News about Oracle's Solaris and Sun Hardware
System News
Jun 17th, 2013 — Jun 23rd, 2013 Generate the Custom HTML Email for this Issue
System News System News for Sun Users
Volume 184, Issue 3 << Previous Issue | Next Issue >>
Sections in this issue:
click to jump to section

Tuning and Performance for Oracle SOA Suite 11g on SPARC T4 Servers
SPARC T4 servers are recommended for all SOA workloads, with good all-around performance

This report describes testing performed on the BPEL and Oracle Service Bus components of the Oracle SOA Suite on Oracle's SPARC T4 servers running Oracle Solaris 11. The goal of the testing was to determine the best throughput for BPEL and Oracle Service Bus workflows by determining the optimal tuning parameters for best performance. Two test efforts are described in this paper. One set of tests revolved around the Fusion Order Demo (FOD) sample framework, with SOA-specific aspects specifically recorded. The second set of tests was run to determine Oracle Service Bus performance with a set of benchmarks created by Oracle engineering to stress test that one component.

Maxxton Cuts Page-Load Time by 90%, Completes Searches 20x Faster
Cuts Batch Run Time by 80%, and Sees Return on Investment in Nine Months
Maxxton BV provides tailor-made, fully automated enterprise resource planning (ERP) solutions for the complete management of vacation parks, hotels, resorts, and tour operators. It provides central reservation, mobile, and Web booking, invoicing, issue resolution, property management, and reporting solutions via Newyse, its software-as-a-service-based solution suite and delivery platform. Some of the largest companies in the Dutch vacation industry use Newyse, including market-leaders Roompot, Hogenboom and Oostappen Vakantieparken.
Oracle VM VirtualBox 4.2.14
maintenance release
VirtualBox is a powerful x86 and AMD64/Intel64 virtualization product for enterprise as well as home use. Not only is VirtualBox an extremely feature rich, high performance product for enterprise customers, it is also the only professional solution that is freely available as Open Source Software under the terms of the GNU General Public License (GPL) version 2. See "About VirtualBox" for an introduction.

Presently, VirtualBox runs on Windows, Linux, Macintosh, and Solaris hosts and supports a large number of guest operating systems including but not limited to Windows (NT 4.0, 2000, XP, Server 2003, Vista, Windows 7), DOS/Windows 3.x, Linux (2.4 and 2.6), Solaris and OpenSolaris, OS/2, and OpenBSD.

See the ChangeLog for details.

IT - Storage
Next Generation Scale-Out NAS
Storage-Switzerland, June 13, 2013
"The use cases for Network Attached Storage (NAS) have changed dramatically in the 20 years since the first NAS appeared. NAS hardware architectures have also changed. So have the capacities and performance levels that NAS systems are asked to support.

These changes have fostered an evolution from first generation monolithic NAS infrastructure to a more flexible, efficient NAS model. With the advent of virtualization, big data analytics and the massive increases in traditional unstructured data, it's time for the next generation of scale-out NAS to resolve today's challenges..."

Five Reasons to Conduct a Storage Assessment Today
IT Business Edge, June 21, 2013
"Lurking inside many corporate data centers across America are legacy storage devices just waiting to expire during a critical task. Some of these older storage devices may be insufficient to handle today's increased data storage and access requirements, let alone the requirements of tomorrow. The challenges are particularly acute as data analytics become increasingly important to corporate America..."

  • Legacy Storage Just Won't Cut it In Tomorrow's Work Place
  • Recognize and remedy deficiencies
  • Reduce management complexity
  • Simplify end-user access and usage
  • Increase ROI

Read on for details.

VMware Server Side Caching - Flash SSD or DRAM
Storage-Switzerland, June 18, 2013
"Server virtualization has a well-documented problem; it creates an I/O blender that can bring storage networks and storage systems to their knees. The I/O blender vs. the desire to design increasingly dense virtual machine (VM) architectures has created a new market of solutions that leverage server side flash SSD and caching software to offload much of the storage I/O from the storage network and the storage system. Flash-based server side caches have their challenges though and it may be time to investigate DRAM based server side cache alternatives..."
At Prices This Low, the NSA Can't Afford to Not Spy On Us
IT World, June 20, 2013
"Not worried about being spied on by the NSA because, you figure, there's no way they can afford to spy on everyone in the United States? Surely the costs of storing all of the phone calls, emails, text messages and other communications that we generate in increasingly large quantities would be prohibitive, right? Well, according to a couple of experts in storing large volumes of data, the costs would be surprisingly affordable..."
    No More Shortcuts: Sound Data Quality Strategy a Must for BI Success
    Search Business Analytics, June 20, 2013
    "As business intelligence and analytics adoption expands within organizations, there's a natural push from business users to add more types of data from disparate sources -- often external ones -- to BI systems. That raises questions about the validity, consistency and overall quality of the data being added -- questions that need to be answered before data errors result in flawed analysis..."
    Java Technology
    Java Spotlight Episode 137: Rory O'Donnell on the Java Test Fest
    Roger Brinkley
    Feature Interview: Rory O'Donnell, Senior Quality Engineering Manager, on LJUG Java Test Fest and how other JUGs can implement their own Java Test Fest.

