News about Oracle's Solaris and Sun Hardware
System News
Mar 4th, 2013 — Mar 10th, 2013 Generate the Custom HTML Email for this Issue
System News System News for Sun Users
Volume 181, Issue 1 << Previous Issue | Next Issue >>
Sections in this issue:
click to jump to section

Enterprise Strategy Group Nixes DIY Big Data Solutions; Buy Oracle Big Data Appliance Instead
'Getting Real About Big Data: Build Versus Buy': A Whitepaper by ESG
Enterprise Strategy Group (ESG) has published "Getting Real About Big Data: Build Versus Buy" which, according to Javier Puerta, comes solidly down on the side of buy ... Oracle Big Data Appliance (OBDA), that is. Among ESG's conclusions are that "DIY infrastructure involves a long series of hidden risks and costs and may undermine your organization's ability to deliver big data in the long term." Their findings on OBDA (@$450K per device) are it is 39% less costly than "build your own" ($733k); OBDA reduces time-to-market by 33% vs "build"; and requires fewer expensive Hadoop engineers. The white paper is available for download.
SnapManager for Oracle DB for ZFSSA Now Available
Try It Free for 30 Days
The Snap Management Utility for ZFSSA, as described by Steve Tunstall, combines the underlying snapshot, clone, and rollback capabilities of the Oracle ZFS Storage Appliance with standard host-side processing so all operations are consistent. He calls it a license like the Clone or the Replication license, a one-time, yes-or-no, on-or-off license per controller. The software is available free for a 30-day trial. Purchasers of the SMU license do not need to buy the clone license because cloning is included in SMU. Tunstall provides download instructions for both outright purchasers of Snap and for those who opt for the 30-day free trial.
IT - Storage
Nano-Tech Will Double Hard Disk Capacity in 10 Years
The Register, March 1st, 2013
"HGST, the Western Digital subsidiary formerly known as Hitachi Global Storage Technologies, says it has developed a method of manufacturing hard-disk platters using nanotechnology that could double the density of today's hard drives.

The new technique employs a combination of self-assembling molecules and nanoimprinting, technologies previously associated with semiconductor manufacturing, to assemble patterns of tiny magnetic "islands," each no more than 10 nanometers wide – the width of about 50 atoms.

The resulting patterns are composed of 1.2 trillion dots per square inch, where each dot can store a single bit of information. That's roughly twice the density of today's hard-disk media, and HGST researchers say they are just scratching the surface of what can be achieved..."

    5 Things to Be Aware of BEFORE You Start A Social Media Campaign, March 1st, 2013
    "Have you ever seen a social media status update from a company asking an inane question to their followers? Sure, they get a number of responses, but most people who view it will roll their eyes in vague annoyance. Asking them an unrelated and stupid question without any need for an answer comes off as patronizing and filler. If you can find a fun way to present a question relevant to your product, all the better..."

    • Do NOT Spam Your Social Media Users
    • Run Contests, Not Lotteries
    • Don’t Patronize The User
    • Work Your Way To Multiple Accounts
    • Be Prepared To Cause Offense

    Read on for details.

      Oracle Releases Oracle Solaris 10 1/13
      Still Plenty of Life Left in the Old OS
      Among the attributes of the recently released Oracle Solaris 10.1.13 are the inclusion of the Oracle Solaris Zones Preflight System Checker; the Oracle Solaris Live Upgrade Preflight Checker; and improved transfer speed rates for SSH, SCP, and SFTP in moderate (50ms) to high latency environments. Oracle testing shows scp transfer times of Oracle Solaris 10 1/13 are 1/8 the times of a similarly configured Oracle Solaris 10 8/11 system for multi-megabyte file transfers. Read Glynn Foster's post to learn about the abundant life still left in Oracle Solaris 10 OS.
      Register Now for Virtual Developer Day: MySQL (March 12 and March 19)
      Enhance Your MySQL Skills in Free Two-track Program
      The first two sessions of the free Virtual Developer Day: MySQL are scheduled for May 12 and May 19, 2013. The first session is for the Americas and Canada. The March 19th session is for Europe, Middle East, Africa and Some Asian Countries (English). Cassandra Clark describes the event as a " ... one-stop shop to learn all the essential MySQL skills and the latest features in MySQL 5.6 GA. You'll also be able to ask questions of Oracle’s MySQL engineering, support, product management, and sales consulting teams." The event has tracks for both fresh and experienced MySQL users. Reserve your place today.
      Cloud Computing
      Managing a Private Cloud with Oracle VM Manager
      Better by Far than a 'Roll-Your-Own' Approach
      It is possible to manage a private cloud with home grown solutions, solutions that enable the necessary layering and are capable of managing storage, servers and operating system infrastructure, the database and middleware, along with application administrators for higher layers of the stack. But why go to all that trouble when you could deploy Oracle VM and Oracle Enterprise Manager 12c, which will manage all these aspects of a private cloud for you with so much less trouble? That's what Rick Ramsey advises in directing readers to Richard Friedman's article "What It Takes to Deploy and manage a Private Cloud with Oracle VM."
      Avoiding Silent Data Corruption
      Solutions from Emulex and Oracle Provide End-to-end Data Integrity
      Silent data corruption is insidious but, fortunately, Oracle Database 11g with Oracle Automatic Storage Management; Oracle Linux 5.x or 6.x with Unbreakable Enterprise Kernel versions 2.6.39-200.24.1 or later; Oracle ASMLib 2.0.8 or later; Emulex LPe12000-E or LPe12002-E with firmware 2.01a10 or later and driver or later; and Emulex LightPulse LPe16000 or LPe16000B with firmware 1.1.21 or later and driver or later create a solid preventive measure against the silent corruption of data. Martin Petersen and Sonny Singh's article "How to Prevent Silent Data Corruption" describes the perils associated with silent data corruption and explains the implementation of the data integrity solution.
      New Features in Oracle Linux 6.4
      Just Released Version Has New Unbreakable Linux Kernel
      Oracle Linux 6.4 is now available Lenz Grimmer posts, noting that individual RPM packages have been published from the public yum repository, and ISO images will soon be available from the Oracle Software Delivery Cloud. Oracle Linux 6.4 includes new features, notably a version of the Unbreakable Enterprise Kernel, Grimmer posts, continuing with the news that Oracle now supports the XFS file system for users of Oracle Linux 6 with Premier Support subscriptions. Also new are Ksplice offline client, which now eliminates the requirement to have a direct connection to the internet to apply Ksplice patches, and DTrace for Oracle Linux.
      IT - Cloud
      70% of "Private Clouds" Aren't Really Clouds At All
      Network World, February 26th, 2013
      "If an enterprise data center has a highly virtualized environment, a web portal for business users to request and access virtual machines and a method for tracking how many of those resources are being used... that's not quite a private cloud.

