News about Oracle's Solaris and Sun Hardware
System News
Apr 15th, 2013 — Apr 21st, 2013 Generate the Custom HTML Email for this Issue
System News System News for Sun Users
Volume 182, Issue 3 << Previous Issue | Next Issue >>
Sections in this issue:
click to jump to section


SPARC
x
SPARC M5-32 Sets Record on Two-tier SAP Sales and Distribution (SD) Standard Application Benchmark
Outperforms IBM Power 780 and IBM Power 760 servers
Oracle's SPARC M5-32 server produced a world record result on the two-tier SAP Sales and Distribution (SD) Standard Application Benchmark using SAP Enhancement package 5 for SAP ERP 6.0 as it achieved 85,050 users running the two-tier SAP Sales and Distribution (SD) Standard Application Benchmark using SAP Enhancement package 5 for SAP ERP 6.0. The SPARC M5-32 solution was run with Oracle Solaris 11 and used the Oracle Database 11g.In setting this record the SPARC M5-32 server outperformed marks set earlier by the IBM Power 780 and IBM Power 760 servers.
SPARC T5-2 Achieves SPECjbb2013 Benchmark World Record Result
Surpasses HP's Proliant ML350p, DL560p, ML310e Gen8
Oracle's SPARC T5-2 server achieved 75,658 SPECjbb2013-MultiJVM max-jOPS and 23,268 SPECjbb2013-MultiJVM critical-jOPS on the SPECjbb2013 benchmark for a world record. The SPARC T5-2 server is 1.9x faster than the 2-chip HP ProLiant ML350p server; 15% faster than the 4-chip HP ProLiant DL560p server; and 6.1x faster than the 1-chip HP ProLiant ML310e Gen8, all three based on SPECjbb2013-MultiJVM max-jOPS. The Sun Server X3-2 system running Oracle Solaris 11 is 5% faster than the HP ProLiant ML350p Gen8 server running Windows Server 2008 based on SPECjbb2013-MultiJVM max-jOPS, while the SPARC T4-2 server achieved 34,804 SPECjbb2013-MultiJVM max-jOPS and 10,101 SPECjbb2013-MultiJVM critical-jOPS on the SPECjbb2013 benchmark.
Exadata
x
Oracle Exadata Database Machine, Sun ZFS Storage Appliance Accelerate Performance for Apollo Group
Educational Services Provider Gains 5X in Strategic Reporting
Apollo Group, one of the world's largest private education providers, is leveraging Oracle Exadata Database Machine and Oracle’s Sun ZFS Storage Appliance to streamline delivery of educational programs and services in higher education. With Oracle Exadata, Apollo Group has sped up strategic reporting by 5X, enabling business users to access key insights in about an hour rather than overnight. Using the Sun ZFS Storage Appliance with Oracle Maximum Availability Architecture best practices for Oracle Exadata backup and recovery, Apollo Group shrank its backup window from more than 24 hours to less than 40 minutes for a full backup of a 4 TB database.
Virtualization
x
Oracle VM VirtualBox: Personal Desktop Virtualization
Detlef Drewanz Discusses Installation and Employment
In part 6 of an eight-part series Detlef Drewanz writes about "Oracle VM VirtualBox - Personal Desktop Virtualization" describing Oracle VM VirtualBox and its uses. Oracle VM VirtualBox requires an already-running host operating system on top of which it can be installed. Following installation one can simultaneously run multiple guest operating systems inside Oracle VM VirtualBox using multiple virtual machines (VMs). Oracle VM VirtualBox consists of three parts: the base software package; guest additions; and extension packs. Drewanz next addresses how data can be transferred to and from the guests through external iSCSI storage, with shared folders from the host or via network services.
Oracle Enterprise Manager Ops Center as a Management Tool for Virtualization
Managing Server Virtualization Technologies Throughout their Lifecycle from One GUI
In Part 8 of an eight-part series on virtualization Elke Freymann describes how to use Oracle Enterprise Manager Ops Center to centrally manage server virtualization technologies throughout their lifecycle from one GUI. With Ops Center, it's possible to manage the complete lifecycle of a system, Freymann writes, so why not install Oracle VM Server for x86 on the bare-metal system using Oracle Enterprise Manager Ops Center. With Oracle Enterprise Manager Ops Center users can group servers of compatible architecture together, assign them shared storage where virtualized guests can run, define the type of virtualization technology to be used, and then define a server pool.
IT - Storage
x
Improving SSD Performance through Better Flash Management
Storage Switzerland, April 15th, 2013
"Solid State Drive (SSD) storage has become a viable performance option thanks to the advent of NAND flash devices which are making memory-based storage affordable. The performance of an SSD is not solely dictated by the NAND but by the performance of the combined components that make up the SSD. The performance of the flash controller, its firmware and how it interacts with the NAND determine the combined performance of the device.

There are many actions that impact flash SSD performance, most notably the management of the flash itself. Flash can only be written to a finite number of times so steps have to be taken to make sure that write I/O is spread evenly across the SSD, a process called 'wear leveling'..."

Big Data to Drive Big Demand for Storage - IDC
Biztech2.com, April 16th, 2013
"As demand for Big Data technology and services continues to escalate, all levels of the Big Data technology stack will experience significant growth. Storage is a critical piece of the infrastructure component, increasing at a compound annual growth rate (CAGR) of 53 percent between 2011 and 2016. International Data Corporation (IDC) has just published two in-depth studies – Storage for Big Data: Insight Into Usage Patterns and Influencers in Deployment of Storage for Big Data– built on findings from its first-ever survey on storage infrastructure for Big Data and analytics (BD&A)..."
Java Technology
x
Java Spotlight Episode 128: Joe McGlynn on Java Security Dialogs @jbmcglynn
Interview with Joe McGlynn, Director of Engineering at Oracle overseeing Java client development
Joe McGlynn, Director of Engineering at Oracle where he oversees Java client development, joins host Roger Brinkley on Java Spotlight Episode 128 for a discussion of the new Java security dialogs, plugins and applet support. Joe McGlynn is currently leading development of Java Deployment, Scene Builder, and JavaFX. He has managed software engineering organizations for 25 years in a variety of product domains including Developer Tools, Distance Learning, Call Center Automation and Biotechnology.
IT - Technology
x
20 People Who Changed Tech: Mauchly And Eckert
Information Week, April 15th, 2013
"The credit for this first digital computer should go first to the U.S. government. The U.S. Census Bureau in 1890 realized that it was taking eight full years to compile the 10-year census and it needed a faster solution, so it turned to Herman Hollerith, an inventor and statistician, to make the first mechanical tabulators. He used punch cards, a technology the textile industry had used for years to program its looms. Hollerith's company eventually turned into International Business Machines..."
    3D Scanner Scans Objects From Over a Half Mile Away, Watches the Grass Grow
    TechHive, April 16th, 2013
    "If we're ever going to have autonomous robots, they're going to need to be able to see better than we can. To this end, researchers from the Heriot Watt University in Edinburgh, United Kingdom say they have developed a new high-definition scanner that can create 3D virtual models of objects. Using lasers. From a half mile away.

