News about Oracle's Solaris and Sun Hardware
System News
Aug 26th, 2013 — Sep 1st, 2013 Generate the Custom HTML Email for this Issue
System News System News for Sun Users
Volume 186, Issue 4 << Previous Issue | Next Issue >>
Sections in this issue:
click to jump to section

New reasons why Oracle VM is best for Oracle Databases
Blogs, Benchmarks, Templates, and more
Chris Kawalek writes, "We received quite a few inquiries and interest from long time Oracle Database users looking to migrate from physical to virtual environments. Following up on our discussion on why Oracle VM is best for Oracle Database are new releases of the Oracle VM Templates that fully automate the creation of Single Instance, Oracle Restart and RAC configurations. Wim's detailed blog showcases the elegance and simplicity of the templates.

How does deploying Oracle Database using Oracle VM Templates different from deploying Oracle Database with traditional virtualization technology? The complexity and intricate dependencies of Oracle Database deployment is fully encapsulated in a simple script that you can run. Simply, we've done the work so you don't have to. You can deploy the Oracle Database single instance or in a clustered environment in a matter of minutes…..the right way!..."

Top 10 signs your CIO isn't ready for the modern web
From Scott McNealy
Barb Darrow writes, "Earlier this summer, Sun Microsystems co-founder Scott McNealy trotted out an old chestnut - a top ten list - on how you can tell your CIO is clueless about the modern web.

A quick sampler from his talk at ForgeRock Open Identity Stack Summit: Your CIO is web-dopey if he thinks Big Data is a rapper; that COBOL programming is prerequisite for all new hires; and considers Computer Associates an open-source software company..."

Cross-CPU migration in LDoms 3.1
Migrate a running virtual machine from a SPARC server with one type of CPU chip to another of a different type
Eric Sharakan writes, "Cross-CPU migration is the ability to migrate a running virtual machine (VM) from a SPARC server with one type of CPU chip to another of a different type. Prior to LDoms 3.1, the only way to perform such a migration was to specify a "cpu-arch" property of "generic" when first defining the VM. Doing so allowed VMs to be migrated between systems based on the T2, T2+, T3 and T4 processors. However, specifying this property results in the VM running without taking advantage of all the features of the underlying CPU, negatively impacting performance. The most serious impact was loss of hardware-based crypto acceleration on the T4 processors. This was unfortunately necessary, due to major changes in HW crypto acceleration introduced in T4..."
SPARC M6 processor unveiled at the Hot Chips conference
Oracle gets it right
Timothy Prickett Morgan writes, "The new SPARC M6 processor, unveiled at the Hot Chips conference at Stanford University this week, makes a bold statement about Oracle's intent to invest in very serious big iron and go after Big Blue in a big way.

Oracle's move is something that the systems market desperately needs, particularly for customers where large main memory is absolutely necessary. And - good news for Ellison & CO. - with every passing day, big memory computing is getting to be more and more important, just like in the glory days of the RISC/Unix business.

It looks like it took Oracle to finally get a decent microprocessor and interconnect development team together for Sun Microsystems..."

SPARC M5 Domaining Best Practices Whitepaper
Oracle White Paper
"For successful consolidation deployments, it is necessary to select a server platform that has the scalability to support many application instances. Additionally, the server platform must have the high availability needed for mission-critical applications, the resource management and virtualization capabilities to simplify managing numerous applications, and the tools to manage the consolidated environment.

Oracle's SPARC M5-32 server delivers on all these requirements and is an ideal solution for server consolidation. With the SPARC M5-32 server, IT managers can create pools of compute resources that can be rapidly and dynamically allocated to meet new and changing workloads..."

Oracle Unveils Latest Engineered System for Enterprise Virtualization
On-Demand Webcast
Roxana Babiciu says,"Check out the On-Demand webcast to learn about Oracle's latest engineered system. It provides a converged infrastructure powered by Oracle VM server virtualization and Oracle Virtual Networking, dramatically enhancing data center operations.

Discover how this system can:

  • Accelerate time to value, with rapid infrastructure deployment
  • Reduce business risk by reducing the application deployment and maintenance complexity
  • Provide infrastructure flexibility by enabling dynamic provisioning of virtual machine resources
  • Lower costs and improve user service levels
  • Support a mix of applications and operating systems

Register on-line.

IT - Storage
Dedupe For Performance and Endurance?
Storage Switzerland, August 29th, 2013
"Deduplication started in the backup space as a way to reduce costs and bring the price per GB of disk based backup solutions within the reach of tape based backup. The potential for performance impact has largely kept the technology out of the primary storage market. But vendors like Tegile are now claiming that not only can deduplication bring capacity efficiencies to primary storage it can deliver those efficiencies while increasing the performance and longevity of the system..."
Modernizing the Storage Stack
InfoWorld, August 28th, 2013
"In the early days of storage tiering, tiers were developed primarily according to key cost differentiators, the first being the cost of additional storage needed to support data protection. That protection was provided by replication, snapshots, backup copies, and RAID configuration, and it was generally assumed that an application requiring tight and expensive recovery would also require good performance.

Vendors cooperated by ensuring that their enterprise-class offerings all supported synchronous, if not asynchronous, replication, along with lots of ports and performance characteristics. Tiers were created where typically the highest and most expensive ones supported a near-zero data loss, with return to operation well under 24 hours..."

