News about Oracle's Solaris and Sun Hardware
System News
Aug 12th, 2013 — Aug 18th, 2013 Generate the Custom HTML Email for this Issue
System News System News for Sun Users
Volume 186, Issue 2 << Previous Issue | Next Issue >>
Sections in this issue:
click to jump to section

Oracle SQL Developer Data Modeler 4.0 Early Adopter Release
Available on OTN
The Early Adopter release of Oracle SQL Developer Data Modeler 4.0 is now available on OTN (Oracle Technology It completes as important add-on release 4.0 of SQL Developer. It comes with an interesting set of new features.
Unveiling Oracle's Latest Engineered System
Webcast now available on-demand
Install and Deploy Your Virtual Infrastructure in Just Hours

Join Wim Coekaerts - Senior Vice President, Linux and Virtualization - and learn about Oracle's latest engineered system. It provides a converged infrastructure powered by Oracle VM server virtualization and Oracle Virtual Networking, dramatically enhancing data center operations.

Discover how this system can:

  • Accelerate time to value, with rapid infrastructure deployment
  • Reduce business risk by reducing the application deployment and maintenance complexity
  • Provide infrastructure flexibility by enabling dynamic provisioning of virtual machine resources
  • Lower costs and improve user service levels
  • Support a mix of applications and operating systems

Register to see the replay.

Oracle VM -- Quantifying The Value of Application-Driven Virtualization
Report Shows Oracle VM Up to 10x Faster than VMware vSphere 5 in Time to Deployment
Time is your IT department's greatest commodity. So when a new report reveals that your IT staff can deploy Oracle Real Application Clusters (Oracle RAC) up to 10 times faster than a traditional install performed with VMware vSphere 5, it's newsworthy.

In fact, with access to more than 100 predefined, pre-configured, and pretested Oracle VM Templates, IT administrators can quickly virtualize and deploy an entire computing stack-resulting in huge savings that show up on your bottom line.

Read this paper to understand:

  • The unique capabilities of the Oracle VM Templates for accelerating enterprise application deployment
  • The value of integrated management throughout the application life cycle
  • The implications for delivering services-including cloud-more quickly and efficiently

The Evaluator Group lab validation report, "Quantifying the Value of Application-Driven Virtualization with Oracle VM," published August 2012 is still meaningful even though Oracle VM is now at release 3.2.

Why use Oracle VM for Oracle Databases
White Paper by Francisco Munoz Alvarez, Oracle Professional Services Manager
Ever asked your self how an Oracle Database performs in a virtualized environment and how these numbers compare against a traditionally bare metal installation?

In this recently published White Paper "Why use Oracle VM for for Oracle Databases" you may find some hints and you will get answers to the questions:

  • Does an Oracle Database perform well on a virtualized environment?
  • What virtualization technology is more stable and allows an Oracle database to perform faster?
  • What is the performance difference between using a bare metal and a virtualized guest?
  • Is it safe to run a production database in a virtualized environment?

For more and detailed information read the white paper "Why use Oracle VM for for Oracle Databases."

IT - Storage
New Storage Technology Will Likely Change the Way We View Tiers
Enterprise Efficiency, August 5th, 2013
"Data storage is undergoing a massive transition. Old ideas are being challenged and replaced and the implications change more than storage.

Some new drives are 10,000 times faster in random file operation than some more traditional options. With such huge changes, something has to give, and much of what will give is our traditional storage tiering strategy..."

    Enterprise Flash Arrays Pack in More Storage with Denser Media
    ComputerWorld, August 12th, 2013
    "A new generation of faster, cheaper flash storage is hitting the enterprise market and will be in the spotlight this week at the Flash Memory Summit conference.

    At least three makers of all-flash storage arrays plan to show off products based on the most dense NAND flash components yet, with cells smaller than 20 nanometers across. These will fit more data into the same space, reducing power consumption and per-gigabyte cost. The catch: Flash gets slower and more error-prone when it gets that dense, so the new products required even more advanced software to make up for this, the vendors say..."

    Fibre Channel in More Trouble
    InfoStor, August 9th, 2013
    "We have all heard about the problems that QLogic is having and fibre channel's decline. I even posted something on this back in May.

    Now the latest is that Emulex is looking for a buyer. This is not good for those of us that have large fibre channel installations..."

    10 Small Devices. No, We Mean Really Small
    ComputerWorld, August 9th, 2013
    "The old adage that good things come in small packages has never been truer -- and they can be smaller than a smartphone or a 7-in. tablet. A lot smaller.

    And while some of the devices shown here are just tiny enough to be impressive, others can't even be seen with the human eye. Thanks to the latest advances in nanotechnology, items even in the microscopic world can have a huge impact on our lives..."

    • Now you see it -- or you don't
    • Print your own batteries
    • A movie with a very small cast
    • Tiny tunes
    • Light bright
    • Thanks for the micro-memories
    • The eyes have it
    • Digital buzz
    • A tiny capacitor with a large capacity
    • A revolutionary size

    Read on for details.

