News about Oracle's Solaris and Sun Hardware
System News
May 20th, 2013 — May 26th, 2013 Generate the Custom HTML Email for this Issue
System News System News for Sun Users
Volume 183, Issue 4 << Previous Issue | Next Issue >>
Sections in this issue:
click to jump to section

As The World 'Goes Software,' Oracle Has An Upside In Hardware
Mark Peters, ESG Analyst
Mark Peters is an ESG senior analyst focused on storage systems. In a recent blog post, he writes, "Late last month Oracle held its annual event for the analyst community. Ensconced with a range of my peers I was immediately struck by how few of the audience I recognized compared to other events of this type that I get to attend. I stopped to think about it and realized that the reason was simple - there was a large preponderance of the attendees that, in one way or another, were focused on software. Now, this might be one of the bigger 'duh' moments of my life and also of your reading experience. So why am I mentioning it here? Because what it demonstrates is actually the importance of other things....err, like hardware in general and storage in particular. As we know from all those Oracle ads telling us that 'x' of the top 'y' companies in any given vertical (where x and y are invariably identical numbers) use its databases, Oracle has largely won that war. The opportunities for Oracle to make significant progress in terms of market share and revenue lie in markets that it does not yet dominate..."

Read on for details and links to the blog entry.

Oracle SPARC T5--2 with Oracle Solaris 11 versus IBM Power 750 Express with AIX 7.1
Edison Group Paper
Edison Group conducted primary and secondary research and in-depth analysis to quantify cost differences between two industry leaders, Oracle and IBM. Specifically, server infrastructures based on Oracle T4-series servers with Oracle Solaris 11 or on the IBM POWER7-series servers with AIX 7.1 were evaluated. Using data from in-depth interviews of technical personnel currently involved in managing one or the other of these infrastructures, Edison has constructed a TCO model. It is based on two specific server configurations,1 and is intended to help decision-makers evaluate:

  • The solutions' acquisition costs (hardware and software licenses, support, and energy requirements);

  • Operational costs (installation, configuration, integration and testing; operations and technical support; technical services) and

  • Downtime cost.

Since the interviews were conducted, the Oracle T4 has been joined by the T5, and the IBM POWER7 by the POWER7+, the TCO model has been adjusted to take into account the different acquisition costs customers will now encounter. Operational costs and downtime costs are assumed to be unchanged and, as noted below, Edison has assumed rough parity in performance for a typical mix of enterprise applications.

Targetbase gets deeper insight and 40x faster query response with Oracle Exadata
strong creative services that drive customer engagements
Margaret Hamburger writes, "This is a great example of the evolution happening in Oracle Data Warehousing environments as customers consolidate databases into a single source of truth for their businesses with Oracle Exadata. Not only was Targetbase able to integrate large volumes of social, retail, and point-of-sale (POS) data, such as Web blogs, to drive richer and more actionable insights for their clients. They enabled real-time analytics scoring and consumer-specific text mining on large volumes of marketing-related data while achieving some great performance gains with up to 40x faster queries. Learn how Oracle Database compression features helped reduce their storage costs by 30%..."
How to go Physical to Virtual with Oracle Solaris Zones using Enterprise Manager Ops Center
By Rodney Lindner
Rodney Lindner writes, "Many customers have large collections of physical Solaris 8, 9 and 10 servers in their datacenters and they are wondering how they are going to virtualize them. This leads to a commonly asked question. Can Enterprise Manager Ops Center 12C be used to P2V (Physical to Virtual) my old servers? Ops Center does not have a single button P2V capability, but it is possible for Ops Center to deploy physical servers, LDOMs and branded zones based on flash archives(flars) that have been taken of your existing physical servers. Ops Center achieves P2V by deploying flars and leveraging its patching and automation capabilities, to make the P2V process consistent, repeatable and as cost effective as possible.

As with any virtualization project, there will be a number of things that will need to be updated as you move from a physical to a virtual environment. It is a common misconception that you can virtualize a system and change nothing about it. There are always a few things that have to be changed on an OS or process level to make it compatible with the virtualized environment. As a best practice, there are many more things that should be updated, re-allocated and redesigned as part of a virtualization project but that is a subject for another blog.

In this blog, we will be covering migrating physical servers to Oracle Solaris Zones..."

IT - Storage
Why Your Unstructured Data is a Blessing, Not a Curse
Information Management, May 20th, 2013
"If you've opened up a business magazine within the last year, you've likely read articles from big data evangelists, proclaiming that unstructured data is a problem that can sink your company's time, focus and money.

You know the oft-repeated, dire facts. Rich media data types have exploded in number and in kind. The majority of the data received or produced by your company is messy, unstructured and terribly difficult to manage. The tools that allow anyone to create video, audio and other rich file formats have outpaced the tools we use to capture, store, search and analyze that data. Your employees spend much of their day swimming in a pool of unstructured data..."

How many IOPS can a HDD, HHDD or SSD do?
StorageIOblog, May 20th, 2013
"A common question I run across is how many IOPS (IO Operations Per Second) can a storage device or system do or give.

The answer is or should be it depends.

This is the first of a two-part series looking at storage performance, and in context specifically around drive or device (e.g. mediums) characteristics across HDD, HHDD and SSD that can be found in cloud, virtual, and legacy environments. In this first part the focus is around putting some context around drive or device performance with the second part looking at some workload characteristics (e.g. benchmarks)..."

Will flash or disk drives own the future of data storage?
VentureBeat, May 20th, 2013
"'Flash or disk?' That question — whether the future of data storage would be defined by flash memory or hard drives — has been a looming battle in the storage industry for the last several years.

Hard drives, of course, remain the heart of the storage industry. Manufacturers shipped 524 million disk drives in 2012, according to iSuppli, more than ten times the 39 million flash drives that were shipped in the same period. Worldwide manufacturing capacity for drives at the end of 2012 came to around 125,000 petabytes per quarter, compared to around 10,000 petabytes per quarter for flash. By volume, hard drives are tough to beat.

