News about Oracle's Solaris and Sun Hardware
System News
May 6th, 2013 — May 12th, 2013 Generate the Custom HTML Email for this Issue
System News System News for Sun Users
Volume 183, Issue 2 << Previous Issue | Next Issue >>
Sections in this issue:
click to jump to section

Oracle Information InDepth
The May edition of the Oracle "Database Insider" newsletter is now available.


  • Oracle Remains #1 in RDBMS Market Share Worldwide for 2012
  • Oracle Exadata Customers Speak About Real-World Value
  • New: Oracle Big Data Appliance X3-2 Starter Rack Helps Jumpstart Big Data Initiatives
  • New Study: Increased Security Spending Still Not Protecting Right Assets

Other sections include

  • Featured Video
  • Webcasts
  • Podcasts
  • Customer Buzz
  • Oracle Excellence Awards
  • Featured Training
  • Oracle Magazine Spotlight
  • Events

May Edition

Best Practices For Database Consolidation On Exadata Database Machine
32-Page White paper
Within IT departments, consolidation is one of the major strategies that organizations are pursuing to achieve greater efficiencies in their operations. Consolidation allows organizations to increase the utilization of IT resources so that idle cycles can be minimized. This in turn lowers costs because fewer resources are required to achieve the same outcome. For example, applications that experience peak load at different times of the day can share the same hardware, rather than using dedicated hardware which will be idle during the non-peak periods.

Consolidation can minimize idle resources and lower costs when you host multiple schemas, applications or databases on a target system. Consolidation is a core enabler for deploying Oracle Database on public and private clouds.

This paper provides the Exadata Database Machine (Exadata) consolidation best practices to setup and manage systems and applications for maximum stability and availability.

Oracle Secure Global Desktop 5.0 Supports iPad
Using HTML5
Oracle has added support for what has been one of Oracle Secure Global Desktop's most widely anticipated features - support for iPad via Oracle Secure Global Desktop version 5.0! Oracle Secure Global Desktop 5.0 provides anywhere access to cloud-hosted and on-premise enterprise applications and desktops (workspaces) from Apple iPad and iPad mini tablets, without the need for a VPN client. In addition, since we leverage HTML5 to provide browser-based access inside Apple iPad and iPad mini tablets, users need not download, maintain, configure and update specific client applications from the App Store.

This new release delivers significant enhancements which provide simple mobile access, enhanced security, full user productivity, security enhancements, session mobility, improved performance and expanded server, client and browser support.

IT - Storage
Five Reasons Why HDD Is Dead and SSD Is Taking Over
IT Business Edge, May 5th, 2013
"Until recently, Flash-optimized Fibre channel storage has been extremely expensive to implement and many organizations were priced out of the procurement cycle. According to Gartner, however, the solid-state drive (SSD) market is expected to grow from some $390 million in 2012 to more than $4 billion in 2016. Emulex, a provider of hardware and software solutions for network connectivity, monitoring and management, offers five reasons why..."

  • Big Data
  • Cost and Availability
  • Faster Resonse Times
  • Durability
  • Power and Cooling

Read on for details.

Data Governance: 10 Steps to Establishing Effective Policies
eWeek, May 7th, 2013
"Data governance, an important IT best practice that nonetheless is underutilized in enterprises, continues to confuse and frustrate IT managers while running up significant costs with little return. Those involved typically stumble across a few similar challenges such as lack of clarity on where to start, insufficient cross-functional involvement, and a rapidly growing population of experts and vendors offering high price-point applications and services. Individuals and teams exploring and implementing data governance systems are often under pressure to deliver measurable progress..."

  • Recognizing Data Governance-Related Critical Business Issues
  • Determine What Is Causing or Continuing These Issues
  • Explore the Impact of a DG Program
  • Establish a Vision for Effective Enterprise Data Utilization
  • Identify Cross-Functional Stakeholders, Decision Makers
  • Determine and Document DG Impact and Benefits
  • Define How a Successful DG Deployment Will Be Measured
  • Develop an Enterprise Information Map
  • Determine What Existing IT Can Be Repurposed for DG
  • Share Quick Wins of Data Governance Throughout the Enterprise

Read on for details.

    Data Hoarding: How to Stop
    Information Week, May 5th, 2013
    "Hoarding information, or storing enterprise data in the wrong places, can open your company to legal liability. But culture change won't be easy.

    Data management is a never-ending struggle for enterprises, particularly when employees store work data in personal accounts on cloud storage services. This so-called data leakage, combined with the problem of data hoarding inside the enterprise firewall, can spell trouble for organizations, especially in legal matters..."

    IT - Technology
    12 APIs Every Programmer Should Know About
    Network World, May 5th, 2013
    "Was it just yesterday that the API was going to take over the Internet and turn every site into an endless remix of data from hundreds of freely available data stores? The world is a bit more mature now. The APIs are still proliferating, but they're not wide open and ready for anyone. Most of the better tools are following the lead of Google and imposing a fee on serious usage...

    Here's a collection of 12 APIs that caught our attention. They're modern tools for adding a bit of oomph or pizazz to your site.

    • Geo-Names
    • Flightstats
    • Follow the Money
    • USA.Gov
    • Stocktwits
    • Yahoo Content Analysis
    • Moodstocks
    • MusixMatch
    • OpenStreetMap
    • Panoramio
    • 3D Geo Stats
    • New York Public Library

    Read on for details.

    MIT Envisions Future of Talking Cars That Can Plan Driver's Day
    IT World, May 5th, 2013
    "You wake up in the morning and your robot starts the coffee maker and then sends the daily calendar to the car. The car then works on a plan that makes sure you keep to that schedule.

