News about Oracle's Solaris and Sun Hardware
System News
Jul 28th, 2013 — Aug 4th, 2013 Generate the Custom HTML Email for this Issue
System News System News for Sun Users
Volume 185, Issue 5 << Previous Issue | Next Issue >>
Sections in this issue:
click to jump to section

READ_ME_FIRST: What Do I Do with All of Those SPARC Threads?
What to do with the 1,536 threads in an Oracle M5-32 system
"With an amazing 1,536 threads in an Oracle M5-32 system, the number of threads in a single system has never been so high. This offers a tremendous processing capacity, but one may wonder how to make optimal use of all these resources.

In this technical white paper, we explain how the heavily threaded Oracle T5 and M5 servers can be deployed to efficiently consolidate and manage workloads using virtualization through Oracle Solaris Zones, Oracle VM Server for SPARC, and Oracle Enterprise Manager Ops Center, as well as how to improve the performance of a single application through multi-threading..."

Double Maximum Memory Capacity for SPARC T5-1B & T5-2 Servers
SPARC T5-2 maximum of 1 TB; the SPARC T5-1B maximum of 512 GB
Oracle announces the availability and support of 32 GB DIMMs for the SPARC T5-2 and T5-1B servers thereby doubling the maximum memory capacity of these servers. The SPARC T5-2 server now supports a maximum of 1 TB; the SPARC T5-1B server module supports a maximum of 512 GB. Increased memory capacity is generally one of the most effective means to provide higher levels of consolidation and virtualization as well as improve overall performance.
New eBook: Engineered for Extreme Performance
A guide to Oracle Engineered Systems
"This eBook acts as a guide to Oracle Engineered Systems, outlining the benefits of each system and providing insight on which system is best suited to a particular business challenge. It includes a brief, handy reference table on the inside cover, listing each of Oracle's engineered systems and outlining how a customer might use it..."
JD Sports Fashion Chooses Oracle Exadata Database Machine
To Leverage Fact-Driven Merchandising and Outperform Competitors
Marie-Christin Hansen writes, "JD Sports Fashion plc. is a leading retailer of branded sportswear and fashion wear with 900 stores and online business across a number of retail locations in the United Kingdom, Ireland, France, and Spain. The company owns many top brands, including Mckenzie, Carbrini, and The Duffer of St George, and sells many limited edition and exclusive designs from Adidas Originals and Nike.

JD Sports is growing fast - organically and through acquisition - and revenue increased almost 20% in 2011. The company wanted to maximize profitability in the competitive sports and fashion wear retail market by matching inventory to demand, identifying best sellers, tracking success of promotions, and being first to market in a fashion-driven business with typically short product life spans..."

Sun Ray Hardware Last Order Dates
Extension of Premier Support for Desktop Virtualization Software
Adam Hawley writes, "In light of the recent announcement to end new feature development for Oracle Virtual Desktop Infrastructure Software (VDI), Oracle Sun Ray Software (SRS), Oracle Virtual Desktop Client (OVDC) Software, and Oracle Sun Ray Client hardware (3, 3i, and 3 Plus), there have been questions and concerns regarding what this means in terms of customers with new or existing deployments. The following updates clarify some of these commonly asked questions..."
IT - Storage
Are Flash Devices Putting Sensitive Data At Risk?
Storage Switzerland, July 29th, 2013
"Flash based storage systems are now the “go to” option for improving the response time of performance sensitive applications. Some applications that require high performance are also storing extremely sensitive data that needs to be completely sanitized if the flash device is replaced. Is erasing the data on a flash device enough to satisfy the standard methods for data destruction?..."
The Benefits of Software-defined Server-side Storage
Storage Switzerland, July 29th, 2013
"Hyperscale Data Centers, Managed Service Providers, Cloud Service Providers and large Enterprises all face a similar challenge; how to cost effectively scale their cloud/virtual infrastructures so that maximum return on investment can be achieved. The answer is to build scale-out compute infrastructures that support very high numbers of virtual machines, something called 'big virtualization'..."
    Micron Nand Chief: Hard Drives Will Always Have Their Place, July 29th, 2013
    "Memory chip maker Micron is pushing flash solid state drives (SSDs) as the technology of choice for enterprise storage, yet does not expect magnetic media to go away anytime soon. The firm is also looking to new technologies such as 3D Nand flash in order to meet the density challenges of the future.

    Micron, which last week started sampling its first 16nm flash devices, said there is growing demand for SSDs across all storage segments, whether enterprise or consumer, but does not see them replacing hard drives anytime soon..."

    Java Technology
    OSCON Trip Report
    Top 10 Languages by Books Sales
    Reza Rahman writes, "OSCON 2013 was held from July 22 to July 26 in Portland, Oregon. I presented the Java EE 7 hands-on lab there as well as a session on WebSocket/JSR 356. This was my first time to the revered conference.

    My impression of OSCON had always been that it is a conference for everything open source mostly sans Java and very much sans anything JCP. As a Java and standards/JCP guy, it's the reason I had always focused on more Java heavy events like JavaOne and TheServerSide Symposium in my former life as an independent. This seemed to be despite the fact that Java remains the most popular language certainly by jobs and most programming language indexes, Java is the most active open source platform in the world and O'Reilly itself tends to make the most money out of Java books..."

    IT - Technology
    Businesses Adopting Robots for New Tasks
    ComputerWorld, August 1st, 2013
    "When Christian Johnson began his summer 2012 internship at the information management branch of NASA's Langley Research Center in Hampton, Va., he little suspected that he'd soon be virtually tooling around the center via a vaguely humanoid robot on wheels..."
    College Students Hijack $80 Million Yacht with GPS Signal Spoofing
    Network World, July 29th, 2013
    "A group of students at the University of Texas at Austin built and successfully tested a GPS spoofing device to remotely redirect an $80 million yacht onto a different route, the Houston Chronicle reports. The project, which was completed with the permission of the yacht's owners in the Mediterranean Sea this past June,..."
      Formula One Racing Learns from Sensors
      Information Week, July 29th, 2013
      "Life on a Formula One racing team is part Moneyball, part video game

      'It is like racing games, You've got all the tracks with the cars and where they are' on a display, said Graeme Hackland, CIO for the Lotus F1 racing team.

