News about Oracle's Solaris and Sun Hardware
System News
Apr 1st, 2013 — Apr 7th, 2013 Generate the Custom HTML Email for this Issue
System News System News for Sun Users
Volume 182, Issue 1 << Previous Issue | Next Issue >>
Sections in this issue:
click to jump to section

SPARC T5-2 Obtains Oracle Internet Directory Benchmark World Record Performance
944,624 LDAP searches/sec
Oracle's SPARC T5-2 server running Oracle Internet Directory (OID, Oracle's LDAP Directory Server) on Oracle Solaris 11 achieved a record result for LDAP searches/second with 1000 clients: 944,624 LDAP searches/sec averaging latency of 1.05 ms with 1000 clients, demonstrating 2.7x better throughput and 39% better latency over similarly configured OID and SPARC T4 benchmark environment. Oracle Internet Directory achieved near linear scaling on the SPARC T5-2 server with 68,399 LDAP searches/sec with 2 cores to 944,624 LDAP searches/sec with 32 cores and up to 12,453 LDAP modifys/sec with an average latency of 3.9 msec for 50 clients.
A Guide to the Management of Exalogic Systems
White Paper Promotes Expertise

In an effort to promote expertise among membership in the WebLogic Community, Oracle has produced the white paper "Exalogic Management: A Guide to Planning the Support and Administration of Physical Oracle Exalogic Systems" Juergen Kress notes in a recent post. Access to the material requires membership in the WebLogic Community, so registration and log in are required.

IT - Storage
When Will SSD Have Same Price as HDD, April 4th, 2013
"The retail price for 256GB and 512GB SSDs has been dropping at a linear rate since 2010. In comparison, HDD pricing and new technology introductions have been stagnant. The HDD industry's highest capacity in a 2.5" 2-disk configuration has been the same 1TB for the last 3+ years.

If SSD pricing continued to fall at the same rate, then mathematically SSDs would match HDD pricing by mid to late 2013; however, a recent up-tick in SSD pricing, noted by the orange circle in the charts below, is expected to delay the intercept into 2014 or beyond..."

Java Technology
Java Spotlight Episode 126: JSON Processing @jcp
With Jitendra Kotamraju, Spec Lead for JSR 353:Java API for JSON Processing
Jitendra Kotamraju is a software engineer at Oracle who has contributed to the many Java EE technologies and GlassFish projects for the last eight years. He was the specification and implementation lead of JAX-WS 2.2, and at present he is the specification lead of JSR 353:Java API for JSON Processing and also implementing various web technologies like Server-Sent Events (SSE), and WebSocket in GlassFish. He joins host Roger Brinkley on Java Spotlight, Episode 126 to discuss JSON Processing.
IT - Technology
New Hybrid Memory Cube Spec to Boost DRAM Bandwidth by 15X
ComputerWorld, April 2nd, 2013
"Backed by 100 tech companies, the three largest memory makers announced the final specifications for three-dimensional DRAM, which is aimed at increasing performance for networking and high performance computing markets.

Micron, Samsung and Hynix are leading the technology development efforts backed by the Hybrid Memory Cube Consortium (HMC). The technology, called a Hybrid Memory Cube, will stack multiple volatile memory dies on top of a DRAM controller..."

Solaris 10 1/13 Patchset Released and Latest Solaris 10 Kernel PatchIDs
Download Available for Solaris 10 1/13 as Alternative
Oracle has releases a patchset of all the patches contained in Solaris 10 1/13 (Update 11) for both SPARC and x86 systems. The patchset includes an important post-S10U11 patch - 150125-01 (SPARC) / 149637-02 (x86) - and a fix for ZFS Bug 15809921. According to Gerry Haskins' post, this patchset can be applied to any existing Solaris 10 system to bring all pre-existing packages up to the same software level as Solaris 10 1/13. As an alternative to using the patchset, users can instead download Solaris 10 1/12, which will additionally install any new packages delivered in the Update.
IT - Cloud
10 Cloud Development Tools to Set You Free
NetworkWorld, April 3rd, 2013
"The migration to the cloud has turned into a stampede as the world turns to browser-based calendars, email clients, word processors, and spreadsheets to replace the hassle of maintaining a desktop with the right software. Through this revolution, though, the programmers have stayed glued to their command lines and desktop Integrated Development Environments (IDEs) out of a mixture of habit, simplicity, and speed...

Here is a collection of some of the most prominent projects that caught our eye. They show how quickly the browser can rival the desktop in...

  • Eclipse Orion
  • Cloud9 IDE
  • Codenvy
  • Exadel Tiggzi
  • Telerik Icenium
  • Python Fiddle
  • jsFiddle
  • Codeanywhere
  • CodeRun
  • CodeMirror

Read on for details.

Eight Approaches to Service Level Agreements on Public Cloud
Information Week, April 1st, 2013
"When I discuss public cloud with experts, some argue that public cloud is also a different form of outsourcing. Though theoretically it may look like that, with my experience of managed services outsourcing, I would argue it is very different..."

