can't we just' is used to justify all manner of things:

                      Can't we just:

                      • replicate the passwords?
                      • leave passwords cleartext?
                      • use one way SSL to solve everything?
                      • the same system we have for the last 15 years for our new Cloud?
                      • the same system we have for the last 15 years for our new Mobile apps?
                      • hardcode XYZ?

                      Read on for details.

                        IT - Careers
                        x
                        5 Tech Terms Boomers Should Use at Work with Millennials
                        Business 2 Community January 31, 2013
                        "Do you ever notice that young people often talk in technology terms? They seem to have their own language much different than the Boomer's language of the 60s and 70s. We used to say a great experience was 'bomb' or the movie Yellow Submarine was psychedelic. Perhaps our parents were bewildered by our choice of words too. But today's vocabulary has a business/technology bent to it.

                        As a Baby Boomer I am part of a generation that prides itself on being cool and up-to-date. Remember, we were the group that wasn't going to trust anyone over 30? So when my 30-year-old son tells me I'm 'just a data point of one', I'm confused– I don't like it..."

                          7 Top Business Intelligence Trends For 2013
                          InformationWeek January 25, 2013
                          "Many people seem to want to stick a sexier name on business intelligence, whether that's "business analytics" or "big data." To me, it's still business intelligence, a top-priority technology that can help companies boost revenues, improve customer service or control costs by making better, faster decisions.

                          Whatever you want to call this still-vital category, here are my predictions for the top BI trends of 2013, along with a few looks back at highlights of 2012..."

                          • Dashboards Evolve, Expand
                          • Self-Service BI Gets Real
                          • Mobile BI Boosts BI Adoption
                          • In-Memory Goes Mainstream
                          • Big Data Generates Big Interest
                          • Cloud Becomes Just Another Option
                          • Collaboration Goes Beyond Social

                          Read on for details.

                          Whatever Happened to the Art of Software Testing?
                          NetworkWorld January 31, 2013
                          "Over the last year I've had the opportunity to attend a number of extremely interesting and mind-expanding conferences focusing on emerging and somewhat disruptive technologies and companies: APIs, mobile, cloud, big data – the works. Coming from a quality background, it has stricken me how little focus these companies give to testing. They talk plenty about continuous integration, agile methodologies, user groups and continuous deployment – but testing? Nope.

                          Why is that?..."

                          IT - Social Media
                          x
                          By 2016, 50 Percent of Large Organizations Will Have Internal Facebook-Like Social Networks, Says Gartner
                          InformationWeek January 29, 2013
                          "Enterprise social networks will become the primary communication channels for noticing, deciding or acting on information relevant to carrying out work. However, Gartner, Inc. estimates that through 2015, 80 percent of social business efforts will not achieve the intended benefits due to inadequate leadership and an overemphasis on technology.

                          'Businesses need to realize that social initiatives are different from previous technology deployments,' said Carol Rozwell, vice president and distinguished analyst at Gartner..."

                          IT - Virtualization
                          x
                          Overcoming The VMware RAM Problem
                          Storage-Switzerland January 30, 2013
                          "Each time a host is added to a VMware Infrastructure, in order to support more virtual machines (VMs), the return on investment (ROI) of the project is reduced. To prevent this, data centers need to focus on increasing the VM density on each host. While there is plenty of CPU horsepower available to do this, thereÂ’s also a shortage of DRAM. This shortage needs to be overcome for ROIs to be maintained and even increased.

                          Modern mid-range servers with eight or more cores can support 5 to 10 times the number of VMs found on the typical host but DRAM and storage performance can become bottlenecks to achieving this kind of density. In this article we'll provide some tips about overcoming the RAM challenge in VMware environments..."

                          48% of IT Staff Fear Unauthorized Access to Virtual Servers
                          HelpNet Security January 29, 2013
                          "Data security in visualized environments is often neglected by IT organizations, with 48% either reporting or suspecting unauthorized access to files on visualized servers, according to Varonis.

                          The study, conducted at VM World conferences, suggests that there is a limited awareness of security matters when it comes to visualized servers, with 70% of respondents having little or no auditing in place on virtual servers..."

                          IT - Compliance
                          x
                          10 E-Discovery Technology Trends That Are Rising to Prominence in 2013
                          eWeek January 25, 2013
                          "Up until a few years ago, document discovery for litigation purposes was a manual process and the exclusive domain of lawyers, law clerks, judges and other non-IT folks. Not so anymore. Since the advent of search engines for word documents, email, spreadsheets, instant message threads, photos, logs, videos and a score of other file formats, IT has been intimately involved in rounding up evidence for legal cases..."