    The system works by sweeping a low-power infrared laser beam over an object—not unlike the Kinect you might have in your home. It then records the round-trip flight time of each of the laser's photons as a pixel map that resolves into a three-dimensional virtual model of an object..."

      Can NASA, Air Force, and Private Industry Really Mitigate Asteroid Threat?
      NetworkWorld, April 15th, 2013
      "There has been much chatter about the threat of an asteroid or significant meteor strike on Earth in the past few weeks - mostly caused by the untracked meteor that blasted its way to international attention when it exploded in the sky above Russia injuring nearly 1,200 people in February.

      It was one of those amazing coincidences that on that same day an asteroid NASA had been tracking for months -- asteroid 2012 DA14 - was to harmlessly cross Earth's path..."

        Banks Must Ditch Legacy IT
        Information Week, April 17th, 2013
        "The banking industry is staring at a major challenge: how to drive growth, attract new customers and slice costs while relying on 40-year old technology systems. Even with constrained IT budgets, many banks need to modernize the aging systems that run their core operations -- deposit gathering, lending, mortgages, cards and online banking.

        Banks have had their reasons to put off modernization. In the pre-financial crisis years, with profits flush, there wasn't a big incentive to make the big investment and take the risk of a large modernization project. Instead, banks opted for smaller, less costly alternatives such as product or feature enhancements, which often added complexity to their environments..."

          Researchers Analyze Brainwaves to Authenticate Users
          Dark Reading, April 15th, 2013
          "It sounds like something straight out of science fiction: brainwaves taking the place of passwords in the name of authentication. But a new study by researchers from the U.C. Berkeley School of Information is turning fiction into reality.

          The study (PDF) examined the brainwave signals of individuals performing specific actions to see whether they can be consistently matched to the right individual..."

            Solaris
            x
            Oracle Solaris and SPARC Performance
            Larry Wake draws attention to Steve Sistare's three-part blog

            Larry Wake draws attention to Steve Sistare's three-part blog "Massive Solaris Scalability for the T5-8 and M5-32," in which he discusses scaling a general purpose operating system to handle a single system image with thousands of CPUs and tens of terabytes (TB) of memory; in Part 2 he explains how improvements to Solaris enable superior performance and scaling on T5 and M5 systems, and in part 3 he focuses on enhancements made in the Scheduler, Devices, Tools, and Reboot areas of Solaris.

            MySQL
            x
            Familiarize Yourself with MySQL Replication: On-demand Webinar Covers the Features
            Important New Capabilities in MySQL 5.6
            The new MySQL 5.6 GA release delivers a host of new capabilities to support developers releasing new services faster, with more agility, performance and security, Mat Keep posts, noting the utility of MySQL replication, used by the largest web, mobile and social properties to horizontally scale highly-available MySQL databases across distributed clusters of low cost, commodity servers. He recommends an on-demand MySQL 5.6 replication webinar that covers those enhancements, including:

            • 5x higher master and slave performance
            • Self healing replication
            • Replication event checksums
            • DevOps features

            Keep concludes his post with selections from the Q&A section of the webinar.

            Linux
            x
            A Few Good Reasons for Migrating from SUSE Enterprise Linux to Oracle Linux
            Choose the Corporate Development Standard (It's Cheaper and Offers Unique Features)
            Michele Casey argues that among the most compelling reasons for migrating from SUSE Linux Enterprise Server (SLES) to Oracle Linux are that Oracle Linux is the corporate Linux standard for all development groups at Oracle. Second, the cost of a subscription to Oracle Linux Basic Support is $1,199 annually per server; for a SLES Priority, 4-socket Virtual Subscription: $3,878 annually per server. Toss in free access to all bug and security errata on Oracle's public yum repositories; Oracle Database Smart Flash Cache; and the reduction in downtime afforded by Oracle Linux Premier Support subscriptions with Ksplice, Casey notes.
            IT - Cloud
            x
            Cloud Computing SLAs: What You Should Ask
            Information Management, April 15th, 2013
            "The promises of performance, storage and savings in a cloud deployment are only as strong as your service level agreement. Even as cloud users become more savvy and vendors more capable, there remain a slew of tricky issues surrounding what is expected and what is realistic.

            Here are seven of the most pertinent issues you should address with your cloud computing SLA and master service agreements:"

            • Start Basic
            • Build from Key Drivers
            • Start with an Exit Strategy
            • Consider Lowest Availability
            • What Shouldn’t You Expect?
            • Validation and Indemnification
            • When to Break it Off

            Read on for details.

            Securing the Cloud: Why You Need Cast-Iron Guarantees
            Forbes, April 15th, 2012
            "Whether you're a CIO or an executive in a non-technical role, you owe it to yourself to be aware of cloud computing issues—particularly data security.

            Fortunately, new industry standards are here to help. In the previous parts of this series I said the cloud could help, rather than hinder, your organization’s security, and I outlined the responsibilities of the executive team when it comes to assessing your organization's readiness for the cloud.

            In this third and final part, I'll explain how to ensure that your cloud services are as safe as possible..."

            What Is Platform As A Service (PaaS)?
            SearchCloudComputing, April 15th, 2013
            "Platform as a Service (PaaS) is a way to rent hardware, operating systems, storage and network capacity over the Internet. The service delivery model allows the customer to rent virtualized servers and associated services for running existing applications or developing and testing new ones.

            Platform as a Service (PaaS) is an outgrowth of Software as a Service (SaaS), a software distribution model in which hosted software applications are made available to customers over the Internet..."

