News about Oracle's Solaris and Sun Hardware
System News
Sep 9th, 2013 — Sep 15th, 2013 Generate the Custom HTML Email for this Issue
System News System News for Sun Users
Volume 187, Issue 2 << Previous Issue | Next Issue >>
Sections in this issue:
click to jump to section

Oracle ZS3 Storage Appliances: Tier-1 Performance at Tier-3 Prices
A Wikibon Report
"On September 10, 2013 Oracle announced a major upgrade to its storage appliances by introducing the ZS3-2 and ZS3-4 products. Table 1 shows the summary data highlighting the major attributes of the systems. Wikibon has written in depth about the Oracle Storage Appliance, and concludes that the ZFS appliance is a true "flash-first" hybrid, allowing high continuous read and write rates with sustained low latency. Oracle continues to add functionality to this platform and as a result is expanding its use cases. Specifically, "sweet spot" applications for the solution span a widening spectrum suitable for high performance streaming workloads such as database backups, latency-sensitive data warehouse loading, use as an analytics file system and as a high-performance filer..."
If Virtualization Is Free, It Can't Be Any Good - Right?
A Consolidation Case Study on Oracle SuperCluster

by Thierry Manfé, with contributions from Orgad Kimchi, Maria Frendberg, and Mike Gerdts

Best practices and hands-on instructions for using Oracle Solaris Zones to consolidate existing physical servers and their applications onto Oracle SuperCluster using the P2V migration process, including a step-by-step example of how to consolidate an Oracle Solaris 8 server running Oracle Database 10g...

This article provides guidance, best practices, and hands-on instructions for using Oracle Solaris Zones to consolidate existing servers onto SuperCluster. It focuses on the operating system and virtualization layers, on the P2V migration process, and on the associated tools for facilitating this migration.

This article is intended to help system administrators, architects, and project managers who have some understanding of SuperCluster and want to familiarize themselves with P2V migration and evaluate the possibility of conducting such a transition.

IT - Storage
Government Agencies Need to Scale Data Storage, But Up or Out?
ComputerWorld, September 9th, 2013
"As government agencies sit at roughly the midway point in their march to meeting the Federal Data Center Consolidation Initiative (FDCCI) target to consolidate at least 1,200 data centers by 2015, there is evidence of tangible results and a recognition that significant challenges lie ahead.

A recent MeriTalk report, 'The FDCCI Big Squeeze,' finds that 60 percent of government IT managers are experiencing better use of IT staff as a result of the consolidating data centers, 57 percent are seeing reduced energy consumption and 47 percent indicate increased usage of more efficient computing platforms..."

    SSDs Do Die, as Linus Torvalds Just Discovered
    ComputerWorld, September 12th, 2013
    "Linus Torvalds found out the hard way that solid-state drives (SSDs) aren't invincible -- and when they do fail, they can die without warning and at inconvenient times...

    While SSDs are vastly better performers than hard disk drives and are considered more reliable for mobile devices because they have no mechanical parts to break, they do have a limited lifespan. With some early SSDs, that lifespan ended up being less than a year, depending on the quality and use of the drive..."

      When Will We See Higher Capacity Hard Disk Drives?
      Forbes, September 7th, 2012
      "It has been more than two years since there was an increase in the areal density of HDDs. The areal density is the average amount of data that can be stored in a unit of surface area on the disk. The growth in areal density corresponds to the total storage capacity the HDD can provide for a fixed number of heads and disks. This is the longest period of time since 2000 that there has not been a significant increase in shipping product areal density..."
        14 Things You Need to Know About Data Storage Management
        CIO, September 9th, 2013
        "If you think backing up files and software to a storage device or to the cloud will automatically preserve and protect them (and your organization), think again. Data storage and management experts discuss what steps you need to take to properly manage and store data -- and why just backing up data is not enough..."

        • Know your data
        • Don't neglect unstructured data
        • Understand your compliance needs
        • Establish a data retention policy
        • Look for a solution that fits your data, not the other way around
        • Don't let upfront costs dictate your decision
        • Use a tiered storage approach
        • Know your clouds

        Read on for more details.