                          • Partnerships Will Take Lead Roles
                          • Holistic Approach Enables Improved Re-use of Data
                          • Self-Collection Policies Being Re-examined
                          • Legalities in Moving to the Cloud for E-Discovery Will Gain Attention
                          • Attorneys With Expertise in Machine Learning, Analytics in Demand
                          • Legal Teams Will Use Advanced Cost-Benefit Analysis for Better Budgeting
                          • Data Privacy Laws in Foreign Jurisdictions Will Create E-Discovery Issues for Enterprises
                          • Data Destruction Policies Will Get Renewed Attention
                          • New Uses for Data Analytics on the Way
                          • Predictive Analytics Will Gain Momentum With Legal Teams

                          Read on for more details.

                          The Role of Ethics in Data Governance
                          Information Management January 25, 2013
                          "Security and privacy have always been at the core of data governance. Typically, company policies, processes, and procedures have been designed to comply with these regulations to avoid fines and in some cases jail time. Very internally focused.

                          However, companies now operate in a more external and connected fashion than ever before..."

                          IT - Email
                          x
                          Email Privacy Tops Tech Agenda at Judiciary Committee
                          CIO January 16, 2013
                          "Should law-enforcement officials have easier access to your email just because it's stored in the cloud? It does now and Patrick Leahy says he intends to resume efforts to update 1986 electronic privacy law to provide greater legal protections for emails and other digital files in the cloud..."
                            Internet-Facing Printers Remain a Huge Risk
                            HelpNet Security January 29, 2013
                            "Despite repeated warnings about office and home devices being accessible from the Internet when there is no good reason for them to be, every now and then someone gets the idea of using Google Search to sniff out just how many of them are there.

                            The latest in this line is Adam Howard, a UK-based software engineer who searched for publicly accessible HP printers by using a sequence that matches with an often-used pattern for printing documents on an office or home network:..."

                            Storage
                            x
                            Pillar Axiom 600 Storage System Enables SaaS Provider Avero to Accelerate Application and Data Warehouse Performance
                            Delivers an Immediate 40 Percent Improvement in ETL and Application Performance
                            With the implementation of OracleÂ’s Pillar Axiom 600 Storage System Avero LLC, a leading provider of SaaS analytic applications and specialized services to the hospitality industry, gained an immediate 40 percent improvement in its ETL and application performance. Avero's infrastructure also includes Oracle Database, Oracle WebLogic Server and Sun servers running Oracle Solaris and Oracle Linux. The Pillar Axiom 600 Storage SystemÂ’s QoS capability, company officials report, allows Avero to run both its production and pre-production staging environments on a single array without performance impacts by prioritizing I/O for its production applications.
                            IT - Mobile
                            x
                            6 Points CIOs Should Evaluate For Embracing SoCloMo and Analytics In the Enterprise
                            InformationWeek January 24, 2013
                            "The next great evolution in computing is driven by four key technology trends - Social, Cloud, Mobile (SoCloMo) and Analytics and the time is ripe for the CIOs to gear up to implement these enabling technologies to drive down costs and increase revenue opportunities...Thus, an enterprise needs to ask itself the following questions:"

                            • How can the social graph improve and transform our customer and partner interactions? WhatÂ’s more important - public or private social networks?
                            • What information can we realistically acquire to make better decisions? How do we use social networks internally?
                            • What happens to business processes when we put more of these into the hands of our customers, partners and employees? How can the processes be revolutionized by mobility and the new device capabilities?
                            • How can we accelerate our ambition through the cloud? What criteria do we need so that we can safely deploy areas that are often mission critical areas outside the firewall?
                            • Where is the information that can change the game for the enterprise beyond its competition?
                            • Where will analytics specifically drive competitive advantage? How do we get the right skill sets for integrating this new insight into our business functions?

                            Read on for more details.

                            6 Cyber Tips to Fight Crime
                            Washington Technology January 25, 2013
                            "The bring your own device, or BYOD, trend couldn't come at a tougher time for government contractors. State-sponsored espionage malware is in the headlines daily. Defense Secretary Leon Panetta is warning about the potential for full-scale cyberwarfare. Federal agencies are starting to look with suspicion at contractors' security policies – and employees want to check their email and access company files on their personal iPads?

                            But this is today’s reality – smart phones, tablets and home computers are part of the IT environment. You need to understand the nature of the threat and find ways to protect government data and your own business..."

