News about Oracle's Solaris and Sun Hardware
System News
Sep 2nd, 2013 — Sep 8th, 2013 Generate the Custom HTML Email for this Issue
System News System News for Sun Users
Volume 187, Issue 1 << Previous Issue | Next Issue >>
Sections in this issue:
click to jump to section


Features
x
Hadoop on an Oracle SPARC T4-2 Server
simultaneously run up to 64 software threads
Jeff Taylor sales he "recently configured a Oracle SPARC T4-2 server to store and process a combination of 2 types of data:

  • Critical and sensitive data. ACID transactions are required. Security is critical. This data needs to be stored in an Oracle Database.

  • High-volume/low-risk data that needs to be processed using Apache Hadoop. This data is stored in HDFS.

Based on the requirements, I configured the server using a combination of:

  • Oracle VM Server for SPARC, used for hard partitioning of system resources such as CPU, memory, PCIe buses and devices.

  • Oracle Solaris Zones to host a Hadoop cluster as shown in Orgad Kimchi's How to Set Up a Hadoop Cluster Using Oracle Solaris Zones

The configuration is shown in the following diagram:..."

SPARC
x
Direct I/O and SR-IOV features are now extended to Non-Primary root domains
Opens up various opportunities for deployment.
Raghuram Kothakota writes, "Until now OVM Server for SPARC Direct I/O and SR-IOV features were limited to PCIe buses assigned to the primary domain only. This restriction is now removed with the release of OVM Server for SPARC 3.1. That is, now you can assign a PCIe bus to a logical domain and then assign PCIe slots or SR-IOV Virtual Functions from that PCIe bus to other domains. This opens up many different creative opportunities. For example it enables configuration such as below:..."
Misys Kondor+ runs best on SPARC T5
Shows the superiority of SPARC in a real-life deployment
"Misys is a leading financial software vendor, providing the broadest portfolio of banking, treasury, trading and risk solutions available on the market," writes Frederic Pariente. "At ISV Engineering, we have a long-standing collaboration with the Kondor+ product line, that came from the Turaz acquisition (formerly part of Thomson Reuters) and now part of the Misys Treasury & Capital Markets (TCM) portfolio. Jean-Marc Jacquot, Senior Technical Consultant at Misys TCM, was recently interviewed by ITplace.TV (in French language) about a recent IT redesign of the Kondor+ installed base at a major French financial institution..."
    Virtualization
    x
    Oracle VM Server for SPARC 3.1
    Provides a new level of functional capability, representing the continued investment and enhancement of this flexible and powerful virtualization capability
    Jeff Savit writes, "A new release of Oracle VM Server for SPARC has been released with performance improvements and enhanced operational flexibility. The details are described in the formal documentation and in other blogs, but here are some highlights:

    • Dramatically improved virtual network performance
    • Cross CPU live migration enhancements (domain migration between different SPARC CPU types)
    • Dynamic Single Root I/O Virtualization (SR-IOV)
    • Infiniband SR-IOV
    • Non-primary root domains

    ... Oracle VM Server for SPARC 3.1 provides a new level of functional capability, representing the continued investment and enhancement of this flexible and powerful virtualization capability. For more information, please see the Virtualization Blog announcement at Announcing Oracle VM Server for SPARC 3.1 Release and the What's New in Oracle VM Server for SPARC Software page..."

    Oracle VM VirtualBox 4.2.16
    maintenance release
    Oracle VM VirtualBox 4.2.18 has just been released.

    This is a maintenance release containing bug fixes. For the full list of fixes see the ChangeLog, or just simply download it now at the community or Oracle download sites.

    VirtualBox is a powerful x86 and AMD64/Intel64 virtualization product for enterprise as well as home use. Not only is VirtualBox an extremely feature rich, high performance product for enterprise customers, it is also the only professional solution that is freely available as Open Source Software under the terms of the GNU General Public License (GPL) version 2.

    IT - Storage
    x
    Is it Time to Upgrade Your Storage Evaluation Process?
    Storage Switzerland, August 22nd, 2013
    "In the modern data center, storage system upgrades are rarely caused by a storage system running out of capacity; rather, it more often occurs due to an unanticipated lack of performance or exorbitant maintenance prices. In fact, performance related upgrades can occur at any time, often well before the current storage system was due to be refreshed and more importantly before the evaluation process had predicted a refresh would be needed..."
    Can Object Storage Solve the RAID TCO Challenge?
    Storage Switzerland, August 20th, 2013
    "The cost of storage is important in all data-dependent companies, but in hyper-scale environments like web-based enterprises, it can literally consume the business. With the simultaneous requirements of scalable capacity, reliability and availability, these organizations face serious challenges with storage economics. RAID and replication are the architectures that have historically been used in large storage systems but object storage is being tapped as an alternative that can offer a compelling TCO advantage..."
    Cloud-Based Storage Up 90 Percent Since Start of 2012
    Information Management, August 29th, 2013
    "The use of cloud-based storage has increased 90 percent from January 2012 to June of this year, according to 'The 2013 State of the Enterprise Cloud Report' from Verizon, and the use of cloud-based memory has doubled, driven by the shift of business-critical applications to the cloud..."
      IT - Technology
      x
      4 Technologies for Every CIO's Roadmap
      Information Week, September 5th, 2013
      "Fenway Park was struggling. Nearly a century's worth of history and the undying love of fans couldn't change the fact that this once state-of-the-art stadium could no longer keep pace in a drastically different world.

