News about Oracle's Solaris and Sun Hardware
System News
Jul 14th, 2013 — Jul 21st, 2013 Generate the Custom HTML Email for this Issue
System News System News for Sun Users
Volume 185, Issue 3 << Previous Issue | Next Issue >>
Sections in this issue:
click to jump to section

Availability Best Practices - Example configuring a T5-8
Notes for Oracle VM Server for SPARC (formerly named Logical Domains)
Jeff Savit writes, "This article continues the series on availability best practices. In this post we will show each step used to configure a T5-8 for availability with redundant network and disk I/O, using multiple service domains. Overview of T5

The SPARC T5 servers are a powerful addition to the SPARC line. Details on the product can be seen at SPARC T5-8 Server, SPARC T5-8 Server Documentation, The SPARC T5 Servers have landed, and other locations.

For this discussion, the important things to know are:

  • Each T5 chip (sometimes referred to as a socket or CPU) has 16 cores operating at 3.36GHz. Each core has 8 CPU threads. A server can have between 1 and 8 sockets for a maximum of 1,024 CPU threads on 128 cores. (Editorial comment: Wow!)
  • Up to 4TB of RAM.
  • Two PCIe 3.0 buses per socket. A T5-8 has 16 PCIe buses.

The following graphic shows T5-8 server resources. This picture labels each chip as a CPU, and shows CPU0 through CPU7 on their respective Processor Modules (PM) and the associated buses. On-board devices are connected to buses on CPU0 and CPU7..."

New feature development for SunRay Software and Hardware, VDI, OVDC Ended
Oracle Desktop Virtualization Products Update
Monica Kumar writes, "In an effort to more tightly align Oracle's future desktop virtualization portfolio investments with Oracle Corporation's overall core business strategy, we have ended new feature development for Oracle Sun Ray Software (SRS), Oracle Virtual Desktop Infrastructure Software (VDI), Oracle Virtual Desktop Client (OVDC) Software, and Oracle Sun Ray Client hardware (3, 3i, and 3 Plus).

Customer support and the renewal of support contracts for these products will continue uninterrupted. Customers can continue to purchase new licenses. Exact time-frames for a last order date for Oracle Sun Ray client devices will be announced shortly.

Going forward, Oracle's desktop portfolio investments will be focused on continued development and new enhancements to both Oracle Secure Global Desktop and Oracle VM VirtualBox software."

IT - Storage
Good Migrations - Moving Data from SAN to SAN
Storage Switzerland, July 18th, 2013
"Either as part of a normal storage refresh cycle or when consolidating storage assets after a merger, almost every data center will eventually need to migrate data from one storage system to another. The problem is that data migrations are often performed reactively rather than executed from a well planned process. Ideally, data migration should be a core infrastructure element that is future proofed. Once this foundational element is in place, data can then be migrated from any storage system to any storage system while maintaining data integrity and not impacting application availability..."
Electronics that Will Be "Born To Die"
Network World, July 15th, 2013
"The idea behind 'Born to Die' electronics is that mpst gadgets now have pitifully short lives. Tech products such as cell phones and pads now have useful lives measured in months and the result is landfills and recycling facilities overwhelmed with electronic gadgets that need to be broken down and safely disposed of.

Researchers at the University of Illinois at Urbana-Champaign have begun a program to create electronics that can be dissolved by simply immersing them in water..."

    How Organizations Can Benefit from Evolving Storage Trends
    Information Week, July 15th, 2013
    "Storage for IT companies today is being driven by the big trends such as automation, flash and convergence. The larger factors driving these trends are: the accelerating growth of data to be stored, currently averaging 50 percent per year, and the limited storage budget increases for IT departments, currently averaging in the low single-digits. It's the classic case of having to do more with less, and more often than not, everything else becomes secondary.

    Most IT professionals today feel that storage is too complex, hard to manage and expensive. According to a Forrester Consulting study conducted on behalf of Dell, the vast majority of IT organizations are seeking storage that is simpler to manage and uses automation to free up staff members for more-strategic tasks. The survey of 839 IT professionals showed that 74 percent of IT leaders and 66 percent of storage administrators believe that storing and managing data is too complex today. Keeping up with the storage trends mean more benefits to organizations in terms of cost and efficiency...."

    Six Hybrid Storage Tips
    Enterprise Storage Forum, July 15th, 2013
    "Should you stick with hard disk drives (HDDs) or move towards solid state drives (SSDs)?

    Many are pondering that question. For some, the answer might be all flash; for others it could be to remain on disk. But for most, these days the solution probably lies somewhere in between, on a platform that known as hybrid storage that offers some disk and some flash.

    Here are some pointers to help you decide..."

    • Check Out Real Cost per GB
    • Consider Scalability
    • Fit the Array to the Application
    • Match the Array to the Topology
    • It's Not Just About Performance
    • Don't Overdo Flash

    Read on for details.

    Why Data Storage Technology is Pretty Much PERFECT
    The Register, July 15th, 2013
    "Reliable data storage is central to IT and therefore to modern life. We take it for granted, but what lies beneath? Digital video guru and IT author John Watkinson gets into the details of how it works together and serves us today, as well as what might happen in the future. Brain cells at the ready? This is gonna hurt.

    Digital computers work on binary because the minimal number of states 0 and 1 are easiest to tell apart when represented by two different voltages.

    In a flash memory, we can store those voltages directly using a clump of carefully insulated electrons. But in all other storage devices, physical analogs are needed..."

    IT - Technology
    Small, Electric-Powered Nano-Lasers May Help Keep Moore's Law Valid
    Network World, July 16th, 2013
    "Some experts believe that the idea behind Moore's Law -- that the number of transistors embedded on integrated circuits would double about every two years -- will ultimately fail as the difficulty of shrinking such technology any smaller will cause all sorts of untenable problems.