        Storage Considerations for a Big Data Infrastructure
        SearchStorage, September 9th, 2012
        "According to Jon Toigo, CEO and managing principal of Toigo Partners International and chairman of the Data Management Institute, big data analytics once referred to the process of mining large amounts of data to find specific pieces of information, but the term big data is now commonly used in a broader sense to describe large volumes of growing data.

        Toigo believes object storage is one of the best ways to achieve a successful big data infrastructure because of the level of granularity it allows when managing storage. He even sees it as the "future of storage." But when determining how to store big data, he said, administrators must first consider what the big data is being used for; for example, capacity demand might be more important to one big data infrastructure than privacy is to another.

        In this podcast with associate site editor Sarah Wilson, Toigo shares his thoughts on what big data is, the best ways to store it and some of the problems storage administrators of big data infrastructures might come across. Listen to the podcast or read the transcript below."

        The Nand Flash Cache SSD Cash Dance
        InfoStor, September 9th, 2013
        "Yes, the title for this piece is a play on words. Yet it also reflects the activity in the data storage industry today, particular pertaining to nand flash Solid State Devices (SSD).

        For those who need a quick refresher, nand flash is a persistent form of memory, which means that when you remove power, your data stays intact as it would on a hard disk drive (HDD). This differs from dynamic random access memory (DRAM), in that when power is removed, if your data is not saved to disk (e.g. HDD) or other persistent storage (e.g. nand flash SSD), it will disappear..."

        Java Technology
        Java Spotlight Episode 144: Danny Coward on his Java WebSocket Programming Book
        Weekly Podcast
        This week's interview is with Danny Coward. Danny is a software architect for the Java Platform and has contributed to all editions of the platform from mobile to enterprise and JavaFX. His new book Java WebSocket Programming is available on Amazon and your local bookstore.
        Cloud Computing
        Podcast of Oracle Cloud Computing experts
        From OTN ArchBeat
        The latest OTN ArchBeat Podcast program is a three-part series recorded during a question and answer session at the OTN Architect Day event held at Oracle Headquarters in Redwood Shores California on July 9, 2013. Earlier in the day the audience attended three presentations given by Oracle Cloud Computing experts Dr. James Baty, Anbu Krishnaswamy, and Markus Michalewicz. After those presentations the Q & A session gave the audience a chance to pick the brains of those experts.

        In order to provide some context to the Q&A,take a moment to review the slide presentations from the event, listed below:

        • 21st Century IT | Dr. James Baty
        • Oracle Cloud: A Case Study in Building a Cloud | Anbu Krishnaswamy
        • Case Study: Database as a Service | Markus Michalewicz

        As you'll hear, the first couple of questions refer to Markus's presentation, which covered the DBaaS implementation at the Commonwealth Bank of Australia. When Markus mentions "CBA," he's talking about Commonwealth Bank of Australia.

        IT - Cloud
        17 Things You Should Go Ahead and Cloud
        InfoWorld, September 12th, 2013
        "Some companies are already sky high in cloudy goodness, while others are still procrastinating. The following items should rise to the top of your cloud priority list..."

        • Backups
        • Faxes
        • Training videos
        • CRM
        • Filesharing
        • Revision control
        • Issue tracking/project management
        • HR management:
        • Identity
        • Database
        • Application servers
        • Telecommunications
        • Office suites
        • Load testing
        • Continuous integration
        • Wiki
        • CMS/website

        Read on for details.

        How to Close the Cloud Chasm between Executives and IT
        Network World, September 11th, 2013
        "Cloud computing discussions abound these days, but there is a growing gap between executives and IT when it comes to assessing cloud's potential.

        Based on our experience working with enterprise and mid-size organizations on a variety of cloud models, we take a look at cloud thinking from both sides of the table. We also offer a few pointers on how best to close this divide and focus the organization on the ultimate prize: a successful cloud deployment that reaps healthy returns for the company and its employees at every level of the organization..."