But look at the growth rates, say flash advocates. Shipments will grow from 39 million units in 2012 to 83 million units in 2013. By 2016, 239 million flash drives will be shipping annually, propelled by sales of tablets, smartphones, and notebooks..."

Java Technology
Java EE 7 Webcast, June 12 and June 13, 2013
Join Oracle and 9 Million Developers to Make the Future Java
Developer productivity and application portability play a huge role in the success or failure of your business. Already the world's #1 development platform, Java is now better than ever with the release of Java EE 7. Join Oracle and participants from throughout the Java community to learn how Java EE 7 can help you:

  • Deliver HTML5 dynamic, scalable applications - Reduce response times, simplify JSON parsing, create RIA using WebSocket, and deliver high-performance RESTful services

  • Increase developer productivity - Simplify architectures, reduce boilerplate code, add more annotated POJOs, and enhance portability

  • Exceed enterprise requirements - Process batch jobs more efficiently, easily define managed concurrent tasks, and simplify application integration

Choose a convenient time-two are offered-then join Oracle and 9 million developers as we make the future Java.

Register now for the keynote address, Java Specification Request (JSR) overview sessions, and live chat with Java EE 7 experts.

Java Spotlight Episode 133: Sivakumar Thyagarajan on JSR 322: Resource Adapters/Connectors in Java EE 7@jcp
JSR 322: JavaTM EE Connector Architecture 1.6
Sivakumar Thyagarajan works in the Cloud Application Foundation group at Oracle India. He leads the Connector Specification (JSR-322 <>;) in the Java EE 7 Platform.

He has led the development of Contexts and Dependency Injection(CDI), Connectors and JMS integration modules in Project GlassFish, Sun Java System Application Server, and the J2EE SDK. He has been involved with the GlassFish project ( since inception, and has worked extensively on Java EE based distributed enterprise application design and development. He blogs at

JSR 332 show notes:

  • Connector specification's project
  • JSR-322 page on
  • Connector 1.6 code samples to get started
  • Samples for the 1.7 specification would be part of the Java EE 7 SDK to be released soon.

Read on for details.

Non-interactive zone configuration
For Solaris 11
Jeff Taylor writes, "When creating new Solaris zones, at initial boot up, the system administrator is prompted for the new hostname, network settings, etc of the new zone. I get tired of the brittle process of manually entering the initial settings and I prefer to be able to automate the process. I had previously figured out the process for Solaris 10, but I've only recently figured out the process for Solaris 11..."
Cloud Computing
How To Protect Public Cloud Using Solaris 11 Technologies
Build a secure cloud infrastructure

Orgad Kimchi writes, "When we meet with our partners, we often ask them, 'What are their main security challenges for public cloud infrastructure.? What worries them in this regard?' This is what we've gathered from our partners regarding the security challenges:

  • Protect data at rest in transit and in use using encryption
  • Prevent denial of service attacks against their infrastructure
  • Segregate network traffic between different cloud users
  • Disable hostile code (e.g.'rootkit' attacks)
  • Minimize operating system attack surface
  • Secure data deletions once we have done with our project
  • Enable strong authorization and authentication for non secure protocols

Based on these guidelines, we began to design our Oracle Developer Cloud. Our vision was to leverage Solaris 11 technologies in order to meet those security requirements..."

IT - Cloud
Cloud-Service Contracts and Data Protection: Unintended Consequences
TechRepublic, May 20th, 2013
"There are things your cloud-service (Facebook, Amazon, Google, Dropbox, etc.) contracts aren't telling you. Michael P. Kassner interviews an attorney concerned about what's not being said.

'If it's not private, it's not protected.'

When I heard Tyler Pitchford mention the above quote in his ShmooCon 2013 talk: 'The Cloud, Storms on the Horizon,' I thought he was stating the obvious. I mean duh, if it's public; of course, it's not protected. Fortunately for me, I kept watching the video, eventually learning that's not what Tyler was trying to say.

What's more, by the end of the video it became apparent that I needed to rethink how and why I use cloud services. Using cloud services could lead to significant legal implications, and ultimately, financial hardships.

If you're thinking this is yet more chastising to get everyone to read End User's License Agreements (EULA), it's not. I'm taking aim at what's not being said in EULAs and privacy policies..."

IT's New Concern: The Personal Cloud
ComputerWorld, May 20th, 2013
"Bring your own device is so 2012. The next big push in the consumerization of IT is bring your own cloud. And just as when consumer devices poured into the enterprise, many IT organizations have already responded with a list of do's and don'ts.

The standard approach has been to forbid the use of personal cloud applications for business use, by offering official alternatives -- the "use this, not that" approach -- and to carve out separate cloud storage workspaces for business documents that can be walled off, managed and audited. But personal cloud services are difficult to control, and users are adept at going around IT if the productivity tools in their personal cloud can do the job easier, faster and better. IT wants a bifurcated approach to consumer and professional cloud apps and storage. But users don't work that way anymore..."

    The Evolution of the Data Center to the Cloud
    IT Business Edge, May 20th, 2013
    "Data centers are evolving from isolated resource "islands" to interconnected pools of virtualized resources shared between multiple data center locations — effectively creating 'data centers without walls' that help businesses cut costs and maximize IT efficiency. Ciena has provided an overview of the evolution of the data center to the cloud..."
      Your Checklist Before Choosing Your "Managed Cloud Hosting" Provider
      Business 2 Community, May 22th, 2013
      "Choosing managed hosting in cloud computing can be a great peace of mind. You can put your entire focus on developing your business without worrying about the IT infrastructure and your online presence. Yet at the same time, going for a poor quality managed hosting provider means drowning both your money and reputation. This results in a set of criteria or checklist that can help an entrepreneur to which he can compare before choosing hosting for his web presence..."
      IT - CxO
      Ten Questions That Every CIO Should Ask
      CIO Insight, May 20th, 2013
      "Many bosses think of their role as 'outward looking.' Meaning, they look out of their offices and make sure that all of their employees are doing what they're supposed to be doing. But truly effective CIOs and other managers also realize there's much to be gained by looking within as self-reflection and assessment can pay great long-term dividends. The recent book, The CEO Code: Create a Great Company and Inspire People to Greatness with Practical Advice from an Experienced Executive (Career Press), introduces a series of questions to get managers thinking about the complete package of value that they're bringing to their departments and organizations..."

