News about Oracle's Solaris and Sun Hardware
System News
Feb 11th, 2013 — Feb 17th, 2013 Generate the Custom HTML Email for this Issue
System News System News for Sun Users
Volume 180, Issue 2 << Previous Issue | Next Issue >>
Sections in this issue:
click to jump to section

Oracle Academy, Computer Science Teachers Association Team Up
Plan Sessions for Hundreds of U.S. and Canadian Computer Science Teachers
The Oracle Academy is collaborating with the Computer Science Teachers Association (CSTA) to instruct teachers in the U.S. and Canada in the delivery of the Oracle Academy’s Introduction to Computer Science curriculum. The curriculum includes Database Design and Programming courses and a Java-specific curriculum aligned to Oracle certification and the US Advanced Placement Computer Science A exam. The Oracle Academy and CSTA will host 32 teacher training events and workshops in the training of up to 600 teachers throughout Canada and the U.S. in sessions running from February through August 2013.
Rick Hetherington on the SPARC T5
Plus 'SPARC T5: 16-core CMT Processor with Glueless 1-Hop Scaling to 8-Sockets': Hot Chips Presentation
Rick Hetherington delivers an overview of the SPARC T5 processor, explaining how doubling the number of S3 cores allows the T5 to achieve 2X throughput improvements, and how 28 nanometer silicon enables clock speed increases to 3.66 Gigaherz (GHz). Hetherington adds that on-die PCI Express Rev 3 results in a doubling of I/O bandwidth. Scaling the SPARC T5 to eight sockets and 16 cores gives the processor the capability of gluelessly interconnecting eight sockets for a total of 128 cores, each supporting up to eight independent threads totaling 1024 CPUs. An accompanying Hot Chips presentation provides a detailed look at the SPARC T5.
Network Virtualization and Network Resource Management
Part 5 of Virtualization Series by Detlef Drewanz
Detlef Drewanz has posted part 5 of his series on virtualization, defining and discussing the features of internal and external network virtualization and network resource management in this segment. Drewanz explains the features that are part of virtualization products, calling them the "glue" that binds all the VMs, zones, and containers together and enables them to communicate among themselves and with the outside world. He then recommends the employment of several types of network resource management tools, including constraints, scheduling, and partitioning.
IT - Storage
Maximize SQL Performance By Integrating SSD Software & Hardware
Storage Switzerland, Feb 14th, 2013
"Getting the most performance impact from a flash purchase involves more than just buying fast hardware or efficient caching software. Both of these components must work together to maximize their use of processing power that’s available.

The hardware certainly must generate as many IOPS as possible to the flash layer, which means an optimal design that includes low latency and high parallelism. But if the hit ratio to the cache is low then the application is going to wait for data to be fetched from the disk layer, wasting those available IOPS. This means CPU cycles must be 'spent' on the software process that decides which data is cache worthy, in order to eliminate cache misses.."

Deduplicating Across the Enterprise
Storage Switzerland, Feb 14th, 2013
Bringing solutions to market which help manage and contain the proliferation of data is paramount for any storage supplier intending to be effective in a competitive market. Various industry sources conservatively estimate that enterprise environments can expect their data to double in size every two years. In a climate where IT budgets are flat, industry storage manufacturers need creative, low cost ways to build efficiencies into their offerings to help storage administrators stem the growth of data in their environments..."
    Dispose of Old Storage & Media, Feb 8th, 2013
    "Your data center was built to store vast amounts of information, both mundane and highly sensitive. So when your storage devices are in need of an upgrade or a refresh, that data needs to be protected or completely eradicated.

    Security issues, industry regulations, and company polices can create obstacles to disposing of your old storage and media. Here’s what you need to know to ensure safe, secure destruction or recycling..."

    Hyperscale Storage: Not If, When
    Wikibon, Feb 12th, 2013
    "On January 22, 2013, the Peer Incite gathered to discuss commercial applications and hyper-scale storage. Joining the community was Russ Kennedy, Vice President at Cleversafe, winner of the Wikibon CTO award for the Best Storage Technology Innovations of 2009..."
      ANALYSIS: Storage Start-Ups in 2012, Feb 15th, 2013
      "In 2012, we counted 67 investment rounds initiated by storage start-ups, a good number.

      It was 62 in 2011 and 68 in 2010, a stable figure but far from the record of 76 and 77 in 2004 and 2005, respectively. This small increase last year is not bad news for storage, still one of the most dynamic sectors in the IT industry, continuing to be appreciated by VCs that dream of what some of them got following the acquisitions of firms like 3par, Data Domain and Isilon few years ago at more than $2 billion.

      But the investors in these latter three start-ups were lucky as generally most of them have to invest in several new ventures to finally win the jackpot.

      Already five new rounds have been registered in 2013."

        IT - Technology
        IBM's Watson Could Be Healthcare Game Changer
        InformationWeek, Feb 11th, 2013
        "It was an amazing feat when Watson, IBM's "cognitive" -- listening, "thinking" and learning -- computing platform handily beat two Jeopardy grand champions in February 2011, but it also left us wanting to know if, when and how the technology would be used in the real world. The world got its first glimpse of Watson at work in a commercial setting on Friday when IBM announced the release of three new health care decision-support applications..."
        One CIO's 2013 Tech Wish List
        Washington Technology, Feb 7th, 2013
        "One of the key roles for a chief information officer is staying ahead of technology trends and how they affect our industry. Besides tracking the latest trends, I also look out for tools that will make our organization more efficient so we can help our customers meet their mission.