            Why Health Care Data is More Secure in the Cloud
            Information Management, April 15th, 2013
            "Public cloud-based platforms are not good locations for health care data, correct? While that may sound right, turns out it’s wrong. As we begin to study security issues in general, we’re finding that cloud-based data storage systems are perhaps more secure than traditional on-premise systems..."
            IT - CxO
            x
            Hiring Wisdom: Top 10 Ways to Guarantee Your Best People Will Quit
            TLNT, April 15th, 2013
            "Here are 10 ways to guarantee that your best people will quit:"

            • Treat everyone equally
            • Tolerate mediocrity.
            • Have dumb rules
            • Don’t recognize outstanding performance and contributions
            • Don’t have any fun at work
            • Don’t keep your people informed
            • Micromanage
            • Don’t develop an employee retention strategy
            • Don’t do employee retention interviews
            • Make your onboarding program an exercise in tedium

            Read on for details.

            7 Ways to Get Your CEO Fired
            CIO, April 15th, 2013
            "With this week's firing of J.C. Penney CEO Rob Johnson—the man credited with creating the massively successful Apple stores—I figured it's time to talk about what gets CEOs fired. Over the last decade the folks at Hewlett-Packard seemingly got this down to a science, so I'll be referencing HP's recent history a great deal. But we can also pull material from recent examples, ranging from Yahoo to the situation at JCP, which is how Johnson unsuccessfully rebranded J.C. Penney..."

            • Allowing, Promoting Micromanagement
            • Making CEOs Executive Chairman
            • Letting CEOs Run Wild
            • Making CEOs Do It Alone
            • Failing to Protect Their Image
            • Surrounding CEOs With 'Yes Men'
            • Leaving a Powerful Rival in Place

            Read on for details.

            10 Warning Signs Your New Boss Is a Jerk
            Business News Daly,April 15th, 2013
            "Working for a jerk of a boss can be a miserable experience. From blaming subordinates for a failed project to constantly talking about themselves, the traits of a bad manager are usually revealed early in the relationship - sometimes, even in your job interview.

            Once on the job, however, it's usually too late to do anything about it. That's why job seekers must use the interview process not just to learn more about what their job would entail, but also to gauge what their would-be boss might be like as a supervisor..."

            • They interrupt
            • They aren't nice to other employees
            • They don't give direct answers
            • They do all the talking
            • They take all the credit
            • They aren't flexible
            • They don't answer questions
            • They are too nice
            • They bash co-workers
            • They micromanage

            Read on for details.

              Enterprise IT Can't Keep Pace with Cloud, Analytics, Integration
              Information Management, April 15th, 2013
              "What is Happening? The components of the new Master Architecture have accelerated rapidly to a level of business relevance since we first described it last year (“Boundary-free Enterprise: Empowered by the New Master Architecture”). Cloud, Mobile, Social, Analytics and Integration (CSMA/I) have all become part of strategies for forward-looking IT organizations..."
              Ten Essential Leadership Qualities of a CIO
              CIO Insight, April 15th, 2013
              "True leaders are always looking for ways to improve, whether they're employees or middle managers or CEOs. Of course, that includes CIOs. So consider the following as a list of skills and qualities that you always want to work on:"

              • Constant Customer Focus
              • Promote Utility
              • Develop Deep Understanding
              • Reach for Your Inner Physician
              • Spark Enthusiasm
              • Encourage "Show, Don't Tell"
              • Lead Change But Don't Create Enemies
              • Convey a Greater Purpose
              • Dual Roles
              • Be the Boss You Always Wanted to Have

              Read on for details.

                Is Outsourcing Losing Its Appeal?
                Baseline, April 15th, 2013
                "A new study conducted by Deloitte Consulting has found that a small but growing number of companies are bringing IT functions back in-house...

                The last two decades have brought forth wave after wave of outsourcing initiatives. Today, it's next to impossible to find a Global 2000 company that isn't outsourcing some type of business or IT function. Nevertheless, a just-released report from Deloitte Consulting, 'From Bangalore to Boston: The Trend of Bringing IT Back In-House,' indicates that some organizations are beginning to reel in the concept and bring certain functions back into the company..."

                Remembering Core Values, or What I Learned From 'Jerry Maguire'
                TLNT, April 15th, 2013
                "I've always found it difficult to pinpoint my core values because I believe that as humans, we are always changing and adapting to our environment.

                Then, I happened to catch Jerry Maguire while flipping through television, right at the pivotal scene in which Jerry admits that he's not happy with the state of his life or his job:..."

                  IT - PM
                  x
                  Ten Uncommon Habits towards Successful Project Management
                  AITS, April 16th, 2013
                  "Just because habits are unusual does not mean they are ineffective. There are several uncommon habits that DD Mishra has seen in project management which can lead to success too, and these are no run-of-the-mill traits you have heard ten times before. These are ploys that are sometimes downright devious in their simplicity and elegance, and in an article for InformationWeek, Mishra relates ten of those habits for our benefit:"

                  • Diversity
                  • Stakeholders & sponsor
                  • Change management
                  • Networking
                  • Innovation
                  • Negotiations
                  • Center of gravity (COG)
                  • Appreciate threats
                  • Not everything is black and white
                  • Useful weakness

                  Read on for details.

                  The Dirty Little Secret of Project Management
                  Harvard Business Review, April 15th, 2012
                  "Why don't more project managers sound an alarm when they're going to blow past their deadlines? Because most of them have no earthly idea when they'll finish the job. They don't even think it's possible to know. Too many variables. Too much that's out of their control.

                  That's the dirty little secret of project management. As the lead developer on one big software project put it: "Everybody knows the schedule is a joke, and we pay no attention to it. It will be done when it's done."

                  It's funny, though. Big, successful companies that manage huge projects like highways and dams and office parks have to deal with many more variables than a software development team. Yet they usually know how far along they are at any given time, and they keep their customers in the loop. That's how they get to be big, successful companies..."

                  IT - Networks
                  x
                  Big-Data Science Requires SDN, Internet2 Chief Says
                  PCWorld, April 15th, 2013
                  "Software-defined networking in universities today is like the early Internet decades ago, and big-data researchers in genomics and other fields already need it for their next set of discoveries, according to the head of Internet2.

                  Internet2 runs a nationwide network linking research institutions, and it’s already using elements of SDN on its production infrastructure. SDN, a closely watched set of technologies at various stages of development, is intended to shift the control of networks from specialized devices such as switches and routers to software that can run on standard computing platforms and be virtualized. It promises a range of benefits that could include lower costs, faster service deployment and more network innovation..."