    What's a TestFest? OpenJDK needs more high quality open testcases. Contributors to OpenJDK need to be confident that their changes are sound and do not cause problems elsewhere. The available testcases in OpenJDK are a great starting point. We want to build on those tests and expand both the number of tests and the test coverage of the JDK. We want to create a larger, more comprehensive, test suite for OpenJDK and we need your help to do that.

    Whats Cool

    • OpenJDK PowerPC Port: Endorsed and Funded
    • Hack OpenJDK with NetBeans IDE
    • The SD Times 100: 'Best in Show' in Software Development - OpenJDK in Influencers Category

    Read on for details.

    IT - Technology
    How a Quantum Computer Works
    IT World, June 17, 2013
    "OK, everyone, get out your pencils and get ready to think quantum mechanics for today's video from 1Veritasium - looking at how a "Quantum Computer" operates.

    When one hears the phrase, you think of supercomputers that can make calculations at the speed of light and you want to stand in line at the Best Buy to pick one up. Unfortunately, this isn't the case - and this video does a pretty good job at explaining the difference between a quantum computer and a regular one..."

      Why You'll Soon Hire a Robot
      Datamation, June 19, 2013
      "People talk about robots like they're coming in the future, when in fact robots are here now in a big way.

      The military uses thousands of robots every day. Manufacturing is increasingly robot heavy. Medicine is taking advantage of robots for both remote doctor-patient visits and surgery, but also medical lab processing.

      Depending on who you ask and how you define the word 'robot,' there are currently about 20 million robots deployed, give or take a few million. One company alone, iRobot, has sold nearly ten million robots..."

        How the OS Makes the Database Fast
        by Ginny Henningsen
        Ginny Henningsen writes, "Is choosing an operating system all that's important any more? After all, virtualization lets sysadmins choose the OS that best matches the workload they plan to put on each virtual machine. And Red Hat Linux on Intel is cheap and ubiquitous enough to work for most anything. Right?

        We don't think so.

        Operating systems were once the glue between the hardware and the applications, parsing out the underlying hardware resources to the application. Over time they evolved to support the entire Infrastructure-as-a-Service (IaaS) stack, including server and network virtualization, resource management, advanced file systems, and storage management. While operating system capabilities have broadened in many respects, one aspect has remained the same: the OS can still have a dramatic impact on application performance. Whether deployed on bare metal or in a virtual environment, the OS is a critical factor in boosting or impeding application performance and data center resource efficiency..."

        MySQL Cluster 7.3
        Enables Faster and Simpler Development of New Web and Mobile Services
        With the accelerated pace of innovation in Web, cloud, social and mobile services, the new GA release of MySQL Cluster 7.3 makes it simpler and faster than ever for developers to enrich their applications with a highly available and scalable, fault tolerant, real-time database.

        With a new NoSQL JavaScript connector for node.js, MySQL Cluster 7.3 makes it simpler and faster to build services deployed across clusters of commodity hardware, with minimum development and operational effort.

        The new release features enhanced capabilities including native support for foreign keys, a browser-based auto-installer and new connection thread scalability, further enabling users to meet the high availability database challenges of next generation Web, Cloud, and communications services.

        Additionally, native integration with the MySQL 5.6 Server enables developers to combine the InnoDB and MySQL Cluster storage engines within a single MySQL 5.6-based application.

        MySQL Cluster is an open source, auto-sharded, real-time, ACID-compliant transactional database with no single point of failure, designed for next generation web, cloud, social and mobile applications.

        MySQL Cluster 7.3 is available for download. Terms, conditions and restrictions apply.

        IT - Cloud
        CIOs Bemoan Lock-In and the 'False Flexibility' of the Cloud
        ComputerWorld, June 19, 2013
        "Despite the promise of portability from service providers, the reality of the cloud for big customers is a similar type of lock-in as they experience with on-premise apps vendors such as Oracle and SAP, two CIOs said Tuesday.

        "You're kind of locked in -- it's out with the old boss and in with the new," said Ralph Loura, CIO of The Clorox Company, in a discussion about 'what keeps CIOs up at night' at the GigaOm Structure conference in San Francisco on Wednesday..."