  • Don’t just look at numbers
  • Cost vs Penalty
  • Exclusions
  • Study the cloud architecture
  • Expectation Setting
  • Definition of outage
  • Service Improvements
  • Service Level Management (SLM) Approach

Read on for details.

10 Things to Know Before You Go Into the Cloud
Enterprise Storage Forum, April 1st, 2013
"'Know before you go' is a popular maxim. And it very much applies to cloud storage. Here are ten questions to answer before you rush to the cloud.

  • What does the cloud mean for you?
  • Do you need cloud storage or cloud backup?
  • What grade of service do you need?
  • What security measures are in place to protect your data?
  • Do you know where your data is?
  • Can you run a test before you commit?
  • How much responsibility should you assume?
  • Are you being oversold?
  • What added value is included?
  • How can we make money from the cloud?

Read on for details.

96% Say IaaS Meets Expectations
ZDNet, April 1st, 2013
"The word 'cloud' is being used with ever-growing frequency, but exactly who is using it and are the results satisfactory?

To find out the current IT mindset on cloud/Infrastructure-as-a-Service (IaaS), TechRepublic did an informal, online survey in early March, asking IT leaders if they’d moved to the cloud, and if so, what business drivers led that decision. The survey delved into whether public, private or hybrid cloud solutions were chosen, and the benefits of choosing one versus the other..."

Cloud Prices: How Low Can They Go?
NetworkWorld, April 1st, 2013
"Infrastructure as a service (IaaS) cloud providers are battling in a price war that has seen 29 price reductions by the four major providers during the past 14 months, a trend industry analysts expect to continue.

RightScale, which acts as a cloud gateway to various providers, released an analysis of more than a year's worth of data related to price reductions and found that Amazon Web Services (AWS) had the most price reductions compared to Google Compute Engine, Microsoft Azure and Rackspace.

AWS had eight reductions during the 14-month period on core services, including compute, storage and bandwidth, along with another 11 reductions on non-core services such as database services, messaging, search and caching. By comparison, Rackspace had four core reductions, while GCE and Azure each had three..."

Know the Key Legal and Security Risks in a Cloud-Computing Contract
ComputerWorld, April 2nd, 2013
"Enterprises that store data with cloud providers may no longer have physical control over it, but they're still on the hook legally for its protection and security.

Knowing what goes into a SaaS contract -- and the risks associated with what's not included -- can mean the difference between a costly lawsuit or a successful partnership, according to technology attorney Milton Petersen..."

Should Cloud Providers Secure Their Outbound Traffic?
Dark Reading, April 1st, 2013
"Discerning between malicious traffic and legitimate traffic in real time is challenging for companies targeted by distributed denial-of-service attacks, but the task is made more difficult when the attacks come from reputable Internet properties that cannot easily be filtered. The attacks on U.S. financial institutions, for example, have used compromised publishing platforms to target banks with a variety of attack traffic since last September. A key factor in the success of those distributed denial-of-service (DDoS) attacks is the use by attackers of compromised, but reputable hosts. While attacks from hosted and cloud platforms have been uncommon so far, they will likely become a larger problems in the future..."
    How Intel Built Its Own Private Cloud
    NetworkWorld, April 1st, 2013
    "Intel not only embraces cloud computing and the technology behind it, the company uses it in a big way.

    During the past four years Intel's internal IT team has been building a private cloud based mostly off of the OpenStack open source cloud platform that serves more than 95,000 workers at the chip manufacturer.

    The effort by Intel's IT team to embrace the cloud has been driven by a goal to more efficiently serve the workers that make those chips and drive the business. The massive undertaking of building that private cloud is already well underway, with a big roadmap for future advancements too..."

    Hybrid Cloud Opportunities: Is IT Ready?
    Information Week, April 3rd, 2013
    "Cloud computing poses a challenge, not necessarily to well-staffed, polished and accomplished IT shops, but to those "who didn't necessarily fully deploy the previous generation of on-premises network and systems management," said Jeffrey Kaplan, managing director of ThinkStrategies, an IT consulting firm.

    Kaplan moderated the opening day workshop, "New Tools and Techniques for Managing Hybrid Cloud," at Cloud Connect, a UBM Tech event in Santa Clara, Calif. The show started Tuesday and runs through Friday. For struggling IT staffs, hybrid cloud computing promises to deploy an additional layer of computing atop the complexity it is already trying to master, Kaplan told about 40 attendees of his half-day workshop..."

    IT - CxO
    6 Ways to Attract Top Talent
    Inc., April 1st, 2013
    "Your company is in a war for talent, and in that war, just about everyone is your enemy. When Bill Gates was asked a few years ago who Microsoft’s main competitors were for top employees, he replied McKinsey and Goldman Sachs. These days he would likely add Google and any of scores of promising startups.

    In other words, great employees have many choices, even in today's economy, and they aren't just limited to your industry. To attract top-flight intellects, you need to build a persuasive case as to why your opportunity is not just the best of your competitors, but the best of all potential employers, including the one he or she works for now. How do you do that?..."

