News about Oracle's Solaris and Sun Hardware
System News
Aug 19th, 2013 — Aug 25th, 2013 Generate the Custom HTML Email for this Issue
System News System News for Sun Users
Volume 186, Issue 3 << Previous Issue | Next Issue >>
Sections in this issue:
click to jump to section

Oracle VM Server for SPARC 3.1
Delivers significant improvements
Oracle has announced Oracle VM Server for SPARC 3.1. The new release delivers significant virtual networking performance improvements, more flexibility to configure I/O virtualization, and further enhancements for cross-CPU secure live migration to help customers take advantage of the massive thread scale offered by SPARC servers and the Oracle Solaris operating system.

Key features and benefits delivered in Oracle VM Server for SPARC 3.1:

  • Virtual network performance improvements
  • Dynamic Single-Root I/O Virtualization (SR-IOV)
  • Cross-CPU secure live migration enhancements
  • Extends the Direct I/O and SR-IOV features to non-Primary root domains
  • Adds InfiniBand device support to the SR-IOV feature
  • Adds the Fault Management Architecture (FMA) blacklisting feature
  • Adds a recovery mode feature
  • Adds the ldmpower command

For additional resources about Oracle VM Server for SPARC review the Oracle VM Server for SPARC white papers.

Open Universities Australia Realizes Valuable Savings and Simplifies IT with Oracle VM
Deploys Virtualized Oracle Database and Oracle's PeopleSoft Applications to Production
To address the challenge of ballooning costs, due to ever-increasing data demands requiring ongoing hardware upgrades, Open Universities Australia (OUA) has virtualized the database and application layers of its IT infrastructure. To help ensure it would achieve its desired performance results, OUA put Oracle products to the test. The cost savings and performance results clearly identified significant advantages.

Open Universities Australia (OUA), an Australian open distance education organization, has converted the database layer of its IT infrastructure into a virtualized environment running Oracle VM, Oracle Linux, Oracle Database, and Oracle Real Application Clusters.

OVM Server for SPARC 3.1 introduces Dynamic SR-IOV feature
Create/destroy VFs while a root domain is running

Raghuram Kothakota writes, "OVM Server for SPARC 3.1 introduces a great enhancement to the PCIe SR-IOV feature. Until now, creating/destroying SR-IOV Virtual Functions(VFs) in a static way, that is it requires a reboot of the root domain and adding and removing VFs requires the Guest domain to be stopped.

Rebooting root domains can be disruptive as it impacts the I/O domains that depend on it. Stopping Guest domain to add or remove a VF is also disruptive to the applications running in it. OVM Server for SPARC 3.1 enhances the PCIe SR-IOV feature with Dynamic SR-IOV for Ethernet SR-IOV devices that removes these restrictions. That is now we can create/destroy VFs while a root domain is running and we can also add/remove VFs from a Guest domain while it is running without impacting applications..."

IT - Storage
Is it Time to Upgrade Your Storage Evaluation Process?
Storage Switzerland, August 22nd, 2013
"In the modern data center, storage system upgrades are rarely caused by a storage system running out of capacity; rather, it more often occurs due to an unanticipated lack of performance or exorbitant maintenance prices. In fact, performance related upgrades can occur at any time, often well before the current storage system was due to be refreshed and more importantly before the evaluation process had predicted a refresh would be needed..."
Are You Ready for Software-Defined Storage?
ComputerWorld, August 21th, 2013
"The software-defined data center is one of the technology trends that's kicking the industry into its next evolutionary stage. It's rife with innovation and has the potential to dramatically increase IT's agility when delivering services to operations, development teams and application owners.

This, my first post here at the Clouds, Flash and Big Data blog, is an introduction to the software-defined data center in general, and in particular how it relates to storage resources..."

Don't Let the SAN Go Down On Me: Is the Storage Array On Its Way OUT?
The Register, August 16th, 2013
"With EMC saying it plans to put VMAX into the "capacity tier"* and suggesting that performance cannot be met by the traditional SAN, are we finally beginning to look at the death of the storage array?

The storage array as a shared monolithic device came about almost directly as the result of distributed computing; the necessity for a one-to-many device was not really there when the data-centre was dominated by the mainframe. And yet as computing has become ever more distributed, the storage array has begun to struggle more and more to keep up..."

Why is Software Defined Storage a Battle Worthy Weapon in the War Against Data Deluge?
Information Week, August 15th, 2013
"Software Defined Storage pools hardware storage resources and allows them to be programmatically defined in software, which allows storage services to be provisioned and consumed based on policies and deployed on a wide range of hardware..."
Vanished: The Line Between Main Memory And Primary Storage
Network Computing, August 19th, 2013
"SMART Storage Systems recently announced the availability of flash storage on the memory channel of a server. Although at first blush, this seems to be only another place in the storage food chain where flash devices can be inserted, it is actually much more. There are a number of immediate applications for this new technology, but it also has profound implications for storage in the future as the distinction between main memory and primary storage vanishes..."
Can Object Storage Solve the RAID TCO Challenge?
Storage Switzerland, August 20th, 2013
"The cost of storage is important in all data-dependent companies, but in hyper-scale environments like web-based enterprises, it can literally consume the business. With the simultaneous requirements of scalable capacity, reliability and availability, these organizations face serious challenges with storage economics. RAID and replication are the architectures that have historically been used in large storage systems but object storage is being tapped as an alternative that can offer a compelling TCO advantage..."
IT - Technology
How Tech Nerds Will Write the Next Generation of Car Apps
IT World, August 15th, 2013
"We've gathered in a converted warehouse in San Francisco's trendy South of Market neighborhood, home to some of biggest names in tech. Sitting at long work benches, we bend over small circuit boards with soldering guns, attaching chips and transistors while trying not to singe ourselves--or the electronics.

