News about Oracle's Solaris and Sun Hardware
System News
Jul 1st, 2013 — Jul 7th, 2013 Generate the Custom HTML Email for this Issue
System News System News for Sun Users
Volume 185, Issue 1 << Previous Issue | Next Issue >>
Sections in this issue:
click to jump to section


IT - CxO
x
CIOs, Not CEOs, Can Drive Business Transformations
CIO Insight, July 5th, 2013
"CIOs are in a unique position to exploit their knowledge of business and technology to influence or drive the direction of an organization's transformation, according to the findings of a new Forrester report titled "The CIO's Role in Business Transformation."

The report noted that almost all of today's business transformations are dependent on technology and focus on breaking traditional business silos. These high-risk, high-complexity projects require a commanding knowledge of technology, business processes and culture change..."

What's Your CIO Style?
Enterprise Efficiency, July 1st, 2013
"What kind of CIO are you? CIOs are, by definition, managers and we all know that there are many different styles of management and leadership.

While most of the leadership styles can be effective, whether any particular style is effective in any particular organization depends on whether individual style matches organizational culture and management techniques. Successful CIOs either modify their style to fit the group or manage to find an organization that's the perfect fit for their particular style. CIOs that can do neither spend a great deal of time polishing their resumes..."

Prescriptions in IT: Treat the cause, not the symptom
ComputerWorld, July 2nd, 2013
"Maybe a server is temporarily down, or perhaps an end user is unable to log onto a device due to password failure. But what if that server is an integral part of a manufacturing workflow? Or what if that blocked login meant that an entire team of employees was unable to obtain their work orders for the day?

It can be the most seemingly innocuous of circumstances that can lead to catastrophic results for a business. Maybe the first sign is an end user filing an incident because their email isn't working properly. On the face of it, this is a fairly simple request. The IT technician can reference and provide standard fixes that should solve the immediately apparent problem..."

    The Curse of Silent Organizations
    CIO Insight, July 1st, 2013
    "A 'silent organization' is one in which employees below the managerial or leadership levels are actively encouraged to keep their mouths shut. In short, don't suggest any new ideas. Don't offer your opinion - or anyone else's. Don't develop a bold, novel initiative and try to implement it. Don't do anything but the tasks outlined in your job description..."
      Nine Major Productivity Killers
      CIO Insight, July 5th, 2013
      "In a world that's constantly driven by getting work done as quickly as possible and moving on to the next task, time management has become a major concern for employees, the business side, and especially CIOs. Companies around the globe are turning to their CIOs to find out what employees are doing that reduces their productivity and either arm them with the products that will increase their productivity, or stop them from engaging in the behavior that decreases it. With that in mind, OfficeTime.net, a company that sells time-tracking software, recently surveyed more than 600 people to determine their biggest productivity-killers in the office..."

      • Better Answer Those E-mails
      • What's In the News Today?
      • Uh, You're Watching TV at Work?
      • "I Really Don't Want to Do That Right Now"
      • Too Many Meetings, People
      • The Standard Chitchat
      • All That Time On the Road
      • Social Engagements
      • Put That Cell Phone Away

      Read on for details.

      What I Learned My First Day as a CIO
      Enterprise Efficiency, July 3rd, 2013
      "I wrote ... about what I was thinking as I began my first day as a CIO. I was planning to redecorate my new office and my organization. After my first couple of weeks at the company, I realized there was a tradition where a group of senior managers went to a local country club to play golf after work on the second Thursday of each month. I didn't know how to play golf.

      Researching hardware and software options for the new IT infrastructure was important, but I decided it was also important to participate in the monthly golf outings..."

      SPARC
      x
      Blazing Performance: SPARC Microprocessors
      Diana Reichardt's cover story in the latest edition of Oracle Magazine
      An article by Dianna Reichart in the July/August issue of the Oracle Magazine says, "Oracle unveiled two new SPARC microprocessors, SPARC T5 and SPARC M5, and introduced a portfolio of systems based on these chips at a live event in Redwood Shores, California, on March 26. Oracle CEO Larry Ellison introduced the SPARC T5, calling it "the world's fastest microprocessor," and reported that the new SPARC T5-based systems have set 17 world records.

      Specifically, the SPARC T5-8 server achieved more than 8 million transactions per minute on the TPC-C benchmark,2 Oracle Executive Vice President of Systems John Fowler told the audience. "It's simply an astonishing level of capability at a cost and performance point that no one has ever seen before, and it's a huge step for us," Fowler said.

