News about Oracle's Solaris and Sun Hardware
System News
May 13th, 2013 — May 19th, 2013 Generate the Custom HTML Email for this Issue
System News System News for Sun Users
Volume 183, Issue 3 << Previous Issue | Next Issue >>
Sections in this issue:
click to jump to section

E-Book Oracle's SPARC Systems: What Customers Say
Login and Download
Oracle SPARC servers and engineered systems deliver record-breaking performance, unrivaled reliability and dramatically lower data center costs. But don't take our word for it – read the success stories of Oracle SPARC customers worldwide.

Download your exclusive copy of Oracle's SPARC Systems: What Customers Say, and learn how you can:

  • Simplify IT infrastructures and gain world-record levels of performance
  • Reduce costs with powerful, built-in virtualization tools
  • Take advantage of unique on-chip security and unmatched reliability
  • Invest with absolute confidence with the SPARC/Solaris binary compatibility guarantee

Discover the global SPARC server revolution. Download your free copy of Oracle's SPARC Systems: What Customers Say today.

Oracle Engineered Systems at Thomson Reuters
Engineered Systems - the Foundation of Efficiency
Aaron Pust has shared a 20-page PDF presentations outlining the evolution of the Oracle Solution at Thomson Reuters:

  • Enterprise Data Warehouse
  • Enterprise Data Warehouse – Next Generation
  • Evaluation of Alternatives
  • The Compression Advantage
  • Backup Strategies
  • Enterprise Data Warehouse Implementation Architecture
  • Risk & Fraud – Data Warehouses
  • Risk & Fraud Warehouses – Evaluating Exadata
  • Risk & Fraud Warehouses Implementation Architecture
  • Risk & Fraud Warehouse Statistics

Aaron concludes that the secret sauce is in the storage layer. Data warehouse projects still require some effort, especially with the new support model. He does caution that incremental growth is restricted in this model.

IT - Storage
Demystifying RAID
Storage Switzerland, May 13th, 2013
"Ever since RAID was invented over three decades ago it has been counted on by IT professionals around the world to keep data available for users and applications when something goes wrong with their storage systems. That thing going "wrong" most likely was a drive failure. Using RAID has since become the standard operating procedure for almost any business of any size, but with that familiarity have come some dangerous assumptions as well, which in some cases can lead to lost data. The purpose of this article is to clear up those assumptions so that IT gets exactly what it expects from RAID and doesn't lose data..."
    The Proper Care and Feeding of SSD Storage
    PC World, May 13th, 2013
    "Your solid-state drive sits there in silence. It's sleek. Elegant. More than a little mysterious. The hard drive it replaced was easy to understand: A soft hum assured you that its platters were spinning. A quiet mechanical click informed you of its read/write operations. You'd groom it with the occasional defrag. Times were good.

    Now? Everything seems peaceful. But you keep hearing stories: An SSD's performance deteriorates over time. They have disturbingly short life spans. If it fails, your precious data will be consigned to oblivion. Facts? Or fever-brained fiction?..."

    What is the Fate of Object Storage?
    Storage Switzerland, May 14th, 2013
    "Object storage and the systems that leverage its unique data storage approach have been the subject of much hype over the past few years. If you took past analyst predictions at face value, by now all unstructured data would be residing on an object based storage platform. For some reason, however, reality has not caught up with all the current hype. What then is the fate of object storage? Will it carve out a well defined niche or is it destined to be one of those technologies that barely makes it beyond a PowerPoint presentation?..."
      Storage optimization: Flash finds some government niches
      FCW, May 13th, 2013
      "Storage performance can spell the difference between a successful technology venture and one that brings systems to a standstill. Storage optimization tools, including software-based accelerators, aim to reduce or eliminate that bottleneck.

      Another approach that promises better storage performance is flash technology, which is familiar to anyone who has ever used a USB thumb drive. In the enterprise context, flash technology takes the form of cards that plug into servers or solid-state drives housed in storage arrays..."

      The Unknown Risk of SSD Mapping Tables
      Storage Switzerland, May 16th, 2013
      "Solid State Disks (SSD) and Flash Appliances use mapping tables to track where data is stored on the flash device. These tables play a similar role to iNode or File Allocation Tables (FAT) and if they get corrupted or lost, they need to be rebuilt. While faster than hard disk systems, the rebuild process on large flash appliances can take hours which makes it especially problematic for the performance sensitive environments that solid state solutions are typically deployed into..."
      IT - Technology
      Ten Star Trek Technologies That Are Almost Here
      Network World, May 16th, 2013
      "The 23rd century may seem a long way off, but you'd be surprised by how much of the future predicted by Star Trek is already here. We've got handheld communicators (smartphones), sassy voice-driven computers (Siri), Geordi La Forge-like vision (Google Glass), and at least 4.5 billion Earth-like planets to choose from. (Whether any of them contain green-skinned alien babes in gold bikinis is still to be determined.) As for warp drives, transporters, phasers, and the rest? It will be here sooner than you think. Join us as we boldly go on a tour of Trek tech..."

      • Warp drives
      • Transporters
      • Phasers
      • Tractor beams
      • Replicators
      • Helpful holograms
      • Tricorders
      • Holodecks
      • Cloaking devices
      • Friendly androids

      Read on for details.