      Its owners had to make a difficult decision: Stick with what's known or start again. The answer was found somewhere in the middle. They didn't to do away with a place that so many love, but they didn't sit still, either. Enhancements were made both inside and out, resulting in a stadium that manages to be historic and modern with the same heartbeat..."

        First Atomic Level Simulation of a Whole Battery
        MIT Technology Review, August 21st, 2013
        "When it comes to developing the next generation of technology, the biggest bottleneck is arguably the battery. Engineers need better batteries for electric vehicles, for energy storage in power grids and, of course, for consumer electronic devices.

        These batteries need to deliver a higher current over more discharge cycles with a greater energy density, to name just a few of the challenges.

        Building and testing new battery designs is time-consuming, difficult and expensive. So it is handy for electrochemists to simulate the way a battery performs before they ever get their hands dirty..."

          How Technology is Transforming the NFL
          Network World, August 28th, 2013
          "With each season, the NFL continues to incorporate new technology that could change every aspect of the game. From research on player safety to improved in-stadium experience for fans, NFL teams are committing more money to new technology seemingly every day..."

          • Tablet playbooks
          • Concussion sensors
          • Aggregating helmet data
          • Thigh-pad study
          • Body-worn GPS
          • More cameras = bigger data
          • Advanced statistics
          • Electronic health records
          • SAP and scouting
          • NFL and the Xbox One
          • NFL's $300 million tech, media plan
          • 49ers new stadium makes beer easier to find

          Read on for details.

          Solaris
          x
          So, what makes Solaris Zones so cool?
          Karoly Vegh Provides 10 Reasons
          Karoly Vegh writes, "This post is about the third option, a container technology built right into Solaris: Solaris Zones. They are pretty awesome, especially on Solaris 11 - they're like vacation: once you go Zones, you won't want to leave them :) But what exactly makes Zones so cool?

          There are a number of reasons, allow me to list my favourite top 10:..."

          • Solaris Zones are performance overheadless
          • Resource Management
          • the Golden Image cloning
          • Zone independence
          • Branded Zones
          • Cluster integration
          • Immutable Zones
          • Exclusive IP stack with VNICs
          • zonestat
          • Per-zone fstype statistics

          Read on for details.

          Linux
          x
          How to Use Hardware Fault Management in Oracle Linux
          by Robert Chase

          Robert Chase writes, "In this article, we will focus on two hardware fault management features and the corresponding tools used with these features in Oracle Linux:

          • Intelligent Platform Management Interface (IPMI) and the ipmitool tool
          • Machine Check Exceptions (MCEs) and the mcelog, mce-inject, and mce-test tools

          The following sections provide an overview of the technology, describe common use cases, and provide instructions for installing and configuring the tools in Oracle Linux. Several examples show how the tools can be used to capture and report important hardware information you can use in your daily operations..."

          IT - Cloud
          x
          The Bare-Bones Cloud: Why Bother?
          InfoWorld, September 5th, 2013
          "IaaS plays like Amazon EC2 mainly provide a way for you to do what you're already doing for a little less money. PaaS and SaaS deliver a lot more...

          I've been surprised at the way fairly traditional companies have embraced the cloud -- but don't always embrace the benefits. For most, the payoff has been relatively small and confined to the infrastructure layer..."

          For Cloud Providers, Fraud Detection is Integral Part of Business Plan
          SearchCloudProvider, September 2nd, 2013
          "Cloud providers have attracted enterprise customers with the promise of rapid elasticity, on-demand provisioning, high availability and a pennies-per-hour pricing model. But there's just one problem: These very qualities have enticed criminals to adopt cloud services as well.

          When a scam artist is looking to set up a phishing scheme to gain access to victims' bank accounts, the built-in redundancy, scalability and automation capabilities of cloud servers are extremely appealing. And when all it takes to procure cloud services is a working credit card -- without ever needing to deal with a live salesperson -- the cloud becomes an even more viable base from which criminals can commit fraud..."

            File Hosting Service Must Scan for Copyright Infringing Files, German Federal Court Rules
            IT World, September 2nd, 2013
            "Online file locker services that, like Rapidshare, have a business model that provides an incentive to share copyright protected materials must monitor incoming links to discover infringing files, the German Federal Court of Justice has ruled.

            The ruling concerned a dispute between German copyright collecting society Gema and filesharing site Rapidshare. In 2009, Gema sued Rapidshare in Germany, alleging that over 4,800 music files for which it represented the copyright holders were shared via Rapidshare without consent from Gema or the artist..."

              The Cloud Is No Cure-All, But Neither Is Your Data Center
              InfoWorld, September 2nd, 2013
              "Don't let healthy skepticism around the cloud blind you to its core value...

              In an article in Midsize Insider, an IBM-sponsored publication, there is some gentle pushback on the concept of cloud computing: 'For scalability or elasticity, the cloud reigns supreme, but for businesses that have outgrown the need for constantly shifting IT power, it may not always be the most economical option. As Wired points out, once a company can accurately predict its computing needs, buying hardware at a discount often contrasts advantageously with a public cloud solution for reasons of economy'..."

              The Future of the Cloud
              Business 2 Community, September 3rd, 2013
              "There are cool things on the horizon for The Cloud. The Cloud is the clearinghouse for all things you access on your enabled device that isn't saved to that device, a memory stick or disk. It evolves as people and businesses rely more heavily on it, for everything from storage of summer camp photos to intricate predictive software for huge corporations. The Cloud is just... out there. Even if you don't know much about it, you've probably used it to: ..."
                Three Factors will Impact Enterprise Cloud Adoption
                Help Net Security, August 30th, 2013
                "Although the use of cloud services is growing faster than the overall enterprise IT market, it is still a small part of overall IT spending, according to Gartner.