    • Get your team aligned.
    • Make a good first impression
    • Draft WhyDocs
    • Remember it's not all about you
    • Get out and hunt
    • Stay flexible

    Read on for details.

    10 Workplace Wellness Tips for IT Managers
    TechRepublic, April 2nd, 2013
    "Techies have a unique approach to life - and your employee wellness program needs to reflect that. These tips will get yours moving in the right direction!..."

    • Your main goal is creativity.
    • Think long-haul.
    • Watch the ergonomics like a hawk.
    • Think of physical activity as a reboot.
    • Provide healthy food.
    • Embrace your inner geek.
    • Keep things interesting.
    • Watch the stress.
    • Bump up the serendipity.
    • Think beyond the office.

    Read on for details.

      A CEO Advises CIOs on Keeping Relevant
      Search CIO, April 1st, 2013
      "TDS Telecommunications CEO Dave Wittwer knows a thing or two about how to get ahead. In his 30 years at the Madison, Wis.-based telecom, he has climbed the ranks, from internal auditor to CFO to COO to head of a $1 billion business with customers in 32 states.

      Over the course of his long career, Wittwer has come to appreciate the competitive advantage that various functions can bring to the business, including IT. Speaking at the recent Fusion CEO-CIO Symposium in Madison, Wis., he had some advice for CIOs who want IT to be a strategic partner to the business. Here, culled from his talk, are four ways for CIOs to be relevant, on the radar and at the table..."

      Job Well Done? Better Ways to Assess Tech Employees
      ComputerWorld, April 1st, 2013
      "How many lines of code did you write this quarter? By how many hours (or days or weeks) were you behind in delivering your latest project? Was it over or under budget, and if so, by how much? How quickly were you able to get your last program to testing?

      For many years, those were the metrics by which IT employees were judged when their performance reviews rolled around.

      These days, IT managers acknowledge that writing fewer lines of code can be more efficient, that time and budget creep can be acceptable if it means getting a project done right the first time and that quickly moving a program to testing doesn't necessarily indicate a job well done..."

      Keep CIOs out of the Trenches
      Internet Evolution, April 4th, 2013
      "True story: Despite the HITECH Act of 2009, the CEO of a major urban hospital continued his institution's policy of not hiring a CIO or CISO. Like many others, he took a wait-and-see attitude, even though HITECH strengthened the enforcement of healthcare security and privacy laws, and provided financial incentives for healthcare organizations to adopt electronic health records and information security.

      In 2010, while other organizations were getting a portion of billions of dollars in federal incentive money to implement health information technology (HIT), this CEO did nothing -- until someone mentioned the fact that penalties loomed for non-compliance..."

      Seven Rules for Managing Creative People
      Harvard Business Review, April 1st, 2012
      "Moody, erratic, eccentric, and arrogant? Perhaps — but you can't just get rid of them. In fact, unless you learn to get the best out of your creative employees, you will sooner or later end up filing for bankruptcy. Conversely, if you just hire and promote people who are friendly and easy to manage, your firm will be mediocre at best. Suppressed creativity is a malign organizational tumour. Although every organization claims to care about innovation, very few are willing to do what it takes to keep their creative people happy, or at least, productive. So what are the keys to engaging and retaining creative employees?..."
        Three Questions for Strategic Leaders
        CIO Insight, April 3rd, 2013
        "I was talking to a man the other day at a corporate event when he uttered the death phrase. 'I’m a very strategic person,' he said. I sighed inwardly, immediately tuned him out and politely waited until I could excuse myself. First, if you have to tell someone that you are 'very strategic,' there’s a pretty good chance that you aren't. Second, the idea of the 'strategic leader' has become so ennobled in our current business environment that everyone feels they must be viewed as being strategic—or risk being ignored. It has become the corporate equivalent of the “cool kids” at school, and no one wants to be left out..."
          Don't Plan for Perfection
          Information Management, April 1st, 2013
          "Chance are, you've seen the following movie before. It’s the one where you or your team are on the hook for distilling the chaos and complexity of the market and the ambiguities and risks surrounding emerging opportunities, competitors and disruptive technologies, into a nice, neat multi-year forecast.

          Sadly, for all of the effort that goes into cramming the complexities of the markets and human behavior into a few flipping cells on a spreadsheet, the output often isn't worth a damn.

          The future has an annoying habit of ignoring our efforts to corral it in the form of plans. Especially when it comes to financial forecasts..."

            The Enemy of Risk Management Starts with A C (And It's Not China)
            GCN, April 1st, 2013
            "Managing risk in a network requires knowing your assets and prioritizing defenses, says the National Institute of Standards and Technology’s Ron Ross. Complexity is the enemy, and moving to the cloud can help simplify.

            'You can reduce the complexity of your infrastructure by 5 to 40 percent by moving to the public cloud,' said Ross. 'Without reducing that complexity, we're going to be doing what technicians call thrashing — a lot of activity with few results'..."

