News about Oracle's Solaris and Sun Hardware
System News
Mar 25th, 2013 — Mar 31st, 2013 Generate the Custom HTML Email for this Issue
System News System News for Sun Users
Volume 181, Issue 4 << Previous Issue | Next Issue >>
Sections in this issue:
click to jump to section

Oracle Releases SPARC Servers with the T5, WorldÂ’s Fastest Microprocessor
SPARC T5 Processor Holds 17 World Records
Oracle has just released the new SPARC T5 and M5 servers running Oracle Solaris. The SPARC T5, the worldÂ’s fastest microprocessor, has set 17 world records and is the worldÂ’s best platform for enterprise computing at any scale. OracleÂ’s SPARC M5-32 high end server is up to 10x faster than previous generations and offers superior hardware domaining and RAS capabilities. It delivers a 2.5x cost advantage over a comparable IBM system. The new servers enable near linear scalability from 1 to 32 sockets, with one common core, one operating system, and one common set of systems management and virtualization tools.
China Mobile Fujian Implements Oracle Exadata Database Machine
Improves System Performance 2X, Data Compression 3X-5X
Using Oracle Exadata Database Machine has enabled China Mobile Fujian to replace its legacy infrastructure and develop an enterprise-level data warehouse for its next-generation BASS. Switching to Oracle Exadata improved system performance by 4X and data compression by the range of 3X-5X. Prior to the deployment of Oracle Exadata Database Machine, China Mobile Fujian could store only 70 Terabytes (TB) of data in its data warehouse, greatly restricting the business analysis. Now, the company can store and process 250 TB of data, including historical data about its mobile customers and the services used; the data mart access layer; and operational, financial, and analysis reports.
March 2013 Edition of the Oracle Virtualization Newsletter
The Best Way to Keep Current on Virtualization Best Practices
The March 2013 issue of the Oracle Virtualization Newsletter delivers the usual mix of news, videos, Web- and podcasts, as well as a new version of the Oracle VM TCO Calculator, which enables users to learn how much more can be saved with Oracle VM vs. VMware (including management costs). Videos include an Oracle VM 3.2.1 Demo and Part 1 of an Oracle VM command Line Tutorial. Contributions in the Blogosphere section help users to stay abreast of best practices in the community. Training sessions are also offered on Oracle Fabric Interconnect Administration and on Oracle VM Server for SPARC: Installation and Configuration.
Managing Tape Storage: Is It Really as Difficult as has been Thought?
Not with Oracle's StorageTek Tape Analytics
Oracle's StorageTek Tape Analytics (STA)answers many concerns about tape storage. "This system," Brian Zents posts, "does the analysis for you, leaving you with proactive recommendations and resulting corrective actions Â… just like disk." He further explains that STA is an intelligent monitoring application for Oracle tape libraries that allows users to make informed decisions about future tape storage investments based on current realities. He adds that it is also is used to monitor the health of your tape library environment. Its functionality can be utilized regardless of the drive and media types within the library, or whether the libraries are in an open system or mainframe environment.
What's New in Oracle VDI 3.5?
An Overview with Fat Bloke
Fat Bloke reviews the just-released Oracle Virtual Desktop Infrastructure version 3.5, a major new release which introduces some great new features, among them enabling VDI deployment that can start with a single server, yet scale to the Enterprise. His post summarizes some of these features:

  • Smarter Virtual Desktop Management with both personal and application hard drives

  • Richer User Experience, with new platforms that allow Windows Media applications (Player and IE plugins) to get accelerated by intercepting the high level codec and using built-in assists on the client to display media on to the screen.
IT - Storage
New Storage Technologies to Deal with the Data Deluge
ComputerWorld, March 25th, 2013
"Douglas Soltesz, vice president and CIO at Budd Van Lines, is facing a common problem: A seemingly endless flood of data.

"If you gave me an infinite amount of storage, I could fill it," he says. The most recent four months of high-definition surveillance video from the company's offices and warehouses now consumes 60TB on his NexentaStor NAS and SAN platforms. That video is one reason his storage needs are growing 50% to 80% per year..."

Overcoming the Weaknesses of Server-Side Flash
Storage Switzerland, March 26th, 2013
"Memory based storage devices, mostly of the type that leverage flash, have become the first option when companies are trying to address storage performance issues. ThereÂ’s just one problem, shared solid state devices often expose the performance limitations of the storage network and of the shared storage system itself. In addition thereÂ’s the complexity inherent in any high performance network design. And, a move to a shared solid state storage system can present a significant disruption by replacing legacy storage systems and tools..."
DreamWorks Tops Compute-Cycle Record With 'The Croods'
ComputerWorld, March 26th, 2013
"The new 3D animated movie 'The Croods' may be about a stone-aged family, but DreamWorks said it is by far its most sophisticated production to date, topping all others in compute cycle hours.

The movie, out in theaters last Friday, required a whopping 80 million compute hours to render, 15 million more hours than DreamWorks' last record holder, 'The Rise of the Guardians.'..."