      Putting race data at the fingertips of the race engineer has been "the huge change" in the IT aspect since Hackland started at Lotus F116 years ago, when it was known as the Benetton team. 'Instead of a couple of smart guys on the pit wall, doing intuitive decision-making, now we have over 200 sensors on the car,' said Hackland..."

      NOAA Goes 'Live' with New Weather Supercomputers
      Network World, July 29th, 2013
      "The National Oceanic and Atmospheric Administration (NOAA) Thursday switched on two new supercomputers that are expected to improve weather forecasting.

      The 'go live' switch over to the new systems was made today without any fanfare, just a box of donuts on hand to mark 18 months of preparation and testing. The new IBM systems are now responsible for producing forecast data that's relied on in the U.S. and around the world..."

      Cloud Computing
      Business Managers Must be Smart About Cloud
      Take a closer look at several cloud opportunities for you to create benefits for your organization
      Yaldah Hakim, of Oracle Managed Cloud Services, writes, "Recently we posted a three part series on the new Dynamic Markets Research report- Cloud for Business Managers: Opportunities and Challenges. We introduced some key considerations for organizations who are moving their applications to a SaaS based environment. For those of you who still have questions or are looking for additional insights this is for you…

      Everyone talks about the benefits of cloud but who really achieves them? Where do you start? What should you look for? Let's take a closer look at several cloud opportunities for you to create benefits for your organization..."

      IT - Cloud
      In The Cloud, Code Doesn't Need Developers
      InfoWorld, July 30th, 2013
      "Automated approaches to development are gaining ground, but have their limits and won't render professional developers obsolete...

      Codeless development environments, which rely on models and templates for building applications rather than strict coding, are gaining a foothold. But they are limited and won't render professional developers obsolete, observers of these technologies say..."

        Complexity and Legacy IT Delay Cloud Adoption
        CIO Insight, July 29th, 2013
        "Existing IT infrastructure in the enterprise has caused CIOs around the world to question whether implementing cloud-based solutions right away is a good idea, according to a new survey of 300 CIOs and senior IT professionals by communications firm NTT. And while many cloud solutions can improve productivity and make for a stronger IT environment, the average CIO wants solutions that can work well in the "real world," says Damian Skendrovic, NTT Europe vice president of cloud services..."
        2 Do's and 2 Don'ts When Migrating Apps to the Cloud
        InfoWorld, July 29th, 2013
        "Relocating an application and data set running on a traditional platform to a cloud-based platform might seem like a humdrum shift. However, you must take into account many points before, during, and after the move. In many instances, you can boil down these considerations to simple do's and don'ts.

        Do consider the changes to the application architecture that should be made to take better advantage of the cloud platforms. In many instances, this means the application should undergo a change in architecture before moving to the cloud. Such changes might include the decoupling of data to allow for better distribution intracloud or intercloud. Consider moving to a services-oriented approach, which works and plays well with the abstraction of cloud services through APIs..."

          Cloud Adoption Suffers in the Wake of NSA Snooping
          InfoWorld, July 30th, 2013
          "According to a survey by the Cloud Security Alliance, 10 percent of the CSA's non-U.S. members have canceled a contract with a U.S.-based cloud provider due to fears of U.S. government abuse of their citizens' data, a fear stoked by revelations of extensive spying on electronic communications by the U.S. National Security Agency through its PRISM program. Moreover, 56 percent said they were now less likely to use an American company..."
          Running Your On-Premise Cloud Like a Business: 10 Key Steps to Take
          eWeek, July 29th, 2013
          "Private cloud deployments are on the upswing, on an even faster scale-up than hybrid clouds. This wasn't the case only two years ago. eWEEK publisher QuinStreet's recent Palmer Research-conducted survey reported that 65 percent of IT decision makers say they use or plan to use a private cloud deployment model for internal purposes or for application inside value chains. Plus, 36 percent of respondents say they are now running a private cloud, with 29 percent planning to use a private cloud. Corresponding hybrid cloud numbers are diminishing..."
            Translating Security From Physical to Virtual Environments
            eWeek, July 29th, 2013
            "Using full drive encryption as a security measure in the cloud is like having a rabbit instead of a dog to protect your house – It's just not the right tool for the job. In fact, many traditional security tactics that organizations use to protect their data in physical environments won't measure up when moving applications and data to the cloud.

            As organizations increasingly leverage infrastructure as a service (IaaS), it's important to understand the unique security requirements in virtual environments..."

            IT - CxO
            Preparing for Your Next Budget
            CIO Insight, July 30th, 2013
            "Budgeting can be a harrowing experience or an opportunity to show that you are a business leader who can help your company accomplish its overall goals...

            As a big fan of Looney Tunes I lovingly recall Elmer Fudd, shotgun in hand, watching Daffy Duck and Bugs Bunny get into a spirited debate as to whether it was duck season or 'wabbit' season. This comes to mind as many of us start to prepare for budget season or, as I lovingly call it, begging for dollars!..."

              6 Alternative Ways For You to Compensate Your Interns
              TLNT, July 30th, 2013
              "In years past, offering paid internships may have been your secret ingredient to gaining the outstanding interest of intern candidates.

              But today, the average salary for a bachelor's degree intern is $16.26. This means simply paying your interns isn't going to set you ahead of your competition.

              With the legal requirement of mandatory minimum wage for all internship programs falling under the the Fair Labor Standards Act, it's time for you to think outside the box when it comes to ensuring your internship program stands out to the best and brightest students in your industry... Here are six alternative forms of compensation worth considering for your interns:"

              • Networking opportunities
              • School credit eligibility
              • Rotational programming
              • Software training
              • Amazing experiences
              • Free products

              Read on for details.

                8 IT Consultant Vetting Tips
                IT World Canada, July 29th, 2013
                "When you hire an IT consultant, you are handing over to a third party access to your organization's critical information systems and software

                • Q. How many consultants does it take to change a light bulb?
                • A. One to change the bulb and two to write the strategy and tell him what he did wrong.

