News about Oracle's Solaris and Sun Hardware
System News
Jun 3rd, 2013 — Jun 9th, 2013 Generate the Custom HTML Email for this Issue
System News System News for Sun Users
Volume 184, Issue 1 << Previous Issue | Next Issue >>
Sections in this issue:
click to jump to section

Overview of Oracle's 5 SPARC CPUs
SPARC64-VII+ (M3), T3, T4, T5, M5, M10
Karoly Vegh writes, "Do you know how many SPARC CPU types does Oracle deliver currently? Not one, not two, but five. The SPARC64-VII+, the T4, T5, M5 and M10. It isn't easy to keep track of these, hence we created an overview table to help you in that - here you are: .."

The table shows, for the T3 and the other 5 SPARC CPUs:

  • Servers which feature the CPU
  • CPU Core Codename
  • CPU Frequency
  • # core per socket
  • Min RAM, sockets, threads per server
  • Max RAM, sockets, threads per server (32TB/64 Sockets/2028 threads!)
  • L3 Cache
  • Virtualization
  • CPU architecture (ISA)
  • OS Supported
  • noteworthy features

Karoly notes, "All the 6 of these CPUs have been released after Oracle taking over Sun..."

IT - Storage
No one ever got fired for buying enterprise storage, right?
By Martin Glassborow
Martin Glassborow writes in El Reg, "The concept of enterprise storage - kit sold by large companies who charge very high margins for providing hardware and support services - is more or less done.

Sound like a rash statement to you? I'll explain what I mean. Pretty much all the functionality that you might expect to be put into a storage array has been done and the previous differentiating features are now provided by pretty much every vendor..."

    Is All Thin Provisioning The Same?
    Storage-Switzerland, June 4, 2013
    "Thin provisioning is a storage allocation process that improves the write efficiency of a storage system by enabling it to consume less capacity for storing a given amount of data. It is becoming an increasingly popular, almost commonplace, feature available on a wide variety of arrays. The tendency in the fast paced world of IT is to assume that these systems all present thin provisioning the same way. In reality these offerings are NOT the same and in fact their differences may significantly impact how storage managers are able to take advantage of this technology..."
      Overcoming the Challenges With SSD Reliability
      Storage-Switzerland, June 3, 2013
      "Articles posted on the Storage Switzerland web site that focus on SSD Reliability are consistently among the top read articles on our site. Clearly there is concern about using the technology in the enterprise and IT planners want to know more about what the problems are related to. The payoff for understanding and effectively working around these issues is increased performance; something that every data center, regardless of size, ultimately needs.

      SSD reliability is a bit of a misnomer. The focus instead, should be on SSD durability. Reliability implies that an SSD will fail shortly after being installed in a storage system. While SSDs can certainly fail out of the box, the chances of that are no greater than hard disk drives failing out of the box. Durability means that somewhere down the road, say 2 to 3 years, the SSD will fail..."

      How to Overcome Flash-Based Storage Limitations to Ensure Efficiency
      Search Storage, June 4, 3013
      "In spite of what you may have heard, flash-based storage -- whether you're talking about memory chip-laden PCI Express cards aimed at servers, 2.5-inch disk form-factor solid-state drives for insertion into server or storage system drive bays, or all-flash storage arrays and appliances -- isn't a panacea. It's a useful technology with a number of specific applications, but, as some of my friends in the South are fond of saying, 'It don't fix stupid.'"
      Parsing Through the Software-Defined Storage Hype
      Search SDN, June 3, 2013
      "With all the hype around software defined storage (SDS), it can be hard to tell which of the many technology vendors claiming the term clearly fall into this category. But experts agree that true SDS technologies share a central goal -- the emergence of a non-proprietary system that is software-driven and enables automated, flexible provisioning of storage resources.

      Essentially, SDS is emerging as an ecosystem of products that decouples software from underlying storage networking hardware..."

        The Critical Need for Data Disposal
        NetworkComputing June 3, 2013
        "With so much stored data having no business value, enterprises need to tackle the challenge of reducing the data mountain.

        Did you know that 69% of all data stored by enterprises has no value? That is, it is data that serves no useful purpose--none, zilch--yet continues to cost IT a bundle in storage resources. This has important implications to IT and enterprises that we need to explore..."

          Tiering Storage: Best Practices to Promote Efficiency
          Search Storage, June 4, 2013
          "A recent article in Forbes extensively quotes a study by Forester Research to identify four widely used techniques -- tiering storage, data retirement, compression and storage virtualization -- for "storage capacity growth containment."

          Technically, tiered storage has nothing whatsoever to do with capacity growth containment. It's a strategy for data movement intended to primarily free space on more expensive and higher-performing storage by moving less frequently accessed data to less expensive and lower-performing storage over time..."

            IT - Technology
            Fave Raves: 25 IT Pros Name Their Favorite Products
            Network World, June 6, 2013
            "It's not always easy to impress IT pros with new technology, but these hardware, software and cloud products managed to do it. The common thread? Gear that saves time or money, increases productivity or tightens security..."

            • CounterACT
            • Veeam Backup & Replication
            • POQ
            • Riverbed Steelhead
            • A10 Networks AX 1030
            • Plixner Scrutinizer
            • Nasuni storage infrastrucure as a service
            • TIBCO Spotfire
            • Enterproid Divide
            • SysAid ITSM

            Read on for details of these products and recommendtions from many other IT pros.

            The Top Technologies the CIA Thinks Are Hot
            Network World, June 5, 2013
            "Through the Central Intelligence Agency's investment firm In-Q-Tel (IQT), here's what the intelligence gathering group is putting your tax dollars to work for now -- though the actual investment amount is secret..."

            • Cleversafe
            • Contour Energy Systems
            • Cloudant
            • Connectify
            • D-Wave Systems
            • 10gen
            • Apigee
            • Adapx
            • Adaptive Computing
            • Cloudera

            Read on for details of those firms and many more.

              Instant Automated Installer Zone for Oracle Solaris 11.1
              By Larry Wake
              Larry Wake writes, "One of the biggest differences between Oracle Solaris 11 and previous releases is how provisioning tasks are handled. It's safe to say that just about any installation or update function you can think of has gotten at least an order of magnitude faster, easier, safer, smarter and more powerful -- but still, there's that word "different" ... .