      • Are My Teams Empowered With Accountability and Responsibility?
      • What's My Vision of a 'Perfect Team'?"
      • How Do I Evaluate the Worth of What I Do Every Day?
      • Can My Teams Measure the Impact of What They Do Routinely?
      • How Much One-on-One Time Do I Spend With Employees?
      • Do My Teams See a Connection Between Personal Goals and the Organization's?
      • Do I Focus on Process—or Results?
      • How Do I Celebrate Team Success?
      • Do We Document Success?
      • What Values Does Team Diversity Bring to Our Department?

      Read on for details.

        As IT Pervades the Enterprise, Here Comes the Chief Procurement Officer
        Search CIO, May 20th, 2013
        "Back in 2007, Mike Wilding wanted to gain greater visibility into the paper invoices Rent-A-Center received from its more than 4,000 rent-to-own furniture and electronics stores. As senior vice president of accounting at the Texas-based chain, Wilding's chief interest was in reconciling the books, not procuring services.

        'And then we realized, if we have 4,000 locations, why do we have 4,000 carpet cleaners? Why not consolidate that spend and go to a national or regional carpet cleaner, provide them more business and get a better price?' Wilding said. 'That's when I was asked to be the chief procurement officer [CPO].'

        Chief procurement officers like Wilding are playing a more vital role in sourcing goods and services and that, experts say, is a development that directly impacts CIOs. CPOs not only require sophisticated software to do their jobs, but they also are scrutinizing the procurement of IT products and services throughout the enterprise..."

          How to Prevent IT Department Overload
          ComputerWorld, May 20th, 2013
          "Not long ago, IT consultant Mark A. Gilmore was called in to help an IT department that was struggling with project overload. 'They'd gotten this kind of attitude -- the executive vice president calls it 'Burger King Syndrome,'' he recalls. 'Their approach was, 'You can have it your way.''

          The business executives believed IT could supply whatever they wanted, whenever they wanted it. Salespeople had gotten into the habit of asking the development team to create applications within a week to fulfill promises they'd made to customers. As a result, IT employees were spending about 80% of their time reacting to crises or struggling to meet impossible deadlines.."

            How to Talk Like a CIO
            IT World, May 20th, 2013
            "How do CIOs talk, and what do they talk about? How does their manner of speaking set them apart as C-worthy material? And, perhaps the most important question of all: Can a little pussycat learn to growl and purr like a C-level lion?

            The speaker finished and waited for questions, but the room hesitated.

            'Those with the highest sexual drive are always the first to ask a question,' he said..."

              So You Want To Be A CIO? 4 Tips
              Information Week, May 20th, 2013
              "I sat on a panel at Interop two weeks ago titled "So You Want To Be A CIO." It was a stimulating conversation with a highly engaged audience. I hope some of the following tips that came out of that conversation and my many years of experience in IT are helpful in planning your own management career..."

              • Grow Your Employees
              • Know Thy First Team
              • Play Politics
              • Encourage Skunk Works

              Read on for details.

              Why the Chief Data Officer is More Vital than Ever
              Information Management, May 21st, 2013
              "Sometimes overlooked in the trends and tech in the information management space is the way careers are transformed (or merely relabeled). One such role that enterprises are attempting to get a handle on is the Chief Data Officer. Professor and industry adviser Peter Aiken estimates that only about 10 percent of CIOs 'know what they're doing' when it comes to managing data as an asset, and he's aiming to reframe data's leader in the enterprise in his new book, 'The Case of the Chief Data Officer.' recently talked with Aiken on the expectations and challenges of changing enterprise data roles, from the CDO and the CIO and beyond..."
              Measuring What Never Happened
              Federal Computer Week, May 20th, 2013
              "It's hard to measure the impact of something that never happened. But that is exactly what federal agencies and private companies must do in risk management, and in determining the return on investment in IT security.

              That challenge is something that organizations increasingly struggle with as investing in IT security becomes more commonplace, more of a requirement and more of a prominent line item in tightening budgets..."

              Why Don't Risk Management Programs Work?
              Network World, May 20th, 2013
              "When the moderator of a panel discussion at the recent RSA conference asked the audience how many thought their risk management programs were successful, only a handful raised their hands. So Network World Editor in Chief John Dix asked two of the experts on that panel to hash out in an email exchange why these programs don't tend to work.

              Alexander Hutton is director of operations risk and governance at a financial services firm (that he can't name) in the Greater Salt Lake City area, and Jack Jones is principal and Co-Founder of CXOWARE, Inc., a SaaS company that specializes in risk analysis and risk management..."

              Turning Vendors into Trusted Strategic Partners
              CIO Insight, May 20th, 2013
              "Gary Wimberly is the CIO of Express Scripts, one of the largest pharmacy benefit management organizations in the U.S. As dramatically as the company has grown, Wimberly has found that selecting better vendors and driving them to become trusted advisors has been a path toward better throughput and innovation. It also has allowed him to populate his own team with a higher concentration of subject matter experts and to lower the cost of IT across the board..."
              IT - DR
              Building an Effective Disaster Recovery Strategy
              Information Week, May 20th, 2013
              "With 24x7 connectivity and business demanding constant availability of data wherever and whenever needed, today the banking sector faces new challenges, even as customers have come to expect that their information and money are accessible at the click of a button. Going forward, these demands for instant access are only going to intensify. Meeting these ever-growing requirements can become impossible in the event of a disaster, unless a well-considered disaster recovery (DR) plan, based on flexible and highly-responsive infrastructure, is put in place..."
              IT - PM
              10 Online Tools for Managing Outsourced Projects
              Business 2 Community, May 22nd, 2013
              "The global marketplace and the Internet are responsible for some major changes to traditional office and workplace dynamics. One of the most impactful changes has been the outsourcing of office and tech jobs. Following in the footsteps of manufacturing, a good deal of tech jobs are now being performed overseas. Business projects can now be conceived, planned and executed without any of the team members meeting face to face. For the project manager, particularly those used to traditional in-office management, this can be a daunting task. How do you train, manage and reward employees that are separated by thousands of miles? ..."