        Cloud Security for SMEs: Seven Key Steps
        ComputerWeekly, June 17, 2013
        "Cloud security remains a key concern for small to medium-sized enterprises (SMEs), and is still often cited as a chief impediment to moving to the cloud. This is understandable, as security breaches can have major negative repercussions for a business.

        However, the risks need not be insurmountable for SMEs, nor outweigh the benefits of cloud services. It is also important to remember that while most SMEs are not specialists in data security, cloud service providers need to be – they have a vested interest in maintaining the security of customer data.

        Below are seven steps which SMEs should follow when considering a cloud service, selecting a cloud provider and managing a cloud contract...:"

        • Audit your data
        • Do your homework
        • Look at the contract
        • Encrypt data where necessary
        • Check your privacy policy
        • Manage your contract
        • Train your staff

        Read on for details.

        Users Want Reduced Cloud Complexity and More Interoperability, Study Finds
        ComputerWeekly, June 19, 2013
        "Cloud adoption has continued to rise in 2013, but to yield the true benefits of cloud computing its complexity must be reduced and cloud interoperability increased, according to the third Future of Cloud Computing survey.

        The study of 855 IT decision-makers, suppliers and CIOs – which was carried out by Venture Partners, GlassHouse Technologies and GigaOM Research – revealed that a wide majority (75%) of respondents used some form of cloud computing. This was 8% more than the 2012 survey..."

        Why Build a Private Cloud?
        Business 2 Community, June 19, 2013
        "IT is currently facing two dilemmas. The first is many want their private cloud architecture to work with their existing data center. Secondly, IT professionals are looking to build private clouds that are open to other clouds but also equipped to run existing in-house systems and applications.

        So you may be asking yourself, 'Why should I build a private cloud?' Under a private cloud, an agency effectively acts as a service provider for their internal customers..."

          IT - CxO
          11 Tips to Prevent and Manage the No. 1 Legal Issue in the Workplace
          TLNT, June 19, 2013
          "According to our most recent survey, the absolute No. 1 workplace legal issue at the moment is how to prevent and manage litigation.

          That's not surprising. EEOC claims are at an all-time high. Class actions continue to rise. Employers now win less than 50 percent of the time in court..."

          • Investigate and document ALL claims
          • Never, ever, ever, ever retaliate
          • Establish litigation budgets and use fixed/flat fees
          • Conduct early case evaluations
          • Follow your own policies and contracts
          • If it ain't job related, it ain't job-related
          • Address known and systemic issues. Now. Please
          • Model ethical behavior at the top
          • Take the 'Mom' Test
          • Know the law
          • Love your employees
            CIOs Must Be Leaders, Not Mere Technocrats
            Insurance & Technology, June 19, 2013
            "In the insurance industry, as in others, we tend to emphasize the technical and organizational prowess of senior technology officers, and that's all very well. However, these qualities are subordinate to a more basic quality that is necessary for competitive victory: leadership. Technical competence is the baseline for any activity with a technical dimension, and for insurance CIOs that means understanding of technology, insurance and business administration..."
            Courageous Leadership Is the Great Differentiator
            CIO Insight, June 19, 2013
            "It takes courageous leadership to communicate true but unwanted information to an organization's stakeholders, because it won't be what they would like to hear.

            The life of a CIO is a precarious one at best, but are CIOs contributing to their own insecurity? In some cases the answer is an emphatic yes.

            First, the good news..."

            Don't Fall Into the Technology Skills Gap
            Wall Street & Technology, June 21, 2013
            "IT organizations are suffering from a skills shortage when it comes to newer, cutting-edge technologies, as well as older legacy systems...

            With the advent of high-frequency trading, mobile banking and online account management, you might not think of the financial services sector as being labor intensive. But when it comes to IT labor, it's very intensive..."

            IT Departments to Shrink Dramatically Within Five Years as Cloud Takes Over
            ComputerWeekly, June 17, 2013
            "Corporate IT departments will shrink by as much as 75% over the next five years as businesses adapt to the cloud and changing economic conditions, a major study by business advisory group CEB has revealed.

            IT departments will take on the role of advising the business on technology decisions, rather than commissioning technology themselves, with huge consequences for the skills IT professionals need, the study predicts..."

              Rules for Radical CIOs: Part 2
              InformationWeek, June 17, 2013
              "In part one of this two-part series, I laid out the first five of activist Saul Allinky's "Rules for Radicals," changing them slightly to apply to competitors and the business of technology. In this installment I cover rules six through 13..."

              • A good tactic is one that your people enjoy
              • A tactic that drags on too long becomes a drag
              • Keep the pressure on
              • The threat is usually more terrifying than the thing itself
              • Develop operations that will maintain a constant pressure on your competitors
              • If you push a negative hard and deep enough, it will break through into its counterside
              • The price of a successful attack is a constructive alternative
              • Pick the target, freeze it, personalize it and polarize it

              Read on for details.