      10 Certifications that Actually Mean Something
      PMP, CISSP, VCP5-DCV, ITIL v3 Foundation, MCITP, Cisco CCIE, RHCA, MCSM, CISM, GSE
      Randy Muller, of Global Knowledge, writes, "What gives meaning to a certification? Is it the certification vendor? Is it the subject? Or is it the perceived difficulty, mystic or aura? Or might it be something totally different? There are some certifications and/or vendors that are perceived to be more valuable - think of Cisco's CCIE, which has been perceived as meaning something (value) since its inception. Then there are other certifications that don't have this same perceived value - certifications that are seen as too easy or ones that might be seen as entry-level certifications. Following is a list of certifications that do have perceived value and worth:"

      • PMP - Project Management Professional
      • CISSP - Certified Information Systems Security Professional
      • VCP5-DCV: VMware Certified Professional 5 - Data Center Virtualization
      • ITIL® v3 Foundation
      • MCITP: Database Administrator 2008
      • Cisco CCIE - Cisco Certified Internetwork Expert)
      • RHCA - Red Hat Certified Architect
      • MCSM - Microsoft Certified Solutions Master
      • CISM - Certified Information Security Manager
      • GSE - GIAC Security Expert

      Read on for details.

      Oracle Solaris 11 and PCI DSS
      Meeting PCI DSS Compliance with Oracle Solaris 11
      "This paper provides guidance to IT professionals who are implementing Oracle Solaris 11 within their Cardholder Data Environment (CDE) and to the Qualified Security Assessor (QSA) assessing those environments. The Payment Card Industry Data Security Standard (PCI DSS) applies to all organizations that store, process, or transmit cardholder data. This includes entities such as merchants, service providers, payment gateways, data centers, and outsourced service providers.

      This guidance is not intended as an in-depth technical assessment of Oracle Solaris 11 or an installation guide, but rather an analysis of its ability to meet and support the PCI DSS requirements. In evaluation of Oracle Solaris 11 and its security capabilities, Coalfire has determined that it is fully capable of supporting PCI DSS compliance.

      The Oracle Solaris 11 features highlighted within this document specifically address PCI DSS compliance; however, the same basic tenets can be used for meeting other regulatory environment standards such as the Gramm–Leach–Bliley Act (GLBA), Sarbanes Oxley (SOX), the Health Insurance Portability and Accountability Act (HIPAA) and the Federal Information Security Management Act (FISMA)."

      Circular Replication in MySQL
      Replication is a hot topic in MySQL 5.6
      Jeremy Smyth writes, "Replication is a hot topic in MySQL 5.6, and for good reason: There are many excellent features that make it a strong well-supported feature, from the new Global Transaction Identifiers (GTIDs), to simplified replication configuration and automated failover using MySQL Utilities (now available in alpha as a separate download).

      The simplest topology consists of a master server that accepts changes, and slaves that replicate those changes from the master. A common requirement is for a network to have multiple servers that accept changes and replicate to each other. This is possible by means of circular replication, where each master is also the slave of another master, in a circular fashion. However, this configuration is prone to certain problems..."

      Cloud Computing
      Operational Siloes Hinder Effectiveness of Cloud Applications
      Independent Report - Cloud for Business Managers: the Good, the Bad, and the Ugly
      Organizations are looking to the cloud to change not only how they buy and consume IT, but also how cloud actually impacts the business. In fact, one of the main drivers for organizations deploying cloud applications is to improve operational agility and effectiveness. To determine if cloud applications are delivering on this promise, Oracle partnered with market research firm Dynamic Markets to survey 1,355 executives from companies across the world with revenues of $65 million or more. The results showed that operational silos are often preventing organizations from realizing the promise of improved business performance and highlighted the need for a broad set of integrated cloud applications.
      Delivering Cloud Services to the State of Texas
      An Oracle Enterprise Architecture White Paper
      "Most government organizations spend a significant portion of their technology budgets procuring and maintaining information technology (IT) infrastructure, platforms, and applications. Purchasing hardware, upgrading software, and hiring administrators is a major undertaking, often consuming resources needed for other activities.

      The State of Texas is setting a progressive example for other state governments by relying on cloud service providers to provision IT resources to dozens of state agencies. Led by the Texas Department of Information Resources (DIR), the state is creating the Texas Cloud Marketplace, a private cloud that utilizes engineered systems such as Oracle Exadata and Oracle Exalogic to deliver new technology while fulfilling legislative mandates. Oracle is helping to transform the state's widespread infrastructure, which spans hundreds of databases and tens of thousands of applications. The billion-dollar consolidation project was designed to help 300,000 government employees serve 25 million citizens in a more flexible and cost-effective way."

      Evaluating Oracle Linux From Inside Oracle VM VirtualBox
      VirtualBox allows you to have multiple virtual machines running simultaneously on a single physical machine
      Yuli Vasiliev writes, "For years, the only way to evaluate a new operating system was to install it on a dedicated machine, as a standalone system, or with existing operating systems in a multiboot scenario. In any case, you had to install your operating system on the bare metal and, therefore, you did not have the ability to run more than one operating system at a time on a single physical machine.

      This situation has changed since cross-platform virtualizers such as Oracle VM VirtualBox appeared. With such a virtualizer installed in your system, you obtain the ability to have multiple operating systems running simultaneously—each in a separate virtual machine (VM)—on an individual physical server.