              • Skype
              • Google Docs/Drive
              • YouTube
              • LiquidPlanner
              • PassPack
              • Wufoo
              • Intuit Online Payroll
              • Human Translation
              • World Clock Meeting Planner
              • Yammer

              Read on for details.

              IT - Networks
              Factors Converging to Drive 10G
              Network World, May 20th, 2013
              "The market for 10G Ethernet is poised for strong growth due to a number of factors, according to Crehan Research. Those factors include:"

              • 10G inventory reductions at major server OEMs, clearing the way for additional sales; Price reductions, stimulating end-user 10G demand;

              • Broader product offerings, including additional 10GBASE-T LAN-on-Motherboard (LOM) and quad-port 10G. First quarter 2013 10GBASE-T adapter and LOM shipments jumped 60% to approach a one-million port annual run rate;

              • The launch of Intel's 'Ivy Bridge' server platforms in the latter half of 2013, which could prompt users to upgrade their servers to 10G.

              Read on for details.

              Hybrid Cloud Networks Face Challenges, but SDN May Be the Answer
              SearchCloudProvider, May 20th, 2013
              "While the potential benefits of running IT services in the cloud are clear, there are still important challenges to overcome before the full promise of elastic clouds can be realized. The nature of these challenges varies -- affecting cloud networks, compute resources and storage -- and perhaps the most critical place they must be addressed is in hybrid cloud deployments..."
                10 Key Questions about Software-Defined Networking
                TechRepublic, May 20th, 2013
                "Software-defined networking (SDN) is a way to virtualize networks for ease of configuration and maintenance in the same way that servers and storage are being virtualized. The difference is that SDN as a network solution is not nearly as far along as virtualization in the server and storage worlds.

                Nevertheless, SDN is coming - and the more IT decision-makers and business leaders know about it, the better they'll be able to determine where and when to introduce it to their data centers. Here are 10 of the questions they're asking about SDN..."

                • What does SDN do?
                • What does it mean when people talk about SDN decoupling hardware from software?
                • Why would you want to do this?
                • What other benefits does SDN provide?
                • What is the difference between SDN and OpenFlow?
                • Will SDN provide end-to-end IT infrastructure visibility?
                • Which technology vendors have embraced SDN?
                • Why is SDN taking so long to adopt?
                • Can we afford to live without SDN indefinitely?
                • Is SDN a mature technology?

                Read on for details.

                SDN Coming ...Soon
                Network World, May 20th, 2013
                "Software defined networking was a hot topic at the recent Interop conference in Las Vegas, where enthusiasm for the emerging technology overpowered any lingering doubts.

                Bob Muglia, EVP of Juniper's Software Solutions Division, got a laugh from the audience when he opened his keynote with a movie trailer about the pending arrival of SDN. "SDN is coming," a booming voice said as dramatic images flashed by, "sometime in 2013, maybe 2014 ... or 2015." But then Muglia went on to say that Juniper is actually going to deliver its SDN controller later this year, months ahead of schedule..."

                  Why WLAN Test Tools Should Evolve Quickly -- But Likely Won't
                  SearchNetworking, May 20th, 2013
                  "As more enterprises shift their wireless LAN infrastructure from being a side feature to their primary access network, testing these environments is becoming increasingly crucial. Network design expert Peter Welcher of Chesapeake NetCraftsmen spoke to SearchNetworking about the impact of wireless LAN growth in the enterprise and what it means for network management tools and troubleshooting tactics..."
                  Is It More Useful To Jump Into Ipv6 Testing or Master IPv6 Theory?
                  SearchCloudProvider, May 20th, 2013
                  "Theory is nice, but working with IPv6 in a lab is absolutely critical. Once you sit down and see things work, you understand them better. You gain the ability to put things into context based on your own eyes and experience. It's important to keep in mind that things constantly change in an environment. IPv6 is a live protocol and, just like IPv4, it continues to evolve. Implementations also continue to get refined and innovations start to penetrate implementation..."
                  IT - Operations
                  Study Ranks US Least Riskiest Place to Open Data Center
                  PCWorld, May 22th, 2013
                  "Last year the U.S. was the least riskiest place in the world to open a data center, according to a study released this week.

                  The rankings, which were released by Cushman & Wakefield, Hurleypalmerflatt and Source8, were made after measuring risks related to physical, economic and social issues in the countries. The U.S. was followed by the U.K., Sweden and Germany, while Indonesia, India and Brazil were at the bottom of the list. The study ranked 30 countries..."

                    Tips for a Successful Data Center Relocation
                    Business 2 Community, May 22nd, 2013
                    "Can't we just pick up, move the servers, cords and equipment, and then plug them all in at our new location?

                    Unfortunately, this false impression can occur when a business first considers a data center consolidation or relocation. It sure would be nice if things were that easy, wouldn't it? Moving or consolidating a data center – whether to support a company's expansion and/or acquisitions, reduce operating costs, or for some other situation – is no small feat. Regardless of the reason, a data center relocation always involves some risk, both operational and financial..."

                      4 Questions to Ask Your IT Recycler to Ensure Environmental Compliance
                      LifeSpan, May 20th, 2013
                      "Cases of irresponsible and outright illegal practices by IT recyclers are appearing with greater frequency in the news as of late. Mountains of equipment leaching toxic chemicals into the environment have been discovered at facilities in the U.S. as well as overseas. Governments and human rights organizations are concerned about the conditions for workers at e-waste processing facilities in Asia and Africa..."