            IT - DR
            How to Conduct an "End-to-End" Disaster Recovery Exercise in Real Time
            Disaster Recovery Journal, April 3rd, 2013
            "Many times organizations conduct traditional disaster recovery exercises where testing is done in silos, and the scope is limited and restricted only to host level recovery of individual systems. With growing technology changes and globalization trends, the intricacy and interdependencies of applications have become more complex in recent years, and major applications are spread across multiple locations and multiple servers. In this scenario, a traditional recovery exercise focusing on server (host) level recovery is not going to adequately ensure the complete recovery of the application without any inconsistencies among various interdependent subcomponents..."
            IT - Networks
            Network Administrators Look to SDN with Hope, Concern
            ComputerWorld, April 2nd, 2013
            "Some network operators say they need new tools to set up and manage connections in a virtualized world, even if that means adopting software-defined networking technology, which is still in its infancy.

            Server and storage virtualization has freed computing and data from the confines of boxes in fixed locations, letting IT handle resources more efficiently. But networks still require manual configuration to keep those resources properly linked. SDN is designed to extend virtualization to networks, too..."

              The Pros and Cons of SSL Decryption for Enterprise Network Monitoring
              Search Security, April 1st, 2013
              "My organization wants to keep watch over outbound network traffic to make sure that valuable IP isn't leaking out, so we're considering SSL decryption. Could you walk through some pros and cons? Ultimately, is this a viable technique or should we consider other options?.."
                IT - Operations
                Cross-Functional Skills Key to Running Data Centers
                ZDNet, April 2nd, 2013
                "Companies are increasingly looking for employees with a cross-functional skillset to manage their data centers, given that the dynamics are changing and IT becomes embedded in business-related activities.

                That said, IT professionals equipped with security and Linux know-how will remain in demand..."

                Going Underground: Will Data Centers Become Data Bunkers?
                GCN, April 1st, 2013
                "Hong Kong is one of the most vertical cities in the world. Like many cities, when it ran out of space, it simply built up instead of out. But Hong Kong has almost reached its upper-limit for going skyward. And as a financial capital of the world with an incredibly dense population, space is at a premium. That means that large dedicated computing areas, like data centers, have to compete for space with everything else, even though they are in great demand.

                The solution for Hong Kong might be to stop building skyward and to start looking under its feet. Data Center Knowledge recently reported that Hong Kong may dig out rock caves under the city and build new data centers down there. Apparently putting a data center in a deep cave isn't such a bad idea because the naturally cooler below-ground air could help maintain temperatures..."

                IT Lacks Resources to Resolve Performance Issues
                CIO Insight, April 1st, 2013
                "We recently reported that IT spends too much time tending to "fireman" tasks, with departments dealing with 20 unexpected issues every week. Now, the company behind that survey, TeamQuest Corp., has released additional research about the serious performance-management difficulties that tech staffers are facing. In far too many organizations, IT lacks either the information and/or the tools required to adequately address these problems, the findings show..."

                • In the Dark
                • Red Alert
                • Ill-Equipped Workforce
                • Limited Perspective
                • Impact Unknown
                • Falling Far Behind
                • Top Problems With Managing Virtual Machines
                • Organizational Downtime
                • Avoidable Disruptions

                Read on for details.

                It's Twilight for Small In-House Data Centers
                ComputerWorld, April 1st, 2013
                "Virtualization, cloud services and software-as-a-service (SaaS) is making it much easier to shift IT infrastructure operations to service providers, and that is exactly what many users are doing.

                This trend is being felt the most at in-house data centers in small- to mid-size companies. These firms may be trying to shut down their data centers, or shift a major portion of their workloads to external providers..."

                IT - Security
                Do The Security Conscious See Something We Don't?
                GCN, April 1st, 2013
                "It's not a seismic shift, but a recent survey on security seems to show a trend, at least among the security conscious, away from Microsoft’s Internet Explorer browser and paid antivirus products in favor of Chrome, Firefox and free antivirus software. Many readers might say, 'What took them so long?'..."
                Employees Still Use Online File Sharing, Even If Companies Prohibit Its Use
                ComputerWorld, April 3rd, 2013
                "More than 75% of corporations have policies that prohibit the use of consumer online file sharing and collaboration tools, yet employee use of the services is still rampant, according to an Enterprise Strategy Group survey.

                "The thing is, IT had control of the data in the past. Now, it has only been three years since this (OFS) market has taken off and now data is everywhere," said Terri McClure, who spoke at SNW here Tuesday..."

                  How Attackers Choose Which Vulnerabilities to Exploit
                  Dark Reading, April 4th, 2013
                  "It's an old but true adage: To protect yourself against a criminal, you have to think like a criminal. This certainly applies to IT security professionals working to keep their organizations' systems and data safe: To protect against a cyber attacker, you have to think like a cyber attacker.

                  According to Verizon's 2012 Data Breach Investigations Report, 81% of data breaches utilized some form of hacking, and 94% of the attacks were not classified as difficult. Even those attacks that were more complex often used simple techniques to gain an initial foothold..."

                  Making Security Simple
                  CSO Online, April 2nd, 2013
                  "Conventional wisdom says that simple security is an oxymoron. Good security is complex, while uncomplicated security is weak.