        The History of Cloud Computing and What's Coming Next: A CIO Guide
        SearchCIO, September 9th, 2013
        "The fundamental concept of cloud computing originated in the 1950s, when corporations and learning institutes prioritized the efficiency of their large-scale mainframe computers, allowing multiple users both physical access to the computer from multiple terminals as well as shared central processing unit time. But it really wasn't until the past decade or so that cloud computing really started to develop into the behemoth we know today.

        After the dot-com bubble burst in the early 2000s, companies such as e-tail giant Inc. played a key role in the development of cloud computing. The present availability of high-capacity networks and low-cost computers, together with the widespread adoption of virtualization and service-oriented architecture, have led to the version of cloud computing we know today -- and a model that is constantly evolving..."

        IT - CxO
        A CIO Guide: The History of Cloud Computing and What's Coming Next
        SearchCIO, September 9th, 2013
        "The fundamental concept of cloud computing originated in the 1950s, when corporations and learning institutes prioritized the efficiency of their large-scale mainframe computers, allowing multiple users both physical access to the computer from multiple terminals as well as shared central processing unit time. But it really wasn't until the past decade or so that cloud computing really started to develop into the behemoth we know today..."
        20 Great Ideas to Steal in 2013
        Information Week, September 9th, 2013
        "This year's InformationWeek 500 winners shared inspiring stories of how technology improved customer service and employee productivity. We've picked the 20 best tales of innovation worth borrowing. (Some might call it stealing.)

        Two common themes this year are the use of Web-based collaboration tools and mobile apps that take up arms against bloated software and workflow complexity. Home Depot, for example, launched MyInstall, a personalized Web portal designed to help customers keep close tabs on each phase of a home improvement project. Public relations firm Ketchum built IdeaShop, a searchable database containing great ideas that were never sold to clients but are still ripe for use..."

          Ignore Customers at Your Own Risk
          CIO Insight, September 9th, 2013
          "Over the last few years, the news media has delivered a seemingly endless stream of stories describing how consumers resolved nettlesome problems using Twitter. Horrible hotel stay. Tweet. Bad customer support at the cable company. Tweet. Bogus bank fee? Tweet.

          In many cases, these tweets lead to positive results. But anecdotal evidence aside, most companies do an abysmal job at monitoring tweets - as well as other types of customer complaints. According to a study conducted by Maritz Research and evolve24, a whopping 71% of companies systematically ignore publicly viewable posts about their products and services..."

          What Every Leader Should be Asking Their Team
          TLNT, September 6th, 2013
          "When I work with general managers to help them get their organizations executing better, the first thing I do is talk to their team.

          First, I talk to all their direct reports. Then, I also have some one-on-ones or focus groups with their mid-level managers and their employees.

          What happens much of the time: The general manager is surprised to find out what I am hearing.

          Don't let this happen to you!

          Because I'm listening to their team's ideas, experiences, feedback, and concerns, I'm figuring out what all the big, real issues are - issues with the organization, with the business, (and sometimes with the general manager).

          Talk to everybody! Learn what is really happening..."

            Straight A's for Determining Risk and Avoiding the Big F
            IT Business Edge, September 9th, 2013
            "Have you ever joined a conversation and taken what is said completely out of context because you simply didn't have the background information? It's an easy mistake to make and can be both frustrating and humorous at times.

            Adding context to a data security situation is just as important as it's essential to ensure that you can connect the dots and fully understand if something is at risk. When it comes to the loss or mishandling of unstructured data, all it takes is one strike and you're out. Here are five ways for determining risk and protecting against threats, identified by Dell Software..."

            • Authentication
            • Authorization
            • Administration
            • Audit
            • Access

            Read on for details.

            Beware the Faux Innovators
            Information Week, September 9th, 2013
            "Innovation is the lifeblood of modern business and the defining characteristic of InformationWeek 500 companies. To these companies, innovation isn't just a buzzword. Their creative, even pioneering, technology initiatives are producing clear business results, which we chronicle in this special IW 500 digital issue.