              The key new provisioning technology, as you may already know, is the Image Packaging System (IPS). It's the framework for installation, maintenance and removal of software on an Oracle Solaris 11 system. Another key technology is the Automated Installer (AI), which replaces JumpStart for hands-free installation of large numbers of systems.

              We've just introduced something new to make it easier to start working with AI..."

              MySQL (5th Edition) - By Paul DuBois
              The definitive guide to using, programming and administering MySQL 5.5 and MySQL 5.6
              MySQL provides a comprehensive guide to effectively using and administering the MySQL database management system (DBMS).

              Author Paul DuBois describes everything from the basics of getting information into a database and formulating queries, to using MySQL with PHP or Perl to generate dynamic web pages, to writing your own programs that access MySQL databases, to administering MySQL servers. The book also includes a comprehensive reference section providing detailed information on MySQL's structure, language, syntax, and APIs.

              The fifth edition of this bestselling book has been meticulously revised and updated to thoroughly cover the latest features and capabilities of MySQL 5.5, as well as to add new coverage of features introduced with MySQL 5.6.

              MySQL is an open source relational database management system (DBMS) that has experienced a phenomenal growth in popularity and use. Known for its speed and ease of use, MySQL has proven itself to be particularly well-suited for developing database-backed websites and applications. MySQL runs on anything from modest hardware all the way up to enterprise servers, and its performance rivals any database system put up against it.

              Cloud Computing
              From Hybrid cars to Hybrid Clouds - it's great to have choice
              By Ayalla Goldschmidt
              "Having the flexibility to share data across Private and Public Clouds in a Hybrid Cloud model allows you to enjoy the best of both worlds. It allows you to set your desired design points around key dimensions, " notes Ayalla Goldschmidt, including:

              • Security
              • Quality of Service
              • IT skills
              • Cost model

              Ayalla continues, "These are just a few considerations that come into play, the point is, there is no right or wrong answer. And even within your company, the decision may change, depending on the application, the team in place and other factors..."

              IT - Cloud
              5 Tips for Avoiding Private Cloud Failures
              Network World, June 3, 2013
              "According to Piston Cloud Computing's CTO, the rate at which his customer's pilot projects turn into production private clouds is pretty typical of most OpenStack-based providers - and it's pretty low. 'Roughly for every 20 pilot projects we open up, we see one of them make it into production,' says Josh McKenty, who prior to founding the San Francisco-based Piston, worked at NASA and served as a technical lead on the project that evolved into OpenStack, one of three open source infrastructure as a service (IaaS) platforms vying for enterprise attention. So why do the other 19 drop off?..."
              6 Tips to Mapping Out Cloud Migrations
              GCN, June 5, 2013
              "It seems like you can't swing your arms nowadays without hitting some company in the process of moving at least part of their IT resources to the cloud. But aside from satisfying customers' high-tech fashion needs (OK, there's that cost thing, too!), such moves also require a great deal of planning, as well as technical expertise. Rackspace Hosting has come up with a list of things that definitely belong on your to-do list when planning such a move. CRN has taken a few liberties with Rackspace's advice, based on the ongoing feedback we hear from the channel:"

              • Expect Delays
              • Deep Dive On Your App
              • Test Apps Before And After
              • Know The Compliance Issues
              • Prepare For A Hasty Retreat
              • Fully Leverage The API

              Read on for details.

                Breaking Down the Value of a Cloud Service-Level Agreement
                Search Cloud Storage, June 4, 2013
                "A cloud service-level agreement is typically the part of a contract where the service is carefully defined and the metrics for measuring and reporting adherence to agreed-upon service definitions are spelled out.

                Within the context of storage, a service-level agreement (SLA) may be defined for services provided by a vendor to the IT organization (maintenance and support, for example); services provided by the IT shop to its "customers" (availability and uptime); or for services provided by an outsourcing agent to the business or IT organization (such as storage clouds). In the vendor-consumer relationship, the real purpose of an SLA is to mollify consumer concerns about the potential for bad outcomes, usually by specifying harsh and punitive remedies for sub-par performance by the service provider..."

                Cloud Computing SLA Failures: Preparing for the Aftermath
                Search Cloud Provider, May 31, 2013
                "The fine print in service-level agreements (SLAs) exists for reasons beyond placating corporate legal counsel. Aggressive guarantees around availability, reliability and performance can help providers attract customers, but what happens when things go awry and a provider fails to meet the terms of its cloud computing SLA?

                Cloud providers may find that making high-reaching promises around service delivery is the easy part; following up when things go bad is where it gets tricky..."

                How to Build a Private Cloud
                Network World, June 3, 2013
                "A private cloud looks and acts like a public cloud, giving your corporation all the speed, agility and cost savings promised by cloud technology, only it's single-tenant, and that tenant is you, right? Well, that's the goal, but it's not quite the reality yet for most enterprises.

                The definition of enterprise private cloud currently exists on a continuum. This lack of commonly defined ground is proving to be a bit of a stumbling block to achieving the velocity and dexterity promised by private cloud vendors inside traditional IT settings..."

                  The Cloud, Simplified
                  FCW, May 31, 2013
                  "In recent years, cloud computing has gone from buzzword to product-label used by virtually every IT vendor that does business with the federal government. And according to David Cearley, tech visionary and futurist at Gartner, that might not be a good thing.

                  "Can you think of a vendor who doesn't have something labeled 'cloud?'" Cearley asked an audience at the Federal Cloud Computing Summit on May 30..."

                  What Will Be the Role of Tape In a Cloud-Based World?
                  Search Data Backup, May 31, 2013
                  "Although the role of tape in traditional backup operations might be diminishing, it still has a place in long-term data retention and even cloud storage services.

                  According to the Enterprise Strategy Group's Trends in Data Protection Modernization, tape is in use in 56% of data protection strategies today. That represents a lot of tape users, suggesting tape is far from dead as some have declared. If you look at archiving solutions (not to be confused with long-term retention during backup), the use of tape would be even higher..."