                  Case Study: London's Olympic Network from BT
                  ComputerWeekly, April 15th, 2013
                  "In the summer of 2012, all eyes were focused on London as the world’s greatest sporting event took over the capital city. With almost 27 million viewers of the Olympic Games opening ceremony in the UK alone, the pressure was on to get the whole event right, from building the venues in time, ensuring public transport could cope and winning medals, through to the underpinning technology.

                  After a long and hard-fought tender process, BT was awarded the contract at the end of 2007 to provide networking for all the sites, in London and across the UK, and to ensure everyone from press to athletes and, of course, the spectators, would be able to stay connected..."

                  Here's Why You Really Need SDN
                  InfoWorld, April 15th, 2013
                  "Last week, I wrote about the confused approach many of the largest network vendors are taking to software-defined networking (SDN). In most cases, the issue is that the shift to SDN from their current hardware-focused business would cause them real economic pain, not an aversion to the fundamental benefits for customers of freeing networks from specialty hardware.

                  Another reason to be wary of SDN is that it can't scale performance as well as hardware can, says Ali Kafel, director of product marketing at networking vendor Enterasys..."

                  Hot Networking Devices For 2013
                  CRN, April 15th, 2013
                  "The networking world is shifting, as software-defined networking, mobility and cloud technologies are forcing everyone to step up their game. Staying on top of the latest technologies and trends can be key for solution providers to stay ahead of the curve. Here, we look at 10 technologies that are changing the face of networking. From cloud-based UC appliances to network switches for SDN, check out CRN's networking Tech 10:"

                  • Ixia Anue GTP Session Controller
                  • Network Instruments GigaStor 2U Analytics Appliance
                  • LSI's Axxia 5500 Communication Processors
                  • Brocade HyperEdge Architecture
                  • Avaya's Cloud-Based UC, Video And Contact Center
                  • Nuage Networks' Virtualized Services Platform
                  • Cisco's Network Intelligence Software
                  • Big Switch Networks' Switch Light Platform
                  • Riverbed Technology AppInternals Xpert 8.5
                  • Juniper Networks EX9200 Switch For SDN

                  Read on for details.

                  Knocking Down MPLS Myths
                  NetworkWorld, April 15th, 2013
                  "As we began to cover last time, until recently, if you were an enterprise WAN manager responsible for a serious WAN, you probably needed MPLS. Thanks to the Next-generation Enterprise WAN (NEW) architecture, this is no longer the case. Yet many myths persist as to why MPLS is necessary for the enterprise WAN.

                  If my main point in this series is that going forward MPLS need not be the guts of an enterprise WAN strategy, and certainly is not the service to which companies should be putting additional resources as me move towards the age of the cloud, my secondary point is that WAN managers almost surely made the right choice in going with MPLS, despite how expensive it is, given the choices and technologies available at the time..."

                    IT - Operations
                    x
                    'Bring Your Own Applications' The Next Shoe to Drop
                    Blogosphere, April 17th, 2013
                    "If you did a public opinion poll in enterprises on the subject of 'bring your own device', you’d find two very different results. Users, by and large, are in favour. IT professionals, by and large, are not. ... The counterpart to the 'bring your own' movement is, of course, 'bring your own applications'..."
                      Driving Operational Excellence in IT Management
                      Deloitte,com, April 17th, 2013
                      "Property & Casualty (P&C) insurers face a myriad of challenges including dwindling pricing power, erratic investment yields, and economic uncertainty. Despite very strong top-line performance over the prior year, 2010 was the second consecutive year in which the industry suffered underwriting losses in the first half of the year.

                      Since claims are the single largest spend for a P&C insurance company, investing in operational improvements in claims management is one of the most effective strategies to drive profitable growth.

                      To enhance operational excellence in claims, the following are some of the key areas in which P&C insurers should consider taking action:.."

                      • Leveraging advanced analytics
                      • Supplier management
                      • Legal cost management
                      • Technology enablement
                      • Fraud detection

                      Read on for details.

                      Saving the Green: Five Ways to Slash Your Data Center Power Bill
                      eWeek, April 15th, 2013
                      "Enterprises have plenty of incentives to reduce their data center power consumption. Excessive power consumption is bad for the environment, but the cost goes directly to the bottom line. Data center managers have to get power consumption costs under control now because otherwise the problem will just keep getting worse.

                      IT market research firm IDC estimated that from 2011 to 2012 alone the volume of digital content grew 48 percent to 2.7 zettabytes, which is equal to 1,000 exabytes. The incredible daily creation of data on the Web—and from all other sources—ensures that data volumes will just keep growing on this scale..."

                      Saving the Green: Five Ways to Slash Your Data Center Power Bill
                      eWeek, April 15th, 2013
                      "Enterprises have plenty of incentives to reduce their data center power consumption. Excessive power consumption is bad for the environment, but the cost goes directly to the bottom line. Data center managers have to get power consumption costs under control now because otherwise the problem will just keep getting worse.

                      IT market research firm IDC estimated that from 2011 to 2012 alone the volume of digital content grew 48 percent to 2.7 zettabytes, which is equal to 1,000 exabytes. The incredible daily creation of data on the Web—and from all other sources—ensures that data volumes will just keep growing on this scale..."

                      IT - Security
                      x
                      Three Simple Steps to Determine Risk Tolerance
                      CSO Online, April 15th, 2013
                      "For CISOs, in addition to deciding what policies, processes, or technology an organization should have in place, an even more significant challenge is successfully negotiating disputed risk issues. But, the process for determining risk tolerance is fraught with organizational politics, and it goes without saying that each organization's circumstance needs a customized fit. When determining a process, the most important aspects to take into account include: how an organization decides on risk tolerance, security risk assumption decision-making, and who has the authority to assume security risks...."
                      4 Steps To Protect Your Business From Data Theft
                      Yahoo Small Business Advisor, April 15th, 2013
                      "Lost your laptop? Your attention wandered? No problem, that’s totally understandable, but it will cost your business almost $50,000. Paying attention now? When you add all the costs up, losing one laptop could cost your business $49,246. That’s according to an article on Smallbiztechnology.com, which draws upon statistics compiled by insurance provider Travelers..."
                        10 Surreal Moments in Infosec History
                        CSO Online, April 15th, 2013
                        "We asked readers to vote on the most notorious "what-were-they-thinking" moments in the history of information security -- those occasions where people in the industry defied all logic and left the rest of us dumbfounded. Here are 10..."