        To do this, I would like to see certain technologies mature in 2013. The list includes more efficient sign-on capabilities, more efficient software for mobile devices, improved collaboration capabilities, information sharing tools for a distributed workforce and ideas for big data..."

        Oracle Solaris 10 1/13 -- What's New
        A Summary of Enhancements and Improvements for both SPARC and x86
        "What's New in the Oracle Solaris 10 1/13 Release" summarizes features in the Oracle Solaris 10 operating system (OS) that are new or have been enhanced in the Oracle Solaris 10 1/13 release. Feature descriptions are included for both SPARC and x86 based systems, where appropriate. Enhancements to installation, system administration, security, networking, file system, device management, system performance, system resources, and freeware are detailed, along with information on new device support, drive enhancements and additional software enhancements.
        Oracle Delivers Unique Value with Oracle Solaris: IDC White Paper
        IDC Takes a Second Look at Oracle Solaris and Customer Attitude
        In his comments on the revised IDC white paper "Oracle Delivers Unique Value with Oracle Solaris" Larry Wake remarks on its highlighting of how Oracle Solaris 11 is optimized for cloud computing, with unique virtualization, scaling, and provisioning capabilities, evidence, Wake notes, of Oracle's increased investment in Solaris since the Sun acquisition. White paper co-authors Gary Chen and Al Gillen include a case study based on the experience of Synodex, a medical records processing company that adopted Solaris 11 early. The white paper also notes a revitalized level of customer confidence in Oracle Solaris since 2010 vis-a-vis competitive major Unix solutions.
        Cloud Computing
        Oracle IaaS with Capacity on Demand Enables Users to Pay for Capacity as Needed
        Engineered Systems Hardware Deployed On-premise for a Monthly Fee
        Oracle's portfolio of cloud products continues to grow. The latest addition is Oracle Infrastructure as a Service with Capacity on Demand (Oracle IaaS). Oracle’s newest private cloud offering enables organizations to deploy Oracle Engineered Systems, including Oracle Exadata Database Machine, Oracle Exalogic Elastic Cloud, Oracle Exalytics In-Memory Machine, Sun ZFS Storage Appliance, and Oracle SPARC SuperCluster, in their own data centers for a monthly fee. Instead of buying or leasing the hardware, and without making an upfront capital expenditure, customers can deploy on-premise, spreading the cost over time by paying a simple monthly fee, adding or shedding additional capacity as required.
        IT - Cloud
        Cloud Security Tips and Tricks
        Network World, Feb 11th, 2013
        "Users and security consultants familiar with the process of securing hybrid clouds have one steady piece of advice to offer: the only way to go is one step at a time.

        'Managing hybrid security is a matter of setting policy across all of the security touch points IT is already used to managing. It's about being consistently diligent at every turn,' says Joe Coyle, CTO of IT consultancy giant Capgemini North America..."

        10 Secrets to Making the Cloud Business Transformation
        CRN, Feb 8th, 2013
        "The cloud computing revolution -- a treacherous business model and technology shift -- has resulted in record consolidation in the solution provider market in the past several years. The exponential rate of change has obliterated the old product-dominated solution provider business model in favor of a services model where annuity-based managed services/professional services with a high quotient of a partner's own intellectual property are front and center. Here are 10 tips from solution provider CEOs who have been successful making the cloud computing business transformation..."

        • Get A Plan
        • Measure Your Progress
        • Focus On High-Value Managed Services
        • Develop A SaaS Offering
        • Let Go Of The Past
        • Develop Unique Cloud Computing Intellectual Property
        • Build A Robust Application Development Business
        • Forego Short-Term Satisfaction To Achieve Long-Term Gain
        • Go Big Or Go Small
        • Listen To Your Customers

        Read on for details.

        Cloud Security Measures Too Opaque for Customers
        Dark Reading, Feb 13th, 2013
        "With nearly half of IT managers avoiding cloud services over worries that their data will be leaked, it is time for cloud providers to become more transparent.."

        "The apparent cost benefits and flexibility of cloud services may have convinced companies' front offices to dive into the cloud, but convincing corporate security teams is another matter. Nearly seven out of eight information-technology professionals do not trust cloud providers to protect their companies' most sensitive data, according to a recent survey conducted by Lieberman Software..."

        Don't Get 2e2'd: How to Survive When Your IT Supplier Goes
        The Register, Feb 11th, 2013
        "I used to know a finance director who had a favourite mantra: “Minimise fixed costs.”

        The concept's a simple one: by all means use permanent staff to deal with the aspects of your business that don't change much, but where your revenue streams go up and down, think of ways of allowing the cost of servicing those revenue streams to vary in unison with the ebbs and flows.

        Outsourcing is an obvious way to look, and companies all over the world are doing it. Yet in the last couple of weeks one of the UK's major service providers, 2e2, has gone spectacularly pear-shaped..."