                  Why the Public Cloud Is Driving IT Pros Crazy
                  Baseline, May 30, 2013
                  "IT professionals are getting anxious about cloud sprawl, according to a recent survey from PMG. So what exactly is that? PMG defines cloud sprawl as "a situation created by the rapidly increasing use of public cloud services and applications, such as file-sharing services, by employees or business units within a company, often without permission from the IT department." Such practices are leading to concerns about security, compliance and other operations-impacting areas, and technology professionals and managers say they're now willing to pull the plug on various unauthorized activities once they discover them..."

                  • Bad Karma
                  • Cloud Usages Causing Concern
                  • Concerns About Unauthorized Cloud Apps
                  • Executive Action
                  • Cloud Services IT Limits or Prevents
                  • Viable Alternative
                  • Why IT Prefers the Hybrid Cloud
                  • Purchase Plan
                  • Moving Forward
                  • Which TV Character Best Represents IT Qualities?

                  Read on for details.

                  IT - CxO
                  Ten Considerations for CIOs Seeking to Insource
                  CIO Insight, May 31, 2013
                  "Many organizations are now looking to transition outsourced assets and functions to an in-house model. CIOs, of course, are frequently in the loop here because many of these initiatives involve IT. So why are companies making this move?... Pace Harmon has come up with the following 10 top considerations for an insourcing business case:"

                  • Total Cost of Ownership
                  • Contractual Obligations
                  • Technical Complexities
                  • Schedule Logistics
                  • Technology Infrastructure
                  • Space Concerns
                  • Staff Recruitment and Retention
                  • HR Resources
                  • Transformation Readiness
                  • Process Maturity

                  Read on for details.

                  5 Ways IT Can Improve Customer Satisfaction
                  ComputerWorld, May 30, 2013
                  "As an IT guy at heart, when people ask me for my top tips to improving customer service, they're always surprised to hear how simple and automate-able they are. So often, IT managers layer technology upon technology to solve problems, but, at the end of the day, you can't have happy customers if the technology you provide was never informed by the fundamentals of what they want and how they want it.

                  • Know your customer
                  • Knowledge management
                  • Do-it-yourself intelligence
                  • Crystal clear service level agreements (SLA)
                  • Risk mitigation via CMDB

                  Read on for details.

                  6 Ways Effective Listening Can Make You a Better Leader
                  Forbes, May 20, 2013
                  "When leaders judge, they expose their immaturity and inability to embrace differences. These leaders may enjoy a long track record of success in one company, but often find it difficult to make the successful transition into a new company.

                  Leaders must not grow complacent. The 21st century leader must embrace new ideas and ideals. They must be more active listeners, constantly learning and adapting to change:"

                  • Show That You Care
                  • Engage Yourself
                  • Be Empathetic
                  • Don't Judge Others
                  • Be Expansively Mindful
                  • Don't Interrupt

                  Read on for details.

                    8 IT Hiring Trends You Can't Ignore
                    InformationWeek, June 3, 2013
                    "The job market, like any market, is not a static beast. It's subject to trends, disruptions, and ups and downs like any other marketplace. You can't manage your current job search -- or your career in general -- with the exact same strategies you used, say, five years ago... We asked IT recruiter Paul DeBettignies, head of Minnesota Headhunter, for his take on some of the top hiring trends on both sides of the interview table:"

                    • Social Media Profiles Aren't A Fad
                    • Resumes: Not Going Away, But No Longer The Calling Card
                    • Look Within First
                    • Learn The Language Of Business
                    • Meet With Prospective Employers Even If You're Not Job Hunting
                    • Prioritize Skills In The Job Description
                    • Develop "Talent Pools:
                    • "Too Busy" To Recruit? Prepare For Mediocre (Or No) Talent

                    Read on for details.

                      10 Questions to Ask Before Planning for the Future IT Organization
                      InformationWeek, June 6, 2013
                      "Executives agree that the old IT organization is on its way out. What's less clear is what the next generation of enterprise IT will look like, but stale assumptions about future operating environments or available technologies won't bring them any closer to the answer. Use these 10 questions to explore what all possible futures could mean for a completely re-designed IT department..."

                      • Why will IT matter to my company?
                      • What would our IT organization look like if we could rebuild it from scratch?
                      • How will our IT executives and other executives share and approve IT decisions?
                      • How do you get all available data anywhere it's needed?
                      • Are we winning or losing the fight for information security?
                      • What kinds of cloud services will dominate?
                      • How urgently must we accommodate consumer technologies?
                      • Which IT skills will we need to succeed, and where will we need them?
                      • Where will IT talent come from?
                      • How will our spending priorities change?

                      Read on for details.

                      CMOs Set To Spend More On New Tech than CIOs
                      Business 2 Community, June 6, 2013
                      "Executives and business users from all industries are embracing social, mobile and cloud technologies to enhance their day-to-day operations. Marketing technology specifically has experienced tremendous growth and innovation due to social media, mobile device usage and Web 2.0. Within the next five years according to Gartner, marketing will see CMOs spending more on new digital technology than CIOs.

                      As IT capabilities become more accessible to business users, marketing departments have shown they are ready and willing to adapt. What could be better than a real-time case study or demographic analysis tool? Marketing analysis from a logistical point of view is centrally about assessing data regarding the people who keep a business profitable..."

                      Despite Uncertainties, 46% of IT Employees Are Looking
                      ComputerWorld, June 6, 2013
                      "The percentage of IT employees interested in getting a new job is rising, even as they lose confidence in the economic outlook, new survey data shows.

                      Randstad Technologies, a staffing and recruiting firm, found that 46% of technology workers are likely to look for a new job this year, an independent survey taken in the first quarter found. In the quarter a year ago it was at 41%.

                      One sign of trouble among IT employees concerns 'discretionary effort,' or the extra effort above what workers are required to put into their jobs. Discretionary effort, which is measured in surveys by consulting firm CEB, has declined from last year's high point..."