                A recent Gartner survey on the future of IT services found that only 38 percent of all organizations surveyed indicate cloud services use today. However, 80 percent of organizations said that they intend to use cloud services in some form within 12 months, including 55 percent of the organizations not doing so today..."

                The Perfect Security Defense is Right Under Our Noses
                InfoWorld, September 3rd, 2013
                "A multitude of computer security defenses simply don't work. And the one we need doesn't exist.

                The security defense we need is one that basically puts a security expert on each computer. Most of the computer security experts I know have never been infected. For example, I've been practicing computer security since 1987, and I've had my personal computers compromised only three times: once by the Cascade virus in the late 1980s, once by a GDI-related zero-day exploit, and once two or three years ago by unpatched Java. In each case, I knew I was compromised in seconds and was able to avoid any real damage..."

                Enterprise Cloud Adoption Grows Only if IT Pros Don't Fear Job Loss
                SearchCloudProvider, August 29th, 2013
                "More businesses are swapping out their traditional IT infrastructure for cloud services that offer faster deployments, lower upfront costs and reduced maintenance. But enterprise IT professionals panicking about their jobs getting outsourced to cloud service providers are likely to feel threatened.

                The more application- or role-specific IT roles are within an enterprise, the better the chance that cloud services could edge out an IT position, said James Staten, vice president and principal analyst at Cambridge, Mass.-based Forrester Research Inc..."

                IT - CxO
                x
                5 New Workplace Legal Hazards That You Can't Afford to Ignore
                TLNT, August 30th, 2013
                "A rapidly changing legal landscape is making the application, interview and screening processes increasingly complicated - and potentially dangerous for employers, which includes staffing firms and may also include recruiters working on a client search.

                Here are the top five legal hazards in hiring and background screening that turned up during the first half of 2013:..."

                • EEOC guidance and use of criminal records
                • Credit Reporting Act violations for adverse action
                • State and local 'Ban the Box' laws
                • Social media and state laws
                • Credit reports

                Read on for details.

                  CIO Drives Tech-Enabled Golf with Repeatable Processes, Innovation Labs
                  SearchCIO, September 2nd, 2013
                  "On a busy day, anywhere from 2,500 to 3,000 people will stop into a TopGolf venue to have a tee-off, grab a bite to eat and enjoy some music or the big game on TV. And the happiness of every one of those thousands of people in some way depends on CIO Tom LaPlante.

                  TopGolf isn't a run-of-the-mill driving range; it's a tech-enabled competitive golf "entertainment experience." The field of play, so to speak, is like a giant dartboard spread out over 200 yards; 500 unique sensor-equipped targets keep score on each microchipped golf ball by tracking its distance and accuracy..."

                  10 Things You Should Keep to Yourself at the Office
                  TechRepublic, August 30th, 2013
                  "Discretion is the better part of professionalism. Here are a few unwritten rules to keep you from getting in hot water at work...

                  • Drama
                  • Rumors
                  • Jealousy
                  • Libido
                  • Personal life
                  • Confidential information
                  • Plans to quit
                  • Politics and religion
                  • Salary
                  • Social media remarks

                  Read on for details.

                    5 Lessons CIOs And CMOs Should Share
                    Information Week, September 5th, 2013
                    "At first glance, the roles of CIO and CMO could not be more different. But now more than ever, organizations' chief information officers and chief marketing officers must rely on each other to do their jobs more effectively. Here are five lessons CIOs can teach CMOs -- and five more that marketing execs can teach their C-level tech peers..."

                    • No technology is an island
                    • What's measured matters, and what matters is measured
                    • Effective policy is critical
                    • Long-term payoff may trump short-term gains
                    • Flexibility must be balanced with security

                    Read on for details.

                    Five Things to Ask Before You Finally Kick That Employee to the Curb
                    TLNT, August 30th, 2013
                    "Firing an employee is a task that no manager enjoys, but one that often appears inevitable.

                    Yet it's a proven fact that hiring a replacement employee will cost a great deal more than retaining than the one you have, if that individual can be deemed salvageable.

                    That's why it's imperative to have a checklist of questions you ask yourself prior to pulling the trigger on your expensive turnover revolver.

                    Here are five (5) introspective considerations you should make sure to include on your checklist:.."

                    • Were my expectations too high for this employee?
                    • Have they failed due to a lack of skill or a lack of will?
                    • Have I done everything I can to set them up for success?
                    • Could they succeed in another position?
                    • Do I feel threatened by this employee?

                    Read on for details.

                      How To Attract Young Talent: 10 Tips
                      Information Week, September 3rd, 2013
                      "To keep your company competitive, you need to hire bright young talent. And to hire bright young talent, your company has to be competitive -- especially when it comes to technology. When deciding which job offer to accept, millennials place a lot of weight on a company's IT posture. Here are 10 things IT professionals can do to attract Generation Y to the business..."

                      • Provide Anytime/Anywhere Access
                      • Support BYOD Programs
                      • Support BYOA Programs -- Heck, Support BYO Everything
                      • Be Social
                      • Enable Open, Dynamic Collaboration Spaces
                      • Rethink Security
                      • Play the Game
                      • Form a Tight Partnership with the Business
                      • Provide Training and Set Reasonable Guidelines
                      • Keep an Open Mind

                      Read on for details.

