News about Oracle's Solaris and Sun Hardware
System News
Apr 22nd, 2013 — Apr 28th, 2013 Generate the Custom HTML Email for this Issue
System News System News for Sun Users
Volume 182, Issue 4 << Previous Issue | Next Issue >>
Sections in this issue:
click to jump to section

Oracle Processor Core Factor Table
Includes SPARC T5 and M5
Oracle pricing for Multi-core processors are priced as (number of cores)*(multi-core factor) processors.

The "Oracle Processor Core Factor Table" has been updated in order to include SPARC T5 and M5. It's 0.5 for both.

Oracle Exadata Recipes for Success
A Problem Solution Approach
"Organizations considering an investment in Oracle Exadata need to understand how it addresses performance, consolidation, and IT infrastructure roadmap goals, plus the changes it will have on their day-to-day operations to support Oracle Database on Oracle Exadata," writes Margaret Hamburger.

"Oracle Exadata Recipes - A problem Solution Approach is a new book written by Oracle database expert and author John Clark that will show you how to maintain and optimize your Oracle Exadata environment as well as how to ensure that it is the right fit for your company. Oracle Exadata recipes is written for individuals that want to quickly learn and develop effective proven solutions without reading lengthy manuals scrubbing for techniques. Learn more about the book when you listen to this interview..."

How To: Migrating Virtual Machines
A Collection of Guides to the Process
A major advantage available to users of Oracle VM Server for x86 or SPARC, Owen Allen writes, is the ability to migrate virtual machines. If two Oracle VM Servers are grouped together in a server pool under one Oracle VM Manager, users can perform a live migration to move an Oracle VM to a new server without shutting it down. There is now a collection of helpful guides to the process of VM migration that Allen provides links to in his post. These include a how-to, the Feature Reference Guide, and the How-To library itself.
VirtualBox 4.2.12
maintenance release
The VirtualBox development team has just released version 4.2.12, and it is now available for download. This is a maintenance release for version 4.2 and contains the may fixes including:

  • VMM: fixed a Guru Meditation on putting Linux guest CPU online if nested paging is disabled
  • VMM: invalidate TLB entries even for non-present pages
  • GUI: Multi-screen support: fixed a crash on visual-mode change
  • GUI: Multi-screen support: disabled guest-screens should now remain disabled on visual-mode change
  • GUI: Multi-screen support: handle host/guest screen plugging/unplugging in different visual-modes
  • GUI: Multi-screen support: seamless mode: fixed a bug when empty seamless screens were represented by fullscreen windows

Read on for more details.

The Role of Oracle VM Server for x86 in a Virtualization Strategy
Evaluating the Components and Operation of a Virtualized Environment
"The Role of Oracle VM Server for x86 in a Virtualization Strategy" is Matthias Pfützner's contribution to the series on virtualization. He considers the roles of both Oracle VM Manager and Oracle VM Server. He goes on to suggest that, given the complexity of large virtualization environments, a careful evaluation of TCO and/or ROI analysis is essential. As the underlying infrastructure becomes more and more a commodity, elements at higher levels become more and more important in the decision-making progress, and getting the "commodity" part from the same vendor that is supplying the higher-level elements might become an advantage.
The Role of Oracle Virtual Desktop Infrastructure in a Virtualization Strategy
Part 7 in a series of virtualization articles
This article, which is Part 7 in a series of virtualization articles, describes how Oracle Virtual Desktop Infrastructure provides multiple end users with individualized desktops that are hosted over the network from a centrally located computer or server.

Now that we've finished the overview of individual virtualization technologies from Oracle using hypervisors and operating system features, it's time to look at the desktop virtualization product known as Oracle Virtual Desktop Infrastructure.

Note: For an introduction to the different levels and types of virtualization technology, see the first article in this series....

Read on for details.

IT - Storage
What Is Dispersed Storage?
Storage Switzerland, April 22nd, 2013
"Keeping unstructured data available, as data sets continue to grow, is a key challenge for today's data center. The access requirements of unstructured data often preclude relying 100% on capacity centric tape so higher capacity disk solutions, for many organizations, become the only option. But making sure data is protected and available on very large disk systems using multiple-TB disk drives has become increasingly challenging and expensive..."
What Is Storage Caching?
Storage Switzerland, April 23rd, 2013
"A cache in a manufacturing environment is an intermediate store of components or partially assembled products, often referred to as 'in-process inventory', that serves to make the overall production process more efficient. In a computer system, caches, also called 'buffers', similarly decouple various components in the data path from each other maximizing the throughput of the system as a whole. Like a factory's in-process inventory, buffers hold data and smooth the transition between components (steps in the 'data production line') that run at different speeds..."
    Java Technology
    Java on SPARC T5-8 Servers is FAST
    by Tori Wieldt
    Tori Wieldt writes, "Watching the boats practicing on San Francisco Bay for the America's Cup reminds me that fast is fun! Did you know that Oracle just announced world record Java benchmarks with SPARC T5 and Solaris?