      If there is enough capacity to supply employees with almost any amount of compute resources they need, and scale that capacity up and down dynamically, but it requires IT workers to provision the systems, then sorry that's not a private cloud either.

      The line between virtualization and a private cloud can be a fuzzy one, and according to a new report by Forrester Research, up to 70% of what IT administrators claim are private clouds are not. "It's a huge problem," says Forrester cloud expert James Staten. "It's cloud-washing."

      Amazon, Windows Azure, GoDaddy: How to Avoid Similar Cloud Outages
      eWeek, March 4th, 2013
      "Though the cloud offers IT departments an amazing list of benefits, they are still technology platforms, managed by imperfect human beings. As a result, they are just as potentially error-prone as internal systems. Recent outages remind us all that, in practice, big IT offers only limited improvement in reliability, and in many cases may increase the effects of small human failures. The basic IT tasks of planning, careful change management and continuous monitoring must be universal. It seems even the big guys have had trouble..."
      Cloud Storage: Price wars ahead?
      ZDNet, March 7th, 2013
      "Who doesn't like free cloud storage? Many of us use Dropbox every day. Others build their businesses around Box's OneCloud services. And still others hunt eternally for the most storage for free, which, for the moment, would be Mega's 50 gigabytes.

      But now, Google with its new Chromebook Pixel, has upped the ante. This new cloud-based laptop comes with a terabyte of free storage for three years..."

      How to Survive Inevitable Cloud Failures
      PCWorld, February 28th, 2013
      "Few people are as thoroughly engulfed in the mishmash of online-only services collectively dubbed "the cloud" as I am. Being a modern, always-mobile technology writer, I've arranged my workflow to be completely independent of my physical location. I need the ability to plop down in front of any computer in the world, and suffer from minimal disruption.

      Most of my work is stored in SkyDrive. I coordinate story assignments with coworkers using Google Docs, and live the rest of my life in Gmail, Evernote, HipChat, and Pixlr. Heck, I even subscribe to Slacker Radio and numerous video streaming services so that a world of entertainment is always just a URL away—complete with synchronized playlists and instant queues. (Yep, I'm a cord cutter.)..."

      How to Use the Rogue Cloud to Innovate the Right Cloud
      Network World, March 1st, 2013
      "Employees keep turning to rogue cloud services, storing and sharing highly sensitive information in the public cloud despite IT's warnings about the dangers, and despite story after story that validates those warnings.

      The rise of the rogue cloud isn't always an innocent mistake by happy-go-lucky but otherwise responsible users. Nearly one-fourth of the respondents (23%) in the IDC Innovation Imperative research commissioned by CA Technologies said innovation projects were frequently pursued stealthily, where IT was consciously and deliberately shut out of the projects..."

      Legal Issues to Consider With Cloud Computing
      TechRepublic, March 5th, 2013
      "Cloud computing and SaaS arrangements are growing increasingly commonplace, and the benefits of getting IT out of the infrastructure business are obvious. While the technology is rapidly maturing and moving from novelty to commodity, negotiating contracts with cloud vendors can be a challenge.