                      Six Steps for Dealing with a High-Level Data Breach
                      IT Business Edge, September 2nd, 2013
                      "The Department of Energy was hacked. Again. It is the second time this year that the DOE was the victim of a breach. The breach took place in, and it is believed that the personally identifiable information (PII) of 14,000 present and former employees was potentially compromised...

                      After a breach, DiBello added, an organization should take the time to learn what happened, and leverage the lessons learned to improve their systems. Otherwise, they may leave themselves vulnerable to another, similar attack. So DiBello provided the following tips on how to best manage breaches like this:"

                      • Event declaration
                      • System isolation from the network
                      • capture all volatile information
                      • create forensic image
                      • begin system build
                      • begin forensic analysis
                      • notification/Reporting

                      Read on for details.

                        Three Hiring Takeaways from the Miss America Pageant
                        TLNT, September 3rd, 2013
                        "Since 1921, every year the crown has been perched atop the head of a new Miss America. Despite the many changes in our society since the pageant started, gathering around the television to watch the Miss America pageant has remained a tradition.

                        If you think about it, the format of the pageant sounds familiar.

                        A lot of talented candidates all vying for the same position. The women with the best special talents move onto the next phase of the competition. There are a few interviews; sometimes the candidates get stumped on the answers. And finally a winner is crowned who best represents the Miss America brand...

                        • Look for the best talent
                        • Watch out for buzzwords
                        • Find the perfect fit

                        Read on for details.

                          10 Hard-Earned Lessons of a Lifetime In IT
                          InfoWorld, September 3rd, 2013
                          "Much of today's talk is about youth ruling development and IT. Sure, there are a lot of eager, bright young people in tech, and most of them like to think that they "rule," but the truth is we oldsters still run the show.

                          Why? Because hard-earned lessons provide the wisdom to distinguish fantasy from reality, and the determination to do what's necessary, not just what's fun or cool.

                          As a green programmer, I thought that coding was everything, that people were annoying and clueless, and that all my bosses had my back and would take care of me so I could just focus on the bits and be happy.

                          Boy, was I wrong.

                          Here are 10 things I wish I knew as an IT newbie..."

                          • They're called 'fundamentals' for a reason
                          • Marketing is not evil
                          • Learn the difference between opportunity and distraction
                          • If you don't have a contract, you don't have a job
                          • MBAs know what's best -- for themselves, not for you
                          • Recognize the patterns before they bite you
                          • Relational database normalization will teach you clarity and economy of thought
                          • Get your head out of tech (to be truly inspired)
                          • Let your eyes wander
                          • IT is more about people than you think

                          Read on for details.

                            14 Ways to Take Your IT Career to the Next Level
                            ComputerWorld, September 3rd, 2013
                            "Trying to climb the corporate IT ladder is tough enough, but differentiating yourself from the pack is even tougher. Learn what it takes to build a plan for success and get ahead as an IT pro.

                            • Talk With Your Supervisor and HR
                            • Find a Mentor
                            • Work on an Open Source Project or Volunteer Your Time
                            • Learn More about Your Company's Business
                            • Develop Your Network
                            • Know What You Want
                            • Set Realistic Goals
                            • Chart a Career Path
                            • Assess Your Skills (And Build a Plan to Fill the Gaps)
                            • Take a College Course or Earn a Certification
                            • Look for Additional Ways to Contribute in Your Workplace
                            • Consistently Deliver
                            • Manage Your Time Better
                            • Get Feedback

                            Read on for details.

                            15 Geeky Places to Visit Before You Die
                            IT World, September 4th, 2013
                            "If you like reliving geeky history, you'll want to add visiting these places to your bucket list..."

                            • Marathokampos 831 02, Samos, Greece
                            • Blackheath Avenue Greenwich, Greater London SE10 8XJ, United Kingdom
                            • 367 Addison Ave Palo Alto, California
                            • Sherwood Drive, Bletchley, Milton Keynes MK3 6EB, United Kingdom
                            • 157 West El Camino Real Sunnyvale, California
                            • Lake Geneva, Wisconsin
                            • 6141 Central Ave NE, Albuquerque, New Mexico
                            • 2066 Crist Drive, Los Altos, California
                            • Matmatat-Al-Qadimal Tunisia
                            • 41440 Big Bear Boulevard Big Bear Lake, California
                            • 579 Endicott Street North Laconia, New Hampshire
                            • Route de Meyrin 385 1217 Meyrin, Switzerland
                            • 501 Buckland Road Matamata 3472, New Zealand
                            • 74 Winthrop Street, Cambridge, Massachusetts
                            • Riverside, Iowa

                            Read on for details.

                              The Ten Commandments of Attending Meetings
                              Baseline, September 4th, 2013
                              "From a personal-development perspective, you should consider work meetings as the proving ground equivalent of your schoolyard playground. There are certain do's and don'ts. And, if you're clueless about which is which, then you'll likely make an unfortunate - and lasting -impression. In other words, there's a fine line between right and wrong here..."

                              • Arrive Late
                              • Take Phone Calls
                              • Check eMail
                              • Have Side Conversations
                              • Forget Your Notebook
                              • Talk too Much
                              • Interrupt
                              • Arrive Unprepared
                              • Chase Rabbits
                              • Talk in a Low Voice

                              Read on for details.

