News about Oracle's Solaris and Sun Hardware
System News
Mar 11th, 2013 — Mar 17th, 2013 Generate the Custom HTML Email for this Issue
System News System News for Sun Users
Volume 181, Issue 2 << Previous Issue | Next Issue >>
Sections in this issue:
click to jump to section


Oracle
x
Oracle Announces IndustryÂ’s First One-stop Social Interactions and Experiences Platform
Integrates Social Marketing, Engagement and Monitoring
The just-announced Oracle Social Relationship Management (SRM) solution is the industry’s first unified, end-to-end social management solution for the enterprise. Oracle SRM fully integrates organically-developed Oracle products with Vitrue, Collective Intellect, and Involver solutions and combines social marketing, engagement and monitoring into a complete platform that allows enterprises to seamlessly listen, create and publish content, engage customers and analyze interactions across multiple social channels in real-time. By integrating the full spectrum of social activities and analysis in a single platform, the solution eliminates the inconsistency, duplication and delays of ‘social silos’ to enable users to create, measure, and consistently deliver more rewarding customer experiences.
'Best Practices for Deploying Oracle Solaris Zones with Oracle Database 11g on SPARC SuperCluster
Oracle White Paper
Giri Mandalika summarizes the Oracle white paper "Best Practices for Deploying Oracle Solaris Zones with Oracle Database 11g on SPARC SuperCluster," explaining that SuperCluster users have the choice of running their databases in logical domains dedicated to running Oracle Database 11g R2.

With exclusive access to Exadata Storage Servers, those domains are called "Database" domains. Users can create and use all logical domains as "database domains" or "application domains" or a mix of those, Mandalika writes. The paper talks only about database domains and their creation, configuration and use within each database domain for fine grained control over multiple databases in a SuperCluster environment.

Features
x
SPARC/Solaris OS 9 System Runs for 3737 Consecutive Days
But Who's Counting?
In late 2002, IT staff at Sun booted up a SPARC/Solaris Server running OS 9, which was recently shut down for the first time after a run of 3737 consecutive days, Larry Wake reports. When it was finally shut down, the reason was that the iron had to be moved. A brief Youtube video celebrates the much-more-than-marathon run.
Exadata
x
Patching Oracle Exalogic – Updating Linux on the Compute Nodes Part I
How to Maintain Availability During Update
"Patching Oracle Exalogic – Updating Linux on the Compute Nodes Part I," by Jos Nijhoff, deals with patching the operating system on the modified Sun Fire X4170 M2 servers running Oracle Linux. Nijhoff explains that patching the compute nodes can be done in rolling fashion, maintaining application availability during the upgrade, if the application is deployed in redundant (HA) fashion, for example in a Weblogic cluster spread over more that one physical node. Users can patch one compute node at a time or multiple nodes in parallel. Nijhoff uses the installation of the Exalogic 2.0.0.0.1 patchset (patch 13569004).
IT - Storage
x
Enterprise SSDs From 382,000 in 2011 to 3.9 Million Units in 2016
StorageNewsletter.com, March 13th, 2013
"...the study has been assembled by Objective Analysis through research and interviews with participants held at various times over the past few years with participants from all sides of the market.

The market is forecast three ways: From the bottom up, analyzing the demand for enterprise SSDs from 22 end markets, from the top down, reviewing an enterprise HDD forecast and analyzing which parts of the market are threatened with replacement by SSDs, and finally by interface, a forecast that splits out the top-down forecast into markets for the three leading enterprise SSD interfaces..."

SSDs Risk Massive Data Loss
StorageNewsletter.com, March 11th, 2013
"This paper considers the behavior of SSDs under fault. Specifically, we consider how commercially available SSDs behave when power is cut unexpectedly during operation..."

"Because we do not know how to build durable systems that can withstand all of these kinds of failures, we recommend system builders either not use SSDs for important information that needs to be durable or that they test their actual SSD models carefully under actual power failures beforehand. Failure to do so risks massive data loss."

Is Storage Saving Virtual Desktop Infrastructure?
InformationWeek march 11th, 2013
"While virtual desktop infrastructure (VDI) projects have been steadily increasing over the last few years, 2013 is seeing a significant spike upward in terms of both interest and actual implementation.

There are two reasons for this. First, the cost of the client has come down while its capabilities have gone up. This is thanks to thin clients, tablets and thin laptops.

The other reason for the increase in adoption is that storage roadblocks to successful adoption, like performance and cost, are quickly being minimized -- if not eliminated all together. In fact, a case could be made that the removal of these storage roadblocks is the top reason behind the increased adoption of VDI..."

Java Technology
x
Updated Java Tutorial Features Information on Java SE 8
Additonal Features Include Lambda Expressions, Annotations Lesson, Installing Custom Resource Bundle
The March 2013 edition of the Java Tutorial has been updated to include information on the upcoming release of Java SE 8, Tori Wieldt posts. Details have also been added concerning Lambda expressions, which support programming in a multicore environment by adding closures and related features to the Java language; an expanded Annotations page is now a full Annotations lesson; and the lesson Service Providers for Internationalization now includes a section called "Installing a Custom Resource Bundle as an Extension," which shows how to load resource bundles with service provider interfaces (SPIs). These new materials are currently available only online, according to Wieldt.
JSR 352 Batch Applications for the Java Platform: Java Spotlight Episode 124
With Chris Vignola, Spec Lead for JSR 352
Chris Vignola, the spec lead for JSR 352 Batch Applications for the Java Platform, works for the IBM AIM Software organization and is the lead architect for WebSphere Systems Management. He appears on Java Spotlight Episode 124 to discuss JSR 352 Batch Applications for the Java Platform with host Roger Brinkley. Formerly the WebSphere Batch Technology Chief Architect, Chris Vignola has over 28 years of industry experience in architecture and development of software systems, including WebSphere Extended Deployment, WebSphere Application Server, and the MVS operating system.
IT - Technology
x
10 rugged gadgets for surviving dirty, dangerous jobs
InfoWorld March 16th, 2013
"Not all work takes place in a cushy, climate-controlled office. A lot of business occurs in less-than-ideal conditions. In the wind and rain. At high altitudes. In extreme temperatures. Sound familiar? You need rugged tech—gear that can tough it out in a construction zone or survive the demands of a research vessel off the shores of Antarctica.

