News about Oracle's Solaris and Sun Hardware
System News
Aug 5th, 2013 — Aug 11th, 2013 Generate the Custom HTML Email for this Issue
System News System News for Sun Users
Volume 186, Issue 1 << Previous Issue | Next Issue >>
Sections in this issue:
click to jump to section


IT - CxO
x
5 Things PRISM Teaches CIOs About Doing Business in Today's World
CIO, August 6th, 2013
"It's been about two months since the sweeping allegations of United States government surveillance, mainly through the National Security Agency, hit the airwaves. It seems like we get a new taste of how deeply the NSA works with various companies to enable that monitoring every couple of weeks, too.

We may never know the full extent of this program, and some details are still in dispute, but it has been long enough for the general public to start forming conclusions about the program. Considering what we now know - or at least what we think we know - here are five considerations for CIOs and technical staff at all companies in the wake of the PRISM monitoring scandal..."

  • Everything - Yes, Everything - Leaves a Trail.
  • Assume That Most PRISM Press Is Wrong.
  • PRISM Should Give You Pause About Cloud Migration Plans.
  • Understand At-Rest Encryption and Plan to Support It ASAP.
  • At the End of the Day, There's Not a Lot You Can Do.

Read on for details.

All Aboard: CIO Wins The Battle, Initiates Centralized IT Organization
SearchCIO, August 7th, 2013
"Eric Hawley doesn't mind being hated -- in a way, he actually welcomes it.

And if that doesn't sound odd enough, this aspect of Hawley's character played a huge role in making him the Enterprise IT Leader of the Year in SearchCIO's 2013 IT Leadership Awards.

Hawley is CIO at the Utah State University, a public university in Logan, Utah..."

Dear IT: No One Likes Petulant Teenagers
Information Week, August 5th, 2013
"A recent Harvard Business Review blog post by management professor Terri Griffith finally asks the question: 'Are we asking too much of our CIOs?' It is a great question. IT organizations have taken on more and more (and more) as technology pervades every aspect of business and consumer life. Something's gotta give.

From provisioning, operating and securing the sprawling Internet of Things to driving revenue and leading innovation in general, IT is now accountable for the success of virtually the entire business..."

Decision to Buy Cyber Insurance Usually Leaves CIO, CISO Out of the Loop
Network World, August 7th, 2013
"A Ponemon survey out today shows about a third of business and public-sector organizations buy cyber insurance to help protect them financially against data breaches and other security exploits. But the survey of 638 U.S. organizations shows there's still a lot of skepticism about whether such insurance is worth the cost.

One finding in the report is that the CIO and IT security divisions have only a small influence on whether to buy cyber insurance, while the risk management, line of business leaders and chief financial officers seem to have the final word..."

Forrester Dispels 'Myths' about Software Industry Trends in 2013
ComputerWorld, August 7th, 2013
"ERP (enterprise resource planning) applications may run the core operations of companies around the world, but enterprises are placing a higher priority in 2013 on other types of software, in particular BI (business intelligence), according to a new Forrester Research survey."

"BI leads the adoption priority list, both in terms of expanding or upgrading existing installations and new implementations," Forrester analyst Stefan Ried wrote in the report, which is titled "Ten Myths And Realities Of The Software Market In 2013."

Same Old Same Old as IT Fails to Mature
CSO Online, August 6th, 2013
"Not much has changed with respect to issues in IT that directly impact information security. Years have passed and much blood, sweat, tears and data have flowed needlessly due to poor management and an inability to perform foundational IT activities.

In my travels, I continue to see the same mistakes made by the same roles. Here is a list of what has not changed over the years that causes infosec professional great angst:..."

When to Quit
Information Week, August 8th, 2013
"His leaving came as a surprise to everyone; he was going great and was synonymous with the company and the industry for a long time. It was like he was destined to be in that position tailor-made for him. He reveled in this and loved the attention and adulation it bought. The industry acknowledged his leadership and mentoring of the minnows to help improve their well-being. So when leading media and press announced his exit, it was totally unexpected and unanticipated news..."
    Oracle
    x
    MediSwitch makes the switch to Oracle Database Appliance
    Podcast with Margaret Hamburger
    Margaret Hamburger writes, "MediSwitch chose Oracle Database Appliance over competing solutions to replace a legacy database system of hardware and software from many different providers. Recently, I had the pleasure of interviewing Wayne Botha, IT Manager of MediSwitch as he discussed their experience with Oracle Database Appliance.

    Not only did they complete a complex migration using Oracle GoldenGate to facilitate a near zero downtime migration in a very short period of time they upgraded their database to Oracle Database 11g. Listen as Wayne describes how simple Oracle Database Appliance was to install and deploy and how the capacity-on-demand licensing played a key factor in their decision to purchase. Best of all they were able to consolidate all of their development testing and pre-production databases and can now use a single resource to patch everything in one go over their legacy system. Their big surprise was the significant performance benefit running reports that use to take 4 hours and now only take 45 minutes.

    If you are considering Oracle Database Appliance, you won't want to miss this podcast..."

    Features
    x
    Embedded Software: Disruptions Ahead
    Blog Post by Terrence Barr
    Terrence Barr, Senior Technologist and Principal Product Manager for Oracle's small embedded Java Products, writes, "There is an interesting discussion happening on the LinkedIn 'Internet of Things' group right now, in response to the InfoWorld article a few days ago titled 'Oracle hitches Java to "Internet of things"'.