    But a research team with Arizona State University this week said a seven year project has culminated with an electrically powered nano-laser that would let developers put ever more lasers into the same space, to achieve far greater processing speeds and ultimately making it makes possible to build future generations of computers that would comply with the Moore's Law theory..."

      The Next Big Thing in 3D Printing: Liquid Metal
      InfoWorld, July 15th, 2013
      "Among emerging technologies, 3D printing is very en vogue, but researchers at North Carolina State have seen the future, and it looks like an even cooler -- not to mention real -- James Cameron special effect: liquid metal. No, you can't print up your own T-1000 (yet), but the technology still is quite impressive. As the above video shows, the metal is pushed out of a syringe needle and forms a ball with a solid skin upon extrusion..."
      The Case for Running Oracle Database 12c on Oracle Solaris
      By Rick Ramsey
      Rick writes, "You may have already seen some of these individually, but here are several resources that explain why Oracle Database 12c runs so well on Oracle Solaris and SPARC..."

      Rick provides links under the headings:

      • Oracle Solaris 11 + SPARC
      • Oracle Solaris 11 + Oracle Database 12c
      • Oracle Solaris 11 + Oracle Stack
      • Article: How Oracle Solaris 11 Makes Oracle Database So Fast
      • Screencast: Outliers

      These interviews "with experts, videos, architectural papers, technical articles, and other resources to help you understand the optimizations between the OS and hardware layers that make Oracle Solaris and SPARC such a winning combination..."

      IBM AIX to Oracle Solaris Technology Mapping Guide
      Preparing for the Move to Oracle Solaris 11
      Aimed at technical IT managers, IT architects, and system administrators tasked with moving - or evaluating the move - to Oracle Solaris, this guide compares the key tools and technologies commonly used in AIX 7.1 environments with those used in Oracle Solaris. Different concepts, processes, and technologies that are essential to successful Oracle Solaris platform deployment are identified. For each topic area, AIX features and tools are mapped to their Oracle Solaris 11 counterparts, with discussion centering on similarities and differences in functionality to help technical staff quickly identify where appropriate, equivalent resources (product and technology information, manuals, and training) are needed to support deployment.
      Cloud Computing
      Read about the Cloud and the Oracle user experience
      By Jürgen Kress

      Juergen writes, "Consumers have already seen the benefit of a cloud approach with tailored, consumer-driven experiences. Find out what that means for Oracle's enterprise applications on the Voice of User Experience, or VoX, blog.

      Want to hear more about the Oracle Cloud and other UX innovations? UX architect Misha Vaughan writes about what Oracle Apps UX is sharing with the team's Sales Ambassador (SAMBA) representatives in this post on VoX.

      Spot the Oracle user experience design pattern Visit this post by Ultan O'Broin, Director of User Experience, to go design-pattern spotting in the Oracle Fusion Mobile Expenses app. O'Broin also takes a different angle on design patterns and talks with Oracle partner Innowave Technologies about how they used design patterns in this post on the Usable Apps blog..."

      Oracle Continues Linux Leadership in the Enterprise
      Customer and Partner Momentum Enable Oracle Linux to Achieve Fastest Growing Enterprise Linux Status
      Oracle says in a press release that, "Oracle Linux is addressing the demands of advanced enterprise workloads as organizations need to ensure a stable, flexible architecture for their critical applications and systems. The fastest growing enterprise Linux, Oracle Linux brings the latest Linux innovations to market, delivering extreme performance, advanced scalability, and reliability along with worldwide, enterprise-class, low-cost support. With record adoption and certifications, Oracle Linux has become the Linux distribution of choice for leading customers and partners worldwide...."
      How to Initialize an Oracle Linux System
      SUSE Linux to Oracle Linux Migration Guide

      Manik Ahuja and Kamal Dodeja write, "This article is Part 1 of a six-part series whose goal is to give SUSE Linux administrators a quick way to understand and perform day-to-day system administration tasks on Oracle Linux.

      The series outlines similarities and differences in major areas of Linux system administration such as file system differences, boot-up sequence, setting up commonly used daemons such as mail and Web, and package management. Throughout the series, you will find actual configuration examples, complete with the steps required to achieve a particular objective. The examples are repeated for both Oracle Linux and SUSE Linux.

      After reading the series of articles, you should be able to not only distinguish the subtle differences between the two operating systems but also perform your daily duties with ease. The series will also help you mitigate any risks related to migrating from SUSE Linux to Oracle Linux..."

      IT - Cloud
      Cloud Computing Swallowing Up Branch Office Hardware
      CIO, July 16th, 2013
      "The popularization of cloud computing and ubiquitous access to high-speed Internet connectivity mean that the days of the specialized branch office IT appliance are numbered, according to industry sources.

      Instead of providing apps and services directly to branch offices using dedicated hardware at both ends of the connection, virtualized networks can emulate that functionality across the public Internet..."

      After Major Disasters, Geospatial Cloud to the Rescue
      GCN, July 15th, 2013
      "An industry/government consortium has begun testing a cloud infrastructure that will demonstrate how a coalition of organizations can share geospatial information as they respond to natural disasters around the world.

      The Network Centric Operations Industry Consortium (NCOIC) is working with six member companies to produce a real-time simulation for the National Geospatial-Intelligence Agency of a scenario similar to the response that occurred after the 2010 Haiti earthquake. Using unclassified NGA information, the project is designed to show how different technologies and data sources from a variety of organizations can support a unified mission..."

      Will Cloud Services Follow the Evolution of the Banking Industry?
      ComputerWeekly, July 15th, 2013
      "Security remains one of the main reasons many organisations are holding back from adopting cloud services, but service providers say security will become the very reason companies choose cloud services in future.

      Google, Microsoft, Verizon and most other cloud service providers commonly argue that they are able to provide better security than any individual customer organisation could on its own.

      The banking industry provides a useful analogy..."