                        How to Get Executive Involvement
                        Information Management, May 1, 2010
                        "While the need for an executive steering committee is widely recognized, I've seen great resistance to establishing this committee at numerous companies. Proceeding without executive support entails a great risk, but companies struggle with how to garner the needed involvement. Ideally, several executives will volunteer to serve on a steering committee and to provide visible support on an ongoing basis. In the absence of volunteerism, what options can the business intelligence director pursue to gather executive support?..."
                          Irving Wladawsky-Berger's Insights on Technology
                          Baseline, May 31, 2013
                          "Few IT industry executives boast a resume as impressive as Irving Wladawsky-Berger. After spending 37 years at IBM—where he was responsible for identifying emerging technologies and marketplace developments critical to the IT industry—the Cuban born engineer (who came to the United States at age 15) has worked on cloud, Internet, e-business and supercomputing initiatives for IBM and served as a strategic advisor to Citigroup since 2008. He is also a regular contributor to the Wall Street Journal and a visiting lecturer at MIT's Sloan School of Management and Engineering Systems Division..."
                          Rules for Radical CIOs
                          InformationWeek, June 3, 2013
                          "I'm obviously not the only activist who turned to the dark side, but I might be the only one who unashamedly believes that the right way to transform "too big to fail" is to infuse its culture with a little Alinsky, from the inside.

                          Here are the first five of Alinky's Rules for Radicals, changed slightly to apply to competitors and the business of technology. I'll cover rules six through 13 in the next installment of this column:"

                          • Power isn't only what you have, but also what your competitors think you have.
                          • Never go outside the experience of your people.
                          • Wherever possible, go outside the experience of your competitors.
                          • Make your competitors live up to their own book of rules.
                          • Ridicule is a company's most potent weapon.

                          Read on for details.

                            Top Killers of Office Productivity
                            Baseline, May 31, 2013
                            "Despite indications that telecommuting is gaining steam, the traditional office setting remains alive and well, according to a recent 'Office Workplace Productivity' study from Actually, a majority of professionals say they thrive best in a classic office setting, as opposed to home. However, the usual-suspect list of workplace distractions—such as noisy co-workers and relentless meeting sessions -- is keeping employees from focusing on their work:"

                            • Noisy Neighbors
                            • Process Fixation
                            • Lesser Evils
                            • What Constitutes "Unpleasant"?
                            • Solo Effort
                            • Office Space
                            • Open Space
                            • Male Bonding
                            • Fixed Location

                            Read on for details.

                              Why IT Departments Won't Exist In Five Years
                              IT World, June 5, 2013
                              "Consumerization of IT and self-service trends will lead to a restructuring of the today's IT shop, leaving behind a hybrid model consisting of tech consultants and integrators.

                              "The business itself will be the IT department. [Technologists] will simply be the enabler," said Brandon Porco, chief technologist & solutions architect at Northrop Grumman.

                              Porco was part of a four-person panel of technologists who answered audience questions during a town hall-style meeting at the CITE Conference and Expo here this week.

                              Among concerns raised is whether IT is losing control as consumer technology becomes part and parcel of everyone's work in the enterprise, and the data center is left behind..."

                                Do You Really Need Real-Time Data?
                                Big Data Republic, May 28, 2013
                                "Real-time. It sounds so compelling, so important, so current, so... real! Of course you want real-time data in your data warehouse. Right?

                                As with so many things, it really depends upon the application and the need. For example, if you're conveying medical monitoring data to a physician so he can diagnose a patient's current condition, then, yes, absolutely you need real-time data. Even if you're checking on inventory availability at point-of-sale you want the data returned to be real-time. Perhaps not as dire as the medical example, unless of course you're the customer looking for the item...."

                                Cerf Sees a Problem: Today's Digital Data Could Be Gone Tomorrow
                                ComputerWorld, June 4, 2013
                                "One of the computer scientists who turned on the Internet in 1983, Vinton Cerf, is concerned that much of the data created since then, and for years still to come, will be lost to time.

                                Cerf warned that digital things created today -- spreadsheets, documents, presentations as well as mountains of scientific data -- won't be readable in the years and centuries ahead..."

                                  Is Data Fragmentation Putting Businesses At Risk?
                                  HelpNet Security, June 6, 2013
                                  "IT managers believe that fragmentation of corporate data across their IT infrastructure and an emerging 'Shadow IT' network of user devices or consumer cloud services outside their control, is putting their organizations at risk and driving up costs.

                                  New research from Freeform Dynamics shows over 80% of respondents believe effective business decision making is hampered by data availability and inconsistency issues. 83% are concerned about the security of their corporate data as it is increasingly dispersed across their network and outside..."

                                  An Evolving View of Outsourcing
                                  CIO Insight, June 4, 2013
                                  "Only a few years ago, businesses couldn't get enough of offshoring and outsourcing. India, China, Costa Rica, the Philippines…Wherever there was a chance to save a few bucks, companies were there.

                                  But, alas, the concept of sending labor and tasks overseas hit a few snags. For one thing, wages in these countries spiked as American and European companies stampeded in. This is a function of basic economics, and it was entirely predictable. For another, service levels often lagged and dissatisfied customers frequently complained. As a result, many businesses have recently pulled the plug and brought operations back to the U.S. The list includes NCR Corp., The Coleman Co., Ford Motor and Peerless Industries..."

                                  IT - DR
                                  When disaster strikes, will federal data be safe?
                                  GCN, June 4, 2013
                                  "Federal agencies are grappling with an unprecedented growth in data at the same time that backup solutions are nearing capacity, a situation that could hamper efforts to recover data in the event of an emergency.

                                  Moreover, agency officials are not testing their disaster recovery solutions as often as they should, raising questions about their preparedness for a natural disaster or man-made incident, according to a survey of 150 federal defense and civilian IT managers in a new MeriTalk report..."

                                  IT - PM
                                  4 Project Management Lessons Learned from The Celebrity Apprentice Season Finale
                                  Accelerating IT Success, May 31, 2013
                                  "Reality TV is all too often a genre of television that has nothing to do with real life. But in the case of The Celebrity Apprentice on NBC, where good project management means the difference between winning and losing, there really is a kernel of truth to be dug out of the spectacle. In the recent season finale, it came down to Penn Jillette of Penn & Teller fame versus Grammy-nominated country music artist Trace Adkins in a task where the winner would receive $250,000 for his selected charity. Both contestants faced challenges in the final task that they dealt with in smart ways, and the result was an episode of reality television where, yes, you could actually stand to learn something..."
                                  Experiments with Project and Portfolio Management: A CIO Perspective
                                  InformationWeek, May 31, 2013
                                  "I was once given an opportunity by an international airlines company to help them with reduction of cycle time for their projects. The airlines used to run more than 500+ IT projects at any point in time and it was difficult for them to accurately identify the opportunities for improvement. It was a daunting task and I knew at the back of my mind that it is mostly executioners in any organization who are better people to tell what improvements are needed.