      Giving Kids IPads Won't Solve the Education Challenge
      InfoWorld, August 9th, 2013
      "You've no doubt read the news that Los Angeles is distributing 640,000 iPads to K-12 students, which is a big win for Apple and yet another sign that the PC is in decline. At the same time, Dell touts the wonders of its Windows 8 tablets for schooling. It's great that students are getting current technology. However, technology doesn't teach -- and it often doesn't help teach, either..."
      Memory Wars: RRAM Vs. 3D NAND Flash, and the Winner is...Us
      ComputerWorld, August 8th, 2013
      "Within a few years, you'll likely be carrying a smartphone, tablet or laptop with hundreds of gigabytes or even terabytes of hyper fast, non-volatile memory, thanks to two memory developments unveiled this week.

      First, Samsung announced it is now mass producing three-dimensional (3D) Vertical NAND (V-NAND) chips; then start-up Crossbar said it has created a prototype of its resistive random access memory (RRAM) chip.

      Three-dimensional NAND takes today's flash, which is built on a horizontal plane, and turns it sideways. Then, like microscopic memory skyscrapers, it stacks them side-by-side to create a vastly more dense chip with twice the write performance and 10 times the reliability of today's 2D, or planar, NAND..."

      The Wearable Tech that will Revolutionize Business
      InfoWorld, August 15th, 2013
      "Think wearable technology is only about porn on your glasses, silly watches, and digital pedometers for runners? Think again. Companies like SAP, Epson, IBM, Plantronics, and even Walt Disney are bringing wearable technology to business.

      In the not-too-distant future, mechanics will see the schematics of heavy equipment they need to repair on a heads-up display, and flexible semiconductors will be implemented within the bodies of patients to broadcast data to their doctors. Office workers will connect directly with customer data via a telephonelike headset, and visitors to Disneyland will wear wristbands that double as admission tickets, hotels keys, and payment cards.

      Check out these real-world examples of wearable tech geared toward transforming business..."

      • SAP and Vizux: Heads-up data delivery
      • SAP and Vizux: Maintenance made easy
      • Disney: Enhancing the guest experience
      • Epson and APX Labs: Data mining at a glance
      • Epson and Scope Technologies: Visual repair instructions
      • Plantronics: Programmable headset
      • IBM: The tiny bit of silicon that could save lives

      Read on for details.

      Java Technology
      Java Spotlight Episode 141: Dr Heinz Kabutz on the Secrets of Concurrency-Part 2 @heinzkabutz
      By Roger Brinkley
      This podcast features part 2 of an interview with Dr Heinz Kabutz:

      "Heinz is a Java programmer living on the beaches of the Island of Crete in the Mediterranean. It is from there that he publishes his entertaining "Java Specialists' Newsletter", read by about 70000 Java experts in at least 130 countries."

      Show Notes

      • JavaOne Opening Day starts early - take note!
      • JavaOne Community Keynote 2013
      • Duke Choice Awards
      • Debian moves up to OpenJDK 7
      • OpenJDK Testing Pitfalls presentation by Stuart Marks
      • GlassFish User Group in London inaugural meeting
      • JMS using GlassFish in Jelastic
      • Apache Tomcat 8 RC - Java EE 7 (WebSocket 1.0, Servlet 3.1, EL 3.0)
      • WebLogic 12.1.2 Launch
      • NetBeans 7.4 Beta

      Download the podcast.

      Java Magazine July/August
      All About Peformance
      Tori Wieldt writes, "The July/August issue of Java Magazine is all about performance. A prime example: Twitter. Learn how Twitter migrated to the JVM and now supports (at last count) 400 million tweets a day. How Oracle Team USA relies on a wireless Java system for real-time data to improve performance on the racecourse. How MapReduce allows Java developers to write programs to process, transform, and derive insights from petabyte size datasets..."
      Exploring Installation Options and User Roles
      by Alexandre Borges
      Alexandre writes that this is ,"Part 1 of a two-part series that describes how I installed Oracle Solaris 11 and explored its new packaging system and the way it handles roles, networking, and services. This article focuses first on exploring Oracle Solaris 11 without the need to install it, and then actually installing it on your system...

      In this article, my approach will be to show you how you can explore Oracle Solaris 11 before (or instead of) installing it. Then, I help you install it, and I will describe the Oracle Solaris 11 desktop, how to use the root role, and how to get some basic information about the system.

      In Part 2 of this series, I will explain several of the important features of Oracle Solaris 11, such as networking features, the Service Management Facility, and the Image Packaging System.

      Along the way, I will also share a bit about my experience installing, configuring, and administering Oracle Solaris 11 and what kind of problems I faced when I tried to use it..."

      MySQL Workbench 6.0
      New Design and Many Enhancements
      New GUI, 30+ New Features, and Major New Components

      Mike Frank writes, "Oracle is excited to announce the immediate availability of the production-read, GA release of MySQL Workbench 6.0, available for download under the GPL, as well as part of the Commercial MySQL Standard, Enterprise, and Cluster Carrier Grade Editions with 24x7 global support.

      The need by database professionals for management tools has increased with expanding data volumes, web, cloud and mobile computing growth. Improvement and additions in MySQL Workbench helps developers and administrators better manage these dynamic data environments. This latest GA release includes many new features and a modernized user interface that allows users to simplify MySQL database development, design and administration..."