    It's not a scene out of a sci-fi movie. It's the vision of MIT researchers who are developing systems to help people collaborate with robots and vehicles..."

      Remembering the Little Desk Lamp That Could: Pixar's "Luxo, Jr."
      Network World, May 5th, 2013
      "People can toss around the phrase 'game-changer' with perhaps a little to much ease these days but the two-minute short animated film 'Luxo Jr' released in 1986 by Pixar could be argued invented the term - at least in the world of computer animation.

      If you have never seen it, the movie revolves around two desk lamps: one large and one small..."

        When Cars Talk, This Is What They'll Tell Each Other
        ComputerWorld, May 10th, 2013
        "Researchers are developing machine-to-machine (M2M) communication technology that allows cars to exchange data with each other, meaning vehicles will soon know what the cars all around you are doing on the highway.

        Your car, for instance, could "see" the velocity of nearby vehicles and react when they turn or brake suddenly. And with computer algorithms and predictive models, your car will be able to predict where other vehicles are going and measure the other drivers' skills -- ensuring you're safe from their bad moves..."

          NetMotion Wireless Migrates Product from Microsoft SQL Server to MySQL
          Reduces Costs and Increases Flexibility
          NetMotion Wireless develops software to manage and secure wireless data deployments for organizations with mobile field workers. Founded in 2001, NetMotion Wireless is one of the fastest growing wireless and technology companies and the recipient of over 25 awards for outstanding technology. NetMotion Wireless has over 2,500 customers, including Advocate Healthcare, Comcast, and Unilever.

          NetMotion Wireless had used Microsoft SQL Server with Mobility Analytics, their mobile VPN product's analytics module, but found it was too costly and lacked the platform and language flexibility to be a good [embedded] database. As a result, when the NetMotion Wireless product team was developing Locality, a cellular network management product, they decided to find an alternative database to use with it and with Mobility Analytics. The team compared MySQL with Microsoft SQL Server on a number of key criteria and, after finding nothing in the 'con column', decided to use MySQL...

          Cloud Computing
          Is Cloud ERP Right for Growing Organizations?
          SaaS and Cloud ERP Observations report from Aberdeen Group
          Organizations are more willing now than ever before to consider Cloud and SaaS ERP deployment models. As a growing company it is integral that you have a deployment model that best fits your requirements for cost, scalability, and flexibility.

          This insightful research by Aberdeen will help you make more informed decisions by providing:

          • Analysis of adoption trends
          • Clear definitions of deployment models
          • Pros and cons associated with each model

          Over the past six years, Aberdeen Group has been measuring organizations' willingness to consider a SaaS deployment model for their ERP implementations. Using this research, Aberdeen has created a short report to help organizations as they review their options and provide key takeaways to consider during the process.

          Register Now and download the free SaaS and Cloud ERP Observations report from Aberdeen Group.

          Oracle Linux
          Market Share: All Software Markets, Worldwide, 2012
          Recently Gartner published a report highlighting among other things ,Operating System revenue, growth and marketshare.

          Below is an estimation by Gartner based on hardware sales, customer momentum info, etc

          • Oracle Linux has @6% of Linux market in 2012
          • Oracle Linux grew @83% since 2011
          • Oracle Linux revenues from 2012 estimated @$81 million

          If you have access to Gartner Research, view the full report with the following info: "Market Share: All Software Markets, Worldwide, 2012" Published: 29 March 2013, Doc ID:G00250553

          IT - Cloud
          4 Questions to Ask When Choosing Cloud Providers
 , May 5th, 2013
          "..using the cloud can still be perceived as a leap of faith. Some businesses are concerned about exactly how to choose the right cloud applications, how to get the best use from them, and if their data will be secure when it's up there. To help dispel these doubts, here are the key questions you should ask a cloud service provider before committing:"

          • Uses for cloud applications
          • Cloud support
          • Terms and conditions
          • Cloud security

          Read on for details.

          Cloud Outages: What to do When Cloud Services and Apps Fail
          SearchCloudApplications, May 5th, 2013
          "When it comes to cloud service outages, the question is not if, but when. That's why cloud application and services users and their software architects must design ways to exert control when disaster strikes. Either automatically or manually, turning off the cloud service in question until the issue is resolved is best, according to Michael Kopp, Compuware Technology Strategist. The trick is identifying a crisis quickly enough to minimize damage..."
            FISMA Compliance through Continuous Monitoring: Tips for Cloud Providers
            SearchCloudProvider, May 5th, 2013
            "When government agencies or cloud service providers develop an information security strategy to achieve and maintain FISMA compliance, they face a complex set of guidelines for ensuring and demonstrating the protection of government data. But one element demands special attention from cloud providers: continuous monitoring..."
            Put Content Management in the Cloud? It Depends...
            Yahoo! Small Business Advisor, May 5th, 2013
            "Cloud computing's most attractive and vaunted business value is its promise of lowering operating costs and reducing or eliminating the burden of managing an IT infrastructure. Thus, it is only natural to wonder whether your business could benefit by putting enterprise content management operations in the cloud.

            We have found that the potential benefits of moving ECM to the cloud differ among organizations and must be evaluated on a case-by-case basis. Because of differing IT support requirements, some businesses are able to realize significant cost savings while others see no financial benefit..."

            IT - CxO
            5 Ways IT Can Crush Corporate Caste System
            Information Week, May 6th, 2013
            "The grim reality is that there's a caste system in corporate America today. At the top sits "the business" and below it, IT and operations. Most C-level types have learned to talk the talk of partnership, but at the end of the day, when the business says jump, IT has little choice but to ask how high.