      What if sensitive customer data are stolen from your cloud provider? Who foots the bill if aliens (or government actors) abscond with your provider’s servers? Who is liable when the lawsuits start flying?..."

      Ponemon Prognosis Shows State of Cloud Security Improvements
      Dark Reading, March 6th, 2013
      "Incremental improvements in risk assessments and data protection in the cloud, but access control issues abound..

      For as much chatter that the cloud security gap continues to garner at trade shows such as last week's RSA Conference, a new Ponemon Institute study out this week shows that, in many ways, organizations are incrementally improving how they manage the risks around placing sensitive databases and applications in the cloud..."

      The New Normal for Disaster Recovery: Incorporating Cloud-Based Recovery Into Business-Continuity Plans
      Data Center Jornal, February 14th, 2013
      "Enterprises and governments are challenged by operational risks to their often complex and mission-critical IT environments. As businesses and IT become more tightly integrated than ever, forward-looking organizations understand the importance of maintaining IT-based business processes. As IT-dependent processes become more critical to the enterprise, downtime and data loss are less and less acceptable. Traditional recovery times—typically 24 to 72 hours from a most-recent tape backup—are inadequate for most important enterprise applications..."
      Cloud Computing's Big Debt to NASA
      eWeek, March 4th, 2013
      "Though the cloud offers IT departments an amazing list of benefits, they are still technology platforms, managed by imperfect human beings. As a result, they are just as potentially error-prone as internal systems. Recent outages remind us all that, in practice, big IT offers only limited improvement in reliability, and in many cases may increase the effects of small human failures. The basic IT tasks of planning, careful change management and continuous monitoring must be universal. It seems even the big guys have had trouble... helped eWEEK come up with this list of tips for avoiding outages..."

      • Monitor Everything
      • Detailed and Effective Alerting With Escalation
      • Check the Charts Every Morning
      • Create Targeted Map, NOC Views
      • Publish Rich Reports
      • Limit Outages Caused by Human Error
      • Create an Internal Communications Plan
      • Create an External Communications Plan
      • Prevent Issues From Growing Bigger

      Read on for details.

      Cloud Haters: You Too Will Be Assimilated
      ZDNet, March 8th, 2013
      "You despise the idea of losing your individual computing power. You hate subscriber services. You don't trust our security model or feel we are reliable enough. You don't believe your connectivity will ever be good enough. It doesn't matter: Your distinctiveness will be added to our own. We are the cloud. Do not resist us..."
      IT - CxO
      How to Be a James Bond-Style CIO
      Computerworld, March 4th, 2013
      "In the age of tech-ubiquity, it’s easy for CIOs to bury themselves in tools and avoid the people they serve...

      To understand the need for CIOs to enter “the field,” consider the amazing change that’s occurred over the past few years thanks to cloud, mobile, social and other flexible technologies. In old school IT, you spent millions on a huge implementation and then tried to force everyone in the organization to fit their behavior to it. The CIO was like the mother who bought her kid a sweater that he hated and made him wear it because she spent too much for it to sit in his closet.

      • Go undercover
      • Dispose of C-suite demeanor
      • Cross departmental lines with style
      • Departmental operations
      • Departmental challenges
      • Employee frustrations
      • Customer frustrations

      Read on for details.

      IT Age Discrimination or Employee Inertia?
      FierceCIO, March 8th, 2013
      "How much age discrimination is there in enterprise IT departments? That question is trickier than it appears, and it goes beyond the question of whether an IT shop is getting rid of people because they're old versus shedding employees who aren't making the grade.

      "To put a finer point on the matter: Thoughtful cost control doesn't equate to age discrimination," writes municipal CIO Jonathan Feldman at InformationWeek."

      The Four Roles of the New IT Leader
      CIO Insight, March 1st, 2013
      "I was having lunch the other day with a friend of mine who is a CIO at a large organization in the bio-pharma space. As we discussed what the future of IT might look like, I asked him what he was thinking about these days—i.e., what was keeping him up at night.

      'I am really beginning to wonder if the role of the CIO will continue to exist in the future,' he said. 'At the very least, it’s going to look a lot different than it does right now.'..."

      What Do You Know? When Sharing Knowledge, Relationships Matter
      knowit information systems, March 4th, 2013
      "Some workers turn to the Internet when they need answers to questions. Others pop down the hall in hopes that a more knowledgeable coworker is available to help. For managers who want to make such knowledge-sharing in their organizations as efficient as possible, the best strategy just might be a combination of all three -- technology, social networks and available time.

      That's one conclusion that Su Dong has drawn from his research on how workers in knowledge-intensive industries share what they know about the tasks they perform..."

        Two Great Reads On Risk Management
        CMO, March 1st, 2013
        "Two recent articles on CSOonline can help expand your knowledge of risk management:

        How to determine your real risk appetite. So you've probably experienced or seen this before: You describe a risk to an executive. The executive shrugs, essentially. Later the risk comes home to roost, i.e. something bad happens. Now the executive appears to be completely surprised and initiates punitive action internally..."