      Why You Should Care About Multicloud
      InfoWorld, July 15th, 2013
      "The use of cloud-based platforms in the technology industry continues to evolve into more complex arrangements. Why? The business world now demands a mix of many best-of-breed cloud services to form the optimal solution. The answer is proving to be a concept called 'multicloud.'

      What is multicloud? It's more complex than a hybrid cloud, which is typically a paired private and public cloud. Multicloud add more clouds to the mix, perhaps two or more public IaaS providers, a private PaaS, on-demand management and security systems from public clouds, private use-based accounting -- you get the idea..."

      IT - CxO
      Corruption in Business and the Importance of Ethics
      Wall Street Journal, July 15th, 2013
      "I once needed to negotiate an important deal with potential significance for my products. An official at the company I was dealing with demanded that I give his spouse stock in my firm in return for his support. A stock gift could have led to millions in sales. If I declined, we would lose the business opportunity.

      I was totally dumbfounded. In other parts of the world, propositions like this one are common business practice. But this was happening in America..."

        Data Collection And Analysis Methods: A Strategy Quiz for CIOs
        Search CIO, July 15th, 2013
        "New and evolving data collection and analysis methods are really picking up steam -- and admirers -- in enterprise organizations, as business leaders come to recognize the value inherent in their trove of business intelligence (BI). It's often up to CIOs and their IT staffs to determine what data to collect and analyze, what value it carries and how it can be applied to enhance business operations.

        In this era of big data and analytics, does your IT organization have a handle on all things data?..."

        How to Hire Telecommuters: 7 Must-Ask Questions
        IT World, July 15th, 2013
        "Hiring remote workers can be tricky business. Here are some questions you should ask would-be telecommuting employees -- and some red flags to look for in the answers:"

        • Have you ever telecommuted before?
        • Tell me about your (home) work environment.
        • How comfortable are you with troubleshooting connectivity?
        • Tell me about your daily work rituals.
        • How do you prefer to communicate with colleagues?
        • Tell me about your remote project tracking experience.
        • What are your concerns about working for this team as a telecommuter?

        Read on for details.

          10 Ways to Be an Authentic IT Leader
          CIO, July 15th, 2013
          "If you follow the news you can find a litany of examples of poor leadership. People are distrustful or cynical of today's leadership and many times with good reason. That's why being an authentic leader is so important. Getting all your people onboard and moving in the same direction is paramount to success in the fast-paced environment of IT..."

          • Know Thyself
          • Lead With Integrity
          • Lead with Vision
          • Have a Clear Strategy (and Execute on It)
          • Be a Better Listener
          • Be Transparent
          • Be Consistent
          • Keep Growing and Measure Your Progress
          • Draw on Your Experiences
          • Share Your Successes
          • The Road Less Traveled

          Read on for details.

            Is Innovation on the CIO Agenda?
            Information Week, July 17th, 2013
            "Where do CIOs stand in the corporate innovation agenda? Are they leading or participating in the program or are they bystanders?

            Innovation has always been a mystery to me; I mean what triggers innovation, how do people come up with ideas that result in innovation, why do some companies innovate more than others, what enables companies to create an innovation culture..."

              Unengaged Employees Hurt the Bottom Line
              Baseline, July 17th, 2013
              "The vast majority of employees are not engaged at work, and quite a few have such negative feelings about their job that they have the potential to disrupt productivity and bring down co-worker morale. Some may even steal from their employer. These and other findings are revealed in the latest "State of the American Workplace" report from Gallup. Managers should pay heed to these results, which indicate that a fully engaged employee has a positive impact on the bottom line. So how does Gallup distinguish between engaged employees and disengaged ones? ..."

              • Short List
              • Regional Differences
              • Bad Seeds
              • Expensive Proposition
              • Strong ROI
              • Top Engagement Firms Do Better in Three Areas
              • Bump Up
              • On a Roll
              • Bland Brand
              • Quality, Not Quantity

              Read on for details.

                CIOs again see employees as biggest cyber security threat
                Enterprise Apps Tech, July 17th, 2013
                "For more than half of executives, the greatest threat to sensitive corporate data stems from the company's own employees, rather than external forces.

                The report from IT Governance, entitled the 'Boardroom Cyber Watch', examined over 250 responses from a wide variety of sectors globally, ranging from technology, to healthcare and financial services. 53% of those polled said employees were the greatest risk to company data, ahead of criminals (27%) and competing organisations (8%)..."

                The keys to information interoperability
                Federal Computer Week, July 15th, 2013
                "Information superiority is critical to our nation's future, particularly in the realms of defense and homeland security. But beyond access to more types of information than one's adversary, that superiority also requires the ability to process that information faster and more efficiently.

                America's information capital is vast. Yet technological obstacles and territorial mind-sets at agencies thwart efforts to bring to bear the full power of all the information residing in federal databases..."

                Oracle Exalytics In-Memory Machine X3-4
                Features significant software enhancements and hardware updates
                Oracle announced a new release of Oracle Exalytics In-Memory Machine X3-4. The new system features significant software enhancements and hardware updates, dramatically expanding the capabilities of the industry's first high-speed engineered system for business analytics.

                The new Exalytics X3-4 system features 2 TB of main memory, 2.4 TB of flash storage, and 5.4 TB of hard disk. Oracle also released system upgrades to increase memory capacity for existing Exalytics X2-4 customers, and updated software for all Exalytics customers.

                Oracle Exalytics X3-4 system has been designed to provide organizations with a data driven competitive advantage by providing a packaged solution to manage the ever increasing volume, scale and scope of business questions that require real-time answers. Specific optimizations have been made to accelerate the platform's ability to handle strategic business questions in the areas of advanced planning, data discovery, scenario modeling, burst reporting and what-if analysis.