SSDs Maturing, But New Memory Tech Still 10 Years Away
ComputerWorld, August 26th, 2013
"Solid-state drive adoption will continue to grow and it will be more than 10 years before it is ultimately replaced by a new memory technology, experts said.

SSDs are getting more attractive as NAND flash gets faster and cheaper, as it provides flexibility in usage as a RAM or hard-drive alternative, said speakers and attendees at the Hot Chips conference in Stanford, California on Sunday..."

Making Flash RAM Like
Storage Switzerland, August 26th, 2013
"Server-side Flash and SSD has delivered significant storage I/O performance benefits to physical and virtualized host environments. While SSD provides many benefits, it is not without its drawbacks. By adding another device into a PCIe slot, for example, SSD resources must compete for the same I/O channel as other devices like network interface cards. The next step in the Flash evolutionary chain, therefore, is to remove points of contention on board the server bus to drive higher levels of throughput and performance..."
IT - Technology
MIT Develops 110-Core Processor
ComputerWorld, August 26th, 2013
" A 110-core chip has been developed by Massachusetts Institute of Technology as it looks for power-efficient ways to boost performance in mobile devices, PCs and servers.

The processor, called the Execution Migraine Machine, tries to determine ways to reduce traffic inside chips, which enables faster and more power-efficient computing, said Mieszko Lis, a postgraduate student and Ph.D. candidate at MIT, during a presentation at the Hot Chips conference in California..."

The Problems with the Smartwatch Even Apple Can't Solve
ZDNet, August 26th, 2013
"We've heard for quite some time that Apple is hard at work on its next big thing, a smartwatch. There's even a product name all picked out by the pundits, the iWatch. According to persistent rumors Apple has dozens, maybe even hundreds, of its brightest employees getting the iWatch ready to blow everybody away. As exciting as rumors make the smartwatch sound, I don't think Apple is going to be able to adequately address some practical issues..."
    Upgrading to Oracle VM Server for SPARC 3.1 using Solaris 11.1
    By Jeff Savit

    Jeff Savit says his "previous blog entry described new features in Oracle VM Server for SPARC 3.1, and I commented that it was "really easy" to upgrade. In this blog I'll show the actual steps used to do the upgrade.

    Oracle VM Server for SPARC 3.1 is delivered in Solaris 11.1 SRU 10.5, and includes device driver improvements used in service domains and guests, so the primary task is to update each domain to the new SRU..."

    MySQL Enterprise Backup 3.9.0
    An Insight
    Priya Jayakumar writes,"MySQL Enterprise Backup team is excited to announce the new release of MySQL Enterprise Backup (MEB) 3.9.0...

    MEB 3.9.0 focusses more on the ease of use of the product and addresses some of the challenges faced currently by database administrators. With growing data the need for hardware for database backups has significantly increased. Keeping that in mind MEB 3.9.0 has extended the product capability to save disk space during backup and restore. MEB 3.9.0 has also enhanced some of the existing features helping MEB users to perform their tasks in a more user friendly way without much overhead..."

    IT - Cloud
    Study: 60 Percent of Companies Prefer Hybrid Cloud Solutions
    Business 2 Community, August 26th, 2013
    "The majority of businesses are likely to settle on a hybrid cloud solution as opposed to a pure public option in the next few years. That's the finding of a study sponsored by hosting provider Rackspace, which revealed 60 percent of enterprises in the US and the UK view such solutions as the end of migration into the cloud, rather than a stepping stone to a fully public cloud strategy. The same number have moved key applications either partially or fully away from public options because of the limitations of this approach, or the potential benefits offered by hybrid tools..."
      3 Things You Need to Know to Save Your IT Job: #1 Cloud Computing
      ComputerWorld, August 26th, 2013
      "Do you have an IT job involving enterprise data? More importantly, do you want to keep it?

      If you answered 'Yes' to both questions, you'll want to make sure you're fully prepared for three big shifts in technology that are reshaping today's enterprise data center. In the next few blog posts, I'll talk about these "mega-shifts," such as the software-defined data center and flash SSD storage.

      But in this first blog post, I'll discuss cloud computing..."

      Integrating Clouds Into the IT Infrastructure
      Baseline, August 22nd, 2013
      "Over the last few years, IT and business executives have witnessed a profound shift in enterprise computing. While organizations continue to rely on internal data centers to manage an array of tasks, clouds have drifted into the mainstream of IT and business.

      "Clouds are becoming the foundation for a new IT platform," says Mike Pearl, U.S. cloud computing leader for PwC consulting. "Organizations are combining IT assets in order to create far greater value. In many cases, they're able to react to market dynamics faster and more effectively."

      Suffering From Cloud Migration Nightmares? It's Time to Wake Up.
      Business 2 Community, August 27th, 2013
      "Ever dream that you're being chased by something? Something really terrifying? You can't exactly make out what it is, but every time you glance back over your shoulder, there it is - getting closer and closer. No matter how fast you run, you just can't get away.

      Now, I'm not one for exaggerations, but that's pretty much the nightmare your typical decision maker has when contemplating migrating their business data to the cloud. The only difference is that in their dreams, they're also screaming: 'It'll be a mess! We'll never get out of it! We'll lose everything!'..."