        5 Reasons MDM (Master Data Management) Projects Fail
        Information Management, March 1st, 2013
        "Once you’ve agreed to implement master data management, the real work begins. While introducing MDM, there are a few business and data issues that consistently threaten project success.

        Here are five problems that, alone or combined, can sink any MDM program.."

        • No Executive Support
        • Letting Business Process Slip By
        • Lax Data Governance
        • Trying to Do Too Much
        • Part-time Validation

        Read on for details.

        Data Protection and Data Growth -- Within Budget. Possible?
        Computerworld, March 5th, 2013
        "A few months ago the folks at Wikibon published a survey around a number of different IT topics. One of the questions centered around the biggest IT challenges that organizations were facing. The top three challenges were:

        • Data Growth
        • Budget constraints
        • Data protection / disaster recovery

        As I considered those from my particular perspective of data protection, it occurred to me that they were all very interrelated, each affecting the others in particular ways. While trying to clarify my thoughts around this, I ended up sketching out a Venn diagram which brought it all into focus. It looks like this:..."

        IT - PM
        Great Sponsor + Great PM = Great Success - Ten Truths of an Effective Sponsor/PM Partnership
        Project Management Articles, March 5th, 2013
        "A sad tale of a how a sponsor/PM relationship killed a project...

        Exec identifies a need for a project and nominates self as sponsor. PM gets assigned to project and assembles project team. Sponsor is vague about problem to be solved other than "we need a new system". PM can't communicate problem to be solved to the team because he doesn't understand what the problem is. Sponsor continues to ask for more and more things to be included in project, PM doesn't have courage to say no.

        PM treats sponsor as "that person in the corner office" and doesn't know how to ask for help, so he escalates everything. Sponsor has to make some tough decisions but is unwilling to do so because of the political fallout. PM provides bad information about decision alternatives so sponsor ignores him. Due to changing priorities project no longer makes sense to do, but PM lobbies to keep the project going. Sponsor loses interest because there are bigger fish to fry. PM and team are disillusioned because sponsor doesn't care. Project dies a slow death. R.I.P..."

          IT - Networks
          Security Manager's Journal: Reining in Network Accounts
          Computerworld, March 5th, 2013
          "After my discovery that we hadn't been doing a great job of removing the network access rights of ex-employees, I looked deeper to see how we could improve things. First, we instituted a new process to compare the active employee list and termination requests to the user accounts configured in our in-house and software-as-a-service offerings.

          As I explained last month, my team already does an account review every quarter to comply with SOX requirements, but we had only been comparing the active user accounts to the termination list to ensure that everyone who was supposed to be removed no longer had access. Now we are also doing a comparison of active user accounts to the list of active employees..."

            11ac's First Wave: What to Expect
            Network Computing
            "The emerging 802.11ac standard promises significant performance enhancements over the current 11n standard, including an eye-popping 7-Gbps maximum throughput. But as vendors begin to roll out pre- or draft-standard products, what performance can you realistically expect? You'll get increases in rate over range, individual throughput and aggregate capacity, but don't bank on 7 Gbps any time soon..."
            Driven By 10G, Ethernet Switches Buck Economic Headwinds
            Network World, March 4th, 2013
            "The Ethernet switch market eked out modest growth in 2012 against the backdrop of an uncertain global economy, underscored by weakness in Europe and lower public sector spending.

            Global Ethernet switch revenue rose 4.7% in 2012, and 5% in Q4 on a sequential basis, according to Infonetics Research. The top five vendors -- Cisco, HP, Juniper, Dell and Brocade -- all increased revenue in 2012 but smaller rivals managed to gain some share, the firm found..."

            Recent Signals Point to Escalating Jitters for Ipv4 Market
            ARN, March 4th, 2013
            "Publications discussing the transition to the IPv6 addressing system have revealed mounting anxiety regarding the economics and service impact of the global shortage of IPv4 addresses. Common concerns have implications for the top and bottom lines of ISPs, clouds, hosting services and other service providers for interconnected pathways. Taken together, the following perceptions suggest a growing appetite for transfers of increasingly scarce IPv4 addresses:..."
            IT - Operations
            Top Tech Companies Plug Into Renewable Power
            Computerworld, March 4th, 2013
            "Microsoft is building a data center next to a Wyoming landfill in order to use its methane gas to power the facility.

            Apple now uses a massive 100-acre solar energy farm to power its Maiden, N.C., data center.

            And Google has placed data centers in Oklahoma and Iowa so they can plug into wind farms.

            America's top tech companies are going green in a big way, so much so that the availability of clean energy resources is now a key consideration in where they locate corporate offices and data centers. The move is designed to save them millions of dollars in long-term energy costs..."

            Facebook's Data Center: Where Likes Live
            Information Week, March 6th, 2013
            "Welcome to the Oregon high desert, where Facebook stores all of your likes while pursuing data center energy efficiency on a new scale. Coming soon to the neighborhood: Apple...