                Just like lawyer jokes, there's no shortage of consultant jokes. But the truth is hiring an IT consultant is no laughing matter.

                Think about it – when you hire an IT consultant, you are handing over to a third party, access to your organization's critical information systems and software. You are also trusting that person to map out a strategy that will impact your workforce and its operations..."

                  Chief Digital Officer: Hot New Tech Title Or Flash In The Pan?
                  ComputerWorld, July 29th, 2013
                  "There's a new C-level executive -- the Chief Digital Officer (CDO) -- in the boardroom, charged with ensuring that companies' massive stores of digital content are being used effectively to connect with customers and drive revenue growth.

                  At first blush, an executive title that includes the word "digital" would seem to encroach on IT's territory. Not so, observers say -- but that doesn't mean tech leaders don't need to be prepared to work closely with a CDO somewhere down the line..."

                    Have a Great Staff? Then Why Aren't You Treating Them Better?
                    TLNT, July 30th, 2013
                    "Ah, the first day on the job. It starts off like a whimsical wonderland for the bright-eyed and bushy-tailed new hire.

                    Everything is fresh and waiting to be explored. With each breath, anticipation fills his lungs and curiosity emanates from his pores. His smile, intensified by a youthful optimism, reveals that he is ready to dive blindly into the office culture..."

                      How Employers can Fight Back Against Fake Job References
                      CSO Online, July 31st, 2013
                      "Many businesses now offer fake job reference services to people looking to fudge the truth when searching for employment. How can companies protect themselves from fake references and potentially bad hires?...

                      Here's whats on the homepage of 'The Reference Store,' which bills itself as the world's leading virtual reference service: 'Unemployed? Fired? Forced Out? Bad Reference? Create an entirely new work history using our fake reference service. Dont let these issues keep you from finding meaningful work. Explain away these periods using one of our Virtual Companies. Our fake companies are so real, our Virtual Companies actually get sales calls from the public...'

                        Top 5 Ways CEOs Should Monitor IT
                        Business 2 Community, July 29th, 2013
                        "By nature a CEO is somewhat removed from the intricate logistical operations going on within the IT department. Business and IT have always had certain issues regarding compatibility and collaboration. As the two worlds become intermingled through analytics and business intelligence, CEO's will find themselves valuing IT as an efficiency driver. If left to its own devices, project costs can quickly outgrow budgets and a six month implementation can easily turn into twelve. To prevent such catastrophes, here are a couple of go to rules for managing your IT department:..."
                        Top CIOs Use IT to Speed Up the Business
                        CIO, July 29th, 2013
                        "The need for speed underpins many of the projects we honor in our 26th annual CIO 100 awards. We recognize organizations whose IT work shows innovation and impressive business value. In 2013, it's clear that meeting those marks often requires a quicker way to get things done. External customer transactions, internal decision making, the very way IT operates to support new business ideas--it's all going faster, then faster still..."
                        What I Learned... When Budget Cuts Made the Backup Fail
                        Enterprise Efficiency, July 29th, 2013
                        "Yesterday I wrote about the long moments of panic and dread I felt when the power went out and our back-up generator did not come to the rescue.

                        Although crisis was averted when the electric company repaired the problem in a few moments, I immediately drew up a capital expense request for a newer, larger generator and some related upgrades. And that's when I got a lesson in the language of finance..."

                          Who Do You Trust?
                          Information Management, July 31st, 2013
                          "Although my friends view me as an eternal optimist, I am becoming increasingly cynical about the world we live in. And I'm apparently not alone. A survey published by Transparency International showed that less than 10 percent of survey respondents in European countries hit hardest by the region's debt crisis believe that their governments are doing a good job fighting corruption. According to a New York Times article on the survey, this reflects a 'crisis of faith in governments' and a 'chasm' between leaders and their citizens. So, can people actually trust governments? This is a business-related monthly column in which I prefer to not touch the field of politics, but this question helps to frame the topic in order to make my points that follow..."
                            Why Talent for Tech is Different Than Skill
                            InfoWorld, July 29th, 2013
                            "Wherever you are in IT, you've probably come across colleagues who were extremely skilled at their jobs -- system administrators who can bend a zsh shell to their every whim, or developers who can write lengthy functions that compile without a whimper the first time. You've probably also come across colleagues who were extremely talented -- who could instantly visualize a new infrastructure addition and sketch it out to extreme detail on a whiteboard while they assembled it in their head, for example, or who could devise a new, elegant UI without breaking a sweat..."
                            Wanted: Executive Peers
                            CIO Insight, July 30th, 2013
                            "As a CIO, the sense of security and confidence that comes with feeling that you're part of a team is an important element of success over the long term...

                            Desperately Seeking: Executive peer who understands what I do, why I do it and how I do it. Must be a good listener with the ability to provide critical yet constructive feedback and perspectives. If this sounds like you, and you work at my company, please contact me at: needapeer@cio.losingmymind.nuts.

                            The life of a CIO can be a lonely one. In many companies the job is less understood than any other executive position, the results are scrutinized more than for any other executive position, and to top it all off, nothing is ever really 'completed' in the same sense as things are for other executive positions..."

                            5 Things CFOs Hate About IT
                            Information Week, July 29th, 2013
                            "I recently had the opportunity to ask four finance executives from a range of industries -- pharma, academia, consulting and retail -- what irks them about IT. If you assume their complaints were industry-specific, you're wrong. In fact, there are remarkable similarities, and the grievances flowed freely.

                            This might come as a surprise, as more than 80% of the IT executives responding to our 2013 InformationWeek Global CIO Survey rated their relationships with finance as good (48%) or excellent (33%). Unfortunately, your CFO may not feel quite as simpatico. Top gripes include:..."

                            • The stickiness of the status quo
                            • The whiz-bang factor
                            • Failure to do risk analysis
                            • Delusions of, if not grandeur, then at least adequacy
                            • Dismissing the "why do we need you?" question

                            Read on for details.