                                IT - DR
                                x
                                Fukushima Sends Japanese IT to the Cloud
                                The Register, September 3rd, 2013
                                "The devastating triple whammy of earthquake, tsunami and nuclear meltdown which struck Japan in March 2011, has led many IT managers to rebuild their infrastructure with a key focus on disaster recovery and business continuity, according to experts.

                                It's an effort which has had obvious knock-on benefits for cloud computing, virtualisation and mobile vendors touting their wares in the land of the rising sun but also teaches some important lessons about IT best practice..."

                                IT - Networks
                                x
                                IPv6 to Complicate Threat-Intelligence Landscape
                                Network World, August 26th, 2013
                                "I loved my v6 wave diagram. It made perfect analytic sense to me; anyone could see this is how the market would adopt IPv6. The crest of the wave starts over the Investigation phase of IPv6 and then over time flows over Research, Trial and then Deployment - the sequential stages of IPv6 adoption. I held tightly to this diagram for as long as I could but Serge hated it. As we were walking out of our third pitch meeting of the day on Sand Hill Road he turned toward me and ordered that I remove it from the deck. 'Too complicated for VCs to understand,' he said..."
                                Five Tips for Managing Enterprise Connection Points
                                IT Business Edge, September 2nd, 2013
                                "A huge shift is taking place in the complexity and composition of today's enterprise communications. What was once fairly straightforward - fixed phone and data connections - has evolved to include large data pipes, a plethora of mobile connections, laptops, smartphones, tablets, machines, telematics, cloud servicesÂ…and more. Each of these 'connection points' has helped enterprises interact more effectively - with customers, users, and other devices - but has also added to the complexity of an already intricate infrastructure. Increased end-user adoption and improvements in productivity might increase, but so do the levels of risk and responsibility..."

                                • Fixed connections
                                • Mobile computing
                                • Machine-to-machine (M2M)
                                • Cloud
                                • IT

                                Read on for details.

                                Upgrading the Network? Don't Forget the Network Security Tools
                                SearchNetworking, August 29th, 2013
                                "It's no surprise that emerging networking technologies are fueling the need for higher-speed connections. But as the network is upgraded, network security tools must become more advanced, too.

                                Enterprise networking has grown convoluted as new kinds of network traffic -- such as video and big data -- begin to travel through organizations' networks. At the same time, developing trends, like software-defined networking (SDN), are demanding enterprises refresh every moving part of their IT infrastructure, according to a recent survey of enterprise IT buyers from Campbell, Calif.-based Infonetics Research Inc..."

                                OSPFv3 for IPv4 and IPv6
                                Network World, September 2nd, 2013
                                "Many enterprises use OSPF version 2 for their internal IPv4 routing protocol. OSPF has gone through changes over the years and the protocol has been adapted to work with IPv6. As organizations start to contemplate how they will deploy IPv6 at their Internet perimeters and within their enterprise networks they should be aware of OSPF version 3 and how it differs from what they are familiar with. This article reviews the differences between OSPF version 2 and OSPF version 3 and how they can be configured to work with IPv4, IPv6 and both protocols..."
                                IT - Operations
                                x
                                Torched 30 Pound Server Switch Costs Phone Firm Millions in Lost Sales
                                The Register, September 3rd, 2013
                                "At the BCS CMSG conference in London earlier this year, Unisys CM manager Michel Delran spoke about how to design and implement a successful configuration management process and how a configuration management database can save you millions.

                                He began with the real-life cautionary tale of a phone company which lost millions as a result of paying too little attention to configuration management.

                                Just before Christmas one year there was a fire in one of the phone company's smaller data centres. Initially no one thought it important but this small fire resulted in an £8m loss of sales as the data centre contained the one server that was responsible for processing company's Chip and PIN information on credit card purchases across Europe..."

                                IT - Security
                                x
                                Dude, Where's My Security ROI?
                                CSO Online, September 3rd, 2013
                                "When it comes to security, ROI or return on investment has historically been difficult to measure. It's a bit like that bar receipt from Las Vegas that you don't want to bring up around management because it's hard to defend..."
                                Five Ways to Get the Most Out of Your Sandbox
                                Help Net Security, August 30th, 2013
                                "There's been a lot of talk lately about the value of sandbox technology as part of a cybersecurity defense. While sandboxes are a valuable tool in the hands of a cybersecurity team to identify and analyze malware and other sophisticated threats, the actual value depends on how well you know how to use it.

                                To help CISOs and other cybersecurity executives, here are five ways to help you get more out of your sandbox, as detailed by ThreatTrack Security's Anthony Arrington..."

                                • Identify all the applications in your stack
                                • Replicate the real-world environment
                                • Isolate your network
                                • Eliminate false positives
                                • Utilize a multiple-sandbox environment

                                Read on for details.

                                Is It Time to Start Hacking the Hackers?
                                Network World, August 29th, 2013
                                "In the light of unprecedented attacks by cybercriminals against businesses that span every industry, this question has come to the fore: Is it time to fight back?

                                As the Founder and CEO of Wisegate, a private, expert peer group for senior-level IT executives, I get to work with some of IT's best and brightest security professionals and have a ringside seat to the discussions that unfold.

                                Wisegate member Jeff Bardin, Chief Intel Officer at Treadstone 71, says 'hacker groups and disruption of business has reached an all-time high and no longer can be ignored. We want to get the 'adversary' to understand that if they launch an attack against a company, there will be costs to pay.'..."

                                Login and Password Troubles Revealed
                                Help Net Security, September 3rd, 2013
                                "Increasingly lengthy and complex log-in processes and web forms are driving consumers away from websites, according to Ping Identity.