    Evaluate & Implement Solid State Drives, March 25th, 2013
    "A considerable amount of promise and upside has been attached to SSDs over the years. The recent releases of enterprise-class SSD models from multiple manufacturers have only fueled the excitement. So, is 2013 the year that SSDs see widespread use in the data center, and if so, how should a small or midsized enterprise go about evaluating if implementation makes sense? Here is what industry insiders are saying..."
    IT - Technology
    10 Tech Products to Boost Your Small Business Productivity
    CIO, March 25th, 2013
    "From mini storage arrays to IP cameras to print servers, these 10 hardware devices will help you run your small business more efficiently whether you're in the office or hitting the road to close a deal..."

    • Pogoplug
    • Drobo Mini
    • xPrintServer
    • ioSafe SoloPRO Hard Drive
    • Dropcam HD
    • Doxie Go Scanner
    • Apple Airport Express Base Station
    • Lenovo ThinkVision LT1421 Travel Monitor
    • Logitech K810 Bluetooth Illuminated Keyboard
    • Libratone Zipp

    Read on for details.

      10 Rugged Gadgets for Surviving Dirty, Dangerous Jobs
      PCWorld, March 25th, 2013
      "Not all work takes place in a cushy, climate-controlled office. A lot of business occurs in less-than-ideal conditions. In the wind and rain. At high altitudes. In extreme temperatures. Sound familiar? You need rugged tech—gear that can tough it out in a construction zone or survive the demands of a research vessel off the shores of Antarctica.

      Read on to discover gear that is, for the most part, tested to military-grade standards..."

      • LaCie XtremKey USB 3.0
      • Panasonic Toughpad FZ-A1
      • Dell Latitude E6420 XFR
      • Panasonic Toughbook F9
      • Olympus TG-820 iHS
      • IoSafe Rugged Portable drive
      • BlueAnt T1 Rugged Bluetooth Headset
      • NCS Technologies Bunker XRV-5241 Server
      • Liquipel waterproofing
      • AquaPac Waterproof Case for iPad

      Read on for details.

      20 People Who Changed Tech: Alexander Graham Bell and Theodore Vail
      Information Week, March 25th, 2013
      Is this one person or two? The real issue is that Alexander Graham Bell was the masterful inventor and Theodore Vail was the organizational genius who made it all work. Wait, was Bell really such a great inventor? He didn't even know what every other inventor playing with electricity already knew: that it was impossible to send a voice call over telegraph wires! So Bell pursued the idea with the help of his father-in-law, who bankrolled his experiments.
        IBM Opens a Path Beyond Silicon Chips
        NewsFactor, March 25th, 2013
        "Researchers at IBM have applied a positively charged ionic liquid electrolyte to an insulating oxide material -- vanadium dioxide -- and successfully converted the material to a metallic state. The material held its metallic state until a negatively charged ionic liquid electrolyte was applied, to convert it back to its original, insulating state..."
        Nanowires Could Boost Solar Power 15X
        ComputerWorld, March 25th, 2013
        "Building solar voltaic cells from nanowires instead of standard metal conductors can increase the amount of energy that can be captured by a factor of 15, according to a new study by scientists from the Nano-Science Center in Denmark.

        The study, published this week in the peer-reviewed journal Nature Photonics, found that nanowires have unique light absorption properties, meaning the limit of how much energy can be harnessed from the sun's rays is vastly higher than previous believed..."

          MySQL Enterprise Edition Enables ip.access to Support Mobile Traffic Growth
          UK Telecom Provider Sees Advantages in High Availability, Performance and Scalability
          ip.access specializes in delivering full end-to-end small cell solutions for Tier 1 and Tier 2 telecom operators around the world. The company deployed MySQL, which delivered the performance & scalability required for mobile traffic growth, and the high availability and zero administrative burden, while being a cost-effective solution fulfilling their other requirements. For installations counting up to 250K small cells, MySQL Enterprise Edition is deployed on active-standby servers. The MySQL Enterprise Monitor and Query Analyzer management tools included in the MySQL Enterprise and MySQL Cluster Carrier Grade Editions enable simple and rapid performance monitoring and tuning when needed.
          Q&A About the Latest Oracle Linux Releases
          Monica Kumar, Senior Director, Oracle Linux, Shares the News
          Monica Kumar, Senior Director, Oracle Linux, Oracle Virtualization, and MySQL Product Marketing, joins Zeynep Koch in a post on Oracle's Linux Blog for a Q&A on Oracle's latest Linux releases: Oracle Linux 5.9 and 6.4. Oracle Linux customers enjoy several advantages over users of RHEL and SUSE, she says, which include the latest technology, the latest word in best testing and deployment practices; 24/7 world-class support at the lowest cost; and free access to software (both binaries and patches). Kumar concludes with the announcement that 2013 will see further releases of both Oracle Linux 5 and 6, as well as the Unbreakable Enterprise Kernel.
          IT - Cloud
          Bart Perkins: Cloudbursts Ahead
          ComputerWorld, March 25th, 2013
          "Moving to the cloud may reduce infrastructure costs and headaches, but clouds have their shortcomings. When they rain, millions can quickly become drenched. In the past year, Amazon, Microsoft, Google and other providers experienced problems, from minor disruptions to major outages. A June 2012 headline captured the fallout: "Modern life halted as Netflix, Pinterest, Instagram go down."