            Elsewhere, however, the word innovation has become "so broadly defined that it has lost all meaning," writes InformationWeek contributor Coverlet Meshing. "The innovation industrial complex produces fast food -- innovation in a can, with loads of salt, sugar and fat."

              Conquering IT's Three Monsters
              Information Week, September 9th, 2013
              "Philosopher Alan Watts said, "Myth is an image in terms of which we try to make sense of the world." Perhaps a myth is a fitting way to make sense of a CIO's world. The world of the CIO is a series of battles, challenges, and encounters with villains like those faced, conquered, and slain by ancient heroes. But the modern-day CIO hero who understands these monsters can overcome the formidable challenges and live to face another day. Here are three mythological monsters that represent modern-day challenges and the strategies CIOs can use to conquer them..."
              Four Courageous Conversations for Every IT Leader
              CIO Insight, September 5th, 2013
              "Over the last month, a single word has repeatedly risen in my consciousness. I started the month delivering the opening keynote at the LEADit conference in Canberra, Australia. I returned home and immediately left for the Pink Elephant Leadership Forum in Scottsdale, Ariz., where I delivered a morning keynote. As I spoke and then talked with people afterward, I found myself repeating the same word again and again: courage..."
                IT - Networks
                5 Signs of Trouble in Your Network
                Dark Reading, September 6th, 2013
                "Whether to improve performance, gather business intelligence, or detect security threats, log management boils down to three steps: Collect the logs, store the data, and analyze the data to identify patterns. Yet, while the collection and analysis of log data is one of 20 critical security controls identified by the SANS Institute, most companies do not regularly collect and analyze their logs unless required by regulations..."

                • User access anomalies
                • Patterns that match threat indicators
                • Configuration changes outside the "window"
                • Strange database transactions
                • New device-user combinations

                Read on for details.

                How to Protect Your Wi-Fi Network from Snoopers...Including Google
                IT World, September 11th, 2013
                "A lawsuit against Google for snooping on Wi-Fi networks is moving forward, and it should raise this question for you: Just how safe is your own network against snoopers? If you've got a small wireless network you use for business or home, here's how you can protect yourself against break-ins and snoopers.

                The suit against Google concerns the data collection Google did for Street View, in which it not only photographed streets and houses, but also snatched passwords, e-mail, and other personal information from home Wi-Fi networks. (Google no longer does that.) Here are some simple steps you can take, and tools to use, to help protect your work or home wireless network -- and that would have protected you against Google's WiFi snooping..."

                Nope, Mesh Networks Won't Stop the NSA
                Network World, September 10th, 2013
                "On American Public Media's Marketplace program this morning I heard the host, Ben Johnson, interview Molly Wood, executive editor at CNET. Ms. Wood argued that "encryption of data does, at least, slow down the NSA."

                The error in this statement is that the content of data exchanges across the Internet, while interesting to the NSA, is not as important to signals intelligence as the who, where, and when of communications. What those of us who understand the implications of NSA surveillance are concerned about is the potential for profiling us through metadata and the idea that encryption slows the NSA down in any meaningful way is simply wrong..."

                IT - Operations
                6 Steps for Setting up a Small Business Server Room
                CIO, September 9th, 2013
                "Are you worried about relying on a third-party online service provider to store your business data in light of NSA spying revelations? Learn how to set up your own server room for an on-premises deployment instead..."

                • Rack-Mount Equipment Makes Sense
                • There's a Server Rack for All Seasons
                • Isolate Servers to Reduce Noise
                • Beat the Heat and Get an AC Unit (or Two)
                • Managing Wires Isn't Glamorous, But It's Necessary
                • Label Everything - and Keep It Simple

                Read on for details.

                  Eight Is Enough! IT's Biggest Frenemies
                  IT World, September 10th, 2013
                  "These are people you deal with on a regular basis, largely because you have no choice. But even when their intentions are good, they can still cause you all manner of grief. They range from,1#frenemy2, who insists on using her iPhone at work (but wants you to support it) to Cloudy Claudette, who's running her own shadow IT organization with the help of public cloud providers..."
                  How Important is Penetration Testing?
                  Help Net Security, September 9th, 2013
                  "With cyber attacks becoming the norm, it is more important than ever before to undertake regular vulnerability scans and penetration testing to identify vulnerabilities and ensure on a regular basis that the cyber controls are working.