                            Retailers Can Now Track You across the Mall
                            IT World January 17, 2013
                            "There's a common argument against online tracking that goes something like this: When you shop at your local mall, nobody is following you around recording the name of every store you enter and what you did there. When you shop on the Web, there are dozens of trackers recording your activities on every site you visit. So why canÂ’t shopping online be more like shopping at the mall?

                            Well, it soon may be, but not in a way most privacy advocates would endorse. Retail stores will soon be able to follow you around the store - or even outside the store if you just walk by without entering - using the WiFi antenna built into your smartphone.

                            How would they do it? Pretty simple really..."

                              IT - Big Data
                              x
                              8 Ways Big Data Will Change Our Lives
                              CRN January 29, 2013
                              "Big data became the industry's hottest buzzword in 2012, but the impact of that technology on our day-to-day lives will be realized for years to come.

                              From healthcare, to sports, to the way we elect a president, big data will make big changes to the way we live our lives. Our ability to manage and analyze the massive amounts of data spawned by new data sources like social media is sparking an 'extraordinary knowledge revolution,' according to Rick Smolan, co-author of 'The Human Face of Big Data.'

                              Here are eight changes you can expect to see as that big data revolution continues..."

                              • Spot-On Sports Analysis
                              • Advanced Healthcare
                              • Personalized Advertisements
                              • Easier Commutes
                              • Presidential Campaigns
                              • Cars Of The Future
                              • Improved Customer Service
                              • Customized Education

                              Read on for details.

                              Believe the Big Data Hype
                              eWeek January 23, 2013
                              "Research firm Ovum reports that sentiment surrounding big data was positive in 2012, despite a perception of overexposure.

                              Though the issue of big data may appear to be overexposed to some, the message coming from one tech analyst firm is 'Do Believe the Hype.'

                              Sentiment surrounding big data vendors remained positive last year, despite skeptics' suggestions that the subject had been 'overhyped,' according to Ovum. The big data buzzword even managed to transcend from the enterprise IT world to become a hot topic for business publications and journals in 2012, with MongoDB claiming considerable mindshare among Web developers who traditionally relied on MySQL..."

                              Big Data Brings Big Privacy Concerns
                              NetworkWorld January 24, 2013
                              "When CIOs think of big data, they might envision the technical challenges and opportunities posed by the vast reservoirs of information their companies are collecting and analyzing. But when some policy makers contemplate the same situation, their concerns turn to questions of privacy, and what steps data-rich companies are taking to safeguard consumers' personal information.

                              In recent years, lawmakers and regulators have voiced mounting concerns about the volume of data that businesses are collecting, how that information is then used and if it is sold, and whether consumers are given meaningful notice about those companies' practices..."

                              Big Data Security Analytics or Big Data IT Analytics?
                              NetworkWorld January 30, 2013
                              "According to ESG research, 44% of enterprise organizations believe that their security data collection, processing and analysis qualifies as 'big data' today while another 44% believe that their security data collection, processing and analysis will qualify as 'big data' within the next two years. Given this requirement and market opportunity, it is not surprise that IBM and RSA announced Hadoop-based big data security analytics platforms this week..."
                              Four Lessons from Successful Big Data Programs
                              Information Management January 28, 2013
                              "To get the most out of big data programs, early adopters have found success through a mix of nimble analytic practices and tried-and-true business-first planning, according to a new report from Aberdeen Research.

                              In 'Data Management for BI: Getting Accurate Decisions from Big Data,' Aberdeen analyst Nathaniel Rowe assessed survey results from 125 organizations at some stage in their big data programs. Rowe says that customer analytics has become 'the driving force behind big data developments,' so itÂ’s of little surprise that many of the 'best-in-class' enterprises in the report came from the fields of retail and telecommunications. Rowe also said specific use cases are popping up as having big, quick returns, like fraud detection in financial services or the analysis of sensor data in utilities..."

                              Is That Big Data In Your Pocket? Or Are You Just Happy To Have New Customer Insights?
                              Business 2 Community January 31, 2013
                              "At this point, most of us are aware that the 'Era of Big Data' is upon us. The phrase was coined to describe the rapidly expanding collections of data sets that are too large and complex to process with traditional data-processing applications.

                              Today, many companies are in a race to provide solutions that help visualize the interrelationships between data sets, finding unexpected insights across sectors as varied as energy, medical, world history, climatology, and sports..."

                              Open Letter to Business from IT Re: Big-Data
                              Internet Evolution January 31, 2013
                              "While there's already talk of big-data disillusionment, research shows most companies are only in the early stages of adopting this far-reaching technology: Inflated expectations aimed for blurry goals and traveled unmapped territory.