                        • Not-so-unbreakable
                        • The hubris of Aaron Barr and HBGary
                        • Obama's flat-footed response to Stuxnet leak
                        • Y2K
                        • No email, no problem
                        • BSidesSF's Violet Blue debacle
                        • World's number-one hacker
                        • RSA's APT moment
                        • Confetti confidential
                        • The perils of legislating security

                        Read on for details.

                        Are You Prepared for the New European Data Protection Framework?
                        Business 2 Community, April 15th, 2013
                        "Having attended the Westminster eForum’s keynote seminar recently, which looked at preparing for the new European Data Protection Framework, here’s a quick summary of what the new regulation includes, and what people at the seminar were saying about it..."
                          Building Security Threat Intelligence Networks: 10 Best Practices
                          eWeek, April 15th, 2013
                          "IT security providers have spent more than a decade debating the need for greater sharing of security data as the most effective way to raise the cost of entry and lower the return on investment for criminals and spies alike. The issue is far from settled, however, and an implementation worthy of the promise has yet to be created... Here are 10 key things that need to happen in order for security threat sharing to finally become a reality across the board. Input for this slide show came from Conrad Constantine, research engineer at AlienVault, as well as RSA Security and eWEEK's own research:"

                          • Information Should Be Shared in Increments
                          • IT Must Adapt to Support More Complex Levels of Sharing
                          • Adoption of Tokenization
                          • More Advanced Big Data Research
                          • Signals Intelligence Is an Important Resource
                          • Engage Your Legal Counsel in the Process
                          • Use Threat-Based, Not Risk-Based, Workflows
                          • Sharing Elicits Valuable Intelligence
                          • All Data Holds Value
                          • Always Keep Moving Forward

                          Read on for details.

                          Cool, Weird and Unusual Security Gear
                          NetworkWorld, April 15th, 2013
                          "These are not your usual ho-hum security products. If you worked as a government spy, law enforcement, or the military, what would you buy? Maybe some of this shown at the recent GovSec show:"

                          • The LONER MOBILE SMARTPHONE from Blackline GPS
                          • The JAVELIN professional-grade covert tracker from Blackline GPS
                          • FLAT TRACK, the first ultra-thin covert tracker for professional surveillance.
                          • CLOUDPASS ACCESS CONTROL from Brivo Systems
                          • CELLBUSTERS ZONE PROTECTOR from Cellbusters
                          • COLLAPSIBLE SPECIAL OPERATIONS BUNKER from Daw Tech
                          • The FbF mobileONE from Fulcrum Biometrics
                          • The IR REVOLUTION 360 CAMERA from HGH Infrared Systems
                          • The IDENTITY STRONGHOLD MINI WALLET for CREDENTIALS
                          • VALOR LAW ENFORCEMENT EVIDENCE PASS THRU LOCKERS

                          Read on for details of these and many more.

                          EU Watchdog: Data Collection Can't Fly Under 'User Experience' Flag
                          PCWorld, April 15th, 2013
                          "Improving users' experiences is no justification for using consumer information in big data projects, according to Europe's top data protection officials.

                          The Article 29 Working Group, which includes the data protection supervisors from the European Union's 27 member states, said that consumers' 'specific, explicit consent' is almost always required if companies want to use their information in big data projects.

                          In an opinion document adopted last week, the group stated that 'vague or general purposes' such as 'improved user experience', 'marketing', 'IT security' or 'future research' are not, on their own, sufficiently specific enough to gain consent.

                          The newly published 70-page document sets out the rules that organizations must abide by if they want to use consumer data..."

                          Five Most Common Security Attacks on Two-Factor Authentication
                          IT Business Edge, April 15th, 2013
                          "Following some high-profile password hacks, companies like Apple, Twitter and Evernote have moved to shore up their systems with two-factor authentication. Said to be a great missing security link in many password-driven systems, two-factor authentication technologies that are most widely used today are actually fraught with many of the same risks as password-driven systems..."

                          • key logging and redirection
                          • man-in-the-middle (MITM) attacks
                          • man-in-the-browser attacks
                          • account recovery
                          • third parties

                          Read on for details.

                          How to Reduce the Risk of Data Breach for Data Center Migrations
                          LifeSpan, April 15th, 2013
                          "When a company chooses to move its applications to the cloud or consolidate a data center using virtualization and the latest energy-efficient server technology, the equipment previously used at the data center for storage and networking usually retired. What becomes of these retired IT assets? Hopefully, they’re recycled or resold. New technology and cloud services are increasingly popular ways for companies to lower the costs and the work required to manage IT systems and software, but most companies aren’t making the move haphazardly..."
                            IED Mitigation Strategies and Technology
                            Security InfoWatch, April 15th, 2013
                            "If there's one thing Monday's Boston Marathon bombing has reinforced among Americans, it is that Improvised Explosive Devices (IEDs) are no longer limited to war zones and other faraway locales - IEDs are a legitimate security threat that must be mitigated by law enforcement to the best of its ability. Due to experiences on the battlefield, government and law enforcement officials, and vendors have the technologies and strategies to do so; however, much more can be done in the name of homeland security to diminish the risk..."
                            Law Professor Makes a Case for Legally Recognizing the Dangers of Surveillance
                            NetworkWorld, April 15th, 2013
                            "'The Dangers of Surveillance', written by Neil M. Richards, Professor of Law at Washington University in St. Louis, was recently published on the Social Science Research Network. In it, Richards proposed 'four principles that should guide the future development of surveillance law.'

                            Yet he said we must first recognize that: 'Surveillance transcends the public-private divide;' that 'secret surveillance is illegitimate;' that "total surveillance is illegitimate' and that 'surveillance is harmful.' The courts may understand that surveillance could be potentially harmful, but 'have struggled to clearly understand why.'..."