It may not look like it, but we're developing car apps, and we're starting from scratch. TJ Giuli and Sudipto Aich, two researchers from Ford Motor Company's Silicon Valley Lab, are showing me and a roomful of software developers how to use OpenXC, an open-source (Linux-based) platform created by Ford for developing in-dash software..."

5 Forms of Travel That Won.t Happen Before Hyperloop
Business 2 Community, August 16th, 2013
"This week Hyperloop came and went, leaving a trail of speculation in its wake. If you weren't on the Internet this week and have no clue as to what I'm talking about, Elon Musk - the current real life Tony Stark, of Space-X and Tesla fame - demonstrated his idea for high-speed travel between San Francisco and Los Angeles. The idea itself is something out of 1950s futurism: Tubes parallel to the interstate freeway, shooting people in pods 800 mph between the two cities..."
Researchers Send Data Without Battery, Transmitter
IT World, August 16th, 2013
"Engineers at the University of Washington have developed a way to communicate over short distances using devices that don't require batteries or transmit any signals.

They've developed a pair of devices that can successfully exchange data at speeds of up to 10kbps over a distance of up to 1 meter -- something that could be useful in applications as varied as wearable devices or building sensors.

The secret to the unusual communications method is the TV broadcasting signals that fill the airwaves of cities and towns across most of the world..."

    The World's Five Most Fascinating 3D Printing Projects
    IT World, August 15th, 2013
    "The 3D printing world is exploding, with researchers in fields across the spectrum drumming up formerly unthinkable projects. It was tough to narrow it down, but here are the five most fascinating 3D printing projects that are in the works:"

    • Swim like an octopus
    • Grow new bones
    • Eliminate the organ transplant waiting list
    • Reduce the spread of disease in poor nations
    • Innovate faster

    Read on for details.

    Second Annual MySQL Connect Conference September 21 - 23, 2013 in San Francisco
    Oracle's MySQL Experts and MySQL Community to Gather
    Oracle will host the second annual MySQL Connect conference September 21-23 at the Hilton San Francisco Union Square.

    This year's three-day event provides a unique opportunity for the MySQL community to gain in-depth knowledge directly from Oracle's MySQL experts.

    • The conference kicks-off on Saturday with a keynote from Edward Screven, Oracle Chief Corporate Architect and Tomas Ulin, vice president, MySQL Engineering - The State of the Dolphin - covering the latest MySQL developments and strategy.
    • MySQL engineer-led sessions include: What's New in MySQL Cluster 7.3, What's New in MySQL 5.7, MySQL Replication Roadmap.

    A customer panel keynote with Facebook, Linkedin, PayPal, and Twitter will discuss: Current MySQL Usage Models and Future Developments.

    MySQL Connect will be filled with over 80 technical sessions, hands-on labs and Birds of a Feather (BOF) sessions delivered by Oracle's MySQL engineers, community members, partners and renowned customers

    MySQL Connector/Net 6.6.6
    maintenance release

    MySQL Connector/Net 6.6.6, a new version of the all-managed .NET driver for MySQL has been released. This is a maintenance release for 6.6.x.

    This release is feature complete. It is recommended for use in production environments.

    It is appropriate for use with MySQL server versions 5.0-5.6

    It is now available in source and binary form from here and mirror sites (note that not all mirror sites may be up to date at this point-if you can't find this version on some mirror, please try again later or choose another download site.)

    The 6.6.6 version of MySQL Connector/Net brings the following fixes:

    • Fix for GetSchema returning MySqlException instead of ArgumentException when passing an invalid collection name (Oracle bug #16271425, MySql bug #67901).

    • Fix for EF 4.3 failing when FK identifiers are too long (MySql bug #67285, Oracle bug #16286397).

    • Fix for race condition on ConnectionStringBuilder when using multiple threads (MySql bug #68217, Oracle bug #16310698).

    • Fix for stored routines being edited from Server explorer appear as ALTER, which may led to syntax errors, which may led to Intellisense to stop working (Oracle bug #16357595).

    See the blog for more details.

    IT - Cloud
    Cloud Adoption: 4 Human Costs
    Information Week, August 20th, 2013
    "Just a few short decades ago, the most expensive IT resources were computers, and human operators were interchangeable. Now the roles are reversed -- technology assets have become a commodity while organizations place a premium on people.

    To that end, the adoption of cloud computing brings with it a series of changes that directly impact the IT workforce. Failing to account for those changes can reduce the value of the cloud and increase IT costs and dysfunction. There are at least four major areas of human cost to assess when planning a cloud strategy and selecting a cloud provider..."