    The discussion touches on some interesting details on why Java may or may not be a good choice for embedded. Besides the fact that Java is already proven to be one of the most widely deployed embedded technologies ('10 billion and Counting..") I think the discussion misses a key point: The coming disruptive shift in the embedded industry..."

    Exadata
    x
    Unveiling Oracle's Latest Engineered System
    Live webcast August 13th, 2013, 10am PT/1pm ET
    Install and Deploy Your Virtual Infrastructure in Just Hours

    Join Wim Coekaerts - Senior Vice President, Linux and Virtualization - and learn about Oracle's latest engineered system. It provides a converged infrastructure powered by Oracle VM server virtualization and Oracle Virtual Networking, dramatically enhancing data center operations.

    Discover how this system can:

    • Accelerate time to value, with rapid infrastructure deployment
    • Reduce business risk by reducing the application deployment and maintenance complexity
    • Provide infrastructure flexibility by enabling dynamic provisioning of virtual machine resources
    • Lower costs and improve user service levels
    • Support a mix of applications and operating systems

    Join Oracle Experts and Chat Live Throughout the Webcast

    • Tuesday, August 13, 2013
    • 10:00 a.m. PDT

    Register "here."

    Virtualization
    x
    Oracle VM Named a Challenger in Gartner 2013 Magic Quadrant
    Gartner's Magic Quadrant for x86 Server Virtualization Infrastructure
    "Oracle is excited to announce continued upward as a second year 'Challenger' in the latest Gartner Magic Quadrant for x86 Server Virtualization Infrastructure report. Oracle believes that its application driven virtualization strategy, along with product optimizations, easy software access, and low cost have resulted in strong customer momentum gains..."

    Read the full report: Magic Quadrant for x86 Server Virtualization Infrastructure

    Linux Container (LXC) -- Part 2: Working With Containers
    How to work with containers with practical examples
    Lenz Grimmer writes, "Part 1 of this article series provided an overview about the Linux container technology. This second part intends to give you an impression on how to work with containers, by showing a few practical examples. These can be easily followed and reproduced on an up to date Oracle Linux 6 system. For the first steps, it is recommended to install Oracl Linux inside a virtual environment like Oracle VM VirtualBox. Oracle provides a pre-installed and pre-configured Oracle Linux 6 Virtualbox image for free download from the Oracle Technology Network (OTN).

    The administration of Linux containers is performed on the command line; so far, there is no integration or support for this technology in applications like Oracle VM Manager or Oracle Enterprise Manager..."

    IT - Storage
    x
    There's a Tide of Unstructured Data Coming - Start Swimming
    The Register, August 5th, 2013
    "Whether you prefer to define the known size of our planet's total digital universe in petabytes or even zettabytes, we can all agree the collective weight of data production is spiraling ever upwards.

    While we focus on the relative merits of transactional versus analytical databases, the unstructured data that fails to fall within the general purview of either these systems is the rising tide beneath.

    We are not just talking about non-textual audio, video and graphical data here. Unstructured data must also be thought of in its textual form of Word documents, emails, social media messages and other as yet undefined data shapes..."

      NAND Flash Sales -- And Prices -- Surge
      InfoWorld, August 7th, 2013
      "Sales of NAND flash technology rose 11 percent from the first to second quarters this year, and 30 percent for the year ending June 30, even as prices have surged.

      For instance, the price of a 64Gb NAND flash chip rose from $3.69 earlier this year to a high of $7.50 today, according to market research firm TrendForce..."

      Hybrid Storage Needs SSD Cache Flexibility
      Storage Switzerland, August 6th, 2013
      "While specialized all-flash storage systems grab the headlines, hybrid storage systems are increasingly becoming the workhorses of the data center, hosting the majority of applications, virtual machines and file shares.

      To expand the number of workloads that they can support many hybrid storage system manufacturers have turned to solid state disks (SSDs) to complement the hard disk drives in the system and boost performance. By using the SSD tier as a cache to the HDD tier, they've attempted to not only unify SAN and NAS storage protocols but also integrate the different storage media tiers..."

      File-based, Object Storage Market to Hit $23B in 2013: IDC
      eWeek, August 7th, 2013
      "IDC says the continued sharp increase in overall enterprise storage systems sales can be traced directly to a shift to FOBS from conventional storage.

      The escalating amount of data pouring into file-based and object-based storage arrays is forcing enterprises to rethink their storage-buying strategies. New industry numbers from researcher IDC released Aug. 7 bear this out. The worldwide file- and object-based storage market--known within the business as FOBS--continues to gain momentum, with revenues to exceed $23 billion in 2013 and forecast to reach a whopping $38 billion in 2017..."

      Java Technology
      x
      Java Spotlight Episode 140: Dr Heinz Kabutz on the Secrets of Concurrency-Part 1 @heinzkabutz
      Interview with author of Java Specialists' Newsletter
      Roger Brinkley has released a new Java Spotlight Podcast.

      Feature Interview

      Heinz is a Java programmer living on the beaches of the Island of Crete in the Mediterranean. It is from there that he publishes his entertaining "Java Specialists' Newsletter", read by about 70,000 Java experts in at least 130 countries (http://www.javaspecialists.eu/countries.html).