                              IT - Careers
                              x
                              Do Your Co-workers Resemble Sci-Fi Characters?
                              Baseline, April 15th, 2013
                              "In a recent story on Baselinemag.com, we reported that Star Wars and Star Trek remain at the top of IT professionals' list of all-time great science fiction movies and television shows. Also popular are Alien, X-Files and—just to demonstrate that geeks like to laugh about themselves—The Big Bang Theory. That affection for sci-fi characters made us wonder: What would it be like to work with some of the most enduring, iconic characters from these and other sci-fi movies and TV programs?..."
                                Ten Tech Skills Heading the Way of the Dinosaur - 2013 Edition
                                Global Knowledge, April 15th, 2013
                                "IT is a very fast changing industry - what is hot today may be a tiny niche market in only a few years and things that few have heard of may be huge trends in the same timeframe. There are many new technologies on the way, and that means opportunities for those who watch the coming trends, prepare themselves early on, and thus have experience when the demand picks up... This year's top 10 skills that are going the way of the dinosaur (in no particular order) include the following:"

                                • Windows XP / 2003 and Earlier
                                • Silverlight
                                • Adobe Flash
                                • COBOL, FORTRAN, and other Mainframe Languages
                                • Lotus Notes Administrator
                                • Novell GroupWise Administrator
                                • Traditional Telephony
                                • Those with only Server Administrator Skills
                                • Help Desk Technicians / Level 1 Support
                                • PC Repair Technicians

                                Read on for details.

                                The Tech Canon of Today Is the IT of Tomorrow
                                ComputerWorld, April 15th, 2013
                                "If you want to learn about tomorrow's science, read today's science fiction. But what if you want to learn about tomorrow's tech trends? Start with the books that make up the modern canon for IT. InfoWorld surveyed its pros and readers and came up with the following 15 picks for the first Tech Canon..."

                                • "The Art of Computer Programming, Volumes I-IV" by Donald E. Knuth (1968, 1969, 1973, 2011)
                                • "The Mythical Man-Month: Essays on Software Engineering" by Fred Brooks (1975)
                                • "The C Programming Language" by Brian W. Kernighan & Dennis Ritchie (1978)
                                • "The Hitchhiker's Guide to the Galaxy" by Douglas Adams (1979)
                                • "The Soul of a New Machine" by Tracy Kidder (1981)
                                • "Neuromancer"/"Count Zero"/"Mona Lisa Overdrive" by William Gibson (1984, 1986, 1989)
                                • "The Media Lab: Inventing the Future at MIT" by Stewart Brand (1987)
                                • "The Cuckoo's Egg" by Clifford Stoll (1989)
                                • "Envisioning Information" by Edward Tufte (1990)

                                Read on for more titles and details.

                                Three Interview Questions You Need to Be Ready to Answer
                                TechRepublic, April 15th, 2013
                                "Here are the three questions that Forbes says all other interview questions boil down to.

                                Employers are no longer relying on standard interview questions like “Where do you see yourself in five years?” To ace your interview, you need to be ready to answer a whole variety of new questions, including some rather odd ones, like 'How many quarters would you need to reach the height of the Empire State building?.'

                                But an insightful article on Forbes says all those questions really boil down to three:

                                • Can you do the job?
                                • Will you love the job?
                                • Can we tolerate working with you?

                                Here's why they’re so important..."

                                  Don't Let Poor Business Writing Kill Your Career
                                  Baseline, April 15th, 2013
                                  "Regardless of your job, it's important to know how to communicate effectively in all types of business documents—and that includes using the proper grammar, word usage, style consistency, etc. As indicated in a recent blog from the Harvard Business Review, a lack of attention to such details can hurt your chances for career advancement. In the post, Grammarly CEO Brad Hoover summarized his company's study of 100 LinkedIn profiles. Here are some of the highlights: Professionals who failed to make a director-level position within the first 10 years of their careers made more than twice as many grammatical mistakes as those who did obtain a director's position..."

                                  • Tight Fit
                                  • Punchy Verbs
                                  • Show, Don't Tell
                                  • Organize Logically
                                  • Cut It Off
                                  • Know Your Audience
                                  • Revise, Revise, Revise
                                  • Font Issues
                                  • Capital Crimes
                                  • Be Yourself

                                  Read on for details.

                                    IT - Social Media
                                    x
                                    Boston Blasts Show Two Sides of Social Media
                                    NetworkWorld, April 15th, 2013
                                    "Twitter users reacted fast to the explosions that ripped through the Boston Marathon Monday, but the incident also revealed how social media can only be so reliable in such situations.

                                    Twitter spread news of the blasts quickly and was a useful communications tool for public authorities such as the Boston police and the marathon organizers. But information on social media sites can also be questionable or just plain inaccurate, noted Greg Sterling, senior analyst with Opus Research..."

                                      Servers
                                      x
                                      DoD Gives Accreditation to Use of Solaris on Its Network
                                      First Ever Instance of this Approval Involving Solaris 11 and SPARC SuperCluster
                                      Jim Laurent blogs about the first ever instance of Solaris 11 being accredited in the US DoD. DoD has granted permission for the SPARC SuperCluster System to operate on the DoD network. As there are no Security Technical Implementation Guides (STIGs) for Solaris 11, Laurent suggests that in the absence of Defense Information Systems Agency (DISA) guidelines, DoD accepted vendor recommended security practices. Among the lessons learned from this experience, Laurent points out that Solaris 11 and the SPARC SuperCluster have received an IATO from the DoD; other DoD customers have received accreditation for Exadata, Exalogic and Database Appliance engineered systems.
                                      IT - Compliance
                                      x
                                      Big Data Governance and EU Data Law - Part 1
                                      Bloor Research, April 15th, 2013
                                      "I met someone at a recent CMSG meeting who suggested that one aspect of the Big Data opportunity was about to hit major problems because it was collecting data for targeted marketing to individuals and no-one is paying attention to the EU data protection implications of this. Philip Howard, however, points out that this isn't really a Big Data issue but something that needs to be considered by the Business Intelligence and Analytics applications further on down the line..."
                                      Protecting Client Data with PCI Hosting Compliance
                                      Business 2 Community, April 15th, 2013
                                      "With the expanded use of cloud computing in business and the explosion in the online use of credit cards in the past two decades, the security of sensitive financial information has become vitally important to companies conducting business over the internet. Massive data breaches at companies like Sony, TJX and Barnes and Noble and at credit card processors like Global Payments have potentially exposed millions of unsuspecting customers to unauthorized bank withdrawals, identity theft and criminal misuse of their credit cards..."
                                      IT - Email
                                      x
                                      How Data Centers Can Keep Up With Massive Internet User Growth
                                      SearchDataCenter, April 15th, 2013
                                      "Picture how bad it would look for your company if a salesperson, in the middle of a pitch across the country, can't access her presentation on your servers. Internet user growth is on the rise in the office and on the road, so data centers face a new challenge.