          The service interruptions experienced by those companies and others disappointed countless consumers, but it was worse than a disappointment for the businesses themselves..."

          BYOD, Data Loss Top List of Cloud Computing Challenges
          Datamation, March 27th, 2013
          "IT managers are struggling to reconcile the realms of cloud computing and data security, according to a study from AccelOps (PDF), a maker of security information and event management (SEIM), performance and availability monitoring software. And it's holding enterprise cloud adoption back.

          In general, IT managers are struggling with BYOD, data control and staving off potential data loss. Enforcing security policies and gaining visibility across cloud-based and on-premise infrastructure resources round out the top five concerns among the 176 IT security professionals surveyed by the company..."

          Cloud Infrastructure: Key Considerations
          Information Management, March 26th, 2013
          "To adequately understand an overall cloud infrastructure, one must look at additional areas, such as mobile access, the Internet of Things, data and big data. Additional infrastructure layers involve consideration of cost, performance, accessibility, reliability and security. All of these factors and layers are distinct by themselves, but when combined become interdependent and contribute to a solid infrastructure..
          How Netflix Is Ruining Cloud Computing
          Information Week, March 26th, 2013
          "On March 13, Netflix announced $100,000 in prize money for the developers who do the most to improve its open source tools for controlling and managing application deployments on cloud computing. Before spearheading this contest, Netflix's cloud architect, Adrian Cockcroft, released many internal Netflix tools as open source. Currently, 8 cloud-architecture-specific tools are available from Netflix, and Cockcroft has been very open in sharing his and Netflix's knowledge in public forms.

          In theory, all of this should be wonderful. In reality, however, it's likely to leave cloud computing with an enormous hangover of subpar practices and architectures for years to come..."

          It's Twilight for Small In-House Data Centers
          ComputerWorld, March 28th, 2013
          "Virtualization, cloud services and software-as-a-service (SaaS) is making it much easier to shift IT infrastructure operations to service providers, and that is exactly what many users are doing.

          This trend is being felt the most at in-house data centers in small- to mid-size companies. These firms may be trying to shut down their data centers, or shift a major portion of their workloads to external providers..."

          Private Cloud to Public Cloud Migration Gets Easier, but Obstacles Remain
          SearchCloudComputing, March 25th, 2013
          "Migrating applications from a private data center to a public cloud can be a rocky road, but many cloud customers choose to make their move without the assistance of cloud migration tools.

          Cloud migration tools can help users move workloads from private to public clouds, as well as between disparate public clouds, but there are limitations. In some cases, these tools are required for management at the beginning of a cloud migration process; and in others, users doubt a mass-marketed tool can address all of the idiosyncrasies of their particular environments, such as custom applications..."

          Who Has Responsibility for Cloud Security? A Network World Roundtable
          NetworkWorld, March 25th, 2013
          "As more organizations leverage the cloud for critical business applications, they are discovering one of the greatest challenges is combining existing internal controls with cloud protection efforts. Highly regulated business and government organizations in particular must maintain comprehensive security and compliance postures across these hybrid systems. Network World explores the issue in-depth with:

          • Shawn Kingsberry, CIO of the Recovery Accountability and Transparency Board
          • Craig Sutherland, principle architect and engineer, lead associate, Booz Allen Hamilton
          • Mike Rothman, president, Securosis
          • Ken Ammon, chief strategy officer, Xceedium

          Read on for details.

          IT - CxO
          Executive Protection: 4 Essentials for Secure Travel
          CSO Online, March 25th, 2013
          "As these words are being written, an Austrian citizen is held captive in Yemen, the attack on the Amenas gas complex in Algeria has claimed a toll of 37 foreigners including three Americans, and reports suggest homicides in Mexico are on the rise (86 at the Estado de Mexico in January, 2013 alone).

          It is an unsafe world. From abductions to targeted assassinations, travelers in general and high-profile executives in particular are being targeted for political statements and/or monetary gain..."

            How a CIO at ING Japan Transformed Its IT Operation
            CIO, March 27th, 2013
            "When I joined ING in Japan, I had been recruited as a turnaround agentbecause I had a track record in large technology transformations. The morale of the IT organization was at an all-time low, as was business confidence in IT. My vision was to move the IT organization beyond the role of modifying and enhancing what was already there to become an effective partner with the business. I immediately engaged the IT department, meeting with every member to get a sense of where the organization was and how ready it was for a transformation...
              Nine Signs That Your Star Employee Plans to Leave
              Baseline March 25th, 2013
              "One-quarter of workers plan to change jobs this year or next, according to research from CareerBuilder. When those employees are designated office "stars," their loss hurts both your department and the overall organization. This is clearly a major issue for companies, as more than one-half of CEOs view the lack of availability of key skills as a potential threat to growth in 2013, and four out of five CEOs view the strengthening of employee engagement programs as a top priority..."