      Cloud Computing
      The AppAdvantage of Oracle Cloud & On-premises Integration
      Simplifying the complexity of cloud and on-premises integration
      Many Oracle application customer are wondering:

      "How do I avoid a nightmare of complexity while expanding my application integration infrastructure from on-premises to a hybrid mix of cloud and on-premises?"

      Oracle's solution to simplifying the complexity of cloud and on-premises integration is based on removing the distinction between cloud and on-premises integration with a unified approach to integration regardless of deployment location.

      For more information on Oracle's solution to simplifying hybrid cloud integration complexity, download the white paper "Cloud Integration - A Comprehensive Solution".

      Oracle Linux Releases
      Major release, Minor updates, errata update
      Wim Coekaer blogs, "A frequently discussed topic inside Oracle and also outside with customers and partners is Oracle Linux versions and how to treat updates and support and certifications and minimum levels. Here's our take on it, from the Oracle Linux side. When talking about Oracle Linux and versions, there really are 3 major components:"

      • A major new release, such as Oracle Linux 5, Oracle Linux 6,...
      • A minor update
      • An errata update

      Wim concludes, "So often, a customer service request comes into the support organization and it's a problem that's known and fixed in an errata, a downtime that could've been prevented by being more current..."

      IT - Cloud
      Buried in Software Licensing
      ComputerWorld, August 12th, 2013
      The transition to cloud-based services is ratcheting up traditional enterprise software costs and adding layers of complexity. Here's how IT organizations are breaking free...

      David Steinour is at his wit's end with enterprise software cost increases. In each of the past three years, the CIO at George Washington University (GWU) watched his annual maintenance and support costs for Oracle Financials and related enterprise software jump by at least 10%.

      'Oracle works very well, but at the end of the day we pay a huge price for that service,' Steinour says..."

      By 2020, Cloud Will Be 'Like Having a Formula 1 Team Running IT'
      ComputerWeekly, August 12th, 2013
      "There is no doubt that cloud computing is changing the way organisations operate.

      By 2020, many industry watchers believe the easy availability of commodity, on-demand IT will have dramatically disrupted the market to the extent of creating new ways of doing business.

      However, there are issues such as security, open standards and culture, which need to be addressed before cloud can achieve its full potential..."

      How Devops and Cloud Can Remake Your IT Department
      Network World, August 12th, 2013
      "Devops and the cloud: They're two of the biggest buzzwords in high-tech today. But organizations embracing these trends are finding out just how closely the two are linked, and the advantages that automating IT processes can bring.

      Take Rafter, a San Mateo-based company that was founded on the idea that college textbooks are really expensive. Chris Williams created a sort of Netflix for textbooks rental business that started by running off a couple servers sitting in a closet. Seven years later the company has 150 employees and is helping students and bookstores manage inventory and host online book stores for colleges, in addition to the book rentals..."

      IT As Cloud Service Provider: New Skills Required
      Information Week, August 12th, 2013
      "Corporate IT organizations are facing real competition. Business users are deploying sophisticated SaaS applications on their own. Developers are looking first to public cloud IaaS and PaaS platforms to build new applications, reducing the need for internal infrastructure. With every new third-party cloud service, more IT budget dollars go outside the door. So what's a CIO to do?..."
      Key Cloud Computing Trends and Enterprise Security
      Help Net Security, August 12th, 2013
      "Dan C. Marinescu is the author of Cloud Computing: Theory and Practice. He was a Professor of Computer Science at Purdue University in West Lafayette, Indiana from 1984 till 2001 when he joined the Computer Science Department at the University of Central Florida.

      In this interview, Marinescu outlines a variety of interesting facts about cloud security, illustrates how the cloud has shaped enterprise security, and provides insight into key future trends..."

      NSA Revelations a Mixed Bag for Private Clouds
      CSO Online, August 14th, 2013
      "Data security fears won't fuel an exodus from public cloud services, experts say...

      Life in the cloud hasn't been the same since Edward Snowden began leaking secrets about government snooping on the Internet.

      Public cloud operators in the United States may be facing large losses because of the Snowden Affair, said a report last week by the Information Technology & Innovation Foundation..."

      What CFOs Don.t Know: Top Cloud Myths
      Business 2 Community, August 15th, 2013
      "Many companies have embraced cloud technology for everything from human resources to customer relationship management, yet the finance department isn't jumping on board. What's holding them back and how can they benefit from cloud-based financial systems?

      Well clearly finance professionals aren't risk-takers - and that's a good thing. We were taught to be conservative, questioning and good custodians of company assets. As the senior leader responsible for handling risk and compliance for an entire company, a CFO is often cautious when it comes to adopting new types of technology - especially for the core accounting operations..."

      What the Cloud Will Look Like in 3 Years
      InfoWorld, August 9th, 2013
      "Perennial management, security, and data issues will remain key, but they will look different than they do today...

      Although many people are calling for a cloud revolution in which everyone simultaneously migrates their systems to the cloud, that's not going to happen. Instead, the adoption of cloud computing will be largely around the opportunistic use of this technology..."