                  Whenever security is discussed, I think of Bruce Schneier. The US-based security guru describes crime and prevention forcefully. What's YOUR security profile?

                  Much of our everyday security practices are unconscious, notes Schneier. We do them out of habit, and don't recognize them as strategic security decisions..."

                  Security Manager's Journal: Rights Can Be So Wrong
                  ComputerWorld, April 2nd, 2013
                  "Windows service accounts used by software are often given domain administrator rights, just because it's quick and easy. That sort of thing rubs security managers the wrong way...

                  I've been continuing my efforts to get my company's user accounts under control. We have a lot of Windows service accounts that are used by software, and many of these were put into the Domain Admins group without any real thought regarding what rights they legitimately need. Now that my eyes have been opened to this situation, I've been working with our system administrators to find a way to let software run without such a high level of access..."

                  Seven Steps to Hinder Hackers: Antivirus Just Isn't Enough
                  IT Business Edge, April 1st, 2013
                  "When hackers broke in to the New York Times' network, evaded its antivirus software and began plundering its computer systems, it highlighted a rather uncomfortable truth: Antivirus software is not that good at keeping systems secure.

                  That means that any company that relies on an antivirus package to secure its endpoints is exposing itself to a huge security risk..." Here are seven ways you can slow down hackers from accessing your company assets, as identified by Paul Rubens:

                  • Antivirus software
                  • Personal firewall
                  • Encryption
                  • Update management software
                  • Data Loss Prevention (DLP) software
                  • Password managers
                  • Training

                  Read on for details.

                  Three Reasons You Shouldn't Neglect Your Application Security
                  NetworkWorld, April 1st, 2013
                  "Business applications are the gateway to nearly all sensitive information, yet they often are the most vulnerable and the most frequently exploited IT components in the enterprise. Many critical business applications were never designed with security in mind and, in many organizations, the responsibility for application security is a game of hot potato between senior management, developers, application owners, security operations and quality assurance teams.

                  None of these groups wants to accept responsibility for application security, which creates an ownership vacuum that overlooks critical vulnerabilities and allows basic security processes to fall through the cracks..."

                  IT - Careers
                  12 LinkedIn Mistakes IT Pros Make
                  IT World, April 1st, 2013
                  "LinkedIn is the go-to place for IT pros to market themselves, connect with co-workers, find former colleagues, and meet-up with like-minded folks. Oh, you can also find your next job there too. But many of us, whether we're in IT or not, wait until we decide to quit our current job to polish our LinkedIn profile. Take a few minutes now to make sure your profile showcases your accomplishments, and skills. Here are some common mistakes to avoid..."

                  • Funky or no portrait photo
                  • No recommendations
                  • Few or no endorsements of important, marketable skills
                  • Lack of details on past and current job responsibilities
                  • Typos and profanity
                  • Overload on jargon
                  • Not joining industry groups
                  • Being hard to contact
                  • Not listing program language proficiencies
                  • Not adding website links
                  • No public profile URL
                  • Using the generic invite

                  Read on for details.

                    IT - Social Media
                    Embarking on a Social Media Journey: Five Key Focus Areas for Companies in
                    IT Business Edge, April 1st, 2013
                    "The nature of financial, health care, insurance and defense industries implies the non-negotiable need for high levels of regulation. In these stringent environments with strict controls on policies and procedures, leveraging social media platforms to increase collaboration among employees is challenging. To succeed, there is a need to establish well-defined processes, policies and codes of conduct to help employees use these social networking tools. The other dimension that adds to complexity is hosting environments - on-premise or hosted. It is equally important to ensure that all of the policies and procedures adhere to industry-specific acts like FINRA, HIPAA, HITECH, AIA (export control, IPR and copyright etc., policies), etc..."
                    The Risks of Social Media: Internal Audit
                    Risk Management, April 3rd, 2013
                    "Internal audit has never been easy, but modern business practices are challenging IA professionals even further. Social media, fraud risk and data analysis tools are areas in need of attention and, in some cases, improvement.

                    The 2013 Internal Audit Capabilities and Needs Survey, released by Protiviti, show that 43% of respondents have no social media policy within their organization. Among those with a policy, many fail to address even the most basic issues, such as information security and approved use of social media applications.

                    What’s most alarming, however, is that more than half (51%) of organizations do not address social media risk as a part of their risk assessment process..."

                    IT - Compliance
                    Having the 'Right to Know' Doesn't Mean You Actually Will Know
                    IT World, April 3rd, 2013
                    "Legislators in California have introduced a 'Right to Know Act' that would compel companies operating in the state to disclose any data they have collected about you, as well as the names of any other organizations to whom they've disclosed that information over the past year. Organizations would have 30 days to respond with the names and contact info for any business that has your data..."
                      IT - Email
                      The Web's Submarine Vulnerability
                      Internet Evolution, April 3rd, 2013
                      "As if cyberwar didn't present enough threats to the Internet -- there's old school sabotage out there. Take some pirates, some wire-cutters, and a massive submarine cable, and you have a recipe for major disruption.