      Heinz tries to "push the envelope" with Java, so if you've ever wondered how to create new enum values on-the-fly (and why this is a bad idea, but why it might be useful), or if you want tips on Java coding style and threading, this publication might be for you. Warning: It is only for advanced Java programmers and those with a sense of humor...

      IT - Technology
      x
      USB Will Soon Catch Up to Thunderbolt with 10Gbps Speeds
      ComputerWorld, August 5th, 2013
      "After five years, the ubiquitous SuperSpeed Universal Serial Bus (USB) communications protocol got a huge upgrade this week with a new specification that more than doubles its speed.

      This latest release of the specification, version 3.1, is available now for download by developers from the USB Implementers Forum (USB-IF) website.

      SuperSpeed USB 3.1 jumps I/O throughput (on paper) from 4.8Gbps (in USB 3.0) to 10 Gbps, bringing it on par with another specification Intel developed, Thunderbolt..."

      World-Saving Robots
      Network World, August 6th, 2013
      "When a deadly earthquake struck Japan's Fukushima Daiichi in 2011, the nuclear-contaminated site was not safe for humans to work in. To help respond to disasters like that, the Defense Research Advanced Research Projects Agency began the DAPRA Robotics Challenge in an effort to create humanoid robots, and software to control them, that can act semi-independently in disaster areas using tools designed for humans..."
        Partners
        x
        Online Solaris Forum
        Replay
        Larry Wake writes, "Earlier this week, we had the latest Oracle Solaris web forum. Is it possible that you weren't there? Was something more pressing on your agenda, such as, I don't know: work? Or, if you're in a different time zone: sleep?

        Did you, in fact, miss out on the whole thing?

        No. No, you did not.

        Thanks to the power of computers, the Internet, and our great behind-the-scenes teams, we now have the on-demand replay of the web forum available, for you to replay. On demand!

        You can see all three sessions:

        • Oracle's Investment in Oracle Solaris - Best Enterprise UNIX for Oracle Systems and Software
        • Oracle Solaris: Optimized for Oracle Software
        • Oracle Solaris: Optimized for Oracle's Enterprise Systems

        Plus, you'll have access to the transcripts from the live Q & A..."

        MySQL
        x
        Top 10 Reasons to Attend MySQL Connect
        San Francisco September 21-23
        MySQL Connect is taking place in San Francisco September 21-23; Counting over 85 sessions and tutorials, the event represents a unique opportunity to boost your MySQL skills and hear from Oracle's MySQL engineers along with customers, partners and MySQL community members.

        Here are the top 10 reasons why you should do so:

        • Better understand Oracle's MySQL strategy. Hear straight from the source how Oracle is driving MySQL innovation, and what are the latest developments and roadmaps.
        • Learn about real-world experiences from other organizations. Find out about the mistakes you should avoid and the best practices they've developed. You'll get the chance to hear from MySQL experts at Facebook, Twitter, LinkedIn, PayPal, Verizon Wireless, Booking.com, Ticketmaster, Mozilla, Big Fish Games, Tumblr, MercadoLibre, NetMotion Wireless and others.
        • Meet the engineers developing and supporting the MySQL products. You'll have the opportunity to ask them all your questions, which can save you significant time and money.

        Read on for more reasons, details and registration details and discounts ...

        MySQL Connector/C 6.1.1
        A new version of the C API for client/server communication for the MySQL DBMS

        MySQL Connector/C 6.1.1, a new version of the C API for client/server communication for the MySQL database management system, has been released. This version of Connector/C provides full support for MySQL 5.6 protocol. Connector/C is compatible with the client libraries (libmysql).

        It includes all the features in the MySQL client library shipped with MySQL servers 5.6 as well as prior versions. You can recompile existing code linked with Connector/C 6.1.0 without any code changes. You can use Connector/C to run and build client applications which communicate with MySQL server versions from 4.1 to 5.6 without a need to do a complete server installation.

        The release is now available in source and binary form for a number of platforms from the download page.

        Linux
        x
        Switch from Red Hat Enterprise Linux to Oracle Linux in Minutes
        Migration Made Easy Webcast August 27th 9am PST
        Monica Kumar writes, "Join us for a live webcast on August 27 at 9am PT and find out how you can switch from Red Hat Enterprise Linux to Oracle Linux in minutes..."

        In this webcast, you will learn about:

        • The why and how of switching from Red Hat Enterprise Linux to Oracle Linux
        • Industry-leading Linux management and high-availability tools (included with Oracle Linux subscription at no charge)
        • Differentiated features, including Ksplice and DTrace
        • Deep testing and integration with the Oracle stack
        • Customer-use cases

        "With Oracle Linux, you get free access to the most advanced Linux operating system, better testing, integration with enterprise infrastructure and applications, and world-class support at a fraction of the cost.

        Speakers:

        • Monica Kumar, Senior Director, Product Marketing Linux, Virtualization and MySQL, Oracle
        • Michele Casey, Director, Linux Product Management, Oracle

        Register Now.

        Using Ksplice for diagnostic purposes
        Enable additional debugging functionality on your production system
        Lenz Grimmer writes, "We've been emphasizing the benefits of using Oracle Linux with Ksplice rebootless updates several times already. The ability to minimize downtime when applying rebootless patches to the Linux Kernel is a feature unique to Oracle Linux, and a growing number of customers realize the benefits of this technology...