            The good news is that we in IT can improve our lots in life and our companies' bottom lines with empathy. And not the kind that forces us all to link hands and sing kumbaya; rather, the kind that Wired magazine called 'a revolutionary force for change.'..."

            • Question the value of disintermediation
            • Shadow the business
            • Shadow the customer
            • Transform your org to disintermediate your stakeholders
            • Invite the business to what is now your table

            Read on for details.

              12 Management Lessons From Disney U
              CIO Insight, May 6th, 2013
              "The following 12 best practices promoted at Disney U demonstrate how the organization combines attention to detail, corporate values and the fun factor to develop fully engaged employees who are determined to deliver a superior customer experience. The Lipps now run G. Doug Lipp and Associates, a consultancy specializing in customer service, leadership, change management and global competitiveness:"

              • Teachable Moments
              • Well Schooled
              • Balanced Equation
              • Buddy System
              • Customer Facing
              • The Last Detail
              • Garbage Time
              • Personal Touch
              • Makeover Moment
              • Unleashed Creativity
              • Flexible Thinking
              • Community Connections

              Read on for details.

              Even Monkeys Demand Equal Pay for Equal Work
              TLNT, May 5th, 2013
              "In 1925, the famed Scopes Monkey Trial occurred in Tennessee. The public feverishly debated whether evolution contradicted certain religious teachings and whether humans, viewed by many to be a superior lot, could be related in any respect to monkeys.

              A recent video on monkey behavior (and, perhaps, human psychology?) is certainly telling.

              Briefly, two monkeys are given the same job, but are rewarded differently. The slighted monkey receives watery cucumbers rather than juicy grapes like his co-worker-monkey does for the same work. The reaction of the slighted monkey is priceless!.."

                SF Giants CIO: Quit Bellyaching, Start Leading
                Information Week, May 5th, 2013
                "You want to learn about creating innovation in a large organization, even with a small IT team? Listen to San Francisco Giants' CIO Bill Schlough.

                Wednesday morning at Interop, I attended the InformationWeek CIO summit, 'Innovate or Go Home: The CIO's Critical Role in Driving Growth, Opportunity & Breakthrough Ideas,' and was fortunate to be able to chat a bit with Schlough after his on-stage interview with Fritz Nelson. As you may know, Schlough was named InformationWeek's Chief of the Year in 2012 due to his team's numerous accomplishments with business focused technology innovation... Here's what I learned about innovating with a small IT team ..."

                Managing Your Budget and Your Strategic Vendors
                CIO Insight, May 5th, 2013
                "I hear a lot these days about shrinking IT budgets. The reality is that the days when your influence was judged by the size of your budget or your headcount are long gone. Having an overinflated operating budget or headcount today can spell your demise. Effectiveness has always been critical to our success, but efficiency is just as important. I make a point every time I present to my board of directors ..."
                  Why IT Spending Is Stuck In a Vicious Circle
                  Information Week, May 6th, 2013
                  "Technology professionals want to deliver business value, but it's hard to break out of the vicious circle of underfunding and catch-up. That's the main takeaway from InformationWeek's 2013 IT Spending Priorities Survey of more than 500 IT pros who set, manage or have a working knowledge of the tech budgets at their companies.

                  Although only 20 respondents who added comments to their survey referred to underfunding or doing more with less, other data points from our survey confirm that IT funding continues to be a big issue..."

                    IT - DR
                    Hurricane Sandy Demonstrates Value of Multiple, Active Data Centers
                    Information Management, May 5th, 2013
                    "If you weren't sure about the impact of disasters on business operations a year ago, you should be now.

                    "This past fall, Hurricane Sandy provided lessons for all of us and demonstrated the value of good disaster recovery and business continuity plans," said Ron DeCicco, Chief Executive Officer, of Pershing, ... at the SIFMA OPS 2013 event in Florida.."

                    IT Disaster Recovery Plan Best Practices: Starting from Scratch
                    Business 2 Community, May 7th, 2013
                    "The survival of your enterprise depends heavily on an IT disaster recovery plan. Companies weather all sorts of difficulties, from a slow economy to staffing troubles to market fluctuations. A disaster is one thing that can put the breaks on hard; potentially no part of your organization will survive without a plan. While a comprehensive initiative set up beforehand can be effective, the days and months following an event can be a time of reflection and forward looking.

                    A hard look at your best practices involves several steps..."

                    IT - PM
                    11 signs your IT project is doomed
                    InfoWorld, May 5th, 2013
                    "The IT world is no stranger to projects that go down in flames. In fact, anyone who has had the unenviable pleasure of participating in a failed IT effort likely sensed its demise well before the go-live date. That sixth sense is invaluable in a competitive field like IT -- but only if it is acted on promptly and professionally.

                    Whether you're looking to avoid being saddled to a dud or to steer a doomed rollout out of the ditch, you must be able to recognize the signs of imminent failure well before a project comes apart at the seams. It can be a career-saver..."

                    • The project has launched without senior buy-in
                    • No detailed project plan exists
                    • Meetings have been scheduled without concern for team member availability
                    • Users have had little (to no) early involvement
                    • The project targets the minimum specs
                    • Testing is an afterthought
                    • No recovery plan is in place in the event of failure
                    • Expert recommendations have been rebuffed without testing outcomes
                    • The go-live date is a weekend or holiday
                    • Expectations have not been set
                    • Skimp on training

                    Read on for details.