                Data Classification Can Boost Risk Management
                Dark Reading, June 21, 2013
                "The effectiveness of data classification and retention policies can have strong ripple effects across an organization's entire IT risk management framework. After all, how data is classified can determine what risk management priorities are placed on it, and the less data that is retained long-term, the less volume the organization has to sift through to determine appropriate protection levels..."
                IT - DR
                Natural Disasters Highlight Importance of Business Continuity Plans
                Security InfoWatch, June 12, 2013
                "Last month, powerful tornadoes ripped through Oklahoma over a 12-day period, leveling buildings and killing more than 40 people in the process. Among the victims were 10 children, seven of whom were killed when a twister stuck an elementary school in the Oklahoma City suburb of Moore. Last fall, Superstorm Sandy struck the northeastern U.S., destroying numerous homes and businesses. The storm also knocked out power and communications for thousands of residents in the region... natural disaster planning should be a part of every organizations' risk assessment regardless of their industry or location..."
                  3 Things You're Overlooking In Disaster Recovery
                  Business Solutions, June 11, 2013
                  "I think most business owners would agree in theory that disaster recovery is important. In practice, however, it's a little too easy to cut corners. There are so many options, it's easy to settle on something simple and cheap. But if you haven't taken the time to understand the kind of disaster recovery solution your business needs, you could be missing something big and paying for a solution that will let you down in the end..."
                  Scale, Velocity, Ambiguity: What's Different About a Type 1 Event
                  Emergency Management, June 11, 2013
                  "The power was out for 2 million electric customers in New York. Hospitals and nursing homes were evacuating patients and shutting down. Thousands of people were stranded in high-rise buildings, needing food and water. In Queens, houses were burning to the ground. Water rescues were taking place in New York City and on Long Island.

                  These events didn't take place on different days. They all happened simultaneously when Hurricane Sandy struck New York on Oct. 29, 2012..."

                    IT - PM
                    Biting the Bullet: When You Know That It's Time to Drop a Project
                    TLNT, June 21, 2013
                    "As much as it goes against the grain for most of us, sometimes the most productive thing a manager can do is give up on a project.

                    Now, I'm not suggesting you throw in the towel as soon as the going gets a little tough; productive people never give up without a fight. But there may come a time when you hit a point of diminishing returns, when investing further resources in the product would just be wasteful.

                    Remember Microsoft Bob, or baby food-maker Gerber's attempt to create adult entrees? Both companies wisely dropped those products when they flopped..."

                    Everything I Know About Project Management, I Learned from Game of Thrones
                    Smart Bear, May 24, 2013
                    "In George R.R. Martin's masterful series, A Song of Ice and Fire (currently an HBO television show, Game of Thrones), many characters in the fantasy world of Westeros create goals, make plans, maneuver people and events toward the goal they want, and eventually realize their goal. It's kind of like project management, but with more entrails.

                    Although a lot of the schemes these characters are based on objectives you wouldn't normally find in an office - revenge, reprisal and retribution against an ever-increasing list of enemies - a project manager can learn a great deal from these books. They're kind of like Sun Tzu's The Art of War and Niccolo Machiavelli's The Prince, except with less sympathy and better costumes..."

                    Oracle SuperCluster T5-8: Web Launch Event
                    June 27, 2013 10am PDT
                    How are you dealing with the increasing costs and delays caused by your complex data center architecture? Is your business struggling with an inefficient collection of multi-vendor, custom assembled components? Are your users asking for faster and more flexible deployments, better performance and higher availability than your current IT infrastructure can support?

                    Join us for a live webcast with Oracle Executive Vice President, John Fowler, as he announces the new Oracle SuperCluster T5-8: Our Fastest Engineered System.

                    Learn how the new Oracle SuperCluster T5-8 delivers:

                    • Extreme performance through Oracle Exadata, Oracle Exalogic, Oracle's virtualization solutions, and the world's fastest servers

                    • Highest availability with no single point of failure and 99.999% uptime

                    • Highest efficiency with unmatched price/performance and the lowest operating costs

                    • A complete engineered system ideal for database and application consolidation and private cloud

                    Register for this webcast here.