                  Geraint Williams, Senior Consultant at IT Governance, explains: 'Vulnerability scanning examines the exposed assets (network, server, applications) for vulnerabilities - the down side of a vulnerability scan is that false positives are frequently reported. False positives may be a sign that an existing control is not fully effective, i.e. sanitizing of application input and output, especially on web applications.'..."

                    Technical Debt & Vendor Lock-In
                    Business 2 Community, September 8th, 2013
                    "Vendor lock-in is either a key technology problem or an overhyped marketing missile depending on the point of view. I think there's a definition problem at the heart of the agita over in the issue. John Dewey remarked, 'A problem well put is half-solved,' so I aim to reframe the question while trying to avoid bikeshedding. The heart of vendor lock-in is the obscene nature of the problem, by which I mean 'I know it when I see it' a la Potter Stewart's famous opinion on obscenity laws. You can almost hear the start of a Jeff Foxworthy routine..."
                      IT - Security
                      Data-Classification Levels for Compliance: Why Simple is Best
                      SearchSecurity, September 9th, 2013
                      "We're interested in implementing a data-classification program to lower our compliance costs. We'd like to establish different sets of controls for different data types. However, we're struggling to define our data-classification levels. How do you recommend structuring the data-classification scheme for a Fortune-500-type company?.."
                        The Most Subtle Resume Error of All Time
                        IT Web, September 6th, 2013
                        "Resumes are all about detail and a job seeker's goal is to get every single facet right. The more finer points you execute, the greater the chance you will catch the attention of the screener and land an interview.

                        We've written about many (many, many) resume errors, but this one is a misstep even we did not consider:..."

                          IT - Careers
                          Fatal Distraction: 7 IT Mistakes that Will Get You Fired
                          InfoWorld, September 9th, 2013
                          "It's hard to get a good job in IT these days, but it's all too easy to lose one.

                          There are lots of reasons for instant termination. Failure to fulfill your obligation to protect your employer's digital assets or abusing your vast powers for your own nefarious ends are two sure ways to end up on the unemployment line. You could be fired for opening your mouth at the wrong time or not opening your mouth at the right one. Spying on the boss, lying to your superiors, or being directly responsible for the loss of millions of dollars in downtime through your own negligence are all excellent ways to end up on the chopping block..."

                          • Slacking on backup
                          • Snooping on the boss
                          • Covering up the crime
                          • The porn identity
                          • Keeping the wrong secrets
                          • Unmitigated disaster
                          • Speaking truth to power

                          Read on for details.

                            Ten Steps to Giving a Great Speech
                            Baseline, September 11th, 2013
                            "Do you suffer from glossophobia? It's very likely that you do. But don't get too worked up about it-it's not a fatal disease. It's just the clinical term for a fear of public speaking, and three out of every four people have it... To provide you with some helpful guidance, we've come up with the following time-proven tips on giving a "knock 'em dead" speech..."

                            • Take a Breath and Relax
                            • Keep It at a High Level
                            • Start With 'Why,' Not 'What'
                            • Align With the Audience
                            • Invite the Audience In
                            • Tell Stories, Not Stats
                            • Easy on the PowerPoint
                            • Use Images to Support Your Points
                            • Use Creative Pauses
                            • End With a Call to Action

                            Read on for details.

                              Three Tips about Managing Your Time
                              CIO Insight, September 9th, 2013
                              "I have coached a large number of executive clients over the past few years. On many occasions I give them 'homework' assignments to complete before our next session. On more than one occasion I've had a client admit that they did not complete their assignment. When I ask why, I almost always get the same response: 'I didn't have the time.' I would argue that, in our fast-paced society, time is perhaps our scarcest resource. It is also the resource that we cannot recapture (you can recoup lost money, but I've never met anyone who's figured out how to create more time). Each of us has the same 24 hours a day to work with..."
                                Ten Tips That Help You Work Smarter
                                Baseline, September 6th, 2013
                                ""We're sure that, by now, you're tempted to clobber the next person who tells you to "Work smarter, not harder!" That's easy to say - and easier to do - when you're not saddled with demanding bosses, fickle customers, dysfunctional co-workers and unforgiving deadlines. That said, the harsh reality is that these issues aren't going to go away by themselves..."