Read on to discover gear that is, for the most part, tested to military-grade standards..."

  • LaCie XtremKey USB 3.0
  • Panasonic Toughpad FZ-A1
  • Dell Latitude E6420 XFR
  • Panasonic Toughbook F9
  • Olympus TG-820 iHS
  • IoSafe Rugged Portable drive
  • Liquipel waterproofing
  • BlueAnt T1 Rugged Bluetooth Headset
  • NCS Technologies Bunker XRV-5241 Server
  • AquaPac Waterproof Case for iPad

Read on for details.

Future Alert: Researchers Create Self-Healing Chips
CIO Today, March 13th, 2013
"To create such Lazarus-like properties in chips, a number of on-chip sensors are deployed that track temperature, current, voltage and power, which then feed updates into an application-specific integrated circuit on the chip. If there are any changes in the variables, the ASIC runs through more than 250,000 configurations to find the best workaround..."
    The age of the sentient machine is upon us
    InfoWorld March 14th, 2013
    "Will man-made intelligent devices ever become "sentient?"

    IBM Fellow Grady Booch -- a pioneer in software engineering and collaborative development environments -- says the answer is yes. In fact, he says the rise of sentient machines is "inevitable."

    Booch defines sentience as having typically human characteristics, such as self-awareness, the ability to set goals, and a sense of creativity: "If we don't achieve that degree of sentience, I believe we're very close to achieving the illusion of sentience whereby we are in a place where we'll, on a large-scale basis, have to interact with these things."

    Payment Technologies: Past, Present and Future
    CIO Journal, Wall St. Journal March 15th, 2013
    "History can be a useful guide to the future, especially when trying to predict the impact of disruptive changes on human organizations and cultures. I was reminded of this dictum when recently attending a very interesting workshop at the University of California, Irvine called Payment Technologies: Past Present and Future.

    The workshop was sponsored by the Intel Science and Technology Center for Social Computing..."

    A visual history of Linux
    InfoWorld March 15th, 2013
    "Linux started out life as a Minix clone built as a hobby by some guy over in Europe. (OK, it wasn't exactly a Minix clone. But it was built by a guy. And he was in Europe.) Since then, Linux has had a lot of different looks. Let's take a look over a few of the most interesting..."

    • The first release of Linux
    • XFree86
    • GNOME 1
    • K Desktop Environment 1
    • K Desktop Environment 2
    • K Desktop Environment 3
    • GNOME 2
    • K Desktop Environment 4
    • Unity
    • GNOME 3/Shell

    Read on for details.

    Cloud Computing
    x
    Cloud Conversations: An Anthology from OTN Architect Day
    Includes Podcasts and Papers

    A variety of resources are available in "Cloud Conversations" assembled by Juergen Kress. These include recordings from OTN Architect Day on October 2012 that capture the Q&A sessions between the audience and the experts:

    • Dude, Whats' My Role (What is the role in a cloud environment for the traditional IT practitioner?)
    • Migrating Mission-Critical Applications to the Cloud
    • All Clouds Are Not Equal (Cloud strategy in enterprise-grade cloud services)
    • Cloud Security and Auditing

    Kress includes three papers as well:

    • "A Pragmatic Approach to Cloud Adoption"
    • "Cloud Foundation" (a reference architecture document)
    • "Cloud Infrastructure" (the provider's viewpoint)

    Listen on for details.

    Oracle VM step-by-step Hands-on Labs
    Three Sessions from Virtual SysAdmin Days now Available On-demand

    The three lab sessions that were offered at the recent SysAdmin Days are now available on-demand:

    • Lab 1: Deploying an IaaS Environment with Oracle VM

    • Lab 2: How to Virtualize and Deploy Oracle Applications in Minutes with Oracle VM

    • Lab 3: Deploying a Cloud Infrastructure with Oracle VM 3.x and the Sun ZFS Storage Appliance

    Chris Kawalek has assembled links to these three sessions for the convenience of participants, noting that, together, they provide a good immersion in Oracle VM to prepare users for the next step of virtualizing Oracle Applications.

    IT - Cloud
    x
    Open Data Center Alliance Adds to List of Needed Cloud Improvements
    CIO March 13th, 2013
    "The Open Data Center Alliance (ODCA) -- whose membership roster includes BMW, Deutsche Bank, JPMorgan Chase and Lockheed Martin -- has expanded its vision for how cloud services should work, with requirements for more cloud-friendly licensing and better mechanisms for access control. The advantages of public cloud services are evident to most CIOs. The hope is that the cloud's multitenant, shared infrastructure will enable greater flexibility and lower costs, according to the ODCA..."
    Judging a cloud by the company it keeps
    IT-Director.com March 14th, 2013
    "When looking for the highest-value cloud platforms to integrate with, technology providers must exercise proper due diligence in examining their cloud partners.

    The de facto indicator of the health of a cloud provider has traditionally been the size and breadth of its customer base. While serving as a valuable barometer, however, this information possesses inherent shortcomings..."