    Oracle produced a world record SPECjEnterprise2010 benchmark result of 57,422.17 SPECjEnterprise2010 EjOPS using Oracle's SPARC T5-8 server in the application tier and another SPARC T5-8 server for the database tier. This result demonstrated less than 1 second response time for all SPECjEnterprise2010 transactions, while demonstrating a sustained load of Java EE 5 transactions equivalent to 468,000 users. A SPARC T5-8 has 8 chips, 128 cores, and runs a 3.6 GHz SPARC T5CPU. Translation: If you get some SPARC T5-8 servers, you can run your Java applications really, really fast..."

    Read on for details.

    Java Spotlight Episode 129: Anthony Lai on JSR 236 Java EE Concurrency Utilities @jcp
    by Roger Brinkley
    This week's podcast features an interview with Anthony Lai on JSR 236 Concurrency Utilities for Java EE. Anthony Lai is a principal member of the Oracle technical staff and a developer in the J2EE Connector Architecture area of Oracle Application Server Containers of J2EE. Anthony is also a member of the expert committee for the J2EE Connector Architecture 1.5 specification (JSR 112) and the specification lead for JSR 236 Concurrency Utilities for Java EE.
    IT - Technology
    Tiny Chip Provides Precise GPS Navigation without the GPS
    GCN, April 22nd, 2013
    "..the Defense Advanced Research Projects Agency set out to develop a “timing and inertial measurement unit” (TIMU) made of microscale components that could deliver precise location and navigation without GPS. DARPA and researchers at the University of Michigan built a prototype chip, about one-third the width of a penny and six human hairs thick, that does the job..."
      How Oracle Solaris Engineering Thinks
      Solaris Engineer Liane Praza Pulls Back the Curtain
      In two brief videos (both about two minutes long) recorded at Oracle Solaris Innovations Workshop, Solaris Engineer Liane Praza explains why Oracle Solaris engineering continues to build virtualization capabilities into the OS instead of adding more features and better management to the hypervisor and then explains what it is about Solaris that makes it such a good platform for managing virtual machines . As Rick Ramsey notes, this is a perfect opportunity to glimpse how Oracle's engineering staff think about Solaris and the other solutions that emerge from their shop.
      Massive Solaris Scalability for the T5-8 and M5-32
      By Steve Sistare
      Steve Sistare writes, "How do you scale a general purpose operating system to handle a single system image with 1000's of CPUs and 10's of terabytes of memory? You start with the scalable Solaris foundation. You use superior tools such as Dtrace to expose issues, quantify them, and extrapolate to the future. You pay careful attention to computer science, data structures, and algorithms, when designing fixes. You implement fixes that automatically scale with system size, so that once exposed, an issue never recurs in future systems, and the set of issues you must fix in each larger generation steadily shrinks.

      The T5-8 has 8 sockets, each containing 16 cores of 8 hardware strands each, which Solaris sees as 1024 CPUs to manage. The M5-32 has 1536 CPUs and 32 TB of memory. Both are many times larger than the previous generation of Oracle T-class and M-class servers. Solaris scales well on that generation, but every leap in size exposes previously benign O(N) and O(N^2) algorithms that explode into prominence on the larger system, consuming excessive CPU time, memory, and other resources, and limiting scalability. To find these, knowing what to look for helps."

      Read of more details.

      Solaris 11 outperforms RHEL 6 on 2 socket Intel servers
      Compare SPECjbb on servers with same Intel chips
      Along time Sun employee writes, "I've often heard the term "Slow-laris" applied to Oracle's premier Unix operating system. Most frequently this was in comparison to the Linux OS running on small two socket servers. I will admit that in the Solaris 8 and 9 timeframe engineering decisions were made to benefit scalability to 64 sockets that sometimes penalized smaller servers. In addition, because of Solaris long history and derivation from ATT and BSD Unix code, there was undoubtedly a bit of code labeled, "if it ain't broke, don't fix it."

      With the advent of Solaris 10 and Dynamic Tracing, (DTrace) we actually hunted down and killed a number of those legacy code segments using a new philosophy labeled internally, "If Solaris is slower than Linux on the same hardware, it's a bug."

      As a result, Solaris 11 provides higher performance than Red Hat Enterprise Linux 6.3 on basically identical 2 socket hardware as measured by the SPECjbb benchmark..."

      MySQL for Excel 1.1.1
      Version 1.1.1 is a maintenance release that contains the may bug fixes
      The MySQL Windows Experience Team has announced the release of MySQL for Excel version 1.1.1 GA, the latest addition to the MySQL Installer for Windows.