                                • Make a "To-Don't" List
                                • Carry a Notebook and Pen
                                • Become a Learning Machine
                                • Don't Aspire to "Zero Failure"
                                • Command Your Own Time
                                • Respond to Messages Promptly
                                • Never Over-Promise on a Deadline
                                • Cut Your Elevator Speech in Half
                                • Be Quick
                                • Gain Perspective

                                Read on for details.

                                  Sun Server X4-2
                                  versatile two-socket server for clustered computing and virtualization
                                  Unrivaled Performance and Scalability for the Data Center

                                  Oracle's new x86 servers pack in 50 percent more compute power than the previous generation. This performance boost comes while remaining within the same power profile as the prior generation of servers, making them some of the greenest servers for running mission-critical Oracle software.

                                  Oracle's Sun x86 servers come included with advanced system management tools, Oracle Integrated Lights Out Manager and Oracle System Assistant.

                                  Oracle's new Sun x86 servers include the Oracle Advanced Cooling System. This innovation uses cooling zones to maximize airflow at lower fan speeds while minimizing power consumption to ensure the maximum lifetime of temperature-sensitive components.

                                  Sun Server X4-2L
                                  Unrivaled Performance and Scalability for the Data Center
                                  Unrivaled Performance and Scalability for the Data Center

                                  Oracle's Sun Server X4-2L system is the perfect integration of compute and storage in a single two rack unit (2U) enclosure for clustered databases and virtualized business applications. It is a unique and scalable enterprise-class, two-socket Sun x86 server.

                                  Oracle's new x86 servers pack in 50 percent more compute power than the previous generation. This performance boost comes while remaining within the same power profile as the prior generation of servers, making them some of the greenest servers for running mission-critical Oracle software.

                                  With the new Sun Server X4-2, Oracle has designed in the perfect balance of compute power, I/O bandwidth, and memory footprint in one rack unit, making it the best platform for high-density, clustered computing in an enterprise cloud environment.

                                  Oracle raises the bar with the new Sun Server X4-2L, supporting more than 50 TB of internal storage and 24 CPU cores in two rack units. By maximizing storage and compute density simultaneously, Sun Server X4-2L is the ideal platform for compute-intensive applications requiring large amounts of direct-attached storage.

                                  Oracle's Sun x86 servers come included with advanced system management tools, Oracle Integrated Lights Out Manager and Oracle System Assistant.

                                  Oracle's new Sun x86 servers include the Oracle Advanced Cooling System. This innovation uses cooling zones to maximize airflow at lower fan speeds while minimizing power consumption to ensure the maximum lifetime of temperature-sensitive components.

                                  IT - Email
                                  Net Neutrality Faces Uncertain Court Ruling in US
                                  Network World, September 5th, 2013
                                  " It's difficult to predict how an appeals court will rule after it hears arguments Monday in Verizon Communication's challenge of the U.S. Federal Communications Commission's net neutrality rules.

                                  Groups on both sides of the debate over the FCC's rules prohibiting broadband providers from selectively blocking or slowing traffic say they believe they have a good case at the U.S. Court of Appeals for the District of Columbia Circuit. Reading the court's tea leaves has become as much of a case of wishful thinking as a predictive science..."

                                    ZS3 Storage
                                    Delivers World Record Performance and Unrivaled Efficiency for Oracle Applications
                                    Oracle's latest ZFS Storage Appliances, the ZS3 Series, enable customers to significantly improve operational efficiencies, reduce data center costs, and increase business application performance. Powered by an advanced cache architecture and multi-threaded SMP OS, the ZS3 Series has achieved the highest throughput, the lowest latency, and better price/performance when compared to similar NetApp, EMC, IBM, and HP systems.