    Cloud review: 8 public cloud services put to the test
    InfoWorld March 14th, 2013
    "The message from the cloud has always been simple: Surrender your cares, IT managers, and we'll handle everything. Forget about skinning your knuckles installing servers, double-checking diesel backups, or fretting about 1,000 or 10,000 things that could go wrong. Give us a credit card number and your data. We'll do the rest.

    For the last few months, I've been living the dream, building a vast empire of computers that spanned the globe..."

      8 Tools Changing Business Technology Resiliency
      InformationWeek, March 12th, 2013
      "What do cloud gateways, emergency communications tools, and disaster recovery as a service (DRaaS) all have in common? All are changing the way businesses run their continuity programs. The products that make up the business technology resiliency market landscape historically have been fragmented and ill-defined, despite the fact that the products share a common mission: improving uptime..."
      IT - CxO
      x
      To Cloud or Not to Cloud
      CIO Journal, Wall St. Journal March 11th, 2013
      "Cloud is all the rage in IT right now, offering nearly instantaneous time to value, continual feature upgrades, and reduced cost. However, it is important to delineate different types of cloud offerings and what should and shouldn't run in the cloud. There are also several contractual issues CIOs should consider when dealing with cloud vendor..."
        How Companies are Addressing the Generation Gap
        CIO Insight March 15th, 2013
        "Boomers resent those "young 'uns" because they arrive at odd hours and seem over-entitled and underworked. Gen Xers get irritated with "know it all" Boomers who refuse to retire, keeping the Gen XersÂ’ mid-level careers "stuck in neutral." And Gen Yers feel "dumped on" by both, taking on lots of grunt work without much tangible reward. Regardless of whether any of these three impressions are based on fact or questionable biases, CIOs and other senior managers cannot pretend they don't exist..."
          CIOs At Mercy of Employees. Personal Cloud Use
          CIO Insight March 12th, 2013
          "Harvard University's admission Monday that it monitored the subject lines of employee emails to investigate a cheating scandal serves as a reminder that policing official channels of communication is well within the CIO's power. But when employees use personal cloud services, such as webmail or file storage, to transfer business information, the power to detect and possibly stop leaks is much less clear. Not only do CIOs lack control over such services, but state privacy laws prohibit them from accessing employeesÂ’ personal webmail accounts..."
          Government removes top CIO role in digital overhaul
          v3.co.ukc March 14th, 2013
          "The government will no longer have a single chief information officer (CIO) to oversee the use of IT across Whitehall. The Cabinet Office said there was no need for the role any more as a cross-government role is "no longer central to delivery".

          It also announced that it would be installing a new technical team to support its digital strategy across departments.

          Previous government CIO Andy Nelson left his role in February this year, swapping it for the CIO role at the Department for Work and Pensions (DWP). The news now that the government CIO role will not be filled is hardly surprising considering Nelson's responsibilities were significantly reduced in December when Liam Maxwell was promoted to the role of government chief technology officer..."

          7 Tech Trends CIOs Call Overrated
          InformationWeek March 15th, 2013
          "The beauty of any tech buzzword is that its time will pass. Remember when it was "e"-everything? Much of that nonsense fell away, leaving reasonable options such as e-commerce and e-books. Or how about "Web services?" For people now railing against how bad a name "big data" is, Web services was even worse.

          The ugly side of tech buzzwords, of course, is that something new always steps up to replace them..."

          • Cloud Computing ROI
          • Outsourcing
          • Business-Tech Misalignment
          • Big Data Over Small Data
          • Consumerization Of IT
          • Cloud Computing Ease Of Use
          • Tech Panaceas

          Read on for details.

          How IT Leaders Can Increase Collaboration in 2013
          IT-Director.com February 26th, 2013
          "IT leadership is tasked with maintaining the processes that help a business operate. These processes can range from telephone connections to computer networks, and the specific role of an IT manager or CIO varies from industry to industry. In 2013, the role is taking on even more responsibility as the technological advancements around the world have increased possibilities in ways never imagined. For instance, an IT department can have much more of an influence on overall business operations now than ever before, and itÂ’s time for leaders to understand this and make a move..."
          19 principles every IT leader should heed
          InfoWorld March 13th, 2013
          "My first IS Survival Guide column, which ran in the Jan. 8, 1996, edition of InfoWorld, introduced the "three basic principles of management." If I were teaching a class on management, I'd still choose the three principles outlined in the first column as the basis for that course. They've held up well over the years.

          In the time since, I've accumulated quite a few more principles you might find useful -- 16 more, in fact, or one per year. Call me a slow learner. Anyway, they might not be quite as important as the big three, but they still matter. A lot..."

          • Customers define value
          • Form follows function
          • Align everyone to a common purpose
          • There's no such thing as an IT project
          • Corporations aren't just people, only bigger
          • If what you need is for "them" to change, give up
          • If you hate your boss you have two choices: Find a new one or wait for a new one
          • You are responsible for your career
          • You get what you measure

          Read on for the rest of the list and the details.

          7 Tips to Help IT Leaders Make Their Business an International Success
          CIO March 12th, 2013
          "Just because your business is a success in one place doesn't guarantee it will be successful in another country, where the laws, customs and culture can be quite different. So what does it take to make it abroad? CIO.com asked business owners and managers with experience opening or running an international office or Website for their best tips. Following are the seven top suggestions for increasing international success..."

          • Partner with someone who knows the lay of the land
          • Make sure you're in compliance with local laws and regulations
          • Carefully select who you send abroad
          • Consider contracting local people
          • Make sure you have the right general manager in place
          • Localize your Website--and marketing materials
          • Work with an international shipper

          Read on for details.