      MySQL for Excel enables you to directly work with a MySQL database from within Microsoft Excel so you can easily do tasks such as:

      • Importing MySQL Data into Excel
      • Exporting Excel data directly into MySQL to a new or existing table
      • Editing MySQL data directly within Excel

      You can download it from the official Downloads page

      Driving MySQL Innovation
      Keynote Speach by MySQL Engineering Tomas Ulin
      Oracle's VP of MySQL Engineering Tomas Ulin delivered on Tuesday a keynote entitled "Driving MySQL Innovation for Next Generation Applications" at the Percona Live Conference.

      If you haven't seen it yet, watch it here.

      Tomas covers:

      • Oracle's Investment in MySQL
      • MySQL 5.6
      • Trends and Product Directions

      He makes it very clear that Oracle:

      • Invests in MySQL like Never Before
      • Drives MySQL Innovation
      • Makes MySQL Better for Next Generation Web, Cloud and Big Data Applications

      Enjoy the keynote!

      IT - Cloud
      Don't Let Your Data Blow Away: Cloud Disaster Recovery
      Business 2 Community, April 22nd, 2013
      "A disaster of any kind is a fear for so many of us. Events like house fires and freak thunderstorms can take all our personal belongings and remind us that no document or treasure is safe unless one of two things is true – you happened to either buy two or make a copy, or it's been backed up.

      But what if you were not only a home owner, but also the owner of a small local bank. What would happen to all your transactional data if that freak storm came through your town?..."

        Here, There, Everywhere: Data Residency and the Public Cloud
        ComputerWorld, April 23rd, 2013
        "It's 10:00 PM. Do you know where your data is?

        Is it nestled securely within the firewalls of your data center, or is it more adventurous, spanning the boundaries of various public clouds? Cloud adoption continues to grow at unprecedented rates, raising concerns about data privacy and also about data residency, especially for organizations considering Infrastructure as a Service (IaaS) in a public cloud..."

        How Cybercriminals Attack the Cloud
        Dark Reading, April 25th, 2013
        "The adoption of cloud-based computing shows no signs of slowing. Indeed, cloud services are expanding at an incredible rate across all sectors of the economy, with the market for public cloud services expected to grow to $210 billion by 2016, according to Gartner.

        And it's no wonder: The cloud is a compelling proposition for businesses and government agencies alike, offering easy access to shared, elastically allocated computing resources. The model creates savings on capital expenditures and reduces the running costs of operating a network, allowing enterprises to focus more on their core operations instead of IT..."

        New Professional Certification for Cloud Security
        HelpNet Security, April 22nd, 2013
        "(ISC)2 and the Cloud Security Alliance (CSA) have signed an agreement to collaborate on a new professional certification for information security.

        The combined initiative will address a concern over the security of modern business systems by establishing a global understanding of professional knowledge and best practices in the design, implementation and management of cloud computing systems..."

        What Big Data Means For Infrastructure Costs
        Insurance & Technology, April 24th, 2013
        "Most insurance companies have at least one big data effort under way, if not more. The cloud can help meet those needs without breaking the bank...

        As data-hungry insurers collect more data from new and different sources to get to know their customers more intimately, they're finding that big data efforts require massive upgrades in their storage capabilities, and many are turning to the cloud for help..."

        IT - CxO
        7 Lessons of the Offshoring Pioneers
        CIO, April 22nd, 2013
        "The need to remain competitive has kept offshoring an essential part of nearly every company's sourcing strategy. The questions that remain are what and how to offshore. Offshore pioneers who have navigated the changing IT offshoring terrain have some answers based on a decade's worth of lessons. In part 1 of a two-part series, we look at seven of those lessons..."

        • Captive Centers May Not Be Worth It
        • A Single Provider Is Not Enough...
        • ... But Too Many Vendors Spoil the Model
        • Invest in Good Governance
        • Nobody Saves 70 Percent Offshore
        • Be Kind to Your Offshore Partners
        • Some Things Weren't Meant to Go Offshore

        Read on for details

          Needed: CIO as Strategist
          Information Week, April 23rd, 2013
          "We expect the CIO to know technology, and how to run a tight budget. But what businesses really want from their CIOs is someone who can strategize.

          The CIO, as someone who sees across the company, is well positioned to shape corporate strategy. But the CIO is often asked merely to be tactical, and strategy isn't something most CIOs are expected to study in school. Even if a CIO did, the strategy course would probably be misguided, said Cynthia Montgomery, who teaches strategy at Harvard Business School..."

          What to do About Data Debris
          Information Management, April 24th, 2013
          "Every day we create 2.5 quintillion bytes of data, and the pace of information creation continues to accelerate. While the potential benefits from mining big data are extraordinary, the reality for most enterprise CIOs is that current information growth is overwhelming the tools and processes they have in place to collect, store, analyze, process, archive, find and delete it..."
          BYOD Lawsuits Loom As Work Gets Personal
          CIO, April 22nd, 2013
          "Will BYOD lead to a rash of lawsuits from employees who feel violated? Or maybe a headline-grabbing, class-action lawsuit? Your company better make sure it has an explicit terms-of-use BYOD agreement. Here are ways companies can protect themselves...."
          Recognize the Dependable People On Your Team
          TechRepublic, April 22nd, 2013
          "Behind-the-scenes capability is one of those things that is often taken for granted and frequently overlooked when it comes to recognition.