                      • Can we tour your facility?
                      • What facilities and companies handle the material downstream?
                      • What do you mean by 'free?'
                      • Which (if any) electronics recycling certifications do you have?

                      Read on for details.

                        Swedish Data Center Saves $1 Million a Year Using Seawater for Cooling
                        PCWorld, May 22th, 2013
                        "A data center in Sweden has cut its energy bills by a million dollars a year using seawater to cool its servers, though jellyfish are an occasional hazard.

                        Interxion, a collocation company in the Netherlands that rents data center space in 11 countries, uses water pumped from the Baltic Sea to cool the IT equipment at its facilities in Stockholm.

                        The energy used to cool IT equipment is one of the costliest areas of running a data center. Companies have traditionally used big, mechanical chillers, but some are turning to outside air and evaporative techniques as lower-cost alternatives..."

                          Vested IT Outsourcing Deals Avert a Catch-22
                          Information Management, May 20th, 2013
                          "A Catch-22, taken from the classic Joseph Heller novel, is a no-win situation that uses contradictory, circular logic. For instance, you need a pass to enter a particular building, but in order to get a pass you must visit an office in the same building.

                          There's something of a tangled Catch-22 in the IT outsourcing industry. It comes into play when service providers meet contractual obligations but are limited in their ability to invest in the kinds of innovations that would make their customers loyal long term. They're afraid those customers will take their ideas and bid out the work to others, so the customers end up looking elsewhere..."

                          IT - Security
                          Fighting Malware with Hardware Can Produce Better Security
                          GCN, May 20th, 2013
                          "Rather than trying to keep up with the threats posed by rapidly evolving malicious software, agencies can leverage the security features being built into hardware to ensure that computing devices are safe and remain uninfected, says Larry Hamid, chief architect for IronKey by Imation.

                          Malware has gone from being a nuisance to a serious tool for crime, espionage and possibly terrorism, Hamid said during a presentation at the FOSE conference in Washington, D.C. Responding to these developments puts defenders in a perpetual game of catch-up in which the bad actors have the advantage. Moving away from software for security solutions could help shift the advantage to defense, he said..."

                          Experts Highlight Top Data Breach Vulnerabilities
                          Help Net Security, May 22nd, 2013
                          "Hidden vulnerabilities lie in everyday activities that can expose personal information and lead to data breach, including buying gas with a credit card or wearing a pacemaker.

                          Every transaction and health record is now collected, categorized, sorted, and analyzed—and can be hacked. Microcomputers that control aspects of everyday life—from heart rhythms and insulin levels, to the operation of manufacturing plants and data centers, to the use of electricity in homes and gasoline usage in cars—are increasingly at risk for data breach and can threaten public safety.

                          Industry experts offer insights on top hidden vulnerabilities that can cause data breach:..."

                          4 Steps to Protect Your Business and Partners from Cyber Attacks
                          Yahoo! Small Business Advisor, May 20th, 2013
                          "Anyone who runs a small business has to stay on the lookout for threats to their company, such as thieves, competitors and natural disasters. With hacking and security breaches on the rise, small businesses are targeted more often than you might expect, and often with far-reaching, devastating consequences.

                          Symantec prevented more than one billion cyber attacks in early 2012. Of those, nearly 40 percent targeted small companies, according to a blog post on Small businesses often have weak defenses, therefore providing hackers with an entry point to their supply chain partners' data, too..."

                          In Current Threat Landscape, Cyber Teams Need To Go Looking for Trouble
                          GCN, May 20th, 2013
                          "Agency cybersecurity teams have not been accepted by IT shops as full partners in the job of supporting agency missions and as a result are falling farther behind in efforts to detect and block threats, said security analyst Mischel Kwon.

                          'That's our fault,' said Kwon, president of Mischel Kwon and Associates and a former government cybersecurity official.

                          Security needs to adopt a more aggressive posture, seeking out threats rather than just detecting them and working with IT departments to follow through on remediation..."

                          Large Attacks Hide More Subtle Threats in DDoS Data
                          Dark Reading, May 20th, 2013
                          "The massive avalanche of data in March that crashed down on Spamhaus, the maintainer of a number of spam blacklists, made headlines as the largest distributed denial-of-service (DDoS) attack witnessed to date.

                          Along with the ongoing campaign against financial institutions by a group of attackers calling themselves the Cyber Fighters of Izz ad-din Al Qassam, the attacks drove the bandwidth of the average DDoS to nearly 50 Gbps during the first quarter of 2013, a sevenfold increase over the past three months of 2012, according to a quarterly report by DDoS mitigation firm Prolexic..."

                            Researchers Uncover New Global Cyberespionage Operation Dubbed Safe
                            ComputerWorld, May 20th, 2013
                            "Security researchers from Trend Micro have uncovered an active cyberespionage operation that so far has compromised computers belonging to government ministries, technology companies, media outlets, academic research institutions and nongovernmental organizations from over 100 countries.

                            The operation, which Trend Micro has dubbed Safe, targets potential victims using spear phishing emails with malicious attachments. The company's researchers have investigated the operation and published a research paper with their findings.."

                            The Internet of Things Is Set to Change Security Priorities
                            ComputerWeekly, May 20th, 2013
                            "The 'internet of things' is a term not devoid of hype and hyperbole, but at its heart is a concept that is already gaining momentum.

                            Technology and telecommunications firms are linking 'things' as diverse as smartphones, cars, industrial sensors and household appliances to the internet, enabling intercommunication and autonomous machine-to-machine (M2M) data transfer.

                            The first ripples of change arrived with the widespread adoption of radio frequency identification (RFID) tags, but the true transformation has yet to occur..."

                              Too Much Infosec Regulation Undermines Security, Warns NAB
                              The Register, May 20th, 2013
                              "More prescriptive regulation of the security posture in industry sectors like banking could have the paradoxical impact of reducing security, according to Andrew Dell, head of IT security services at the National Australia Bank.

                              'We have to become much more agile and proactive – how we look at, how we react to cybercrime. Our posture is changing from 'observe and analyse' to 'detect and respond',' Dell told the 2013 Trend Micro Evolve Security Conference..."