      Oracle SuperCluster T5-8
      Overview and Frequently Asked Questions
      Oracle SuperCluster T5-8 is Oracle's fastest engineered system for running both database and enterprise applications. Combining powerful virtualization and unique Oracle Exadata and Oracle Exalogic optimizations, Oracle SuperCluster is ideal for consolidation and enterprise private cloud infrastructure deployments. Oracle SuperCluster is a complete system integrating Oracle's servers, storage, network and software - all optimized and ready to run.
      Availability Best Practices on Oracle VM Server for SPARC
      By Jeff Savit
      Jeff writes, "This is the first of a series of blog posts on configuring Oracle VM Server for SPARC (also called Logical Domains) for availability. This series will show how to how to plan for availability, improve serviceability, avoid single points of failure, and provide resiliency against hardware and software failures.

      Availability is a broad topic that has filled entire books, so these posts will focus on aspects specifically related to Oracle VM Server for SPARC. The goal is to improve Reliability, Availability and Serviceability (RAS): An article defining RAS can be found here."

      Virtualization
      x
      Oracle Secure Global Desktop 4.71
      Bug fix release

      Oracle announced the general availability of Oracle Secure Global Desktop version 4.71. This version includes several bug fixes and also updates to components of the Oracle Secure Global Desktop web server. Specifically, the Oracle Secure Global Desktop web server now supports Apache HTTP Server 2.2.24, OpenSSL 1.0.0.k, mod_jk 1.2.37, Tomcat 7.0.37 and JDK 1.6.0_43.

      For information on downloading Oracle Secure Global Desktop version 4.71, please visit here.

      Oracle VM VirtualBox 4.2.16
      maintenance release
      Oracle VM VirtualBox 4.2.16 was released last night.

      It fixed a regression that impacted Vagrant and other appliance users, and now supports Windows 8.1 Developer Preview out of the box.

      This is a maintenance release. The following items were fixed and/or added:

      • OVF/OVA: don't crash on import if no manifest is used (4.2.14 regression; bug #11895)
      • GUI: do not restore the current snapshot if we power-off after a Guru Mediation
      • Storage: fixed a crash when hotplugging an empty DVD drive to the VM
      • Storage: fixed a crash when a guest read from a DVD drive attached to the SATA controller under certain circumstances
      • EFI: don't fail with 64-bit guests on 32-bit hosts (bug #11456)
      • Autostart: fixed VM startup on OS X

      Read on for details.

      IT - Storage
      x
      SSDs And The Write Endurance Boogeyman
      Network Computing, July 3rd, 2013
      "A drawback of flash-based SSDs is their limited write endurance. In my previous blog I looked at how, at first glance, the limited write endurance of flash-based SSDs might cause problems for RAID-based data protection systems. The idea is that multiple SSDs with the same write endurance rating could, theoretically, fail at the same time and cause data loss. I don't think it's a significant concern. I'll take a closer look at flash write endurance and how it causes SSD wear to show you why..."
      Java Technology
      x
      Java Spotlight Episode 139: Mark Heckler and Jose Pereda on JES based Energy Monitoring
      Weekly Podcast
      Roger Brinkley writes that the latest podcast includes an, "Interview with Mark Heckler and José Pereda on using JavaSE Embedded with the Java Embedded Suite on a RaspberryPI along with a JavaFX client to monitor an energy production system and their JavaOne Tutorial- Java Embedded EXTREME MASHUPS: Building self-powering sensor nets for the IoT

      Mark Heckler is an Oracle Corporation Java/Middleware/Core Tech Engineer with development experience in numerous environments. He has worked for and with key players in the manufacturing, emerging markets, retail, medical, telecom, and financial industries to develop and deliver critical capabilities on time and on budget. Currently, he works primarily with large government customers using Java throughout the stack and across the enterprise. He also participates in open-source development at every opportunity, being a JFXtras project committer and developer of DialogFX, MonologFX, and various other projects. When Mark isn't working with Java, he enjoys writing about his experiences at the Java Jungle website and on Twitter (@MkHeck).

      José Pereda is a Structural Engineer working in the School of Engineers in the University of Valladolid in Spain for more than 15 years, and his passion is related to applying programming to solve real problems..."

      IT - Technology
      x
      10 Great Gadgets From The Future
      Information Week, July 1st, 2013
      "More often than not, technology products disappoint. Part of it is the marketing. The videos of attractive, carefree people wielding mobile phones at nightclubs generate a sense of excitement that just can't be sustained in daily life.

      The letdown also stems from actual usage. Google Glass looked like it might change everything, but its significance has been less than that. It's a milestone in wearable computing, but more of a millstone when worn..."

      Can Libraries Survive the E-Book Revolution?
      Government Technology, July 1st, 2012
      "Facing higher prices and limited access to e-books from the major publishers, Jamie LaRue, the man charged with running Douglas County, Colo.'s library system, has inspired a national movement to promote smaller, digitally based presses and self-published authors.

      More than 20 years ago, when Jamie LaRue took over the library system in Douglas County, Colo., few people outside that patch of Rocky Mountain wilderness south of Denver knew who he was. A lot of things were different back then. Public libraries were still considered pillars of the community and the most important stop for any local resident looking for the latest from the printed word. Commercial e-books were still a fantasy..."