      This article discusses how you might evaluate Oracle Linux, running it inside a virtual machine on top of your existing operating system..."

      IT - Cloud
      IT's Attitude Problem
      Information Week, May 13th, 2013
      "Cloud computing has widened the already pronounced rift between business executives and stereotypical IT throwbacks who think data is safer on internal Windows 2008 servers that get patched every quarter, whether or not they need it. There are a few members of the latter camp among the 446 business technology professionals from companies with at least 50 employees responding to our InformationWeek 2013 State of Cloud Computing Survey. They made comments such as 'I won't trust my checkbook to the cloud, why should I trust anything else?' and 'Another IT fad filled [with] flaws and glitches.'

      These results reinforce a trend we saw in our recent Standardization Survey ..."

      How Cloud Computing Changes Enterprise IT Economics
      CIO, May 13th, 2013
      "After a recent speaking engagement, in which I focused on creating a hybrid cloud computing strategy, an attendee approached me with a question. 'How,' he asked, 'can I show that our storage is less expensive than AWS?'

      When I asked him to elaborate, he outlined this challenge. His group installed a significant amount of storage a year ago, based on an estimate that the installation would support the growth of the company for the next five years.

      Now, less than a year later, the new storage is nearly full. He explained that business users want to offer new capabilities to customers; one example is providing customers the capability to view their invoices for the past year online. Unfortunately, these new capabilities consume far more storage than planned for in the upgrade..."

      Cloudy IT Forecast Means Change Ahead
      knowit information systems, May 13th, 2013
      "There's a cloudy forecast ahead for corporate IT shops, and it's getting cloudier fast. Analysts at Gartner predict that Infrastructure-as-a-Service, or cloud-based computing, will reach a compound annual growth rate of 41 percent through 2016. As enterprises adopt cloud computing models, they'll need to make other changes, too. Researchers at the W. P. Carey School of Business expect cloud adoption to bring organizations rapid business-process calibration, increased use of analytics, as well as possible issues around the tax implications of cloud-based IT spending..."
      Does Your Cloud Vendor Protect Your Rights?
      ComputerWorld, May 14th, 2013
      "From time to time, organizations are asked to provide access to data for legal reasons. Those requests can be more complicated when the data is in the cloud. But a new report sheds some light on one critical aspect of such requests.

      One risk with cloud computing is that the customer has less control over who can access its data. When customer data is stored on and processed by the cloud vendor's data center instead of in-house, what's to stop a third party, such as the government, from going directly to the cloud vendor to obtain access to that data without the customer's permission or knowledge? And if that happens, will the cloud vendor's priority be to protect its customer's rights and data or to protect itself?..."

      Seven Competencies You Require Over Cloud
      Information Week, May 14th, 2013
      "As many organizations think that cloud is going to be their priority, there are many research findings which exist today which tells us widening gap between demand and supply of cloud skills. Apart from other factors cloud computing skills shortage is going to prevent the growth and adoption unless we do something immediately.

      To uncover this, I thought of writing this article so that we can focus on these skills and bring attention so that we can do something to manage the gap. There is a huge opportunity to train the workforce and become ready to tap the megatrend. The competencies are discussed below..."

      • Cloud Technical
      • Partner Management
      • Demand Management
      • Contract Management
      • Cloud Financials
      • Negotiation
      • Governance

      Read on for details.

      How to Keep the Feds from Snooping On Your Cloud Data
      ComputerWorld, May 16th, 2013
      "A cottage industry is growing up around virtual padlocks that consumers can place on cloud services so that the vendors themselves can't get to the information -- even if the government requests access.

      And in recent years there have been a lot of those government requests for access from storage-as-a-service providers.

      For example, Google regularly receives requests from governments and courts around the world to hand over user data. Last year, it received 21,389 government requests for information affecting 33,634 user accounts. Sixty-six percent of the time, Google said it provided at least some data in response..."

      IT - CxO
      How the Sins of Management Hurt Team Performance
      Baseline, May 13th, 2013
      "Here's a not-so-well-kept secret about bosses that every worker should know: They suffer from the same human failings that everyone else does. Sometimes, these flaws emerge because there is so much about department success or failure that they can't control, and they feel helpless. At other times, there are inner impulses that lead them away from core qualities that respected leaders exhibit. Either way, these traits will drag down your team's performance..."

      • Sin #1: Fear
      • Sin #2: Arrogance
      • Sin #3: Over-Control
      • Sin #4: Anger
      • Sin #5: Guilt
      • Sin #6: Paranoia

      Read on for details.

      11 Tips for Deploying ERP Applications
      CIO, May 15th, 2013
      "In a global mobile environment, organizations are looking for ERP systems that do more than integrate with a legacy system. But with so many solutions available, how do you choose the software that's right for your enterprise? IT executives and ERP experts offer 11 tips to get a return on your software investment..."

      • Document Business Objectives and Come Up with an Implementation and Support Plan
      • Decide on a Delivery Model
      • Compare Solutions
      • Carefully Vet Vendors
      • Focus on the Essentials
      • Don't Go it Alone
      • Invest in Training
      • Focus on Data and Change Management
      • Avoid Over-Customizing Your ERP Solution
      • Measure Results
      • Keep Your Software Current

      Read on for details.