                      Size Matters: Smaller Project Teams Are Better
                      Information Week, May 5th, 2013
                      "It's not complicated. Bigger is better -- if you are a cellphone company. But if you are a project team, the opposite should be true.

                      Why? Because the larger the development team, the more the number of interactions. These interactions don't just grow linearly; they explode exponentially. For a project team of 20, the number of possible interactions of groups of two or more can be more than 1 million!.."

                        IT - Networks
                        Hottest Products from Interop 2013
                        Network World, May 6th, 2013
                        "Interop is one of the definitive networking shows. It's a place where vendors from around the industry come to display their latest and greatest products. This year, there seems to be a focus on next-generation networking, cloud computing, security, mobile and collaboration products and services, plus the hardware and accessories to support those. Here are some of the hottest tools we've noticed so far at this year's Interop..."

                        • Arista 7500E (96 100GbE wire-speed ports)
                        • Dell Networking S5000
                        • OmniSwitch 6900 10GBaseT (Copper)
                        • OmniSwitch 6450L
                        • SmartNA-XTM
                        • AppRiver's SecureSurf Web Protection with Agent
                        • HP FlexFabric 11900 switch series (model 11908)
                        • HP HSR6800 router series
                        • ACM5504-5-L with integrated 4G LTE support
                        • Secret Server

                        Read on for details of these and many more products.

                        Got Malware? Three Signs Revealed In DNS Traffic
                        Dark Reading, May 5th, 2013
                        "Companies focus much of their energy on hardening computer systems against threats and stopping attempts to breach their systems' security -- and rightfully so. However, companies should always assume that the attackers have already successfully compromised systems and look for the telltale signs of such a breach.

                        Because malware is increasingly using a variety of domain techniques to foil takedown efforts and make their command-and-control servers harder to locate, DNS traffic becomes a good indicator of compromise..."

                        SDN and InteropNet: Cranking Up and Running World's Biggest Temporary Network
                        Network World, May 6th, 2013
                        "Hundreds of exhibitors and thousands of attendees all depend on a network managed by 23 different vendors..

                        It starts with a gathering in a warehouse in Brisbane, Calif. Vendor reps, volunteers and networking experts of all stripes meet to create an enormous temporary network using products from 23 different companies, test it within an inch of its life -- and then stuff it on to trucks drive it out to Las Vegas.

                        Handling Internet access for all of Interop 2013 -- everything from sophisticated tech demos to CEO emails -- is an unsurprisingly complicated task. With 13,000 attendees and more than 300 exhibitors, demand is constant..."

                          IT - Operations
                          10 More of the World's Coolest Data Centers
                          Network World, May 9th, 2013
                          "It's been another year since we've taken a look at the coolest data centers in the world, determined either by architectural innovation, green design, innovative reuse of existing buildings or just sheer size. Here are 10 attention-grabbing examples from around the world that show data centers aren't simply big rooms with lots of refrigerated air to keep servers from overheating..."

                          • Bahnhof modular data center, Kista, Sweden
                          • Google Data Center, Hamina, Finland
                          • Princeton High-Performance Computing Research Center, Princeton, N.J.
                          • OVH data center, Beauharnois, Quebec, Canada
                          • Deltalis Radixcloud Data Center, Attinghausen, Switzerland
                          • Microsoft Data Center, Dublin, Ireland
                          • Verne Global data center, Reykjavik, Iceland
                          • Green Data Center, Syracuse University, New York
                          • Barcelona Supercomputing Center, Spain
                          • SuperNAP, Las Vegas, Nev.

                          Read on for details.

                          Data Centers Under Water: What, Me Worry?
                          IT World, May 5th, 2013
                          "Given the dire warnings about climate change, some business and IT people are pondering this question: How should data center managers handle the crop of 100- and even 500-year storms, coastal flooding and other ecological disasters that climatologists predict are heading our way?

                          Some experts suggest that managers of mission-critical IT centers simply need to harden existing facilities, other observers say they need to move the centers to higher ground and a third group says both strategies are needed.

                          But one thing is certain, experts say: Few IT organizations -- even those that suffered or narrowly escaped damage from recent major storms -- are thinking long-term. Most IT leaders are, if anything, taking the path of least resistance and expense..."

                          How to Close Your Next IT Outsourcing Deal: Handshake vs. Contract
                          CIO, May 6th, 2013
                          "Should you trade your clear-cut written outsourcing contract for a simpler agreement and a handshake with your IT services provider? Thomas Young from Information Services Group (ISG) says you should consider what he calls 'evolutionary contracting.'..."
                          IT - Security
                          6 Steps for a Successful Data Security Control Implementation
                          Information Week, May 5th, 2013
                          "It's time to move from infrastructure-only security to infrastructure and data security control, asserts Neil Thacker, Security and Strategy officer, Websense. He shares six steps for a successful data security control implementation..."

                          • Calculate the value of your data
                          • Make your ROI case
                          • Monitor and log your data
                          • Apply data security controls
                          • Find your data
                          • Implement proactive protection and up employee education

                          Read on for details.

                          10 Reasons SQL Injection Still Works
                          Dark Reading, May 8th, 2013
                          "After all of these years, SQL injection vulnerabilities still stand as an old reliable for attackers seeking to break into corporate databases... Beyond the obvious "hackers do what works" explanation, there are additional dynamics at play that keep SQL injection in the limelight. Among the top 10 most impactful reasons why SQL injection persists, experts named technical missteps, business process issues, and attack environment factors. Here's how they broke things down..."