      IT - CxO
      What the $500 Billion Cybercrime Estimate Means for Enterprises
      CIO Today, July 26th, 2013
      "For enterprises, breaches have an ongoing cost that can take a long time to manifest as intellectual property continues to be stolen from the organization and is put into practice competitively in global markets. "When an attacker breaches your network his work has just begun," said security analyst Tom Cross..."
      8 Questions to Ask Before You Hire More Employees
      HR Solution Journal, August 13th, 2013
      "Anyone who has ever started a business, particularly if they've bootstrapped the start-up, has experienced a major moment of indecision: When do you hire more people?

      On one hand, you want to keep staffing as low as reasonably possible. The more people you bring on, the less money available to cover your own contribution or to invest back into the business. However, put off hiring too long and you can hamper growth and damage relationships with customers because you become unable to keep up with business..."

      • What kind of business do you want?
      • Can you throttle back growth if needed?
      • What is your growth like?
      • Are you suffering from growth?
      • Is there outside help available?
      • Do you really need help?
      • Are you ready for the short-term profit impact?
      • Are you set up to handle more employees?

      Read on for details.

        Bad IT Customer Service Starts At The Top
        Information Week, August 13th, 2013
        "Customer service: It can make the difference between the failure and success of IT organizations and the enterprises they serve. Trouble is, it's scarcer than ever. Nobody's been able to bottle it. But don't blame bad customer service on employees; blame it on leadership.

        At one organization I worked with, poor planning for an outdoor event led to hot, hungry/thirsty employees who didn't get bathroom breaks lashing out at a VIP's little kids ... and to a subsequent backlash..."

          Bart Perkins: Jousting for jobs
          ComputerWorld, August 12th, 2013
          "We all want to hire winners. That's even more vital when we're trying to fill key technical jobs like programmer and architect. After you've taken the time to post the jobs, work with recruiters and sift through mountains of resumes, you'll still want to verify the technical skills of the applicants. That's where a contest can be helpful..."
            Handling Complaints: Do Your Managers Know the Chain of Command?
            Business Management Daily, August 9th, 2013
            "Now that the U.S. Supreme Court has recently defined who is a 'supervisor,' can employers finally relax and cut down on their employment liability insurance? Nope. Not so fast. One court recently ruled that even a manager who can't 'hire, fire or discipline' can still hold a company responsible for Title VII harassment liability if he or she fails to send an employee's complaint to the correct links on the corporate chain..."
              How to Stop Hiring the Wrong People in Five Simple Steps
              TLNT, August 13th, 2013
              "Standardized interviews, questionnaires, complex scoring systems, background checks, drug tests and personality assessments - Corporate America has certainly engineered what should be a fool-proof process to help companies avoid hiring the wrong person...

              Here are some of the most common indicators that a candidate isn't right for your organization and how to deal with them:"

              • Fuzzy answers
              • Bashing a former employer
              • Too much group attribution
              • Late for the interview
              • The Signal: Spinning a weakness as a strength

              Read on for details.

                'Shark Tank' Entrepreneur: 20 Secrets To Surviving Vicious IT Waters
                CRN, August 15th, 2013
                "Kevin O'Leary, a successful software entrepreneur featured on the hit ABC television show 'Shark Tank,' recently spoke to 400 IT buyers at $1.5 billion solution provider PCM's Vision IT Conference & Expo. Following the conference, O'Leary spoke to CRN about the secrets to succeeding in the fast-paced IT services market... Here are 20 secrets from O'Leary on how to survive IT's 'Shark Tank.'..."

                • Make IT A Profit Center
                • Pay Your Salespeople More Than The CEO
                • Know The Numbers
                • Make Sure Customers Understand The High Return On IT Investment
                • Invest In Sensor-Based Solutions
                • Increase Your Profitability By Delivering Cloud Solutions
                • Service Trumps Price
                • Cherish And Reward American Entrepreneurialism
                • Don't Tax Software And Services Innovation
                • Outsource. Outsource. Outsource

                Read on for more secrets and details.

                  Ten Workplace Lessons From the Military
                  Baseline, August 9th, 2013
                  "While it's a discomforting thought, the truth is that the majority of today's employees have probably spent most of their professional careers during a time of war. And, regardless of whether they served in Iraq, Afghanistan or another global hotspot, men and women who have sacrificed while serving overseas can offer many valuable lessons learned from the battlefield - lessons that are readily transferable to the modern, technology-driven workplace. With this in mind, the following 10 insights shed light on the wide range of valuable skills, practices and personal qualities that are commonly found within members of the military community..."

                  • No Surrender
                  • Punch-List Items
                  • Decentralized Structure
                  • Flood the Zone
                  • Role Call
                  • Organized Chaos
                  • Grace Under Pressure
                  • Inspirational Leaders
                  • One for All
                  • Strength and Honor

                  Read on for details.

                  Transform Your IT Team With a Persuasive Slogan
                  CIO Insight, August 9th, 2013
                  'When General George Joulwan was commander in chief of the U.S. Southern Command during the early 1990s, he ended all of his messages with a slogan: "One Team, One Fight." Joulwan would also greet the soldiers and officers under his command with the same "One Team, One Fight" slogan. "After a while we started smiling whenever we heard George's slogan," Colin Powell recalls in his autobiography, It Worked for Me. "But [the slogan] was a good idea - worth taking to heart. It was a constant reminder to his command that everyone had to come together as a team to prosecute a fight that everyone agreed had to be won. It remains a good idea."...'
                    IT - PM
                    7 Keys to a Successful BPM Initiative
                    Information Management, August 12th, 2013
                    "Over the last decade, business process management has primarily been a back-office function; however, a focus on improved customer service, regardless of industry vertical, has brought BPM to the foreground of organizations... MWD Advisors' "BPM Technology Review 2013" outlined 7 tips to introduce (and keep) BPM in your organization..."