      CIO Interview: Graeme Hackland, CIO, Lotus F1 Team
      ComputerWeekly, May 13th, 2013
      "Graeme Hackland, CIO of Lotus F1, has been working for the race car team for 16 years and has seen major changes in the way IT is used both on and off the track. He started as network engineer and moved up to an IT infrastructure manager role when the team was taken over by Renault. The team's head office is in Oxfordshire where Hackland now spends much of his time.

      He says: 'Early on, I used to support the guys at the track. But these days there are restrictions...'"

      Don't Take Your Posse to Your New Job
      Federal Computer Week, May 13th, 2013
      In the modern world, however, 'posse' doesn't mean a lot of people with hats chasing some person who shot the sheriff. In federal IT and elsewhere, the term today means bringing a lot of your fans into the organization from your last organization - in other words, bring your own people. After all, they already understand you and know your priorities and quirks. They're the comfortable shoes you've already broken in. For decades, I have watched this process at work. We in the IT world know that no one understands what we go through. Comfort is more important than progress, and someone will watch my backside..."
        How to Ensure Your Business Judgments Are Fair
        Baseline, May 13th, 2013
        "Managers and business leaders regularly evaluate organizational members, as well as the products and services their company offers. These evaluations are often biased: They do not account for the role that the context plays.

        As an example, consider the last time one of your colleagues arrived late at an office meeting. You may have interpreted this behavior as a sign that your colleague is not a reliable or considerate person.

        Now consider the last time you were the one who was late for a meeting. You may have had a legitimate excuse, such as getting stuck in traffic on the way to the office. This highlights how a factor outside your control could explain your behavior. In this case, you did not conclude that you were inconsiderate or unreliable..."

          Learning to be a Leader, the Hard Way
          Information Management, May 13th, 2013
          Experience is clearly the best teacher when it comes to learning to lead. However, there are a few items that I wish someone would have pointed out before I tripped all over myself earlier in my career. Forewarned is forearmed!

          At Least 10 Things I Discovered the Hard Way about Leading:

          • This job would be easy if it weren't for the people
          • It's easy to spend too much time with the wrong people
          • Hire slow, promote fast and fire fair and fast
          • People fundamentally don't change
          • Feedback is the most powerful performance tool
          • Recognize that everyone on your team is watching and judging you
          • Clear expectations matched with accountability equals high performance
          • Paying attention to a person
          • listen
          • Questions are more powerful than commands

          Read on for details.

          Nick Carr's 'IT Doesn't Matter' Still Matters
          Network World, May 13th, 2013
          "The jarring headline of Carr's May 2003 article, "IT Doesn't Matter," is what many people remember, and it tends to overshadow his more thought-provoking thesis: that companies have overestimated the strategic value of IT, which is becoming ubiquitous and therefore diminishing as a source of competitive differentiation...

          Carr spoke with Network World this month about his inspiration for the article, the backlash, and the article's unexpected longevity..."

            Trust, Transparency and Creating Business Value
            CIO Insight, May 13th, 2013
            "It was a fairly routine appeal-a capital budget request to upgrade the organization's WAN acceleration technology. The cost was estimated to be seven figures. But something about the request struck Michael Keithley, CIO of entertainment industry giant CAA, as wrong; he couldn't quite put his finger on it, but he felt this budget request needed more investigation. So he asked a question: What was this investment's business value?..."
            When CIO Reports to CFO, Everyone Loses
            Internet Evolution, May 13th, 2013
            "In all my years interacting with CFOs, I have not met one who actually understood IT -- not that I expected them to. Why, then, do I continue to see ads seeking a strategic CIO who will report to the VP of Administration and Finance or the CFO? Sometimes ads are slightly better: CIOs report to the Chief Operating Officer. Those conducting the recruitment will sagely say: 'The CIO will have complete empowerment and access to all cabinet members and the president.' However, these organizations appear to lack an understanding of the role of the CIO and the CFO.

            By definition a CIO's role spans all aspects of an organization. Why, then, should the CIO report to a single business vertical?..."

            When IT Doesn't Choose Applications
            Information Week, May 13th, 2013
            "Business applications are the apex predator of the IT world. All the servers, storage, routers and switches, virtualization software, databases and middleware in enterprise IT organizations exist to deploy applications to knowledge workers.

            Until recently, corporate IT has been responsible for delivering the meat to feed the application beast. Now, a shift is changing the traditional IT role and the impact is only going to get more radical. Non-IT professionals -- managers of other business functions and other knowledge workers in general -- are buying their own software and apps and services. Even when they're not the actual buyers, it is pretty clear their influence over the business application purchase is growing. Recent research from ESG indicates that as many as 42% of knowledge workers either influence, sign off on, or outright make purchase decisions for business applications..."

              Making drawings with Oracle hardware components
              Kemer Thompson writes, "For those of you who like to (or need to) create architectural drawings with reasonable renditions of components and all the requisite connections, you are probably already aware of Microsoft Visio, or for those of you who prefer Macs (such as myself), Omnigraffle Pro. Did you know that we have an open repository with a growing selection of components on VisioCafe? We just updated this Tuesday night, adding stencils of Oracle's new SPARC T5 and SPARC M5 servers. You will find them in the zip bundle Oracle-Servers.

              We have also added Visio templates for Oracle's Exadata Database Machines. In case you didn't know the difference between stencils and templates, templates provide a more powerful (and efficient) representation that allows you to reorganize the racks to match your actual configuration..."