    Cloud-Based Collaboration Pays Off
    CIO Insight, August 19th, 2013
    "The cloud is all the rage in today's rapidly changing corporate space. Companies around the globe are deploying cloud solutions and CIOs are more than happy to listen to pitch after pitch from service providers to see what might be the best solution for their operations..."

    • I Feel the Need for Speed
    • When CIOs Are Included
    • Boundaries? What Boundaries?
    • Come One, Come All
    • Bring On the Innovation
    • When CIOs Leave, Innovation Does, Too
    • It's No Longer Just IT
    • Competitive Advantages, Anyone?
    • There's a Mobile Element, Too
    • And About Those Costs…

    Read on for details.

      Cloud Market Destined to Change Following NSA Leaks
      CSO Online, August 19th, 2013
      "Internet surveillance by the National Security Agency (NSA), leaked to the media by ex-contractor Edward Snowden, has shifted companies' priorities when sizing up cloud services providers in and outside the U.S., experts say.

      The economic impact to the industry is open to debate. The Information Technology & Innovation Foundation estimated last week that U.S. cloud providers could lose as much as $35 billion in business by 2016, as companies flee to rivals overseas.

      This week, Forrester Research took a much broader viewer and estimated a maximum loss of $180 billion..."

      Is the Hybrid Cloud the Future for Enterprises?
      Help Net Security, August 19th, 2013
      "While the public cloud remains important to IT decision-makers at UK and US enterprises, the limitations of using this type of platform as a one-size-fits-all solution are becoming more apparent.

      According to a Rackspace survey, these limitations are leading many respondents to turn to a hybrid cloud infrastructure (i.e. public cloud, private cloud and dedicated servers working together in any combination) for certain applications or workloads..."

      Legal News Site Groklaw Shuts Down over Gov't Spying Fears
      CIO Today, August 20th, 2013
      "The decision to shutter Groklaw represents another in a series of 'closing up shop' headlines this month in the wake of government surveillance. Secure email provider Lavabit and Silent Mail, a secure email service from Silent Circle, also said they would cease operations because of surveillance issues..."
        NASA's Cloud Audit Holds Value for All
        ComputerWorld, August 20th, 2013
        "NASA's Office of the Inspector General (OIG) recently audited and evaluated the efficacy of the space agency's efforts to adopt cloud-computing technologies. The resulting report, 'NASA's Progress in Adopting Cloud-Computing Technologies' includes six recommendations 'to strengthen NASA's IT governance practices with respect to cloud computing, mitigate business and IT security risks and improve contractor oversight.' While the recommendations are specific to NASA, their underlying concepts can be leveraged by any organization that wants to more effectively adopt cloud-computing services..."
        Ten Ways Cloud Computing Is Revolutionizing Aerospace And Defense
        Business 2 Community, August 19th, 2013
        The following is a summary of key DoD IT Modernization initiatives:

        • De-Siloing Quality and Compliance Management across production is leading to greater supplier audit consistency and reduced compliance reporting costs.
        • Mobile Device Management (MDM) has moved beyond dashboard support for smartphones and tablets to being integral for product design and managing production.
        • Reducing tooling costs using cloud-based platforms is accelerating
        • Higher priority being placed on virtualized applications across the DoD including data centers with cloud-ready infrastructure supporting secured applications
        • Chief Information Officers (CIOs) realize they must become strategists and move beyond being the caretakers of legacy systems
        • The silent majority of cloud implementations in A&D are in highly secured vault areas and hidden from view in denied environments
        • The A&D industry is losing patience with its “cylinders of excellence” as sequestration brings urgency to make collaboration pay.
        • Department of Defense (DoD) requirements for cloud security are outpacing what commercial providers offer today, forcing a faster pace of innovation that benefits everyone.
        • Cloud-based consolidation of collaboration applications is the 'low hanging fruit'of cost reduction in defense agencies.
        • Automating Maintenance, Repair and Overhaul (MRO) workflows using cloud-based systems that include mobility support are leading to reduction in inventory levels while service levels increase.

        Read on for details.

        Three Emerging Cloud Trends: Offshoring, Networking, Big Data
        Datamation, August 19th, 2013
        "The cloud may not have quite reached maturity yet, but it's getting there. Plenty of businesses rely on the cloud for mission-critical applications, and cloud adoption is steady enough in the U.S. that offshore public cloud providers fear they'll never catch up to Amazon, Google, Rackspace and other cloud providers in the U.S.

        "The initial resistance to public cloud has begun to subside and customers are beginning to realize its efficiencies as the solutions mature," said Ian Marriott, research vice president at Gartner. According to Gartner, spending on public cloud services is expected to grow 18 percent in 2013 to $131 billion. By 2015, Gartner believes the public cloud services market will exceed $180 billion..."