                                  Every improvement must have an existing baseline. Every correction requires us to work on precision and accuracy but if I have to choose between the two, I will start with precision and move to accuracy..."

                                  IT - Networks
                                  How can you maximize the ROI for IPv6 training?
                                  Search Cloud Provider, May 31, 2013
                                  "When it comes to maximizing the return on investment (ROI) for IPv6 training, I'm a firm believer in doing the right training for the right people at the right time. If you just take a bunch of employees from an organization and put them in a set of classes at random, they could forget what they learned by the time they get the chance to use or apply the knowledge. It's important, therefore, to maintain perspective. Put a plan in place that gives you an idea of when these employees are going to start to come into play..."
                                  One Year after World IPv6 Launch, Number of IPv6-Connected Internet Users Doubles
                                  Dark Reading, June 4, 2013
                                  "The number of IPv6-connected users has doubled since World IPv6 Launch began on June 6, 2012, when thousands of Internet service providers (ISPs), home networking equipment manufacturers, and Web companies around the world came together to permanently enable the next generation of Internet Protocol (IPv6) for their products and services. This marks the third straight year IPv6 use on the global Internet has doubled. If current trends continue, more than half of Internet users around the world will be IPv6-connected in less than 6 years..."
                                  IT - Operations
                                  Is This What Future Data Centers Will Look Like?
                                  Network World, June 6, 2013
                                  "A few years ago LexisNexis, a supplier of legal resources for lawyers around the country, needed to expand its West Coast presence. In the past, the way that Terry Williams would have handled such a task as vice president of managed technology solutions for the company would be to find a collocation provider, rent out some space, then buy servers and configure them. Even though a collocation facility provides the power, cooling and building infrastructure, Williams says it still take months to configure the system just the right way. Then, if changes are needed, either more space needs to be rented out or the system has to be reconfigured.

                                  There had to be a better way, Williams thought..."

                                  IT - Security
                                  Hacking Firmware and Detecting Backdoors
                                  Dark Reading, May 30, 2013
                                  "As the major software vendors have worked diligently over the past decade to harden their operating systems, and critical flaws have become much harder to uncover, many hackers have been pursuing lower-hanging fruit on the vulnerability tree.

                                  One of the perpetually lower-hanging fruits has been the firmware updates for practically any physical device (consumer or industrial) that contains some kind of processing capability and options for increasing functionality over time.

                                  For as long as I can remember, hackers have been pulling apart firmware and hunting for bugs..."

                                    9 Tips, Tricks and Must-Haves for Security Awareness Programs
                                    Network World, June 3, 2013
                                    "What are the essential ingredients for making a security awareness program successful? Check out these 9 tips from CSO contributors on how to make awareness work in your organization:"

                                    • Metrics
                                    • Flexibility
                                    • Some allowance of rule breaking
                                    • A challenging new approach
                                    • C-Level support
                                    • Partnering with key departments
                                    • Creativity
                                    • An effective time frame
                                    • A multimedia approach

                                    Read on for details.

                                    Enterprises Sitting On Security Time Bomb as Office Workers Compromise Company Data
                                    Dark Reading, May 30, 2013
                                    "Companies are at serious risk of data security breaches as 38% of U.S. office workers admit to storing work documents on personal cloud tools and services. The nationwide survey of 2,000 office workers carried out for Huddle by Ipsos MORI revealed that almost a fifth (16 percent) of people use Dropbox to store work documents, while Google Drive and Apple iCloud came in second and third place with 15% and 12% respectively. With 91% of workers also stating that they use personal devices to store, share, access or work on company documentation, organizations are at risk of losing data and intellectual property forever as it becomes fragmented across multiple devices and cloud services..."
                                    Could the Sequester Make Us Smarter About Security?
                                    FCW, May 30, 2013
                                    "We are nearly three months into sequestration, and the world -- or even the U.S. government -- has not ground to a screeching halt. By the same token, all the talk about the cuts shocking elected leaders to their senses and prompting an agreement to negate them seems to have died down as well.

                                    That doesn't mean the cuts have not been deep, though. It doesn't mean that many employees -- both government workers and contractors -- will not lose their jobs or that new programs and initiatives are not being canceled or delayed. But nor does it mean IT leaders are relieved of the responsibility of securing our IT assets and managing our risk at acceptable levels..."

                                      Four Ways SMBs Can Improve Security through Cloud
                                      Dark Reading, May 31, 2013
                                      "Small and midsize businesses (SMBs) have major problems dealing with their information technology: Rarely does a small business have an employee dedicated to IT and, when it does, the person has little time to pay attention to security.

                                      Yet the security of SMBs has become a mounting concern. While attackers are increasingly focusing on small businesses, only 10 percent of businesses with 250 employees or less have a full-time IT administrator, according to a 2012 study conducted by Symantec and the National Cyber Security Alliance. The study found that nearly 70 percent of companies did not even have an informal Internet security policy or provided their employees with security training..."

                                      Rogue Employees, Malware Exploits and Unauthorized Software
                                      HelpNet Security, June 7, 2013
                                      "While IT security professionals recognize the threat posed by unwitting employees, many still admit to allowing administrative privileges to go unmanaged, making organizations increasingly vulnerable to malware exploits and unauthorized software, according to Avecto.

                                      The study, conducted at Infosecurity Europe in London, UK, surveyed more than 500 decision-making information security professionals. It reveals the extent to which organizations allow employees full control over their desktops, without implementing adequate controls to defend against accidental or deliberate misuse of privileges..."

                                      Is Security Professional Development Too Expensive?
                                      Dark Reading, June 5, 2013
                                      "Paid trainings and certificates serve vital role, but open-source-style security education offerings could make the entire security education field more complete and affordable...