      What is WebRTC?
      Network World, July 1st, 2013
      "Enterprise trade shows have recently been full of chatter about WebRTC (Real-Time Communication). Descriptions like game changer and disruptive technology have been used. But, what is WebRTC and does it really matter?

      The simple explanation is that WebRTC enables browser-to-browser audio and video conferencing. The user can establish a call by clicking on an icon representing the other endpoint. For example, a customer could click on a button labeled agent and choose either audio or video to complete the call. The other end could be a friend, colleague, video source, or radio station - anything capable of having a built-in browser..."

        MySQL
        x
        Virtual Developer Day: MySQL - July 31st
        Design, develop, and manage your MySQL databases
        Virtual Developer Day: MySQL is a one-stop shop for you to learn all the essential MySQL skills. With a combination of presentations and hands-on lab experience, you'll have the opportunity to practice in your own environment and gain more in-depth knowledge to successfully design, develop, and manage your MySQL databases.

        This FREE virtual event has two tracks tailored for both fresh and experienced MySQL users. Attend the sessions on July 31st and sharpen your skills to:

        • Develop your new applications cost-effectively using MySQL
        • Improve performance of your existing MySQL databases
        • Manage your MySQL environment more efficiently

        Read on for details.

        IT - Cloud
        x
        Overlooked questions to ask before jumping into the cloud
        GCN, July 1st, 2013
        "Is your organization asking the right questions when planning for the cloud? If not, progress can be slowed as you work to integrate multiple externally hosted IT services. Lately, cloud solutions have not been expanding as rapidly within the federal government as they have in other sectors, and one reason might be failure to deal with important questions upfront when evaluating how cloud services will be integrated.

        Here are a set of often overlooked questions that can help agencies establish a true enterprisewide plan for how to tap into a wide range of on-demand services..."

          The worst cloud outages of 2013 (so far)
          ComputerWorld, July 1st, 2013
          "Cloud computing provides plenty of perks for both businesses and casual users, but while cloud servers may live in fluffy white shapes in the sky, they aren't immune to earthly errors.

          As any cloud dweller knows, Web-based services can crash and burn just like any other type of technology. If the companies behind them are smart, you shouldn't lose any data in the long run -- but you'll likely lose a bit of sanity during the time the service is offline.

          While 2013's only halfway done, we've already seen some cringe-worthy cloud failures this year. Here are the worst -- so far..."

          • Amazon takes a nosedive (Jan 31)
          • Dropbox drops the ball (Jan 10)
          • Facebook falls flat (Jan 28)
          • Microsoft melts down, part one (Feb 1-2)
          • Microsoft melts down, part two (Feb 22)
          • Google Drive (Mar 18-19)
          • CloudFare doesn't fare well (Mar 3)
          • Dropbox drops off the Web again (May 30)
          • The Fail Whale flails (Twitter) (Jun 3)

          Read on for details.

          IT - DR
          x
          3 things to consider before buying into Disaster Recovery as a Service
          CSO Online, July 1st, 2013
          "Disaster Recovery as a Service (DRaaS) backs up the whole environment, not just the data.

          'Most of the providers I spoke with also offer a cloud-based environment to spin up the applications and data to when you declare a disaster,' says Karyn Price, Industry Analyst, Cloud Computing Services, Frost & Sullivan. This enables enterprises to keep applications available.

          Vendors offer DRaaS to increase their market share and revenues. Enterprises, especially small businesses are interested in the inexpensive yet comprehensive DR solution DRaaS offers. There are cautionary notes and considerations too that demand the smart businesss attention before and after buying into DRaaS..."

          IT - Operations
          x
          10 IT Outsourcing Tips to Become a 'Very Important Customer'
          CIO, July 3rd, 2013
          "Follow these simple steps to show your IT outsourcing provider a little love and get more attention than other customers in return (without giving away too much)..."

          • Be Reasonable in Negotiations
          • Open Up
          • Put the Contract Away
          • Offer Rewards
          • Go Public
          • Be the Change
          • Loosen Up the Purse Strings
          • Lend a Hand
          • Pay Your Bills (On Time)
          • Be Nice.

          Read on for details.

          The top 5 reasons to upgrade to Windows 8.1
          PCWorld, July 1st, 2013
          "The Windows 8.1 preview is here, giving us a first-hand glimpse at the fruits of Microsoft's newfound rapid-release religion. Remolding an operating system in eight scant months is a tall task indeed, and while Windows 8.1 is still far from perfect, Microsoft managed to craft a fairly capable reimagining of its new-look OS in the short time since Windows 8 debuted last October..."

          • A better desktop experience
          • More seamless overall
          • Versatile app snapping
          • Cohesive search results
          • New features in every corner

          Read on for details.