                          • We're Maintaining Juicy Targets
                          • At Least Go Least Privilege
                          • SQLi: Attacker's "Easy Button"
                          • Insecure Development Architecture
                          • Trusting Input
                          • Agnosticism At All Costs
                          • Legacy Code
                          • Code Samples Outdated
                          • Flaws Easy To Fall Through Cracks
                          • Budget Shortfalls

                          Read on for details.

                          Bank Security Weaknesses Led To Cyber Looting of $45M from ATMs
                          ComputerWorld, May 10th, 2013
                          "Indicted cyber thieves used pre-paid debit cards, maniulated bank accounts to withdraw huge sums from ATMs around the world...

                          Alberto Yusi Lajud Pena, found dead in the Dominican Republic two weeks ago, was the leader of the New York cell of an international gang of cyber thieves that authorities allege stole a staggering $45 million from ATM machines around the world.

                          One startling aspect of the case, sure to be closely reviewed by banks worldwide, is that Pena and his cohorts pull off the theft quickly using just 17 prepaid debit cards..."

                            Majority of Organizations Underestimate Scope Of Privileged Account Security Risk
                            Continuity Central, May 5th, 2013
                            "Despite repeated warnings, a majority of organizations are failing to enact recommended best practice security policies around one of the primary targets of advanced attacks - privileged accounts. According to the results of Cyber-Ark Software's global IT security survey on Privileged Account Security & Compliance, 86 percent of large enterprise organizations either do not know or have grossly underestimated the magnitude of their privileged account security problem, while more than half of them share privileged passwords internally..."
                            New Strategy for IT Security: Focus On the Systems, Not the Threats
                            GCN, May 5th, 2013
                            "The newly revised catalog of IT security controls from the National Institute of Standards and Technology gives administrators more flexibility in protecting information systems and focuses more on designing and acquiring systems that have security built in.

                            Special Publication 800-53, 'Security and Privacy Controls for Federal information Systems and Organizations,' is a foundational document underlying federal cybersecurity regulation. The latest update, Revision 4, is the most comprehensive to date..."

                            Security Manager's Journal: Plans and Processes Are Made to Be Revised
                            ComputerWorld, May 5th, 2013
                            "We security managers are always documenting processes and plans. It's a task without end, because you have to dust off those documents every once in a while and think about how they could be updated. Organizations' needs are always changing, and so is technology, so what was a great plan a couple of years earlier might have some gaping holes now.

                            Such was the case with our incident-response plan. I had reason to review it recently, and it clearly needed modernization..."

                            Why Wiping Decommissioned IT Assets Should Be a Must
                            Help Net Security, May 5th, 2013
                            "We all know the enormous amount of data a modern computer can store on the cheap, so the proper destruction of that data is essential before the workstation leaves the organization. Unfortunately, many tend to disregard this issue and simply swap the computers with new ones or merely format the drives without securely wiping the data.

                            A few years ago, British researchers found top secret U.S. missile defense system data while examining 300 hard drives bought at computer auctions, computer fairs and eBay. I'm sure that if someone did a similar research today, they would still discover sensitive data leaking into the wild..."

                              You're Doing Passwords Wrong. Here's How to Make Them Uncrackable
                              IT World, May 5th, 2013
                              "For years now I've harangued relatives about their shoddy password practices. Either they use easily-hacked passwords or forget the passwords they've created--sometimes both.

                              If you won't take it from me, beloved family, consider this Password Day (yes, apparently it's a thing) statement from McAfee's Robert Siciliano: '74% of Internet users use the same password across multiple websites, so if a hacker gets your password, they now have access to all your accounts. Reusing passwords for email, banking, and social media accounts can lead to identity theft and financial loss.'

                              What's the fix? It's easier than you might think..."

                                IT - Careers
                                9 Things to Consider Before Accepting That IT Job Offer
                                CIO, May 6th, 2013
                                "In a competitive job market like IT, it's tempting to accept an offer as soon as a company makes it. However, at this crossroad careful deliberation is what's in order. Choose unwisely and you may wind up back at square one..."

                                • Know What Motivates You
                                • Know the Job History
                                • Research the Company
                                • Get It in Writing
                                • Know the Company Culture
                                • Who's the Boss?
                                • Talk to Potential Peers
                                • Know the Job Details
                                • Know Where the Company is Headed With Technology

                                Read on for details.

                                  20 People Who Changed Tech: General Georges Doriot
                                  Information Week, May 6th, 2013
                                  "Nobody I knew ever called General Doriot "George" -- certainly not me, a young punk MBA (needless redundancy) when The General ran American Research & Development, the first venture capital fund and the grandfather fund to an entire industry. Greylock, Kleiner Perkins, Sequoia and the other 400 or so venture firms in the U.S. all borrowed expertise from those who went before them. Remember, back in 1949 there weren't venture capitalists because there wasn't venture capital. How do you find companies? Evaluate ideas? Recruit management? All these were skills not yet in evidence when Doriot began AR&D..."
                                  A Nine-Inning Guide to a Winning Career
                                  Baseline, May 5th, 2013
                                  "In the continuing seesaw ride that has defined the present job economy, IT employment opportunities appear to be on the wane, according to research published by Janco Associates. While 78,900 tech jobs have been added in the last 12 months, there was only a net increase of 5,400 positions in March. That's a steep decline from the 9,800 added in January and essentially the same as the numbers from February. This means you should continually strive to increase your value in the workplace, regardless of whether you are looking for a new job or are happy where you are..."

                                  • Stay Ahead of the Curve
                                  • Get Credentialed
                                  • Be Generous
                                  • Show Your Human Side
                                  • Put on Your Best Face
                                  • Elevate Your Expert Profile
                                  • Speak Out
                                  • Build Your Network
                                  • Make Users Love You

                                  Read on for details.