        Hybrid Clouds Pose New Security Challenges
        Network World, Feb 11th, 2013
        "If 2013 is the year enterprises begin implementing their hybrid cloud strategies, as the experts are predicting, then it follows that this will also be the year when hybrid cloud security takes center stage.

        According to analysts, industry watchers and security practitioners the bad news is that there is no silver bullet on how to fully accomplish security in a hybrid cloud..."

        Cloud Issues Challenge Companies
        Baseline, Feb 4th, 2013
        "The verdict is in: The cloud has become an accepted part of the IT toolkit, but a closer look under the hood indicates that a number of cloud aspects continue to confound and expose businesses. Security vendor Symantec recently released its 'Avoiding the Hidden Costs of Cloud 2013' survey, and the findings make it clear that companies continue to find storing, protecting and recovering data in the cloud to be major challenges..."
        3 Deep, Dark Secrets of Cloud Computing
        CIO, Feb 12th, 2013
        "The promise of cloud computing is that you, the customer, don't ever have to buy another server, back up another disk drive or worry about another software upgrade. All those promises are true—and now there are multimillion-dollar companies without a single server closet. Cool.

        Unfortunately, too often cloud applications and services are bought by people who really shouldn't be buying. Sure, they may have the budget—did you hear Gartner's prediction that the CMO will spend more on tech than the CIO by 2017?—but that doesn't mean they necessarily have the training to make good IT decisions, let alone the discipline or skills in their underlings to actually execute a coordinated technology strategy."

        Learn To Fail and Avoid the Next Cloud Outage
        Network World, Feb 11th, 2013
        "The total public cloud services market in 2011 was $91 billion and it will grow to $207 billion in 2016, according to Gartner. Despite this tremendous surge, large, very publicized cloud outages have everyone thinking about cloud risks. The reality, however, is that outages with large public cloud providers aren't more common than they are with a business' own private infrastructure. In fact, for many organizations, these cloud providers probably provide better uptime than they could achieve on their own.

        The trick is to design for failure..."

        IT - CxO
        Half of Ex-Employees Walk Off with Corporate Data
        eWeek, Feb 6th, 2013
        "A new survey from Symantec and the Ponemon Institute reveals that 56 percent of employees do not believe it is a crime to use a competitor's intellectual property.

        Co-workers who left their jobs for one reason or another may have walked out with a lot more than their last paychecks or the clothes on their backs.

        According to a new report by Symantec, half of the employees who left or lost their jobs in the last 12 months kept confidential corporate data, and about 40 percent plan to use it in their new jobs..."

          3 Ways That IT Still Fails Itself
          Information Week, Feb 11th
          "My InformationWeek colleague Chris Murphy recently wrote a pair of columns: "6 Ways IT Still Fails The Business," followed by "5 Ways Business Still Fails The IT Organization," both of which struck a nerve with some of my colleagues at the city where I'm CIO. But let me suggest another way to look at this complex relationship: There are times when we in IT fail ourselves..."

          • We Fail To Automate IT
          • We Don't Ask Our Business Colleagues For Help
          • We Fail To Report What We Do

          Read on for details.

          Getting Into the Heads of Departing Insiders
          Dark Reading, Feb 12th, 2013
          "Here's an age-old security riddle: Where and when is theft of intellectual property (IP) not really theft? Answer: In the minds of your employees, when they're headed out the door for the last time.

          Survey after survey has shown that departing employees view the raiding of customer lists and IP about as lightly as a toddler with a chair views his swipe at the cookie jar on the kitchen counter. Experts say that the only way to combat the mentality is to understand where it comes from. It is only then that enterprises can use smart people skills, solid policies, and unconventional educational techniques to keep insiders from flying the coop with the golden egg..."

          Give Killer Presentations: Think Like a Writer
          Computerworld, Feb 9th, 2013
          "Business presenters have every advantage: A captive audience, big graphics and the benefit of being there in person. Yet most presenters fail to break free from the soul-killing dreck that makes PowerPoint presentations so dull.

          Have you ever wondered how good novelists can hold a reader's attention for hours at a time with nothing but words on a page? Have you wondered how good Web writers can keep people glued to the screen when the whole Internet beckons?..."

            Why You Shouldn't Punish Employees Who Goof Off
            CIO Feb 8th, 2013
            "Employees who buy stuff online aren't slackers. Step back and look at the contributions they make outside normal business hours (whether at home or at their desk) before you watch them like a hawk, make them sign a timesheet and restrict their Internet habits...

            A Today Show segment this week focused on what companies were doing to stop cyber-slackers. It seems—and this should hardly surprise any of us—that folks often use their company PCs and Internet connection to do things like shop at work. Shame on them, the story said, encouraging efforts to stamp out these horrid practices and make sure people are working properly..."

              Reducing Insider Security Risks, Data Loss: 10 Best Practices
              eWeek, Feb 7th, 2013
              "It's not uncommon for large enterprises to spend millions of dollars on IT tools to defend against security threats. Yet they continue to experience security compromises and data breaches. These threats to massive quantities of highly sensitive data are increasing in both volume and sophistication.

              However, one significant cause that is also extremely challenging to mitigate is employee risk. According to research by the Ponemon Institute, insider negligence is still the No. 1 data security risk; more than three-quarters of IT professionals report that their organizations have experienced a data breach due to insider risk, whether it was malicious or negligent..."