          Brute-force cyberattacks against critical infrastructure, energy industry, intensify
          ComputerWorld, July 5th, 2013
          "Do you leave the factory-default password on your devices that are connected to the Internet? While I certainly hope not, and this may seem like a no-brainer, how much more important is it to change manufacturers' passwords on our nation's critical infrastructure control systems? DHS's Industrial Control Systems Cyber Emergency Response Team (ICS-CERT) warned that attacks against critical infrastructure are growing, with more than 200 brute-force cyberattack incidents reported between October and May, surpassing the 198 total attacks in all of fiscal year 2012..."
          IT - Security
          x
          The Beginning of The End For Firewalls
          Continuity Central, July 1st, 2013
          "Recently a very interesting article on the Armed Forces Communications and Electronics Association website caught my eye: 'DISA Eliminating Firewalls.'

          Although the title seemed provocative at first, the article itself just made me smile.

          DISA gets it, it really gets it..."

          Cyberwarfare: Mounting a defense
          TechRepublic, July 5th, 2013
          "Both private and public organizations are at risk for cyberwarfare attacks and must take responsibility for network defense. Tom Olzak outlines security best practices.

          In Part 1 of this two-part series, we examined the rise of cyberwarfare, its characteristics, and expectations of government involvement. In this final installment, we look at what it takes to protect private and public organizations from the effects of state- or group-sponsored warfare.

          Defending networks isn't a new concept. We've known how to implement prevention, detection, and response controls for years. This isn't the problem. The challenge we face is the lack of will to do what's required to deal with the increasing threats from nations, terrorists, and others. Relying on the Federal government to protect us is simply finger pointing. The fingers need to come down while organizations start assuming responsibility for their own defense..."

          Information Security Risk Assessment Toolkit by Mark Talabis, Jason Martin
          Help Net Security, July 3rd, 2013
          "It is a truth universally acknowledged that in order to know what company IT assets you should protect and how, you need to first perform a risk assessment. But how do to go about it? This book will tell you everything you need to know and do to perform this feat..."
            10 funny videos about computer passwords
            InfoWorld, July 1st, 2013
            "It's no laughing matter when you can't remember your passwords. Neither would it be funny if someone figured out your password and broke into your machines. But comedy writers and comedians these days are yukking it up big-time over this serious IT security matter..."

            • A UCB Comedy classic about resetting passwords
            • Short and sweet office prank, with scary co-worker
            • Which is funnier, the actual infomercial or Ellen Degeneres' take on it?
            • A few choice moments in this gem ('Churchill? Really?'), which Buzzblog's Paul McNamara wrote about.
            • Real-life passwords
            • This password rant might get you angry before it gets you laughing, but some 3 million YouTube viewers have eaten it up.
            • Comedy Central offers up John Ramsey's take on passwords.
            • And now, we throw a bone to vendor Tripwire, which did this video at the RSA Conference in 2012.
            • This one's a bit longer -- it's a comedy routine from Don Friesen, whose old man brain is stuffed with passwords.
            • Corporate comedian Dave Fleming riffs on passwords. [Cringe.]

            Read on for details.

            PRISM should make businesses think twice about cloud computing
            TechWorld, July 1st, 2013
            "Businesses worldwide need to re-think their use of cloud computing, in light of recent revelations around the PRISM and Tempora surveillance programmes, according to independent privacy advocate Caspar Bowden.

            Speaking at a House of Commons debate, chaired by Labour MP Tom Watson, Bowden said that the UK is in an 'extremely exposed' position, because of its relationship with the US National Security Agency (NSA).

            While PRISM and GCHQ's surveillance programme Tempora focus on consumer-facing cloud services like Facebook, Google and Skype, Bowden believes that there may be other programmes that tap into business cloud services such as Microsoft Azure and Amazon Web Services..."

            California's First Data-Breach Report Finds 131 Incidents Hit 2.5 Million Citizens
            CIO, July 2nd, 2013
            "The state of California yesterday issued its first annual data-breach report saying for 2012 it recorded a total of 131 data breach incidents that put the personal data of more than 2.5 million Californians at risk.

            According to California's report, the retail industry reported the most data spills last year, accounting for 26% of the total, followed by finance and insurance at 23%. More than half of last year's incidents reported in California involved Social Security numbers. And more than half of all the reported data breaches -- 55% -- were the result of deliberate intrusions by outsiders or unauthorized insiders..."

            How to Manage Passwords Effectively
            CIO, July 1st, 2013
            "It's tough to keep track of all of your passwords. In spite of advances in biometrics, and increased attention on the value of two-factor authentication, passwords remain the primary means of digital security. They're also one of the weakest links in the security chain. If we can't get rid of passwords, we need a better way to manage them.

            Remember when passwords were going to die out?..."