              • Out-of-Office Response
              • Dress the Part
              • Private Connection
              • Photo Finish
              • Checked Out
              • Going Solo
              • Search Party
              • Glowing Endorsement
              • Disappearing Act

              Read on for details.

                Straight Talk on Security Gets Employees to Listen -- And Comply
                ComputerWorld, March 25th, 2013
                "The statistics are staggering: Last year, Symantec blocked more than 5.5 billion malware attacks, an 81% increase over 2010, and reported a 35% increase in Web-based attacks and a 41% increase in new malware variants. Those findings, documented in the company's latest annual "Internet Security Threat Report," might cause IT leaders to wonder if they're doing everything possible to protect their organizations.

                And well they should. Security folks, in struggling to establish policies and procedures that are both effective and easy to implement, often forget a crucial step, experts say: communicating their security goals effectively, so that employees not only follow the security procedures but also understand the reason for having a security policy and embrace its goals..."

                The Power of IT Peer Groups
                CIO Insight, March 27th, 2013
                "Last year, Israel Lang, CIO of Pinnacle, an IT consulting practice in Indianapolis, faced a dilemma. A difficult customer was mistreating his engineers and four of them had quit in frustration. But the customer paid Pinnacle five figures a month for its services, 'so it was hard to walk away from that cash flow,' says Lang..."
                The Renewed Importance of Communication and the CIO
                Mindjet, March 28th, 2013
                "The CIO of any business plays a crucial role, which can often be overlooked. Responsible for an organisation's entire IT infrastructure, the buck really does stop with them if something goes wrong–especially as we now live in a world where businesses simply cannot function without technology or the internet. And as policies like BYOD and other smart devices gain popularity in the workplace, it's more important than ever for CIOs to take the spotlight and help their enterprise reach its goals..."
                IT - PM
                8 Reasons Enterprise Architecture Programs Fail
                Information Week, March 25th, 2013
                "Enterprise architecture was conceived some 25 years ago to address the increasing complexity of IT systems and their poor alignment with business goals. The same problems still exist today, amplified by the accelerating pace of technology change.

                Why is it that EA programs are more likely to fail than succeed? Here are eight typical failure modes, followed by recommendations on how to avoid them.

                • Lack Of Sponsorship
                • Hiring Or Promoting The Wrong Person
                • Building An Ivory Tower
                • Policing And Insensitivity To Culture
                • Maintaining The EA Artifact Factory
                • Clinging To A Particular Framework Or Tool
                • Thinking Enterprise Architecture Equals Technology Architecture
                • Taking The "Enterprise" Word Literally

                Read of for details.

                  Oracle Database Appliance X3-2 Launch Webcast Set for April 3, 2013
                  Learn About the Latest Version of the Solution that has Revolutionized Database Management
                  The launch Webcast for Oracle Database Appliance X3-2 is scheduled for Wednesday, April 3, 2013, at 10:00 a.m. PT (1:00 pm ET). Viewers will have the opportunity to learn from Oracle experts and customers about the latest version of this solution that has revolutionized the deployment, management, and support for a database platform. Oracle Database Appliance X3-2 offers performance increases of up to 2X and increases in storage capacity of up to 4X. The solution hosts both databases and application workloads, and Oracle Database Appliance X3-2 also extends the "pay-as-you-grow licensing policy." Registration and log in are required for this Webcast.
                  IT - Networks
                  Killer App for Ipv6? It's The Internet
                  GCN, March 25th, 2013
                  "I recently solicited comments on what the killer app might be that would drive demand for and adoption of IPv6, the next generation of Internet Protocols. From what the readers had to say, the killer app is the Internet itself. Despite the possibilities for improved functionality in the new protocols, the overriding reason for using them is simply to keep the Internet alive and well as the old address pool dries up. With the current IPv4 infrastructure becoming increasingly fragmented and fragile, 'the Future is IPv6, or no Internet,' one reader commented. 'You choose.' ..."
                  Monitoring the Nomads in Your Network
                  Dark Reading, March 25th, 2013
                  "As more employees bring their own devices into the network, tracking the nomadic technology can be difficult. From basic to sophisticated, options abound, say experts..

                  In discussing the dangers of the bring-your-own-device movement, Guy Levy-Yurista, chief technology officer of AirPatrol, points to a recent discussion with a private equity firm. It took three months for the firm to realize that an unknown device was logging into their network and collecting e-mail messages, he says..."

                    Plan for a Network Expansion or Upgrade
          , March 25th, 2013
                    "Expanding or upgrading your network can be a daunting task, especially without proper planning. Among other tasks, you need to upgrade in waves in order to prevent downtime, have a solid backup plan if things go wrong, and make sure your newly implemented solutions give you the performance and efficiency they promise.

                    When it comes to a network expansion, thereÂ’s no such thing as too much planning, and it all starts with establishing a baseline so you know where you want to be in the future..."