                                      We spoke to Kevin Ressler, director of global product management for the enterprise networks division at TE Connectivity, about this rise in mobilityand how data centers must grow and change to avoid falling short of user demand..."

                                      IRS Going Against Privacy Tide On Warrantless Email Search
                                      NetworkWorld, April 15th, 2013
                                      "The [US] Internal Revenue Service (IRS) has taken the position it does not need a search warrant to gather email in criminal investigations, despite opposition from lawmakers and privacy advocates and a ruling by a federal appellate court.

                                      Through the Freedom of Information Act, the American Civil Liberties Union (ACLU) obtained 247 pages of IRS records in an attempt to find out whether the agency had ever used only a subpoena to obtain emails. Unlike a warrant, a subpoena does not require law enforcement to show 'probable cause' in front of a judge. Probable cause refers to having enough evidence to show that a crime has likely been committed..."

                                        IT - Database
                                        x
                                        Digging through Data Can Be Path to the Future
                                        IT World Canada, April 15th, 2013
                                        "Canadian-based Maritz Loyalty has found data mining software to be a gold mine for its customers. Read why this category of solutions is important to organizations

                                        Number-crunching has never been easier thanks to powerful PCs, software and servers. But what data gets crunched and how has never been more difficult to decide.

                                        That's what Mississauga, Ont.,-based Maritz Loyalty Marketing wanted over a year ago when it began looking for a data mining solution..."

                                          Do You Need an EDW?
                                          Information Management, April 15th, 2013
                                          "In the early 2000s, data warehouses were the iPhones of the IT world: everyone had to have one. They were cool, great for snazzy demos, could be piggybacked by a bunch of applications and cost a truckload of money. There was no shortage of reasons for having a data warehouse, and some of the business cases made for wonderful reading.

                                          Nearly a dozen years down the line, not a lot has changed on this front. CIOs still love data warehouses, but there have been other developments that need to be added into the business case..."

                                            Open Your Data to the World
                                            ComputerWorld, April 16th, 2013
                                            "When Neil Fantom, a manager at the World Bank, sat down with the organization's technology team in 2010 to talk about opening up the bank's data to the world at large, he encountered a bit of unfamiliar terminology. "At that time I didn't even know what 'API' meant," says Fantom.

                                            As head of the bank's Open Data Initiative, announced in April 2010, Fantom was in charge of taking the group's vast trove of information, which previously had been available only by subscription, and making it available to anyone who wanted it. The method of doing that, he would learn, would be an application programming interface..."

                                              Poor Data Quality That Kills
                                              Information Management, April 15th, 2013
                                              "In my previous post, I made the argument that many times it's okay to call data quality as good as it needs to get, as opposed to demanding data perfection. However, a balanced perspective demands acknowledging there are times when nothing less than perfect data quality is necessary. In fact, there are times when poor data quality can have deadly consequences..."
                                                IT - Backup
                                                x
                                                Why VMware Disk Backup Is Broken
                                                Storage Switzerland, April 15th, 2013
                                                "Backup, the protection of virtual machines (VMs) in a virtualized environment like VMware or any hypervisor, is often an afterthought. The initial focus is on migrating physical systems to the virtual environment and creating new VMs to host new applications. Initial backups tend to leverage the existing backup methodology, typically a backup agent is installed in the guest OS. Over time though, most virtualized environments gravitate to a virtualization specific backup application and these applications all count on disk as the primary target for backup and that is where the problems begin...."
                                                IT - Mobile
                                                x
                                                4 Mobile Predictions CIOs Should Watch For
                                                IT World Canada, April 15th, 2013
                                                "Consumerization of IT and the bring-your-own-device trend continues to create headaches for many CIOs.

                                                While privacy implications and data loss risks keep many C-level IT execs up at night, according to Chenxi Wang, analyst for Forrester Research, there are signs that emerging technologies will provide administrators with better tools to manage the growing ranks of worker-owned devices in the enterprise..."

                                                4 Mobile Security Predictions to Help CIOs Plan for the Future
                                                CIO, April 15th, 2013
                                                "Few things can keep CIOs up at night these days like mobility, particularly bring your own device (BYOD). After all, mobile, consumerization of IT and bring-your-own-device (BYOD) are turning enterprise security models on their heads. Privacy implications--let alone the potential for data loss and data leakage--are enough to make a CIO break out in a cold sweat...

                                                • Mobile Prediction 1: Personal Devices Will Become the Norm
                                                • Mobile Prediction 2: Seamless, On-Demand Mobile 'Virtualization' Will Overtake MDM
                                                • Mobile Prediction 3: HTML5 Enterprise Apps Will Proliferate
                                                • Mobile Prediction 4: Identity-based Mobile Services Will Put Privacy in the Spotlight

                                                Read on for details.

                                                Have You Really Started A Mobile Strategy?
                                                Information Week, April 15th, 2013
                                                "You probably have an app. We have an app. But do you really have a mobile strategy for how those apps fit into your business model? Is there a plan for keeping the creative energy focused on your apps so customers drool instead of mock? How are you building the in-house skills and collaboration to meet expectations that get higher with every smartphone and mobile game that's launched? Are you giving employees mobile capabilities that make them anywhere near as efficient running their business lives as their personal lives?..."
                                                  How QR Codes Can Hack Your Phone
                                                  NetworkWorld, April 15th, 2013
                                                  "With the huge popularity in mobile devices like the smartphone and tablets, two-dimensional barcodes, also called QR codes, are beloved by marketers. QR codes, or Quick Response codes, were designed for the automotive industry in Japan. Now, QR codes have become popular outside the industry due to greater reliability and storage space.

                                                  Originally designed for industrial application, the QR code has gained popularity in the advertising industry..."

                                                    Keeping Up With Mobility Acronyms
                                                    Yahoo Small Business Advisor, April 15th, 2013
                                                    "If you are trying to keep up with mobility acronyms, here is a quick guide:.."

                                                    • CoIT - Consumerzation of IT
                                                    • BYOD - Bring-Your-Own-Device
                                                    • MDM - Mobile Device Management
                                                    • MCM - Mobile Content Management
                                                    • MADP - Mobile Application Development Platform

                                                    Read on for details.