                              Earlier this year, Gartner analyst Svetlana Sicular wrote that big-data is "falling into the trough of disillusionment." It's up to IT leaders to build bridges over this quagmire and prevent their organization from sliding into a ditch of their own making. The technologies are here. The tools are here. For big-data to work, you really need to work closely with your business peers, explain your requirements, and mutually agree on common goals, deadlines, and intentions.

                              Your letter might go something like this..."

                              Realities of the Enterprise Data Scientist
                              Information Management January 31, 2013
                              "You need talented people to lock on to the valuable elements of vast and varied data streams. Like big data itself, these 'data scientists' come with all types of lofty definitions and expectations. So we reached out to Anand Rao, innovation lead for the analytics group at PwC, who has turned much of his consulting attention of late to enterprises looking to bring on or train a wave of data scientists. Rao spoke with Information Management on the differences between data scientists and what enterprises already have on staff, some approaches he sees making early inroads and the emerging importance of layered visualizations..."
                              Staggering Revelations about Big Data
                              Baseline January 29, 2013
                              "It is the stuff of e-documents, blogs, Tweets, news footage and fan forums. It is also a massive collection of family photos, music recordings, corporate webinars and podcasts, and, yes, Angry Birds and homemade videos of kittens. This and so much more continue to shape what we now know as big data. And big data is only going to get bigger and bigger, according to a recent report..."

                              • Huge
                              • Really Huge
                              • Really, Really Huge second of the day.
                              • Up and Comers
                              • Unexploited Opportunity
                              • Risk Potential
                              • On-Premise Preference
                              • That's Entertainment, Part I
                              • That's Entertainment, Part II
                              • Outpaced

                              Read on for details.

                              To Avoid Nasty Surprises, Higher Ed Turns To Prediction
                              InformationWeek January 28, 2013
                              "Lots of mainstream businesses are graduating from rearview-mirror reporting to more advanced, predictive analytics, so it's no surprise that colleges and universities are making the same progress.

                              The goal, of course, is to figure out what's coming. You know how many students enrolled last fall, but did you accurately forecast how many freshmen would drop out after the first semester? Can you anticipate what revenue will look like next fall? How many dorm rooms, classrooms and dining halls will your college need five years from now? These are just a few examples of the data-driven analyses taking place in higher ed..."

                              Use Big Data to Predict Business Trends
                              Business 2 Community January 28, 2013
                              "Big Data is a hot topic. Heck, there’s a Harvard Business Review category dedicated to articles strictly about the “problem” of Big Data. But at ASQ, we like to think of Big Data as an opportunity rather than a problem. With all of the data that your website can collect, it’s hard to imagine a scenario where your business goals cannot be completely data-driven. However, there may be some sources of data you are not considering..."
                              What Big Data Is Not... at Least Not Yet!
                              Big Data Republic January 23, 2013
                              "Faced by the spin and hype surrounding big data, a key for managers and executives wishing to execute a successful big data strategy is to sift the possible future realities from the possible future fictions.

                              A worthwhile and natural starting point for examining big data hype is GartnerÂ’s 2012 Hype Cycle. This indicates the distance a technology is from becoming a common productivity tool..."

                              What's Wrong With Big Data?
                              Big Data Republic January 29, 2013
                              "Imagine talking to various big data vendors, asking, 'Once IÂ’ve collected all my big data sources, where should I put it?' Hadoop vendors will say 'put it in Hadoop.' NoSQL vendors or appliance vendors will say 'No, put it here.' At which youÂ’re ready to say, 'IÂ’ll tell you where to put it.'

                              The big problem is not where you put it. If you succumb to the 'put it here' way of thinking, youÂ’re not solving the problem. Leave your data where it is and start by asking, 'What do I want to get out of my data? What problem am I trying to solve?' In other words, use that tried and true standard: Start with the end in mind..."

                              IT - BYOD
                              x
                              Standardizing BYOD at Your Company
                              Business 2 Community January 28, 2013
                              "For many business managers and company administrators, the idea of consumerization and BYOD has been around for a while. While there has been an idea of BYOD being completely free for most of its history, there are some problems that can arise from doing so.

                              In a completely free BYOD business model, employees can bring any device they wish to the workplace. While this can still work, there are ways that it can restrict workflow and efficiency..."