                    What Happened to IPv6?
                    Government Technology, March 26th, 2013
                    "One could feel the excitement building as June 6, 2012, approached. This was to be World IPv6 Launch Day, the day the Internet Society would replace the old IPv4 with a new, permanent Internet address protocol. While heavy hitters like Bing, Facebook, Yahoo, Google, Comcast and AT&T joined the parade, few others noticed the event. How could that be? ..."
                    IT - Operations
                    4 Steps to Regulatory Compliance in IT Asset Disposition (ITAD)
                    Lifespan, March 26th, 2013
                    "Almost every corporate organization has to comply in some way with regulatory standards. The requirements vary by industry, but regulatory compliance is one of the major areas at which companies must look when creating risk management policy. For those planning for risk through their companyÂ’s IT processes, a major regulatory concern is data security. Generally, regulatory standards place a high value on data security and come down hard on organizations that let sensitive data leak..."
                    10 of the Biggest IT Sand Traps
                    TechRepublic, March 25th, 2013
                    "IT faces challenges on a daily basis. But most experienced IT’ers have learned to avoid the worst sand traps so they can prevent time and energy drains. What are today’s biggest IT sand traps — and what best practices can you use to circumvent them?.."

                    • Uncooperative users
                    • Unhelpful users
                    • Lack of tool integration
                    • Platform loyalty
                    • Poor project management
                    • Lack of documentation
                    • Poor data quality
                    • Jargon
                    • Unrealistic deadlines
                    • Lack of people skills

                    Read on for details.

                    IT - Security
                    Five Ways to Protect Customer Credit Card Information
                    IT Business Edge, March 25th, 2013
                    "According to a March 13 report from the Commerce Department, retail sales increased 1.1 percent in February, to $421.4 billion, marking the biggest surge in the retail space since last September. Elevated sales numbers mean additional credit card transactions and, as a result, an increased risk for fraud.

                    A recent report from Javelin Strategy & Research found that credit card fraud has increased an alarming 87 percent since 2010 and accounted for a cumulative total loss of approximately $6 billion. Despite mounting evidence of this growing epidemic, loss as a result of credit card fraud has remained the proverbial elephant in the room for many businesses..."

                      6 IT Security Innovations to Keep You Ahead of Attackers
                      CIO, March 26th, 2013
                      "Hardly a day goes by without a new security threat emerging. Traditional security tools aren't always up to the task of keeping sensitive business information in safe hands. These six innovations will help you stay a step ahead...

                      Security threats abound in the enterprise. Today's IT security professionals must worry about malware, spyware, hackers, DDoS attacks, hijacked USB drives, spies, cyberwar and other vulnerabilities too numerous to mention..."

                      15 Worst Data Breaches
                      IT World, March 27th, 2013
                      "Data security breaches happen daily in too many places at once to keep count. But what constitutes a huge breach versus a small one? For some perspective, we take a look at 15 of the biggest incidents in recent memory...

                      • Heartland Payment Systems
                      • TJX
                      • Epsilon
                      • RSA
                      • Stuxnet
                      • Department of Veterans Affairs
                      • Sony PlayStation Network
                      • ESTsoft
                      • Gawker Media
                      • Google, etc.
                      • VeriSign
                      • CardSystems
                      • AOL
                      • Fidelity National Information Services

                      Read on for details.

                      Don't Make Users a Security Punching Bag
                      Dark Reading, March 25th, 2013
                      "Too many security pros today take it upon themselves to blame "dumb" users for all of the security ills befalling IT organizations, particularly when users fall for phishing and other email-based attacks. But many of today's most advanced attacks are through Web channels and are so well-designed that even the most advanced training techniques may not teach users how to detect them. According to many security pundits, it is time to stop with the blame game and look in the mirror..."
                      Honeypot Stings Attackers with Counterattacks
                      Dark Reading, March 26th, 2013
                      "A Russian researcher who built an aggressive honeypot to test the ability to hack back at attackers mostly ensnared fellow white hat researchers, script kiddies, and some of his friends in his experiment—but he discovered that he had also counterattacked the desktop of an intelligence agency in a nation formerly part of the Soviet Union..."
                        IT Pros Admit to Plugging In Found USB Drives
                        eWeek, March 25th, 2013
                        "The survey revealed that data which was discovered on the found USB drives often included viruses, rootkits and bot executables.

                        The temptation to find out what exactly is on an unknown USB drive is apparently too great for a vast majority of IT workers, with 78 percent of IT security professionals admitting to picking up and plugging in USB flash drives found abandoned or lying around, according to a survey conducted by South Korean security vendor AhnLab..."

                        Think Layers Of Security Is All That? Think Again
                        CSO Online, March 26th, 2013
                        "NSS Labs, a security research and advisory firm, has found that the layers of malware-catching technology that start at the perimeter of the corporate network and end at the desktop will always fail to catch some exploits.

                        In testing all the major technologies used by corporations, NSS found that some of the 1,800 serious malware it tested always managed to get through, no matter what combination of products was used..."