        IT - CxO
        5 Questions CIOs Should Ask While Choosing a Security SaaS Solution
        Information Week, August 20th, 2013
        "For most CIOs around the world, taking on SaaS-based software services is not an option anymore, it is a necessity, asserts Rakesh Kharwal of McAfee. He details 5 questions that CIOs should enquire before selecting a security SaaS solution..."
        CIOs Need to Push BYOD Policies to Lure Millennials
        CIO, August 19th, 2013
        "In less than two years, millennials will make up the largest segment of the workforce. If you hope to attract GenY technology professionals, your IT strategy better include a bring-your-own-device plan that plays to the strengths of this tech-dependent generation...

        Despite rumors swirling in Silicon Valley that the BYOD phenomenon is losing its buzz, CIOs who think they can abandon the practice risk upsetting an important and growing constituency of their workforce: millennials, also known as GenY.

        BYOD in the workplace skews toward younger segments of employees..."

        Five Tips for 'Use It or Lose It' Budgets
        CIO Insight, August 19th, 2013
        "'Use it or lose it!' You might hear your doctor say that expression about your mental acuity or your personal trainer about your physique. I often hear it from my clients in government, specifically from federal CIOs or IT managers. The phrase relates to their IT budget; if they don't spend their money in the current year, it goes away the following year. Of course, we should have smarter incentives to reward spending under budget, but we'll properly address that issue another day...

        Operating under the assumption this process won't change any time soon, here are five things IT managers can do to better manage their budgeting process:"

        • Distribute responsibility
        • Centralize reporting
        • Include confidence factors
        • Learn from the past
        • Improve your spreadsheet

        Read on for details.

          Returning from FMLA: Must New Position Have the Same .Status.?
          Business Management Daily, August 19th, 2013
          "Your waitress says, 'We don't have Diet Coke. We have Diet Pepsi. Will that be okay?' Both will wash down your burger and both have zero calories. But are they otherwise equivalent enough to be substitutes?

          When an employee returns from absences that are covered under Family and Medical Leave Act (FMLA), he or she is entitled to 'the same or an equivalent position' (see box below). But what counts as 'equivalent'? As this new court ruling shows, it goes beyond simple pay, benefits and working conditions..."

            Selling to the LOB manager: Reseller, beware
            SearchITChannel, August 19th, 2013
            "At many businesses, line-of-business managers and staff are making decisions to move mission-critical and often sensitive data to the cloud, and they're performing local installs without the knowledge of the IT department.

            Let's set aside the fact that IT departments even tolerate this -- and make it possible by providing users with administrative rights and other IT privileges that should be closely guarded. The lack of application controls and data loss prevention systems, which would stop program installation and exporting and importing of data, compounds the problem. (These issues of unfettered data access and admin rights for users -- which they should never have -- will require an entirely different article.)..."

            Steve Jobs on Management (Video)
            AITS, August 19th, 2013
            "In this video, Steve Jobs talks about how Apple is 'the largest startup in the world.' In particular, how each person in his organization has a role to play, and how important it is that each person believes that the other will do their job (and that they themselves will complete the work they are in charge of). Truly a valuable video for any leader to watch:..."
              Strive for Harmony, Plan for a Lawsuit: Document Every Complaint as if You Will be Sued
              Business Management Daily, August 20th, 2013
              "Of course you have an anti-discrimination and anti-harassment policy. You make sure employees know about it. You even make it easy for employees to use the policy by providing clear instructions on where to go with a complaint and what to expect when they do.

              But all that can be for naught if you're unable to track those complaints

              • maybe because voice mail or email messages got deleted or notes of your conversations with complainants or witnesses went missing.

              Unfortunately, failing to accurately and completely track every complaint could mean all your anti-discrimination and anti-harassment efforts will backfire if the case winds up in court..."

                Why IT and Marketing Should Go Out for Coffee (Or Something Stronger)
                Network World, August 19th, 2013
                "Sophisticated marketing initiatives that rely heavily on analytics and back-end systems integration are inspiring IT and marketing pros to collaborate more closely...

                TruGreen Landcare CIO George Kelly is a realist. He not only knows the business-critical role of marketing at the nationwide commercial landscaping and property care company, but also that if IT doesn't meet that department's needs, they'll look elsewhere..."

                Withholding Employee References: It.s Time to Stop the Insanity
                TLNT, August 19th, 2013
                "Do you give candid references on former employees?

                If you're like most, probably not. Due to advice given by legal counsel or an article someone in HR once read, the preponderance of employers has one of the following policies:

                • No one is allowed to give any information under any circumstances.
                • You can report only 'name, rank, and serial number' (dates of employment, job description, starting and ending pay).
                • You must refer the caller to HR (where they only report name, rank, and serial number).

                This is insanity..."

                  Oracle Virtual Compute Appliance
                  The View from Product Management

                  Adam Hawley writes, "as the head of virtualization product management at Oracle, I thought I'd add some comments.

                  Our goal, and what we are delivering with the Oracle Virtual Compute Appliance, is to perform all the necessary installation and configuration for the hardware and software to allow you to go from power-on to a running application (or database or middleware) in about an hour. Already, one press headline has declared "Oracle tar ledningen på nyckelfärdiga servrar". Now, just in case your Swedish is a bit rusty, that translates to 'Oracle Takes the Lead in Turnkey Servers' So what's all the fuss about?..."