            The Biggest Security Snafus of 2013 (So Far)
            Network World, July 1st, 2013
            "Late last December ended with a hacker leaking data on 300,000 Verizon FIOS customers which was apparently stolen via a third-party partner of Verizon. And now, the middle of 2013 ends with Edward Snowden, the former Booz Allen Hamilton contractor who worked for the National Security Agency (NSA), leaking secrets about NSA spying, including that Verizon, along other U.S. telecom companies, gives customer phone records to the NSA. It's been a busy six months for security chills and spills, and here's our semi-annual update on the 'biggest security snafus so far' this year..."
            Critical infrastructure protection: Are we prepared for a massive cyberattack on U.S. systems?
            CSO Online, July 1st, 2013
            "One expert says the financial system deserves more attention, but others say if the power grid goes down, so does everything else. Is there a cyber 9/11 in our future? If so, what is the plan for defense?

            There is no debate in the security community that the nation needs to protect its critical infrastructure (CI) from cyber attacks. But not everybody agrees that all infrastructure sectors are equally critical.

            According to the most recent Presidential Policy Directive on cyber security, the U.S. has 16 CI sectors, ranging from transportation to energy, food, water, financial services and others..."

            IT - Careers
            x
            The only thing programmers have to fear is... all of these things
            IT World, July 2nd, 2013
            "Software developer is generally considered a pretty good job, and with good reason. The pay and the perks are good (and can be really good), the work is challenging (usually in a good way) and, given the current supply of and demand for programmers, it's a pretty secure career. But all that, of course, doesn't mean that developers don't occasionally wake up in a cold sweat in fear of something bad happening at work... the top five answers to the question, 'What's your biggest fear as a programmer?'..."

            • Incompetent management and coworkers
            • Being forced to learn or use a specific technology
            • No longer liking my job
            • Losing my job
            • Screwing up

            Read on for details.

            Hiring vs. training: 6 things IT managers need to know
            IT World, July 1st, 2013
            "In a recent article we looked at doing a skill assessment of your IT teams and it raised a question that IT managers and CIOs have to deal with regularly. When do you hire and when do you train and groom internal IT professionals to take over the future needs of the business?

            The answer will vary depending on a number of variables, but to help sharpen the focus we collected these questions the expert say you need to ask to make the train or hire decision..."

            • How much time do we have to fill the gap that's been identified?
            • Is this a skills problem or a bandwidth problem?
            • Is it experience that's needed or skills?
            • How large is the gap?
            • Does the gap represent a short-term or a long-term need?
            • Is the gap valuable only in tandem with institutional knowledge?

            Read on for details.

              Ten Ways to Improve Employee Retention
              CIO Insight, July 1st, 2013
              "In a number of recent features, such as Demand for IT Pros Is On the Rise, we've reported how competitive talent recruitment has gotten. To just cite one report, seven of 10 CIOs say it's challenging to find skilled IT pros today... has come up with the following 10 ways to boost your department's retention:"

              • Mission Minded
              • Growth Curve
              • Big Picture Focus
              • Play Time
              • Open Ears
              • Esprit de Corps
              • Good Karma
              • Stand-Up Guy
              • Level Field
              • Discount Club

              Read on for details.

                20 People Who Changed Tech: Steve Jobs
                Information Week, July 1st, 2013
                "Maybe the best thing about Steve Jobs was that he wasn't officially an engineer. Think about it. Engineering teaches many very good habits: discipline, a cognitive way of thinking, a symbolic logic of problem solving.

                I've spent my entire career hanging with engineers, and no one appreciates their talents more than I do. But engineering can stifle creativity. From Day One, when they first open their cute little lab books, engineers live with a rigor; they want the world to be at a sort of intellectual attention. They want to order facts. They want to represent reality in a set of firm parameters..."

                  What Facebook posts will keep you from getting hired
                  IT World, July 3rd, 2013
                  "People have been aware for some time that employers often check out job applicants' social networks.

                  Now a new survey reveals what employers look for and what pictures and posts on Facebook could keep a prospective candidate from getting that perfect job..."

                  "Employers are using all the tools available to them to assure they make the correct hiring decision, and the use of social media continues to grow," said Rosemary Haefner, vice president of human resources at CareerBuilder. "For job seekers, it is essential to be aware of what information they're making available to employers, and to manage their online image."

                  IT - Social Media
                  x
                  14 Proven Ways to Connect With Customers
                  CIO, July 1st, 2013
                  "Today, there are more ways than ever to connect with customers. There's email, social media, mobile, meetings, focus groups, trade shows. The list goes on. But which ways are the most effective? CIO.com asked dozens of business owners, managers and customer relationship experts to find out. Following are their top 14 recommendations for how to connect with customers--and what makes those methods effective.