        IT - CxO
        What CIOs Should Be Thinking About But Aren't
        CIO Insight, August 22nd, 2013
        "A vice president of datacenter initiatives and digital infrastructure with the analyst firm 451 Research, Michelle Bailey recently spoke with CIO Insight about IT investments, the current lack of innovation, business metrics and what many CIOs should be thinking about but aren't. Here is a condensed version of Bailey's remarks..."
        6 Ways To Develop Internal IT Talent
        Information Week, August 26th, 2013
        "If your company faces an IT skills shortage, it may be time to take a long, honest look within. Are you investing in your employees and their professional development? Does your organization create real incentives for technology innovation? Do you encourage staff to learn new technologies and IT skills, even if they're not explicitly relevant to a person's job description?..."

        • Offer Real Training Opportunities
        • Send Employees Back To School
        • Enable Job Description Creep
        • Do Lunch-and-Learns
        • Consider Prizes For IT Innovation
        • Make Professional Development Part Of Your Culture

        Read on for details.

          How BYOA (Bring Your Own Apps) is the new BYOD
          Enterprise AppsTech, August 26th, 2013
          "The Bring-Your-Own movement is expanding from devices to apps, which is transforming enterprise mobility management. And like everything in mobile, it is happening FAST. We've seen this with our customers, who dryly report 'it did not go well' when talking about the fallout from restricting certain popular apps, and our own employees, who come in expecting to be able to use the apps they have grown to depend on to be productive.

          In May, Ojas Rege, our VP of Strategy, did a webinar (available here) with Stacy Crook, Mobile Enterprise Program Manager at IDC, on BYOA - the Next Wave of Consumerization. She estimates that the BYOA movement is where BYOD was about three years ago..."

          IT Security Experts Share Their Tips for Managing Vendors
          Network World, August 21st, 2013
          "The brain trust at Wisegate has just published a report to share their insider tips on managing security vendors. Wisegate is an online professional networking community of CIOs, CISOs, CSOs and other IT leaders. They confer regularly to share their experiences and best practices with all things pertaining to IT and IT security. The latest report, Top 10 Tips for Managing Vendors, is freely available online, but I'll summarize the highlights for you here.

          The report addresses three phases of the solution buying cycle:"

          • Managing vendor hype before you decide to buy the product
          • Managing your total budget and fitting a new purchase in
          • Managing the vendor relationship once the purchase order is signed

          Read on for details.

          The Information Management Hierarchy of Needs
          Information Management, August 21st, 2013
          "In a 1943 paper, Abraham Maslow introduced a new theory on motivation that has subsequently been called 'Maslow's Hierarchy of Needs.' His premise is that humans demonstrate patterns in motivation ranging from the most basic needs (physiological) through to self-actualization, and that the most basic needs must be fulfilled before someone has the ability to focus on higher-level needs. In other words, someone needs to have food, water and shelter before they are motivated to seek friendship, confidence and achievement..."
            The Road Map You Need to Get to One of the Best Workplaces on Earth
            TLNT, August 28th, 2013
            "Suppose you wanted to design the best company on earth to work for. What would it be like?

            For three years, Rob Goffee and Gareth Jones of the London Business School explored that question and found six (6) imperatives that can serve as a road map for leaders aiming to create the most productive and rewarding working environments possible.

            Here are the six imperatives:..."

            • Let people be themselves
            • Unleash the flow of information
            • Magnify people's strengths
            • Stand for more than shareholder value
            • Show how the daily work makes sense
            • Have rules people can believe in

            Read on for details.

              Why IT Financial Management Equals Cost Reductions
              CIO Insight, August 2nd, 2013
              "I was talking with some friends the other day about financial management. Since most of the people are in IT organizations, the focus of the conversation quickly shifted to cost reductions. After a few minutes of discussion, it occurred to me that most IT organizations think of financial management only in terms of cost reductions. And most business units think of IT as the largest cost center and, therefore, are always seeking to reduce IT-related costs, which led me to start thinking about how these opposing thought patterns came about and how we can serve as catalysts to change the business units' current perceptions..."
              IT - PM
              11 Signs Your IT Project is Doomed
              ComputerWorld, August 29th, 2013
              "No senior buy-in, minimum spec targets, a 'nothing can go wrong' mentality -- here's how to sense demise before your IT project meets its ignominious end..."

              • The project has launched without senior buy-in
              • No detailed project plan exists
              • Meetings have been scheduled without concern for team member availability
              • Users have had little (to no) early involvement
              • The project targets the minimum specs
              • Testing is an afterthought
              • No recovery plan is in place in the event of failure
              • Expert recommendations have been rebuffed without testing outcomes
              • The go-live date is a weekend or holiday
              • Expectations have not been set

              Read on for details.

                Ten Reasons to Become a Project Manager
                Baseline, August 28th, 2013
                "It seems pretty clear that you would like to get paid more … and gain more job security … and advance your career far more rapidly… and hobnob with influential organization leaders who are convinced of your greatness. If any of these goals are on your career to-do list, you might want to consider getting certified as an IT project manager... To find out more about project management certifications and what they require, go to the Project Management Institute site. Following are 10 reasons why you should consider becoming an IT project manager:"

                • You'll Better Deal With Change
                • You'll Deliver Tangible Value
                • You'll Deliver Intangible Value
                • You'll Control Scheduling and Costs
                • You'll Manage Change
                • You'll Minimize Do-Overs
                • You'll Make More Money
                • Your Job Will Be More Secure
                • You'll Be More Marketable
                • Your Company Profile Will Soar

                Read on for details.