                                    With new world record performance, Oracle's ZS3 Series storage enables customers to perform critical business functions faster, including optimizing supply chains, closing quarterly books, evaluating a greater number of investment scenarios, and accelerating database queries. It also enables enterprises to respond to application needs dynamically while helping to reduce time-to-business value.

                                    IT - Backup
                                    Rationalizing Backup Licensing Strategies
                                    Storage Switzerland, September 13th, 2013
                                    "The backup process has a myriad of costs associated with them. There is the obvious cost of the hardware - backup servers, backup storage and network infrastructure. There is also the cost of operations to manage the backup process. One of the biggest costs and one that is seldom addressed is the cost associated with the backup software itself; upfront purchase price, upgrade and expansion costs as well as on going support and maintenance costs.

                                    Understanding backup licensing costs has always been a difficult task and initiatives like server virtualization make it even more so. In this report, Storage Switzerland will explain the motivation behind backup software licenses, review the various models that are in the market today and suggest a new model for the future..."

                                    Beware of Backups That Come Back to Bite You
                                    InfoWorld, September 5th, 2013
                                    "Last week I wrote about rsync and how it can be used for a wide variety of tasks. One of the main uses, of course, is for backups -- and not just poor-man's backups. In many cases, using a hard-link rsync backup scheme from one storage array to another can be extremely useful. It can even be better than "standard" backup schemes.

                                    There's a downside to the relative ease of this type of backup, however, and that's data spread..."

                                      IT - Mobile
                                      4 Mobile Device Dangers That Are More of a Threat than Malware
                                      Dark Reading, September 11th, 2013
                                      "From Trojan horses to viruses, botnets to ransomware, malicious software garners a great deal of attention from security vendors and the media.

                                      Yet mobile users -- especially those in North America -- should worry more about other threats. While smartphones and tablets could be platforms for a whole new generation of malicious functionality, the ecosystems surrounding the most popular devices work well to limit their exposure to malware..."

                                      Boeing Brings Tablets on Board for Technicians
                                      Information Week, September 9th, 2013
                                      "Boeing is no stranger to mobile technology. Aviation depends upon mobility. But almost a hundred years after the company's founding, mobile computing is just beginning to transform the manufacturing and maintenance of aircraft.

                                      Using tablets, manufacturing technicians (MTs) who prepare commercial and military aircraft now have immediate access to information throughout a work facility, says Donald E. Lang, director of IT for the Boeing Military Aircraft unit of Boeing Defense Systems. They can pull up a work order and quickly identify what repairs need to be done with the aid of pictures..."

                                        Gartner: Be Wary of Nascent Managed Mobility Services
                                        Network World, September 11th, 2013
                                        "Managed mobility services (MMS) are still fairly young and providers vary considerably, with few having the type of global reach to potentially support the enterprise with any worldwide deployments of smartphones or tablets, Gartner warns in a recent "Magic Quadrant" report on the topic.

                                        In fact, Gartner is so cautious on what it's seeing in MMS development, it doesn't elevate any MMS provider to the prized Magic Quandrant status of market 'leaders' or 'challengers.' But Gartner, which notes that MMS providers typically charge a monthly recurring charge per device that is managed, says there is growing demand for MMS for day-to-day management of mobile devices along with handling associated tasks such as expense management, logistics, recycling and other practical concerns..."

                                        NSA Vs. Your Smartphone: 5 Facts
                                        Information Week, September 11th, 2013
                                        "Is your smartphone a sitting duck for government intelligence agencies?

                                        Fears about the security afforded by smartphones rose sharply over the weekend, after excerpts of documents leaked by National Security Agency whistle-blower Edward Snowden revealed that the agency has successfully retrieved data from a number of different makes and models of smartphones. A report published Saturday by Der Spiegel outlined some of those capabilities..."