                                The study revealed that an overwhelming 80% of consumers had locked themselves out of websites because they couldn't remember their log-in details.

                                This is hardly surprising as nearly a quarter (24%) of respondents had log-ins for up to five websites, while an equal number juggled six to ten websites and almost a third (30%) face the logistical feat of remembering log-ins for between 11 and 20 websites. As a result of this 'password amnesia', nearly 50% of consumers have had to re-set a password, with over a fifth (21%) having to do so on a regular basis..."

                                  Study Shows People Are Still Intrigued by Spam Subject Lines
                                  IT Business Edge, August 29th, 2013
                                  "One of my favorite episodes of Friends shows Chandler checking his email on Ross's laptop. Suddenly, Chandler's face goes blank and he begins pounding his fingers on random keys, muttering, 'Oh no, oh no.' He admitted to opening an email from someone he didn't know because it promised naked pictures of Anna Kournikova. If you are over the age of 20, you may remember that the Anna Kournikova virus, spread via an email encouraging the recipient to check out the pictures of the beautiful tennis star..."
                                    Talking Threats with Senior Management
                                    Dark Reading, August 29th, 2013
                                    "Have you ever walked into your office after a nice, relaxing weekend to find an article ripped out of an airline magazine sitting on your chair? You know, the article that talks about small-business fraud and how it's now an epidemic. A few vendors are quoted in there fanning the flames of FUD, talking about how vulnerable business are, and an analyst or two appear in their Chicken Little suits. Yeah, that's a lot of fun -- but it gets better. Then you read the sticky note on it that says: 'Hey, saw this on my flight. What are we doing about this? Let's talk. Signed, CEO'..."
                                      The Future of IPS
                                      Dark Reading, September 4th, 2013
                                      Lauded long ago as a miracle pill for security operations, intrusion prevention systems (IPS) have been there and back again along the hype cycle curve. Now, as next-generation IPS (NGIPS) products are being put through their paces in real-world IT environments, the question is whether IPS will maintain its relevance in the enterprise or fade away as organizations put less emphasis on perimeter security and look to bundle similar feature in unified threat management and next-generation firewall deployments.
                                      The Most Recent Password Security Compliance Guidelines
                                      Business 2 Community, August 30th, 2013
                                      "One of the most common reasons business owners and IT managers ask me for help shoring up their organizations' password procedures is because of the confusing and often-changing requirements of the industry and government regulations to which their organizations must comply. It makes sense they would want to make sure their password policies are 100 percent in line with their compliance obligations. Running afoul of industry or government regulations is one of the more costly and embarrassing things that could happen to a business. When this happens, losses come in the form of fines and legal fees, as well as bad publicity and loss of customer confidence..."
                                        Time to Bridge the Gap between Identity and Security
                                        Network World, August 29th, 2013
                                        "Lots of security vendors play in the identity space. IBM is a leader in both areas while McAfee, RSA Security, and Symantec have acquired identity technologies over the past few years.

                                        These vendors present a compelling vision of tighter alignment between identity and security that is sometimes referred to as 'contextual security.' By unifying identity, network security, device identity, and data security, CISOs can create and enforce granular access policies that focus on what's most important: sensitive data, profitable transactions, and valuable IT assets..."

                                        IT - Virtualization
                                        x
                                        Right-Size Up
                                        IT Web, September 4th, 2013
                                        "In the first Industry Insight in this four-part series on how to make the most of a company's virtual environment, I looked at the problem of virtual machine (VM) sprawl: how proliferating zombie VMs can tie up resources and cancel the benefits of virtualising in the first place. In this Industry Insight, I consider another problem that undermines the business case for virtualising: misallocation and over-allocation of system resources..."
                                          Storage
                                          x
                                          Oracle's Next-Generation Application Engineered Storage
                                          Live Webcast September 10, 2013 10am PDT/1pm EDT
                                          Join Oracle storage executives as we introduce Oracle's next-generation Application Engineered Storage solutions, the only storage co-engineered to work with Oracle Database and Oracle Applications. Get ready to meet our newest storage products that can help your enterprise increase application performance, while reducing sprawl and complexity.

                                          Attend the Webcast to learn about how Oracle's Application Engineered Storage:

                                          • Delivers breakthrough efficiency and performance
                                          • Achieves unmatched advantages for Oracle applications through deep co-engineering of Oracle Storage with Oracle software
                                          • Benefits high-performance NAS, Business Intelligence/Data Warehouse, video streaming and virtualized server environments

                                          Register for this launch Webcast.

                                          IT - Database
                                          x
                                          The Man Who Tortures Databases
                                          Information Week, September 5th, 2013
                                          "Have doubts about NoSQL consistency? Meet Kyle Kingsbury's Call Me Maybe project. Here's the number...

                                          It's an exciting time in the database world. We're casting aside the relational database management system shackles for NoSQL (and "NewSQL," but I'll just use NoSQL as a term for both) systems that let us achieve better availability and scalability by relaxing data consistency requirements. That is, NoSQL systems are built to scale horizontally -- so you can run lots and lots of different servers, minimizing the impact of any of them going down -- and to handle the complexities that arise when you spread data across lots of servers..."