                    IT - Networks
                    Understanding the Relationship between SDN and NFV
                    Search SDN June 17, 2013
                    "It's difficult to get an industry with a long depreciation cycle for capital equipment to support any sort of revolution, but networking is facing two at once. Both software-defined networking (SDN) and network functions virtualization (NFV) propose revolutionary developments, and the success of either in changing the network may depend on the technologies being somewhat harmonious, if not actually supportive of each other. Just where the points of harmony lie may explain our roadmap to the network of the future..."
                      WAN Optimization Part 3: Overcoming Bandwidth Limitations
                      NetworkComputing, June 13, 2013
                      "As I wrote in my first blog post, there are three factors that can impact the performance of any application's connection: the amount of bandwidth, percentage of packet loss and latency. By addressing and correcting each of those factors, WAN optimization products profoundly improve protocol and application performance. I'll examine each of these items over several posts, starting with bandwidth..."
                      IT - Operations
                      9 Reasons Sys Admins Hate You
                      IT World, June 18, 2013
                      "A lone admin recently drew attention to the power the humble system administrator wields when he made front page international news by leaking details about PRISM, an NSA electronic surveillance program. Of course, you probably already know that sys admins are the lifelines between your keyboard and productivity, so the last thing you want to do is get on their bad side. By avoiding these 9 faux pas, you can help keep your sys admin happy and your systems humming along:.."

                      • You bypass the help desk system
                      • You're vague
                      • You abuse your rights
                      • You do not upgrade
                      • You make urgent, last-minute requests
                      • You waste your admin's time
                      • You test code on production systems
                      • You make personal requests
                      • You take your admin for granted

                      Read on for details.

                        IT Pros Struggle with Performance Management
                        Baseline, June 18, 2013
                        "When a crisis alert sounds in IT operations, is your organization in the dark as to what's happening? This is apparently a common scenario. In fact, the vast majority of technology professionals admit that their oversight of tech performance must dramatically improve, according to recent survey research from Evolven. When they deploy a new technology initiative, most IT professionals confess that they really can't determine the accuracy of the effort.."
                        Ten Technologies That Will Transform Data Centers
                        CIO Insight, June 17, 2013
                        "The ten innovations highlighted speak to the need for reduced capital and operating expenses without sacrificing data-center functionality. In fact, a few of the technologies promise to significantly increase performance while still arriving at a lower cost..."

                        • Low-Power Servers
                        • Advanced Data Center Infrastructure Management (DCIM)
                        • Cloud-Level Resiliency
                        • Silicon Photonics
                        • Chiller-Free Data Centers
                        • Power-Proportional Computing
                        • Chiller-Free Data Centers
                        • Power-Proportional Computing
                        • Flash Storage
                        • Prefab Modular Data Centers
                        • Onsite Clean Power Generation
                        • Memristors

                        Read on for details.

                        How to Evaluate the Risk of Outsourcing Locations
                        CIO, June 18, 2013
                        "IT organizations and CIOs don't contract and outsource to countries, they contract and outsource to companies. Given that, it's time to stop assessing location-based risk in a vacuum because sometimes the 'riskiest' suppliers may have the most innovative solutions...."
                          IT - Security
                          How SoCloMo Is Changing the Enterprise Security Landscape
                          InformationWeek, June 18, 2013
                          "The enterprise mobility wave, coupled with emerging public cloud computing solutions and rise in the usage of social media consumption has knocked open the traditional, closed on-premise enterprise IT infrastructure and is making it vulnerable to different kinds of security threat vectors..."
                          Information Security Executives Need To Be Strategic Thinkers
                          HelpNet Security, June 17, 2013
                          "George Baker is the Director of Information Security at Exostar. In this interview he talks about the challenges in working in a dynamic threat landscape, offers tips for aspiring infosec leaders, discusses BYOD, and much more.

                          How have your previous positions prepared you for the challenges you face as the Director of Information Security for Exostar?..."

                          EU Justice Commissioner on Prism: EU Citizens' Rights Are Not Negotiable
                          IT World, June 14, 2013
                          "Europe's justice commissioner will not sacrifice European citizens' rights for U.S. national security, she said Friday.

                          Commissioner Viviane Reding spoke after meeting with U.S. Attorney General Eric Holder after sending him a long list of questions regarding the U.S. data collection and surveillance scandal. She is responsible for the European Union's data protection laws.

                          The collection and analysis of cellphone metadata from Verizon is directed mainly at U.S. citizens, she said after the meeting, and so she is satisfied that no further action is needed from an E.U. point of view..."

                          7 Essentials for Defending Against DDoS Attacks
                          CSO Online, June 14, 2013
                          "You don't have to be a bank to be worried about being hit by a Distributed-Denial-of-Service attack these days. With hackers who pull off these costly take downs getting stealthier and more vicious, security leaders across all industries need heed these tips to be prepared.."

                          • Be ready for real-time defense adjustments
                          • Don't rely only on perimeter defenses
                          • Fight application-layer attacks in-line
                          • Collaborate
                          • Have your playbook ready
                          • Watch out for secondary attacks
                          • Be worried, even if you're not a bank

                          Read on for details.