          Do you have a closer on your team? I'm not using the term 'closer' in the sense it's used in the sales biz — as someone who can close a sale. Or as aggressively as it’s addressed in the play and movie Glengarry Glen Ross ('Coffee is for closers!').

          I'm referring to that someone you instinctively turn to when you need something done quickly and well, and from whom you’ll hear no complaints. They’re basically a boss's dream..."

            Under New Business Demands, CIOs Can't Cling to Old BI
            Information Management, April 22nd, 2013
            "Just about all the CIOs I speak with are at an inflection point in their careers. Some are just biding time before retirement, but many are emerging CIOs who are driven more by a business imperative than a technological one..."
              Seven Strategic Outsourcing Secrets You Should Know
              Information Week, April 23rd, 2013
              "I thought of capturing some of my experiences, understanding and findings on strategic outsourcing for the purpose of healthy debate. I may be right or wrong but will not shy away from expressing what I felt and experienced with a hope that it can prevent some of the expensive mistakes. The points mentioned below are not related to any particular case but it a result of discussions, experiences and studies on variety of cases..."
              How a CIO Can Save an Incompetent CEO
              CIO, April 22nd, 2013
              "When a bad CEO goes down, the CIO often goes down with him. The way to save yourself, and your company, is to invest in the analytics technology that gives the CEO the data necessary to make smart business decisions. It doesn't hurt that it also shows why the CIO is more valuable to the CEO than other C-level executives..."
              Ten Ways to Turn Around a Losing Team
              CIO Insight, April 22nd, 2013
              "What if you're a CIO who must manage an IT team that has never known success? Unless you can inspire the uninspired—and cultivate a sense of ownership where "not my job" serves as a stock response to requests for help—you and your teams will never experience the pure adrenaline rush of success..."
              There Is No Such Thing as Information Security Risk
              CIO, April 22nd, 2013
              "There is no such thing as information security risk, according to a panel of security professionals speaking at the Infosecurity Europe 2013 conference in London; the only risk that matters within any organisation is the risk to the bottom line..."
              IT - Networks
              The Data Center Switch Industry Does Not Have a Leader
              SearchUnifiedCommunications, April 22nd, 2013
              "Despite years of innovation and hundreds of millions of dollars invested, no networking vendor has established a leadership position in the market for data center switch fabrics.

              Over the last five years, nearly every vendor has launched a new family of data center switches and fabrics. Not only do these switches offer faster bandwidth, lower latency and higher port density, they also offer a lot of innovation in the form of so-called data center fabric technologies. Remember, way back in 2011, before software-defined networking (SDN) turned the industry upside-down, data center fabrics were the buzziest of networking technologies..."

                Unified Communications Creates Security Holes. Here's How To Plug Them
                SearchNetworking, April 22nd, 2013
                "Because unified communications technologies, such as VoIP, are really just beginning to go mainstream, there simply has not been a lot of emphasis on the security risks that are associated with unified communications systems. Even so, implementing a unified communications system introduces some unique security risks that administrators may not have had to deal with in the past and may be ill-equipped to handle."
                Why Do Unique IP Addresses Matter and What Is Their Importance?
                Business 2 Community, April 22nd, 2013
                "If you have been around computers and on the Internet for any length of time, you may have heard the term IP address. Although you may have heard about them, you may not know exactly what they are or why they are important. Why do unique IP addresses matter? Why are they important? On this page we are going to answer those questions and some other questions you might have..."
                  IT - Operations
                  How Document Management Drives Workers Crazy
                  CIO Insight, April 22nd, 2013
                  "Knowledge workers are fed up with document-management snafus, according to a recent survey released by Perforce Software. The vast majority say these problems have caused them to lose precious productivity. They often can't find the file they're looking for. And then, after they think they have accessed it, many discover that they've been working on the wrong document..."
                  How to Develop Cooling Solutions That Fit SMB IT Infrastructure and Budget Needs
                  IT Business Edge, April 22nd, 2013
                  "While small-to-medium sized businesses may not require the complex cooling systems typical of enterprise data centers, choosing the right cooling solution is still a critical component to ensuring IT services are delivered efficiently and with minimal downtime. Determining and implementing a correctly sized air conditioning system is a great way for SMBs to increase energy efficiency and avoid wasted electricity associated with unnecessary cooling..."
                    IT - Security
                    Consumers Want Biometrics, Survey Finds
                    Dark Reading, April 22nd, 2013
                    "Most consumers support biometrics for authentication, with voice recognition, facial, and fingerprint scans as their top identity verification methods. They're also getting frustrated with passwords, with half of them having frequently been unable to conduct an online transaction due to an authentication failure on the website, according to a new survey..."
                      Six Emerging Threats All Security Professionals Should Prepare For
                      IT Business Edge, April 22nd, 2013
                      "The security threat landscape changes constantly, with malicious hackers developing new ways to compromise your systems as older vulnerabilities are discovered and patched. So it's important to be aware of the threats to enterprise security that are coming over the horizon and heading this way..."