        But did you know that we use Ksplice for diagnostic purposes, too? As part of our Oracle Linux Premier Support offering, we can make use Ksplice to enable additional debugging functionality on your production system, if we need to track down an issue in your environment..."

        IT - Cloud
        x
        Cloud Contracts Poor on Security, Says Gartner
        ComputerWeekly, August 5th, 2013
        "Buyers of commercial cloud services - especially software as a service (SaaS) - are finding security provisions inadequate, according to a report by research firm Gartner.

        Contracts need more transparency to improve risk management, analysts said, with SaaS contracts often have ambiguous terms regarding data confidentiality, data integrity and recovery after a data breach..."

        SaaS Contracts too Often Lack Security Specifics
        ComputerWorld, August 5th, 2013
        "The large majority of people working in IT procurement are "significantly dissatisfied" with the way SaaS (software as a service) vendors define contract language related to security, a feeling likely to persist through 2015, according to a Gartner report..."
        Cloud Concerns: Survey Reveals Some Counter-Intuitive Results
        Information Management, August 5th, 2013
        "Drill-down analysis of the results of Saugatuck's 2013 Cloud Survey found significant variations in the top concerns that business and IT executives had with regard to the adoption of Cloud-based offerings. While Saugatuck was not surprised that 'Data Security/Privacy' continued to rank as the top concern when aggregated across all buyer segments, other top concerns varied significantly - reflecting different realities by size, region and buyer type (IT vs. business)..."
        Cloud Service Providers Often not Set Up for Incident Response
        ComputerWeekly, August 5th, 2013
        "Cloud data storage and disparate privacy laws could be hampering companies fighting cyber attacks, according to Seth Berman, UK executive managing director of digital risk management and investigations firm, Stroz Friedberg.

        He urged organisations to review cloud services contracts to prevent valuable time being lost when responding to a data breach incident..."

        Don't Rely on the Little Guy for Cloud Services
        CITEworld, August 8th, 2013
        "About six weeks ago, Catch had some big news: It was making an enterprise pivot. Catch was basically an Evernote competitor, a cloud-based note-taking service with native iOS and Android apps and some unique UI features. I talked to new CEO Laura Yecies -- formerly of SugarSync -- about how the company was trying to follow Evernote into the workplace with a new offering, Catch Team.

        Apparently, it didn't work out..."

          NASA's Cloud Strategy Panned by NASA Auditors
          The Register, August 5th, 2013
          "NASA's cloud strategy has been panned by its own auditors, proving that even technically competent organizations can sputter when trying to soar into the tech stratosphere.

          In a lengthy report released on Monday by NASA's Office of Audits, investigators slammed the agency's cloud governance, risk management, and security policies..."

          Using Cloud Storage: Tips On SLAs, File Sharing, Archiving And More
          SearchCloudStorage, August 5th, 2013
          "Howard Marks is founder and chief scientist at DeepStorage LLC, a storage consultancy and independent test lab. In this expert interview for SearchStorage, Marks tackled seven questions related to using cloud storage, ranging from the value of service-level agreements to determining which applications are truly a good fit at a time when many IT administrators are considering going beyond backup and moving primary data and business applications to the cloud..."
            What the CIA Private Cloud Really Says About Amazon Web Services
            CIO, August 6th, 2013
            "When the CIA opted to have Amazon build its private cloud, even though IBM could do it for less money, a tech soap opera ensued. Lost amid the drama, though, is a perfectly reasonable explanation why Amazon Web Services makes sense for the CIA--and why a disruptive AWS represents the future of the cloud..."
            IT - DR
            x
            Weathering Hurricanes, Other Disasters: 10 Enterprise Best Practices
            eWeek, August 5th, 2013
            "Tornadoes, hurricanes, wildfires or other natural disasters can bring an enterprise to a screeching halt when the office is damaged or destroyed, and critical infrastructure is offline.

            When Hurricane Sandy hit the East Coast last fall, it resulted in $62 billion in damages and economic losses from businesses that were not able to operate because of flooded buildings, power blackouts and damaged communications infrastructure, Justin Moore, CEO at Axcient, reminded eWEEK.

            'However, there were several success stories, where firms had disaster plans in place and were able to leverage cloud-based disaster-recovery and business-continuity solutions to weather the storm. Dozens of IT providers in Sandy's path used the latest IT to spin up virtual offices in the cloud to keep employees productive while waiting for primary systems to come back online or be restored'..."

            Issues and Insights for Preventing Data Recovery Failures
            Information Management, August 5th, 2013
            "Do you know if you can recover your critical data quickly in the event of loss due to human error, theft or natural disaster - or in response to a regulatory mandate or e-discovery request?

            Whether it's as small as accidentally overwriting a document or as massive as a flood or earthquake impacting your data center, data loss is inevitable. By the same token, anytime data is lost, the key to recovering it successfully is a consistent, reliable and comprehensive backup process..."

              IT - PM
              x
              Five Best Project Management Apps To Make Your Projects Efficient
              Business 2 Community, August 8th, 2013
              "Project management can be a complicated affair. However, project complexity does not necessarily equal more features. This is because multiple features and functionalities that perform the same task can confuse team members and cause scope creep in projects. Essentially, there are two parts to project management.

              The first part is concerned with making sure that work is assigned and distributed optimally. The second part is concerned with analyzing project analytics to make sure that project goals are reached in an efficient fashion. Striking a balance between the two can be problem and most cloud-based project management apps scrimp on solutions..."