                                    Leave Early On Friday: Time-Saving PC Tips and Tricks
                                    IT World, May 5th, 2013
                                    "What's the best way to tell an expert PC user apart from a bumbling amateur? The expert doesn't waste time. Time is money, after all, and there are tons of ways to speed up even the most basic computing tasks.

                                    We're going to contribute to your expert education with 21 simple things you can do to waste less time while you're using a PC. Even if one of these tips saves you just five minutes each week, it'll save you hours over the next year..."

                                    • Tame your email with Inbox Zero
                                    • Cut meetings down to size
                                    • Learn Microsoft Office keyboard shortcuts
                                    • Add a second monitor
                                    • Use a disk visualizer to speed up your PC
                                    • Disable the Windows 8 password screen
                                    • Create a separate user account on your PC
                                    • Speed up your boot time
                                    • Cut down on tab clutter in Chrome
                                    • Use a business card OCR app

                                    Read on for details of these and many more tips.

                                    Seven Traits of Effective Programmers
                                    TechRepublic, May 5th, 2013
                                    "In order to be an effective programmer, you need to possess a combination of traits that allow your skill, experience, and knowledge to produce working code. There are some technically skilled developers who will never be effective because they lack the other traits needed. Here are seven traits that are necessary to become a great programmer..."

                                    • Learn new tech and non-tech skills of their own accord
                                    • Are pragmatic, not dogmatic
                                    • Know how to research for answers
                                    • Have passion
                                    • Leave their egos at the door
                                    • Have entrepreneurial spirits
                                    • Measure twice, cut onceĀ… but do not measure more than three times

                                    Read on for details.

                                      IT - Social Media
                                      Five Tips for Managing the Enterprise Social Identity
                                      TechRepublic, May 5th, 2013
                                      "All companies interacting in social media are creating social identities. These identities are often clouded by the poor planning and implementation of social media efforts, leaving companies in a sort of social media no-man's-land where they are either unknown or known for the wrong things..."

                                      • Take an active inventory of the social identity
                                      • Curate the social identity by selecting, organizing, and managing outgoing messaging to align with the company's core values.
                                      • Don't try to control social media conversations.
                                      • Be authentic
                                      • Employ social listening by recognizing that dialogue is a two-way street

                                      Read on for details.

                                        Is Your Social Network Built Enterprise Tough?
                                        Network World, May 7th, 2013
                                        "You don't have to look further than the uprisings across the Arab world to recognize the power of social tools, and this transformative power applies to business as well. But for an enterprise social network (ESN) to be genuinely useful, it needs to go beyond the "Facebook for enterprise" model.

                                        In evaluating the usefulness of any social platform, here are four essentials to look for:"

                                        • Getting work done faster.
                                        • Information where and when you need it
                                        • Enterprise has secrets -- protect them
                                        • Usability for the whole enterprise

                                        Read on for details.

                                        The 10 Commandments of a Social Media Strategy
                                        Business 2 Community, May 5th, 2013
                                        "Thou Shalt Not Spam!

                                        Dazed and confused about social media? You're not the only one. Even the 'experts' sometimes need to get back to the basics. Whether you have 10 years experience in social media, or you're simply aspiring to pen your first Tweet, you're in luck. I've been summoned to bring you the 10 Commandments for Twitter, Pinterest, Facebook and more. The following rules should be the root of all social media strategies..."

                                        • I will not, under any circumstances, use social media for hard sales.
                                        • Thou shalt not take yourself too seriously
                                        • Thou shalt have a strategic plan
                                        • Thou shalt not forget that you are human
                                        • Thou shalt not only self-promote
                                        • Thou shalt not overshare
                                        • Thou shalt not ignore comments
                                        • Thou shalt not throw shade on other companies
                                        • Remember to shorten thy links
                                        • Thou shalt review analytics regularly

                                        Read on for details.

                                        IT - Virtualization
                                        Hyper-V and VMware vSphere Architectures: Pros and Cons
                                        ServerWatch, May 5th, 2013
                                        "Both VMware and Microsoft have been in the server virtualization scene for a number of years -- VMware for more than a decade now, while Microsoft entered into it relatively recently.

                                        It is imperative for IT workers or organizations to understand the differences between the Microsoft Hyper-V and VMware vSphere architectures as well as the advantages and disadvantages each technology offers before they propose the virtualization solutions to their customers or employees -- or before using it in a production environment..."

                                        Storage Problems Are Holding Back App Virtualization, Survey Finds
                                        GCN, May 5th, 2013
                                        "The overall cost of storage and performance issues appear to be the two most significant storage-related barriers preventing agencies from virtualizing more of their mission-critical workloads, according to a survey of 477 IT professionals from industry and government conducted by DataCore Software.

                                        Storage continues to be the biggest chunk of the investment in server and desktop virtualization projects, respondents said in the Third Annual State of Virtualization Survey released by DataCore, a developer of storage virtualization software. Fifty-two percent of those surveyed said storage accounted for more than 25 percent of their virtualization budget..."

                                        IT - Compliance
                                        Dodd-Frank's Third Anniversary: The IT Journey to Date
                                        Wall Street and Technology, May 5th, 2013
                                        "As we approach the third anniversary of the Dodd Frank Wall Street Reform and Consumer Protection Act in July, it is worthwhile to take a look at its impact on banks and their respective IT departments so far.