                IT - DR
                Some data center operators take their chances with floods
                ComputerWorld, July 15th, 2013
                "Given the dire warnings about climate change, some business leaders and IT professionals are pondering this question: How should data center managers handle the crop of so-called 100- and even 500-year storms, coastal floods and other ecological disasters that climatologists predict are heading our way?

                Some experts suggest that managers of mission-critical data centers simply need to harden their existing facilities, other observers say data centers need to be moved to higher ground, and a third group advises data center managers to pursue both strategies..."

                5 Reasons Your Employees Don't Care About Business Continuity
                Information Week, July 15th, 2013
                "You've spent months drafting, refining and testing your business continuity plan... Let's look at five reasons your company's employees don't care about business continuity, and ways to make it work anyway:"

                • They have no idea that a plan exists
                • They don't understand the meaning of 'disaster'
                • They are creating new venues for business-critical data outside of the plan
                • They weren't even covered in the plan
                • They have their own disaster at home

                Read on for details.

                IT - PM
                Getting Derailed Projects Back on Track
                TechRepublic, July 15th, 2013
                "Even experienced PMs need help recovering troubled projects. This series gives you a structured process to assess the situation, determine whether recovery is possible, and turn the project around.

                Projects often go crazy and veer off track. Project managers can make project course corrections by developing a structured process that lets them assess the situation, determine whether recovery is possible, and turn around the project..."

                  Fixing a Troubled Project
                  NASA, July 15th, 2013
                  "The three main areas that can lead a project down a slippery slope are team dynamics, technical development issues, or those things outside the project's control - external support, problems, or direction.

                  Dealing with technical development is a challenge that we engineers and scientists embrace, though we often underestimate the difficulties and do not allow adequate cost and schedule to develop the technology. Dealing with issues outside our control is always difficult, as we constantly face the challenges of budget cuts and delays pushed on us by the powers that be. I think we need to learn to say, 'No, we cannot give you the same program requirements with less funding, inadequate cost reserves, or less time.' If they want the original requirements, they must provide the resources needed...."

                    IT - Networks
                    How To Avoid The Complexity Risks Associated with Next-Generation Firewalls
                    Continuity Central, July 15th, 2013
                    "Next-generation firewalls can be a real headache for the IT department; Sam Erdheim shows how to maximise security while avoiding the complexity that such firewalls can bring.

                    Evolution isn't an easy process. Take firewalls, for example: increased mobility, virtualization, security consolidation and the rise of more sophisticated threats, have caused the stateful firewall to evolve into the next generation firewall (NGFW). These support additional policy granularity and control, including application control, intrusion prevention systems (IPS), anti-malware, email security and more.

                    But this comes at a cost: added complexity..."

                    Nine Traits of the Veteran Network Admin
                    InfoWorld, July 15th, 2013
                    "A few years ago, I wrote a somewhat tongue-in-cheek piece detailing nine traits of the veteran Unix admin. It enjoyed quite a reception and sparked all kinds of debate across the Internet, with people discussing each trait point by point and sparking skirmishes between rival factions. Since then, I've thought about giving network admins the same treatment, but never got around to it. It seems that this is the week. Here are a few of the many traits of the veteran network admin..."

                    • We already know it's down
                    • If we don't know it's down, it's probably not down
                    • We will ping and test several times before digging into the problem
                    • Believe it or not, we've tried turning it off and back on again
                    • During an outage, we're not just staring at the screen -- we're following a path in our heads
                    • We calculate subnet masks and CIDR as easily as breathing
                    • We do not tolerate bugs; they are of the devil
                    • We can read live packet streams and write highly complex filters in our sleep
                    • We take big risks all the time

                    Read on for details.

                    The SDN Misunderstanding
                    IT Web, July 15th, 2013
                    "One of the more surprising aspects of 2013 has been the rush by IT industry professionals to join the SDN (software-defined networking) bandwagon.

                    Investors are buying into start-up companies which have proliferated. They are encouraging early adopters to join the party. All this without a clear understanding of SDN, its true role in the industry, or its future direction..."

                      Using Network Flow Analysis to Improve Network Security Visibility
                      Search Security, July 15th, 2013
                      "For years, security professionals have debated whether outsiders or insiders pose the bigger risk. Today, this argument is moot: The threat is all around us because the network demarcation line has blurred.

                      For instance, insiders may work from home and telecommute; employees may take advantage of BYOD, while business partners and sales staff often have access to mission-critical cloud-based services. It's getting harder than ever to know who is on the network at any given time, using any number of devices to access services, systems and data. All this is occurring while attackers are adapting to these new technologies while using them to bypass traditional defenses.

                      In order to overcome these security risks and gain better insight into who is on the network, security professionals have turned to network flow analysis to improve network security visibility..."

                      IT - Operations
                      8 Things You Should Know About DevOps
                      Network Computing, July 15th, 2013
                      "Called a cultural and professional movement, DevOps seeks to better integrate development and IT operations teams to accelerate application delivery. Read on to find out what the DevOps movement is about and the benefits it can provide enterprise organizations..."

                      • DevOps: Ending Old Conflicts
                      • Cooperation And Communication
                      • DevOps !=  Agile Development, But It Does Enable It
                      • Day-To-Day Improvements Through DevOps
                      • Speed And Quality Get A Boost
                      • Amazon's Amazing Results
                      • DevOps Helps Increase Deploy Frequency
                      • DevOps Improves Change Failure Rates

                      Read on for details.

                      Bringing Cloud Storage to the Tier 2 Data Center
                      Storage Switzerland, July 15th, 2013
                      "Unstructured data is file based data that is most commonly associated with user productivity applications like word processing, spreadsheets and presentation files. But unstructured data also includes rich media from training videos, photos, CAD-CAM drawings etc., plus the data created by surveillance cameras, GPS locators and other device sensors. All these types of file data can be critical to the enterprise and often need to be stored for long periods of time as well.