                      The crown jewel of the Sea-Me-We 4 network is an almost 12,000-mile long telecommunications cable that winds from the south of France, across the Mediterranean, down through the Red Sea to the Arabian Sea, around the tip of India into the Bay of Bengal, reaching the end of its tether at Singapore...

                      Sea-Me-We 4 was constructed by a consortium of 16 international telecommunications companies, and is intended to connect hundreds of millions of people in Asia and Europe. What happens if someone snips it?"

                        Superior Performance of Sun ZFS Storage Appliances on SPARC T5 and M5 Servers
                        Betters the Performance of NetApp FAS 3250

                        Sun ZFS Storage Appliances complement Oracle’s new SPARC T5 and M5 servers. With Sun ZFS Storage Appliances, SPARC T5 and M5 server customers can: service thousands of I/O requests in parallel with up to 80 CPU cores; accelerate data transfer through the system and to clients with up to 200 GB/s memory bandwidth; speed data delivery and lower latency for databases and applications with 40Gb/s InfiniBand client networking; access Big Data faster with up to 2 TB of memory, 50x more than the NetApp FAS 3250 and accelerate I/Os with 14.5 TB of total Flash cache, 7x greater than NetApp FAS 3250.

                        IT - Database
                        How to Improve DBA and Security Team Relations
                        Dark Reading, April 3rd, 2013
                        "If ever there were an "odd couple" tension of Oscar and Felix proportions within the IT operations community, it would be the mismatch between database administrators (DBAs) and the security pros tasked with managing risk on the data stores the DBAs keep humming. DBAs are "performance junkies," according to John Kindervag, principal analyst for Forrester Research. Meanwhile, many IT security professionals came up through the ranks of network administration ranks and know very little of the arcane world of fields, tables, and queries..."
                        IT - Backup
                        The Value of Real Time Backup Health Assessment
                        Storage Switzerland, April 2nd, 2013
                        "Change is good...or is it? The sheer volume and velocity of changes taking place in IT environments today is staggering. While change may be good for business needs, if left unchecked, improperly managed changes within the backup environment could deal a deadly blow to a business if disaster strikes. Organizations may benefit from a real time monitoring reporting tool which exposes vulnerabilities within the backup infrastructure and enables proactive administration of the environment before problems occur..."
                        IT - Mobile
                        Forrester Research Calls Mobile-Device Management 'Heavy-Handed Approach'
                        NetworkWorld, April 1st, 2013
                        "Forrester Research predicts that with the "bring your own device" (BYOD) trend expected to increasingly include laptops in addition to smartphones and tablets, the approach to managing those devices is in for some big changes.

                        In its 2013 "Mobile Security Predictions" report, Forrester says that "on-demand mobile virtualization will overtake mobile-device management" as a core technology that IT professionals will turn to as a way "to segregate business content and data from the personal environment" in mobile devices..."

                        3 Keys to a Successful Mobile Deployment
                        Field Technologies Online, April 1st, 2013
                        "Evaluating, selecting, and deploying a mobile solution are very challenging for many companies. In today’s technology-driven world, the options are virtually endless (which translates to overwhelming). Mix in a little budget and timeframe pressure along with some employees who may be resistant to change and you can have yourself an uphill battle. That said, the benefits of mobility are clear — so it’s a battle that’s well worth fighting. Here are a couple of tips to make your mobile deployment process as easy as it can be..."

                        • Define Clear Goals For Your Mobile Solution
                        • Do Due Diligence In Technology Selection
                        • Don’t Ignore The Need For Change Management

                        Read on for details.

                        Army Has Lost Control of Its Mobile Devices, Says DOD IG
                        DefenseSystems, April 2nd, 2013
                        "The inspector general of the Defense Department reports that the Army’s Chief Information Office/G-6 has, in essence, lost control over commercial mobile devices (CMD) within the Army, and that more than 14,000 smartphones and tablets are untracked. The upshot is that the Army CIO office does not have an effective cybersecurity program that identifies and mitigates risks surrounding CMDs and removable media, according to the DOD IG..."
                        CIOs Must Move From 'Mobile First' to 'Mobile Only'
                        CIO, April 1st, 2013
                        "Mobile is top-of-mind for most CIOs today. However, while many IT leaders are focused on enabling existing business processes and operations in a mobile framework, CIOs with an eye to the future are thinking about how mobile can transform the business and enable new use cases..."
                          Enterprises Must Close Security Gap in Mobile Devices
                          Internet Evolution, April 3rd, 2013
                          "Late in 2012, the International Association of IT Asset Managers Inc. (IAITAM) conducted a survey focused on how mobile asset management is being incorporated into the workplace. The survey defined a mobile asset to include laptops as well as tablets and smartphones.

                          The survey results show that the introduction of mobile assets causes difficulties for IT managers but remains a prevalent requirement, due to employee expectations and the consumerization movement..."