                                        The implementation of the rules has been fraught with delays and confusion. The regulators who were entrusted with the job of proposing the rules and transforming the guidelines into policies have struggled to reach consensus with the industry, and have therefore been forced to repeatedly revise and delay compliance dates. The ongoing process prevented the initial implementation of strategic solutions, since firms were not willing to risk investing in new technology until the final rules came into better focus..."

                                          IT - Email
                                          Want a Reply To Your Email? Try Being Downbeat and Pessimistic, Say Scientists
                                          MailOnline, May 7th, 2013
                                          "If you want a quick reply to an email, make it downbeat and pessimistic, experts have advised.

                                          That's according to a study by software company Contactually, which found that negative emails got a quicker response than positive conversations.

                                          It also found that unhappy people are more likely to reply to emails within 24 hours, compared to their more upbeat colleagues..."

                                            How to Build A Cloud for Family and Friends Using Oracle Solaris 11
                                            by Suk Kim, Oracle ACE Director
                                            Oracle Solaris 11 is a cloud operating system that is very powerful. Using Oracle Solaris 11, you will be able to provide various services. For example, it is possible to create storage that can be utilized by AjaXplorer, which provides Web-based access to files.

                                            If you'd like to download software, participate in forums, and get access to other technical how-to goodies in addition to content like this, become an OTN member. No spam! This article describes a PHP-based open source solution that uses AjaXplorer, Oracle Solaris 11.1, and Apache Web server (although other Web servers can be used) to build a cloud-based storage service that is similar to Dropbox.

                                            Of course, you can also build the storage in the same way using AjaXplorer with other operating systems, such as Microsoft Windows, Mac OS X, and Linux. However, when using Oracle Solaris 11.1, you will be able to configure the storage in a more powerful and secure way by taking advantage of ZFS.

                                            After you implement the solution described in this article, you will be able to use any Web browser to access the Web-based storage. In addition, you can use apps on Android and Apple iOS smartphones and tablets to access the storage...

                                            IT - Backup
                                            Data storage and backup? Fuggedaboutit!
                                            SearchDataBackup, May 5th, 2013
                                            "Many storage shops are fighting a losing battle when it comes to data storage and backup protection, with too much data and not enough time. Maybe it's time to rethink the process.

                                            It's 2013 and we're still doing backup. I know things tend to toddle along kind of slowly in IT, but the way we protect our data has barely changed at all in my lifetime, and I'm hardly a kid. Backup keeps getting better, of course, with techs like data deduplication and bigger, faster storage targets to send all that backup data to. But today's data storage and backup process requires essentially the same oversight and administration it did 10, 20 or 30 years ago..."

                                              IT - Big Data
                                              Bank of America CIO on Big Data, Emerging Enterprise Tech
                                              Information Management, May 5th, 2013
                                              "Catherine Bessant hates the phrase 'Big Data.'

                                              'As a term, it means different things to different people, and it creates a black box or a mystery around data,' says Bessant, who is head of global technology and operations at Bank of America; the bank's CIOs report to her and she reports directly to CEO Brian Moynihan. 'I think making data a black box works against its use. It overcomplicates the topic, when all you're really trying to do is add up the sum of the micro transactions to tell you something you couldn't see' before..."

                                              Big Data Analytics Provides a Financial Edge
                                              Baseline, May 5th, 2013
                                              "From now through 2020, the digital universe will double every two years, according to research from IDC. By then, the total amount of digital data will equal 40,000 exabytes. To put that into context, a single exabyte is big enough to contain 50,000 years' worth of DVD-quality videos. Unfortunately, only a tiny fraction of the digital universe is being explored for analytic value, IDC reports..."

                                              • Big Edge With Big Data
                                              • Job Description
                                              • Prime Positions
                                              • Mandatory Duty
                                              • Minority Opinion
                                              • Professionals Who Say Data Is "Extremely Important"
                                              • Strategies to Promote a Data Culture

                                              Read on for details.

                                              More Data Isn't Always Better, Says Nate Silver
                                              ComputerWorld, May 8th, 2013
                                              "Big data may seem to promise big insights to users, but more isn't always better, cautions statistician Nate Silver, who became one of America's most well-known faces of data analysis after his FiveThirtyEight blog accurately predicted 2012 presidential election results in all 50 states.

                                              The more data there is, "the more people can cherry pick" data points that confirm what they want it to show, he said..."

                                              The Missing V's in Big Data: Viability and Value
                                              Wired, May 6th, 2013
                                              "The era of Big Data is not 'coming soon.' It's here today and it has brought both painful changes and unprecedented opportunity to businesses in countless high-transaction, data-rich industries. In this first wave of Big Data, IT professionals have rightly focused on the underlying resource demands of Big Data, which are outstripping traditional data infrastructures and, in many cases, rewriting the rules for how and where data is stored, managed, and processed..."
                                              IT - Mobile
                                              What I'm Learning about Mobile Computing Security Best Practices
                                              Network World, May 5th, 2013
                                              "I started my career at EMC in 1987... I've had PCs at every job since, but it wasn't until the mid-to-late 1990s until any of these machines had any security software installed on them. In fact, I think it was the rise of spyware that drove the deployment of security software somewhere around 1999.

                                              I use my personal history to illustrate a point: PC infrastructure, management, and operations was fairly mature before security software became a requirement. Because of this, PC management was never quite aligned with PC security. This remains true today..."