                  IT - DR
                  3 out of 4 Companies WW Failing in Terms of Disaster Readiness
        , August 19th, 2013
                  "The Disaster Recovery Preparedness (DRP) Council was started last month by IT business, government and academic leaders with its mission to increase Disaster Recovery Preparedness awareness and improve DR practices. Here are some initial results from the online survey that organizations around the globe have participated in. The Disaster Recovery Preparedness Benchmark (DRPB) Survey was designed to give BC, DR, compliance audit and risk management professionals a measure of their own preparedness in recovering critical IT systems running in virtual environments..."
                  Gimme Shelter: Wall Street Braces For Next Superstorm
                  Network World, August 20th, 2013
                  "Heading into the heart of hurricane season 10 months after Sandy slammed the New York metropolitan area, Wall Street has had time to reassess and revamp backup plans.

                  Sandy's storm surge caused the first weather-related, 48-hour closure of markets since the Great Blizzard of 1888. 'You could say Sandy forced the hand of the trading firms,' said David Weiss, an analyst with the consulting firm Aite Group..."

                    IT - Networks
                    IPv6 Adoption on the Rise
                    Network Computing, August 14th, 2013
                    "After my previous article about Cisco LISP and the IPv6 transition, I fully expected to hear about all the ways that LISP could improve things. I had argued the merits of tunnel services over LISP as a transition tool. Instead, I was pleasantly shocked when I got an email from Fred Baker, a Cisco Fellow who co-chaired the IPv6 Operations Working Group in the IETF. Fred gave the first Cisco Live presentation I ever attended back in 2006, which was based in large part on his work with RFC 4192, Procedures for Renumbering an IPv6 Network without a Flag Day. It was my first stop down the IPv6 highway..."
                    Layer 2 Firewalls for the Data Center
                    Network World, August 15th, 2013
                    "I had a great time meeting with a variety of customers at Cisco Live in Orlando back in June. We covered a lot of different topics around data center security. One specific item that came up more than once was the use of Layer 2 versus Layer 3 firewalls in the data center. In fact, this topic comes up fairly often, so as a follow-up I thought it would be great to write a post that discussed this topic..."
                    Google Goes Dark for 2 Minutes, Kills 40% of World's Net Traffic
                    The Register, August 19th, 2013
                    "You can all relax now. The near-unprecedented outage that seemingly affected all of Google's services for a brief time on Friday is over.

                    The event began at approximately 4:37pm Pacific Time and lasted between one and five minutes, according to the Google Apps Dashboard. All of the Google Apps services reported being back online by 4:48pm.

                    The incident apparently blacked out every service Mountain View has to offer simultaneously, from Google Search to Gmail, YouTube, Google Drive, and beyond.

                    Big deal, right? Everyone has technical difficulties every once in a while. It goes with the territory..."

                    Router IDs and the 7Ps
                    Network World, August 15th, 2013
                    "The 7Ps apparently started off (according to wikipedia) as a British Military adage. I didn't, actually, know that until I started writing this blog today and googled 'prior proper preparation'. Voila! Wikipedia was the first hit - 7 Ps (military adage). I was raised one of the varieties of the 7Ps: 'Prior Proper Preparation Prevents Poor Performance'. Yea, I know that is only 6 'Ps' and not 7. I'll let you read the wikipedia article and do the scavenger hunt for my 'missing P'..."
                    The 10 Deadliest Networking Mistakes
                    Network Computing, August 16th, 2013
                    "We all make mistakes, but some networking mistakes wreak more havoc than others. Avoiding a few common errors will drastically increase your LAN uptime and decrease your troubleshooting time and frustration level. Here is a top 10 list of errors, omissions, misconfigurations and points of confusion that lead to network mayhem..."

                    • Mismatched Masks
                    • Lack Of Fiber Standard Familiarity
                    • Link Aggregation Dilemmas
                    • Relying On Auto Negotiation Settings
                    • VLAN Delusions
                    • Recruiting The Wrong Resources
                    • Spanning Tree
                    • Default Gateways
                    • Duplicate IPs
                    • 'While I'm In There' Syndrome

                    Read on for details.

                      IT - Operations
                      How to Find the Best Electronics Recycling Vendor for Your Business
                      Business 2 Community, August 21th, 2013
                      "Your business can only afford to keep old, unused electronics equipment in its storage areas for so long. Real estate is expensive; eventually you'll need that space for something more worthwhile. So the question becomes, what do you do with those old electronics? Dumping them in a landfill or putting them in your dumpster is not an option. Not only will you be violating environmental regulations, but that equipment most likely contains sensitive data that could cause your business significant trouble if it fell into the wrong hands. Some of the equipment may even be remarketable. As you search for an electronics recycling vendor, you have these main priorities:..."
                        10 Cabling Tips to Keep Your Data Center Manageable
                        TechRepublic, August 19th, 2013
                        "With a little planning and a few best practices, you can avoid the problems and maintenance headaches that come with improper cabling... I have put together 10 tips to help you get the most out of your data center's cabling. With these tips, you'll have a more reliable data center and your staff will have a much easier time maintaining it:"

                        • Measure twice, cut once
                        • Label, label, label
                        • Don't skimp on terminations
                        • Don't skip the test
                        • Keep patch cables short
                        • Color code
                        • Upsize your conduit
                        • Make your design cable-friendly
                        • Separate Cat5 and power lines
                        • Keep cables cool

                        Read on for details.