              Big Data Appliance X3-2 Updates
              Review of Changes in Hardware and Software
              The release of Big Data Appliance X3-2 includes improvements in both the hardware and in the software, reports Jean-Pierre Dijcks. The new 2 x 8-core count CPU (as compared to the earlier 2 x 6-core CPU) results in more parallel compute power while saving some 30% in energy and heat. Changes in the software include CDH 4.1.2 and the default set up of highly available name nodes for Hadoop, the Oracle Enterprise Manager management of the BDA, the uptake of the Oracle R Distribution and the updates to Oracle NoSQL Database, as well as numerous bug fixes.
              Evaluating and Comparing Oracle Database Appliance Performance
              White Paper Reports Performance on OLTP- and DSS-type Workloads
              "Evaluating and Comparing Oracle Database Appliance Performance," an Oracle white paper, documents the performance testing on OLTP- and DSS-like workloads executing of Oracle Database Appliance. During the performance testing Oracle Database Appliance demonstrated scalable performance for both workloads. Using all 24 cores, Oracle Database Appliance supported 10,000 concurrent Swingbench users and more than 9800 Swingbench transactions per second while maintaining an average response time of less than 30ms. With the DSS type workload, Oracle Database Appliance easily supported a sustained IO throughput of more than 2400 MB/Second. Some configuration adjustments and tuning were needed to obtain maximum performance from the Oracle Database Appliance.
              IT - DR
              Bart Perkins: After Superstorm Sandy, an Opportunity to Be Better Prepared
              Computerworld, Jan 14th, 2013
              "It's a pretty safe bet that a lot of organizations in the Northeast are bulking up their business continuity plans (BCP) right now. That's because many of them were left in the rubble following Superstorm Sandy, and experience is often the best teacher.

              If your organization escaped that disaster, you should let the experiences of those that got hit be lesson enough for you. Don't wait until it's too late; the whole point of a BCP and an information systems contingency plan (ISCP) is to be prepared before catastrophe strikes..."

              Blackout: Don't Drop the Ball When the Lights Go Out
              AITS, Feb 8th, 2013
              "When the most watched sports event in the country goes dark, it’s time for smart leaders everywhere to pay attention to what happens next.

              Super Bowl XLVII showed us how technology can fail in a spectacular way – despite years of planning by the most seasoned professionals.

              First, the background: 90 seconds into the second half of the game, power was lost within the Mercedes-Benz Superdome. According to the Washington Post, a piece of equipment monitoring the electrical load sensed an abnormality – and threw a breaker to isolate the problem..."

              IT - Networks
              Five handy applications for Wi-Fi
              TechRepublic, Feb 11th, 2013
              "Brien Posey shares some utilities that can help you to get the most out of what Wi-Fi has to offer.

              In just over a decade Wi-Fi has gone from relative obscurity to becoming nearly ubiquitous. Like any other popular technology, there are numerous utilities that can help you to get the most out of what Wi-Fi has to offer..."

              • Virtual Wi-Fi Router
              • Hotspot Shield
              • WiFi Guardian
              • Xirrus Wi-Fi Inspector
              • WiFi Profile Manager

              Read on for details.

              Build Your Understanding of Software-Defined Networking
    , Feb 8th, 2013
              "Software-defined networking, or SDN, is a relatively new approach in the IT world. But in the next few years, it could become the go-to technology for data center networks.

              Where today’s networks are traditionally hardware-oriented and difficult to make changes to in many instances, SDN separates the control plane from the access plane and uses software to improve network performance and agility. There's plenty of promise for how it could reshape the data center network, with many vendors working to bring products to market..."

              Top 5 Criteria to Assure the Successful Rollout of a Global Telecom Expense Management Initiative
              NwtworkWorld, Feb 8th, 2013
              "The use of telecommunications within large organizations has increased significantly as the business ecosystem of customers, partners and employees has become more complex and globally intertwined. This changing environment now requires investment in a plethora of technologies to successfully conduct business and manage relationships. In response, many organizations have started either to establish or consider a telecom expense management (TEM) initiative..."
              IT - Operations
              5 Ways the Help Desk May Be Hurting You
              Network World, Feb 8th, 2013
              "Aptly named, a company's help desk is primarily focused on resolving technology issues so the business as a whole can function successfully. Despite the best of intentions, however, help desks can put the company at risk by using legacy tools, shared passwords and incomplete security practices.

              The start of a new year is a great time to examine these issues, so IT leaders can ensure their help desk is better positioned to help, and not hurt, the company in 2013. Here are five things to guard against..."

              • Using outdated remote access tools
              • Sharing generic passwords
              • Focusing on the same old metrics
              • Impeding telecommuting and BYOD
              • Lack of knowledge sharing

              Read on for details.

              10 Things to Do With Old Computing Equipment
              TechRepublic, Feb 5th, 2013
              "Few companies amortize their computing equipment for more than three years of useful life. So once computing assets reach the end of the line, what do you do with them? In 2013, some best practice answers remain the same, but others are new. Here’s a checklist for dealing with old IT equipment..."