                            Sun Rack II capacity calculator
                            New version
                            A new release of the Sun Rack II capacity calculator is available on eSTEP portal.

                            The tool calculates all the data necessary (power requirements, BTU, number of rack units, needed power outlets etc.) while inserting the many different kind of HW equipment in a Sun Rack II cabinet (version 1000 and 1200). It takes into consideration most of the available servers, storage devices, tapes, and Netra products. There are also a couple of third party products which are taken into account.

                            The spreadsheet can be downloaded from eSTEP portal.

                            Unveiling Oracle's Latest Engineered System
                            Live webcast August 13th, 2013, 10am PT/1pm ET
                            Install and Deploy Your Virtual Infrastructure in Just Hours

                            Join Wim Coekaerts - Senior Vice President, Linux and Virtualization - and learn about Oracle's latest engineered system. It provides a converged infrastructure powered by Oracle VM server virtualization and Oracle Virtual Networking, dramatically enhancing data center operations.

                            Discover how this system can:

                            • Accelerate time to value, with rapid infrastructure deployment
                            • Reduce business risk by reducing the application deployment and maintenance complexity
                            • Provide infrastructure flexibility by enabling dynamic provisioning of virtual machine resources
                            • Lower costs and improve user service levels
                            • Support a mix of applications and operating systems

                            Join Oracle Experts and Chat Live Throughout the Webcast

                            • Tuesday, August 13, 2013
                            • 10:00 a.m. PDT

                            Register "here."

                            IT - Networks
                            Two SDN Groups Mark Progress
                            Network World, July 29th, 2013
                            "Two SDN consortia this week announced progress in efforts to define a standard way to implement the technology, which promises to automate and accelerate network service introduction. The OpenDaylight organization, a vendor-driven group founded by Cisco and IBM, said it's received an influx of technology contributions from members and non-members alike, involving network protocols, virtualization and security..."
                            IPv4 To IPv6 Conversion Thwarted by ISP Peering Issues
                            SearchNetworking, July 29th, 2013
                            "Sometimes it's obvious when things are out of whack, like when an ISP is delivering bandwidth well below the service-level agreement and it's causing users to open 'The Internet is slow' helpdesk tickets. But other times, especially when troubleshooting intermittent routing issues, our helpdesk tickets tell us something seems broken, but nonspecifically and in a manner that's a difficult to reproduce. IPv6 Internet endpoint reachability should be essentially identical to its IPv4 ancestor, but many admins supporting dual-stack endpoints have developed a generalized unease about it. As usual in IT, it turns out you're not paranoid: There is a problem with the IPv6 Internet and IPv4 to IPv6 conversion, and it's not just you..."
                            SDN Basics: Five Questions Answered
                            SearchSDN, July 29th, 2013
                            "Although SDN certifications and SDN education programs are beginning to take shape, engineers are seeking answers to questions about SDN basics. Our SearchSDN experts are open for business and ready to answer questions.

                            We rounded up five of our Ask the Expert questions and answers that explain a few SDN basics every network professional should know:..."

                              Should You Create A Separate, Supersecure Network?
                              InfoWorld, July 30th, 2013
                              "A safe deposit box protects your valuables -- so why not shield your critical data in an ultrasecure network? It's not that simple..

                              All companies that have been pwned by APT (advanced persistent threat) adversaries look for ways to fend off future threats. My best recommendations: Do better patching and use whitelisting. As I've repeated ad nauseam, these two countermeasures together would reduce the risk of successful malicious attacks by 99 percent in most environments..."

                                TRILL's Hidden Cost
                                Network Computing, July 29th, 2013
                                "The world of today's data center is focused on moving bits back and forth as quickly as possible without interruption. We've taken every measure to ensure that data is flowing as freely as it can between 10, 40 or even 100 Gbit links connecting clusters of virtual servers. We want to crunch, analyze and query data instantly. All of this works as well as it can until we start looking under the hood. There we discover the root of all evil: spanning tree..."
                                  What CIOs Need to Know About Software Defined Networking (SDN)
                                  Network World, July 29th, 2013
                                  "Software defined networking is one of the most misunderstood concepts in infrastructure computing. It's a phenomenon that's growing in relevance, but it's still mysterious to many CIOs, particularly those who were not reared in overly technical practice. Many myths still surround SDN. What exactly is the notion behind the technology? How can you apply SDN at your business? And how can your organization benefit from it..."
                                  IT - Operations
                                  IT Offshore Service Providers Without a Cloud Strategy Will Risk Long-Term Future, Says Gartner
                                  Information Week, July 29th, 2013
                                  "While the increased use of industrialized services will reduce the volume of traditional and customized services, the impact on offshore providers will be counterbalanced by new revenue from investments in cloud-based services, said Gartner. However, service providers that are slow, unable or unwilling to invest in the shift to the cloud will risk hampering offshore services revenue growth.

                                  Gartner predicts continued strong growth in public cloud services, with end-user spending on public cloud services expected to grow 18 percent in 2013 to total USD 131 billion..."

                                  Study on Private vs. Public Sector Software Glitches
                                  Help Net Security, July 30th, 2013
                                  "In the private sector, software errors are causing both financial and reputational damage. A new study identified private sector businesses in the banking, retail and mobile sectors, more likely to suffer software malfunctions than public sector organizations.

                                  The SQS team analyzed two years' worth of news reports about software and computer failures, covering 964 stories and 245 UK-based organizations. While the level of public sector computer-glitch reporting remained constant during 2011 and 2012, reports on private sector computer problems have tripled..."

                                    New Discoveries in the Data Center Space Will Be Driven by Need to Lower Energy Costs
                                    Information Week, July 29th, 2013
                                    "As energy-related costs are among the major contributors to the total operational cost for today's data centers, new technology discoveries in the space will surround around developing energy efficient solutions that will enable customers to save on their operational costs, says C R Srinivasan, Vice President, Global Product Management, Data Centre Services, Tata Communications..."
                                    Getting Smarter About IT Outsourcing
                                    CIO Insight, July 29th, 2013
                                    "A number of recent reports indicates that IT outsourcing is maturing and many organizations-along with their CIOs-are beginning to look at it in a different way. A new study from market intelligence firm Information Services Group (ISG) indicates that as a growing number of outsourcing contracts expire, businesses are being more aggressive about renegotiating the terms.