          What Your CEO Is Reading: The Sharing Economy; Rethinking Infrastructure
          CIO Journal, Wall St. Journal March 15th, 2013
          "Whatever one thinks of Groupon Inc., the company that brought us daily deals—the endless two-for-one frozen yogurt offers, etc.–its story makes for a good read. Between November 2008, when Andrew Mason founded the company, and last March, when Mason was fired as CEO, the company was a tech reporter's dream.

          In those four-plus years Groupon managed to reject a $6 billion buyout offer from Google, expand to dozens of countries, build a labor force of 12,000 employees, go public against the wishes of key investors, get dinged by the SEC for basic accounting violations and get sued by investors and employees..."

          IT Spends Too Much Time on 'Firehouse Duty'
          CIO Insight March 12th, 2013
          "It sounds somewhat like a bad IT joke that you'd hear in the office: 'How many tech professionals does it take to fix an issue?' The answer is five, working a combined average of 100 hours of time that otherwise would be devoted toward pursuing business-benefitting goals. And that, unfortunately, is no joke. It's just one of a number of eyebrow-raising findings from a recent survey..."
            IT - DR
            x
            The elements of business continuity planning
            Techrepublic March 11th, 2013
            "Whether you are creating a business continuity plan from scratch or updating an existing one, know what these elements mean to your recovery objectives.

            Recovering from a business continuity event (BCE) requires system-by-system planning with thorough understanding of how each computer and network component impacts critical business outcomes. Consequently, business continuity planning (BCP) must include several documented, tested, and practiced sets of tasks that support:

            • System dependency mapping
            • Maximum tolerable periods of disruption (MTPOD)
            • Mean time to repair (MTTR)
            • Recovery time objectives (RTO)

            Incorrect analysis of one or more these BCP objectives will likely result in irreparable harm to your organization if a critical business process fails..."

            IT - PM
            x
            Is configuration management your IT project's missing link?
            TechRepublic March 15th, 2013
            ""Your IT project will soon be in trouble if you fail to establish configuration management (CM) as early as possible during the systems/software development life cycle (SDLC). This is true regardless of whether you use a traditional software development methodology/process such as 'Waterfall' or an Agile, iterative methodology..."

            Create your CM plan during the conceptual demonstration and validation phase, which the Rational Unified Process (RUP) refers to as Inception and Elaboration.

            • At contract award, identify the configuration items (CIs)
            • Determine the appropriate development methodology for the system or product
            • Specify the required documentation for each product
            • Set up the configuration control library
            • Set up a change management process
            • Issue numbers and identifiers to each product (CI/CSCI), its components, and related documentation.
            • Determine and prioritize the planned component or functional releases
            • Establish the configuration baselines
            • Set up QA, validation and verification
            • Throughout your program or project, do the following:

            Read on for details."

            10 keys to successful patch management
            TechRepublic March 12th, 2013
            "HereÂ’s a look at 10 areas IT pros need to keep an eye on to ensure a smooth patch management strategy.

            The recent spate of Java vulnerabilities has required a number of large vendors to react almost instantly to optimize security levels. But as good as these reactions are, organisations urgently need to apply insightful strategic thinking to ensure that security updates are reaching the entire organisationÂ’s IT estate..."

            • Ensure transparency
            • DonÂ’t just look at the security
            • Define your patch nirvana
            • Face the facts
            • Do it your way with software policies
            • Get the timing right
            • Audit first — is it too broken to be fixed?
            • Keep it simple
            • Consider automated solutions
            • Visualise your patch management

            Read on for details.

            IT - Networks
            x
            Cisco CTO: Internet Of Everything Much More Than SDN
            InformationWeek March 15th, 2013
            "When Cisco announced strong earnings during its most recent fiscal quarter, much of the progress was attributed to the networking giant's strides in software-defined networking (SDN).

            SDN technology broadly eliminates manual management of switches and other networking hardware by abstracting control to a single administrative console. Such networks factor into many of the IT world's most impactful movements, such as virtualization and cloud computing, but according to Cisco CTO Padmasree Warrior, SDN is a constraining concept that falls short of the company's more ambitious vision: an intelligent, programmable network that will not only link billions of devices to the Internet but also, thanks to the data mining the network enables, inject trillions of dollars into the global economy..."

            Next-generation network solutions
            NetworkWorld March 13th, 2013
            "From a data center perspective, the last five years have been very interesting. We've seen a huge push by customers of all sizes to reduce costs and improve data center performance and resiliency.

            In the process, we get called on to assess whether existing network architectures can meet the requirements, or whether a transition to next-generation architectures -- for example, Cisco's Unified Data Center -- would be best..."

            Good Customer Service Rules the Online Experience
            Baseline March 13th, 2013
            "Businesses are constantly attempting to solve the riddle of how to make the online shopping experience better for their customers—and more profitable for them. Fortunately, a recent survey from LivePerson indicates that this isn't exactly rocket science: It all comes down to people. Specifically, converting clicks to sales involves employing knowledgeable, friendly and helpful customer service representatives who are readily available at all times, findings show..."
              IT - Operations
              x
              10 new cool tools for Exchange admins
              InfoWorld March 13th, 2013
              "It feels like I've been inundated with new admin tools to play with lately, both from Microsoft and third parties. I'm happy to be swimming in that sea of options.

              Many of the tools came from the Microsoft Exchange team as part of the updated release a few weeks back of the online Deployment Assistant for Exchange 2010 and Exchange 2013 migration. That release was followed by Jetstress 2013, used for testing the performance and stability of your Exchange storage under a stress load by simulating Exchange I/O behavior. And just yesterday the Exchange team released the Microsoft Connectivity Analyzer Tool 1.0 (MCA), a companion to the Remote Connectivity Analyzer (RCA) website (also upgraded to 2.1)..."