                          How Smart Companies Manage BYOD
                          CIO Insight, April 1st, 2013
                          "Only a few years ago, overseeing a workforce armed with mobile technology was a fairly straightforward proposition. The enterprise purchased a separate phone for business use, it controlled what applications and content went on the phone, and decided when the employee would upgrade to a new device. The biggest question on the minds of CIOs was whether to equip employees with a basic cell phone or a BlackBerry..."
                            Report Thumping Army for Mobile Cyber Security Efforts Yanked Off DoD Website
                            Network World, April 3rd, 2013
                            "A report from the Inspector General of the U.S Department of Defense that's critical of the way the Army has handled mobile-device security has been inexplicably yanked from the IG DoD public website but can still be found in the Google caching system.

                            The IG DoD report No. DODIG-2013-060, entitled 'Improvements Needed With Tracking and Configuring Army Commercial Mobile Devices,' dated March 26, flatly states the Army's chief information officer 'did not implement an effective cybersecurity program for commercial mobile devices.' The Inspector General of the DoD is the independent oversight division in the DoD that investigates whether the DoD is operating effectively and efficiently..."

                            IT - Big Data
                            5 Strategic Tips for Avoiding a Big Data Bust
                            InfoWorld, April 1st, 2013
                            "Big data has arrived as a big business initiative. But the hip, experimental, ad hoc veneer of blending data streams to surface bold discoveries belies a massive cultural and technological undertaking not every organization is ready for.

                            Without a strategic plan that includes coherent goals, strong data governance, rigorous processes for ensuring data accuracy, and the right mentality and people, big data initiatives can easily end up being a big-time liability rather than a valuable asset..."

                            • tip No. 1: Make big data a central business tenet
                            • tip No. 2: Data governance is essential
                            • tip No. 3: Don't shortchange data accuracy
                            • tip No. 4: Pool best practices for best results
                            • tip No. 5: Expertise and collaboration are key

                            Read on for details.

                            7 Insights on Hiring Data Gurus
                            Information Week, April 2nd, 2013
                            "Despite the weak economy and zero growth in many IT salary categories, business intelligence (BI), analytics, information-integration and data warehousing professionals are seeing a slow-but-steady rise in income. Our InformationWeek 2013 U.S. IT Salary Survey reveals that the median BI/analytics staff salary for 2013 is $90,000, up 1.8% from last year.."

                            • Location matters
                            • Age and gender matter
                            • Creative types earn more than administrators
                            • Birds of feather flock together
                            • The standouts are good at listening, learning and communicating
                            • Renting can make more sense than buying
                            • Self service opens up opportunities

                            Read on for details.

                            10 Big Data Trends from the GigaOM Structure Data Conference
                            eWeek, April 1st, 2013
                            "If you are going to implement big data in your enterprise, start with the applications. While that is good advice for any tech or business exec considering where to invest his or her technology dollar, that advice is particularly trenchant in the world of big data..."
                            Big Data: Where to Begin?
                            Bank Systems and Technology, April 1st, 2013
                            "Financial institutions are still grappling with understanding the concept of big data and how it can be applied in their organizations, according to new research by Celent that will be released tomorrow. Celent surveyed IT executives at 33 financial institutions - including banks and insurers, large and small - for a study commissioned by Microsoft on where institutions stand on implementing big data projects. Bank Systems & Technology got an exclusive first look at the research before its publication tomorrow by Celent..."
                            Bullish on Big Data? Better Make a Plan
                            Federal Computer Week, April 1st, 2013
                            "Are you bullish on big data?

                            Then your agency better get a big data strategy in place – and if that strategy does not outline at least one specific problem to solve, a timeline for success and measurable metrics to gauge progress, it’s probably a waste of time and taxpayer dollars..."

                            Is Your Big Data Stuck in the Pilot Stage?
                            Information Management, April 1st, 2013
                            "Data management history has shown it is not what you buy; it is how you are able to use it that makes a difference. According to survey results from the Q4 2012 Forrsights BI/Big Data Survey, this is a story that is again ringing true as big data changes the data management landscape..."

                            • Big technology adoption across various capabilities ranges from 8% to just over 25%
                            • Plans to implement big data technology across various capabilities is as high as 31%
                            • Pilot projects are the preferred method to get started

                            Read on for details.

                            IT Pros Struggle to Manage Big Data
                            TechWorld, April 1st, 2013
                            "Only 28 percent of those surveyed are currently extracting value from their data..."

                            "IT professionals and businesses are struggling to extract strategic value from their Big Data, according to global research.

                            The Cisco Connected World Technology Report (CCWTR) surveyed 1,800 IT professionals across 18 countries to examine the IT readiness, challenges, technology gaps and strategic value of implementing Big Data projects.

                            While most companies are collecting, storing and analysing data, the report reveals that many are struggling with both the business and IT challenges of Big Data..."

                            It's Time for Big Data to Deliver
                            CIO Insight, April 2nd, 2013
                            "The majority of major, global organizations are now fully immersed in big data projects. And CIOs who are helping lead these efforts are under pressure to perform: These initiatives are stretching into the eight-figure range in terms of budgeting, and corporate leaders fully expect ROI to cross the double-digit percentage range..."
                            Thoughts on Big Data and Data Governance
                            IT Director, April 4th, 2012
                            "I want to start this piece by giving the most important take-away for IT readers: They should take care that data governance does not get in the way of Big Data, and not the reverse.