                    • Business Takes the Driver's Seat
                    • Try to Maximize Participation
                    • Make Sure All Actions are Measurable and Justifiable
                    • Supports Decision-Making
                    • BPM is "Part of the Furniture"
                    • Tools Support and Manage Change
                    • Platform Offers Integrated Experience

                    Read on for details.

                    All Projects Are Business Projects
                    Information Management, August 7th, 2013
                    "I read this somewhere recently - I think it was the CIO of Intel, Kim Stevenson (quoting IT folklore). But it stuck in my mind, long after the link that I harvested it from had evaporated. I like it since it gets to the heart of the discussion - what's the business problem you are trying to solve. So often I find myself fielding queries where the people on the other end of the phone have decided on a technological solution (a hammer), and are now looking for a problem (the right nail)..."
                    IT - Networks
                    How A Switch Failure in Utah Took Out Four Big Hosting Providers
                    Data Center Knowledge, August 5th, 2013
                    "On Friday morning, two network switches failed in a data center near Provo, Utah. As the impact of the failed switches rippled through the facility's network, the downtime spread across four major U.S. web hosting firms, affecting millions of customers.

                    How could an equipment failure in a single facility knock out four large national brands, including BlueHost, HostGator, HostMonster and JustHost? The simultaneous downtime reflects the ongoing consolidation in the hosting industry, as well as the tendency for large firms to congregate in many of the same data center facilities. It's not a new trend, and can also be seen in cloud computing, where power problems at a single Amazon facility can quickly ripple across popular start-ups and social media sites..."

                    IT - Operations
                    Death By A Million Regulations
                    Information Week, August 15th, 2013
                    "It is long past time to assess the consequences of the endless laws, codes, rules, licenses and guidelines governing just about every human activity...

                    Six healthcare industry IT executives recently sat down with InformationWeek editors to discuss a range of issues, from remote patient monitoring to electronic health records to population health management to clinical decision support. But when we started the conversation by asking about "the things that are dominating your agendas," we got an earful on a subject we weren't quite expecting..."

                    Build Up Your Production System by First Tearing It Down
                    InfoWorld, August 12th, 2013
                    "Beating preproduction gear to the ground is a great way to learn the system and excellent prep for future troubleshooting...

                    If there's a mantra for deep IT, it might go like this: When something is working right, leave it be, lest it change its mind. That pretty much encompasses everything from the switchport on up, for every layer of the stack, and then some. However, there's a time and a place to start messing around with an otherwise perfectly functional system. In fact, you really should break stuff on purpose when the opportunity presents itself..."

                      IT - Security
                      Five Major Technology Trends Affecting Software Security Assurance
                      SearchSecurity, August 12th, 2013
                      "This year, five major technology trends provide a framework for my thinking about software security and the enterprise. My goal in this article is to use BSIMM observations from the field (in particular calling out a number of the 111 specific BSIMM activities) to illustrate, flesh out and inform a technology trends discussion and angle the trends toward software security..."

                      • Software in everything
                      • Unification of the feeds (information to knowledge)
                      • BYOD (or else)
                      • Ultra-rapid development
                      • Big data, Big Brother, and avoiding the NSA dragnet

                      Read on for details.

                      How Security Smart is Generation Y?
                      CSO Online, August 12th, 2013
                      "The generation gap has existed for - well - generations. But the current divide between twentysomethings and their elders in the IT workforce, at least according to some experts, goes beyond the older cohort simply shaking their heads and muttering, 'Kids these days.' There is, they say, a security divide.

                      Andrew Avanessian, vice president of Global Professional Services at Avecto, writing for USA Today's CyberTruth, called Millennials, also labeled Generation Y, 'a new attack vector that is emanating from the inside.'..."

                      How to Assess the Security of a Cloud Service Provider
                      ComputerWeekly, August 12th, 2013
                      "As businesses continue to put more of their information online, understanding cloud suppliers and agreements has never been more important

                      As a user, when my iCloud, Google Drive, Dropbox, etc. synchronise, seemingly by magic, across my smartphone, tablet and laptop, I do not want to know how the cyber plumbing works. I leave all that to the IT professionals. But can I expect them to warn me if I am taking unreasonable risks? ..."

                      Hype or reality: Which security trends concern CSOs today?
                      CSO Online, August 12th, 2013
                      "Earlier this year, CISOs and CSOs that are members of Wisegate, an invitation-only, business-social-networking group comprised of CSOs and CISOs, took part in a webinar predicting the top IT security threats. Called Hype or Reality, the webinar looked at topics including security and cloud computing, BYOD/BYOx, security awareness and counter-attacking hackers.

                      Recently, Wisegate asked some member CISOs and CSOs the following questions to get their observations about how these trends and concerns are panning out. Wisegate shared the answers from several CISOs..."