            The road to one of the world's mega data centers is lined with scattered sagebrush, tumbleweeds and gnarly, undersized junipers.

            No crops grow without irrigation in the central Oregon high desert; it's not promising territory for large populations. But it serves as home to the most heavily populated Internet application, the 901 million user-strong Facebook..."

            Security Cameras Continue to Pose Snooping Risk
  , March 6th, 2013
            "Over a year after it emerged businesses and consumers were exposing themselves to being snooped upon when researchers uncovered a flaw in some IP security camera that let internet users access feeds, it appears the lessons have not been learnt.

            Security researcher Adrian Hayter told V3 that he was able to access hundreds of publicly accessible IP camera feeds via a simple spot of Googling and a bit of knowledge about what to look for..."

            Wind Turbine Repair Techs Use iPod Touches from Precarious Perches
            Computerworld, March 5th, 2013
            "Off-the-shelf consumer handheld computers are showing up in some of the most precarious of workplaces.

            For instance, about 1,700 NextEra Energy wind turbine technicians recently began using Apple's iPod Touch handheld devices to help them service the gargantuan machines.

            The iPods are loaded with technical information and repair diagrams that a technician can access while working some 300 feet above the ground inside and outside the clean energy company's turbines.

            Having the information close at hand means the technician won't have to climb back down a ladder and then drive a truck back to an office to search for the data on a PC, said NextEra CIO Lakshman Charanjiva..."

            eBay Develops 'Miles per Gallon' Metric for Data Centers
            Computerworld, March 5th, 2013
            "There's a maxim in the data center business that you can't manage what you can't measure, and eBay has come up with the mother of all measurement systems for calculating data center efficiency.

            The online auction giant has devised a methodology that looks at the cost of its IT operations in dollars, kilowatt hours and carbon emissions, and ties those costs back to a single performance metric -- in eBay's case, the number of buy and sell transactions its customers make at"

            IT - Security
            5 Most Dangerous New Hacking Techniques
            CRN, March 4th, 2013
            "The rise of Stuxnet, Flame, Gause, the Olympic Games operations and Shamoon have all shed light on the issue of nation-state driven cyberwarfare and cyberespionage activities. Now that we are in cyberspace, we have another domain for humans to occupy and dominate, according to Ed Skoudis, founder of Counter Hack Challenges.

            Skoudis told RSA Conference 2013 attendees that he worries about some of the risks of taking action over the Internet..."

            Demand for IT Security Experts Outstrips Supply
            Computerworld, March 7th, 2013
            "Demand for information security experts in the United States is outstripping the available supply by a widening margin, according to a pair of recently released reports.

            A report from Burning Glass Technologies, which develops technologies designed to match people with jobs, shows that demand for cybersecurity professionals over the past five years grew 3.5 times faster than demand for other IT jobs and about 12 times faster than for all other jobs..."

            Four IT Shops, Four Approaches to BYOD Network Security
            SearchNetworking, March 4th, 2013
            "Devising a bring-your-own-device (BYOD) security plan would be simple if it merely involved granting network access based on user identity, device or location. But a solid BYOD network security application would consider all of these factors -- and that’s a tall order.

            At this point, since there is no proven singular solution, IT shops are instead patching together various tools that range from mobile device management (MDM) to network access control (NAC) and even out-of-band management systems..."

            Natives Restless with SIEM, Study Shows
            CSO, March 6th, 2013
            "A security technology that was supposed to be the solution to porous perimeter defenses is losing the hearts and minds of IT professionals, according a survey released Wednesday by a maker of network security solutions.

            Security and Information Event Management (SIEM) is designed to monitor network activity with an eye toward identifying Black Hat ills such as Advanced Persistent Threats, cyberespionage and data breaches.

            What surveyors for elQnetworks discovered, though, is considerable discontent in SIEM shops over their deployments. Nearly a third (31 percent) of the 191 IT pros interviewed for the survey said they'd ditch their SIEMs if they could find an alternative that would save them more money..."

            Securing the Network beyond Passwords
            Network World, March 4th, 2013
            "Passwords have been a weakness of network security since the development of computer networks. Through guessing weak passwords, exploiting weak passwords, acquiring passwords through social engineering, or more recently using malicious software like Advanced Persistent Threats (APT), attackers have focused on compromising passwords to gain access to the network.

            The traditional approach to defending against password attacks has focused on user awareness training, ever increasing password complexity requirements, certificate based authentication, and multi-factor authentication. Defenses that rely on the user are often subject to apathy, non-compliance from the user, and lack of enforcement of company policies that render them ineffective..."

            Tale of Two Compromises Provides Lessons For SMBs
            Dark Reading, March 1st, 2013
            "The stories behind the hacking of a startup's CEO and a journalist, as told at the RSA Conference, provides small and midsize businesses with good tactics to secure their businesses..."
              The Time for Sharing Cyber-Threat Data is Now
              CIO Insight, March 6th, 2013
              "While controversy has long swirled around the proposed Cyber Intelligence Sharing and Information Act that was recently re-introduced in Congress, the information security community has no doubts that the time to share information on cyber-threats is here.