                                          IT - Backup
                                          x
                                          61 Percent of Users Lost Data Due to Malware, Says Study by Kaspersky
                                          Information Week, September 3rd, 2013
                                          "When malware strikes, the impact on data can be disastrous. And to make matters worse, there's no guarantee of getting that valuable information back. Only 39 percent were able to retrieve all the data they lost in a malware attack, according to a summer 2013 survey by B2B International and Kaspersky Lab. 61 percent lost at least some of their information forever..."
                                            OpenStorage
                                            x
                                            OpenStorage Summit to be Held With Open Server Summit
                                            October 22-24
                                            Open Server Summit, a leading Silicon Valley conference for the server industry, announces that this year's meeting will join forces with the OpenStorage Summit presented by Nexenta. The combined Summits will be held at the Santa Clara Convention Center from October 22-24, 2013.

                                            The expanded format will offer attendees exposure to both tracks of Summit content, expanding the breadth of the Open Architecture in the Server Industry to include for the first time in-depth insight into OpenStorage. Dr. Lance Levanthal, Open Server Summit Chairperson, said, "The joint event further cements our dedication to serve the needs of a global audience focused on open design initiatives in the server industry."

                                            IT - Mobile
                                            x
                                            Mobile Devices Burying Banks in Data
                                            Information Management, September 3rd, 2013
                                            "Banks have long struggled to make sense of the reams of customer data they collect across product lines. The rise of mobile banking is making this task even harder.

                                            The industry now has a litany of new data points to process. How many customers interact with their bank via the web browser on the mobile devices compared to those who use an app? How frequently do customers log into a bank account through their smartphones? How much time do they spend there? Are consumers completing the tasks they set out to do on their mobile phones or tablets, or are they giving up in frustration?..."

                                              Six Data Loss Prevention Strategies for Mobile Environments
                                              SearchConsumerization, August 30th, 2013
                                              "Despite concerns over data loss, security experts and consultants say that not all companies are savvy when it comes to company risks concerning information loss.

                                              The way companies set policies and governance around bring your own device (BYOD) use, the cloud, data sharing and other issues is critical to avoiding the loss of data and thousands -- or possibly millions -- of dollars.

                                              Companies must establish data loss prevention strategies to protect their business. It's not enough for them to implement disaster recovery practices alone; they need to take proactive steps..."

                                              5 Things You Need to Know About Geofencing
                                              CIO, August 28th, 2013
                                              "Here's what you need to know about this location-based mobile service that lets marketers send messages to your smartphone when you enter a defined geographic area, such as a shopping mall.

                                              • It can engage local shoppers
                                              • Deals can be hyper-local
                                              • It leverages your location
                                              • It adds depth to analytics
                                              • You need more rewards

                                              Read on for details.

                                              Are MDM Tools as Secure as You Think?
                                              SearchConsumerization, September 2nd, 2013
                                              "IT managers turn to mobile device management to protect corporate assets, but MDM tools might not provide the protection that IT pros are counting on.

                                              Mobile device management (MDM) software helps reduce some of the risks associated with mobile devices in the enterprise, such as corporate data leaks and mobile malware infecting the network. But relying on MDM tools alone to secure smartphones and tablets is like assuming a house with a smoke alarm can't catch fire..."

                                              Five Myths about Mobile Security and their Realities
                                              CSO Online, September 4th, 2013
                                              "Earlier this summer, Aaron Rhodes of Neohapsis talked to CSO about five things to consider when developing mobile security policies. Today, moving that discussion forward, Pankaj Gupta of Amtel talks to us about five myths in mobile security.

                                              In business both large and small, mobile devices are being used to access mission-critical data that must be protected. As mentioned in our previous article, mobile is the new endpoint when it comes to security..."

                                              If You Think Phones, Tablets, and Computers are Smart Now, Just Wait
                                              InfoWorld, August 30th, 2013
                                              "We spend our lives doing things. It doesn't matter whether we're at work or home. We've quickly moved to mobile devices to help make our lives (ostensibly) easier and more productive. Not that we've really succeeded: We've just changed the use case.

                                              You used to listen to the radio when you were driving; if you got bored, you'd put in a tape or CD. Now you make a phone call and conduct business, or maybe it's a chance to keep in touch with Mom. You used to sit down and do your homework and maybe have some music on; now you still have your music, but Instagram, Twitter, Pinterest, and Facebook continuously ping in the background. What started out as a productivity tool very quickly becomes a device of distraction..."

                                              IT - Big Data
                                              x
                                              3 Lessons CMOs Take Away From IT's Flawed Approach to Big Data
                                              It's Not the Data You Have, It's What You do with It
                                              "Just how that relationship will shake out depends on how CIOs approach the problem of big data and business intelligence (BI). Jennifer Zeszut, former CEO and co-founder of innovative social media monitoring specialist Scout Labs (acquired by Lithium Technologies in 2010), and current CEO and co-founder of Beckon, a software-as-a-service (SaaS) offering for gaining insight from marketing data, says most IT departments have a flawed approach to big data and BI that forces smart CMOs to seek alternatives..."
                                              Predictive Analytics Shine a Light on the Future
                                              CITEworld, August 29th, 2013
                                              "The rarified world of predictive analytics is becoming more mainstream as the types of companies using it and the variety of tools available grows.

                                              Predictive analytics encompasses a variety of disciplines such as statistics, mathematical modeling, machine learning, and data mining to help companies answer the age-old question "what's going to happen?"

                                              The growth of predictive analytics is being driven by big data and new sources of consumer information such as web activity, e-mail, social and mobile media data. Rather than just looking at past performance, predictive models seek out esoteric data patterns and perform calculations during live transactions..."