                      The net result is millions if not billions of files that must be saved, protected and kept available for rapid retrieval. The size and quantity of these files is bringing traditional file-system based solutions, like file servers and network attached storage devices (NAS), to their breaking points..."

                      '1 + 1 = 3': The Synergy between the NEW key technologies
                      Network World, July 15th, 2013
                      "As noted last time, just as the Next-generation Enterprise WAN (NEW) architecture is enabling IT to take advantage of 'the cloud' - SaaS, public and hybrid cloud computing - so the cloud is enabling the next generation enterprise WAN. The ecosystem of the new way of doing computing combines with the new way of building enterprise WANs in a synergistic, 1 + 1 = 3 fashion..."
                      How to Ensure Environmental Compliance for IT Asset Disposal
                      Yahoo! Small Business Advisor, July 15th, 2013
                      "The process of disposing of retired IT assets is fraught with risk. One of the most risky elements of IT asset disposal is compliance with state and federal environmental regulations. On top of regulatory obligations for environmental compliance is the public relations disaster that could occur if your company's assets were discovered moldering in a landfill, leaching toxic material into the surrounding environment, or even worse, processed under unsafe working conditions at an overseas dumping ground..."
                        It's Getting Warmer in Some Data Centers
                        ComputerWorld, July 15th, 2013
                        "With major parts of the U.S. under an intense heat wave, opting for less cooling may seem like a bad idea. But it isn't.

                        The U.S. General Services Administration, as part of data center consolidation and efficiency efforts, has recommended raising data center temperatures from 72 degrees Fahrenheit to as high as 80 degrees. Based on industry best practices, the GSA said it can save 4% to 5% in energy costs for every one degree increase in the server inlet temperature.

                        But how many data centers are near the upper data center limit recommended by the American Society of Heating, Refrigerating and Air-Conditioning Engineers (ASHRAE) of 80.6 degrees?

                        Not many, it turns out..."

                          No Need for Crystal Balls
                          IT Web, July 18th, 2013
                          "How many times do people stand in a shop and say: 'The service is a bit slow in here'? Chances are, they walk out - deciding not to go there again; and even go so far as to advise friends and work colleagues to avoid the place. Then they move on to 'blame apportionment' - who to blame? They may start with the shop management - surely they could plan better for busy times? Customers may also cut them a little slack with the excuse that maybe they didn't expect that many patrons midweek and were not appropriately staffed..."
                          IT - Security
                          Most Enterprise Networks Riddled with Vulnerable Java Installations
                          ComputerWorld, July 18th, 2013
                          "Despite the significant Java security improvements made by Oracle during the past six months, Java vulnerabilities continue to represent a major security risk for organizations because most of them have outdated versions of the software installed on their systems, according to a report by security firm Bit9.

                          Bit9's report was released Thursday and is based on data about Java usage collected from approximately 1 million enterprise endpoint systems owned by almost 400 organizations that use the company's software reputation service..."

                          Can your IP address give away your identity?
                          Network World, July 16th, 2013
                          "In today's world of hackers, stalkers and cybercriminals, not to mention government spy programs and commercial sites that collect information about you for advertising purposes, is there a way to surf the Web and keep your privacy intact? Or does that mere fact that you have an IP address mean that your identity is out there for the taking?

                          Turns out, there's no easy answer to this question..."

                            Metrics: Valuable Security Indicator or Noise?
                            Help Net Security, July 18th, 2013
                            "Many organizations believe that IT, and by association IT security, is a wasted expense. They recognize that the financial investment needs to be made but few truly understand what they're rubber-stamping, and even less believe they'll see a return on this outlay. But it doesn't have to be this way. How can security support revenue growth and profitability? The secret is metrics...."
                            The One Security Technology that Actually Works
                            InfoWorld, July 16th, 2013
                            "Antivirus, perimeter defense, and network monitoring are jokes. But whitelisting works once you clear the political and logistical hurdles ...

                            To decrease security risk, most companies try to do too much. They have dozens of "top priority" security projects, few of which they ever complete and even fewer that are done well. The irony: Little of that activity addresses the threats most likely to compromise an enterprise.

                            The No. 1 defensive measure any company can take is to prevent unauthorized programs from running on any computer. Most often, bad guys break into companies through holes in unpatched software -- and when they do, they almost always end up running hacking tools. Prevent those hacking tools from running and you'll reduce risk by 99 percent..."

                            Security Manager's Journal: Suddenly, Our Firewall Audit can't Wait
                            ComputerWorld, July 18th, 2013
                            "A comprehensive audit of our firewalls just moved up on my list of priorities. The urgency arises from a recent incident that, fortunately, wasn't as bad as it could have been.

                            Around the world, we have over 60 individual firewalls. We use a centralized platform for managing the rules and baseline configuration, but it's still important to audit every firewall to track down the inevitable inconsistencies. We had scheduled that audit for later this year, but now we're planning to do it much sooner..."

                            IT - Careers
                            4 Rules for Naming Your Files
                            IT World, July 17th, 2013
                            "Ever seen a file with "Final Final" in the name or, better yet, "Final Final USE THIS ONE"? You've probably been a victim of poor file naming before or committed these crimes yourself. Poorly named files, whether you share them with others or not, just make it harder and more frustrating for you to retrieve those files later--and isn't that the point of saving your files anyway? Here are a few rules and tips for naming your files properly..."
                              7 Ways to Conquer Impostor Syndrome - Lessons from Successful Business Leaders
                              Sources of Insight, July 18th, 2013
                              "Joyce Roche is the author of The Empress Has No Clothes: Conquering Self-Doubt to Embrace Success, where she shares her story about what she learned from her life-long struggle with impostor syndrome.

                              If you're not familiar with the impostor syndrome, it's when you feel like a fraud, despite your external success.

                              You're unable to internalize your success..."

                              • Don't suffer in silence
                              • Do a reality check.
                              • Learn to see and accept others as they are
                              • Learn to accept external validation
                              • Build alliances with like-minded people
                              • Develop a sense of humor
                              • Live the life you want

                              Read on for details.