                Want Outstanding Projects? Make Stakeholders CARE!
                AITS, August 26th, 2013

                • Lack of sponsor and stakeholder support deprives projects of vision and resources.
                • Project management presentation of important information can make motivate stakeholders to take actions that reduce project uncertainty and improve project outcomes.

                Those who are responsible for the outcomes of your organization's initiatives should be very concerned about how sponsors and project managers interact and exert their leadership. During times of economic danger, you may be wasting limited resources because of inefficiencies and unresolved conflict. The PMI Pulse of the Profession report (March 2013) states that the dollars lost in risk by high performing organizations is 14 times less than that of low performing organizations..."

                IT - Networks
                3 Types of DNS Attacks and How to Deal with Them
                InfoWorld, August 26th, 2013
                "The Syrian Electronic Army altered the DNS records used by the New York Times, Twitter, and others. Here are three ways such attacks can be mitigated...

                When DNS is compromised, several things can happen. However, compromised DNS servers are often used by attackers one of two ways. The first thing an attacker can do is redirect all incoming traffic to a server of their choosing. This enables them to launch additional attacks, or collect traffic logs that contain sensitive information..."

                  Software-Defined Networks: Lots of Optimism, Less Knowledge
                  Federal Computer Week, August 22th, 2013
                  "Federal IT managers like the idea of software-defined networks, but don't understand them all that well, according to a study commissioned by a leading SDN vendor.

                  The study released Aug. 22 by Juniper Networks said 34 percent of federal IT professionals plan to adopt SDN within two years. While 66 percent of the 250 surveyed federal IT management executives and IT professionals said SDN software would help make their networks more efficient and agile, there was a disconnect as to exactly how it would do so..."

                  IT - Operations
                  The Stone Wars of Root Cause Analysis
                  Information Management, August 28th, 2013
                  "As a single stone causes concentric ripples in a pond," Martin Doyle commented on my blog post There is No Such Thing as a Root Cause, "there will always be one root cause event creating the data quality wave. There may be interference after the root cause event which may look like a root cause, creating eddies of side effects and confusion, but I believe there will always be one root cause. Work backwards from the data quality side effects to the root cause and the data quality ripples will be eliminated."
                    10 Steps to Improve Return on Investment of IT Purchases
                    Enterprise AppsTech, August 28th, 2013
                    "It's an unfortunate fact of life that, very often, IT systems, once purchased, are underutilized. This can lead companies to question the ROI promised by suppliers and industry experts.

                    Below are ten steps to enable you and your team to extract more value from the investments in your existing enterprise systems..."

                    • Improve your argument
                    • Map your processes
                    • Improve the use of existing resources
                    • Customise to automate
                    • Integrate your systems selectively
                    • Mobilise your processes
                    • Fully train your users
                    • Bring the concept of Business Intelligence to the operational level
                    • Keep your systems up to date
                    • Revisit your processes

                    Read on for details.

                      How to Vet An ITAD Vendor
                      Business 2 Community, August 25th, 2013
                      "When you set out to contract a ITAD vendor, you are investing in a relationship that will safeguard your organization's data security - that's no light matter! Partnering with the wrong organization can cost you, both in revenue and in lost time. If you don't take the time to do it right, you can rack up significant legal fees and environmental violations, not to mention the damaging data breach risks! Here are a few tips from MPC to help you make sure you are making the right choice:..."
                      New Global Warming Rules Put the Heat on Data Centers
                      Network World, August 26th, 2013
                      "California is rolling out a new law to reduce greenhouse gas emissions, primarily from electric generating plants, and the cost of the effort is expected to be passed along to data centers, which are among the biggest consumers of electric power in the state.

                      This means data center operators in California will need to step up their energy efficiency efforts in order to avoid the higher costs. And the handwriting is on the wall for data centers in the rest of the U.S., as President Obama has directed the EPA to develop greenhouse gas controls nationwide..."

                        Smart Building Security: Threats, Tips and Tricks
                        Help Net Security, August 29th, 2013
                        "Martin Lee is the Technical Lead, Threat Intelligence at Cisco. In this interview he discusses the critical security threats to smart buildings, the features of a robust and secure smart building system, and much more.

                        What are some of the most critical security threats to smart buildings today?

                        Smart buildings are being implemented without necessarily designing security into these systems from the beginning. Because of this, we risk creating smart buildings that have inherent weaknesses that attackers can exploit. We've seen this happen in many other environments; unless security considerations are implemented as part of the design, we will be forever trying to bolt on extra security and playing catch up with attackers..."

                        How to Get Multiple IT Outsourcing Providers to Play Nice
                        CIO, August 23rd, 2013
                        "There's no doubt that multisourcing -- parceling out the IT services portfolio among a number of vendors--has its benefits: competitive pricing, increased flexibility and access to a deeper pool of talent, among others. But working with multiple providers creates multiple challenges, not the least of which is trying to get all of those competing vendors to play nice.

                        In fact, almost everything in the typical outsourcing transaction, transition and operation is conspiring against them getting along..."