                      • Use DRM-like tech to hide viruses
                      • Targeting OS X
                      • Malicious hardware/supply chain insecurities
                      • mobile malware
                      • The Cloud
                      • search engine filter bubble poisoning

                      Read on for details

                      Many Hacked Businesses Remain Unprepared for the Next Breach
                      Dark Reading, April 22nd, 2013
                      "A company suffers a data breach. So, of course, it then retrenches and shores up its defenses and processes to prepare for the next attack, right? Not so much, a new survey of organizations that have suffered breaches shows: More than one-third of organizations hit by data breaches still have no formal plan or process in place to handle the next breach..."
                        Many Hacked Businesses Remain Unprepared for the Next Breach
                        Dark Reading, April 22nd, 2013
                        "A company suffers a data breach. So, of course, it then retrenches and shores up its defenses and processes to prepare for the next attack, right? Not so much, a new survey of organizations that have suffered breaches shows: More than one-third of organizations hit by data breaches still have no formal plan or process in place to handle the next breach..."
                          Should Insiders Really Be Your Biggest Concern?
                          Dark Reading, April 23rd, 2013
                          "Yesterday's release by Verizon of its annual Data Breach Investigations Report (DBIR) will surely confirm many information security professionals' observations and fears. In addition, it will surely kick off another year of number-crunching and proposals to respective boards for new initiatives.

                          But amid the data included one subset of information likely to challenge both conventional wisdom and vendor sales pitches is the information Verizon collected about the impact of insider threats..."

                          The Many Faces of the Verizon Data Breach Investigation Report
                          Dark Reading, April 23rd, 2013
                          "For those of us who cover data breaches, the release of the annual Verizon Data Breach Investigations Report is sort of like the motion picture industry's Oscar awards or the annual release of the auto industry's Blue Book -- it doesn't provide all of the answers, but it helps define what the coming year's questions will be..."
                            10 Tips to Secure Funding for a Security Program
                            CSO Online, April 22nd, 2013
                            "Ask any cyber security specialist what their biggest challenge is, and you will get a variety of answers — ranging from strengthening network security, to managing internal threats, to protecting against cyber espionage. But upon further investigation, you may be surprised to learn that the unanimous pick for the biggest challenge cybersecurity professionals face is simply getting the funding necessary to carry out a security program..."

                            • Set the foundation for security funding before you need it; and once established, keep it strong
                            • Don't use scare tactics
                            • Establish your cybersecurity credentials within your organization
                            • Relate your security risks to the business
                            • Outline the need in plain English
                            • Develop a plan that meets the security needs but also considers financial constraints
                            • Once you get the funding, follow the plan you outlined
                            • Provide constant feedback on the security program
                            • Use outside resources to support your request
                            • Always emphasize that cyber security is not an "information technology" issue — it is an organizational risk management issue

                            Read on for details.

                            How to Stop Making Excuses for Poor Application Security Testing
                            Dark Reading, April 22nd, 2013
                            "Just as the old carpenter axiom warns to measure twice and cut once, the effort of putting in effective security testing practices earlier in the application development process saves many more headaches later in the application life cycle..."
                            IT - Careers
                            Coping With Unlikeable Tasks: You Just Gotta Take Ownership
                            TLNT, April 22nd, 2013
                            "Have you found that perfect job yet?

                            Of course not, because the perfect job doesn’t exist. Every job in the world includes unpleasant tasks that may bore you to death, strain your capacities, or require such brainless repetition you’d rather go hide in the nearest swamp..."

                              IT Candidates Unlikely to Negotiate Salary Offers
                              CIO Insight, April 22nd, 2013
                              "In prior features, we've reported that CIOs and other tech managers are struggling to remain competitive in the recruiting game. And, as the laws of supply and demand dictate, IT salaries are rising as a result. Surprisingly, however, the majority of tech job candidates accept the very first offer they get, without even attempting to negotiate for a bigger salary .."

                              • "YEEEES!"
                              • Raising the Stakes
                              • Short List
                              • Sweetened Pot
                              • Work Opp
                              • Hired Guns
                              • Phoning it in
                              • Top Tech Metro Areas for IT Work

                              Read on for details

                                Nine Things to Consider Before Accepting That IT Job Offer
                                CIO, April 23rd, 2013
                                "In a competitive job market like IT, it's tempting to accept an offer as soon as a company makes it. However, at this crossroad careful deliberation is what's in order. Choose unwisely and you may wind up back at square on..."