              • Meet your green requirements
              • Work with local schools
              • Use older equipment for training and testing
              • Cannibalize
              • Work your trade-ins (lease/buy)
              • Sell to the third-party market
              • Cycle down older equipment to low power users
              • Sell or auction older equipment to employees
              • Donate to charities
              • Sell for scrap

              Read on for details.

                Sage Conversations: Out With the Old And In With the New
                Security InfoWatch, Feb 12th, 2013
                "Your budget for security operations is 90 percent plumbing. As such, it is difficult to migrate away from the expense of your mundane, dead-end technology over to innovative, long-term scalable solutions. However, solutions are emerging that will optimize the way you mitigate risk and drive innovation within your organization. Embracing innovation will allow you to cut costs, eliminate inefficiencies and create a path to new value..."
                Six Tips for the Care and Training of New Users
                NetworkWorld, Feb 11th, 2013
                "As a responsible IT organization you have to recognize that this is a big responsibility. Your user is probably nervous in his new surroundings and doesn't know how to behave in his new IT environment.

                Whatever Human Resources has told him can't possibly prepare him for what he needs to know in your digital environment and he's probably already developed bad habits from wherever he was before. Your job is to make sure he's going to become a happy productive worker who won't complain and ask dumb questions and make dumb mistake that will aggravate you.

                To help you train your new user I have six tips that will ensure your user stays out of your hair, knows his place, and doesn't waste your valuable time..."

                  Data Center Operators Take On More Risk As Budgets Dive
                  Wall Street & Technology, Feb 14th, 2013
                  "As data centers continue to juggle tighter budgets, many are taking on more risk than ever before, according to a new report.

                  Data centers have traditionally been risk-averse. 'When times were good, money was no object and we were extremely risk averse. If we needed to have two of everything, we had two of everything. We're now more willing to accept risk than we ever have been,' one source said in a report by DCD Intelligence, the research arm of DatacenterDynamics.

                    IT - Security
                    Manage insider threats: Knowing where the risks are
                    TechRepublic, Feb 13th, 2013
                    "Too often, we view insider risk as a homogenous threat landscape; employees with access do bad things and there is business impact. While this description is somewhat accurate, it doesn’t provide enough information with which to manage risk. What we need is a deeper look at what types of threats exist, the business roles involved, and the signs that typically exist when an employee, vendor, etc. is not complying with policy, law, or ethics. Armed with this information, organizations can implement administrative, technical, and physical controls to mitigate insider risk.

                    In this opening article, we look at the three categories of insider threats..."

                      5 Myths about Awareness
                      CSO, Feb 11th, 2013
                      "I'm often amazed by all the myths and misconceptions that pervade the security community when it comes to security awareness training. Here are the most common falsehoods I have heard, and why they are wrong..."

                      • Training does not work
                      • It's not worth it because someone will still mess up
                      • People already know what to do
                      • It's all about prevention
                      • It's simple

                      Read on for details.

                      10 Shocking Security Exploits
                      CIO, Feb 11th, 2013
                      "Bad guys are getting creative. Rather than targeting Internet Explorer, now they're gunning for your virtual machine, your video games, and your Web-connected thermostat..."

                      • The chamber of chaos
                      • peep at your printer
                      • Too smart for their own good
                      • Why DRM sucks, part 3279
                      • Steam-soured
                      • Bait-and-switch done wrong
                      • Yes, VMs can play Crisis
                      • I'm in ur base, spying on ur d00dz
                      • Simon says 'Pwned'?
                      • Bad-news Borg

                      Read on for details.

                        12 Hybrid Security Products to Watch
                        Network World, Feb 11th, 2013
                        "Securing a hybrid cloud describes the process by which IT employs a host of products to manage the security parameters of your hybrid cloud installation. Hybrid cloud security products can be delivered in a box that gets deployed on premise at a customer's site. But increasingly security vendors are offering a hybrid approach to their product portfolios whereby customers can buy a physical box or buy the security capability as a service..."

                        • IronPort S-Series appliances and ScanSafe service
                        • Proxy SG and BlueCoat Cloud Service
                        • Security Gateway and Securty Gateway Anywhere
                        • Zscaler Web Security
                        • vSentry
                        • vSecurity
                        • ArcSight
                        • QRadar
                        • McAfee Enterprise Security Manager
                        • Access Governance Software Suite
                        • Access Assurance Suite and CourionLive
                        • Identity IQ

                        Read on for details.

                        EU Proposes To Make Data Breach Disclosure Mandatory
                        Help Net Security, Feb 7th, 2013
                        "The European Commission has today announced the launch of new proposals that include a requirement for EU member states to appoint an independent CERT and pivotally calls for each to create a national authority to whom companies, whose functions are critical to the economy, must report data breaches.

                        This body would then be responsible for deciding whether to make the breaches public and whether to fine companies..."

                          How Lockheed Martin's 'Kill Chain' Stopped SecurID Attack
                          Dark Reading, Feb 12th, 2013
                          "A few months after RSA had rocked the security world with news that it had been breached and its SecurID database exposed in a sophisticated attack, defense contractor Lockheed Martin discovered an intruder in its network using legitimate credentials.

                          "We almost missed it," says Steve Adegbite, director of cybersecurity for Lockheed Martin, of the intrusion sometime around May or early June 2011. "We thought at first it was a new person in the department ... but then it became really interesting."...