              IT - DR
              Another Active Hurricane Season Expected in 2013
              Risk Management, May 13th, 2013
              "With the start of the Atlantic hurricane season only two weeks away, experts across the board are predicting another active season. Today, released its findings calling for 16 named tropical storms, eight hurricanes and four major hurricanes. They expect three hurricanes to make landfall in the United States. These numbers are all slight increases over the average numbers recorded by NOAA from 1981-2010 and are comparable to last year's activity..."
                The Ten Commandments of Disaster Recovery
                CIO Insight, May 13th, 2013
                "How much can a flawed disaster recovery and business continuity plan cost you? Try an average of $90,000 for every hour of downtime among corporations, according to Strategic Research. Whether we're talking a hurricane, flood, terrorism or simply a loss of power, CIOs must consider every worst-case scenario and come up with a comprehensive failover and response strategy. In fact, the survival rate for companies without a disaster recovery plan is less than 10 percent..."

                • Thou Shalt Analyze Single Points of Failure
                • Thou Shalt Keep Updated Notification Trees
                • Thou Shalt Remain Aware of Current Events
                • Thou Shalt Consider Every Possible Disruption
                • Thou Shalt Document the Recovery Process
                • Thou Shalt Centralize Information.
                • Thou Shalt Create Test Plans and Scripts.
                • Thou Shalt Retest Regularly
                • Thou Shalt Perform Comprehensive Recovery and Business Continuity Testing.
                • Thou Shalt Define Metrics and Distribute 'Scores.'

                Read on for details.

                IT - PM
                12 Ways to Create Successful Teams
                Baseline, May 13th, 2013
                "Are you and your tech team members out of sync? Perhaps it's the classic "right hand doesn't know what the left hand is doing" trap. Or maybe a colleague or two has an agenda that conflicts with the greater mission of the group or your enterprise. Unfortunately, these issues surface all the time at companies. However, a section of the book 9 Powerful Practices of Really Great Teams (Career Press/available now) provides an in-depth perspective on how teams can incorporate norms that set best-practices guidelines and policies to ensure that all individual team members are working for the good of the whole..."

                • Who's the Boss?
                • Depth Chart
                • Team Assignments
                • Set Agenda
                • Steady Pace
                • Confrontational Position
                • Contact List
                • Potential Red Flags
                • Action Plan
                • Acknowledged and Honored
                • Change Management
                • Review Process

                Read on for details.

                IT - Networks
                Bringing Networking and Security Together Through Network Automation
                Help Net Security, May 13th, 2013
                "The past ten years have seen a proliferation of increasingly complex network devices. Coupled with the recent rise in adoption of BYOD policies, mobile working practices, virtualisation and cloud services, the challenges faced by the modern network - from provisioning and configuring, to handling the mounting numbers of day-to-day requests – are greater than ever before.

                For example, years ago, a new service request required a hole to be punched in a single firewall. But, today's multi-layer approach means that ACLs and rule changes not only affect firewalls, but also integrated routers and switches. When multiple vendors are thrown into the mix, the challenges rapidly start to skyrocket..."

                The Role of Startups in the SDN Networking Revolution
                Network World, May 13th, 2013
                "In the past few years, the technology landscape has changed, making it possible for a new generation of startups to innovate and challenge the incumbents. Thanks to Moore's Law, cheap, commodity processors from Intel have caught up in performance to specialized networking processors. Adding to this, virtualization tools have transformed the data center by allowing software to run in a distributed, elastic manner. With the combination of cheap, powerful processors and a framework for virtualized cloud computing, networking functionality that used to be implemented in hardware can now be written in software and distributed across many x86 processors in a data center..."
                What's Next for Data Centers: Virtualization and SDN Take Over
                GCN, May 13th, 2013
                "Someone working in data centers 30 years ago wouldn't recognize them today, and likely the next 30 years will see just as many changes. But what will those changes be?

                Doug Bourgeois, chief cloud executive for VMware's U.S. Public Sector division and former director of the Interior Department's National Business Center, sees an overall shift to software-defined data centers, more use of big data and end-user computing..."

                IT - Operations
                Five Steps for Improved Performance Management
                CIO Insight, May 15th, 2013
                "To maximize returns on IT investments, it is critical for CIOs and IT leaders to manage the performance of current IT assets in the organization's portfolio. Therefore, they must possess the answers to questions such as: What IT assets does the organization own? Which IT systems and projects are mission critical? What is the cost to manage these assets? How extensively are these assets utilized across the company? How is the overall IT portfolio performing vs. company objectives and common best practices? Answers to these and other core questions will help define the direction that the organization takes to optimize the value of its IT portfolio..."

                • Define Performance Metrics and Baselines.
                • Assemble IT Asset Inventory.
                • Analyze Portfolio Performance.
                • Draft Action Items
                • Automate Performance Management Process.

                Read on for details.

                Six Simple Steps to Enterprise Risk Management
                Information Management, May 13th, 2013
                "Enterprise risk management is a scalable, holistic approach to improved decision-making that consolidates and organizes risk information from across an organization. No longer limited to a risk manager's monthly report, ERM is becoming a fundamental part of business success. By embracing ERM and creating a risk management culture, organizations can drive business performance, innovation and growth, while protecting company reputation and shareholder value. For many businesses, demonstrating that they have a clear, auditable risk management process has become a critical factor in winning new business..."