                                      As the security industry continues to grapple with a shortage in skilled professionals, particularly within very specific niches like application security, the state of security professional development continues to keep the industry locked up in a number of hotly contested debates. Beyond the most obvious argument over the value of security certifications, some security pundits have stepped up to argue about a more fundamental impediment to rising the tide for all boats in the industry: the cost of paid training..."

                                      Do Your Employees Choose Data Protection or Productivity?
                                      CSO Online, May 31, 2013
                                      "Imagine this situation.

                                      It's the day before an important presentation at a large corporation's annual global earnings conference. In the airport, the national sales manager receives last minute feedback and begins to edit the document on a laptop when a stranger takes the next seat. The presentation, which contains proprietary information on important company financials, is now in plain sight of wandering eyes. The national sales manager is faced with a critical decision: continue working to finish the changes or stop altogether to safeguard the company data...."

                                        What to Ask Your Penetration Tester
                                        Dark Reading, June 5, 2013
                                        "Reviewing the results of a penetration test and discussing methodology is another way to assess the skill level of your pen tester (and the overall quality of the penetration test). What this means is that by asking a few simple questions and evaluating the quality of his or her responses, you can get a good read of his or her abilities. It doesn't mean that if a pen tester fails to break into your system that he or she is a novice. Even the best testers run into targets that are secure..."
                                          IT - Careers
                                          20 Historic Tech Sounds You May Have Forgotten
                                          ComputerWorld, May 31, 203
                                          "From the hum of an old car's engine to the galunk! of a fictional plumber's fireball, sounds have an amazing ability to transport us back in time.

                                          Outside of our minds, however, sounds have a far less reliable lifespan -- especially within the realm of technology. As electronics evolve, so do the sounds that go with it -- and many of the dings, beeps, and hisses burned into our brains will hold no emotional connection to the teens of tomorrow. Some are already meaningless to today's 20-somethings.

                                          So crank up your speakers and get ready to mutter incomprehensible insults about "those darn kids these days." Here are 20 memorable tech sounds that are well on their way to being forgotten...

                                          • The floppy disk anthem
                                          • The modem's music
                                          • The Windows serenade
                                          • The mail man's call
                                          • The Nokia boogie
                                          • The busy signal ballad
                                          • The dot matrix jam
                                          • The slide projector shuffle
                                          • The TV sign-off song

                                          .. Read on for details.

                                          Becoming a Computer Forensic Examiner
                                          HelpNet Security, May 31, 2013
                                          "Since the advent of affordable personal computers, digital devices, and later the Internet, these technologies have been used for both legal and illegal purposes, and in order to collect evidence to help prosecute some of the people engaged in the latter, a new science had to be born: digital forensics.

                                          One of the branches of digital forensic science is computer forensics, which deals with legal evidence that can be extracted from computers and digital storage media..."

                                            Does IT eat its young?
                                            TechRepublic, May 27, 2013
                                            "Sometimes IT is less than welcoming to new blood. Is your IT department willing to destroy its future in order to maintain its current all-stars?

                                            In nature, several species routinely eat their young for various reasons, ranging from scarcity of food resources to eliminating future competition for mates. While this behavior has been recorded in humans in various cultures, it's currently manifested metaphorically in several fields where senior personnel obstruct, sabotage, or make life generally difficult for new entrants to the field. In response to one of my recent articles about IT's 'woman problem,' several readers emailed that whether they agreed or not with IT having a problem with the fairer sex, there was obstructionist behavior toward new entrants..."

                                              How to Hold a Meeting That Won't Waste Everyone's Time
                                              TLNT, May 31, 2013
                                              "Nowhere in the business arena does the absolutely necessary collide with the potentially wasteful more often than in meetings.

                                              Few terms have given American workers more reason to shudder, with the possible exception of 'downsizing' -- and at least that's over quickly.

                                              All kidding aside, meetings remain more necessary than not. While you can diminish their frequency by taking advantage of technology and informal chats, you can't eliminate them entirely. Even so, you don't want to waste your time when you can avoid it..."

                                                IT Job Interviews: 8 Tips to Avoid Disaster
                                                InformationWeek, May 31, 2013
                                                "So you scored an interview for that job you want. Congratulations. Now don't screw it up.

                                                Not quite the words of encouragement you were looking for? IT pros with sought-after skills sometimes need a gentle -- or not-so-gentle -- reminder about job interview skills, according to Paul DeBettignes, head of the IT recruiting firm Minnesota Headhunter... He shared his top do's and don'ts for IT pros hoping to ace their next interview:"

                                                • Do: Your Homework
                                                • Don't: Be Creepy
                                                • Do: Ask Questions, Rather Than Just Answering Them
                                                • Do Not: Dress For The Beach
                                                • Do: Discuss Past Projects And Skills
                                                • Do Not: Be Late
                                                • Do: Be Comfortable Talking Money
                                                • Do Not: Leave Your Phone On

                                                Read on for details.

                                                  Ten Certifications That Actually Mean Something
                                                  IT Business Edge, May 31, 2013
                                                  "What gives meaning to a certification? Is it the certification vendor? Is it the subject? Or is it the perceived difficulty, mystique or aura? Or might it be something totally different? ... Global Knowledge instructor Randy Muller, MCT, MCTS, MCSE, CEH, has identified a list of certifications that do have perceived value and worth:"

                                                  • Project Management Professional (PMP)
                                                  • Certified Information Systems Security Professional (CISSP)
                                                  • VMware Certified Professional (VCP)
                                                  • ITIL V3 Foundation
                                                  • MCITP Database Administrator 2008
                                                  • Cisco Certified Internetwork Expert (CCIE)
                                                  • Red Hat Certified Architect
                                                  • Microsoft Certified Master (MCM)
                                                  • Certified Information Security Manage (CISM)
                                                  • GIAC Security Expert (GSE)

                                                  Read on for details.

                                                  IT - Social Media
                                                  3 Reasons Why Criminals Exploit Social Networks (and Tips to Avoid Getting Scammed)
                                                  CSO Online, June 5, 2013
                                                  "William Pelgrin of the Center for Internet Security explains why cybercriminals view social media as the perfect venue for finding victims, and offers smart advice to consider before your next tweet, post or click ...