                              Why BYOx Is the Next Big Concern of CISOs
                              Help Net Security, May 22nd, 2013
                              "Wisegate released new research from its members that demonstrate how CIOs and CISOs are working to achieve the right balance between employee productivity and information security as they face growing IT consumerization trends, such as BYOD and more recently BYOx (where x = anything from the latest mobile device to personal apps, web services, cloud storage and more.)

                              Today BYOx has become a catch-all term that encompasses a broad spectrum of technologies and services that are not managed (or in some cases even approved) by the corporate IT organization, but are being used by the workforce to get their jobs done..."

                              IT - Careers
                              4 Spring Cleaning Tips for All Your Devices
                              Business 2 Community, May 23rd, 2013
                              "It started small: You saved a document to your computer's desktop and left it there instead of filing it properly. In small businesses, disorganization tends to quickly snowball. When a third friend just happened to loan you a copy of the popular workflow manual Getting Things Done, you took the hint. After spending a week cleaning your out-of-control workspace and organizing your data and files, you feel strangely calm.

                              For small business owners, maintaining their information structure is critical. The following four spring cleaning tasks can help keep your computers in top operating condition..."

                                9 Steps to Build Your Personal Brand (and Your Career)
                                CIO, May 20th, 2013
                                "Businesses and people from every industry are competing to sell their brand in ads, commercials, on social media and everywhere else they can, and it's time that the forward-thinking people of IT got on board. Personal branding isn't a new topic. In fact, it's been around since roughly 1997 when Tom Peters coined the phrase, but as we slowly recover from the economic downturn and with the rise of new technology and an increase IT consulting, personal branding is becoming more prevalent and more important.

                                Regardless of your role in IT--whether you are a CIO, a developer or a helpdesk technician-- developing and maintaining your personal brand should be a part of your long-term career strategy.

                                A personal brand is more than just maintaining your LinkedIn profile, according to the experts. 'Good people put their head down and get caught up in their job and forget they have a whole career to manage,' says 11 Profiles in Bad Leadership Behavior..."

                                20 People Who Changed Tech: An Wang
                                Information Week, May 20th, 2013
                                "[Dr.] An Wang was a brilliant computer scientist who was a pioneer in magnetic core memory and storage, but that's not why he makes our list. Before Dr. Wang, computing was done by the High Priests. Office automation wasn't even automated. Letters and documents were done by secretaries; every manager had a secretary, and executives had two. Wang bridged the gap. He automated the office just when the number of secretaries was waning because of cost cuts and the demand for speed and accuracy was waxing because of competition..."
                                  IT - Social Media
                                  3 Signs Your Social Media Shout is a Whisper
                                  Yahoo! Small Business Advisor, May 20th, 2013
                                  "Every other week I like to remind you that you're being a social media wuss. And, by wuss, I mean you're being too much of a social media 'nice guy.' And by 'nice guy' I mean you're spending too much time worrying about what others think to the point of turning your entire social media marketing campaign into a milquetoast and pablum sandwich. You spend too much time trying to get everyone to like you. You're always afraid of stepping on toes or offending anyone. You're especially afraid of getting fired. If you're honest with yourself, that's your biggest fear: losing your job if you're an employee or losing (or alienating) your clients (or prospects) by doing something as revolutionary as having a voice, an opinion, an agenda, or a point-of-view. Heaven forbid..."
                                    Oops! The Risks of Using Social Media at Work
                                    ComputerWeekly, May 20th, 2013
                                    "Businesses are leaving themselves exposed to legal risks because they are taking a relaxed approach to social media.

                                    Recent employment tribunal cases have shown that employers can run into difficulties because their firms lack formal guidelines on social media.

                                    'The biggest mistake is not having a social media policy in place at all,' said Kathryn Dooks, partner at law firm Kemp Little, in an interview with Computer Weekly.

                                    Even when employers have policies in place, companies can run into difficulties if the wording is vague or unclear..."

                                      IT - Compliance
                                      Banking Privacy Prevails Over Copyright Enforcement, Dutch Court Rules
                                      PCWorld, May 20th, 2013
                                      "Privacy laws protecting bank account holders are more important than providing information to aid in copyright enforcement, according to a Dutch court ruling this week.

                                      The Dutch ING Bank doesn't have to reveal who has access to a bank account, the number for which is posted on the website FTD World, the Amsterdam district court ruled.

                                      FTD World, at, is a Usenet-indexing website that lists links to binary files posted on Usenet. It also provides files in the NZB format listing that allows users to download the posted files more easily. By doing this, the site provides access to copyrighted entertainment files including books, movies, music, games, and software without the permission of the copyright holders, according to Dutch anti-piracy foundation Brein..."

                                        IT - Email
                                        10 Things You May Not Know About Ethernet
                                        Network World, May 20th, 2013
                                        "Ethernet's value to networking and IT is well established over the past 40 years. But did you know that "Ethernet" refers to two slightly different ways of sending information between endpoints on a LAN? That and some other perhaps lesser known facts about this 40-year-old technology are reviewed here (also read "What's next for Ethernet?"):.."
                                          As Ethernet Turns 40, Some Seek To Take It to the Cloud
                                          PCWorld, May 23th, 2013
                                          "As Ethernet marks its 40th birthday this week, some of those celebrating will also be looking ahead to yet another use for the nearly ubiquitous technology: the cloud.

                                          On Thursday at the Ethernet Innovation Summit, which will include a commemoration of Ethernet's invention on May 22, 1973, a group of cloud vendors and users are launching the CloudEthernet Forum. It will be announced on the second day of the event in Mountain View, California, with the backing of Alcatel Lucent, Juniper Networks, Tata Communications, Citrix, and other founding members.

                                          Ethernet, originally a LAN, increasingly is also used for WANs (wide-area networks) operated by enterprises and service providers. The CloudEthernet Forum aims to make Ethernet better suited to large-scale cloud services that may operate across many data centers..."