                • Identify your risks
                • Analyze your risks
                • Control your risks
                • Monitor your risks
                • Improve your risk management
                • Report on your progress

                Read on for details.

                Seven Ways to Cut Data Center Costs
                CIO Insight, May 15th, 2013
                "If CIOs are looking to reduce expenses in a big way, they may want to schedule a visit to their data centers—even if they may not like what they see. Indeed, these facilities consume enough energy worldwide to power 30 nuclear power plants or every single home in Italy, according to research from Green House Data..."

                • Misallocated Resources
                • Virtual World
                • Bring the Heat
                • It's the Humidity
                • Automatic Response
                • What's the Frequency?
                • Software Support

                Read on for details.

                  10 Best (and Worst) IT Offshoring Options for English Proficiency
                  IT World, May 13th, 2013
                  "There's some good news for CIOs who struggle with communication and language issues offshore -- and sometimes onshore as well. Global business English proficiency, on average, has increased during the past year, according to tests given to global employees in 78 countries.

                  GlobalEnglish, a Brisbane, Calif.-based provider of on-demand English language instruction to customers including Deloitte, Unisys, and Procter & Gamble, analyzed the test results of 212,883 non-native English professionals to create its annual Business English Index (BEI) rating the English proficiency of countries and industries on a scale from 1 to 10..."

                    IT - Security
                    3 Big Mistakes in Incident Response
                    Dark Reading, May 13th, 2013
                    "An incident response specialist investigating a recent breach of a government services firm was convinced the attack he was investigating was the handiwork of a group of Chinese hackers. The type of malware he found was commonly associated with that group of attackers, so he concentrated his efforts on cleanup and analysis of the malware, ultimately missing the real danger: The attackers had abandoned the malware and had since commandeered the victim company's administrative tools..."
                      Companies, Government Unprepared for New Wave of Cybersabotage
                      CSO Online, May 13th, 2013
                      "A new wave of cyberattacks reportedly aimed at industrial control systems comes at a time when private companies and government are still struggling to protect the nation's critical infrastructure, experts say.

                      The New York Times reported on Sunday that the attacks were aimed mostly at U.S. energy companies. Rather than looking for intellectual property or sensitive information, the hackers were using probes to look for ways to seize control of processing plants.

                      While government officials did not know if the attacks were state-sponsored, the origin appeared to be somewhere in the Middle East..."

                      Former DuPont Security Chief: Safeguarding Data Is a Daily Struggle
                      CRN, May 13th, 2013
                      "Two-factor authentication and tighter controls around intellectual property are the only ways to safeguard a company's critical assets, according to a longtime security expert.

                      Larry Brock, former chief information security officer at DuPont, saw the organization grow and struggle to keep pace with the evolving security landscape. Over his three decades at DuPont, Brock, a former National Security Agency official, helped roll out stronger authentication and gain control over data spread out over multiple business units and across disparate systems..."

                      Human Sensors: How Encouraging User Reporting Strengthens Security
                      Help Net Security, May 13th, 2013
                      "Despite the pervasiveness of cyber-attacks threatening the enterprise security today, many organizations are still not taking advantage of their most widely deployed security asset: people.

                      Adversaries, including cyber criminals, nation-states, and hacktivists, are actively targeting employees, and by not encouraging users to report suspicious emails, organizations are missing a huge opportunity to gather vital information about threats. Developing a formal process for users to report suspicious emails provides real-time threat information, and allows for improved response and mitigation activities. Still, many organizations resist encouraging user response..."

                      Is An Emphasis On Compliance Hampering IT Security?
                      Federal Computer Week, May 13th, 2013
                      "Leo Scanlon, chief information security officer of the National Archives and Records Administration, has an information security question for federal CIOs: 'Are you satisfied that where you are is good enough? Do you understand the risk?'

                      Too often, he says, federal C-level officials do not know if their security is adequate because they do not understand the risks they face and what the risk tolerance of their agencies should be. And too often, they are content to remain that way..."

                      Know Your Pen Tester: The Novice
                      Dark Reading, May 13th, 2013
                      "Penetration testers put their pants on just like the rest of us, one leg at a time. Except once their pants are on, they break into computers. Not all pen testers, however, are created equal.

                      Whether you're hiring someone for your security team or you're engaging a consulting firm to conduct a third-party assessment, it's valuable to know how to gauge your pen tester's level of expertise..."

                      Seven Steps to Hinder Hackers: Antivirus Just Isn't Enough
                      IT Business Edge, May 13th, 2013
                      "When hackers broke in to the New York Times' network, evaded its antivirus software and began plundering its computer systems, it highlighted a rather uncomfortable truth: Antivirus software is not that good at keeping systems secure.

                      That means that any company that relies on an antivirus package to secure its endpoints is exposing itself to a huge security risk. 'To some extent the problem is the fault of the security industry who have been selling these products,' says Graham Cluley, a senior technical consultant at antivirus vendor Sophos..."

                      • antivirus software
                      • personal firewall
                      • encryption
                      • update management software
                      • DLP software
                      • password manager
                      • training

                      Read on for details.