                                    Organizations are also turning to a greater number of service providers. ISG notes that a growing number of IT executives are attempting to renegotiate outsourcing contracts before they expire in order to take advantage of short-term cost savings..."

                                    4 Risks from Legacy Applications
                                    ComputerWorld, July 29th, 2013
                                    "Security professionals are prone to delivering edicts about securing code in new dev projects, but what about the mountain of existing code that is already in production?

                                    Both security professionals and stakeholders alike often overlook the huge amount of legacy code which imposes an unmeasured and unaccounted risk on an organization.

                                    Some companies can have hundreds or even thousands of domains. Product specific domains and websites are often spun up during the release of a product, then they are left online indefinitely. Even if we imagine, hypothetically, that these websites had no security flaws the day they were put into production, over time many will metastasize into a risk-filled PR nightmare waiting to happen..."

                                    IT - Security
                                    Critics Urge End of Passwords, But Alternatives Not Ready for Prime Time
                                    CSO Online, July 29th, 2013
                                    "With no practical alternative, a small tech group has launched a campaign to rally consumers against the use of passwords for logging into websites and services.

                                    The Petition Against Passwords, launched on Wednesday, is the brainchild of think-tank TechFreedom and rivals Clef and LaunchKey, which sell password-less technology. As of Thursday, the group had several hundred signees.

                                    The idea is to put aside the technology debate in finding a password replacement and use the power of the people against the widely used method for logging into websites..."

                                      Cyber Security is Central To Long-Term Economic Growth
                                      Help Net Security, July 29th, 2013
                                      "An increase in attacks on corporate websites should focus attention on the actions businesses should take to reduce the impact of cybercrime.

                                      The word of caution comes in the wake of the government announcing the launch of its 'Cyber Governance Health Check' – a programme designed to assess the extent to which FTSE 350 Boards and audit committee chairmen understand and oversee risk management measures addressing cyber security threats to their business..."

                                      SQL Flaws Remain an Achilles Heel for IT Security Groups
                                      ComputerWorld, July 29th, 2013
                                      "Indictments filed against five persons charged in a massive international hacking scheme indicate that SQL injection vulnerabilities continue to be a huge security Achilles heel for large IT operations.

                                      The residents of Russia and Ukraine were indicted Thursday in connection with the theft of more than 160 million credit card numbers and other financial data from a virtual Who's Who of big business, including NASDAQ, JCP, Carrefour, Discover Bank, Hannaford, Heartland and Dow Jones.

                                      The indictments allege that the victims lost some $300 million over a seven-year period between 2005 and 2012..."

                                      The #1 Myth about Security Information and Event Management (SIEM)
                                      Wall Street and Technology, July 29th, 2013
                                      "Probably the most popular myth deceiving IT security professionals today is that Security Information and Event Management (SIEM) software is a sufficiently-robust solution for keeping a close eye on sensitive data and – and to send alerts when anything suspicious happens to it. However, SIEMs can only report on logs they can see - therefore another type of user activity monitoring software is needed to ensure data remains secure..."
                                      To Achieve Good Security, You Need to Focus on Business
                                      Help Net Security, July 29th, 2013
                                      "In September 2001, as the Nimda computer worm devastated networks worldwide, we in IT security thought that the management will finally wake up and see how important it was to secure out networks. They would begin to pay attention to the warnings from their network security, we thought, and we would finally have the budget we needed and recognition for what we do. But, we were wrong..."
                                      University Condemns Court Ban Of Research Paper on Flaws in Car Lock System
                                      Network World, July 29th, 2013
                                      "A court ban on a research paper that analyzes flaws in a car-lock system should be overturned, according to the Dutch university that employs two of the three researchers who wrote the analysis.

                                      The U.K. High Court of Justice banned the publication of the paper, 'Dismantling Megamos Crypto: Wirelessly Lockpicking a Vehicle Immobilizer' on June 25, said the Radboud University Nijmegen in a news release on Monday. The ban came to the attention of the public when the U.K. newspaper The Guardian published a story about it over the weekend..."

                                        The Impact of Weak Threat Intelligence on Organizations
                                        Help Net Security, July 29th, 2013
                                        "A new Ponemon Institute study, which includes a survey of more than 700 respondents from 378 enterprises, defines what 'live threat intelligence' is; how global enterprises are using it defend against compromises, breaches and exploits; and the financial damage that slow, outdated and insufficient threat intelligence is inflicting on them..."
                                          IT - Careers
                                          How to Become a Technology Evangelist
                                          Business 2 Community, July 29th, 2013
                                          "As an Innovation Evangelist for SAP, I often get asked 'I'm interested in being a technology evangelist - what should I do?' Here are some personal answers. What is a Technology Evangelist? ..."
                                          How to Know When It's Time for a Career Change
                                          IT World, July 29th, 2013
                                          "Changing jobs is one thing, changing careers another. And while the latter may seem more daunting, it's a move professionals wisely make for a litany of reasons.

                                          Here are 5 signs it's time to consider a career switch: ..."

                                          • Accidental, undesirable career
                                          • Life change
                                          • Poor job outlook
                                          • New interests
                                          • Your values and job are out of sync

                                          Read on for details.

                                            IT Careers: 8 Steps Toward New Business Roles
                                            Information Week, July 29th, 2013
                                            "As information technology becomes more tightly woven into business processes and strategic business planning, IT personnel find themselves being pulled in many directions -- by marketing, sales, the social business team, finance, human resources, customer service and so on. In fact, IT pros might find the work done in other departments more appealing or rewarding -- and decide to jump ship.

                                            In InformationWeek's most recent IT Salary Survey, one-third of IT managers and one in five IT staffers said they report to someone outside of the IT organization for at least half of their time..."