              PMO At Your Service
              AITS, August 5th, 2013
              Take-Aways:

              • The core mission of a Project Management Office is to help organizations improve project outcomes and improving how projects are executed.
              • Trends towards organizations that embrace improvisation in dealing with uncertainties, information overload, and global competition require more decisions to be made by project managers.
              • Project managers need to leverage both their own experiences and knowledge assets so they know when to follow the rules and when to break them to achieve desired outcomes.
              • PMOs must adapt to help project managers navigate turbulence and reduced cycle times.

              Read on for details.

              Smaller Project Teams Are More Productive
              Baseline, August 7th, 2013
              'At one time or another, almost all information technology professionals have heard cries for more resources. They may even have been the one asking for help. "If only there were more people available for this project," they've said, "then maybe it would get done on time."

              Well, it turns out that more staffing is not the equivalent of optimal staffing. In fact, smaller project teams are more productive and can complete projects cheaper and faster than larger ones, according to a recent study from software life cycle consultancy Quantitative Software Management. That should be good news for IT departments that have seen their ranks depleted in recent years...'

              Your IT Project is Toast: 11 Early Indicators to Watch for
              InfoWorld, August 8th, 2013
              "The IT world is no stranger to projects that go down in flames. Anyone who's had the unenviable pleasure of participating in a failed IT effort likely sensed its demise well before the go-live date. That sixth sense is invaluable in a competitive field like IT.

              Whether you're looking to avoid being saddled to a dud or to steer a doomed rollout away from the ditch, you must recognize the signs of imminent failure well before a project comes apart at the seams. It can be a career-saver.

              We've gathered 11 red flags to look for in assessing IT project health. Be proactive whenever you encounter one -- or if you can, simply walk away. Your career depends on it..."

              • The project has launched without senior buy-in
              • No detailed project plan exists
              • Meetings have been scheduled without concern for team member availability
              • Users have had little (to no) early involvement
              • The project targets the minimum specs
              • Testing is an afterthought
              • No recovery plan is in place in the event of failure
              • Expert recommendations have been rebuffed without testing outcomes
              • The go-live date is a weekend or holiday
              • Expectations have not been set
              • Skimp on training

              Read on for details.

              IT - Networks
              x
              15 More Useful Cisco Sites
              Network World, August 7th, 2013
              "It seems there are more and more sites either devoted to Cisco itself or to a market it's focused on and heavily invested in. Here's our latest roundup of such sites..."

              • Tech Field Day
              • Network Heresy
              • The OpenDaylight Project site
              • Open Networking Foundation
              • CITEworld site
              • DaniWeb IT discussion community site
              • Security-Database site
              • Homeland Security News Wire
              • Data Center Knowledge
              • Converge! Network Digest

              Read on for more sites and details.

              802.11ac: Preparing to Troubleshoot
              Network Computing, August 5th, 2013
              "While the 802.11ac is still not a ratified standard (the IEEE has a November deadline to make it official), the WLAN industry isn't one to wait for such formalities. Many vendors have announced early 11ac products, and vendors and customers alike are starting to live as if 11ac was already here..."
                Attackers Are in the Network, Now What?
                ComputerWeekly, August 5th, 2013
                "A growing number of security experts say the traditional model of a secure network perimeter is no longer meaningful and that companies should assume outsiders are already on the corporate network.

                Adversaries have shown in recent months that they are quite capable of stealing credentials to authenticate and access systems containing sensitive data. It is now only reasonable to assume that attackers are inside your network, that they can disguise themselves, and they can get close to sensitive information..."

                Network Security Remains a Blind Spot for Businesses
                eWeek, August 7th, 2013
                "Areas of blind spots within the typical enterprise are many, including applications, network traffic, network devices and user activity.

                Many enterprises possess an unrealistic confidence surrounding the security of their networks, with more than 65 percent of IT/security professionals contacted for a survey by network visibility and security intelligence specialist Landcope not thinking or being unsure that they had experienced any security incidents within the last 12 to 18 months..."

                SDN Is Not a Technology, It's A Use Case
                Network Computing, August 7th, 2013
                "Commentators on software defined networking (SDN) often point out that no one has deployed SDN, or you that can't buy SDN today. At a recent IETF meeting, someone stood up and said SDN stands for "Still Does Nothing."

                This attitude fails to understand SDN is not a technology. It's more practical to define SDN as a bunch of use cases that use many technologies to meet specific customer needs..."

                  IT - Operations
                  x
                  Four Critical Decisions in Data Center Migrations
                  Information Management, August 7th, 2013
                  "Innovations are creating new business opportunities, which require organizations to adopt newer technologies to stay ahead in their business. State-of-the art infrastructure, technologies and expert advice can save time, capital expenses, and ongoing operational expenditures and can reduce the physical footprint of the data center..."
                  IT - Security
                  x
                  Compliance No Longer Main Driver of Security Measures
                  Help Net Security, August 8th, 2013
                  'The need to ensure compliance with regulations should no longer be the primary consideration of CIOs when planning IT risk and security measures. Gartner said compliance is an outcome of a well-run risk management programme and should not dominate CIOs' decision making.

                  "By simply trying to keep up with individual compliance requirements, organisations become rule followers, rather than risk leaders," said John A. Wheeler, research director at Gartner. "CIOs must stop being rule followers who allow compliance to dominate business decision making and become risk leaders who proactively address the most severe threats to their enterprises."...'