                                • Know What Motivates You
                                • Know the Job History
                                • Research the Company
                                • Get It in Writing
                                • Know the Company Culture
                                • Who's the Boss?
                                • Talk to Potential Peers
                                • Know the Job Details
                                • Know Where the Company is Headed With Technology

                                Read on for details.

                                  The 21 Worst Tech Habits -- And How to Break Them
                                  PCWorld, April 22nd, 2013
                                  "Are you guilty of a bad tech habit? Here are 21 of the worst technology-oriented habits, plus potential fixes for all of them. (And we have a bonus at the end, on mending bad email habits.).."

                                  • Leaving equipment in plain sight
                                  • Oblivious gadget usage
                                  • Using your devices with dirty hands
                                  • Not cleaning your equipment
                                  • Sitting with bad posture at the computer
                                  • Not taking breaks
                                  • Working with your laptop on your lap
                                  • Failing to back up data
                                  • Reusing passwords over and over
                                  • One account, multiple users

                                  Read on for details and many more bad habits!

                                    Wanted: IT Staffers with Vertical Industry Chops
                                    ComputerWorld, April 22nd, 2013
                                    "Fast-changing business processes and ever-mounting government and industry regulations are complicating day-to-day operations -- and making deep vertical industry expertise a must-have.

                                    One out of five IT staffers on the clinical applications team at Continuum Health Partners in New York is also a nurse, a pharmacist or another type of clinical specialist. For IT managers and directors, a clinical degree is a must..."

                                    IT - Social Media
                                    5 Social Blunders Job Hunters Must Avoid
                                    Information Week, April 23rd, 2013
                                    "Your presence on social networks plays an increasingly important role in how potential employers see you. What you do and don't do, socially speaking, can be the difference between a job offer and a phone that just won't ring.

                                    When it comes to social business blunders, the cliché is the widely shared photo of a clearly inebriated person, perhaps with a lampshade on his head. That's not good, for sure, but the mistakes we're talking about are more subtle and potentially more damaging to your professional reputation.

                                    Following are five social business blunders that could cost you that new job...

                                    • Lacking Social Visibility
                                    • Undersharing
                                    • Oversharing
                                    • Inconsistent Social Personas
                                    • Spelling and Grammar Gaffes

                                    Read on for details

                                      How Companies Should Navigate Social Media in a Crisis
                                      ComputerWorld, April 24th, 2013
                                      "Companies using social networks like Twitter and Facebook need to face what to do during a national crisis like the Boston Marathon bombing.

                                      Do you tweet or post a statement about the crisis, continue on with your normal social media postings, or do you keep silent?

                                      It's a tricky question. To answer it, companies may want to look to Dunkin' Donuts and Southwest Airlines..."

                                      How to Recover From a Twitter Hack
                                      CIO, April 25th, 2013
                                      "Do you know what to do if your Twitter account is hacked? Here are four steps to take to regain control of your account and ensure it doesn't happen again..."
                                        IT - Virtualization
                                        Virtualization showdown: Microsoft Hyper-V 2012 vs. VMware vSphere 5.1
                                        InfoWorld, April 24th, 2013
                                        "Any comparison of Microsoft's Hyper-V versus VMware's vSphere has to take into consideration a number of different factors. First, there's the target customer and the feature set for different sizes of deployments. The needs vary widely depending on the number of virtual machine instances, and these requirements should drive the architecture and configuration choices. Second, there is the topic of management, which is also tied closely to the size of the installation. Beyond these considerations are a number of other issues, including cost, performance, scalability, and usability..."
                                        IT - Compliance
                                        Can We Cease Check-Box Compliance?
                                        Dark Reading, April 25th, 2013
                                        "For years now, security insiders have railed against the check-box compliance ethos, warning enterprises that simply chasing after regulatory lists won't ever fully address the risks facing their organizations. While there are some early indicators that show that this message may be finally gaining acceptance among tech and line-of-business executives, security experts say the transition to risk-based decision-making is still a long way off..."
                                        IT - Email
                                        25 Weirdest Things in the .Internet of Things'
                                        NetworkWorld, April 22nd, 2013
                                        "The Internet is slowly creeping into every part of our lives, so much so that it’s becoming easier to look around the house and find objects that can be connected to the Internet. In just a few short years, we probably won’t think twice about connecting most of these objects to the Internet, but others will likely take some more time to get used to..."

                                        • College dorm bathrooms
                                        • College dorm laundry room
                                        • Garden
                                        • Dog collar
                                        • Cat feeder
                                        • Cattle
                                        • Human heart
                                        • Diapers
                                        • Slippers
                                        • Breathalyzer (that Tweets)

                                        Read on for details and more Things!