                        IT - Security
                        Poison Ivy RAT Gnawing on Systems Again
                        CSO Online, August 26th, 2013
                        "Poison Ivy, a Remote Access Trojan (RAT) circulating on the Internet for almost a decade, is experiencing a resurgence among hackers, says a report released on Wednesday by the network security company FireEye.

                        The RAT has been used in several high profile attacks in the past -- notably the breach of RSA that compromised its SecurID authentication token system and the 'Nitro' forays against chemical makers, government offices, defense firms, and human rights groups. FireEye said it is also currently being used in hundreds of intrusions on prominent enterprises..."

                        6 Ways Employees are Putting Your Company's Data At Risk
                        InfoWorld, August 26th, 2013
                        "Most of the time, employees aren't knowingly risking data leaks, but casual behavior can end up costing your company...

                        IT walks a fine line between balancing security issues and giving people the tools they need to get the job done. Every day companies move sensitive data around, and IT is in charge of securing that data, but what about the little things that tend to fall through the cracks?..."

                        • Opening documents in third-party apps
                        • Sending company data over personal email addresses:
                        • Using file transfer apps
                        • USB thumb drives, smartphones and tablets
                        • Data and IP theft
                        • Tackle the digital security challenge

                        Read on for details.

                        10 Security Tips for Customer Support and Service
                        CSO Online, August 23th, 2013
                        "What every company hopes dearly to avoid is the customer facing security incidents especially those involving compromise of customer information. While the issues related to retail customer information usually get primetime coverage, there is also the significant issue of B2B interactions with our corporate customers and partners...

                        Below are top 10 tips for security organizations to implement for their support and services delivery organizations:"

                        • Move customer information out of email or local storage
                        • Clearly separate out internal versus external customer content very explicitly
                        • Keep an eye on the training material and process
                        • Watch the new hires
                        • Follow a double check process
                        • Follow a simple data classification process
                        • Guard the customer data closely, even from the customer
                        • Be careful about what you sign and agree to with the customer
                        • Change Customer system with caution
                        • Encrypt hard drives

                        Read on for details.

                        Costs of a Data Breach: What to Do When the Worst Happens
                        Business 2 Community, August 26th, 2013
                        "Every company that handles confidential information should be concerned with the likelihood of a data security breach. But what happens when the worst happens? Do you have a plan in place? Here's the best way to approach a data security breach:"

                        • First, figure out the whole story
                        • Second, review your regulations
                        • Next, decide who to notify
                        • Then, decide when to notify them
                        • Finally, decide what you'll say
                        • How to prevent a future data breach

                        Read on for details.

                        Don't Be The Tortoise (DevOps)
                        Dark Reading, August 27th, 2013
                        "The fable of the Tortoise and the Hare has been passed on from generation to generation of children for over 2500 years. Most of us first hear it while curled up in our parents' laps, or perhaps as one of our first story times at school. The tale, as most commonly interpreted, tells us that slow, steady, and determined beats impulsive yet agile and quick.

                        Which is, of course, absolute rubbish. Just ask Usain Bolt. Or stick a tortoise and a hare in front of a bear and see what happens. Go ahead, I'll wait..."

                          New Security Trend: Bring Your Own Attorney (BYOA)
                          Information Week, August 26th, 2013
                          "Acronyms have an amusing way of characterizing moments in time. For some of us, BYOB (bring your own beverage) became a familiar and festive part of college. Now, later in life, those of us in the government professional environment have learned to use a similar acronym -- BYOD.

                          BYOD sums up the ability to use our own mobile device -- laptop, tablet, smart phone -- to access agency or company information and applications. It also suggests an approach that makes our job easier, makes us more productive and creates an overall more satisfying work-life balance..."

                          NSA: NOBODY Could Stop Snowden - He Was A SYSADMIN
                          The Register, August 26th, 2013
                          "The US National Security Agency may have some of the most sophisticated cyber-surveillance programs in the world, but it was trivial for former NSA contractor Edward Snowden to walk off with sensitive data, sources say, owing to the agency's antiquated internal security.

                          "The [Defense Department] and especially NSA are known for awesome cyber security, but this seems somewhat misplaced," former US security official Jason Healey told NBC News on Thursday. "They are great at some sophisticated tasks but oddly bad at many of the simplest."...

                          There Are No Winners In the Blame Game
                          Help Net Security, August 26th, 2013
                          "Every time a major security breach makes the headlines, a common reaction happens. Even before the details of the breach are known, the infosec world gets into a frenzy of speculation as to how the attack happened, who conducted it, and whether the attackers were skilled or not. Invariably the conversation focuses onto the company that is the victim of the attack, and it often tends to highlight how stupid, negligent or weak its security defenses were. In effect, we blame the victim for being attacked..."
                          Top 6 Threats to Enterprise Security
                          Information Management, August 26th, 2013
                          "With news of 'cyberesponiage' making headlines, enterprises are taking a closer look at the threats that can impact their business and ultimately their bottom line. McAfee Labs has analyzed the threats of the past quarter for emerging trends, which center on mobile and overall malware. With BYOD becoming ubiquitous, threats that once considered consumer problems are now becoming issues for the enterprise as well.

                          Here are the top six threats to enterprise security..."