                        Too Scared To Scan
                        Dark Reading, March 27th, 2013
                        "When it comes to detecting vulnerabilities in mission-critical applications, security professionals often find themselves in a bind. These are usually the applications that the enterprise can least afford to suffer a hack. But at the same time, they are also the applications whose owners are most likely to balk at security testing or scanning probes while they're live. These opponents to vulnerability scans on production applications point to the near-infinitesimal tolerance for downtime or disruption as reason enough to leave well enough alone. But according to security professionals, someone will eventually find those vulnerabilities and if the organization doesn't do it first odds are it is the bad guys who will ferret out the flaws..."
                        Victim of $440K Wire Fraud Can't Blame Bank for Loss, Judge Rules
                        ComputerWorld, March 26th, 2013
                        "A federal court in Missouri has rejected an escrow firm's attempt to blame its bank for a $440,000 cyberheist in March 2010.

                        In a ruling last week, the U.S. District Court for the Western District of Missouri held that Choice Escrow and Title LLC had essentially failed to follow its bank's recommended security procedures and therefore had only itself to blame for the loss..."

                        Misconfigured, Open DNS Servers Used In Record-Breaking DDoS Attack
                        Dark Reading, March 27th, 2013
                        "Biggest-ever distributed denial-of-service attack originally aimed at Spamhaus escalates and hits other corners of the Net...

                        This was not your typical hacktivist DDoS attack: a massive, 300 gigabits-per-second traffic attack against volunteer spam filtering organization Spamhaus spread yesterday to multiple Internet exchanges and ultimately slowed traffic for users mainly in Europe..."

                          IT - Careers
                          15 Common Resume Mistakes and How to Avoid Them
                          IT World, March 25th, 2013
                          "Your IT resume provides recruiters and hiring managers a first impression of who you are and what you offer. Working in a field as competitive as IT means you have to do everything you can to make your resume get noticed. "They [resumes] get eliminated for all sorts of reasons just to get the pile down to something manageable," says Rick Endres, president of the Washington Network and former CIO of the U.S. Congress, as well as deputy assistant secretary for the Department of Commerce for Technology Policy.

                          • Typos, Misspellings and Bad Grammar
                          • Too Much Technology Jargon
                          • Poor Resume File Name
                          • Resume Length
                          • Not Having an Updated Career Brand
                          • Unclear Positioning
                          • Too Little Emphasis on Strategy
                          • Using the Wrong Resume Format
                          • Not Telling the Full Story of Achievements
                          • Being Too Modest About Achievements
                          • Not Aging Achievements and Skills Gracefully
                          • Discounting Important Business Knowledge
                          • Using a Job Title Instead of Describing the Actual Job Role
                          • Not Having Your Resume in PDF Format
                          • Not Enough Crisp Action Verbs

                          Read on for details.

                          13 Things You Should Never Say At Work
                          Forbes, March 25th, 2012
                          "Darlene Price, author of Well Said! Presentations and Conversations That Get Results, concurs. 'Words matter,' she says. 'They are a key component of persuasive communication. Regardless of the audience, topic, or industry, or whether the setting is a stand-up presentation, sit-down conversation, telephone discussion, or an online meeting, a leader uses language to influence someoneÂ’s mind in order to achieve a certain result. ThatÂ’s one reason theyÂ’re seen as leaders; their words compel people to follow'..."
                            One of the Most Important Questions You Should Ask In an Interview
                            TechRepublic, March 27th, 2013
                            "Any IT professional looking at an employment opportunity should ask one question during the interview process:

                            'Is technology seen as a revenue generator or a cost center in this organization?'

                            The answer to this question will tell you something important ..."

                              Ten Surefire Ways to Sabotage Your Career
                              Baseline March 25th, 2013
                              "You may bring the best technology talent to your company, but raw skills alone aren't enough to guarantee a successful career. In fact, there are a number of undesirable "soft skill" traits and behaviors that could very well earn you a pink slip. Even though the job market is improving, anyone who's looking for a position after getting fired (as opposed to being downsized) will be at a disadvantage compared to candidates who have a clean employment record..."
                                IT - Social Media
                                Ban Social Media as a Distraction? No, It Boosts Productivity
                                TechRepublic, March 27th, 2013
                                "Far from diverting employees from their jobs, social media and smartphones actually make staff more productive - and employers should learn to deal with that new reality.

                                Access to social networks via mobile devices gives staff a 'virtual co-presence' with direct benefits for the business in which they work, according to a new study..."

                                  IT - Compliance
                                  Ten Things Compliance Officers Need to do in 2013
                                  WallStreet & Techology, March 25th, 2013
                                  "2012 was quite a year for compliance officers and their firms with record-breaking fines, global benchmark manipulation scandals and continuing swathes of regulatory change. It was also a year of almost unprecedented focus on risk, control and compliance activities within firms and that trend looks set to continue as firms deal with the fall-out of major fines, regulatory change and yet more evidence emerging of significant past wrongdoing in many parts of the financial services marketplace.