                                                    IT - Big Data
                                                    x
                                                    Big Data Fakers: 5 Warning Signs
                                                    Information Week, April 16th, 2013
                                                    "Data fabrication and falsification pose a major problem in academic research, especially for projects funded by government agencies. Large fines and moratoria for researchers await those individuals and institutions caught cheating. The extent to which this problem also occurs in the amorphous world of big data is difficult to assess, but worth evaluating given the embarrassments in academia and the likelihood that motivations to cheat are universal..."
                                                    Forget Big Data, Think Content Curation: Gartner
                                                    IT World Canada, April 15th, 2013
                                                    "It's human, it's simple, it's visual and it's curated.

                                                    When it comes to social marketing, organizations are more focused on curated content rather than big data, according to Jake Sorofman, research director for analyst firm Gartner Inc.

                                                    'OK, don't forget about big data – it's a big deal,' Sorofman wrote in a recent blog. 'But, these, days content may be giving data a run for it money.

                                                    For instance, Gartner's 2013 Digital Marketing Spending Survey found that content creation and social marketing accounted for 21 per cent of digital marketing budgets..."

                                                    Big Data: Start Small, Think Big
                                                    Information Week, April 15th, 2013
                                                    "Big data presents harried IT departments with a new set of challenges, many of which go beyond the logistical headaches of implementing a new data management platform. According to Raj Sabhlok, president of ManageEngine, an enterprise IT management software company, IT has gone from having not enough data to too much data.

                                                    'If you go back 10 years or so ago, there was a lack of data from an IT perspective. We didn't have enough information about the systems, the network, the applications,' said Sabhlok in a phone interview with InformationWeek. "'But now, everything has been instrumented. We're in a situation where your applications, systems, and devices are all generating alerts, events, and logs. Collectively [it's] what's known as machine data.'..."

                                                    IT - BYOD
                                                    x
                                                    BYOD - A Bright Idea with a Tarnished Lifecycle?
                                                    ComputerWeekly, April 15th, 2013
                                                    "Having seen so many vendors talking about it and so many articles written about it, may make it seem like it has been around forever, but the bring your own device (BYOD) trend has only really been 'crossing the chasm' of wider adoption in the last 6-12months.

                                                    Quocirca started widely referring to BYOD over two years ago, but it first cropped up when employees in certain companies, mainly in the IT industry, perhaps most notably Intel in 2010, brought their own smartphones into the office, mostly to access email. Since then it has become a byword for anybody wanting to appear that they are up to date with mobile thinking - hence its presence in so much marketing material..."

                                                    More Than 6 Out of 10 Companies Approve of Personal Device Use for Work
                                                    ComputerWorld, April 15th, 2013
                                                    "More than six out of 10 companies allow or mandate the use of employee-owned mobile devices for work in order to increase productivity, according to a survey released Tuesday.

                                                    While the BYOD (bring your own device) push has received a lot of press coverage lately, the majority of companies still provide at least a subset of devices to employees. One-third of companies strictly mandate which devices can be used for work purposes and don't allow the use of any type of device brought in by the employee, according to the survey conducted by the Computing Technology Industry Association (CompTIA), a nonprofit trade group..."

                                                    What Good's An Android That Can't Make Calls? For NYPD, Plenty.
                                                    GCN, April 15th, 2013
                                                    "New York City police are piloting a somewhat novel use of Android smart phones, using them on the beat the same way they would use the laptop PCs in their cruisers.

                                                    NYPD has distributed about 400 Androids to officers as part of a program that started in 2012, the New York Times reports. Police with phones is nothing new, of course, but these phones can’t make or receive calls. Instead, they’re used to access databases of information on everything from criminal records, existing warrants, registered gun owners and motor vehicle records..."

                                                      Top10
                                                      x
                                                      Top Ten Articles for last few Issues
                                                      Vol 182 Issues 1 and 2 ; Vol 181 Issues 1, 2, 3 and 4; Vol 180 Issues 3 and 4
                                                      We track how frequently each article is viewed on the web site to determine which the readers consider the most important. For last week, the top 10 articles were:

                                                      • ZFS: Read Me 1st (Capabilities and Cautions)
                                                      • Fujitsu M10 Servers Now Available Worldwide
                                                      • Upgrade Paths to Solaris 11 for Solaris 10 Customers
                                                      • SPARC M5-32 Server Is Perfect for very Large Business-critical Workloads and Server Consolidation.
                                                      • Sun Ray Software 5.4: New for Trusted Extensions
                                                      • Java Spotlight Episode 127: Laurent Doguin on Nuxeo @nuxeo
                                                      • SPARC T5 Systems Net Oracle TimesTen Benchmark World Record
                                                      • SPARC T5-2 Posts Yet Another Leading Benchmark Result
                                                      • LibreOffice Upgrades Continue at a Regular Pace
                                                      • NetBeans Is a Vital Tool in Development of NASA's Deep Space Flight Dynamics Support System

                                                      The longer version of this article has list of top ten articles for the last 8 weeks.

                                                        Networking
                                                        x
                                                        Solaris 11 Network Virtualization now Possible with Oracle VM Server for SPARC 3.0.0.2
                                                        New Version Allows vNICs on VNets
                                                        Jeff Savit addresses the new capability in Oracle VM Server for SPARC, which is that version 3.0.0.2 now supports the removal of restrictions that in earlier versions prevented vNICs on VNets, further allowing Solaris 11 network virtualization. Now, instead of just consolidating servers, users can consolidate a data center's servers and network topologies into a single Solaris instance, setting up multiple isolated virtual networks, associating zones with the different virtual networks, and establishing rules for isolation, connectivity and quality of service (QoS). Savit goes on to explain the use of this new capability, providing the necessary code.
                                                        Security
                                                        x
                                                        'Function Security and Role-Based Access Control (RBAC) in Oracle E-Business Suite'
                                                        New Oracle Whitepaper on the Latest Work in RBAC
                                                        The new white paper "Function Security and Role-Based Access Control (RBAC) in Oracle E-Business Suite (Note 1537100.1)" (registration and log-in required) draws some praise from Chris Warticki, who explains that it illustrates two main ways to implement security in Oracle E-Business Suite: “traditional” Oracle E-Business Suite responsibility-based security (usually referred to as “function security”) and Role-Based Access Control. According to Sara Woodhull in a separate post, the whitepaper is written for Oracle E-Business Suite system administrators, super-users, and implementers. It applies to Oracle E-Business Suite Release 11i, 12.0, and 12.1.
                                                        Trending in
                                                        Vol 234, Issue 3
                                                        Trending IT Articles