                      View from Inside Verizon's Security SWAT Team
                      Network World, May 13th, 2013
                      "Bryan Sartin is director of Verizon's RISK Team, the communications provider's computer forensics practice, which is also the group that helps create the annual Data Breach Investigations Report (DBIR). Network World Editor in Chief John Dix caught up with Sartin to learn more about the RISK Team, get his take on the state of enterprise security, and discuss new findings from the recently published DBIR report.&#8232;.."
                      Websites Should Consider Tougher ID Verification Policies
                      Internet Evolution, May 13th, 2013
                      "The apartment and house sharing service, Airbnb, now requires members to verify their identities by demonstrating a presence on the web, and by either scanning a government ID or entering detailed personal details. Other enterprises should take a close look at Airbnb's verification policies.

                      Airbnb has good reasons for these more stringent verification procedures. The service, which started in the United States and now is available in numerous countries around the world, enables members, called hosts, to rent their accommodations -- apartments, houses, cottages, villas -- by the day, week, or month to guests. Sometimes the host rents just a couch in the living room, with the host sleeping in the bedroom. Sometimes the rental is a spare bedroom or an entire unoccupied apartment or house..."

                        IT - Careers
                        Ten Professional Networking Mistakes to Avoid
                        Business 2 Community, May 14th, 2013
                        "Do you find yourself going to one professional networking event after another, only to get very little out of your efforts? Sure, your e-rolodex now contains dozens or even hundreds of contacts that you'd never have otherwise. But if you fail to keep these connections active and productive, you'll reap few rewards from them. With this in mind, we present the following 10 classic mistakes of professional networking that focus on the quantity of your relationships, rather than the quality..."

                        • Quality, Not Quantity
                        • Big Net
                        • Dressing Down
                        • Desperation Situation
                        • Going Off Script
                        • It's All About Me
                        • The Know-It-All
                        • No Follow Through
                        • Mr./Ms. Needy
                        • Thankless Task
                        • Two-Way Street
                        • Classic Mistakes: Losing Touch

                        Read on for details.

                          True Work-Life Balance? It.s a Myth We Need to Quit Worrying About
                          TLNT, May 14th, 2013
                          "As a Baby Boomer teen born to Depression-era parents, I never heard that term once.

                          It didn't exist back then and, if it had, it would have never come out of my father's mouth. Hard work was his life, and when he had a day off, he worked. To my dad and those who were his age and older, balance was something you did to your checkbook when the statement arrived.

                          It wasn't until the late 1980s when this three-word term entered the American lexicon, and it wasn't popularized until the late 1990s. Now, those three words are said in conjunction as frequently as pass the salt..."

                            Weird Reasons Not To Hire Someone
                            Information Week, May 13th, 2013
                            "Wanted: network administrator. Must have five years of experience and powerful handwriting. Must be blood type O and a Capricorn. Low-slanting foreheads preferred. Scorpios and people with hat sizes larger than 7.5 need not apply."

                            "You're unlikely to see that exact post on Monster or LinkedIn soon, but companies are doing some crazy things when hiring folks. And big-data isn't reversing this trend. In fact, it might make things worse.

                            There are companies in China and Australia that refuse to hire those born under certain zodiac signs, according to this Yahoo report..."

                              IT - Social Media
                              Managing Mobile, Cloud and Social Media Security
                              Baseline, May 13th, 2013
                              "Organizations are dealing with three IT megatrends that show no signs of slowing: the move to cloud computing, rapid growth of mobile devices and applications in the workplace, and the emergence of social media in the corporate environment.

                              Each of these areas offers huge opportunities for benefits, including enhanced collaboration, increased productivity, more efficient operations and improved customer services. And each creates unique security threats, which, if not addressed, can lead to serious problems for organizations..."

                              IT - Email
                              FBI/IC3: Impersonation, Intimidation and Scams, Yep that.s the Internet
                              Network World, May 14th, 2013
                              "The FBI and Internet Crime Complaint Center (IC3) issued their annual look at the state of the dark side of the Internet which is indeed thriving with all manner of scams and intimation tactics being used by criminals.

                              While complaints filed with the IC3 are down slightly through 2012 over 2011 (289,874 v. 314,246, respectively), losses from online scams are up over 8% topping out at over $525 million through the same time period.

                              The most common complaints received in 2012 included FBI impersonation e-mail scams, various intimidation crimes, and scams that used computer scareware to extort money from Internet users..."

                                Internet Security and the Future of the Password
                                Business 2 Community, May 13th, 2013
                                "At any given time and across any given news site it's clear to see that the internet landscape is changing; sometimes for better and sometimes for the worst. More often than not we see news story after news story of accounts and businesses that have fallen victim to hacks and malicious users accessing private data for ulterior motives. In order to better combat these attacks, the minds at Google have been hard at work formulating new ways that people will access information that has previously required a password to access..."
                                IT - Backup
                                If Files Were Bricks, You'd Change Your Backup Strategy
                                ComputerWorld, May 13th, 2013
                                "If somebody asked you to do the exact same work over and over again, would you think that was a smart thing to do? Of course not. But that's exactly what many of us are doing in our backup environments.

                                There are a lot of technology approaches to backup, and all of them have to deal with ever increasing amounts of data. But they are not all equally smart. In fact, when you look at them a certain way they can be downright stupid. And while 'Dumb and Dumber' may have been quite popular as a movie, it shouldn't serve as an approach to backup..."