              During a panel discussion at the RSA Conference at San Francisco's Moscone Center last Wednesday, top security executives agreed that corporations, which have largely shied away from sharing any information about their vulnerabilities, need to open up as never before. And, they said, it’s not going to be easy to make it happen..."

              IT - Careers
              Hope These Guys Don.t Work For Yahoo!: Nearly 600,000 Mega-Commuters Have 90 Minute Ride to Work
              Network World, March 5th, 2013
              "If anyone needs a pretty darn good reason to telecommute it's these guys: the nearly 600,000 mega-commuters whose ride to work is 90 minutes or longer and over 50 miles one way. Of those 4.3% in fact do work from home from time to time.

              Based on the 2006-2010 American Community Survey, 586,805 full-time workers are mega-commuters -- one in 122 of full-time workers. These commuters were more likely to be male, older, married, make a higher salary, and have a spouse who does not work. Of the total mega-commutes, 75.4% were male and 24.6% women. Mega-commuters were also more likely to depart for work before 6 a.m. Metro areas with large populations tend to attract large flows of mega commuters, according to the Census Bureau..."

                NASA Conducts Martian Tech Support to Repair Curiosity
                Computerworld, March 5th, 2013
                "A computer problem onboard the Mars rover Curiosity has forced NASA scientists to put the rover into safe mode while they try to bring a backup system online and try to figure out what is wrong with the main computer.

                "We are doing multiple things at the same time," Jim Erickson, Curiosity's deputy project manager, told Computerworld. "All we know is the vehicle is telling us that there are multiple errors in the memory. ... We think it's a hardware error of one type or another but the software did not handle it gracefully. We'd like to have our vehicles withstand hardware trouble and continue to function."

                People Who Changed Tech: James Watt
                Information Week, March 4th, 2013
                "We stand on the shoulders of giants. Virtualization, cloud computing, smartphones -- they all came from somewhere. What's the greatest invention of the last 300 years? The telephone? Computer? Internet? Remote clicker? Nope. It's the steam engine, the invention that launched the Industrial Revolution and changed the world.

                When the sun finally came out in Britain in the 1720s, agriculture blossomed … and prices fell. Suddenly, many of the 97% of the population who made their living off the land had to find some other way. Instead of making crops, some had to make products..."

                Hybrid Technology Degrees Emerging
                Network World, March 5th, 2013
                "As demand for college graduates with technical degrees soars, new majors are emerging that are hybrids of computer science, information systems and computer engineering.

                Penn State University, for example, created the College of Information Science and Technology a decade ago as an interdisciplinary program that combines engineering and business courses. The college offers three bachelor's degrees: a B.S. and a B.A. in Information Sciences and Technology (IST) and a B.S. in Security and Risk Analysis (SRA)..."

                IT - Compliance
                A Vulnerability Disclosure Game Changer
                Dark Reading, March 1st, 2013
                "Two new standards on the horizon in 2013 could prod ISVs, hardware makers and online services developers to start to address the black hole around how they handle responsible vulnerability disclosures and triage after vulnerabilities are found within in-house software, web apps and firmware. So says bug-finding maven Katie Moussouris, senior security strategist for the Microsoft Security Response Center and a former @stake penetration tester, who held court at a jam-packed and encored session at RSA this week about how the impending publication of two ISO standards will be a game changer for when "friendly hackers come a knockin'" on an enterprise's doors..."
                IT Security Managers Too Focused On Compliance, Experts Say
                Computerworld, March 1st, 2013
                "Companies with IT security strategies that focus mostly on complying with key standards are dangerously unprepared for emerging cyber threats, said security experts at the RSA Conference 2013 here this week.

                Over the past few years, the security strategies of many companies and government agencies have centered around meeting the requirements of Sarbanes-Oxley, Health Information Portability and Accountability Act (HIPAA), the Payment Card Industry Data Security Standards (PCI DSS), Federal Information Security Management Act (FISMA) and other government and industry standards.

                Experts say that meeting such standards is important, but they should be used as baseline controls in a broader IT security strategy..."

                The Great Lie of Compliance
                Dark Reading, March 6th, 2013
                "It happened again: I'm chatting with a gentleman at one of those business social events. He is senior management for a large organization. As we talk about the economy and business, he politely asks a few questions about what my team does to help companies.

                When I mention our work in assessing and assisting with compliance, he is quick to firmly tell me, "Oh, we're fully compliant," and quickly changes the subject. Fair enough; compliance is a pretty dry topic for cocktail hour.

                The Best Network Attached Storage Choice for Oracle Database and Software Environments
                Oracle Sun ZFS Storage Appliance versus NetApp
                If the question is whether to implement Oracle's Sun ZFS Storage Appliance or NetApp for Network-Attached Storage, then it behooves IT managers to have a look at the new white paper "The Best Network Attached Storage Choice for Oracle Database and Software Environments" (registration required) to learn about the clear advantages of the Oracle solution. The verdict? Advantage Oracle. Here's why:

                • Twice the performance at half the price
                • Savings of 30-50% on storage
                • 36% faster to administer and to provision

                Read on for details.