                          Is Our View of Cybersecurity Too Local?
                          FCW, Feb 7th, 2013
                          "Cybersecurity is a top priority for most agencies, as evidenced by ongoing efforts to formulate, tweak, and implement relevant plans and policies. But there is a big world beyond America's borders. Could looking at the global landscape help the government better shape its approach to securing U.S. cyber interests? Examining decidedly nontechnical factors -- including socioeconomics, demographics and the rapidly changing nature of Internet users -- could help inform cyber policies and make them more effective, according to a new study from Microsoft..."
                          Is Your Security Plan Proactive or Reactive?
                          CSO, Feb 5th, 2013
                          "Charles Renert, vice president of research and development for Websense Security Labs, stopped by CSO's headquarters today. The discussion was primarily around an upcoming threat landscape report Websense will be releasing soon. But we also had the chance to discuss Renert's perspective of what he said is a continued emphasis on 'reactionary' security among many organizations and security leaders.

                          "A lot of the companies I talk to don’t make a proactive investment,' Renert told me. 'They wait to be attacked, then put measures in place. But, in the heat of the battle, you aren't going to have good security architecture in place.'..."

                          Security Standards Council Cuts Through PCI Cloud Confusion
                          Network World, Feb 7th, 2013
                          "Can you hold Payment Card Information (PCI) data in a cloud-based service? Yes, but doing so isn't straightforward, so the PCI Security Standards Council has published a guideline that clarifies what approaches compliance-minded businesses can take..."
                          The 5 Places That Security Testing Should Happen, But Doesn't
                          Computerworld, Feb 12th, 2013
                          "The seemingly never-ending spate of hacking attacks is now the unfortunate norm across the web landscape. Among the casualties lay everything from personal data to entire companies who have been mercilessly eradicated in the Darwinian world of web vulnerabilities...."
                            IT - Careers
                            8 Tips for Job Hunting While You're Still Employed
                            CIO, Feb 12th, 2013
                            "Job hunting while you're still working in your current position can be a double-edged sword. Candidates who are employed are typically more attractive to employers. However, it can be dangerous. Learn what it takes to balance your current job and your career search--without getting cut..."

                            • Who Can You Tell
                            • Don't Conduct Your Search on the Company Dime
                            • Don't Use Company Email Addresses or Phone Numbers
                            • What Should You Do If Your Boss Asks You Directly?
                            • Don't Be Careless With Your Resume
                            • Don't Say Negative Things About Your Current Employer
                            • How to Handle References
                            • Selling Your Personal Brand is Easier When Employed
                            • Put Yourself in the Best Position

                            Read on for details.

                              The CIO resume vs. The CTO resume
                              TechRepuplic, Feb 13th, 2013
                              "Don't confuse the position of CIO with CTO when you’re applying for one of those jobs. Resume expert Jennifer Hay talks about the difference..."

                              "I admit it! I regularly peruse web sites for resume samples because I’m just nosy about how other people write IT resumes. I prefer to be delighted and amazed but it’s not always the case. My first impression when I read the summary below was that it was well-written to blend an executive’s technical strengths with his business management skills, a great combination since many organizations want the IT department to be run like a business. At second glance, however, I noticed a major snafu, the summary was written for a CTO and not for a CIO as I had assumed from reading the paragraph below:.."

                              IT - Social Media
                              Four BYOD Policy No-Nos
                              IT World Canada, Feb 11th, 2013
                              "Take note of these four bring-your-own-device policy missteps to protect your company's assets and help your employees get the most out of BYOD...

                              These days it's getting harder for some companies to justify not opening up the corporate network to worker-owned devices.

                              Whether you’re contemplating or already have a bring-your-own-device policy in the workplace, it might be useful to take note of these four BYOD missteps that are certain to compound your IT department’s headaches or even waylay a well-intended BYOD plan ..."

                              IT - Virtualization
                              Virtualising a server to retain legacy software
                              TechRepublic, Feb 12th, 2013
                              "Virtualisation can buy you a little more time when you can’t face replacing that aging application. Mark Pimperton describes how and why his company did it.

                              We never run servers outside their manufacturer warranty, and certainly no longer than five years. (If you have physical servers older than that, I hope you have a good risk management strategy in place.) Six months ago I knew we were due to replace our oldest application server in January 2013. Trouble was, the server runs our time and attendance (T & A) software, which won’t run on any OS later than Windows Server 2003. Although it’s often this kind of situation that leads to companies replacing applications, we had neither the time nor the inclination to do so..."

                              IT - Compliance
                              Highly Regulated Companies Tiptoe Into Social Media
                              Computerworld, Feb 11th, 2013
                              "Social networking is serious business within regulated industries. Posts pertaining to finance, insurance and healthcare, in particular, require adherence to strict government and industry regulations. However, even with the rule-a-palooza, some companies in these industries have not only found ways to keep regulators happy, but have also made social networking a productive and key part of doing business..."
                              IT - Backup
                              Data Protection Services -- Make Sure You Get What You Pay For
                              Computerworld Feb 7th, 2013
                              "For those readers growing up in the 1970s, you are probably familiar with the commercials for Fram oil filters. For those who don’t know, they featured a grease covered mechanic talking about how changing your oil filter for a few dollars would prevent far more costly car repairs later on. The tag line was a very convincing: 'You can pay me now, or pay me later.'..."
                                IT - Big Data
                                What's Driving the Focus on Big Data?
                                Information Management, Feb 8th, 2013
                                "As big data continues to rumble loudly among information management trends, two analytic experts contest that most organizations fail to start with the right project design and 'explorative' approach.