                  Cutting Through The Mystique Of Testing The Mainframe
                  Dark Reading, August 5th, 2013
                  "While most IT security teams tend to lump mainframe systems into the category of legacy systems unnecessary or impossible to scrutinize during regular audits, that couldn't be farther from the truth, says a researcher at Black Hat USA who this week released a number of free tools meant to help bridge the understanding gap between mainframe experts and security professionals..."
                  Cybercriminals Are Doing a Better Job than the Companies They Target
                  Help Net Security, August 5th, 2013
                  "What can you learn from reading the exploits of the most successful hacking ring ever brought to justice? Recently, the US Attorney's Office in NJ unsealed their indictment against a mostly Russian-one American co-conspirator was also named-gang of cybercriminals who are alleged to have snatched over 160 million credit card numbers resulting in more than $300 million in losses over seven years..."
                    Make Security and Compliance Part of Workflow to Achieve Balance
                    ComputerWeekly, August 5th, 2013
                    "The march towards greater regulation and adherence to compliance has created a set of challenges for organisations and their IT departments, while also delivering a cultural shift with regards to how they treat data and quantify the need to secure it.

                    As always, there is a balancing act to achieve between meeting compliance and security expectations, while also keeping the business functional..."

                    Security Intelligence Through Configuration Auditing
                    Help Net Security, August 8th, 2013
                    "Modern systems have a multitude of configuration elements that, ideally, meet the IT business requirements of the organization. The danger of having poorly configured systems in place is real, due especially to their increasing complexity.

                    Managing a large number of servers without a configuration auditing solution becomes nearly impossible. Imagine having to deal manually, one at a time, with all the applications and databases on your network? And that's just the tip of the iceberg..."

                      The Tangled Web of Data Privacy Issues
                      SearchCIO, August 5th, 2013
                      "For those who care about data privacy issues, boy was this your week. These past seven days saw National Security Agency (NSA) director Gen. Keith Alexander wonder where the love was at the annual Black Hat security conference, Edward Snowden end his extended stay at the Sheremetyevo International Airport, MIT release its first public response to the prosecution of late hacktivist Aaron Swartz, and the XKeyscore program revealed.

                      But the news that seemed to reverberate the most -- it tore through social media like wildfire -- was the tale of the pressure cooker and the backpack..."

                      Understanding Incident Response: 5 Tips to Make IR Work for You
                      CSO Online, August 5th, 2013
                      "Incident response is a plan that evolves over time to keep your organization best prepared against likely threats. CSO talked to industry experts at Black Hat about the ups and downs of IR, and how to develop a plan that's right for you..."
                        Would You Want Your Child to Grow Up to Work in Infosec?
                        Network World, August 6th, 2013
                        "During my recent trip to Las Vegas for Black Hat I once again heard a lot of frustration from my fellow InfoSec people about the challenges of security incidents that seem to scream from our headlines every day. For a certain segment of the industry it seems like a thankless, no-win job. I began to ask my colleagues if, in spite of all these challenges, they would want their children to follow in their footsteps with a career in Information Security. The answers I received may surprise you..."
                        IT - Careers
                        x
                        10 Ways to Build Good Coworker Relationships
                        TechRepublic, August 5th, 2013
                        "Good office etiquette helps build the foundation for a healthy work environment. Here are 10 tips to make the most of your interactions with coworkers..."

                        • Practice common courtesy
                        • Use effective communications
                        • Respect other people's time
                        • Help yourself
                        • Proceed with caution on social media
                        • Stay on the level
                        • Don't gripe about work at work
                        • Put out a welcome mat
                        • Don't pass the buck
                        • Follow up with people

                        Read on for details.

                          Ex-Goldman Programmer Goes to Prison . Are You Next?
                          Internet Evolution, August 7th, 2013
                          "IT pros and knowledge workers who leave a company and work for a competitor need to be careful of legal prosecution. That's a lesson from the case of a programmer who did jail time after being convicted of stealing trade secrets from former employer Goldman Sachs.

                          Sergey Aleynikov helped Goldman Sachs earn hundreds of millions of dollars. But Goldman claims he stole its intellectual property, and he was sentenced to prison for eight years. That conviction was eventually overturned, but not before Aleynikov did time..."

                            How to Break the 9 Most-Destructive Work Habits
                            IT World, August 5th, 2013
                            "If you're miserable at work, you can do something about it and regain a tremendous amount of mental and emotional energy that you can put to better use.

                            AOL Jobs' Miriam Salpeter identified the top 9 destructive routines professionals practice, ones that can make any day longer, unproductive and downright depressing. Want to immediately improve your work life? Do not:.."

                            • Worry about things you can't control
                            • Obsess about what insignificant people think about you
                            • Procrastinate
                            • Be careless
                            • Fall into an Internet rabbit hole
                            • Badmouth people
                            • Hold grudges
                            • Constantly complain
                            • Obsess about the past

                            Read on for details.

                              NASA Working on Tech to Take Humans To Mars -- And Bring Them Back
                              ComputerWorld, August 6th, 2013
                              "As NASA celebrates its super rover's first year on Mars, scientists made it clear that the space agency's interest in the planet is only ramping up.

                              NASA, which will be sending more robotic rovers to Mars, also has set its sights on sending humans to the Red Planet between 2033 and 2043..."