                          • Targeted Trojans
                          • Mobile Spyware
                          • Ransomware
                          • Phishing
                          • Database Breaches
                          • Browser-Based Threats

                          Read on for details.

                          University Cybersecurity: Different, But Still the Same
                          GCN, August 28th, 2013
                          "Universities are shoring up their cybersecurity strategies amid a rising wave of attacks on their networks. Schools from the University of North Carolina to the University of California at Berkeley have doubled the size of their IT staffs and/or budgets in order to address the problem.

                          A challenge many say university IT managers face is striking a balance between protecting sensitive information while allowing the open sharing of information characteristic of educational institutions. 'A university environment is very different from a corporation or a government agency, because of the kind of openness and free flow of information you're trying to promote,' David Shaw, Purdue University's CISO, recently told the New York Times..."

                            Would You Publicly Report A Security Breach?
                            Help Net Security, August 29th, 2013
                            "Recent research by AlienVault revealed that only 2% of surveyed EU companies would be willing to go public should they suffer a security breach. 38% opted to inform the relevant authorities and 31% said they would tell their employees. A mere 11% said they would share the information with the security community.

                            Organizations who suffer a security breach face a Catch 22, said Barmak Meftah, President and CEO of AlienVault..."

                            The Dangers of QR Codes for Security
                            CSO Online, August 19th, 2013
                            "A large number of end-user computers are mobile devices and the lion's share of those are smartphones. APTs are increasingly targeting the mobile market. "Mobile malware increased more than 1,000-percent in 2012 alone," said Catalin Cosoi, Chief Security Researcher, BitDefender. BitDefender bases this data on analyses of mobile threats it collects via honeypots.

                            Criminal hackers use malicious QR codes for the same reasons they use any attack on mobile devices: the mobile market is outpacing PCs, creating a bigger target; and, these newer, mostly end-user devices (especially smartphones) are the least likely to carry any security software..."

                            IT - Careers
                            10 Resume Mistakes to Avoid
                            TechRepublic, June 5th, 2012
                            "The goal of a resume is to let a potential employer know why you're the best person for the job. Here are 10 practices that impede that goal..."

                            • Your focus is wrong
                            • You have typos in your resume
                            • Your resume is too long
                            • Your resume is not very "readable"
                            • Your name appears in the Word header
                            • Your resume doesn't include keywords
                            • You list your experience instead of your accomplishments
                            • You use vague verbs and subjective adjectives
                            • Your resume is like all the others
                            • You lie/exaggerate on your resume

                            Read on for details.

                              Forget Shark Week: Researchers Tag N' Track Great Whites
                              ComputerWorld, August 26th, 2013
                              "Meet Mary Lee, a great white shark that's the same weight and nearly the same length as a Buick. And, by the way, you may have been swimming within a few feet of her this past year and not known it.

                              Since last September, when she received an array of radio, acoustic and satellite tags, Mary Lee has traveled from Massachusetts to Florida, often hugging the coastline so closely that scientists tracking her called beach authorities in Florida to warn them about her. The 16-foot, 3,456-pound shark also headed into open ocean, taking a February vacation off the beaches of Bermuda..."

                                How to Prepare for (and Ace) the Technical Interview
                                CIO, August 27th, 2013
                                "As developers and IT pros you need to do all the things everyone else does to prepare for a job interview such as update and focus your resume as well as work on your communication and presentation skills. However, you also have the technical interview to deal with.

                                The good news is if you make it this far in the interview process, you've likely got a good shot at the position. How you prepare for this (or not prepare for this) can cost you the job. We spoke with CEOs, recruiters and other industry experts who agree you simply can't just go in there and muddle your way through it. You've got to prepare in a number of ways..."

                                  In Case of IT Emergency, Break Out the Chocolate
                                  InfoWorld, August 26th, 2013
                                  "On good days in tech support, users' kind words can sustain you. On the bad days, you need a different kind of boost...

                                  We all have ways of coping with our jobs. Mine is chocolate. You see, I work in IT support, which often means I'm the proverbial punching bag for frustrated users. People only call when there's a problem, and every incident automatically escalates into an emergency that's all IT's fault. After so many negative encounters, these blowups can be difficult to shrug off..."

                                    Jealous Much? 8 Techy Things that Can Spark Office Envy
                                    IT World, August 28th, 2013
                                    "Many things in the workplace have long been the source of jealousy among co-workers. Traditionally, these are things like office space, compensation and special treatment from the boss. These days, though, technology has introduced a whole new list of things a fellow employee may have that you (really) want. Here are 8 tech-related office things that can make co-workers green with envy.

                                    • Being able to work poolside or in your PJs
                                    • That new computer smell
                                    • Screen real estate out the wazoo
                                    • Something in anodized aluminum
                                    • He can BYOD but I can't
                                    • Office equipment that won't hurt you
                                    • Not being shackled to a desktop
                                    • Superuser powers

                                    Read on for details.

                                    OpenStorage 2013 Santa Clara
                                    Save the dates: October 22-24
                                    The 2013 OpenStorage Summit will be held in conjunction with the Open Server Summit 2013 at the Santa Clara Convention Center, Santa Clara CA, October 22-24 (Tuesday-Thursday).

                                    No details are available yet. Please save the dates in your calendar.

                                    Details will be posted to in the near future.