                        Empire State Ends IT Empire Building
                        ComputerWorld, August 16th, 2013
                        "New York, the nation's third most populous state, has over 120,000 state employees spread across more than three dozen agencies. These agencies all run their own IT operations, but that is all going to change and for good reason.

                        Over the years, the state gained 50 data centers and no coherent IT practices. Agencies moved their IT at different paces. Some agencies had video conference capabilities, while others were still using tape backups. Email systems were a combination of GroupWise, Notes, Exchange and others.

                        The experience wasn't uniform and collaboration was hindered. There was no single IT budget..."

                        IT Now 10 Percent of World's Electricity Consumption, Report Finds
                        The Register, August 16th, 2013
                        "The information and technology ecosystem now represents around 10 per cent of the world's electricity generation, and it's hungry for filthy coal.

                        In a report likely to inspire depression among environmentalists, and fluffy statements from tech companies, analyst firm Digital Power Group has synthesized numerous reports and crunched data on the real electricity consumption of our digital world..."

                          Managing the Risks of Cyberspace
                          CIO Insight, August 15th, 2013
                          "Hardly a day goes by without news of a new cyber-security threat or a major data breach arising from 'malspace' - that online environment inhabited by hacker groups, criminal organizations and espionage units. As hacktivists, cyber-criminals and nation-states excessively increase traditional information security risk, it's becoming clear that the business risks of operating in cyberspace is quickly moving to the top of most chief executives' agendas..."
                          Straight A's for Determining Risk and Avoiding the Big F
                          IT Business Edge, August 19th, 2013
                          "Have you ever joined a conversation and taken what is said completely out of context because you simply didn't have the background information? It's an easy mistake to make and can be both frustrating and humorous at times.

                          Adding context to a data security situation is just as important as it's essential to ensure that you can connect the dots and fully understand if something is at risk. When it comes to the loss or mishandling of unstructured data, all it takes is one strike and you're out. Here are five ways for determining risk and protecting against threat..."

                          • Authentication
                          • Authorization
                          • Administration
                          • Audit
                          • Access

                          Read on for details.

                          IT - Security
                          6 Technical Measures to Mitigate Insider Threats
                          CSO Online, August 19th, 2013
                          "Insiders were a huge point of discussion at the 2013 Black Hat security conference in Las Vegas Nevada. Recent high-profile insider incidents have attracted mainstream media coverage and amplified this topic...

                          We generally accept a certain level of risk in anything we do: sharing intelligence, choosing a smartphone, expanding a business internationally, and yes, allowing employees, consultants and partners to have access to sensitive assets. There are no magic boxes, lines of code or consultants that can be hired to prevent or detect every type of insider incident. I know it's not fair. It's not fair that carbohydrates make you fat either, but I'm half Italian, I love pasta, so there you go..."

                          Don't Underestimate Directory Traversal Attacks
                          Dark Reading, August 19th, 2013
                          "About as simple to fix as they are to exploit, directory traversal vulnerabilities stand as a persistent threat in the application environment. Yet it is one that many developers and even security teams are unaware can lead attackers to gain valuable information about how a system is organized, to get access to sensitive files on the application server, or even to easily leverage to start other attacks on that server or the rest of the network. Perhaps not as favored as SQL injection, directory traversal attacks can wreak a lot of damage by taking advantage of the way applications access files not really meant to be accessed by that application..."
                          Five Major Technology Trends Affecting Software Security Assurance
                          SearchSecurity, August 19th, 2013
                          "This year, five major technology trends provide a framework for my thinking about software security and the enterprise. My goal in this article is to use BSIMM observations from the field (in particular calling out a number of the 111 specific BSIMM activities) to illustrate, flesh out and inform a technology trends discussion and angle the trends toward software security..."

                          • Software in everything
                          • Unification of the feeds (information to knowledge)
                          • BYOD (or else)
                          • Ultra-rapid development
                          • Big data, Big Brother, and avoiding the NSA dragnet

                          Read on for details.

                          How to Remember Hundreds of Passwords Without Writing Them Down
                          Business 2 Community, August 18th, 2013
                          "If you're like me you have a ga-jillion internet accounts. Multiple email addresses, dozens of app or social media accounts. You want to keep your accounts secure so you don't get hacked but there doesn't seem like an easy way to do it. You either need to have the same password for every site or have a different password for every site..."
                            Managing High-Level Breaches
                            IT Business Edge, August 19th, 2013
                            "The Department of Energy was hacked. Again. It is the second time this year that the DOE was the victim of a breach. The breach took place in July (I'm impressed that the DOE came public with the breach in under a month), and it is believed that the personally identifiable information (PII) of 14,000 present and former employees was potentially compromised.

                            Defense contractor Northrop Grumman recently announced that it, too, suffered a similar breach..."