                  • Survey your customers
                  • Use newsletters
                  • Blog
                  • Pick up the phone
                  • Go visit
                  • Respond to email
                  • Send a personalized note or a postcard
                  • Be active on Twitter and Facebook.
                  • Use Instagram
                  • Offer webinars
                  • Empower salespeople
                  • Provide exceptional customer service
                  • Go mobile
                  • Monitor review sites

                  Read on for details.

                  Take Social Collaboration To Next Level
                  Information Week, July 2nd, 2013
                  "Going it alone doesn't work anymore, for companies or for individuals. With technology changing almost daily and increasing pressure to perform, success -- for the individual or the organization -- will depend upon the ability to amplify learning and accelerate performance improvement within large, diverse ecosystems.

                  The opportunity is to build environments -- "creation spaces" -- that combine the advantages of tightly-knit teams with the ability to scale to encompass increasing numbers of participants..."

                  Twitter etiquette: The do's and don'ts of tweeting
                  IT World, July 3rd, 2013
                  "Every so often you see a tweet that makes you cringe. Were you ever the one who wrote it?

                  With millions of people tweeting about their jobs, politicians, celebrities and even their favorite sandwich, it's easy to tweet without thinking or tweet in anger. Those thoughtless tweets can offend some and stir up an online hornet's nest..."

                    5 Secrets to Corporate Social Media Success
                    CIO, July 1st, 2013
                    "You don't need a big budget to be successful with social media, according to Walmart's director of social strategy. Here are five steps your business can follow to reap the benefits..."

                    • Determine What Your Value Is
                    • Understand Your Audience
                    • Don't Underestimate the Value of Good Content
                    • Get Creative in Your Metrics
                    • Work Your Data

                    Read on for details.

                      How To Declare Independence From Bad Social Media
                      Information Week, July 3rd, 2013
                      "Taxation without representation was the straw (or, at least, one of the straws) that led the colonists to declare independence from Britain. Of course, users of social media don't have as important a cause or as big a fight as our forefathers did. But as we get ready to celebrate the birth of our country, we can't help but think about the ways in which users should be declaring their own kind of independence from people and habits that are bringing them down on social media..."
                        IT - Virtualization
                        x
                        Top 10 virtualization killers
                        Federal Computer Week, July 1st, 2013
                        "There's a crisis brewing in federal virtualization, but it's not what you think.

                        Government's virtualization software isn't failing; it's just failing to see the light of day. Consider these numbers:

                        A shocking nine in 10 government desktop virtualization initiatives (VDI) never reach production. Worse, in seven out of 10 cases, paper studies topple the project before a pilot can even begin..."

                        • Cost
                        • Complexity
                        • Power
                        • Cooling
                        • Scaling
                        • Space
                        • Weight
                        • Politics
                        • Speculation
                        • Performance

                        Read on for details.

                        IT - Email
                        x
                        17 tips and tools to make Gmail better
                        InfoWorld, July 1st, 2013
                        "Live your life in Gmail? These tricks and add-ons will make Google's email service more powerful, productive, and pleasant to use..

                        • HelloSign
                        • Boomerang for Gmail
                        • Gmail labels
                        • Customizable addresses
                        • Gmail filters
                        • Copy2Contact
                        • Google Tasks
                        • Minimalist for Everything
                        • AwayFind
                        • Priority Inbox
                        • Keyboard shortcuts
                        • Canned Responses
                        • ToutApp
                        • Preview Pane
                        • Gmail Gadgets
                        • Embedded content
                        • Mute

                        Read on for details.

                        Cyber espionage moves out of the shadows
                        Help Net Security, July 3rd, 2013
                        "During the first half of 2013, AppRiver screened more than 15 billion messages, nearly 13 billion of which were spam and another 171 million that carried viruses. Once again, the United States was the leading country of origin for spam email messages, but to the surprise of many, servers in the former Soviet republic of Belarus logged the second-highest total from January through June..."
                          Storage
                          x
                          The Sun ZFS Storage Appliance
                          Better Performance, Greater Efficiency, Tighter Integration
                          Oracle's Sun ZFS Storage Appliance delivers higher performance, greater efficiency, lower TCO, and deeper integration with Oracle Database and Oracle Applications than NetApp's equivalent products.

                          Five Reasons to Choose Oracle's Sun ZFS Storage Appliance over NetApp:

                          • Performance - Get up to twice the performance for half the price of comparable NetApp solution
                          • Storage Efficiency - Achieve a 3x to 5x reduction in storage footprint
                          • Oracle Integration - Gain up to 3x better throughput in Oracle environments
                          • Simplified Management - Spend 36 percent less time managing your storage
                          • Systems Engineered Together - Experience seamless integration with storage developed for the Oracle stack

                          Oracle is integrating storage into its entire software and hardware stack to bring applications, data, and storage closer together. Oracle's goal is to help enterprises dramatically accelerate applications while using less physical storage capacity.