                                              IT - Social Media
                                              10 Actionable Blog Tricks to Skyrocket Your Sales
                                              Business 2 Community, July 29th, 2013
                                              "Sorry, but first-time visitors to your company's website probably don't want to talk to your sales representative. The internet and mobile technology have revolutionized the way that consumers research organizations, and many prospects who find your website through organic search simply aren't ready to make a purchase. This fact doesn't mean you need to cut your losses, continue using various blog tricks, and wait for your phone to ring...we've curated 10 remarkable blog tricks to help you reach your sales goals, without resorting to pushy content:"

                                              • Use Better Keyword
                                              • Answer Customer Questions
                                              • Use Your Content as Educational Assets
                                              • Get the Context of Your Call-to-Actions Right
                                              • Provide True Insider Insight
                                              • Target More Effectively
                                              • Illustrate Worst Case Scenarios
                                              • Naturally Showcase Your Product or Service
                                              • Don't Be Afraid of Your Competitors
                                              • Justify Your Brand

                                              Read on for details.

                                                IT - Email
                                                Internet of Things: Pipe Dream or Reality?
                                                Business 2 Community, July 31st, 2013
                                                "Imagine you're driving home after a long day of work. A coupon for a local pizza shop pops up on your vehicle's navigation system and, with a simple voice command, you place an order so dinner can meet you at your doorstep. Waiting at a stoplight near your house, you then use a single app to open the garage door, queue up your favorite flick on the TV and adjust the living room lights to create the perfect cinematic ambience. Welcome to movie night, Internet of Things-style..."
                                                  Oracle Storage: Standalone and Engineered Systems
                                                  IDC Insight
                                                  In June IDC published a interesting note named "Oracle Storage: Standalone and Engineered Systems".

                                                  The IDC Insight report looks at the Oracle storage strategy across Oracle's external disk storage systems and tape automation product lines.

                                                  Bullet points out of the report:

                                                  • Over the past several years, Oracle has developed an extensive arsenal of storage products, from distributed file systems to external disk storage systems to tape automation.

                                                  • Oracle competes with other leading storage vendors for discrete (or standalone) storage business while at the same time introducing market disruption . This comes with the company 's strategy in developing and selling infrastructure products and features targeted at the application and database owner.

                                                  • The success Oracle has seen with the Oracle Engineered Systems solutions and in integrated Oracle database features with Oracle 's storage solutions has had implications on the Oracle storage business and will continue to be a growth engine for future Oracle storage wins.

                                                  Read the full IDC report.

                                                  IT - Backup
                                                  Transform Backup Data into an Information Advantage
                                                  Storage Switzerland, July 29th, 2013
                                                  "Backup infrastructure is somewhat like an expensive insurance policy. Large premiums are expended on backup hardware, software and people resources to collect, store and protect business information in the event a 'claim', or in this instance, a data recovery event needs to take place. What if backup infrastructure could provide value even if no 'claims' need to be filed? This article will discuss how to transform backup data into a business asset..."
                                                  The Future of Backup is an Architecture Not an Application
                                                  Storage Switzerland, July 29th, 2013
                                                  "While the applications that protect data have vastly improved over the last 20 years, they still often struggle to keep up with the technical challenges of data growth, shrinking backup and recovery windows and demands for greater disaster resilience. At the same time, user expectations have also risen..."
                                                  IT - Mobile
                                                  Blur is the Enemy of a Well-Lived Life
                                                  Business 2 Community, July 31st, 2013
                                                  "In the northern hemisphere, it is summer, which means a time of vacations, getting together with friends, and taking a little time off. But are you really taking any time off? There's a time to plug in to technology and a time to unplug. Are you unplugging on your down time? In fact, are any of us ever unplugged? It wasn't that long ago that people left their laptops behind when they went out for dinner or to visit friends. But today we have our computers with us 24/7 in the form of smart phones and tablets..."
                                                    Cheap Monitoring Highlights Dangers of Internet of Things
                                                    Dark Reading, July 29th, 2013
                                                    "While consumers and workers typically know that their mobile devices are frequently sending off data to the Internet, most do not understand the implications of carrying around an always-on connection in their pockets.

                                                    A University of Wisconsin at Madison law student and security researcher plans to highlight the privacy and security problems by demonstrating a monitoring system that uses a network of inexpensive sensors to track people using their smartphones and other wireless devices. The system, known as CreepyDOL, uses a network of air-dropped sensors that listen for wireless traffic, allowing the tracking of anyone with a wireless-enabled mobile device..."

                                                    Five Things to Consider for a Mobile Security Policy
                                                    CSO Online, July 29th, 2013
                                                    "Last week, news broke that Samsung was pushing into the federal space and is close to inking a deal with the FBI and the U.S. Navy. While that story hinges on the shift from BlackBerry to Android and Apple in the secure mobile space, it also singles out the fact that BYOD isn't a buzzword - it's a reality within IT operations.

                                                    However, as the network expands outward from the office walls into hotels, conferences, and even the home, the IT department (or the security staff within) gains additional workloads as they are charged with protecting new assets and lines of information..."

                                                    Security Manager's Journal: Android Panic
                                                    IT World, July 29th, 2013
                                                    "A couple of years ago, I implemented a technology that makes iPhones, iPads and Android smartphones and tablets more secure by giving us access control, encryption, passwords and remote-wipe capability. Since then, at a time when smartphone usage at my company was booming, we haven't had any data security breaches related to smartphones and tablets. Although some of those devices have been lost or stolen, such occurrences have never led to a breach, thanks to the ability to remotely wipe those devices. I've loved the peace of mind that has given me.

                                                    But now my peace of mind has been shattered..."

                                                    The Three Extremes of Corporate BYOD Policies
                                                    ComputerWorld, August 1st, 2013
                                                    "Corporate attitudes toward bring-your-own-device (BYOD) policies appear to fall into one of three categories, according to a survey of IT users released this week: There's no official BYOD policy, devices are banned, or no one talks about it.

                                                    The survey, conducted by IT services company TEKsystems, included responses from 1,500 IT leaders and 2,000 IT professionals form companies of all sizes..."

                                                    IT - Big Data
                                                    6 Ways To Build Trust In Big Data
                                                    Information Week, July 31st, 2013
                                                    "Many business leaders may not believe what big data says, even when it shows increased revenue or efficiency. Big data has to earn their trust...