                IT - Database
                Don't Believe the IT Hype: Ye Cannae Change the Laws of Physics
                The Register, March 5th, 2013
                "It's fun to be on the receiving end of IT advertising. The vendor's ads start by promising to solve your business problems better than the competition can, and then the superlatives begin to snowball until an answer to global warming and a solution for war in Iraq are both in there among the plug-ins you can buy to make your purchase extra-worthy.

                There comes a point, however, where you have to ask yourself: why do I need to buy this? Is it really all it's cracked up to be? Could I do it just as well myself, or via some other means?..."

                  IT - Backup
                  Cloud Backup Requires Intelligent Recovery
                  Storage Switzerland, March 7th, 2013
                  "Using the cloud as a destination for backups has evolved from a consumer solution into a viable option for many small businesses and larger enterprises. Today production applications and even entire virtualized environments are leveraging the cloud to augment their existing backup processes.

                  Thanks to technologies like changed block tracking, deduplication and compression the movement of data to the cloud across a relatively low bandwidth internet connection is very viable. Most solutions even leverage a local backup device in some form to assist in completing the initial backup quickly and to provide recovery for the most immediate information. .."

                    IT - Big Data
                    Data or Die? How Analytics Play a Vital Role in Your Business
                    knowit information systems, March 4th, 2013
                    "Warning: If analytics are not at the core of your business, you will be going out of business. This according to Gartner, Inc., the world's leading information technology research and advisory company. Their vice president Bill Hostmann was quoted earlier this year as saying, 'Organizations that do not move analytics into the central part of both their IT strategy and business strategy are not going to meet their business objectives or even survive in the new world of realities we are facing.'..."
                    David Meets Goliath: How Big Data Is Leveling the Playing Field
                    Big Data Republic, March 1st, 2013
                    "The big data manifesto by the Wikibon community asserts that leveraging big data is the definitive source of competitive advantage in the future across all industry segments.

                    The importance of understanding and using insights delivered by big data and analytics has become so important that many industry watchers and journalists go so far as to assert that “data is the new oil.” They are entirely justified; taming data, especially when it grows at the rate of several petabytes every day, and understanding it requires enhanced capabilities of part of an organization..."

                    Do You Know Big Data's Top 9 Challenges?
                    Wachington Technology, March 1st, 2013
                    "Challenges equal opportunities in today's market, and when it comes to big data, there are many of both.

                    Earlier this week, at the Big Data Technology Leadership Series 2013, presented by GTSI Corp. and FCW, Simon Szykman, chief information officer of the Commerce Department, outlined his top nine big data challenges:..."

                    • Data acquisition
                    • Storage
                    • Processing
                    • Data transport and dissemination
                    • Data management and curation
                    • Archiving
                    • Security
                    • Workforce with specialized skills
                    • Cost of all of the above

                    Read on for details.

                    Does Your Agency Need Big Data? Maybe Not
                    FCW, March 6th, 2013
                    "If you don't have the tools to turn big data into useful information, you need them, right? Maybe not. While big data tools have proven to be useful in applications such as weather forecasting and continuous monitoring of government financial transactions, smaller agencies would be wise to evaluate their missions before jumping on board the big data bandwagon, according to Bill Franks, chief analytics officer for Teradata's global alliance programs..."
                    Tame Risk with Smart Data, not Big Data
                    Insurance Networking News, March 6th, 2013
                    "Technology alone doesn't deliver insights, but being able to answer four basic questions surrounding your data flow does.

                    That's the principle guiding David Saul, SVP and chief scientist of State Street Corporation, the global provider of financial services that include investment management, research, trading and investment servicing.

                    The challenge is to identify and pull in data that allows a financial firm to calculate risks it faces in securities positions held and exposures to different counterparties. This is not something solved with 'technology alone,; Saul said at the 2013 Americas Operations Forum of the Society for Worldwide Interbank Financial Telecommunications..."

                    These 10 People Get Big Data
                    CRN, March 4th, 2013
                    "It's not often you see an executive spend a keynote slot talking about another company's innovations. But, that's exactly what Scott Yara, senior vice president of products and co-founder of Greenplum, the big data-focused division of EMC, did during his keynote address at Strata this week.

                    During his time on stage, Yara spoke not of Greenplum's recent successes, but of the folks outside his company who helped make them happen. He listed off 10 non-Greenplum employees who have helped inspire Greenplum and shape its big data strategy..."

                    • Jake Porway, DataKind
                    • Jon Kleinberg, Cornell University
                    • The White House
                    • Andrew Ng and Daphne Koller, Coursera
                    • Jonathan Harris, Cowbird
                    • Joe Hellerstein, Trifacta
                    • Ben Werther, Platfora
                    • Todd Papaioannou, Continuuity
                    • Mike Driscoll, Metamarkets
                    • Steven Hillion, Alpine Data Labs

                    Read on for details.