                                IT - Virtualization
                                x
                                Keeping the Sprawl at Bay
                                IT Web, August 8th, 2013
                                "There's no such thing as an IT department with too much money. That's always been true, but budgets right now are universally tight. For many organisations I deal with, the question is not which 'nice-to-have' optimisation to leave off the list this year, but which essential project to delay.

                                This is not the only thing driving more and more organisations to virtualise their IT environments - there are many other factors like speed, reliability and flexibility - but making the best possible use of scarce resources is a big factor..."

                                  Your Hypervisor Still Matters -- So Choose Wisely
                                  InfoWorld, August 7th, 2013
                                  "Although sometimes considered a nonfactor in virtualization decisions, the hypervisor dictates other options...

                                  In the early days of virtualization, the hypervisor was king. We all knew that VMware had the better hypervisor, and until Microsoft produced a competitive option, VMware was the only choice. In present-day virtualization discussions, though, the hypervisor doesn't play as large a role. In fact, many have dismissed the hypervisor as a commodity. As with electricity, you can purchase it from any vendor. Which hypervisor just doesn't matter..."

                                  Storage
                                  x
                                  Oracle Storage Expert Center: Database Management
                                  Papers, Videos, Demos, and more
                                  Oracle invite you to check out the new Oracle Storage Expert Center for Database Management. Test drive the ZFS Storage Appliance, download free e-books, learn how one customer achieved 99.999% up-time, and more.
                                  IT - Database
                                  x
                                  The Virtues of Database as a Service
                                  InfoWorld, August 5th, 2013
                                  "Database as a service is nothing new. But you'd think it was considering its low adoption -- fewer than 1 percent of businesses do it -- even as other forms of cloud computing are growing fast. The concept of keeping corporate data in public clouds is new to most businesses.

                                  But as the needs around data analytics and transactional data processing continue to grow -- and IT budgets remain the same -- the use of public cloud-based databases will climb rapidly..."

                                  IT - Mobile
                                  x
                                  Five Common Legal & Regulatory Challenges With Social Media
                                  CSO Online, August 5th, 2013
                                  "It should come as no surprise that regulators and organizations alike struggle to set and enforce guidelines for social media activity. It's not just that the rise of social media is rapidly transforming the way we interact with people, customers, and brands; but also how many ways this transformation is happening..."
                                    Why MDM and ITSM Need to Play Nice
                                    ComputerWorld, August 5th, 2013
                                    "Every IT professional knows that bring-your-own-device (BYOD) is here to stay. Analysts at Gartner report that about half of the world's companies will have adopted BYOD programs by 2017. Even heavily regulated industries are opening the door to mobility and allowing employees to choose their device of choice. So what does this mean for IT service management? ..."
                                    IT - Big Data
                                    x
                                    4 Biggest Big Data Myths
                                    Information Week, August 8th, 2013
                                    "Big data will never eliminate uncertainty or answer all your questions. But treat it as a fad at your own peril.

                                    There's no shortage of noise surrounding big data. Today it seems that every software vendor, consulting firm and thought leader has developed the "right" definition of the term. While I'd argue there is no such definition, I would like to dispel a few of the most commonly held myths about the subject, many of which I explore in Too Big to Ignore: The Business Case for Big Data..."

                                    10 Big Data Trends Changing the Face of Business
                                    InfoWorld, August 5th, 2013
                                    "Big data is slowly but surely changing the way companies do business. 'There are different use cases in every industry,' says Ron Bodkin, CEO and founder of big data consulting firm Think Big. 'Big data is unlocking an ability to work with data that has been stressed for a long time. There's been a lot of pent-up demand.'

                                    Here are 10 trends shaping big data and the future of business..."

                                    • Machine data and the Internet of Things Takes Center Stage
                                    • Compound applications that combine data sets to create value
                                    • There's an explosion of innovation built on open source big data tools
                                    • Companies taking a proactive approach to identifying where big data can have an impact
                                    • There are more actual production big data projects
                                    • Large companies are increasingly turning to big data
                                    • Most companies spend very little, a few spend a lot
                                    • Investments are geared toward generating and maintaining revenue
                                    • The greatest ROI of big data is coming from the logistics and finance functio
                                    • The biggest challenges are as much cultural as technological

                                    Read on for details.

                                    Enterprise Master Data Management and Big Data: A Well-Matched Pair
                                    SearchDataManagement, August 8th, 2013
                                    "Big data and master data management seem destined for a future together, but for now their relationship remains murky and unresolved.

                                    At first blush, the two seem like a mismatched pair. Big data environments typically encompass large volumes of text and other forms of unstructured data from a variety of sources, such as social networks, Web server logs and sensors. Enterprise master data management (MDM) initiatives are meant to create a trusted source of highly structured transaction data throughout an organization..."

                                    IT - BYOD
                                    x
                                    12 BYOD Disaster Scenarios
                                    CIO, August 5th, 2013
                                    "Everyone seems to be jumping on the Bring Your Own Device bandwagon, but it's a bumpy ride. There are many ways to fall off and get a bloody nose (or worse). As the BYOD reality catches up to the hype, here are 12 very real disaster scenarios..."