                                Job Market Bodes Well for IT Professionals
                                CIO Insight, July 15th, 2013
                                "Dice, the company that tracks the IT job market, has some good news for professionals: the second half of 2013 is going to be an awfully favorable period for technology professionals. Things are so good, in fact, that companies are willing to invest an inordinate amount of the cash in their constrained budgets on new technology professionals..."

                                • Hiring Is On the Rise
                                • The Economy Is Coming Back
                                • But Not Everyone Is So Sure
                                • Where Are You Going?
                                • IT Pros Are Getting a Little Picky
                                • Pay Is Still a Deal Breaker
                                • A Little Cheap, No?
                                • Full-Timers In High Demand
                                • Hiring Time Is On the Rise
                                • Others Are Hiring More Quickly

                                Read on for details.

                                  Love Your Work, Or Sing The Dinosaur Blues
                                  Information Week, July 17th, 2013
                                  "I'm back from this year's World Domination Summit (WDS), an event for "amazing people with big plans," essentially a micropreneurship conference that focuses on creating personal success. Once again, it was an incredible event. So why am I blue?...

                                  Any organization, especially an IT organization, needs old dogs who can learn new tricks. But first, you need to be happy at work, in an age where Dilbert and Office Space seem to be more like reality shows than parodies..."

                                    High-tech heroes and zeros: 2013's best and worst so far
                                    InfoWorld, July 15th, 2013
                                    "It's the midyear point (give or take), which means it's time look back at the first six months of 2013 and say, Is it July already? How the heck did that happen? Am I really that old? And has anyone seen my reading glasses?

                                    It's also a good excuse to look at the people who've made the first half of this year both interesting and exasperating. Here are my picks for the biggest heroes and zeros of 2013, so far..."

                                    • Hero: Ed Snowden
                                    • Zero: Elon Musk
                                    • Hero: John McAfee
                                    • Zero: Glassholes
                                    • Hero: Kim Dotcom
                                    • Zero: Wanda Lee Ann Podgurski
                                    • Hero: Judge Otis D. Wright II
                                    • Zero: Sean Parker

                                    Read on for details.

                                      Trust Me with Your Secrets
                                      Help Net Security, July 17th, 2013
                                      "For little over a month, revelations about NSA wiretapping schemes have been hitting the news and and rattling the world.

                                      The fact that the NSA has access to so much data about you is scary and bad. The fact that they denied collecting said data is even worse. Still, we should not be surprised.

                                      IT technology makes it easy to transfer, store and compute information. Thanks to IT, we are able to communicate faster, cheaper, safer and, in general, with more people than ever before in history of communication..."

                                        IT - Social Media
                                        18 Signs You're a Seriously Terrible Social Media Manager
                                        IMA, July 16th, 2013
                                        "Social media is the most amazing thing to hit the marketing world in decades. It's nearly free, especially if you're not spending enormous amounts of time on it. You can reach plenty of people, which makes you nearly famous, if you think about it. Plus, Twitter and Facebook are so hot right now, which means you don't need to do much of anything to market with them. Essentially, you just have to show up..."

                                        • Auto Posting
                                        • Link Accounts
                                        • Same Content on All Channels
                                        • No Engagement Necessary
                                        • No Follow-Back Girl (Or Guy)
                                        • Blogging Is Boring
                                        • LinkedIn Is for Losers
                                        • All Eyes on You
                                        • More Brownie Recipes, Please
                                        • DistractionTube

                                        Read on for details.

                                        Careless Social Media Postings Can Cost You a Job
                                        Baseline, July 15th, 2013
                                        "You are what you post. At least, that's what a large number of hiring managers think, according to a CareerBuilder survey. They're actively engaging in thorough searches of social media sites to get a sense of how job candidates present themselves..."

                                        • Deal-Killer
                                        • TMI
                                        • Substance Issues
                                        • Poor Form
                                        • Unfortunate Phrasing
                                        • Personal Prejudices
                                        • Tall Tale
                                        • Socially Skilled
                                        • What to Do on Social Media to Get Hired
                                        • Big Endorsement

                                        Read on for details.

                                          IT - Virtualization
                                          Virtualizing Hadoop Impacts Big Data Storage
                                          Enterprise Storage Forum, July 17th, 2013
                                          "Hadoop is soon coming to enterprise IT in a big way. VMware's new vSphere Big Data Extensions (BDE) commercializes its open source Project Serengeti to make it dead easy for enterprise admins to spin and up down virtual Hadoop clusters at will.

                                          Now that VMware has made it clear that Hadoop is going to be fully supported as a virtualized workload in enterprise vSphere environments, here at Taneja Group we expect a rapid pickup in Hadoop adoption across organizations of all sizes..."

                                          IT - Compliance
                                          Hospital Fined After Hard Drive Full of Patient Data Bought on eBay
                                          TechWorld, July 15th, 2013
                                          "The ICO has hit NHS Surrey with a 200,000 GBP ($300,000) fine after a 'shocking' lapse allowed a member of the public to buy a hard drive containing the records of 3,000 patients that had supposedly been sent for secure destruction.

                                          The issue came to light when the individual contacted the former NHS Trust in May 2012 after using recovery software to reveal the records of 2,000 children and 900 adults on a second-hand drive inside a PC reportedly bought on eBay..."

                                            Warning Bells for an Enforcement Tsunami? Regulators and CPOs Weigh In
                                            iapp, July 17th, 2013
                                            "In recent weeks, various European regulators have come down on Google for its policy on data collection. The UK's Information Commissioner even went so far as to tell the company it had until September 20 to revise the policy or face 'formal enforcement action.' Hamburg Commissioner for Data Protection and Freedom of Information Johannes Caspar has said his office will join European regulators, including those from France and Spain, in taking action against the company.