                          It Takes 10 Hours to Identify a Security Breach
                          HelpNet Security, June 17, 2013
                          "Businesses are vulnerable to security breaches due to their inability to properly analyze or store big data, according to McAfee.

                          The ability to detect data breaches within minutes is critical in preventing data loss, yet only 35 percent of firms stated that they have the ability to do this. In fact, more than a fifth (22 percent) said they would need a day to identify a breach, and five percent said this process would take up to a week. On average, organizations reported that it takes 10 hours for a security breach to be recognized..."

                          NSA Surveillance Leads to Tighter Data Privacy Policies
                          Search Consumerization, June 14, 2013
                          "The recent revelation that the NSA collects massive amounts of user data from various technology companies has caused many IT pros to re-evaluate their user policies and data privacy tactics.

                          Though news of the National Security Agency (NSA) surveillance program has many people concerned about data privacy violations, it hasn't caused corporate IT to alter plans for mobile computing or for moving data beyond the corporate firewall to the cloud. However, IT pros should take a second look at their privacy policies, data security systems, the vendors they work with, and their service-level agreements..."

                          Take a Data-Centric Approach to Securing Information in the Cloud to Protect Against the Risks of Privileged Users
                          Network World, June 20, 2013
                          "Privileged users such as system, network and domain administrators can pose a significant threat to mission-critical systems or ones holding highly sensitive data. In fact, the consequences of a disruption in service or stolen confidential information can be severe enough ruin a business. Revocation of certifications, loss of critical intellectual property, and exposure to the consequences of a data breach disclosure are all part of the consequences..."
                          Thumb Drive Security: Snowden 1, NSA 0
                          InformationWeek, June 17, 2013
                          "The humble storage device is again under fire after reports surfaced that National Security Agency (NSA) whistle-blower Edward Snowden, 29, used a removable USB storage device to exfiltrate top-secret information from the agency, reported the Los Angeles Times.

                          NSA investigators now "know how many documents he downloaded and what server he took them from," a government official -- speaking on condition of anonymity -- told the paper..."

                          Why Are We So Slow To Detect Data Breaches?
                          Dark Reading, June 20, 2013
                          "Security breach response times can be a crucial factor in determining the difference between a minor security incident and a major data breach with far-reaching business effects. And, yet, most organizations today are slow to detect breaches. What's worse, many have a deflated sense of how long it really takes for them to sniff out an attacker on their networks. This lack of speediness and lack of awareness of that weakness plays right into the hands of attackers who are crafting long-term attacks with the strategy of staying hidden on network resources for extended periods of time..."
                          Why We Can't Stop Malicious Insiders
                          CSO Online, June 17, 2013
                          "Security experts have been saying for years that insiders - malicious, careless or simply unaware - are a greater threat to organizations, both public and private, than hackers.

                          And the world got another illustration in support of that argument last week when the most famous whistleblower of the moment, Edward Snowden, admitted he had leaked top-secret documents about the National Security Agency's (NSA) surveillance - both telephone and online - of American citizens to The Guardian and The Washington Post..."

                          Would You Give Away Your Front-Door Key Just Like That?
                          InformationWeek, June 19, 2013
                          "You would never hand over your front-door key to a complete stranger who called you from a telephone and asked for it. Why, then, do we act so carelessly when it comes to our Internet businesses? On the Internet, danger is lurking everywhere. Everybody knows. However, when danger appears in front of our very noses, we scarcely recognize it. Nevertheless, it is often a matter of common sense. If a complete stranger calls you with the request 'Would you just pass me your front-door key, because we are updating the locks,' everyone would name him a perfect fool. Why, then, do we act so carelessly when it comes to our Internet businesses?..."
                            IT - Careers
                            Run, Snowden, Run! A Pro's Advice for Escaping the Grid
                            IT World, June 17, 2013
                            "Shortly before revealing his identity, confessed NSA whistleblower Edward Snowden split town and headed for Hong Kong. While Snowden's current whereabouts within the semi-autonomous city-state aren't known, it's clear he isn't exactly trying to disappear from the world--indeed, he's been granting media interviews.

                            However, Mr. Snowden's plight got us thinking: If he really wanted to avoid prosecution, what would be the best way to slip off the grid and make an escape forever? Regardless of how you feel about Snowden's actions, it's a provocative question--especially in today's climate where so many people are worried about their own digital trails. We reached out to a professional vanisher for answers..."

                              9 Animated Shorts That Give Pixar a Run for Its Money
                              IT World, June 18, 2013
                              "Summer blockbuster films aren't always about the best actors and scripts, but the biggest explosions and special effects, which aren't even real but are added by computers in post-production. Why pay outrageous ticket prices for the latest computer-generated imagery when you can see the best CGI for free?..."
                                Guys, Stop Creeping Out Women at Tech Events
                                ComputerWorld, June 17, 2013
                                "I go to a lot of security conferences, but I never gave much thought to this curious fact: The conferences are hardly ever headlined by women. In fact, not a lot of women attend security conferences and other tech events.