                                    • Sneaky Workers Rip Off Employer
                                    • Out of Compliance
                                    • The Productivity Problem
                                    • Out of the Network, Into the Cloud
                                    • Expense Reports Explosion
                                    • Text Messaging Theft
                                    • Lost Phone
                                    • Lawsuit 1: Privacy
                                    • Lawsuit 2: Overtime
                                    • The Widening Trust Gap
                                    • Zombie Phone Invasion
                                    • Media on Line 1

                                    Read on for details.

                                    10 Mobile Device Management Leaders to Help Control BYOD
                                    ComputerWorld, August 7th, 2013
                                    "Consumers love their smartphones and tablets, so it should come as no surprise that they want to use their devices at work. The pressure to develop and deploy a bring-your-own-device (BYOD) policy is on and coming from every direction, including the 'C' suite of executives who tend to be especially keen on using smartphones and tablets for their work.

                                    Managing devices in a BYOD environment is no small feat, and the right mobile device management (MDM) product is a key component in making it work. Here are 10 leading MDM vendors in the market today, drawn from the leaders and visionaries in Gartner's 2013 Magic Quadrant for Mobile Device Management Software..."

                                    How IT Can Scare Off BYOD Monsters in the Closet
                                    CIO, August 8th, 2013
                                    "When it comes to security risks, BYOD is the gift that keeps on giving. But what about the devices that your employees used to use, gave up on and, months later, finally dug out of the closet to sell? That's another issue to wrestle with. Here are seven ways to beat the monsters..."
                                    Top10
                                    x
                                    Top Ten Articles for last few Issues
                                    Vol 185 Issues 1, 2, 3, 4 and 5; Vol 184 Issues 2, 3, 4
                                    We track how frequently each article is viewed on the web site to determine which the readers consider the most important. For last week, the top 10 articles were:

                                    • Sun Ray Hardware Last Order Dates
                                    • READ_ME_FIRST: What Do I Do with All of Those SPARC Threads?
                                    • How to Get Best Performance From the Oracle ZFS Storage Appliance
                                    • Unveiling Oracle's Latest Engineered System
                                    • Sun Rack II capacity calculator
                                    • Advanced Uses of Oracle Enterprise Manager 12c
                                    • Business Managers Must be Smart About Cloud
                                    • Double Maximum Memory Capacity for SPARC T5-1B & T5-2 Servers
                                    • Oracle Storage: Standalone and Engineered Systems
                                    • OSCON Trip Report

                                    The longer version of this article has list of top ten articles for the last 8 weeks.

                                      IT - Encryption
                                      x
                                      Step Into the BREACH: New Attack Developed to Read Encrypted Web Data
                                      The Register, August 5th, 2013
                                      "A new hacking technique dubbed BREACH can extract login tokens, session ID numbers and other sensitive information from SSL/TLS encrypted web traffic, say researchers.

                                      Secret data crucial to securing online banking and shopping can be lifted from an HTTPS channel in as little as 30 seconds, we're told.

                                      BREACH (short for Browser Reconnaissance and Exfiltration via Adaptive Compression of Hypertext) attacks the common Deflate data compression algorithm used to save bandwidth in web communications. The exploit is a development of the earlier Compression Ratio Info-leak Made Easy (CRIME) exploit, which also involved turning compression of encrypted web requests against users..."

                                        Sysadmin
                                        x
                                        Operational Considerations and Troubleshooting Oracle Enterprise Manager 12c
                                        An Oracle White Paper
                                        Oracle Enterprise Manager (EM) 12c has become a valuable component in monitoring and administrating an enterprise environment. The more critical the application, servers and services that are monitored and maintained via EM, the more critical the EM environment becomes. Therefore, EM must be as available as the most critical target it manages.

                                        There are many areas that need to be discussed when talking about managing Enterprise Manager in a data center. Some of these are as follows:

                                        • Recommendations for staffing roles and responsibilities for EM administration
                                        • Understanding the components that make up an EM environment
                                        • Backing up and monitoring EM itself
                                        • Maintaining a healthy EM system
                                        • Patching the EM components
                                        • Troubleshooting and diagnosing guidelines

                                        The Operational Considerations and Troubleshooting Oracle Enterprise Manager 12c whitepaper available on the Enterprise Manager Maximum Availability Architecture (MAA) site will help define administrator requirements and responsibilities. It provides guidance in setting up the proper monitoring and maintenance activities to keep Oracle Enterprise Manager 12c healthy and to ensure that EM stays highly available.

                                        Security
                                        x
                                        Understanding and Using Trusted Extensions in Oracle Solaris 11
                                        An introduction to the evolution, installation, and usage of the security extensions incorporated in Oracle Solaris 11

                                        Yuli Vasiliev has written an introduction to the evolution, installation, and usage of the security extensions incorporated in Oracle Solaris 11.

                                        "Trusted Extensions is a powerful security technology of Oracle Solaris that allows you to create a multilevel (labeled) security environment in which users with different access permissions can work simultaneously with data that has different access controls, thus enabling you to enforce strict access controls for your data based on both data sensitivity and data ownership.

                                        Want to comment on this article? Post the link on Facebook's OTN Garage page. Have a similar article to share? Bring it up on Facebook or Twitter and let's discuss. This article unveils some history and background on Trusted Extensions and then explains how to install and enable the feature in Oracle Solaris 11. It covers how to create and configure a Trusted Extensions system with the help of tools available in Trusted Extensions, including the txzonemgr script, Labeled Zone Manager, and Label Builder..."

                                        Trending in
                                        Vol 231, Issue 3
                                        Trending IT Articles