                                                    With big data, the biggest hurdle isn't so much achieving success. It's getting people to believe in big data -- to trust it. And it's not just trusting the data itself. It's trusting what can be done with the data..."

                                                    7 Predictive Analytics Vendors You Might Not Know
                                                    Information Management, July 29th, 2013
                                                    "Perhaps the most sought after aspect of data analysis, predictive analytics is flourishing from a mix of technical acumen and business-minded models. As this space develops, what are some of the PA vendors achieving real-world success?

                                                    Here's a list of seven forward-looking analytics firms that are attracting attention of late..."

                                                    • Revolution Analytics
                                                    • Civis Analytics
                                                    • KXEN
                                                    • ForeSee
                                                    • Angoss Software
                                                    • Versium
                                                    • Inkiru

                                                    Read on for details.

                                                    9 Big Data Lessons Learned
                                                    Datamation, July 30th, 2013
                                                    "It's time for a Big Data reality check. All of the hype about the profound value and benefits of the ability of new databases, servers, networks and other ingredients to rapidly process and present massive amounts of data in the Big Data stew has risen to the peak of expectations made famous by the Gartner hype cycle. After conducting a variety of surveys about the reality of Big Data implementations this year, and asking leading consultants and vendors about what they and their clients have learned, it's time to just slightly deflate the balloon..."
                                                    Big Data = Big Exposure. What Can You Do About It?
                                                    GCN, July 29th, 2013
                                                    "Agencies are looking to 'big data' to help solve some of the most pressing challenges facing government today. But big data often brings its own challenges in the form of IT and information security concerns. Too often, agencies approach big data as if it were an expansion of or significant increase in their database capability.

                                                    Yet the term 'big data' means much more than just a large database; it encompasses new tools, technologies, and deployment and operational methods. It is usually inextricably part of cloud computing and virtualization strategies. From an information security perspective, big data can mean “big exposure” to risk if approached solely from a traditional IT perspective..."

                                                    Data Analytics Nears Adulthood but Has It Grown Up Yet?
                                                    The Register, July 30th, 2013
                                                    "The problem with business analytics technology is that it has just about emerged from puberty and adolescence but nobody has given it a bank account and introduced it to the opposite sex yet.

                                                    Analytics has been around in one form or another ever since Henry Ford decided to catalogue his motorcar assembly line measurements a century ago. So far the computerisation of analysis engines has arguably had a less tangible business impact.

                                                    In a world where every large organisation has its own enterprise resource planning (ERP) system, or software designed to shoulder customer relationship management (CRM) or some form of business process management (BPM), how do we start to look for real competitive advantage?.."

                                                    Four Factors to Weigh in Planning an Analytics Big Data Architecture
                                                    SearchBusinessAnalytics, July 29th, 2013
                                                    "By providing access to broader sets of information, big data can help maximize the analytical insights data analysts and business users generate. Successful big data analytics applications uncover trends and patterns that enable better decision making, point to new revenue opportunities and keep companies ahead of their business rivals. But first, organizations often need to enhance their existing IT infrastructure and data management processes to support the scale and complexity of a big data architecture..."
                                                    Self-Driving Cars Could Create 1GB of Data A Second
                                                    ComputerWorld, July 29th, 2013
                                                    "Self-driving cars, which some experts have predicted will be readily available within five years, will come with a myriad of sensors creating machine-to-machine data at the rate of 1GB a second, according to one strategist.

                                                    Mark van Rijmenam, a big data strategist and founder of, believes the sensors in self-driving cars will also will provide great opportunities to spot mechanical problems before they happen -- and even schedule repairs..."

                                                    The Big Joke About Big Data
                                                    Wall Street and Technology, July 29th, 2013
                                                    "It never ceases to amaze me how frantically people rush to shoehorn their products, companies or internal IT strategies into the latest buzzword. Every large banking, investment and insurance company claims to have a big data strategy. The big joke is that these strategies are often very small.

                                                    Let me get right to the point: big data is way, way more than storing, organizing and crunching all the log files you used to throw away. Defining big data as what can be done with Hadoop or Splunk amounts to a hijacking of the term. I can't blame vendors for wanting to be synonymous with the next big thing. But it's a joke..."

                                                    The 'Internet of Things' Will Mean Really, Really Big Data
                                                    InfoWorld, July 29th, 2013
                                                    "Bland by name and superficially viewed as gee-whiz technology never to be realized, the IoT (Internet of things) has significant potential to transform business. Early forays into Net-enabling physical objects are already pointing the way.

                                                    Promising unprecedented connectivity among objects and the gathering of massive amounts of data, IoT is poised to deliver significant business benefits to organizations forward-thinking enough to envision the opportunities and efficiencies IoT can reap..."

                                                      The NSA and Big Data: What IT Can Learn
                                                      Information Week, July 29th, 2013
                                                      "Whatever your civil liberties stance, the technologies underpinning the National Security Agency's data collection and analysis programs, such as PRISM, spell opportunity for companies looking to connect a different set of dots -- identifying potential customers, spotting fraud or cybercrime in its early stages, or improving products and services.

                                                      The pillars of the NSA's architecture are big data systems, particularly a distributed data store called Accumulo, machine learning and natural language processing software, and scale-out cloud hardware (we delve into all three in much more depth in our full report)..."

                                                      What Is DaaS?
                                                      Big Data Republic, July 29th, 2013
                                                      "We live in the age of big data, but big data is not showing up to the party alone. Fast data and open data are also coming along for the ride.

                                                      Together, they are creating growing mountains of data locked away in every recess of the enterprise -- from applications to relational and non-relational databases, to in-memory caches, public clouds, and Hadoop clusters. Furthermore, putting sensors on everything, as as both Cisco and GE propose, will increase the amount of data collected without necessarily increasing our ability to access and analyze it..."