                                I guess, if I noticed this at all, I chalked it up to the general dearth of women in the technology field. But the scarcity of women at events goes beyond that, and my eyes have only recently been opened to this fact and the reality that explains it.

                                My awakening began through my role as president of the Information Systems Security Association. .."

                                Ten Professional Networking Mistakes to Avoid
                                Baseline, May 14, 2013
                                "Do you find yourself going to one professional networking event after another, only to get very little out of your efforts? Sure, your e-rolodex now contains dozens or even hundreds of contacts that you'd never have otherwise. But if you fail to keep these connections active and productive, you'll reap few rewards from them. With this in mind, we present the following 10 classic mistakes of professional networking..."

                                • Quality, Not Quantity
                                • Dressing Down
                                • Desperation Situation
                                • Going Off Script
                                • It's All About Me
                                • The Know-It-All
                                • No Follow Through
                                • Mr./Ms. Needy
                                • Thankless Task
                                • Two-Way Street
                                • Losing Touch

                                Read on for details.

                                  IT - Social Media
                                  Friending the Boss: An Unwelcome Facebook Invitation
                                  Internet Evolution, June 17, 2013
                                  "As the boss, it can be tempting to friend some of your subordinates on Facebook. But don't click that button -- especially if you're a guy inviting a female staffer to connect online, or are dealing with older employees.

                                  Study after study confirmed what may be many employees' immediate gut reaction when they see that invitation on their Facebook page: Not a good idea. Of course, turning down a manager's invitation may be easier said than done. As a boss, therefore, you might want to disconnect from subordinates, at least on Facebook, some experts say..."

                                  How to Choose the Right Enterprise Mobile, Cloud and Social Tools
                                  Search Consumerization, June 18, 2013
                                  "IT must focus on the user's needs to deliver tools and services employees want to use in the consumerization era.

                                  To accomplish that, IT departments must create a sensible and agile plan to evaluate emerging technologies to meet end-user needs without putting the company at risk from a security or cost perspective..."

                                  IT - Virtualization
                                  Setting a Network Security Policy for a Virtual Environment
                                  Search Networking, June 17, 2013
                                  "Virtualization has become an important tool for many organizations as they look for ways to optimize existing servers and infrastructure. Yet for all its benefits, there is concern that virtualized environments may not be properly addressed in an organization's network security policy.

                                  A network security policy is the high-level document developed by management to transmit the guiding strategy and philosophy of management to employees. Management and business process owners are responsible for the organization and for designing security policies that will guide it toward success..."

                                  Bone Up On Fresh EU Privacy Law - Or End Up In the Clink, IT Biz Warned
                                  Channel Register, June 17, 2013
                                  "Technology resellers, distributors and service providers need to be ready for the freshly proposed European Data Protection law, IDC has said.

                                  The analyst's research director of European security software Kevin Bailey said that end users were already preparing for the new rules of the incoming regulation, but the technology channel needs to get its act together too..."

                                  Sun QFS Software
                                  Consolidate, share, and protect your business information
                                  Sun QFS software is a shared SAN file system designed to solve file system performance bottlenecks by leveraging underlying disk technology and hardware. The high-performance, configurable Sun QFS shared file system helps to overcome traditional UNIX® file system shortcomings, such as lengthy file system checks after an unintended interruption, long file system generation times, and limitations in file system scaling due to a finite number and size of files.
                                  IT - Mobile
                                  How Super High-Def Displays Change Everything
                                  ComputerWorld, June 15, 2013
                                  "Ultra high-resolution displays are suddenly possible for all screen devices. It's a great time to be an eyeball.

                                  The consumer electronics market is being flooded with devices that have incredible high-resolution screens.

                                  All the new iPhones and high-end Android phones have them.

                                  The 10-in. iPad has one, as do the Archos 97 Titanium HD, Onda V972, Freelander PD80, Ainol NOVO9 Spark, Cube U9GT5 and others.

                                  So does a new class of laptops, including the Google Chromebook Pixel, Acer Aspire S7, Apple MacBook Pro with Retina display, Asus Zenbook Prime UX31A, Asus Zenbook UX32VD, Dell XPS 12, Dell XPS 13, Samsung Series 9, Sony Vaio Duo 11 and others..."