                                          What's next for Ethernet?
                                          Network World, May 20th, 2013
                                          "Internet traffic will quadruple in five years and the number of mobile Internet connections will exceed the world's population by 2017, according to Cisco research.

                                          The number of Internet users will be a quarter billion greater this year than last and almost three times that of 2005, according to the ITU.

                                          Bandwidth requirements in data centers keep rising to accommodate the growth in users and the service levels they demand. We're seeing it now with the progression from 10G to 40G to 100G Ethernet. Soon, Gigabit Ethernet will go the way of Fast Ethernet..."

                                          IT - Mobile
                                          BYOD Means the Map is No Longer the Territory
                                          ComputerWeekly, May 20th, 2013
                                          "In the modern enterprise, the map is no longer the territory, writes Adrian Wright. The "map" in this case represents the inventory and network diagrams that used to tell IT people where all the systems and endpoints were on their network, while the "territory" represents the reality of what is actually out there and connecting in.

                                          Prior to the mobile and bring your own device BYOD explosion, the map and the territory were pretty much the same, give or take, but I believe this is no longer the case and is becoming less so every day..."

                                          Security Managers Still Don't Get Mobile Security
                                          ComputerWorld, May 20th, 2013
                                          "For the past several months, security veteran Aaron Turner has been making the rounds at industry events presenting some pretty disturbing information about the state of mobile security.

                                          Turner, a former strategist in the security division of Microsoft, should know. He's been working, researching and developing in the mobile space for years. After Microsoft, he to begin research and development at the US Department of Energy's Idaho National Laboratory. For two years, Turner worked on, and eventually patented, a cell phone-based payment and identification system which became the basis for his start-up, RFinity..."

                                          Embrace BYOD and Manage the Risks
                                          ComputerWeekly, May 20th, 2013
                                          "Everyone wants to have the latest technology and the coolest device. Consequently, we are breaking our corporate perimeter, and we will keep doing that, bringing disruption in what once was the preserve of the business: information technology.

                                          This is the era of consumerisation, with devices that are as capable and powerful as – or even more powerful than – the computers in the office.

                                          We are witnessing an era in which information is stored almost everywhere..."

                                            Which Workers Are the Best Fit for BYOD?
                                            CIO, May 20th, 2013
                                            "What kinds of workers should be allowed to use their smartphones and tablets on the job, in a growing trend called "Bring Your Own Device," or BYOD? Opposing sides are forming about two distinct groups: hourly workers and salespeople.

                                            For hourly workers, BYOD promises great productivity gains and significant cost savings, particularly for entry level employees who don't qualify for corporate-issued devices..."

                                            Managing the Mobile Enterprise
                                            ComputerWeekly, May 20th, 2013
                                            "Mobile working has brought new challenges for IT departments, but the fundamentals of managing them remain the same.

                                            Many new technologies appear to be completely different and disruptive to the status quo, suggesting they need to be considered and managed in an entirely new way; but as reality bites, it turns out that the fundamentals of management change very little..."

                                            IT - Big Data
                                            5 Keys to Getting Big Data under Control
                                            GCN, May 20th, 2013
                                            "Agencies will face a lot of challenges with forthcoming big data projects, but one of them will not be generating enough data. In fact, consulting firm Gartner Inc. recently reported that enterprise data growth rates now average 40 percent to 60 percent annually.

                                            At the Commerce Department - parent agency for some of the government's biggest data producers, including the National Weather Service and the National Oceanic and Atmospheric Administration - those numbers might even be low..."

                                            Big Data Investigations: Opportunity and Risk
                                            CSO Online, May 20th, 2013
                                            "British Telecom had a problem: The company was suffering an ongoing series of security breaches -- the physical, not cyber, kind. Thieves were stealing the company's underground copper cable.

                                            Obviously, for a service provider like BT, the problem was not just about the cost of replacing the cable. It was also about customer relations. 'It was damaging the brand,' said Bryan Fite, BT's U.S. and Canada security & mobility portfolio manager, noting that every time there was a theft, customers lost service. A report in The Register said metal theft was costing taxpayers 700 million pounds per year..."

                                            How to Replace a Dead HiPPO
                                            Big Data Republic, May 20th, 2013
                                            "The days of the Highest Paid Person's Opinion (HiPPo) will be numbered when big data grips business. But dead HiPPOs will make a mess on the career path. If experience is out and analysis in, will companies need to rip up the rulebook for recruitment and development?

                                            One animal stands in the way of progress: the HiPPO. While data promises to take companies forward with decisions based on evidence, the blubbery body of business makes its choices by deferring to the Highest Paid Person's Opinion. Hence, HiPPOs have become the demons of big data conference speakers..."

                                            Pondering a Big Data Philosophy
                                            Information Management, May 20th, 2013
                                            "In my post 'On Philosophy, Science, and Data,' I explained that though some argue philosophy only reigns in the absence of data while science reigns in the analysis of data, a conceptual bridge still remains between analysis and insight, the crossing of which is itself a philosophical exercise.

                                            Therefore, I argued that an endless oscillation persists between science and philosophy, which is why, despite the fact that all we hear about is the need for data scientists, there's also a need for data philosophers..."

                                              Securing Hadoop Data: 10 Best Practices
                                              eWeek, May 20th, 2013
                                              "Storing data in Hadoop has become a common practice in IT these days. However, there are some concerns about securing sensitive data in Hadoop. Dataguise, a maker of data security intelligence and protection solutions, has provided us with 10 security best practices for organizations considering or implementing Hadoop. By following these procedures to provide privacy risk, data and security management, enterprises can prevent costly exposure of sensitive data, reduce their risk profile and better adhere to compliance mandates..."

                                              • Start Your Hadoop Planning Early
                                              • Consider Privacy Concerns
                                              • Check for Exposure
                                              • Be Aware of Sensitive Data
                                              • Real or Desensitized?
                                              • Support the Relevant Techniques
                                              • Be Consistent Across the Board
                                              • Tailored or Off the Rack?
                                              • Make Sure Everything Fits
                                              • Make Decryption Available

                                              Read on for details.