                              Top10
                              x
                              Top Ten Articles for last few Issues
                              Vol 179 Issue 1, 2, 3 and 4; Vol 178 Issue 1, 2,3 and 4
                              We track how frequently each article is viewed on the web site to determine which the readers consider the most important. For last week, the top 10 articles were:

                              • Scott McNealy on How to Keep Your Balance: Lessons and Mistakes
                              • Critics of Oracle's Cloud Portfolio Miss the Mark
                              • New and Enhanced Virtual Desktop Client Solutions for Mobile Devices
                              • Oracle's SPARC T4 Servers Exhibit 4X Adoption Rate Year-Over-Year
                              • Oracle's New Resources Help Dramatically Speed Transformation to Enterprise Private Cloud
                              • Read All About It: Oracle Virtualization Newsletter
                              • Over 3 Exabytes of Media for StorageTek T10000C Tape Drives Shipped
                              • Philippine Telco Globe Telecom Implements Oracle Fusion Middleware, Oracle Exalogic Elastic Cloud
                              • Jan/Feb Java Magazine: Java Embedded
                              • Pillar Axiom 600 Storage System Enables SaaS Provider Avero to Accelerate Application and Data Warehouse Performance

                              The longer version of this article has list of top ten articles for the last 8 weeks.

                                Top Ten Articles for last few Issues
                                Vol 179 Issue 1, 2, 3 and 4; Vol 178 Issue 1, 2,3 and 4
                                We track how frequently each article is viewed on the web site to determine which the readers consider the most important. For last week, the top 10 articles were:

                                • Scott McNealy on How to Keep Your Balance: Lessons and Mistakes
                                • Critics of Oracle's Cloud Portfolio Miss the Mark
                                • New and Enhanced Virtual Desktop Client Solutions for Mobile Devices
                                • Oracle's SPARC T4 Servers Exhibit 4X Adoption Rate Year-Over-Year
                                • Oracle's New Resources Help Dramatically Speed Transformation to Enterprise Private Cloud
                                • Read All About It: Oracle Virtualization Newsletter
                                • Over 3 Exabytes of Media for StorageTek T10000C Tape Drives Shipped
                                • Philippine Telco Globe Telecom Implements Oracle Fusion Middleware, Oracle Exalogic Elastic Cloud
                                • Jan/Feb Java Magazine: Java Embedded
                                • Pillar Axiom 600 Storage System Enables SaaS Provider Avero to Accelerate Application and Data Warehouse Performance

                                The longer version of this article has list of top ten articles for the last 8 weeks.

                                  Top Ten Articles for last few Issues
                                  Vol 179 Issue 1, 2, 3 and 4; Vol 178 Issue 1, 2,3 and 4
                                  We track how frequently each article is viewed on the web site to determine which the readers consider the most important. For last week, the top 10 articles were:

                                  • Scott McNealy on How to Keep Your Balance: Lessons and Mistakes
                                  • Critics of Oracle's Cloud Portfolio Miss the Mark
                                  • New and Enhanced Virtual Desktop Client Solutions for Mobile Devices
                                  • Oracle's SPARC T4 Servers Exhibit 4X Adoption Rate Year-Over-Year
                                  • Oracle's New Resources Help Dramatically Speed Transformation to Enterprise Private Cloud
                                  • Read All About It: Oracle Virtualization Newsletter
                                  • Over 3 Exabytes of Media for StorageTek T10000C Tape Drives Shipped
                                  • Philippine Telco Globe Telecom Implements Oracle Fusion Middleware, Oracle Exalogic Elastic Cloud
                                  • Jan/Feb Java Magazine: Java Embedded
                                  • Pillar Axiom 600 Storage System Enables SaaS Provider Avero to Accelerate Application and Data Warehouse Performance

                                  The longer version of this article has list of top ten articles for the last 8 weeks.

                                    Top Ten Articles for last few Issues
                                    Vol 179 Issue 1, 2, 3 and 4; Vol 178 Issue 1, 2,3 and 4
                                    We track how frequently each article is viewed on the web site to determine which the readers consider the most important. For last week, the top 10 articles were:

                                    • Scott McNealy on How to Keep Your Balance: Lessons and Mistakes
                                    • Critics of Oracle's Cloud Portfolio Miss the Mark
                                    • New and Enhanced Virtual Desktop Client Solutions for Mobile Devices
                                    • Oracle's SPARC T4 Servers Exhibit 4X Adoption Rate Year-Over-Year
                                    • Oracle's New Resources Help Dramatically Speed Transformation to Enterprise Private Cloud
                                    • Read All About It: Oracle Virtualization Newsletter
                                    • Over 3 Exabytes of Media for StorageTek T10000C Tape Drives Shipped
                                    • Philippine Telco Globe Telecom Implements Oracle Fusion Middleware, Oracle Exalogic Elastic Cloud
                                    • Jan/Feb Java Magazine: Java Embedded
                                    • Pillar Axiom 600 Storage System Enables SaaS Provider Avero to Accelerate Application and Data Warehouse Performance

                                    The longer version of this article has list of top ten articles for the last 8 weeks.