                                  The Good and Bad of Tablets at Work
                                  InformationWeek, June 19, 2013
                                  "As people pile into a restaurant called Stacked, tucked in a San Diego mall around the corner from a Lego Store, it's easy to tell newbies from repeat customers. Veterans chat or watch sports while they wait for a table. The uninitiated gawk at people who've already been seated, watching them pass an iPad around each table to tap and swipe in their orders. The iPad has a ruggedized case and a credit card reader, and it's locked down to run only one app: Stacked's proprietary menu, ordering and payment system..."
                                  IT - Big Data
                                  Don't Do Big Data Analytics Alone, Says Expert
                                  IT World Canada, June 21, 2013
                                  "Organizations that don't have big IT staffs should look around for help, a big data conference has been told. Read some of the case studies that were presented

                                  Jumping off a diving board into a pool of big data doesn't have to be a lonely job, says an analytics expert..."

                                  IT - BYOD
                                  BYOD decision points: Who pays?
                                  Network World, June 17, 2013
                                  "As enterprises implement BYOD initiatives, IT managers have some key decisions to make: who purchases the devices, who pays for data plans and carrier contracts, and how does the company manage a mix of corporate and personal access to data on the devices.

                                  At Wells Fargo, employees are responsible for paying data charges, says Jim Spicer, executive vice president and CIO for Corporate Technology and Data.

                                  Spicer says now that industry and vendor offerings have matured, the company has implemented a pilot program with 3,000 employees. The goal of the experiment is to provide technologies that better enable workers to support the bank's customers..."

                                  CIO Takes Action to Solve BYOD's Privacy Problem
                                  CIO, June 21, 2013
                                  "The BYOD policy at a California law firm earned the CIO the nickname of Big Brother. However, the sarcasm stopped when he sprang into action and saved the day when an attorney's smartphone was swiped. The case represents the love-hate relationship workers and IT management have with BYOD..."
                                  Top Ten Articles for last few Issues
                                  Vol 184 Issues 1 and 2; Vol 183 Issues 1, 2,3, 4 and 5; Vol 182 Issue 4
                                  We track how frequently each article is viewed on the web site to determine which the readers consider the most important. For last week, the top 10 articles were:

                                  • Comparing Solaris 11 Zones to Solaris 10 Zones
                                  • Java Magazine May/June
                                  • Best Practices - Live Migration on Oracle VM Server for SPARC
                                  • Java Platform Enterprise Edition 7 (Java EE 7)
                                  • Cloud Computing: Concepts, Technology & Architecture
                                  • SPARC T5-4 Produces World Record Single Server TPC-H @3000GB Benchmark Result
                                  • SPARC T5-8 Delivers Best Single System SPECjEnterprise2010 Benchmark running WebLogic 12c
                                  • Monitoring per Zone Filesystem activity
                                  • Unbreakable Enterprise Kernel Release 2 Quarterly Update 4
                                  • Java Spotlight Episode 136: Paul Parkinson on JSR 907: Transaction API 1.2 @jcp

                                  The longer version of this article has list of top ten articles for the last 8 weeks.

                                    IT - Encryption
                                    New Encryption Method Promises End-To-End Cloud Security
                                    GCN, June 13, 2013
                                    "Researchers at the Massachusetts Institute of Technology have developed an encryption technique that, down the road, could make cloud computing more secure by ensuring that data remains encrypted while being processed.

                                    The system combines three existing schemes — homomorphic encryption, garbled circuit and attribute-based encryption — into what the researchers call a functional-encryption scheme, according to a report in MIT News. The result is that a database in the cloud could handle a request and return a response without data being decrypted..."

                                    Spy-Proof Enterprise Encryption Is Possible, But Daunting
                                    Network World, June 13, 2013
                                    "Data encryption could help enterprises protect their sensitive information against mass surveillance by governments, as well as guard against unauthorized access by ill-intended third parties, but the correct implementation and use of data encryption technologies is not an easy task, according to security experts.

                                    Encryption could limit the ability of law enforcement and intelligence agencies to access data without the knowledge of its owner as it travels over the public Internet or by forcing third-party service providers like hosting or cloud vendors to hand it over under a gag order. However, in order for this to work the data needs to be encrypted at all times, while in transit, while in use and while at rest on servers..."

                                    Moving Oracle Solaris 11 Zones between physical servers
                                    By Amir Javanshir

                                    Amir Javanshir writes, "As part of my job in the ISV Engineering team, I am often asked by partners the following question : is it possible to easily move a Solaris 11 Zone from a physical server to another?

                                    The short answer is : YES ! The longer one comes with the following restrictions :

                                    • Both physical servers should be of the same architecture, x64 or SPARC (T-series and M-series systems are compatible).

                                    • Both physical servers should run Oracle Solaris 11.

                                    • The destination server should run at least the same or higher release of Solaris 11. This includes the SRU (Support Repository Update) level..."

                                    Read on for details.

                                    Trending in
                                    Vol 234, Issue 2
                                    Trending IT Articles