                              Securing the Modern Web: Open Sourcing the Future Of IAM
                              Help Net Security, August 16th, 2013
                              "Every CIO needs a reliable identity and access management (IAM) system for protecting employee, customer, and partner data - and for years, they have relied on traditional, proprietary IAM vendors to secure their user identities and data behind the company firewall.

                              In the past few years though, IAM needs have changed dramatically. Employees expect access to company systems anytime, anywhere; customers expect immediate and constant access to user-friendly, consumer-facing data; and partners need access to various apps with limited access to company data..."

                              The Best CISO Isn't Necessarily the Technical-Minded One: HP
                              ZDNet, August 20th, 2013
                              "As Gartner argues that the boards should be listening more to the CISO for advice, rather than treating them as the defender of the business, Hewlett-Packard CTO for Enterprise Security Andrzej Kawalec believes that the modern CISO requires less of a technical background and more of a risk-oriented one.

                              Speaking to ZDNet, Kawalec pointed to the more balanced professionals that he sees as the new generation of CISOs..."

                              The Enterprise Security Model Is Experiencing "Death by a Thousand Cuts"
                              Network World, August 19th, 2013
                              "If enterprise security were an automobile it would be a Ford Taurus circa 1995. Good car way back when and still running but burning oil, barely passing inspection, and held together by bondo today.

                              Like my Ford Taurus example, enterprise security continues to hang on but it certainly isn't a model of technical excellence or operational efficiency. To be more specific, current enterprise security is based upon disjointed organizations, manual processes, and an army of disconnected point tools. Functional but no match for IT complexity or the volume and sophistication of cybersecurity threats...."

                              5 Truths Your IT Asset Manager Should Know About Data Erasure
                              Business 2 Community, August 17th, 2013
                              "Data security experts, you should talk with your IT asset manager about best practices for data security. IT asset disposition is often an area in which a company's data security policy has some holes. When it can cost millions to recover from a single data breach, the risks are too high to ignore. Your company can't afford the risk of allowing any IT equipment to leave its control with sensitive data still stored on it. There are many misconceptions about the right way to do data erasure. Make sure your IT asset manager understands the following five concepts:..."
                              IT - Careers
                              The Opposite of Engagement: When People Decide to Fire Their Company
                              TLNT, August 19th, 2013
                              'I need to speak to you when you get in this morning, preferably before the meeting with XXXX.'

                              'OK, no problem. Is everything OK? I sure hope it is not what I think...'

                              "That email exchange took place about 10 pm one night last week. The young woman who sent it had finally received a job offer and was letting her manager know that she wanted to meet so that she could finally say 'you're fired.' - not to her manager, but to the organization..."

                                IT - Social Media
                                Social IT Emerges as a Silo Smasher for CIOs
                                CIO Insight, August 19th, 2013
                                "In order to encourage collaboration and otherwise abandon siloed work processes, CIOs and other tech leaders are pushing their organizations to implement what's called 'social IT.' Social IT is defined as 'the use of collaboration-based technologies to enhance communication, productivity, knowledge-sharing, and decision-making within IT organizations and between IT and end user communities,' according to ITinvolve.

                                To highlight the abundance of increasing activity on this front, ITinvolve recently released a survey of nearly 400 U.S.-based IT pros, managers and executives with the results clearly indicating that there is an active level of interest in social IT projects among organizations..."

                                • Productive Start
                                • Most Popular Forms of Social IT Implementation
                                • FAQs
                                • Big Fish, Little Fish
                                • Vetting Process
                                • Model Effort
                                • Working Guidelines
                                • Award Opportunities
                                • On the Fly
                                • Impact Projections

                                Read on for details.

                                  IT - Compliance
                                  How To Get Employees Engaged in the Compliance Process
                                  WallStreet & Techology, August 20th, 2013
                                  "Increasing employee awareness and participation fuels greater involvement, better compliance and improved business results - the trick is to figure out how to keep them engaged...

                                  New regulatory requirements are causing companies across all industries and geographies to step up their compliance initiatives, increasing the importance of the annual compliance audit cycle.

                                  While employees are conditioned to participate in this annual review, most seem to view compliance as a necessary but tedious task..."

                                  Managing Security and Compliance in the Cloud
                                  CIO Insight, August 19th, 2013
                                  "IT organizations frequently find themselves between a rock and a hard place when it comes to compliance issues in the age of cloud computing. There are numerous regulations that, in many instances, make putting data in the cloud problematic. While not every regulation is specific, the spirit of the regulation, if not the letter of the requirement, holds the company accountable for maintaining control over customer data..."
                                  IT - Email
                                  30 Years Ago: How Email Rose to Become the No. 1 Killer App
                                  eWeek, August 19th, 2013
                                  "The first email was sent in 1965. Since then, more than 3 billion email accounts exist and about 294 billion emails are sent per day.

                                  When the first personal computers started being sold by Apple and IBM in the late 1970s and early 1980s, it was common for people to ask: "Why do you really need to buy a PC?" The truth was, if you had a typewriter, that's pretty much all you needed to create documents. If you wanted to play video games, you'd go down to the mall. If you needed to do math problems, you got a calculator..."