                                      Top Ten Articles for last few Issues
                                      Vol 179 Issue 1, 2, 3 and 4; Vol 178 Issue 1, 2,3 and 4
                                      We track how frequently each article is viewed on the web site to determine which the readers consider the most important. For last week, the top 10 articles were:

                                      • Scott McNealy on How to Keep Your Balance: Lessons and Mistakes
                                      • Critics of Oracle's Cloud Portfolio Miss the Mark
                                      • New and Enhanced Virtual Desktop Client Solutions for Mobile Devices
                                      • Oracle's SPARC T4 Servers Exhibit 4X Adoption Rate Year-Over-Year
                                      • Oracle's New Resources Help Dramatically Speed Transformation to Enterprise Private Cloud
                                      • Read All About It: Oracle Virtualization Newsletter
                                      • Over 3 Exabytes of Media for StorageTek T10000C Tape Drives Shipped
                                      • Philippine Telco Globe Telecom Implements Oracle Fusion Middleware, Oracle Exalogic Elastic Cloud
                                      • Jan/Feb Java Magazine: Java Embedded
                                      • Pillar Axiom 600 Storage System Enables SaaS Provider Avero to Accelerate Application and Data Warehouse Performance

                                      The longer version of this article has list of top ten articles for the last 8 weeks.

                                        IT - Server
                                        x
                                        Cleaning A Compromised Server: How To Detect Boater Shells, Remnants
                                        Search Security January 29, 2013
                                        "My enterprise recently suffered a server breach and we're now trying to clean up. I've noticed more traffic than usual coming from the server and have heard about hackers leaving behind tools called "booter shells" after attacks to be used for future DDoS attacks. How can I tell if booter shells are infecting this server? How can I clean them off if they're on the server?..."
                                          Server's Down: How Do I Find Out What's Wrong?
                                          ComputerWorld January 28, 2013
                                          "Many different problems can creep up on a network, so network troubleshooting skills become crucial for anyone responsible for servers or services on servers attached to a network. Linux provides a large set of network troubleshooting tools, and this article discusses a few common network problems along with how to use some of the tools available for Linux to track down the root cause..."

                                          • Problem: Server A can't talk to server B
                                          • Client or server problem?
                                          • Is it plugged in?
                                          • Is the interface up?
                                          • Is it on the local network?
                                          • Is DNS working?
                                          • No name server configured or inaccessible name server
                                          • Missing search path or name server problem
                                          • Can I route to the remote host?
                                          • Is the remote port open?
                                          • Test the remote host locally
                                          • Test for listening ports
                                          • Firewall rules
                                          • Troubleshoot slow networks
                                          • DNS issues
                                          • Find the network slowdown with traceroute

                                          Read on for more details...

                                          NetBeans
                                          x
                                          The Latest News on NetBeans: Podcast #63
                                          Details on the Release of NetBeans IDE 7.3; Adam Bien; New Governance Board
                                          The guests on NetBeans Podcast #63, the first in 2013, are Petr Jiricka, Hermien Pellissier, Toni Epple, Adam Bien, and M.A. Hossain Tonu. Contents of the 54-minute podcast include news on the release of NetBeans IDE 7.3; details on the activities of recently elected NetBeans Governance Board #20; Adam Bien on the Java EE 6 workshop series; and an interview with the author of "PHP Application Development with NetBeans," M.A. Hossain Tonu.
                                          NetBeans 7.3 RC1 Newly Released
                                          Download It Now
                                          NetBeans 7.3 RC1 has just been released Ondrej Brejla reports, providing a download link. Brejla also lists the main new and improved features now available:

                                          • Parsers for Namespaced Annotations (Symfony 2, Doctrine 2, etc.),
                                          • Basic Composer Integration (Dependency Manager for PHP),
                                          • Twig Code Completion (with documentation),
                                          • Smarty Braces Matching for Related Tags,
                                          • Smarty Parser Errors of Unmatched Tags.
                                          Trending in
                                          Vol 233, Issue 2
                                          Trending IT Articles