                                              IT - BYOD
                                              How to Craft the Best BYOD Policy
                                              CIO, May 5th, 2013
                                              "What is a good BYOD policy? Step one is to clarify the rights of both company and employee and state upfront what's business and what's personal. But there's a lot more to it. In this interview with a technology transactions lawyer, explores the do's and don'ts of BYOD policies..."
                                              Security Think Tank: Embrace BYOD, But Be Wary of the Risks
                                              ComputerWeekly, May 5th, 2013
                                              "The bring your own device (BYOD) movement has shaken traditional security controls to the core.

                                              It is becoming increasingly more technically and legally difficult, if not impossible, to fully control ownership and secure the integrity of user devices that are accessing company data. While consumerisation is driving this forward, security is being left behind..."

                                              Top Ten Articles for last few Issues
                                              Vol 183 Issue 1; Vol 182 Issues 1, 2, 3 and 4 ; Vol 181 Issues 2, 3 and 4
                                              We track how frequently each article is viewed on the web site to determine which the readers consider the most important. For last week, the top 10 articles were:

                                              • SAS Traffic for ZFS Solutions
                                              • Become an Oracle Solaris System Administrator
                                              • Four Key Features in Selecting a Hybrid Storage Array
                                              • Oracle Secure Global Desktop 5.0
                                              • Oracle ZFS Storage Appliance provides superior unified storage platform
                                              • More SPARC T5 Performance Results
                                              • Addressing the Top 5 Cloud Security Challenges
                                              • Cloud Storage: the Next Frontier for Tape
                                              • Oracle VM 3.2.3 and Oracle VM Server for SPARC updates
                                              • Oracle Partners Fuel Growth in Sun ZFS Storage Appliance Sales

                                              The longer version of this article has list of top ten articles for the last 8 weeks.

                                                IT - Server
                                                Your DNS Server Is Helping DDoS Attacks
                                                Information Week, May 5th, 2013
                                                "In the first quarter of this year, it was reported that the Internet experienced a 700 percent DDoS bandwidth increase. As DDoS attacks force more bandwidth onto a target, it means that even the largest enterprise networks can succumb to over-utilization.

                                                DDoS attacks are growing increasingly sophisticated and take advantage of dozens, hundreds, or even thousands of compromised machines that form enormous botnets. But more importantly, they increasingly make use of non-compromised, but misconfigured, public DNS servers. Your enterprise might be responsible for these servers..."

                                                  IT - Tape
                                                  Sales of Tape Drives Plunging in 2012 - Santa Clara Consulting Group
                                                  Storage Newsletter, May 5th, 2013
                                                  "Backup tape drive and media sales represented a $1.06 billion market in 2012, according Backup Tape Technology: 2013

                                                  Trends for QIC, DAT, 8 mm, DLT and LTO Media & Hardware Markets, a report from the Santa Clara Consulting Group.

                                                  Drives had sales of $391.91 million.

                                                  Media sales amounted to $665.24 million.


                                                  Secure Access for 75,000 IT System Users at UPMC
                                                  University of Pittsburgh Medical Center
                                                  Committed to developing and delivering life-changing medicine, University of Pittsburgh Medical Center (UPMC) is a US$10 billion, integrated, global health enterprise and one of the leading health systems in the United States. UPMC operates more than 20 academic, community, and specialty hospitals and 400 outpatient sites; employs more than 3,200 physicians; and offers an array of rehabilitation, retirement, and long-term care facilities. It is also Pennsylvania's largest employer and the first nonprofit health system to fully adopt Sarbanes-Oxley standards.

                                                  A recognized innovator in information technology, UPMC has deployed an electronic health record across its hospitals and has implemented a semantic interoperability solution to unify information from multiple systems...

                                                  CSO Online Study: Threats are Outside, Risks are Inside
                                                  Oracle recently worked with CSO Online to study the economics of security
                                                  Oracle recently worked with CSO Online to study the economics of security. Despite the the increasing IT spend on security, many organizations don't feel any safer. According to the study, organizations allocate up to 67% of their IT security spend protecting network resources. However, the biggest risk in many organizations is weak governance controls on user access and application security. According to the latest Verizon Data Breach Report 2013 , 76% of attacks utilize lost or stolen credentials as a means of entry or propagating the attack.

                                                  According to the survey, 40% believed that implementing fragmented point solutions created gaps in their security and resulted in vulnerability. Fragmentation creates latency in security processes and latency introduces risk. According to a similar study by Aberdeen Research, organizations that take an integrated platform approach had 35% fewer audit deficiencies and were more responsive.

                                                  The findings underscore the relevance of Oracle's "security inside-out" approach which means focusing attention on the organization's most strategic assets which include applications, databases, systems, and users.

                                                  Oracle Unified Directory 11gR2PS1
                                                  An all-in-one directory solution with storage, proxy, synchronization and virtualization capabilities
                                                  Etienne Remillon writes, "Oracle Unified Directory is an all-in-one directory solution with storage, proxy, synchronization and virtualization capabilities. While unifying the approach, it provides all the services required for high-performance enterprise and carrier-grade environments. Oracle Unified Directory ensures scalability to billions of entries, ease of installation, elastic deployments, enterprise manageability and effective monitoring.

                                                  Some of the new features provided by this Patch Set:"

                                                  • Extensibility framework via Plug-in API
                                                  • Support for Macro ACIs
                                                  • Additional use cases for Oracle database enterprise user security (EUS) including Proxy mode to other - directories and Kerberos and Certificate based authentication
                                                  • ODSM console supported on IBM WebSphere
                                                  • Increased performance

                                                  Oracle Unified Directory is part of Oracle Directory Services Plus which provides comprehensive directory solutions for robust identity management deployments.

                                                  Trending in
                                                  Vol 235, Issue 2
                                                  Trending IT Articles