                                          Why the Internet of Things Needs IPv6
                                          Government Technology, April 22nd, 2012
                                          "The transition to IPv6 is important not only because the 4.3 billion IPv4 addresses are running out, but also because the proliferation of Internet-connected devices is creating a new environment of information. 'The Internet of Things is very much upon on us,' said Vint Cerf, Google’s chief Internet evangelist, at the Rocky Mountain IPv6 Summit..."
                                          The Top Capabilities of ZFS Storage Appliance Explained
                                          Video Interview
                                          Nancy Hart describes her favorite capabilities about the ZFS Storage Appliance, and Jeff Wright explains how each of them works. They cover Hybrid Columnar Compression, Direct NFS (makes data transfer more efficient), Remote Direct Memory Access, Oracle Intelligent Storage Protocol (database aware of the storage and vice versa), DTrace Analytics to optimize deployments, and more.
                                          IT - Database
                                          Prioritizing Your Database Security Patches
                                          Dark Reading, April 25th, 2013
                                          "Patching databases can be painful, but the presence of critical vulnerabilities can make closing security holes quickly necessary...

                                          Prioritizing patches is tricky enough when organizations are not thinking about the downtime that can result from taking down a production database. When that comes into play, however, the patching process can slow down -- so much so that databases can be months behind in critical updates..."

                                          IT - Backup
                                          Analyzing Recent Developments in the Backup Software Market
                                          SearchDataBackup, April 22nd, 2013
                                          "Cloud backup and disaster recovery continue to gain steam, with many solutions dodging early concerns about restore times by taking a hybrid on-premises/cloud backup approach, and others allowing users to fail over to backup instances of virtual machines in the cloud. Backup app vendors made a variety of cloud moves over the past year..."
                                          IT - Mobile
                                          Do Our Mobile Devices Turn Us Into Teenagers?
                                          Baseline, April 22nd, 2013
                                          "Do we become different people when we fire up our mobile devices? Could be. In fact, a significant share of users say they feel entitled to do pretty much whatever they want while on their smartphones or tablets, according to a recent survey from McCann Truth Central. For many people, that means illegal downloading, cursing and even sexting..."
                                            IT - Big Data
                                            10 Rules for Working with Big Data
                                            Big Data Republic, April 22nd, 2013
                                            "Offering huge monetization potential from a marketing perspective (never before in human history have we had access to so much intricate data on so many things), big data floods in as a continuous stream; from social information to video, app data from smartphones and tablets, and more..."

                                            • Keep it clear.
                                            • Keep it secure.
                                            • Worry, but not too much. Privacy debates are inevitable.
                                            • Seek expert opinions.
                                            • Be patient.
                                            • Cater for all tastes.
                                            • Make the most of your human resources.
                                            • Use innovation and imagination.
                                            • Share and share alike.
                                            • Perhaps the most important rule.

                                            Read on for details.

                                            Big Data Can Be a Big Headache for Data Defenders
                                            CSO Online, April 25th, 2013
                                            "Big data is all the buzz in board rooms these days, but in security circles it's a mixed blessing.

                                            The technology allows tons of threat data to be analyzed and used to thwart intruders. In the enterprise, it can be used to analyze volumes of network traffic to reveal insider trouble and advanced persistent threats.

                                            Problem is, the network architecture that supports big data wasn't created with security in mind, which can create problems for system defenders..."

                                            Designing an Information Governance Program
                                            Baseline, April 22nd, 2013
                                            "Big data holds promise for firms that can collect and analyze it, but information governance leaders, especially those at multinational organizations, are struggling with a dilemma: The value of information declines over time, but the costs and risks associated with it don't..."
                                            Four Steps to Achieve Returns on Your Analytics Investments
                                            Information Management, April 24th, 2013
                                            "Analytics promises so much to organizations that embrace it as a vital business discipline. Above all, it gives them the insights they need to make faster and smarter decisions – in a business environment where the pace of change has never been so rapid..."
                                            Hadoop Poses a Big Data Security Risk: 10 Reasons Why
                                            eWeek, April 23rd, 2013
                                            "Information is power, and more and more enterprise IT professionals are tapping into the power of big data to better understand what drives their businesses. In the meantime, the information keeps piling up, as data volumes are doubling annually. And roughly 80 percent of that captured data is unstructured and must be formatted using a batch-processing platform...

                                            • Hadoop Wasn't Designed for Enterprise Data
                                            • Hadoop's Security Relies Entirely on Kerberos
                                            • Hadoop Clusters Consist of Many Nodes
                                            • Traditional Backup/Disaster Recovery Isn't the Same in Hadoop
                                            • Hadoop Is Rarely Used Alone
                                            • Compliance Mandates Still Apply in Big Data Workloads
                                            • Cost of a Breach Undetermined
                                            • Big Data Users on Their Own With Security
                                            • Additional Steps Needed to Protect Data Cluster
                                            • Hadoop Users Must Keep Up to Date

                                            Read on for details

                                            How Big Data Will Save Your Life
                                            ComputerWorld, April 25th, 2013
                                            "Dr. Robert Walker, director of health innovation for the U.S. Army Surgeon General, has been more a frustrated data entry clerk in recent years than a physician, a frustration shared by thousands of his colleagues.