                                  IT - Big Data
                                  A Very Short History of Big Data
                                  Forbes, May 13th, 2012
                                  "The story of how data became big starts many years before the current buzz around big data. Already seventy years ago we encounter the first attempts to quantify the growth rate in the volume of data or what has popularly been known as the 'information explosion' (a term first used in 1941, according to the Oxford English Dictionary). The following are the major milestones in the history of sizing data volumes plus other 'firsts' in the evolution of the idea of 'big data' and observations pertaining to data or information explosion..."
                                  Big Data Fail: Five Principles to Save Your BI Butt
                                  CIO Insight, May 14th, 2013
                                  "Much of the great promise of business intelligence (BI) goes unrealized because decision makers aren't using the decision support systems in any meaningful way. The vast majority of big data and business analytics projects implemented by normal companies suffer from chronic underuse. Big data. Magical business analytics. Such topics are all the rage these days.

                                  I hate to be the one pointing out the fact that the emperor has no clothes (well, not really, I kinda like that role actually). But the fact of the matter is that the vast majority of big data and magical business analytics projects fail. Not in a great big system-won't-work way, but in a more insidious and hidden way. They fail because the users don't use them..."

                                  Do you Really Need to Embrace Analytics?
                                  Information Management, May 13th, 2013
                                  "If you have not witnessed the deluge of big data and business analytics media coverage to date, then welcome back from the coma you were apparently in for the last couple of years. For the rest of you, perhaps you have the same nagging question that I have: Are big data and business analytics such a big deal that if our organization is late to the party in deploying them, we will never catch up to our competitors?..."
                                  Why RAID Is Dead for Big Storage
                                  Storage Newsletter, May 14th, 2013
                                  "Data is exploding, growing 10X every five years. In 2008, IDC projected that over 800EB of digital content existed in the world and that by 2020 that number is projected to grow to over 35,000EB. What's fueling the growth? Unstructured digital content.

                                  Over 90% of all new data created in the next five years will be unstructured digital content, namely video, audio and image objects. The storage, archive and backup of large numbers of digital content objects is quickly creating demands for multi-petabytes TBs storage systems..."

                                  IT - Mobile
                                  BYOD Policy: Employee Right to Social Media Privacy Is Paramount
                                  CIO, May 13th, 2013
                                  "If your company lets employees bring their own devices for work purposes, you'd better have a formal BYOD policy -- one that understands employee privacy rights and employer access rights.

                                  Such policies are often crafted by legal experts for good reason. Violations of certain rights can land companies in hot water. Management consulting firm Janco Associates has created a 14-page BYOD policy template covering everything from help and support to disaster recovery to access control..."

                                  Top Ten Articles for last few Issues
                                  Vol 183 Issues 1 and 2; Vol 182 Issues 1, 2, 3 and 4 ; Vol 181 Issues 3 and 4
                                  We track how frequently each article is viewed on the web site to determine which the readers consider the most important. For last week, the top 10 articles were:

                                  Top Ten Articles for Vol 183 Issue 2

                                  • How to Build A Cloud for Family and Friends Using Oracle Solaris 11
                                  • Achieving Unmatched Value and Performance from Oracle's T5 Servers: The Real Story
                                  • Oracle Linux
                                  • Oracle Secure Global Desktop 5.0 Supports iPad
                                  • Oracle Unified Directory 11gR2PS1
                                  • Java Spotlight Episode 131: Nigel Deakin on JSR 343
                                  • Best Practices For Database Consolidation On Exadata Database Machine
                                  • Big Data Gets Real-time with Oracle Fast Data
                                  • Building Consolidation Efficiency into Operations Support Systems
                                  • CSO Online Study: Threats are Outside, Risks are Inside

                                  The longer version of this article has list of top ten articles for the last 8 weeks.

                                    IT - Tape
                                    What can IT Learn about Tape from Broadcast Industry?
                                    Storage Switzerland, May 17th, 2013
                                    "The storage managers in the Media and Entertainment industry (M&E) - studios, broadcasters, internet content providers, etc, - have big data problems, including 'big data'. Tape has been part of the solution for decades, due to its unmatched density and cost per GB, and now, the Linear Tape File System (LTFS) is promising to take tape use to another level. IT organizations in other industries that are facing similar data issues may be able to learn something from this situation..."
                                    LibreOffice 4.0.3
                                    For Windows, OS X and Linux,
                                    The Document Foundation (TDF) has released LibreOffice 4.0.3, for Windows, OS X and Linux, the third minor release of LibreOffice 4.0 family. OS X Intel packages are now signed by The Document Foundation, to pass OS X Gatekeeper security without user intervention.

                                    In the meantime, another large migration to LibreOffice has been announced, as the government of Spain's autonomous region of Extremadura has just begun the switch to free software of desktop PCs and expects the majority of its 40,000 PCs to be migrated by the end of 2013. Extremadura estimates that the move to open source – including LibreOffice – will help save 30 million Euro per year.

                                    Community is growing too. After the success of the LibreOffice Impress Sprint in Germany, it is now the turn of the first LibreOffice Bay Area Meetup. It will take place on May 11, 2013 starting at 2pm in the Hacker Dojo in Mountain View, California. Bjoern Michaelsen will be there for some good Q&A, and most importantly for some hands-on work on how to get involved in the project, with Simon Phipps keynoting about 'Foundations and Empires'.

                                    Trending in
                                    Vol 235, Issue 2
                                    Trending IT Articles