              Server Room Nightmares: 5 Steps to Create a Cool, Safe Place for Your Data
              eWeek March 11th, 2013
              "Undersized, cluttered and poorly designed server rooms can be a contributing factor to service outages that are expensive to fix and cause data losses that cripple or kill a business. This is a particular problem for small and midsize businesses with tight budgets that often cut corners when building their server rooms.

              As a result, the servers that keep these businesses depend on are stacked up in what is no better than a cramped, poorly ventilated closet that's inadequately cooled. This lack of space also makes it more likely that server power and network cables will become hopelessly tangled, which complicates maintenance and raises the chances of an outage..."

                4 Internet privacy laws you should know about
                NetworkWorld March 12th, 2013
                "Last year after an outpouring of opposition, Internet advocates logged a victory when they defeated the controversial Stop Online Piracy Act (SOPA).

                Now there are other new bills and efforts to amend existing law that could reshape how businesses share digital information about users and what powers the federal government has in obtaining online data. Below are four that are either actively being debated, or could come up for consideration soon..."

                • Electronic Communications Privacy Act (ECPA)
                • Cyber Intelligence Sharing and Protection Act (CISPA)
                • Computer Fraud and Abuse Act (CFAA)
                • Trans Pacific-Partnership Agreement (TPP)

                Read on for details.

                  IT - Security
                  x
                  CSOs must adopt new risk management trends
                  Help Net Security, March 13th, 2013
                  "Wisegate released new research from senior IT security members that shows how CSOs are adopting new risk management trends calling for a risk-based security approach.

                  Security managers are working with senior executives in all divisions across their organizations to move away from compliance-focused thinking towards a risk-based approach to information security. The shift requires senior management and C-level executives to think about risk strategically versus simply crossing off regulatory check boxes..."

                  Identity fraud is up, but banks are up to the security challenge
                  Help Net Security March 14th, 2013
                  "In 2012, the total losses resulting from account takeover and new account fraud each rose by approximately 50% over the previous year. These two fraud types impact consumers most severely, and are historically more difficult for FIs to prevent and detect than any other major fraud type.

                  Today, Javelin Strategy & Research releases the firmÂ’s 2013 Banking Identity Safety Scorecard..."

                    99 Percent Of Tested Applications Are Vulnerable To Attacks
                    dark Reading March 13, 2013
                    "Cenzic Inc., the leading provider of application security intelligence to reduce security risks, today released the Cenzic Trends Report for 2012. The report demonstrates that the overwhelming presence of web application vulnerabilities remains a constant problem, with an astounding 99% of applications tested revealing security risks, while additionally shedding light on pressing vulnerabilities within mobile application security.

                    Gathered during the Cenzic Managed Security team's analysis of applications in production, the report reveals the massive number of vulnerabilities prevalent in web and mobile applications today. The report highlights the type, frequency and severity of vulnerabilities found and predicts which vulnerabilities will pose the greatest risk in web and mobile applications in production throughout 2013..."

                    Latest Wisegate Research Reveals CSOs Must Adopt New Risk Management Trends
                    dark Reading March 13, 2013
                    "Austin-based start-up Wisegate, the IT expert knowledge service, released new research from senior IT security members that shows how CSOs are adopting new risk management trends calling for a risk-based security approach. Wisegate's latest report reveals that security managers are working with senior executives in all divisions across their organizations to move away from compliance-focused thinking towards a risk-based approach to information security. The shift requires senior management and C-level executives to think about risk strategically versus simply crossing off regulatory check boxes..."
                    Firms Need Tough Security Against Cyber-Threats
                    Baseline March 12th, 2013
                    "Despite a near constant barrage of news stories about cyber-espionage and cyber-attacks, business and government remain woefully behind the curve in instituting adequate safeguards. Meanwhile, threats grow and the risks multiply. According to the World Economic Forum, only about 30 percent of organizations discuss cyber-resilience at the board level..."
                      IT - Careers
                      x
                      Employers Cite a Surge in Demand for Linux Pros
                      Baseline March 12th, 2013
                      "It is considered the most ubiquitous and popular free open-source operating system. And if you demonstrate IT skills in this field, you're setting yourself up for a lucrative in-demand career. In this case, we're referring to Linux, as a vast majority of hiring managers worldwide say they are looking for systems administrators, developers and other technology professionals who specialize in this IT niche, according to recent research from Dice and The Linux Foundation..."
                      10 steps to becoming the developer everyone wants
                      InfoWorld March 14th, 2013
                      "You thought it was all about programming skills. But you were wrong!

                      Great code is fine, yet commanding better work and a higher salary depends on ensuring more people know who you are. In other words, you need to market yourself. Here's what seems to succeed..."

                      • Blog
                      • Go open source
                      • Not six months, not 10 years
                      • Eye on the new stuff, hands on the practical
                      • Write your own documentation
                      • Brevity is the soul
                      • Wow the crowd
                      • Be realistic
                      • Solve the hard stuff, know the tools
                      • Practice humility

                      Read on for details.

                      IT Talent Shortage Or Purple Squirrel Hunt?
                      InformationWeek March 7th, 2013
                      "There either is or isn't a technical talent shortage in the U.S. To hear corporate leaders tell it, America's woeful inability to educate enough students in science, technology, engineering and math has left U.S. companies with a dangerously shallow talent pool. Arguably, this shortage is at least partially the result of past outsourcing, which has been discouraging U.S. students from pursuing IT careers..."
                      42% of IT Leaders Have Invested in Big Data - Gartner
                      StorageNewsletter.com, March 13th, 2013
                      "After a few years of experimentation and early adopter successes, 2013 will be the year of larger scale adoption of big data technologies, according to Gartner, Inc.