                                            Instead of freeing him for more face-time with patients, the electronic health record (EHR) system he uses has become a third person in the exam room, drawing his attention away from patients. The issue isn't the EHR Walker uses, however; it's the shortcomings of technology in general..."

                                            How to Spot a Data Scientist
                                            Federal Computer Week, April 24th, 2013
                                            "In a big data world, data scientists are all the rage.

                                            Private sector companies like Facebook, Google and LinkedIn have benefitted immensely from their teams of data scientists, and the public sector's buzz about big data and analytics has many top IT officials touting the need for similar talent to drive their mission successes..."

                                            How Video Analytics Helps Reconstruct Boston Marathon Bombings
                                            GCN, April 22nd, 2013
                                            "Video from surveillance cameras and people’s cell phones are increasingly valuable resources in helping investigators collect and analyze data from crime scenes, such as the finish line of the Boston Marathon. Investigators are combing through hours of digital feeds and thousands of photographs to identify suspects responsible for detonating two bombs there on April 15... But how do investigators weed through terabytes of video in different formats, whether 30-second snippets from cell phones or hours of footage from a surveillance camera at a nearby store? ..."
                                              Ten Best Practices for Securing Sensitive Data in Hadoop
                                              IT Business Edge, April 22nd, 2013
                                              "Dataguise, a leading innovator of data security intelligence and protection solutions, recently released 10 security best practices for organizations considering or implementing Hadoop. By following these procedures to manage privacy risk, data management and security, professionals can prevent costly exposure of sensitive data, reduce their risk profile and better adhere to compliance mandates..."
                                              IT - BYOD
                                              As BYOD Explodes, IT Managers Learn To Cope
                                              ComputerWorld, April 23rd, 2013
                                              "Pity the poor IT manager trying to get his arms around the bring-your-own-device (BYOD) movement.

                                              Even the most cutting-edge tech leaders -- those who are working to make mobile devices secure and productive corporate tools -- are feeling overwhelmed by the frenetic pace of change in the marketplace..."

                                              It's Time to Make Way for BYOx
                                              ComputerWorld, April 24th, 2013
                                              "With BYOx, the concept of BYOD has been upped a notch, paving way for its successor as part of a technological evolution...

                                              BYOx, unlike BYOD is not restricted to the device itself. It brings under its vast canopy things associated with the device itself, for example, the data, the services, applications, ports etc. When it comes to their device, working professionals do not want their options limited..."

                                              Top Ten Articles for last few Issues
                                              Vol 182 Issues 1, 2 and 3 ; Vol 181 Issues 1, 2, 3 and 4; Vol 180 Issues 4
                                              We track how frequently each article is viewed on the web site to determine which the readers consider the most important. For last week, the top 10 articles were:

                                              • IDC Analyst Optimistic About Effect of T5 and M5 Processors on Oracle's Market Share
                                              • Reservation & Ref Reservation - An Explanation
                                              • DoD Gives Accreditation to Use of Solaris on Its Network
                                              • A Few Good Reasons for Migrating from SUSE Enterprise Linux to Oracle Linux
                                              • Oracle VM VirtualBox: Personal Desktop Virtualization
                                              • SPARC M5-32 Sets Record on Two-tier SAP Sales and Distribution (SD) Standard Application Benchmark
                                              • Solaris 11 Network Virtualization now Possible with Oracle VM Server for SPARC
                                              • Oracle Solaris and SPARC Performance
                                              • Oracle Information InDepth Optimized Data Center newsletter
                                              • Java Spotlight Episode 128: Joe McGlynn on Java Security Dialogs @jbmcglynn

                                              The longer version of this article has list of top ten articles for the last 8 weeks.

                                                Guidelines for Deployment in a Virtualized Environment
                                                Oracle Virtual Networking
                                                Oracle Virtual Networking offers advantages for virtualized server environments. With server virtualization, the bandwidth, network diversity, and storage performance requirements for the physical hosts can be accommodated by using multiple virtual NICs (vNICs) and virtual HBAs (vHBAs), all of which are delivered over a single pair of cables connecting to a purpose-built fabric. These resources can be added or changed on the fly without disrupting service, making it easy to virtualize new applications. The networking resources can also be configured such that they communicate directly across the fabric, allowing for unprecedented server-to-server performance.

                                                In this article, we will examine guidelines and best-practices for deploying Oracle Virtual Networking in a virtualized environment. The recommendations focus on bringing the most simplicity, agility, and performance to the environment. This article is not a replacement for the official documentation; it is a supplement. It is assumed that readers are familiar with the administration of virtualized environments and the basic concepts of Oracle Virtual Networking.

                                                Read on for details.

                                                Trending in
                                                Vol 234, Issue 3
                                                Trending IT Articles