                          IT - Database
                          x
                          10 Most Common Security Vulnerabilities In Enterprise Databases
                          Dark Reading, July 1st, 2013
                          "Databases contain the largest -- and most sensitive -- store of enterprise data, making them a prime target for attackers. But it's often the enterprise's internal staff -- database developers, administrators, and even users -- who create the vulnerabilities that attackers exploit to compromise that data.

                          In this report, we look at how and why database vulnerabilities are created -- whether it's during the creation of a new database, during customization of an off-the-shelf application, or in the process of patching or updating the data. We examine the most common causes of database security vulnerabilities and recommend ways to prevent them..."

                          IT - Mobile
                          x
                          Why Mobile is Crucial to First American Title
                          Insurance & Technology, July 1st, 2013
                          "With the growing demand for tedious processes to become quicker and paperless, title insurers must make ordering titles paperless and quicker for Realtors, lenders and their clients.

                          That's what Larry Godec, CIO of Santa Ana, Calif.-based First American Title Insurance Company has gleaned from research of the insurer's core customers. First American launched the myFirstAm application, for realtors and lenders to check title and escrow status, review documents pertaining to the request, and calculate estimated title insurance and closing fees, a year and a half ago on iOS. A new Android version was released last week because, he says, research revealed that nearly half of its potential users were on that mobile platform..."

                          Occum's App: 5 Barriers To Mobile Simplicity
                          Information Week, July 1st, 2013
                          "The big banks are in a mobile arms race, constantly adding features to their already bloated flagship apps and misguidedly defining success by how closely their mobile capabilities match their more mature online offerings.

                          The unfortunate casualty is customer experience. What's lost on the big banks -- and most other large enterprises -- is that software should be so simple as to border on the obvious. It's a design imperative for mobile..."

                            IT - Big Data
                            x
                            Big Data Analysis Drives Revolution In Travel
                            Information Week, July 3rd, 2013
                            "Airlines, hotels and reservation sites are making the most of data to improve booking ratios, boost revenue yield and improve customer satisfaction.

                            "We're seeing tangible, pragmatic business benefits using big data, whether it's to increase the look-to-book ratio, decrease the cost of operations, boost revenue yields or increase customer satisfaction," says Herve Couturier, executive VP at reservation services giant Amadeus..."

                            Big Data Do or Die
                            Big Data Republic, July 1st, 2013
                            "Although big data is on the minds of just about everyone, IT departments are still struggling to find ways to capture, manage, make sense of, and ultimately get cash value from all this data and information we are accumulating.

                            Here are my top common-sense recommendations about big data and how to generate value from it by working within your means -- and with the tools, systems and skills you already have. The key: Everything needs to be evolutionary, not revolutionary.

                            First, beware of technology in search of problems. Identify the pressing problems first and then how to apply the new technology to address them..."

                            Getting on top of the Big Data life cycle
                            TechRepublic, July 2nd, 2013
                            "If we don't start thinking about how we are going to manage this incoming mass of Big Data in our data centers-where images, videos and documents are growing at a clip of 80 percent-we may never be able to lift our heads from under it...

                            Big data, like other kinds of data, has a life cycle-but how many organizations think about big data in this way? At this moment in time, probably not many.

                            To compare, it has taken us decades to get on top of data life cycles for standard transactional data with fixed record lengths coming from baseline 'systems of record' in the enterprise. Even now, it is not uncommon for IT to sit down with various business functions deemed to 'own' this data in order to determine both business and regulatory requirements for data retention and storage..."

                            What Unix can teach you about big data
                            IT World, July 1st, 2013
                            "I see a lot of headlines these days about "big data" and immediately identify. I think of all the big data problems that I've grappled with over the years and imagine what the key problems with managing big data will be as the data stores get larger and more diverse -- storage, manipulation, characterization, extraction of meaning (or "intelligence") ... There's a lot more to looking for needles in haystacks than folks might imagine. First, you've got to know what kinds of needles you're looking for and second, you need to know what kind of tools might help you find them..."
                            The Big Data Big Picture: The Full Lifecycle
                            Big Data Republic, July 2nd, 2013
                            "When most folks think of big data, they focus on one or perhaps two aspects: analytics and visualization or data acquisition.

                            They look at the tools and technologies that enable them to collect the data from multiple streams (data acquisition) or those that enable them to manipulate and review it. Anything else gets short shrift -- and that's a mistake.

                            In Nemertes' recent benchmark, during which we interviewed more than 200 IT professionals, we learned that a key success factor for Big Data is taking a "full lifecycle" approach. Organizations that do so are 50 percent more successful than those that don't..."

                            How To Balance BYOD And Big Data
                            Information Week, July 5th, 2013
                            "The bring-your-own-device-to-work revolution, a.k.a. BYOD, may make employees and executives happy, but it often means migraines for the folks in IT. End users love using their favorite smartphones and tablets at work, but IT is stuck with the arduous task of supporting multiple devices, safeguarding sensitive enterprise data, and generally making everything work together seamlessly.