                                  All of the signs are that 2013 will stretch risk and compliance functions further still..."

                                  IT - Email
                                  New Web Domain Names: Should You Pass?
                                  Information Week, March 25th, 2013
                                  "Web addresses ending in extensions such as .accountant or .pizza will soon join the online world where .com has long been the sought-after destination. Yet the majority of small and midsize businesses (SMBs) still have no idea the new real estate is about to hit the market. The Internet Corporation for Assigned Numbers and Names (ICANN) received nearly 2,000 applications when it opened the doors for new generic top-level domains (gTLDs) last year. A gTLD is the string of characters "to the right of the dot" in Internet domain names, such as .com or .org..."
                                    Optimizing Storage Systems for DB Workloads
                                    While Guaranteeing Best in Class Performance and Ease of Integration
                                    Storage devices must embed a variety of features so that the optimal level of performance, manageability and operational agility can be achieved. Oracle's Exadata Engineered System does exactly that by embedding dedicated and highly optimized storage nodes that take in charge a part of the database workload in a way that a separate standalone storage device cannot. Philippe Deverchère reviews the requirements that must be met before one can deliver storage systems that can be used as primary storage for databases while guaranteeing best in class performance and ease of integration, noting that Sun ZFS Storage Appliance meets these requirements in large measure.
                                    IT - Big Data
                                    Big Data's Dark Side
                                    Byte, March 25th, 2013
                                    "The potential upside of big data is significant. Organizations, empowered by the ability to extract actionable insights from massive volumes of digital information from a variety of data sources, can (ideally) make our world a better place.

                                    But before we get too dewy-eyed and sentimental, it's important to know that big data has a potential dark side as well, where governments and corporations use this newfound wealth of information for nefarious purposes..."

                                    10 Real-World Big Data Deployments That Will Change Our Lives
                                    CIO, March 25th, 2013
                                    "There's a lot of hype surrounding big data. But it's not hype that the amount of data in the world is increasing exponentially, doubling every 18 months. And use of that data is starting to touch nearly every aspect of our lives, whether we realize it or not. Here are 10 real-world big data deployments you may not have realized were driven by big data..."

                                    • Netflix
                                    • Mount Sinai Medical Center
                                    • The California ISO
                                    • Hydro One Networks
                                    • Oregon Health & Science University
                                    • The City of Las Vegas
                                    • Miami-Dade County
                                    • Tennis Australia
                                    • DPR Construction

                                    Read on for details.

                                    Are You Being Judged Without Your Knowledge?
                                    TechRepublic, March 25th, 2013
                                    "My goal here is to provide some thought-starters, and then see what insights readers are able to provide.

                                    The first issue worth discussing is the proliferation of information about each of us that big data has spawned. More organizations have more information on every one of us than could have been imagined just a decade ago. You all know you have a credit score, but are you aware of what's in your file at the Medical Information Bureau? You should be, because it can greatly impact your ability to get insurance..."

                                    Big Data Workloads Require a New Security Plan: 10 Best Practices
                                    eWeek, March 25th, 2013
                                    "At least two things can be counted upon as big data workload processing and analytics become strategic in enterprise business plans: increasing bandwidth requirements and the emergence of significant new security issues. Regardless of how large or small data workloads may be, IT staff needs to be able to capture and store it all, properly enrich, cleanse, analyze or otherwise process it and effectively access it securely...

                                    • Find and Secure All Your Data Assets
                                    • Have an Enterprise Incident Response Plan
                                    • Set Up Data Loss Prevention as Soon as Possible
                                    • Encrypt All Important Data Assets
                                    • Control and Protect Remote Access
                                    • Practice Consistent Policy Management
                                    • Use AAA for Secure and Effective Remote Access
                                    • Ensure a Secure Application
                                    • Pay Attention to Users Outside the Enterprise
                                    • Keep Up With the News

                                    Read on for details.

                                    CIA Chief advises you to ask: What are your rights? Who owns your data?
                                    NetworkWorld, March 25th, 2013
                                    "The CIA wants to keep all data 'forever' to connect the dots, but the CIA CTO Gus Hunt advised that you should be asking about your rights and who owns the data in this Big Data world...

                                    The cloud is old news, it's "so three years ago," and Big Data "was so last year," but according to the CIA's Chief Technology Officer, Ira "Gus" Hunt, this year is about "how to get value" from Big Data. At the GigaOM Structure Data conference, Hunt presented, "The CIA's 'Grand Challenges" with Big Data" and I highly recommend that you take about 30 minutes to personally listen to it..."

                                    New York City Takes an Open Approach to Data
                                    Baseline March 25th, 2013
                                    "Local Law 11, New York City's landmark open-data law, takes shape and changes the way the city's citizens access government data.

                                    Obtaining and using government data has never been a simple proposition. Too often, data is stored in proprietary, if not arcane, formats, and formatting it in accessible and open formats has been next to impossible..."

                                      Is There A Viz Wall In Your Future?
                                      Information Week, March 27th, 2013
                                      "CIOs the world over are having trouble getting big insights from their big data.