                    Using Big Data to Combat Big Risk
                    Advanced Trading, March 7th, 2013
                    "Everyone is talking about the use of "big data" these days and so now is a good time to reflect on the potential uses of big data by different industries and policy makers to solve some of their long standing issues. Here we look at how banks and regulators can use the principles of "big data" to solve some problems -- like how to identify traders who are taking undue risks, or investment salesmen who are fronting a Ponzi scheme..."
                    IT - Mobile
                    Must-Know Facts Every Mobile User Should Know About Security
                    IT Business Edge, February 25th, 2013
                    "So your users just got new shiny smartphones and can't wait to start downloading all the hottest apps. Hold on a second. Before they do, there are some important facts they need to know. Adam Ely, founder & COO at Bluebox, has identified security facts every mobile user must know before they expose company or personal data to cyber criminals..."
                    Why Mobile Security Is a Systemic Problem
                    Network World, March 1st, 2013
                    "There has been considerable hype around each mobile threat vector that has emerged in the last year, but what's often overlooked is how mobile security is currently approached. What's particularly troubling is how reactionary responses have been to these threats, whether it be from Android apps with major flaws in their SSL implementations or the recent airport VPN Trojan.

                    One simple truth: the only secure way of handling mobile devices is in a managed way..."

                    Why IT Security Staff Want You to Work at the Office
                    IT Business Edge, February 28th, 2013
                    "When CEO Marissa Mayer announced she was ending telecommuting at Yahoo, she made an awful lot of people angry. Her reasoning, according to various articles, had to do with bringing the employees together for face-to-face collaborations. However, there may be a lot of IT security professionals who are applauding the decision for another reason.

                    According to a new report from Imation, IT decision makers have much less confidence in data security when workers are off site, even when the company has strong mobile security policies in place. One of the key findings of the report was this:..."

                    Top Ten Articles for last few Issues
                    Vol 180 Issue 1, 2, 3, 4; Vol 179 Issues 2, 3, 4 and 5
                    We track how frequently each article is viewed on the web site to determine which the readers consider the most important. For last week, the top 10 articles were:

                    • Adam Leventhal Ponders the Issue of Systems Software: Alive or Dead?
                    • How to: Build a Private Virtual Network with Zones in Solaris 11
                    • White Paper: Implementing Root Domains with Oracle VM Server for SPARC
                    • Myth Busters Department: 'A Solaris tmpfs Uses Real Memory'
                    • Since You Asked... A Couple of Oracle Solaris Resources
                    • Oracle's StorageTek SL150 Modular Tape Library Perfect for Entry-level, Mid-level Markets
                    • Performance Tuning an Exalogic System
                    • Java Spotlight Episode 122: Ashwin Rao on NetBeans 7.3 Release @netbeans
                    • Videos and Presentation Slide Decks from the IOUG 2013 Exadata Virtual Conference
                    • Locks and Killing Sessions in Oracle SQL Developer

                    The longer version of this article has list of top ten articles for the last 8 weeks.

                      IT - Server
                      The Benefits of Hardware Neutral, Server-side Caching
                      Storage Switzerland, March 7th, 2013
                      "Caching has been around as long as computers have. There’s a cache in the CPU, at the OS, in applications like databases, even disk drives have a small cache area. Basically any device which handles an I/O operation typically uses a cache to buffer an I/O data stream. However, caching in a storage context is a little different and caching with flash as a faster storage area for improving application performance is newer still.

                      Storage caching has become more popular lately because of the availability of NAND flash devices. .."

                      How to Stress-Test Your PC Hardware
                      PCWorld, February 22th, 2013
                      "Modern-day PCs are more reliable than ever before, but that doesn’t mean they're infallible. Equipment failures still happen, however rarely, and even the beefiest of computer components aren't worth their weight in silicon if they aren't dependable. Thankfully, the hot and heavy world of stress testing can help to identify critical faults before your PC craps out in the middle of a critical operation.

                      Whenever you buy or build a PC, swap out a major component, or overclock a piece of hardware, it's a good idea to stress-test (or "burn in") the fresh gear, which is not the same as benchmarking your rig..."

                        The Document Foundation Releases LibreOffice 4.0.1
                        An Improvement in the Overall Quality and Stability of 4.0
                        The Document Foundation (TDF) has released LibreOffice 4.0.1, which features Impress Remote for Android on Linux, MacOS and Windows – from Google Play with how-to instructions available on the wiki. TDF describes the new release as a step forward in improving the overall quality and stability of LibreOffice 4.0. For enterprise adoptions, though, TDF recommends the more solid and stable LibreOffice 3.6.5. TDF has also released the guide “Getting Started with LibreOffice 4.0, in PDF and ODF formats and as a printed book. LibreOffice 4.0.1 is available for download from the website, while extensions are available from the extension repository.
                        Trending in
                        Vol 235, Issue 2
                        Trending IT Articles