                                In a recent Web seminar entitled 'Big Data: Can You Seize the Opportunity' conducted by Harvard Business Review, the basic framework for enterprise big data programs was challenged by presenters Donald Marchand, professor of Strategy Execution and Information Management at IMD in Switzerland and founder of analytics firm enterpriseIQ, and Joe Peppard, analytics consultant and professor of information systems, Cranfield University School of Management in the U.K..."

                                Big Data: Why It's Not Always That Big nor Even That Clever
                                The Register Feb 13th, 2013
                                "You may not realize it, but data is far and away the most critical element in any computer system. Data is all-important. It's the center of the universe.

                                A managing director at JPMorgan Chase was quoted as calling data 'the lifeblood of the company.' A major tech conference held recently (with data as its primary focus) included a presentation on how to become 'a data-driven organization.'

                                The Harvard Business Review says 'data scientist' will be 'the sexiest job of the 21st century.' A separate recent article describing how Netflix is harvesting information about our every gesture, and may transform us from “happy subscribers to mindless puppets”, warned that 'the sheer amount of data available to crunch is already phenomenal and is growing at an extraordinary rate.'"

                                  Big Data Is a Solution Looking for a Problem: Gartner
                                  ITWorld Feb 14th, 2013
                                  "Big Data is forecast to drive $34 billion of IT spending in 2013 and create 4.4 million IT jobs by 2015, but it is currently still a solution looking for a problem, according to analyst firm Gartner.

                                  While businesses are keen to start mining their data stores for useful insights, and many are already experimenting with technologies like Hadoop, the biggest challenge is working out what question you are trying to answer, said Debra Logan, VP Distinguished Analyst at Gartner..."

                                  Don't Hurt Those Close to You with Bad Data
                                  HealthData Management Feb 14th, 2013
                                  "Has this ever happened to you? It happened to a friend of mine. You open a performance report, one that's been sent to your boss and all the top executives in your company, and it states that your group is failing to meet company mandated quotas and therefore its performance is poor. Your heart sinks and you think, 'I don't need this.'

                                  Then, knowing how hard you and your team have been working in this particular area, you take a closer look at the numbers and realize that all the data points in the report are wrong..."

                                  Getting Big Data Results ASAP
                                  Big Data Republic, Feb 5th, 2013
                                  "As a closer to last week's Speed to Solution: Are There Shortcuts to ROI? webinar, there are some approaches worth taking, and some you should definitely avoid.

                                  One great way to stay on top of all of the tasks involved in a complex data project, and stay close to your business stakeholders, is to use a lightweight version of the Agile development methodology.

                                  You may choose to do two-week sprints where the project tasks are divided into manageable chunks, that when all completed, add up to the delivery of the full project. Decompose your project into a series of user stories, which can be understood by both developers and non-technical business users..."

                                    How to Beat the Big Data Disconnect
                                    InformationWeek, Feb 11th,2013
                                    "Your organization has its shiny new Hadoop platform in place -- great. You've spent a sizable chuck of your budget on big data appliances, and your IT folks have spent countless hours figuring out how everything works.

                                    Now what? Many organizations at this point "hit a bit of a roadblock," according to David Smith, vice president of marketing and community for Revolution Analytics, a software company and one of the guiding forces behind the open source R programming language. Forbes recently selected Smith as one of the top 20 influencers in the big data space..."

                                    What's Working (and Missing) from Analytics Graduate Degrees?
                                    Information Management, Feb 5th, 2013
                                    "A young colleague of mine is about a third of the way through an M.S. in Analytics program from a prestigious university. Though there are the inevitable startup frustrations, she likes her studies a lot, noting she’s learning a ton about predictive modeling, data mining and new-to-her software like SPSS, SAS and R.

                                    She feels she's among the better technically-trained students and that her programming and data chops make the program an easier go than for her less-techie peers. If she could change one thing, it'd be to introduce a big data focus to the curriculum..."

                                    IT - Mobile
                                    10 Things to Consider When Choosing an MDM Solution
                                    TechRepublic, Feb 7th, 2013
                                    "Mobile device management (MDM) solutions provide security, reporting, and management for mobile devices that access your network. Unfortunately, it’s becoming a crowded “flavor of the month” market, with many vendors, consultants, and analysts putting their own spin on this critical security solution, which is integral to any Bring Your Own Device (BYOD) initiative.

                                    Let’s break down some MDM considerations..."

                                    • Corporate vs. mobile user expectations
                                    • Trial period
                                    • Device support
                                    • Security management
                                    • Inventory management
                                    • Software distribution
                                    • Service management
                                    • Policy management
                                    • Level of reporting
                                    • Hosted vs. onsite

                                    Read on for details.