                      According to a worldwide survey of IT leaders, 42% of respondents stated they had invested in big data technology, or were planning to do so within a year..."

                      Demand for IT Security Experts Outstrips Supply
                      Network Computing March 12th, 2013
                      "Demand for security professionals is growing at almost four times the pace of other roles in IT, and has consistently outstripped the supply of experts, according to new report. During the past five years, the number of job postings for IT security positions went up 73%, according to a study conducted by Burning Glass Technologies, which develops job-search and resume-parsing software. By contrast, the study showed that job postings for general IT positions went up just 20% in the same time period..."
                      3 Warning Signs Your IT Team Is Job Hunting
                      InformationWeek March 13th, 2013
                      "Is your IT team toiling with one foot pointed toward the exit sign? It's not always so obvious as an employee leaving a resume on the printer tray.

                      Recognizing the warning signs of unhappy employees is a vital IT management skill. When you see them, you can act before your employees -- and especially your best employees -- start leaving for other jobs..."

                      • People Act Differently In Team Settings
                      • "A" Performers Start Making Rookie Mistakes
                      • Flip-Flops Become Dress Shoes

                      Read on for details.

                      10 trends shaping IT hiring in 2013
                      InforWorld March 15th, 2013
                      "Concerns about the economy and budget battles on Capitol Hill have put a damper on the IT job scene, but not enough to thwart expansion

                      There's plenty of reason for optimism about IT jobs. CIOs are ramping up hiring, average salaries are climbing, and companies are increasing their investments in core tech areas such as security, mobility and data analytics. Concerns about the economy and budget battles on Capitol Hill have put a damper on the IT job scene, but not enough to thwart expansion.

                      We're seeing robust growth in IT jobs, both on the contract side and on the permanent/direct hire side," says Matthew Ripaldi, senior vice president at IT staffing specialist Modis. "It's broad-based, as well. We're seeing growth in a lot of different geographies, across a number of different industries, and in companies of all sizes."

                      Job Candidates Want Payback for Hiring Snubs
                      Baseline March 13th, 2013
                      "Note to hiring recruiters: If you think there's no harm, no foul involved when you don't acknowledge a job candidate's application, think again. The vast majority of job seekers expect to get at least a token "thank you for your interest" note, according to a recent survey from CareerBuilder. Yet, most of these individuals never hear back from prospective employers, findings show..."
                        IT - Virtualization
                        x
                        Getting Real With Virtualization
                        CIO Insight March 15th, 2013
                        "The very essence of virtualization is to fool us. That is, it takes what is real and makes it infinitely more valuable by making its 'realness' disappear. This ability to fool us provides the key enablement for solutions such as IT as a service (ITaaS) and Cloud. That is, solutions like ITaaS demand ubiquity, which can occur when we can create granular processing entities afforded by different virtualization techniques that are now available..."
                          Companies take bold steps into desktop virtualization
                          IT World March 11th, 2013
                          "At the new Johns Hopkins Hospital in Baltimore, the maxim "do no harm" extends beyond caregivers to members of the technology team, especially when they undertake a sweeping desktop virtualization project that could impact the daily routine of up to 9,000 clinicians.

                          'If we're going to take on technology change inside a critical care setting, and with systems that serve our sickest patients, we've got to have a well-thought-out plan for making sure it works and that there's backup,' says Stephen Sears, director of cloud and virtualization services at the 1.6 million-square-foot hospital.

                          The sheer physical size of the new hospital meant clinicians would need to be more mobile and rely more heavily on wireless computing. In addition, caregivers were adopting a new clinical documentation system, and Sears knew that they would be spending much more time on desktops and mobile devices..."

                          Virtualization Gains Popularity Despite Problems
                          CIO Insight March 11th, 2013
                          "Virtualization is a huge buzzword in the enterprise. CIOs around the globe are questioning whether they should stick with existing infrastructure or switch to a new virtual server setup that, according to vendors, will deliver all of the benefits of legacy solutions but with fewer headaches.

                          However, a new study commissioned by Veeam Software, a virtual backup company, tells a much different story..."

                          IT - Compliance
                          x
                          PCI compliance in the cloud decoded
                          SC Magazine March 15th, 2013
                          "The Payment Card Industry's (PCI) Cloud Special Interest Group (SIG) is responsible for evaluating cloud technology – particularly public cloud – and providing guidance on achieving PCI Data Security Standard (PCI DSS) compliance within these environments.

                          The output of the SIG was an information supplement titled 'PCI DSS Guidance: Cloud Technologies.' The document was released by the PCI Standards Security Council in February..."

                          IT - Email
                          x
                          We still need Emily Post in the digital age
                          InfoWorld March 15th, 2013
                          "In the age of the tweet, the text, and the wearable camera, there's still reason to take an extra few seconds to be polite..

                          Thirty minutes or so after I finish writing this post, I'll get a short email from my editor ..

                          But if you believe New York Times tech writer Nick Bilton, I should be irked, not pleased. In an attention-grabbing story the other day with the print headline "Thanks, Don't Bother," Bilton writes: "Some people are so rude. Really, who sends an email or text that just says 'Thank you'?" He wasn't being ironic..."