                                  Cloud Email Migration: 10 Tips for Evaluating Service Providers
                                  SearchCloudApplications, August 19th, 2013
                                  "Lacking support for and needing greater functionality in Microsoft Exchange, many companies today are on the cusp of being in the throes of email migrations. The big question they face: "Is it time to go with cloud-based email?" Complicating that decision is the mighty clout and noise level of cloud email providers -- Microsoft with Office 365 and Google with Google Apps for Business..."
                                  IT - Big Data
                                  Big Data is Reaching the Peak of Its Hype, Gartner Says
                                  Network World, August 19th, 2013
                                  "Each year Gartner gives buzzwords a reality check by publishing its Hype Cycle report. The latest one focusing on big data shows that the industry is just reaching the peak of its hype right now, with vendors flocking to the market, customers getting anxious that they don't yet fully understand the technology, and the expectations about what big data can do for an organization being over-inflated..."
                                  Big Data Will be Mostly Hype Until it Looks Like This
                                  CITEworld, August 13th, 2013
                                  "We've all heard the hype about big data's potential to transform business, but it's mostly theoretical today. For big data to reach that transformative level, it must move beyond the realm of data scientists and into the hands of regular users.

                                  That's going to take the proverbial killer app. Today, we have the seeds of such apps in a few public-facing web sites. These test cases provide a window into the possibilities of big data and what could happen if we can simplify a data set and give employees the ability to ask a variety of questions, to experiment, to let the data surprise them..."

                                  Building Big Data? Are You Building a Security Headache Too?
                                  The Register, August 19th, 2013
                                  "The world and its dog has been shocked by the Prism news story. Early in June, we found out that the US National Security Agency (NSA) had developed a secret data-gathering mechanism to steal all our data and store it in a large data warehouse.

                                  We are outraged that it is being mined, searched and otherwise prodded. But do we really think that big data security problems stop at Google, Facebook, Microsoft and Fort Meade?

                                  The private sector has been collecting data on all of us for ages. It is stored in massive data sets, often spread between multiple sources. What makes us think this is any more secure? At least the NSA is well trained in keeping it all under lock and key..."

                                  IT - Mobile
                                  Basic Features and Capabilities to Look for in MDM Tools
                                  SearchConsumerization, August 19th, 2013
                                  "MDM tools can centrally automate many manual IT tasks, such as device enrollment. They also deliver IT requests over the air to company-issued or employee-owned devices and can help IT administrators get a grip on the plethora of smartphones and tablets that employees have introduced into enterprises.

                                  Mobile device management (MDM) products are rapidly evolving to keep up with the stream of new devices emerging in the marketplace, updated mobile operating systems and increasingly complex business needs. With dozens of diverse products to choose from, finding the best MDM software to monitor and control your mobile workforce can be daunting..."

                                  7 Best Practices for Employee Mobile Device Rollout
                                  Bank Systems and Technology, August 20th, 2013
                                  "Only a few years ago, financial institutions were looking at the bring-your-own-device (BYOD) movement with trepidation because of concerns that their carefully constructed information security infrastructure would come tumbling down as loan officers and other employees tapped their way to needed data. Today, many banking organizations are not only tolerating employee use of smartphones and tablets but embracing it..."
                                  Mobile Device Management vs. Mobile Application Management
                                  SearchConsumerization, August 19th, 2013
                                  "When it comes to enterprise mobility management, IT administrators have a lot of choices. You may have wondered about all the different mobile device ownership models, acceptable use policies and management technologies that are available to implement. In this series, we tackle some of the biggest head-scratchers facing mobility admins to help you get things straight.

                                  Let's get this straight Mobile device management and mobile application management are two of the more popular technologies for enabling secure smartphone and tablet use in the enterprise. They have different use cases, but some of their features overlap, and more vendors are combining the two technologies into single products..."

                                  Top Ten Articles for last few Issues
                                  Vol 186 Issues 1 and 2; Vol 185 Issues 1, 2, 3, 4 and 5; Vol 184 Issue 4
                                  We track how frequently each article is viewed on the web site to determine which the readers consider the most important. For last week, the top 10 articles were:

                                  The longer version of this article has list of top ten articles for the last 8 weeks.

                                    LibreOffice 4.0.5
                                    LibreOffice 3.6 series users are strongly encouraged to upgrade
                                    The Document Foundation (TDF) has announced LibreOffice 4.0.5 for Windows, OS X and Linux, the fifth minor release of the stable LibreOffice 4.0 family. Users of the now-end-of-life LibreOffice 3.6 series are strongly encouraged to upgrade.

                                    LibreOffice 4.0.5 fixes more than 90 bugs, many of them in the area of interoperability with proprietary document formats and operating systems. Thanks to the work of our QA volunteers, LibreOffice 4.0.5 also solves a number of regressions from earlier releases. Just recently, the QA community has concluded their first triage contest, thereby cutting down the number of untriaged and unreviewed bugs significantly. That has contributed greatly to an even more confident assessment of the LibreOffice quality.

                                    The new release is available for immediate download.

                                    Trending in
                                    Vol 235, Issue 2
                                    Trending IT Articles