                            This may seem odd, when I among others have been pointing out for some time that better data cleansing and the like are badly needed in enterprise data strategies in general. But data governance is not just a collection of techniques—it's a whole philosophy of how to run your data-related IT activities. Necessarily, the IT department that focuses on data governance emphasizes risk—security risk, risk of bad data, risk of letting parts of the business run amok in their independence and create a complicated tangle of undocumented data relationships..."

                            IT - BYOD
                            BYOD: The Elements of Getting It Right the First Time
                            GCN, April 1st, 2013
                            "IT leaders must balance the perceived benefits of BYOD with existing requirements in addition to new challenges and requirements that often extend beyond traditional agency IT deployments. New devices, capabilities, and use cases have caused agencies to reconsider typical deployments of mobile devices that in the past centered primarily on BlackBerry services.

                            The Office of Management and Budget reminded agencies on Sept. 27, 2012, that the Federal Information Security Management Act and all other federal information security, privacy and records retention requirements apply to mobile devices:..."

                            BYOD Pros and Cons: Spend Less on Devices, More on Support
                            Search Consumerization, April 1st, 2013
                            "Before allowing employees to use their own smartphones and tablets, organizations should have a clear understanding of BYOD pros and cons and their potential long-term effects.

                            The bring your own device (BYOD) movement has taken the enterprise by storm, and it's not likely to subside anytime soon. Organizations large and small have been steadily embracing BYOD, citing cost savings and increased productivity as their primary motives. Yet additional support and management costs, as well as risks to sensitive data, can easily outweigh such benefits..."

                            Mobile Security: Why It's Your Biggest Threat
                            CIO Insight, April 1st, 2013
                            "From trying to determine what your employees should be using to figuring out where in the world you're going to find the right employees to handle security and networking, the tasks presented to CIOs and CSOs on a daily basis are worrisome, to say the least. Over the last several years, the number of security issues affecting desktop computers and mobile devices have skyrocketed. A study from security firm Securelist reveals that the number of threats hitting your network is growing at a rapid rate..."
                            Wrestling with the BYOD Quandary
                            Security InfoWatch, April 1st, 2013
                            "It's hardly a secret that BYOD (bring your own device) is the dominant trend among employees, in small and large businesses alike. Gartner predicts that by 2015, there will be nearly 300 million tablets and two billion smartphones used by workers. IT teams have discovered that it is impossible to buck this trend and they are learning to embrace and manage it. The employees' main motivation to use their own devices is both the comfort level with their personal devices and anytime, anywhere access to information from their organization’s databases and servers. Among the remote access technologies that are contributing significantly to solve these issues is virtual private network (VPN) technology..."
                            Top Ten Articles for last few Issues
                            Vol 181 Issues 1, 2, 3 and 4; Vol 180 Issues 1, 2, 3 and 4
                            We track how frequently each article is viewed on the web site to determine which the readers consider the most important. For last week, the top 10 articles were:

                            • Is btrfs is better than ZFS?
                            • Oracle Releases SPARC Servers with the T5, World’s Fastest Microprocessor
                            • What Is the Future for Sysadmins?
                            • Optimizing Storage Systems for DB Workloads
                            • Q&A About the Latest Oracle Linux Releases
                            • What's New in Oracle VDI 3.5?
                            • March 2013 Edition of the Oracle Virtualization Newsletter
                            • Java Magazine March/April 2013: Java Is Community
                            • Managing Tape Storage: Is It Really as Difficult as has been Thought?
                            • Oracle Database Appliance X3-2 Launch Webcast Set for April 3, 2013

                            The longer version of this article has list of top ten articles for the last 8 weeks.

                              LibreOffice 4.0.2 Release Fixes Bugs, Glitches
                              TDF Publishes White Paper to Promote Migrations to LibreOffice
                              The Document Foundation (TDF) has released LibreOffice 4.0.2, for Windows, Mac OS X and Linux, the third release of the LibreOffice 4.0 family that fixes several small bugs and glitches. The Document Foundation has recently published a white paper to provide a reference roadmap for migrations to LibreOffice. LibreOffice 4.0.2 is available for immediate download, and extensions for LibreOffice are also available for download.
                              Oracle Virtual Networking Newly Announced
                              Simplifies Complex Data Center Deployments

                              Oracle has just announced Oracle Virtual Networking, an architecture data center fabric that simplifies complex data center deployments with a wire-once solution and simple software-defined network configurations. Oracle Virtual Networking offers the industry’s fastest data center fabric with up to 80 Gigabytes (Gb)/sec bandwidth to the server and supports Oracle’s SPARC T5, T4 and M5 servers and Oracle Solaris 11 on SPARC and x86 platforms. Among the benefits users of Oracle Virtual Networking will enjoy are 4X improvements in application performance; a 70% reduction in infrastructure complexity; a 50% reduction in LAN and SAN capital expenditures; and a 19X acceleration of virtual machine migrations.

                              Trending in
                              Vol 234, Issue 3
                              Trending IT Articles