                                              Seven Ways Banks Can Leverage a 'Security Data Scientist'
                                              Bank Systems and Technology, May 20th, 2013
                                              "Security executives are stepping in line and forming their own strategies, approaches, and use cases to achieve that new competitive edge. CISO's are conquering this frontier by reducing risk and fraud, whether it stems from cyber data loss or questionable customer transactions.

                                              In general, businesses have made progress in laying the foundations for the required technical data-mart infrastructure and the organization structure to support big data security initiatives. And yet, there is much work to be done in other component areas of the complex journey of building the successful security program..."

                                              • Blueprint the program
                                              • Define Use Cases
                                              • Understand the current implementation level
                                              • Merge business and security data
                                              • Identify long range technologies
                                              • Identify skills and expertise
                                              • Sponsorship

                                              Read on for details.

                                              The Rise of the Dataviz Expert
                                              ComputerWorld, May 23th, 2013
                                              "A picture's worth a million data points. That's the mantra, anyway, in business analytics these days.

                                              As the big data trend intensifies and analytics become more ingrained in corporations, the need for people who can present data in easily intelligible ways is rising. Last fall, Gartner predicted that there would be 4.4 million big data jobs by 2015, many requiring new, nontraditional skills like data visualization.

                                              But what exactly is data visualization? Who exactly is doing this visualizing, and how is it different from creating a colorful graph or an interesting infographic?..."

                                              What You Need to Succeed with Big Data
                                              Enterprise Efficiency, May 20th, 2013
                                              "When it comes to big-data, everyone wants in, so it is no surprise that some companies are flocking to launch big-data projects before they figure out how it actually makes a material difference to their business.

                                              Often, when these companies turn their attention to big-data, much of the emphasis is typically on the big in big-data -- how much data can be collected, and which technologies may be employed to manage that data? In the mad rush to design Hadoop clusters, evaluate NoSQL databases, and deploy leading-edge business analytics, it is far too easy to overlook the essential element of success -- building a data-driven culture..."

                                              When It Comes to Big Data, Do the Benefits Outweigh the Risks?
                                              Wall Street and Technology, May 21st, 2013
                                              "The term "big data" seems to be everywhere these days. You even see it in discussions about science, government, and mathematics, just to name a few. But one area where big data is making a difference is in the financial services sector where the profit and loss pendulum can swing in a matter of seconds.

                                              So why all the fuss about big data? First let's start with defining what the term actually means. .."

                                              Top Ten Articles for last few Issues
                                              Vol 183 Issues 1, 2 and 3; Vol 182 Issues 1, 2, 3 and 4 ; Vol 181 Issue 4
                                              We track how frequently each article is viewed on the web site to determine which the readers consider the most important. For last week, the top 10 articles were:

                                              • Sun Microsystems' stars: Where are they now?
                                              • 10 Certifications that Actually Mean Something
                                              • Making drawings with Oracle hardware components
                                              • The Great Java Application Server Debate: GlassFish
                                              • Evaluating Oracle Linux From Inside Oracle VM VirtualBox
                                              • E-Book Oracle's SPARC Systems: What Customers Say
                                              • Oracle Solaris 11 and PCI DSS
                                              • Java Spotlight Episode 132: Shing Wai Chan on JSR 340 Servlet 3.1
                                              • illumos and the 2013 Google Summer of Code
                                              • Delivering Cloud Services to the State of Texas

                                              The longer version of this article has list of top ten articles for the last 8 weeks.

                                                Apache OpenOffice: One Year, 50 Million Downloads
                                                Apache OpenOffice was formerly called
                                                Recently, in a blog on, it was noted that "yesterday we reached the 50 million download mark for Apache OpenOffice 3.4. This milestone occurred within a few days of the first anniversary of the release of Apache OpenOffice 3.4., on May 8th, 2012.

                                                Apache OpenOffice (formerly called is the leading free and open source office application suite for Windows, Mac and Linux. Version 1.0 of OpenOffice was released 11 years ago, in May 2002.

                                                Although we're all very busy now with the testing of our next major release, Apache OpenOffice 4.0, it is worth taking a few minutes to explore some of the trends that can be discerned from our download data over the past year. The information we have gathered, relative to desktop OS versions, 64-bit Linux use, screen aspect ratios, etc., may be of special interest to other open source projects to consider in their planning..."

                                                Instant NetBeans IDE How-To
                                                Book by Atul Palandurkar
                                                "Instant NetBeans IDE How-To" is for Java developers or anyone who has basic knowledge of Java but has not had much experience with IDEs; you can use this book to rapidly develop Java applications. NetBeans is an open source IDE which is known as a powerful IDE for Java application development. It allows you to write and generate smart code, and utilize drag-and-drop tools. NetBeans gives complete flexibility with full support to developers for all the latest technologies.

                                                Instant NetBeans IDE How-To is a complete practical, hands-on guide that provides you with a number of clear step-by-step recipes, which will help you take advantage of the real power of Java technologies, and give you a good grounding in using it for your projects.

                                                The book shows you how to develop desktop applications, web applications, enterprise applications, mobile applications, and how to deploy applications. It also takes a look at databases, validations, etc. If you want to develop a Java application with just a few clicks and write less code, then this is the book for you.

                                                Unified Directory Goes Virtual: IdM R2 PS1
                                                Lower operating cost by consolidating directory silos
                                                Naresh Persaud writes, "Oracle Unified Directory has set the bar for performance. Built ground up to provide elastic scale, Oracle Unified Directory (OUD) is inter-operable with all directories in the Oracle Directory Services Suite.

                                                With the Patchset 1 release OUD now combines the capabilities of Oracle Virtual Directory. With a combined directory, organizations can lower operating cost by consolidating directory silos using a single directory server. Instead of having multiple infrastructures and separate administrators, a unified solution can provide better administrative ratios and economies of scale..."

                                                Trending in
                                                Vol 234, Issue 3
                                                Trending IT Articles