                                                  The popularity and influence of social media continues to increase at lightning speed, and recent events bear evidence to the impact — both positive and negative —this medium presents. As the tragedy of the Boston Marathon bombing unfolded, millions of people turned to social media for information, and government officials and law enforcement used it to keep the public informed and solicit their help.

                                                  The criminals were also using that same power of social media, but for very different purposes..."

                                                  The Social Network Wars Are Over. The Winner: Email!
                                                  ComputerWorld, June 1, 2013
                                                  "Email is old and in decline. Chat, texting and social networks are how people interact now, right?

                                                  Well, not so fast.

                                                  With every new social network and social service, with every new instant and not-so-instant way to communicate, email rises in importance. The reason is that with everybody choosing a different communications medium, email is increasingly the only one we all have in common. It's the glue that holds the social Web together..."

                                                    IT - Email
                                                    A Perspective on IP Traffic Growth
                                                    Network World, June 3, 2013
                                                    "IT professionals, perhaps more than anyone, have a sense of just how fast things are changing in this information-driven world. But Cisco's latest Visual Networking Index, an ongoing study of global IP traffic, adds perspective that may influence some of your thinking when it comes to long-range capacity planning.

                                                    Cisco says 'global IP traffic will pass the zettabyte threshold [a zettabyte is a billion terabytes] by the end of 2015, and will reach 1.4 zettabyes per year by 2017.'

                                                    That by itself is remarkable, but even more so when viewed in historical context. Cisco offers the chart below..."

                                                    • 1992: 100 Gb/day
                                                    • 1997: 100 Gb/hour
                                                    • 2003: 100 Gb/Sec
                                                    • 2007: 2,000 Gb/Sec
                                                    • 2012: 12,000 Gb/Sec
                                                    • 2017: 35,000 Gb/Sec

                                                    Read on for details.

                                                    Cybersecurity's Best Bet: An Internet That Learns To Defend Itself
                                                    GCN, May 30, 2013
                                                    "During the first 40 years of the Internet, security has been about patching mistakes that have been made in its architecture and software and defending these vulnerabilities against attacks from the outside. The future will be about creating an environment that is secure by design and has the ability to anticipate rather than merely respond to threats, government and industry experts say.

                                                    This will not be a single secure infrastructure, but an ecosystem of technologies designed to better handle the basic chores of systems development; identity management and access control; and monitoring, analysis and response..."

                                                    Ten Things You Should Know About WebRTC
                                                    CIO Insight, June 5, 2013
                                                    "Don't you think it would be great if you could engage with customers, employees, and partners accessing voice, video and data-sharing apps on a Web browser without any plug-ins? Thanks to developments with WebRTC technology, this is becoming a reality. To lend greater insight into this topic, Constellation Research Inc. has come out with a recent report, Ten Things CIOs Should Know about WebRTC..."

                                                    • Moving Target
                                                    • Direct Action
                                                    • Bottom-Line Performance
                                                    • 360-Degree View
                                                    • Custom Made
                                                    • Premature Obit
                                                    • Could Microsoft Block WebRTC?
                                                    • What About Mobility?
                                                    • Future Mobility Benefits
                                                    • Getting IT staffers familiar with WebRTC

                                                    Read on for details.

                                                    Integration Matters -- Oracle ZFS Has it, NetApp FAS Doesn't
                                                    Webcast:June 20
                                                    In this webcast, Marc Staimer of Dragon Slayer Consulting discusses with Oracle storage executives how Oracle's Sun ZFS Storage Appliance uniquely delivers "Application Integration" - and, how NetApp doesn't. We'll look specifically at the innovative features and functionality that you can use to compare Sun ZFS Storage to NetApp filers, and the benefits you can achieve with a move to Oracle. The webcast is scheduled for June 20.
                                                    Why The Era of General Purpose Storage is Coming to an End
                                                    Emergence of Application Engineered Storage (AES)
                                                    Industry analyst Marc Staimer, frequent speaker and author for TechTarget , recently issued a new research report that highlights how the era of general purpose storage such as NetApp FAS and EMC VNX is coming to an end, while Application-Integrated Storage led by Oracle's ZFS Storage Appliance is addressing the new era of application centricity.

                                                    Download this new report and learn more about Application Integrated Storage.

                                                    IT - Database
                                                    5 Big Database Breaches of Spring 2013
                                                    Dark Reading, May 30, 2013
                                                    "This spring's crop of database breaches has been about as abundant as the pollen count this time of year, and twice as likely to make security researchers' eyelids twitch. During the past couple of months, data breaches have ranged from the mundane to the fantastic, with each occurrence offering valuable lessons for security professionals with regard to locking down databases and the applications that access them.

                                                    The following five high-profile breaches offer some of the low lights of late and what organizations can learn from each of these incidents..."

                                                    IT - Big Data
                                                    A Futurist's Take on Managing Big Data and Disruptive Technology
                                                    Information Management, June 5, 2013
                                                    "The pace of technology change is accelerating, according to noted futurist and academic Thornton May, and becoming more disruptive. And insurance IT executives need to figure out a way not only to stay on top of the shifts, but to keep their focus on the business benefit of these new technologies.

                                                    And perhaps there is no bigger shift happening than the adoption of analytics and big data. 'Big data is a call to action,' May said during a Monday speech at the IASA Education Conference and Business Show..."

                                                    Big Data Will Grow Past Its Hype by 2016: Gartner
                                                    InformationWeek, June 6, 2013
                                                    "Big Data will grow past its hype towards 2016 to become 'just data' once the technologies mature, and organizations learn how to deal with it, according to Gartner, Inc. While data is regularly defined by the dimensions of volume, velocity and variety, information management concerns must be much broader.

                                                    'The bottom line is that not all information requires a Big Data approach,' said Frank Buytendijk, research vice president at Gartner. 'The new "Big Data way" is not going to replace all other forms of information management. There is more room - and need - for experimentation in the area of "information of innovation," for instance with social media data, or by making processes more information-centric' ..."