                      Security Manager's Journal: Learning to Let Go and Offshore
                      ComputerWorld, August 12th, 2013
                      "I have shunned offshoring and have written about my concerns in the past. But I worked for a different company when I shared those thoughts, and years have passed since that time. When my current employer started sending some IT activities to an office in India, I was more satisfied than I was in the past that security was being well addressed. For starters, our network and server operations team has moved monitoring offshore. That led to the offshoring of several other activities, including the administration of our network and of the Windows and Unix systems, as well as the help desk and quality assurance operations..."
                      The Difference Between IT and Security Incidents
                      IT World Canada, August 12th, 2013
                      "Tell staff to think of security incidents as possible computer crimes, an industry analyst advises. That will help them understand their importance

                      Shakespeare once asked 'what's in a name?' Call a rose something else and it would still smell as sweet, he argued. But over the decades, the answer to his question has often been 'quite a lot.'..."

                      IT - Careers
                      How To Turn Down A Job Offer
                      Forbes, August 13th, 2012
                      "Here's something most people didn't have to worry about for the last half-decade: turning down a job offer.

                      But now, after years of layoffs and hiring freezes, plenty of corporations are starting to increase staffing levels again. The Bureau of Labor Statistics reported there were 162,000 jobs added on public and private payrolls last month-and chances are, at least some of those newly employed people were offered more than one position and had to decline an offer. Most would probably agree that this isn't necessarily a bad problem to have, but it can be a difficult and uncomfortable thing to deal with, nonetheless..."

                        The Best of the Worst: The Dirty IT Jobs Hall of Shame
                        InfoWorld, August 12th, 2013
                        "For several years running, we've run our fingers along the underside of IT in an effort to surface the dirtiest jobs in tech.

                        Carcasses in computer hardware, endless streams of anatomical close-ups, the occasional encounter with fecal matter both real and metaphoric -- each installment of our Dirty IT Jobs series has revealed an industry of consummate professionals willing to go to any length (or depth) in the name of IT..."

                        • Sludge systems architect
                        • Espionage engineer
                        • Fearless malware hunter
                        • Data crisis counselor
                        • Network sherpa
                        • The whistle-blower
                        • Sexy games producer
                        • Professional scapegoat
                        • Systems sanitation engineer
                        • The shadow
                        • Black ops

                        Read on more Dirty IT Jobs and for details.

                          IT - Social Media
                          5 Ways CIOs Can Show Social Business Mettle
                          Information Week, August 8th, 2013
                          "Enterprises are increasingly tapping into the power of social media to extend and improve the effectiveness of core business disciplines, but social is also one of those technologies that falls squarely into the "consumerization of IT" category -- that is, technologies are discussed, evaluated, piloted and procured outside the purview of IT.

                          As an IT executive, you do not want to be on the outside looking in when it comes to any technology -- and that may go double for social, with its growing use in and importance to the enterprise. Here are five things IT executives can do to prove their social business mettle.

                          • Leverage Your Bird's-Eye View
                          • Flex Your Marketing Muscle
                          • Express Yourself
                          • Push Compliance Role
                          • Define Metrics of Success

                          Read on for details.

                            Reality is Mobile
                            Business 2 Community, August 15th, 2013
                            "I spent a recent Saturday scouring the local thrift stores for some furnishings for my new apartment ("Help me, I'm poor" is indeed an accurate phrase to describe my current situation). After digging through the Goodwill down the street from my house, I was still looking for the perfect set of chairs to accent my latest Pinterest find, so I naturally, without a second's thought, reached for my iPhone to search for other Goodwills in the area..."'
                              IT - Virtualization
                              Scale Data Protection With Your Virtual Environment
                              Storage Switzerland, August 14th, 2013
                              "Thanks to an easy-to-measure return on investment (ROI) most data centers' virtual server environments are growing rapidly. Many organizations have implemented a 'virtualize first' policy, where all new servers are virtualized. In addition, legacy servers are being migrated to virtual instances as quickly as possible. While virtual environments have shown an incredible ability to scale and generate positive ROI, the data protection process has not. This data protection scaling issue threatens to slow virtualization adoption as well as reduce its ROI..."
                                Virtualization: Misunderstood and Underappreciated
                                CIO Insight, August 13th, 2013
                                "There's a knowledge gap in the enterprise about virtualization and its impact on companies, according to a new survey of more than 1,200 employees by Cisco partner firms. The survey reveals that while CIOs see the value of deploying a virtualization initiative, the employees working at their firms have no idea what virtualization is. And even those employees and executives who understand virtualization are having a hard time understanding its advantages..."

                                • The Business Side Is Often Clueless
                                • Getting Up to Speed
                                • Uh, IT? Really?
                                • The Great Virtualization Void
                                • Virtualization and Mobility
                                • Back to Work
                                • Easy Access to Documents
                                • Getting the Job Done
                                • Clearly Not Informed
                                • Knowledge Equals Power

                                Read on for details.