                                    IT - Big Data
                                    10 Big Data Trends Changing the Face of Business
                                    CIO, July 24th, 2013
                                    ""Big data is slowly but surely changing the way companies do business. Here's a look at 10 trends shaping big data and the future of business..."

                                    • Machine Data and the Internet of Things Takes Center Stage
                                    • Compound Applications That Combine Data Sets to Create Value
                                    • There's an Explosion of Innovation Built on Open Source Big Data Tools
                                    • Companies Taking a Proactive Approach to Identifying Where Big Data Can Have an Impact
                                    • There Are More Actual Production Big Data Projects
                                    • Large Companies Are Increasingly Turning to Big Data
                                    • Most Companies Spend Very Little, A Few Spend A Lot
                                    • Investments Are Geared Toward Generating and Maintaining Revenue
                                    • The Greatest ROI of Big Data Is Coming from the Logistics and Finance Functions
                                    • The Biggest Challenges Are as Much Cultural as Technological

                                    Read on for details

                                    Beat the Odds in the Big Data Productivity Battle
                                    TechRepublic, August 28th, 2013
                                    "Gartner predicts it will take companies five to ten years to achieve productivity with their big data. Learn six ways to avoid delaying productivity.

                                    Gartner published in July 2013 its revised hype cycle on big data. This is a timeline that predicts the phases that companies will go through as they try to make their big data work for them..."

                                    • Build your business case first
                                    • Don't get budget happy
                                    • Don't "underdesign" pilot projects
                                    • Seek help if you don't know how to ask the right questions
                                    • Perform a proof of concept before you buy anything
                                    • Consider a batch vs. a real-time big data application first

                                    Read on for details.

                                    Better Business through Technology: Learning from Arnold Schwarzenegger
                                    Business 2 Community, August 28th, 2013
                                    "What is your company's legacy? Can you quantify it, predict it, or use it? Is the understanding of your legacy the same as your customer's? By utilizing data and technology, these questions are quickly answered and turned into powerful tools for your business. For an example of how to explore your legacy and understand how it impacts your business today, enter Arnold Schwarzenegger..."
                                      Big Insights from Big Data Require the Right Data Science Team
                                      Information Management, August 26th, 2013
                                      "Much has been said lately about the diversity of skills required by a data scientist to successfully translate data-driven insights into tangible business results. Now, management consulting firm Booz Allen Hamilton is taking this understanding one step further and applying it to an organization's entire data science team..."
                                      Designing an Information Governance Program
                                      Baseline, April 16th, 2013
                                      "Big data holds promise for firms that can collect and analyze it, but information governance leaders, especially those at multinational organizations, are struggling with a dilemma: The value of information declines over time, but the costs and risks associated with it don't.

                                      Information life-cycle governance (ILG) programs respond to this challenge, reducing information costs and risks by incorporating the value of information to the various stakeholders..."

                                      When Pigs Fly... Is Now!
                                      Big Data Republic, August 26th, 2013
                                      "The term 'big data' has become synonymous with complexity, and finding people with the right skills to work with it is becoming increasingly difficult. Consulting firm McKinsey predicts that, in the US alone, there will be a shortage by 2018 of 140,000 to 190,000 people with the deep analytical skills needed to work with big data.

                                      It is an issue that is increasingly holding business back from adopting big data technologies and rolling out new big data programs..."

                                      IT - Mobile
                                      Confidential Data Is Leaving on Workers' Mobile Devices
                                      CIO, August 29th, 2013
                                      "More than half of employees admit to storing, sharing and working on corporate documents on their personal devices - and this number is growing. You might want to re-read that statement. It's a doozy.

                                      If you think your BYOD policy telling employees that they can't put sensitive data on their personal smartphones, laptops and tablets is keeping your company safe, think again. Few office workers are actually aware of their company's BYOD policy..."

                                      BYOD Is Dangerous for Employees
                                      Internet Evolution, August 27th, 2013
                                      "Considering BYOD or already using your personal computing devices at work for company business? Then here's something to think about: By agreeing to BYOD, and through no fault of your own, you could become embroiled in civil or criminal litigation.

                                      No matter what kind it is, being involved in work-related litigation is painful. The best-case scenario is you lose use of the confiscated device for an indeterminate length of time. The worst-case scenario is where the party authorized to inspect all data stored on the device finds incriminating evidence.

                                      Let me clarify, that means any incriminating evidence..."

                                      CIO's Approach to BYOD in Education Puts Focus on Productivity
                                      SearchCIO, August 26th, 2013
                                      "Eric Hawley, CIO at Utah State University, is the SearchCIO 2013 Enterprise IT Leader of the Year. Hawley brought together centralized and decentralized IT at Utah State by creating shared services, common standards and a culture of voluntary participation. In this installment of a series of three podcast interviews with Senior Features Writer Karen Goulart, Hawley discusses bring your own device (BYOD) in education and the biggest risks facing higher education today. This is the third of three special podcasts with Hawley..."
                                      Mobile Device Management Checklist
                                      SearchConsumerization, March 4th, 2013
                                      "Ideally, IT should be at least aware of every smartphone and tablet used in an organization, from activation to retirement. Accomplishing this requires a cohesive plan for mobile device management.

                                      As business use of smartphones and tablets continues to grow, inadequate IT oversight and control is having negative effects. Up to one-third of companies acknowledge that smartphone use is being hindered or slowed because IT admins cannot manage the devices to the extent they would like, according to a 2012 Osterman Research study; the situation is even worse for tablets..."