                            DOD Reaches 1 Million Users On Cloud Email
                            InformationWeek March 13th, 2013
                            "The Department of Defense now has one million users on a consolidated private cloud email platform, making it one of -- if not the -- largest of all independent email systems worldwide. Two years after beginning the push toward enterprise email for the Department of Defense, the military has almost fully migrated one service, the Army, to enterprise email; has begun moving a series of other DOD agencies and military commands to the system; and is engaging in deep discussions about the move with the Air Force and Navy..."
                              Storage
                              x
                              On-Demand Webcast: DataCenter Storage Trends for 2013 with IDC
                              Meeting Storage Demands with a Declining Budget
                              A new webcast "Data Center Storage Trends for 2013," featuring Ravi Pendekanti of Oracle and Laura DuBois of IDC, is now available (registration and log-in required). Topics include new and emerging technologies that will help users stay ahead of challenges of optimal storage. Specific topics are:
                              • Top trends you can expect to see in the storage market in 2013
                              • New ways to optimize your IT infrastructure for performance and efficiency
                              • How Oracle is positioned to help you with our complete and fully integrated storage portfolio

                              Learn how to respond the growing demands on storage infrastructure with a diminishing budget.

                              Snap Clone: Instant, Self-serviced Database-on-demand (DBaaS)
                              Advantages Over Storage-level Cloning
                              In Sudip Datta's post "Enterprise Manager Snap Clone Instant, self-serviced database-on-demand" the efficiencies in space and time Snap delivers over storage-level cloning are noted, along with other advantages:

                              • Automated registration and association with Test Master database

                              • Database as a Service using a self-service paradigm

                              • Time travel (backup snapshots)

                              • Manageability

                              Datta reviews the steps involved in enabling both the Snap Clone feature of Enterprise Manager and of DBaaS. Enterprise Manager supports a self-service model where users can provision databases without being gated by DBA and pick a service template that specifies the zone where to deploy and the database gets provisioned.

                              IT - Database
                              x
                              Database security is too complex to implement
                              Help Net Security March 14th, 2013
                              "A recent GreenSQL survey of IT professionals worldwide concluded that 31.4% of security professionals believe that database security implementation is too complex, making it their number one obstacle. Almost 20 percent think that requirement for dedicated personnel or special expertise is yet another hurdle in putting in place database security..."
                              IT - Backup
                              x
                              Cloud Backup and Recovery Guide
                              InforStor March 11th, 2013
                              "Like It or Not, You Will Be Backing Up to the Cloud Soon

                              Many organizations are still resisting cloud backups for one main reason: trust. Businesses don't trust third parties with their sensitive data. They don't trust that data will be available when they need it, and they don't necessarily trust that they'll be able to move their data from one vendor's cloud to another.

                              All valid points. And, frankly, all of them are beside the point..."

                                IT - Big Data
                                x
                                Practice big security with Big Data
                                TechRepublic March 11th, 2013
                                "Security is often an afterthought in most rapidly maturing applications, and Big Data is no exception.

                                IT security has gone from nuanced technical discussions in IT leadership circles to dinner table conversation topics, as each week brings new front page news stories about security breaches and high-profile hacker attacks.

                                ItÂ’s easy to get caught up in the fear and loathing of these discussions, and long-term readers may recall that I generally take a more sanguine approach to data security. I suggest regarding data security like insurance: determine your risk exposure and ideal coverage, determine how much you want to spend, then adjust the two until they meet at a medium youÂ’re comfortable with..."

                                IDC: Big data hype still here, but maturity beckons
                                Computerworld March 13th, 2013
                                "Few tech industry buzzwords have gotten as vigorous a workout as "big data," but while the hype remains plentiful, it is starting to give way to real-life successes as well as formal ways companies can develop big data strategies, according to a number of IDC analysts..."
                                Is Your Data Big Enough For Big Data?
                                Information Week March 12th, 2013
                                "If you're familiar with Gartner's 3V definition of big data -- high volume, high velocity and high variety -- you're probably aware that managing massive data sets doesn't necessarily require a Hadoop-style solution.

                                If not, you've got some studying to do..."

                                Big Data Adds .Nickles and Dimes. to Giant Wind Farm
                                CIO Journal, Wall St. Journal March 12th, 2013
                                "Sensor data is emerging as a critical tool for operators hoping to get the best performance out of their giant wind farms...

                                The company is using analytic tools developed by General Electric Co. that captures data on 200 different measures from sensors placed on wind turbines and then provides advanced, real-time analysis to help the turbines operate more efficiently in different conditions, including winter weather..."

                                The Long Journey to Analytics ROI
                                CIO Insight March 15th, 2013
                                "A new survey of 600 executives in the U.S. and the U.K. conducted by Accenture finds that belief in the business value of analytics at this point is more an article of faith than science.

                                It's clear that while the executives surveyed are continuing to increase their investments in analytics, only one in five says they are satisfied with the results. More troubling yet, 58 percent say they are still unclear about the business outcomes derived from those investments. And just to make matters even more interesting, half admit they are concerned about data accuracy issues, and only two in five say their analytics efforts to date has yielded any actionable intelligence..."

                                The Open Group panel explores how the Big Data era now challenges the IT status quo
                                IT-Director.com February 25th, 2013
                                "We recently assembled a panel of experts to explore how big data changes the status quo for architecting the enterprise. The bottom line from the discussion is that large enterprises should not just wade into big data as an isolated function, but should anticipate the strategic effects and impacts of big data—as well the simultaneous complicating factors of cloud computing and mobile—as soon as possible..."
                                Stalking the Elusive Data Scientist
                                CIO Insight March 13th, 2013
                                "There is widespread agreement that there aren't enough data scientists to power the Big Data movement, and I concur with this increasingly commonplace sentiment. I also believe that the human expertise to capture and analyze Big Data is both the most expensive and the most constraining factor for most organizations pursuing Big Data initiatives. So what do we do about the problem?..."
                                Visa Says Big Data Identifies Billions of Dollars in Fraud
                                CIO Journal, Wall St. Journal March 11th, 2013
                                "The rising controversy over China's alleged cyber espionage against U.S. companies has dominated the recent discussion over network security. While politically motivated intrusions are doubtless a threat to many corporations around the world, those concerns may be obscuring a much bigger and more immediate threat to many businesses and their customers—and that is the mounting sophistication of criminal gangs that operate online...