                                            We are expecting a tsunami of privacy enforcement...."

                                            IT - Email
                                            Email Encryption And The Goldilocks Principle
                                            Network Computing, July 15th, 2013
                                            "The other day I decided to add two-factor authentication to my online password safe. The authentication device, which is powered by a USB port, worked fine the first few days. Then one morning, it didn't. No matter what USB port I plugged it into, it wouldn't power up and generate my one-time password. About the time I was about to throw the key and my laptop out the window, I remembered reading about occasional compatibility issues between USB 2 and 3 devices. So I checked online for patches for the laptop and the key, but didn't find anything. I finally took the computer professionals' path of last resort: a reboot. Voila! The key worked again. I thought to myself, Why does this still have to be so difficult?..."
                                              Email Security: Perception vs. reality
                                              Help Net Security, July 17th, 2013
                                              "When it comes to email security in the workplace, 98 percent of employees believe they demonstrate either equally secure or more secure behaviors than their colleagues.

                                              SilverSky's study examines corporate email security habits and perceptions, and is based on a survey of 119 business professionals at U.S. organizations across a variety of industries..."

                                              How to Write Eye-Catching Email
                                              IT World, July 17th, 2013
                                              "If you're job-searching or networking, 9 times out of 10 your primary form of communication is e-mail.

                                              Alexis Grant at offers these four steps to writing networking or job-searching messages that people will read and, more importantly, remember..."

                                              • Be succinct
                                              • State what you want
                                              • Do your research
                                              • Use flattery

                                              Read on for details.

                                                Why the Enterprise Can't Shake Its Email Addiction
                                                ComputerWorld, July 15th, 2013
                                                "Atos CEO Thierry Breton caught a lot of flak last year when he announced he wanted his employees to give up email, but he may have been onto something.

                                                Kids these days don't use email -- digital market research company comScore found that use of Web-based email dropped 31% among 12- to 17-year-olds and 34% among 18- to 24-year-olds in the period between December 2010 and December 2011.

                                                And consumers in general are also off email. The Radicati Group, which tracks use of email and other messaging media, projects the number of consumer emails will decrease by 3% to 4% each year between 2012 and 2016 (see chart, below right)..."

                                                  ZFS Storage Appliance Compression vs Netapp, EMC and IBM
                                                  Darius Zanganeh Says Enable Compression by default
                                                  Darius Zanganeh addressees Oracle ZFSSA Customer thus,"Please enable LZJB compression on every file system and LUN you have by default

                                                  I have been involved in many large Proof of Concepts during my time here at Oracle and I have come to realize that there is a quite compelling and honestly very important feature in the ZFS Storage Appliance that every customer and potential customer should review and plan on using. This feature is inline data compression for just about any storage need, including production database storage. Many storage vendors today list and possibly tout their compression technologies but rarely do they tell you to turn it on for production storage and never would they tell you to turn it on for every File System and LUN. This is where the ZFS Storage Appliance is somewhat unique..."

                                                  IT - Backup
                                                  Should Your VMware Backup Use Agents?
                                                  Storage Switzerland, July 16th, 2013
                                                  "Initially most VMware projects start off by leveraging the backup applications that were in place prior to the virtualization effort. Then, IT Planners realize that they need something more and they turn to VM-specific backup applications. But then they are often faced with another decision to make, using a backup product that requires agents or one that is agent-less..."
                                                  Sysadmins: Everything They Told You About Backup WAS A LIE
                                                  The Register, July 15th, 2013
                                                  "So, you're a sysadmin, slaving away to maintain the impossible 100 per cent uptime demanded by The Powers That Be. How many common myths about storage do you really believe?

                                                  More to the point, how many of these common myths do your bosses believe? Of course, it really doesn't matter which backup vendor you use - the myths are pretty much all the same.

                                                  Unless you (and your seniors) are aware of them, you will end up living in 'interesting times' - but perhaps that's the point of myths. They bring excitement to a mundane existence. And it's those exciting-but-wrong storage-related myths that we're slaying today..."

                                                    IT - Big Data
                                                    5 Secrets to Successful Analytics
                                                    Information Management, July 15th, 2013
                                                    "Good analytic projects don't come easy, but there are a few truths sometimes hiding beneath the surface. Here are five 'secrets' to setting up a program for successful business analytics.

                                                    Hannah Smalltree compiled this refined list of expert insight from a recent TDWI conference..."

                                                    • Understand the Business Decisions
                                                    • Evaluate Available Data and Policies
                                                    • Conduct a Visual POC
                                                    • Don't Leave Out SQL Support
                                                    • Take a Holistic View of Present and Potential Business Needs

                                                    Read on for details.

                                                    A Bottom-up Start on Big Data Analytics
                                                    Information Management, July 15th, 2013
                                                    "I recently debriefed with an OpenBI consultant who'd just completed a challenging big data analytics assignment. In a two-month period, he exhausted a procession of Hadoop tools, including Hive, Pig, Pentaho Data Integration and finally Java MapReduce - in addition to SQL and R.

                                                    In the end, mission accomplished and many lessons learned. Two summary observations: the need for higher-level, integrated query/computation Hadoop tools, but also an appreciation of the low-level MapReduce pattern of computation..."

                                                    CIO Matters: Leveraging Big Data for Big Business Value
                                                    Search CIO, July 15th, 2013
                                                    "Despite the fact that there is no commonly accepted definition of big data, there is growing evidence that, when approached in the proper manner, there is big business value in big data.

                                                    Industry publications are filled with articles that deliberate, sometimes even pontificate, around whether big data is hype or reality. The good news is that the trend is toward case studies that demonstrate how leveraging big data has created significant business value. This is somewhat encouraging, but acceptance of big data still falls short, as does understanding and institutionalized concepts, facilities, tools and methodologies that we have come to expect from our 'big' technologies..."