                                                      Where's the "Big" in Master Data Management?
                                                      Information Management, July 31st, 2013
                                                      "Big data is making its way into master data management strategies. A growing number of leading edge organizations are already connecting these dots, but this is just the beginning. Before the end of 2013, big data will be driving an essential part of the requirements for MDM programs as new types of data become full constituents of the enterprise information architecture. Both big data and MDM are used to provide a complete view of entities such as customers, albeit in different ways. Big data, for example, leverages unstructured and semi-structured data, such as that from social media, to provide supplemental information that could help uncover new user tendencies and interests. However, all of this can't be done without an MDM program in place first..."
                                                      IT - BYOD
                                                      Top 10 BYOD Risks Facing The Enterprise
                                                      CRN, July 29th, 2013
                                                      "Threats to the enterprise posed by an employee-owned mobile device can be as complex as a sophisticated malware attack designed to snoop on an employee's browsing activity or as simple as a lost phone in a taxicab. The threats are forcing security teams to introduce new policies to reduce the risk. Enforcing them without impacting productivity is a balancing act. Experts say the first step is to understand the perceived risks and weigh them against the company's security posture..."
                                                      When It Comes To BYOD Security Risks, Which VPN Is Best, IPsec Or SSL?
                                                      SearchNetworking, July 29th, 2013
                                                      "Over the past several years, Virtual Private Networks (VPNs) have taken an increasingly critical role in businesses' IT security strategies. At the same time, the ranks of workers accessing company networks remotely are growing rapidly and creating more potential points of failure. According to Gartner, 40% of the workforce will be mobile by 2016..."
                                                      Top Ten Articles for last few Issues
                                                      Vol 185 Issues 1, 2, 3 and 4; Vol 184 Issues 1, 2, 3, 4
                                                      We track how frequently each article is viewed on the web site to determine which the readers consider the most important. For last week, the top 10 articles were:

                                                      • Microsoft ReFS and Oracle ZFS
                                                      • Oracle Solaris 11 System Administration
                                                      • Online Solaris Forum - including live Q&A throughout
                                                      • 25 Years of SPARC Innovation
                                                      • Apache OpenOffice 4.0
                                                      • LibreOffice 4.1: A Landmark For Interoperability
                                                      • Just How Messed Up Is My Code?
                                                      • Video: Oracle Solaris 11 for ISVs
                                                      • Deploys Estate Asset Distribution Application on Oracle Cloud Platform Services
                                                      • Official Support for PhoneGap in NetBeans IDE

                                                      The longer version of this article has list of top ten articles for the last 8 weeks.

                                                        IT - Encryption
                                                        Hand over encryption keys and user passwords
                                                        Help Net Security, July 29th, 2013
                                                        "The US government and its intelligence and law-enforcement agencies have apparently been trying to get Internet firms to hand over both their users' account passwords and their master encryption keys.

                                                        According to Declan McCullagh and his sources inside some of these companies, the agencies obviously subscribe to the notion that "If you don't ask, the answer is always no," but it's unknown whether this approach has been successful..."

                                                        IT - Server
                                                        Flash Breakthrough Promises Faster Storage, Terabytes of Memory
                                                        IT World, July 30th, 2013
                                                        "In the ongoing quest for faster access to data, Diablo Technologies has taken what could be a significant next step.

                                                        Diablo's Memory Channel Storage (MCS) architecture, expected to show up in servers shipping later this year, allows flash storage components to plug into the super-fast channel now used to connect CPUs with memory. That will slash data-access delays even more than current flash caching products that use the PCI Express bus, according to Kevin Wagner, Diablo's vice president of marketing..."

                                                        Happy SysAdmin Day To All
                                                        Network Computing, July 29th, 2013
                                                        "I discovered -- almost too late to write this blog post -- that today is System Administrator Appreciation Day. Having spent much of my career as a Windows, and before that NetWare, sysadmin, I understand how unappreciated the average sysadmin feels. Maybe, just maybe, those poor introverted servants -- and masters -- of the servers will get the attention they deserve..."
                                                        Navigating the Troubled Waters of Patch Management
                                                        GCN, July 29th, 2013
                                                        "Patching is an effective way to mitigate security vulnerabilities in software and firmware, but patch management in an enterprise can be a daunting task because of the complexities of deployment across large, heterogeneous platforms.

                                                        'There are several challenges that complicate patch management,' the National Institute of Standards and Technology warns in its latest guidance on the practice. 'Organizations that do not overcome these challenges will be unable to patch systems effectively and efficiently, leading to compromises that were easily preventable'..."

                                                        Wanna Keep Your IT Job? Master Automation
                                                        InfoWorld, July 29th, 2013
                                                        "It's 5 a.m. I've been working way too long on a new feature of Exchange and SharePoint 2013 called site mailboxes, meant to improve collaboration by letting users connect to a team mailbox (through a browser) with storage shared between Exchange and SharePoint. The configuration is extremely complex: It requires expert understanding of both Exchange and SharePoint 2013, as well as every networking skill imaginable, from DNS configuration to certificate services. And yes, PowerShell scripts (thankfully already written) are essential to successful configuration..."
                                                          Advanced Uses of Oracle Enterprise Manager 12c
                                                          August 2013
                                                          "The objective of this whitepaper is to help operational teams, administrators and IT managers comprehend some of the more advanced features of Oracle Enterprise Manager 12c, so you can take full advantage of all the features and capabilities within the software, in order to get the most out of your Oracle investment-rather than just use Oracle Enterprise Manager 12c for basic capabilities, such as monitoring, metrics, thresholds, alerting and so on. While such capabilities are very useful, we need to go beyond monitoring into deep-down management of your applications, databases, middleware and server hosts.

                                                          This whitepaper gives you in a nutshell, a number of advanced techniques for setting up and working with Oracle Enterprise Manager 12c. We look at practical use cases from the experience of industry-leading Oracle experts. Tips and recommendations range from architecture for Oracle Enterprise Manager 12c, to setting up Oracle Recovery Manager (RMAN) backups, to creating and managing Oracle Active Data Guard standbys through Oracle Enterprise Manager 12c as well as other advanced capabilities..."

                                                          Trending in
                                                          Vol 234, Issue 2
                                                          Trending IT Articles