                                IT - Email
                                Lavabit Shutdown Marks Another Costly Blemish for U.S. Tech Companies
                                InfoWorld, August 12th, 2013
                                "Lavabit, the purported email provider to NSA leaker Edward Snowden, abruptly suspended its operations yesterday under mysterious circumstances. Lavabit founder and operator Ladar Levison said that after much soul searching, he'd decided to shut down the U.S.-based service -- but couldn't legally reveal his reasons..."
                                  After Lavabit, Silent Circle also Shuts Down Email Service
                                  Network World, August 9th, 2013
                                  "Silent Circle also shuttered its encrypted email service a few hours after Lavabit shut down citing an ongoing legal battle.

                                  "We see the writing the wall, and we have decided that it is best for us to shut down Silent Mail now," Silent Circle wrote in a blog post on Friday in reference to the closure by Lavabit.

                                  The company, with U.S. headquarters in Maryland, said it had not received subpoenas, warrants, security letters, or anything else from any government, and "this is why we are acting now."

                                  Personal Email and Private Clouds Fall in War on Privacy
                                  InfoWorld, August 9th, 2013
                                  "Here's how bad it's become: Yesterday, two 'secure' email service providers decided they'd rather close up shop than cooperate with the United Spooks of America.

                                  First, Lavabits founder Ladar Levison posted a notice to his 350,000 customers saying he was shutting down the service, effectively immediately. His letter has since shot around the Internet thousands of times, but the salient bits are worth repeating..."

                                    Encrypted Email Vendor: Don't Trust Private Data to Companies With Physical Ties to the U.S.
                                    Network World, August 12th, 2013
                                    "Two encrypted email services have shut down because they feel threatened about having to turn over customer information to the government.

                                    Lavabit and Silent Circle both offered encrypted email services, but both have decided to discontinue them so they aren't put in the position of having to turn over what customers thought would be kept private..."

                                      IT - Mobile
                                      How Coca-Cola Bottling CIO Manages Mobile Strategy
                                      Information Week, August 12th, 2013
                                      "Our romance with mobile devices isn't all that hot anymore. That torrid period when we fell in love with the iPhone and dumped our loyal but frumpy BlackBerry is far in the past. We again take our gadgets for granted.

                                      iPhones and Android devices are now company-issue, and BYOD policies abound. We no longer hoard tablets like rare gems. The conversation has shifted from 'I can't live without my new iPhone 3' to 'how soon can we add a mobile app for sales pipeline updates?..."

                                      Network Connectivity, Security Issues Hinder Mobile Strategies
                                      SearchConsumerization, August 12th, 2013
                                      "Many enterprises face challenges in implementing mobile strategies and hesitate to jump headfirst into the sea of mobility.

                                      The top three issues raised by enterprises are security, wireless connectivity, and coverage and compatibility, according to a recent survey done by VDC Research Group Inc., a mobile advisory firm based in Natick, Mass.

                                      In the survey, 62% of respondents said security was a concern, and 50% cited wireless connectivity and coverage as issues. Forty-two percent said a mobile solution isn't compatible with existing systems..."

                                      The Futility of the Single-Device Solution
                                      InfoWorld, August 14th, 2013
                                      "Maybe one day a single device will adapt to different use cases, but until then, embrace the power of having multiple devices...

                                      I've had the same conversation a number of times over the last few weeks: Business groups or IT groups have set a goal to move all their users to one device in the next 18 months. At one level, you can't blame them: As tablets have started to overtake PC and laptop sales, most manufacturers are trying to push the fact that their device is the only one that your users will need. You have the Lenovo Twist/Yoga/insert name here, the Samsung device that is a Windows laptop until you turn it around and it becomes an Android tablet, and of course Microsoft with its Surface, which is a hybrid trying to be everything..."

                                      IT - Big Data
                                      Big Data Means Big Challenges in Lifecycle Management
                                      InfoWorld, August 15th, 2013
                                      "No matter what its size or variety, data must still be managed through its lifecycle, even when the tools are immature...

                                      Integrated lifecycle management (ILM) faces a new frontier when it comes to big data. The core challenges are threefold: the sheer unbounded size of big data, the ephemeral nature of much of the new data, and the difficulty of enforcing consistent quality as the data scales along any and all of the three Vs (volume, velocity, and variability)..."

                                      "A Fool with a Tool is Still a Fool" - 5 Guidelines to Make Big Data Work
                                      TLNT, August 13th, 2013
                                      "There's a lot of talk about Big Data these days and many HR people are either excited or intimidated by it. Maybe both.

                                      Regardless, there seems to be more talk about "it" than on how to use it in solving problems or how HR can benefit from it.

                                      So the question is how to use Big Data - what can you do to make sure you get meaningful results? Here are five (5) guidelines that will help keep you on the "straight and narrow."

                                      First, let me introduce a case study we can use as an example in this five (5) step process..."

                                      Big Data Hiring: Unorthodox Advice
                                      Information Week, August 9th, 2013
                                      "Building a data science team? As a first step, swap in subject-matter experts from the business to help you formulate the right questions. Next, consider hiring physicists and music majors as well as statisticians and computer scientists.

                                      These are the key, and in some ways unorthodox, data-science hiring pointers offered by Josh Sullivan, VP of the Strategic Innovation Group at management consulting and technology advisory firm Booz Allen Hamilton. Sullivan's graoup is responsible for helping clients with data analytics initiatives, and in that work Sullivan said he sees many companies make the same mistake...."