                                      Organizations Taking Risky Approach to BYOD
                                      CIO Insight, August 22th, 2013
                                      "While the bring your own device (BYOD) trend only continues to gain momentum, the implementation of effective policies to establish best practices for the use of personal devices on the job remains a work in progress..."

                                      • Position Statement
                                      • Regulatory Lapse
                                      • Budget Blues
                                      • Performance Issues
                                      • Win-Win
                                      • Risky Business
                                      • School's Out
                                      • Big Brother
                                      • Self-Financed
                                      • What Devices IT Employees Use for Work

                                      Read on for details.

                                      The Bring Your Own Device (BYOD) Movement is Catching On. Is Your Business Ready?
                                      Business 2 Community, August 28th, 2013
                                      "We've been bringing our own devices to work for a while now, but until recently, this wasn't the norm. Whether it's just connecting our work email to keep in touch on the go or using our using personal computers to make presentations, BYOD adds a level of convenience that we, as employees, appreciate.

                                      It looks like employers are finally realizing the benefits of this trend. In fact, according to Gartner, half of United States employers will require BYOD by 2017. Imagine walking in on the first day at work with your beloved Macbook, your pretty Moto X phone and your ultralight tablet. Sounds pretty sweet! But to many employers, BYOD is still a scary concept and to them, the risks outweigh the benefits. There are definitely some potential issues that employers worry about: ..."

                                      Why You Plug Gadgets Into the Wall Like a Neanderthal
                                      IT World, August 26th, 2013
                                      "In the future, your phones, tablets and wearable computing gadgets won't come with chargers -- they'll use inductive chargers built into desks, kitchen counters, bedside tables, cars and other surfaces. Just placing a device on any convenient surface will charge it.

                                      This future will be great for us lazy people, and there are environmental benefits as well.

                                      More than one-third of the 'stuff' that comes with your smartphone -- plastic, wiring and electronics -- is in the charger.

                                      Each phone has its own personal charger destined inevitably for the landfill or an environmentally unfriendly recycling center..."

                                        Top Ten Articles for last few Issues
                                        Vol 186 Issues 1, 2 and 3; Vol 185 Issues 1, 2, 3, 4 and 5
                                        We track how frequently each article is viewed on the web site to determine which the readers consider the most important. For last week, the top 10 articles were:

                                        • Oracle Virtual Compute Appliance
                                        • Less known Solaris 11.1 features: pfedit
                                        • Oracle VM Server for SPARC 3.1
                                        • OVM Server for SPARC 3.1 introduces Dynamic SR-IOV feature
                                        • LibreOffice 4.0.5
                                        • Java Spotlight Episode 142: Milton Smith on the JavaOne Security Track @spoofzu
                                        • Open Universities Australia Realizes Valuable Savings and Simplifies IT with Oracle VM
                                        • Second Annual MySQL Connect Conference September 21 - 23, 2013 in San Francisco
                                        • MySQL Connector/Net 6.6.6
                                        • OVM Server for SPARC 3.1 introduces Dynamic SR-IOV feature

                                        The longer version of this article has list of top ten articles for the last 8 weeks.

                                          IT - Encryption
                                          Are We Heading for a 'Cryptopocalypse'?
                                          TechRepublic, August 26th, 2013
                                          "High profile security breaches, leaks about the NSA's surveillance program, and the risks of storing data in the cloud have all combined to put a big spotlight on encryption. That is often the mitigation championed by the tech community as a means to protect sensitive and personal data from prying eyes. If we encrypt our files, our connections and messages, then we avoid snooping. It keeps the bad guys and potential spies away. But is encryption really the end-all, be-all of security and privacy? It may not be that simple...."
                                          Quantum Cryptography Is the Last, Best Defense
                                          InfoWorld, August 27th, 2013
                                          "Quantum computing has long confused and challenged the best of us. You can read only so many technical details before your head explodes. Yet it's likely that usable quantum cryptography will be a fact of life within the decade -- and that has huge ramifications.

                                          Most of today's popular cipher algorithms (especially public/private key exchanges) work because the math involved is very difficult for conventional (nonquantum) computers to solve. Take some really big prime numbers, add, subtract, multiply, and divide them a bit (like you do with the RSA algorithm), and you quickly get a mathematical problem that is very hard to solve even with hundreds of billions of guesses..."

                                          LibreOffice 4.1.1
                                          first minor release of the LibreOffice 4.1
                                          The Document Foundation (TDF) announced LibreOffice 4.1.1, for Windows, Mac OS X and Linux. This is the first minor release of the LibreOffice 4.1 family, which features a large number of improved interoperability features with proprietary and legacy file formats.

                                          The new release is a step forward in the process of improving the overall quality and stability of LibreOffice 4.1. For enterprise adoptions, though, The Document Foundation suggests LibreOffice 4.0.5, backed by certified professionals.

                                          LibreOffice 4.1.1 arrives a few days after the announcement of the Spanish autonomous region of Valencia's migration to LibreOffice on 120,000 PCs, which will save the government some 1.5 million Euro per year on proprietary software licenses.

                                          Trending in
                                          Vol 235, Issue 3
                                          Trending IT Articles