                                              IT - BYOD
                                              x
                                              BYOD Security Challenges are Old Mortarboard for Universities
                                              CSO Online, August 30th, 2013
                                              "Businesses coping with security issues stemming from employee use of personal devices for company work are only experiencing what universities have grappled with for years.

                                              "Many of us in higher ed find it very funny when we see how BYOD has dominated so much of the security press lately," Mike Corn, chief privacy and security officer at the University of Illinois (UI) at Urbana-Champaign, said in an interview. "We view that with amusement because Bring Your Own Device has defined our environment almost since the beginning of personal computing."

                                              The magnitude of BYOD at a university the size of UI would likely give a corporate security administrator fits. Not only is there a large annual turnover rate -- some 10,000 new students arrive on campus each year -- but each has an average of 3.5 personal devices in tow..."

                                              BYOT: Where Does It Fit Into Future IT Trends? Readers Sound Off
                                              SearchCIO, August 26th, 2013
                                              "In a SearchCIO tweet jam recap, participants suggested current trends toward bring your own technology would continue to offer unique opportunities for enterprise IT departments, but also raise new management headaches. Their predictions shed some light on future IT trends, and we followed up by polling our readers, "Are BYOD policies a major concern for CIOs or a fizzling priority?"

                                              Our poll responses echoed the Twitter feedback, highlighting overwhelming support for bring-your-own-technology (BYOT) policy management..."

                                              You Thought BYOD was a Thorny Problem? BYO-PC will be Even Harder
                                              CITEworld, September 3rd, 2013
                                              "The BYOD trend began with mobile devices like smartphones and tablets, and in most organizations these are the only types of devices included in a BYOD program. A range of recent announcement and trends, however, have begun to shine a spotlight on the on the idea of extending BYOD to include BYO-PC and BYO-Mac options..."
                                              Top10
                                              x
                                              Top Ten Articles for last few Issues
                                              Vol 186 Issues 1, 2,3 and 4; Vol 185 Issues 2, 3, 4 and 5
                                              We track how frequently each article is viewed on the web site to determine which the readers consider the most important. For last week, the top 10 articles were:

                                              • SPARC M6 processor unveiled at the Hot Chips conference
                                              • Top 10 signs your CIO isn't ready for the modern web
                                              • SPARC M5 Domaining Best Practices Whitepaper
                                              • Cross-CPU migration in LDoms 3.1
                                              • New reasons why Oracle VM is best for Oracle Databases
                                              • Upgrading to Oracle VM Server for SPARC 3.1 using Solaris 11.1
                                              • Java Spotlight Episode 143: Arun Gupta on the Java EE 7 Essentials Book @arungupta
                                              • Sysadmin and Systems Developer Newsletter
                                              • Oracle Unveils Latest Engineered System for Enterprise Virtualization
                                              • LibreOffice 4.1.1

                                              The longer version of this article has list of top ten articles for the last 8 weeks.

                                                IT - Server
                                                x
                                                Software Patches Eat Government IT's Lunch
                                                Information Week, September 3rd, 2013
                                                "Netscape co-founder and prominent tech investor Marc Andreessen famously noted that "software is eating the world." Unfortunately, it's also eating the lunch of most enterprises, including federal agencies.

                                                For all the talk about wasteful government IT spending, little is said about the costs agencies pay to patch buggy software, a consequence of the industry's predisposition to release their wares now and fix them later. For Robert Jack, CIO of the U.S. Marine Corps, those costs aren't incidental..."

                                                Sysadmin
                                                x
                                                Administering Solaris Zones
                                                An excerpt from Chapter 17 of Oracle Solaris 11 System Administration Exam Guide
                                                This is an excerpt from Chapter 17, "Administering Solaris Zones," of Oracle Solaris 11 System Administration Exam Guide by Michael Ernest (McGraw-Hill Professional; 2013) with permission from McGraw-Hill. Download a PDF of the full chapter. Also, read a Q&A with the author.

                                                "You are about to learn how to create and configure a Solaris Zone, observe it in its various states of being, and manage it as it runs on your system. For those of you who need to get on with learning about other virtualization techniques available on Solaris and other operating systems, learning how zones work will give you a solid conceptual foundation for those subjects.

                                                You've been learning about zones already -- or at least the key parts that make up one. For example, you've learned to configure projects, an abstraction for treating a group of processes as a workload. You've learned how to set limits with process, task, and project resource controls, and you've learned about global resource controls such as memory caps, process scheduling, and CPU provisioning. You can create a new ZFS file system with its own property controls for any occasion you deem fit. And you know that you can now create virtual NICs whenever you need a new logical network resource..."

                                                NetBeans
                                                x
                                                NetBeans Podcast 66
                                                Podcast Guests: Shai Almog (CodeName One), Attila Kelemen (Gradle), Toni Epple (Eppleton), John Yeary (GreenJUG)
                                                NetBeans Community News with Geertjan and Tinu

                                                • Import Eclipse XML formatting files into NetBeans with the new Eclipse Formatter Plugin
                                                • Take the NetBeans IDE 7.3 Satisfaction Survey
                                                • Browse the list of NetBeans related sessions at JavaOne 2013
                                                • Who's Who: NetBeans Community Speakers at JavaOne 2013
                                                • Geertjan's sessions at JavaOne
                                                • Tinu's sessions at JavaOne

                                                DON'T MISS IT! NetBeans Community Day at JavaOne 2013 - September 22

                                                Trending in
                                                Vol 233, Issue 3
                                                Trending IT Articles