                                                    Web, Big Data to Experience Explosive Growth
                                                    Baseline, April 25, 2013
                                                    "VeriSign reports that more than 252 million top-level domain names currently exist, and even more explosive growth is likely in the future.

                                                    In less than two decades, the World Wide Web has been transformed from a bold new medium into a mainstream tool for businesses, educational institutions, charitable organizations and government. A new report from domain registrar VeriSign indicates that more than 252 million top-level domain names now exist worldwide, and the number grew by 2.5 percent since the third quarter of 2012. The total number of .com and .net registrations topped 8 million..."

                                                      IT - Mobile
                                                      Mobile Phone Security No-Brainer: Use a Device Passcode
                                                      ComputerWorld, May 31, 2013
                                                      "When it comes to smartphone safety, the single most important thing a mobile phone owner can do is lock the device with a unique, four-digit PIN.

                                                      That's been the opinion of many experts for years, but the advice still holds, including from Microsoft's chief online safety officer, Jacqueline Beauchere..."

                                                      IT - BYOD
                                                      BYOD Movement Requires Management, Not Resistance: 10 Reasons Why
                                                      eWeek, June 3, 2013
                                                      "The bring-your-own-device (BYOD) trend is now an irresistible force that has actually made an impact on the vast majority of companies in one fashion or another. Most enterprises have recognized that they have to find ways to manage the movement because there is no way to stop it. In some cases, BYOD policies allow for employees to use whatever products they want and use any applications they prefer. In other implementations, the IT side strictly controls BYOD with certain parameters on which products can and cannot be brought into the office. In either case, BYOD is here, and it's here to stay..."

                                                      • The iPhone Is Relatively Secure
                                                      • The iPad Is Secure, Too
                                                      • It's All About Productivity
                                                      • Remember the Apps
                                                      • It Helps Constrained Budgets
                                                      • It's Happening, Anyway
                                                      • It's All About Android Security
                                                      • Control Really Is Possible
                                                      • The Competitors Are Already Doing It
                                                      • Smartphones Are Delivering More Enterprise-Friendly Features

                                                      Read on for details.

                                                      An Ugly Prediction about Forced BYOD
                                                      Internet Evolution, May 28, 2013
                                                      "A horror story could unfold if Gartner is correct that many businesses will soon be forcing their employees to bring their own devices to work. It might seem like great news to people who want to use their own gear, but the policy could turn ugly for both employees and IT departments.

                                                      Based on Gartner's survey of CIOs around the world, 38 percent of enterprises expect to stop providing devices to employees by 2016, and 50 percent expect to do so by 2017. Gartner says about half of businesses with bring-your-own-device (BYOD) programs currently provide some reimbursement to employees. However, reimbursement for the entire cost 'will become rare.'..."

                                                      The BYOD Mobile Security Threat Is Real
                                                      ComputerWorld, May 30, 2013
                                                      "Paul Luehr knows a thing or two about security, the law and "Bring Your Own Device," or BYOD.

                                                      Formerly a federal prosecutor and supervisor of the Internet fraud program at the Federal Trade Commission, Luehr is a managing director at Stroz Friedberg, a global data risk management company with a cyber-crime lab. He focuses on computer forensics, investigations and discovery.

                                                      BYOD has led to an increase of mobile devices, cloud storage repositories, different kinds of data types, and, of course, data theft by disgruntled employees. "The number of cases we have involving mobile devices has probably doubled in the last three years," Luehr says..."

                                                      Personal Devices Used to Access Work Data, Regardless of Company Policy
                                                      eWeek, May 27, 2013
                                                      "The top five information or applications used by employees were email, calendar and scheduling, databases, company apps and directories.

                                                      With the bring-your-own-device (BYOD) trend growing increasingly popular, a survey released by the CTIA wireless association and conducted by Harris Interactive found that regardless of company policy regarding the use of personal devices, employees are using their own notebooks, smartphones and tablets to access work data..."

                                                      Top Ten Articles for last few Issues
                                                      Vol 183 Issues 1, 2,3, 4 and 5; Vol 182 Issues 2, 3 and 4
                                                      We track how frequently each article is viewed on the web site to determine which the readers consider the most important. For last week, the top 10 articles were:

                                                      • Interview with ZFS Co-founder, Matt Ahrens
                                                      • Oracle Solaris 11 Certification Study Tips
                                                      • Wikibon Reviews Oracle ZFS Appliance
                                                      • Oracle Database Appliance X3-2
                                                      • Oracle outlines steps to improve Java home, enterprise security
                                                      • Reduce IT Help Desk calls when using Oracle VDI
                                                      • Oracle Internet Directory 11g Benchmark on SPARC T5
                                                      • Java Spotlight Episode 134
                                                      • Oracle Service Cloud
                                                      • The Oracle Cloud Chronicles: Simplifying IT and Driving Innovation

                                                      The longer version of this article has list of top ten articles for the last 8 weeks.

                                                        IT - Tape
                                                        3 Roles for Tape in the Cloud
                                                        InformationWeek, June 6, 2013
                                                        "Questions about the usefulness of tape come up often in conversations with users and vendors. The general theory, especially by cloud storage vendors, is that tape has outlived its usefulness. The reality is that it has not; in fact, I often make the case that tape is actually more useful than it has ever been, especially in the cloud.

                                                        Here are three uses for tape in the cloud today..."

                                                        A Summary of Identity Management R2 PS1
                                                        Videos and PDFs.
                                                        If you have downloaded Identity Management R2 PS1 and are looking for a good summary of capabilities, the presentation below by Marc Boroditsky, Vice President of Product Management, provides a good preview.

                                                        For more information on getting started with Identity Management R2 PS1 click here for the documentation. You can learn more about Identity Management R2 PS1 from these resources:

                                                        • Datasheet: Oracle Identity Governance
                                                        • Access Governance Paper
                                                        • Mobile and Social Access Management
                                                        • Single Sign-on Paper
                                                        • Oracle Identity Manager Paper
                                                        • Datasheet: Oracle Identity Manager

                                                        Read on for videos and PDFs.

                                                        Trending in
                                                        Vol 235, Issue 3
                                                        Trending IT Articles