                                      More than half of executives who responded to a PricewaterhouseCoopers survey in late 2012 said it's difficult to get something useful out of the troves of data they have. Anand Rao, a principal at PwC, thinks it's because too few firms use visualization for their data. 'Only 26% are using it,' he said..."

                                      IT - Mobile
                                      10 Tips to Improve Mobile Security
                                      Internet Evolution, March 26th, 2013
                                      "Regardless of whether we're doing online banking, researching new markets, working in the cloud, or simply surfing, we're at risk of becoming a victim of hackers. IT departments take extensive steps to protect data, networks, and devices, but in an era of BYOD and increasingly sophisticated cybercriminals, employees also have to safeguard themselves.

                                      The times when telephones were used solely for making phone calls are long gone. Smartphones and tablets can be used anywhere for practically any function, yet they have their drawbacks. Symantec's State of Mobility survey found that users' biggest fears are devices being lost or stolen, the loss of data, and outsiders gaining unauthorized access to company resources. Unfortunately, all these fears are well founded..."

                                      IT - BYOD
                                      10 Best Practices for Creating a BYOD Policy
                                      eWeek, March 2th, 2013
                                      "Human nature being what it is, people are going to use whatever connected device they have available at the time to handle a business function without giving a thought to security. Why? The terms "easy" and "convenient" come immediately to mind..."

                                      • Where Does a Company Begin?
                                      • Determine your Company's Needs
                                      • Determine Employees' Needs
                                      • Decide What Apps to Allow
                                      • Decide on Your Company's Policy
                                      • Write a BYOD Privacy Policy
                                      • Consider an MDM Tool to Enforce the Policy
                                      • Roll Out the BYOD Program
                                      • Update as Necessary
                                      • Developing a BYOD Policy Won't Happen Overnight

                                      Read on for details.

                                      What to Know Before Implementing BYOD
                                      Business 2 Community, March 26th, 2013
                                      "Many enterprises have implemented a BYOD model. The benefits have been praised repeatedly over the past year, but making the switch is not as simple as just connecting devices to the corporate network. There needs to be many issues addressed, such as security, with coordination between IT and management, in addition to operations, human resources, finance, and other departments. A company wide policy is the only way everyone can be on the same page to implement the most secure and efficient BYOD strategy. There are a few things to consider during this process..."
                                      Top Ten Articles for last few Issues
                                      Vol 181 Issues 1, 2 and 3; Vol 180 Issues 1, 2, 3 and 4; Vol 179 Issue 5
                                      We track how frequently each article is viewed on the web site to determine which the readers consider the most important. For last week, the top 10 articles were:

                                      • Webcast Announcing New SPARC Servers with the WorldÂ’s Fastest Microprocessor
                                      • Oracle Solaris Cluster 3.3 3/13 Upgrade Integrates with Oracle Solaris at Kernel Level
                                      • Oracle Posts GAAP EPS of 52 Cents; Q3 Revenue of $9.0 B
                                      • Joerg Moellenkamp on Performance Analysis
                                      • Get Oracle's Tape Storage Upgrade Guide with Information on the Latest Oracle StorageTek Tape Solutions
                                      • New Releases of Oracle Virtual Desktop Infrastructure and Sun Ray Software
                                      • Performance Tuning for Oracle Business Process Management Suite 11g
                                      • Security Inside Out Newsletter
                                      • Java Spotlight Episode 125: Terrence Barr on ME Embedded 3.3
                                      • Social Media Gathers Momentum; Connects with Enterprise Bottom Line

                                      The longer version of this article has list of top ten articles for the last 8 weeks.

                                        TDF White Paper Aids Migrations to LibreOffice
                                        Outlines Comprehensive Change Management Process
                                        The Document Foundation (TDF) has released the "LibreOffice Migration White Paper," a guide for enterprises wishing to adopt LibreOffice and other free software. The guide is framed in terms of dealing with both the technical aspects of such a migration and the resistance often encountered in the work force when long-term working habits are challenged. Developed in Open Document Format (ODF), LibreOffice is the standard document format recognized by the largest number of organizations and supported by the largest number of desktop software solutions. Legacy investments are thereby protected even as enterprises undertake migration to ODF.
                                        An Overview and a How-to on Protecting Your Oracle Solaris Zone Cluster
                                        Labeling Zones for Appropriate Access

                                        Rick Ramsey posts an introduction to zones, clustering, and trusted extensions and a link to a paper by Subama Ganguly on building a secure zone cluster with trusted extensions. As Ramsey writes in his introduction, "Oracle Solaris Trusted Zone clusters became available in Oracle Solaris Cluster 4.1. They are zone clusters with the security capabilities (mandatory access control or MAC) provided by Trusted Extensions. The zones in the cluster are labeled in the same way that other objects are labeled, so that only other objects with the same (or higher) sensitivity label can access them. Subama Ganguly walks you through setting one up.

                                        Trending in
                                        Vol 235, Issue 3
                                        Trending IT Articles