                                                    Predictive Analytics: Beyond the Predictions
                                                    Information Management, July 15th, 2013
                                                    "We make predictions and act on them all the time. I predict that if I jump into the path of a moving bus, I will be hurt - so I won't jump. I'd conclude that my prediction had been in alignment with my goals, but if I had to, I could only prove it by using the laws of physics or examples of other people's encounters with moving buses. If done well, predictive analytics help companies avoid business situations analogous to being struck by a bus. Business situations, however, are usually less dramatic and much more nuanced than avoiding a moving vehicle. And, unlike the bus, a company will often not even know there was a situation worth avoiding..."
                                                    Still Waiting for Big Data?
                                                    Information Management, July 16th, 2013
                                                    "The hype around big data is astounding. Don't get me wrong, the advantages of having a big data capability are easily quantified, but the roadmap to get there is riddled with danger.

                                                    Many organizations view big data as a gold mine of incremental revenue, from products to consultancies, but is big data really an incremental requirement? I would like to think that there is a black and white answer here, but unfortunately it depends on your strategy and business case. I will come back to this later..."

                                                    IT - Mobile
                                                    BYOD: Best Practices to Future-Proof Your Corporate Policy
                                                    eWeek, July 15th, 2013
                                                    "Advice on bring-your-own-device (BYOD) strategies is everywhere, and for good reason. Gartner has called BYOD the "most radical change in the economics and the culture of client computing in decades." ... In a recent report, Gartner analyst David A. Willis discusses the impact of BYOD and its evolution and makes eight key recommendations:"

                                                    • The Democratization of Technology
                                                    • Opportunities Are Everywhere
                                                    • Have a Clear Strategy
                                                    • Whether to Subsidize
                                                    • How to Subsidize
                                                    • Determine the Type of Policy You'd Like to Offer
                                                    • Tablets by Vertical
                                                    • Determine Who's Responsible
                                                    • BYOD Increases Security Risks
                                                    • New Risks Mean a New CIO Focus

                                                    Read on for details.

                                                    Mobile Malware, Mainly Aimed at Android Devices, Jumps 614% in a Year
                                                    ComputerWorld, July 15th, 2013
                                                    "The number of mobile malware apps has jumped 614% in the last year, according to studies conducted by McAfee and Juniper Networks.

                                                    The Juniper study -- its third annual Mobile Threats Report -- showed that the majority of attacks are directed at Android devices, as the Android market continues to grow. Malware aimed specifically at Android devices has increased at a staggering rate since 2010, growing from 24% of all mobile malware that year to 92% by March 2013..."

                                                      Tips for Network Administrators as Mobile Device Usage Increases
                                                      Help Net Security, July 16th, 2013
                                                      "The increase in mobile device has resulted in network challenges for businesses of all types and sizes. According to the Monetate Q1 2013 Ecommerce Quarterly, tablets have exceeded traditional desktops in driving web traffic and conversion rates, suggesting that users rely more heavily on mobile devices to make purchases and complete transactions through web applications and mobile sites...

                                                      There are five immediate actions that companies can take to prepare their websites and applications for mobile device access:"

                                                      • Visibility into Application Performance
                                                      • Automated Web Performance Optimization Technology
                                                      • Application Certification
                                                      • Denial of Service (DoS) Protection
                                                      • Application Delivery Controllers (ADCs)

                                                      Read on for details.

                                                      Top Ten Articles for last few Issues
                                                      Vol 185 Issues 1 and 2; Vol 184 Issues 1, 2, 3, 4; Vol 183 Issues 4 and 5
                                                      We track how frequently each article is viewed on the web site to determine which the readers consider the most important. For last week, the top 10 articles were:

                                                      • National Security, the "two man rule" and Solaris
                                                      • Oracle SPARC Software on Silicon
                                                      • Oracle VM Receives an A+ in Recent Testing Benchmark
                                                      • Availability Best Practices - Avoiding Single Points of Failure
                                                      • Optimize Database Storage for Maximum Performance and Efficiency
                                                      • Oracle Cloud Application Foundation
                                                      • Golf Channel Selects Oracle's Pillar Axiom Storage System
                                                      • JDeveloper 12c
                                                      • Database Insider
                                                      • Prototype of JavaFX Performance Analyzer on New Framework

                                                      The longer version of this article has list of top ten articles for the last 8 weeks.

                                                        IT - Server
                                                        The future of Linux: Evolving everywhere
                                                        IT World, July 15th, 2013
                                                        "If Linux acceptance and development are peaking, where does Linux go from up? Because Linux is such a mutable phenomenon and appears in so many incarnations, there may not be any single answer to that question.

                                                        More important, perhaps, is how Linux -- the perennial upstart -- will embrace the challenges of being a mature and, in many areas, market-leading project. Here's a look at the future of Linux: as raw material, as the product of community and corporate contributions, and as the target of any number of challenges to its ethos, technical prowess, and growth.

                                                        Linux: Bend it, shape it, any way you want it..."

                                                        Oracle Switch ES1-24
                                                        24-Port 10 GbE Top-of-Rack Switch
                                                        Recently, Oracle announced the Oracle Switch ES1-24 which expands Oracle's 10 Gigabit Ethernet top-of-rack switch portfolio for Oracle Data Base Appliance, servers and storage.

                                                        The Oracle Switch ES1-24 is designed specifically as a top-of-rack (ToR) server access switch with comprehensive Layer 2 and 3 features and wire-speed switching for high performance. In a compact half-width 1U with twenty RJ45 ports of 1/10GBase-T and four ports of 1/10 GbE SFP+, it enables easy migration from a 1 Gbps to 10 Gbps infrastructure by reusing existing copper cabling. It provides for redundant architecture in 1U rack space using two adjacent units and rapid failover with logical link aggregation capability.

                                                        Trending in
                                                        Vol 235, Issue 3
                                                        Trending IT Articles