                            This challenge is particularly acute in the small and midsize business (SMB) market, where IT staffs are already stretched thin. An expected increase in the use of big data applications, many of which use mobile devices as data-collection tools, may compound the problem as well..."

                            IT - BYOD
                            x
                            Will BYOD Give Rise to the Enterprise Genius Bar?
                            CIO, July 1st, 2013
                            "CIOs would do well to tap into Apple's retail flare and improve IT's sour relationship with the business side. Specifically, Apple's super-friendly Genius Bar fosters a cozy connection with patrons. This stands in stark contrast to the often hair-pulling customer interaction of a traditional help desk call.

                            So why not an enterprise Genius Bar at your company? "It's a good face lift," says Mike Burgio, vice president of managed services operations at Inergex, an IT services firm..."

                              Protect your company from BYOD security threats
                              Help Net Security, July 3rd, 2013
                              "With users wanting to connect their personally owned computers to corporate infrastructure, IT admins have to find the right balance between providing services, and securing access. BYOD can present significant risks to companies' IT infrastructures, as these devices can connect to services and data but aren't controlled by the company. If you are an admin dealing with BYOD, look at a cloud based patch management service to help secure BYOD computers.

                              Most admins think that devices they don't issue are beyond their control. That's not entirely accurate. With the right patch management software service, BYOD computers can be secured just like corporate owned devices are..."

                              10 tips and tricks for managing employee BYOD
                              Apps Tech News, July 2nd, 2013
                              "The BYOD (Bring Your Own Device) phenomenon is expanding at an incredible rate. It is something that affects every business, from the smallest to the largest. How each business is dealing with BYOD ranges from complete apathy to a full embrace of it with sophisticated processes and controls in place to maximize employee productivity while minimizing risk to the business.

                              The goal of this article is to give you the information you need to get control over how employees are using their own personal devices to access, store, and communicate business-owned information in the course of doing their jobs..."

                              Top10
                              x
                              Top Ten Articles for last few Issues
                              Vol 184 Issues 1, 2 and 3; Vol 183 Issues 1, 2,3, 4 and 5
                              We track how frequently each article is viewed on the web site to determine which the readers consider the most important. For last week, the top 10 articles were:

                              • Linux-Containers - Part 1: Overview
                              • Oracle Database 12c is Generally Available
                              • Salesforce.com and Oracle Announce New Strategic Partnership
                              • SuperCluster T5-8
                              • LibreOffice 4.0.4
                              • Boot Environments for Solaris 10 Branded Zones
                              • How to Set Up a MongoDB NoSQL Cluster Using Oracle Solaris Zones
                              • Oracle Virtualization Newsletter
                              • Java Spotlight Episode 138: Paul Perrone on Life Saving Embedded Java
                              • MySQL Enterprise Backup (MEB) 3.8.2

                              The longer version of this article has list of top ten articles for the last 8 weeks.

                                Sysadmin
                                x
                                Oracle Enterprise Manager 12c Release 3
                                Introduces Advancements in Cloud Lifecycle and Operations Management and Expanded Partner Ecosystem
                                Cloud adoption is on the rise across many industries as organizations are seeking the agility benefits inherent in cloud computing. However, private and public cloud service providers are not able to take full advantage of cloud because of inefficiencies in IT management. Oracle Enterprise Manager 12c Release 3 addresses these challenges with new enhancements for managing infrastructure, middleware, and applications, allowing IT service providers to be more agile while further reducing the costs and complexity of their cloud and enterprise IT environments.

                                Further extending its leadership in cloud computing, Oracle today announced general availability of Oracle Enterprise Manager 12c Release 3.

                                Now available for download, the release introduces unique capabilities for deploying and managing business applications in an enterprise private cloud, such as Platform-as-a-Service (PaaS), enhanced business application management, and integrated hardware-software management for Engineered Systems such as Oracle Exalytics In-Memory Machine and Oracle Exalogic Elastic Cloud.

                                Oracle Enterprise Manager 12c R3 fully supports Oracle Database12c, including new multitenant capabilities.

                                Networking
                                x
                                Oracle SDN (Software Defined Networking)
                                Data Sheet
                                Oracle SDN (Software Defined Networking) boosts application performance and management flexibility by dynamically connecting virtual machines (VMs) and servers to networks, storage devices, and other VMs. With it, you can gain the performance benefits of up to 80 Gb/sec server-to-server throughput and realize up to 19 times faster live migration, 12 times faster database queries, and 30 times faster backups than legacy systems. Oracle SDN provides virtual networking flexibility that costs 50 percent less than legacy networking systems.
                                Trending in
                                Vol 231, Issue 3
                                Trending IT Articles