                                No company—and certainly not Visa, the credit and debit card processing giant—can afford to 'stand still,' Richey says."

                                IT - BYOD
                                x
                                Learning BYOD's risks the hard way
                                FierceCIO March 13th, 2013
                                "If you're in charge of IT for a school district, your users are on vacation for several months every summer, and if they bring their own devices back to work with them in the fall, they probably bring back a lot of malware too. The viruses that faculty members in the Anaheim Union High School District have brought back with them have caused hundreds of hours of extra work for IT, reports Colin Neagle at Network World..."
                                  How BYOD Can Complicate Support
                                  Byte, March 14th, 2013
                                  "Advocates of Bring Your Own Device (BYOD) and consumerization have promised it would improve employee productivity because they can choose the device they want and access the data from anywhere they want. IT departments have resisted BYOD and consumerization, however, because their perception is they lose control of testing, the upgrade cycle, the data or even understanding fundamentally how the application works. The ease of use for the user creates an additional burden for the IT staff. Here's a perfect example...":
                                  BYOD is a four-letter word for too many
                                  InfoWorld March 15th, 2013
                                  "It's telling that "bring your own device" is shortened into the acronym BYOD. It's just another four-letter word that, depending on the context you use it in, is either your company's downfall or its savior. For some, it's another way to save money on the bottom line, though most people know by now that if your intention is to save money, you're barking up the wrong tree. Then there are those who know that providing their users with the right devices can boost productivity. It's not really a stretch to think this, as tons of news stories and surveys show that people are spending more time working and are producing more..."
                                  15 percent of companies have no BYOD policy
                                  Help Net Security March 11th, 2013
                                  "ThreatMetrix announced results of a study that surveyed U.S. business managers and IT executives within retail and financial services organizations on their level of cybersecurity planning and fraud prevention solutions.

                                  While one in four retail and financial service employees participate in BYOD, 15 percent of companies have no policy in place. As the BYOD trend replaces strictly controlled corporate-issued devices with a wide variety of consumer-owned devices, this poses a huge security risk to organizations and its customers..."

                                  Top10
                                  x
                                  Top Ten Articles for last few Issues
                                  Vol 181 Issue 1; Vol 180 Issues 1, 2, 3 and 4; Vol 179 Issues 3, 4 and 5
                                  We track how frequently each article is viewed on the web site to determine which the readers consider the most important. For last week, the top 10 articles were:

                                  • Oracle Releases Oracle Solaris 10 1/13
                                  • Managing a Private Cloud with Oracle VM Manager
                                  • The Best Network Attached Storage Choice for Oracle Database and Software Environments
                                  • New Features in Oracle Linux 6.4
                                  • Introducing Oracle's x86 Infrastructure Block
                                  • Oracle Solaris on Oracle x86 Systems Webcast Replay
                                  • SnapManager for Oracle DB for ZFSSA Now Available
                                  • The Document Foundation Releases LibreOffice 4.0.1
                                  • Oracle Produces World Record SPECjbb2013 Result with Oracle Solaris and Oracle JDK
                                  • Enterprise Strategy Group Nixes DIY Big Data Solutions; Buy Oracle Big Data Appliance Instead

                                  The longer version of this article has list of top ten articles for the last 8 weeks.

                                    IT - Server
                                    x
                                    An old IT ninja learns new Unix tricks - vim
                                    InfoWorld March 11th, 2013
                                    "It was with some fascination that I happened across Ian Langworth's "VIM after 11 years" post last week. As a vi/vim user for more than 20 years, I wasn't expecting to learn much. But to my surprise, Langworth revealed many features and tweaks I never would've sought out on my own because -- well, why would I? My vim reflexes have been built up like calluses over decades, long before many of these features and plug-ins were a glimmer in anyone's eye.

                                    Yet I found some very old features that I either never knew about or used so sparingly that they've been archived..."

                                      Sysadmin
                                      x
                                      Configuring a Basic LDAP Server + Client in Solaris 11
                                      A How-to that Results in an extra LDAP Server

                                      In his post on Configuring a Basic LDAP Server + Client in Solaris 11, Paul Johnson concedes that, while Solaris 11 ships with OpenLDAP to use as an LDAP server, users require a simple slapd.conf file and an LDIF schema file to populate the database. After suggesting (and demonstrating how) to change the lines suffix and rootdn to better represent respective network naming schema, Johnson addresses the procedure for changing the LDAP manager password, then he demonstrates the group, world and single user he has created and proceeds to turning on the LDAP server that is up, populated, and ready to authenticate against.

                                      Take a Second Look at Unix Features: vim
                                      Not a Platform to Take for Granted

                                      In the wake of reading Ian Langworth's "VIM after 11 years," Paul Venezia posts that he learned of several Unix features that, despite long use of the platform, he remained unfamiliar with. Among them is the Unix less command, a tool that simply handles pagination of long text files, as well as the ability to move forward and backward within the file, and that features 34 command-line switches and numerous navigation commands.

                                      Trending in
                                      Vol 234, Issue 3
                                      Trending IT Articles