                                    Moving Beyond No
                                    CIO Insight, Feb 12th, 2013
                                    "A couple of years ago, the edge of corporate sanity revolved around whether to adopt social media, BYOD and cloud computing. Now, the focus is on how to best tap into these tools and technologies. CIOs who dawdle and resist this new order risk total failure. There is no breathing space.

                                    Social media is no longer merely a quaint tool used for marketing on Facebook and for monitoring customers on Twitter. It's increasingly tied into enterprise collaboration, knowledge sharing, big data analytics and business process management. The ability to collect and deliver pertinent process data at the right time is nothing short of transformative..."

                                    IT - BYOD
                                    Authentication with Cloud, BYOD: It's Complicated
                                    GCN, Feb 8th, 2013
                                    "The true foundation of enterprise authentication and access control is pretty simple: establish identity. This includes both human and machine identity. As cloud services proliferate, the need for reliable authentication and access control methods also grows. This has led to the emergence of multiple authentication services (both on-premise and off-premise) from a variety of providers.

                                    Besides cloud growth, other disruptors are emerging to help boost the need for authentication services. They include:..."

                                      Avoiding Basic BYOD Blunders
                                      CSO, Feb 14th, 2013
                                      "For all the sophistication and power of the modern cell phone or tablet, people think of them more or less like pens: You can use the generic ballpoints they have at the office, or you can bring the one you like from home. That's a consequence of high technology becoming pervasive. People use technology widely, and they might prefer what they use on their own time.

                                      Pens, of course, can't access corporate networks (yet). But cell phones and tablets represent powerful computing devices; people might even be able to get more done using their personal devices for work..."

                                        BYOD: A Cost-Saving Must-Have for Your Enterprise
                                        CIO Insight, Feb 11th, 2013
                                        "If last year could be marked by anything, it was the BYOD craze. Companies across the globe increasingly invested in consumer products, and allowed their employees to bring their own devices into the office. That has been good news for Apple, Samsung and other consumer-focused vendors, and has dramatically changed the face of enterprise mobility and computing.

                                        A new study from Good Technology sheds some more light on the popularity of BYOD in the enterprise. With BYOD programs in place, companies are cutting costs and increasing overall efficiency. Better yet, employees are fine with paying the cost of investing in a personal device that can be used in the enterprise. Simply put, BYOD has caught the enterprise by storm and there is no indication that it'll slow down anytime soon..."

                                        BYOD Is Increasing IT Frustration and Loss of Control
                                        Help Net Security, Feb 7th, 2013
                                        "IT is concerned about rising mobility costs and feeling frustration and loss of control over BYOD, according to iPass and MobileIron. The majority of survey respondents (57 percent) thought their mobile data roaming costs would rise in 2013, with eight (8) percent saying they'll rise more than 25 percent.

                                        BYOD is creating new challenges for IT. The top two sources of frustration were onboarding and then supporting the increasing number and variety of personal devices, far outranking even security concerns. The survey also found that IT is increasingly losing control of mobility budgets as departments assume greater responsibility for mobile initiatives..."

                                        BYOD: Reaching the Peak? Or Just Getting Started?
                                        Information Management, Feb 11th, 2013
                                        "The mobile workforce has arrived, but the peak debates over device ownership and control are probably a few years off, according to a new mobile workforce analysis from Forrester Research.

                                        In the '2013 Mobile Workforce Adoption Trends,' Forrester VP and Principal Analyst Ted Schadler collected and assessed survey responses from 9,766 information workers at SMBs and enterprises in 17 countries, including the U.S., U.K. and Canada..."

                                        Wearable Tech Will Create BYOD Tsunami
                                        Internet Evolution, Feb 12th, 2013
                                        "The next big shift in IT's cycle will come strapped to our wrists.

                                        We are already migrating into a landscape of people who are empowered with information-gathering and reporting devices. These portable devices, in order to be truly effective, require interaction with the cloud or the Internet. But today, these devices rely heavily on tethering, a trend that will not last given our insatiable demand for mobility and flexibility. Users, from top executives to students, will increasingly insist upon WiFi connectivity..."

                                          Top Ten Articles for last few Issues
                                          Vol 180 Issue 1; Vol 179 Issues 1, 2, 3, 4 and 5; Vol 178 Issues 3 and 4
                                          We track how frequently each article is viewed on the web site to determine which the readers consider the most important. For last week, the top 10 articles were:

                                          • Are We There Yet? - Oracle's Map for the Journey to Database Cloud
                                          • Oracle VM Manager 3.2 Now Supports Both SPARC and x86
                                          • How to Configure a Failover Guest Domain in an Oracle Solaris Cluster
                                          • Solaris 11: Basic Tool for Building Your Developer Cloud
                                          • Information Management and Big Data: A Reference Architecture
                                          • Oracle Snap Management Utility for Oracle Database
                                          • Exadata Operational Management: Whitepaper Series
                                          • Siebel Benchmark on SPARC T4
                                          • Oracle White Paper Labels StorageTek SL150 Modular Tape Library Superior to Quantum's Scalar Line
                                          • New Collection of ExaLogic Reference Material

                                          The longer version of this article has list of top ten articles for the last 8 weeks.

                                            Trending in
                                            Vol 235, Issue 2
                                            Trending IT Articles