                                      Four Best Practices for Accelerating Time-to-Value of Master Data Management
                                      IT Business Edge, August 12th, 2013
                                      "Master data management (MDM) has become recognized as a key way for businesses to gain consistent and valuable insight on data, usually distributed across applications and systems. While the anticipated benefits of MDM are usually clear, a number of factors must be considered to implement an effective MDM program, ensuring actual success and return on investment. Talend has identified four best practices for accelerating successful returns on an MDM initiative..."
                                      Tell Me, Professor, What is Big Data?
                                      The Register, August 12th, 2013
                                      "Big Data may be misunderstood and overhyped - but the promise of data growth enabling a goldmine of insight is compelling. Professor Mark Whitehorn, the eminent data scientist, author and occasional Register columnist, explains what big data is and why it is important.

                                      Sometimes life is generous and hands you an unexpected gift on a plate. Our esteemed editor asked me to write about how big data is misunderstood..."

                                      Using Big Data Analytics as a 'Competitive Hammer'
                                      Insurance Networking News, August 12th, 2013
                                      "Barry Ralston, AVP for data management at Infinity Insurance Companies, is a big believer in the power of big data to help gain an edge in the marketplace. Recently, Ralston sat down with Dana Gardner, principle analyst at Interarbor Solutions, to detail his approach to making big data a competitive tool within the insurance sector.

                                      Infinity, a billion-dollar property/casualty company headquartered in Birmingham, Ala., has taken a leadership role in terms of data analytics, Ralston explains. The company fully grasps how and why data is a strategic weapon..."

                                      IT - BYOD
                                      NAC Security Becoming Critical Infrastructure Component for BYOD
                                      SearchConsumerization, August 8th, 2013
                                      "The influx of employee-owned mobile devices, Software as a Service apps and other elements beyond IT's control drive organizations to reevaluate their network access control security.

                                      Until recently, the only devices connecting to the network were controlled by IT. First-generation network access control (NAC) products were solutions in search of a problem..."

                                      "In the past, the value proposition of knowing what's on your network wasn't a big concern for IT," said Chris Rodriguez, an analyst at Frost & Sullivan, a research firm based in Mountain View, Calif. "It was a blind spot they could deal with."

                                      Top Ten Articles for last few Issues
                                      Vol 186 Issue 1; Vol 185 Issues 1, 2, 3, 4 and 5; Vol 184 Issues 3, 4
                                      We track how frequently each article is viewed on the web site to determine which the readers consider the most important. For last week, the top 10 articles were:

                                      • Online Solaris Forum
                                      • Oracle VM Named a Challenger in Gartner 2013 Magic Quadrant
                                      • Unveiling Oracle's Latest Engineered System
                                      • Embedded Software: Disruptions Ahead
                                      • Switch from Red Hat Enterprise Linux to Oracle Linux in Minutes
                                      • Linux Container (LXC) -- Part 2: Working With Containers
                                      • Using Ksplice for diagnostic purposes
                                      • Operational Considerations and Troubleshooting Oracle Enterprise Manager 12c
                                      • Java Spotlight Episode 140: Dr Heinz Kabutz on the Secrets of Concurrency-Part 1
                                      • Top 10 Reasons to Attend MySQL Connect

                                      The longer version of this article has list of top ten articles for the last 8 weeks.

                                        IT - Encryption
                                        Encryption is Less Secure than We Thought
                                        Homeland Security News Wire, August 15th, 2013
                                        "For sixty-five years, most information-theoretic analyses of cryptographic systems have made a mathematical assumption that turns out to be wrong.

                                        Information theory - the discipline that gave us digital communication and data compression - also put cryptography on a secure mathematical foundation. Since 1948, when the paper that created information theory first appeared, most information-theoretic analyses of secure schemes have depended on a common assumption..."

                                        Encryption News (Lavabit): What You Need to Know
                                        Network World, August 14th, 2013
                                        "We probably should have seen this coming, what with government spying dominating headlines for the summer, but encryption suddenly became a hot topic this week.

                                        First was the surprise shut down of Lavabit, the encrypted email service that NSA whistleblower Edward Snowden reportedly used to communicate with a human rights activist. Once the activist let it slip that they had used Lavabit to evade the NSA, Lavabit founder, 32-year-old Ladar Levison, apparently started to receive some heat..."

                                        No, Your Data Isn't Secure in the Cloud
                                        ComputerWorld, August 13th, 2013
                                        "While online data storage services claim your data is encrypted, there are no guarantees. With recent revelations that the federal government taps into the files of Internet search engines, email and cloud service providers, any myth about data "privacy" on the Internet has been busted.

                                        Experts say there's simply no way to ever be completely sure your data will remain secure once you've moved it to the cloud..."

                                          Self-Encrypting Drives (SED) Aren't Magic Security Dust
                                          Network Computing, August 13th, 2013
                                          "Suddenly, everyone's talking about at-rest, on-disk encryption again. No surprise why: Recent news about NSA surveillance programs and Bradley Manning's conviction for leaking U.S. classified files have reawakened interest in data protection. But I worry that people will once again fall into the trap of thinking that a single technology automatically means security..."
                                          Trending in
                                          Vol 234, Issue 2
                                          Trending IT Articles