                                        Top 10 Signs Your Users Are Mobile Ready
                                        Business 2 Community, September 12th, 2013
                                        "Whether you're planning a project for a mobile business app or developing a mobile business intelligence (BI) strategy, it's critical to gauge your users' overall mobile readiness. Even though sales of mobile devices continue to increase, some mobile users show chronic use of PC-era habits. Yes, the mobile savvy millennial generation is taking the workforce by storm, but they don't necessarily represent the largest portion of business users. Mobile-ready users, on the other hand, will display at least some of the following characteristics..."
                                          IT - Big Data
                                          5 MLB Analytics Practices That Work for Businesses
                                          Information Week, September 5th, 2013
                                          "One of the most staid industries in the world is in the midst of a revolution. Major League Baseball, a notoriously slow mover rooted in centuries' old traditions, is radically changing in the way games are managed and players are evaluated, and the driving force behind the shift is data analytics.

                                          Many of the best practices now embraced by general managers and managers throughout the sport can be used by executives in all lines of business. Let's take a look at five of the most critical practices..."

                                          • Value Data Over Intuition
                                          • Embrace New Metrics
                                          • Consider Context
                                          • Make Predictions
                                          • Declare WAR

                                          Read on for details.

                                          A Better Way for Supercomputers to Search Large Data Sets
                                          GCN, September 9th, 2013
                                          "Scientists are getting better all the time at collecting data, pulling vast amounts of it from expanding networks of sensors, satellite feeds, supercomputers and other devices. The trick is poring over that data and finding useful information, and even with the big data analysis tools at hand, that's not an easy task.

                                          But researchers at Lawrence Berkeley National Lab may have just made the job easier..."

                                          Exploring the Big Data Stack
                                          Datamation, September 3rd, 2013
                                          "Like any important data architecture, you should design a model that takes a holistic look at how all the elements need to come together. Although this will take some time in the beginning, it will save many hours of development and lots of frustration during the subsequent implementations. You need to think about big data as a strategy, not a project.

                                          Good design principles are critical when creating (or evolving) an environment to support big data - whether dealing with storage, analytics, reporting, or applications. The environment must include considerations for hardware, infrastructure software, operational software, management software, well-defined application programming interfaces (APIs), and even software developer tools. Your architecture will have to be able to address all the foundational requirements that we discuss in Chapter 1:..."

                                          'Small Data' Analysis the Next Big Thing, Advocates Assert
                                          eWeek, September 10th, 2013
                                          "It seems inevitable, but some IT experts are now claiming that "small data" analysis is the next big buzzword because it can more quickly produce useful results for business managers.

                                          While big data is getting all the headlines, small data is the next big thing. Big data and the value associated with combining and culling vast structured and unstructured data sets for business insights is a worthwhile but, as the name implies, big undertaking. It may be too big for all but the largest enterprises that have the time, money and expertise to build a big data platform..."

                                          What an Old Dictionary Teaches Us about Metadata
                                          Information Management, September 5th, 2013
                                          "Spelling, pronunciation, and examples of usage are included in the dictionary definition of a word, which is a good example of one of the many uses of metadata, namely to provide a definition, description, and context for data..."
                                            IT - BYOD
                                            Challenges Faced In a BYOD Workplace . and How to Overcome Them
                                            Business 2 Community, September 11th, 2013
                                            "To adjust to the changing nature of the workplace, an increasing number of companies have begun to adopt Bring Your Own Device (BYOD) polices. Companies know that adopting a BYOD policy is a way to become a competitive employer, as employees enjoy the freedom of being able to do their work wherever they choose, not having to be tethered to a desk...

                                            If you're thinking of creating a BYOD policy for your organization, learn about some of the challenges you may face and how to overcome them..."

                                            • Document Management
                                            • Lack of Face Time
                                            • Security Breaches
                                            • Too Many Devices

                                            Read on for details.

                                            Top Ten Articles for last few Issues
                                            Vol 187 Issue 1; Vol 186 Issues 1, 2,3 and 4; Vol 185 Issues 3, 4 and 5
                                            We track how frequently each article is viewed on the web site to determine which the readers consider the most important. For last week, the top 10 articles were:

                                            • Hadoop on an Oracle SPARC T4-2 Server
                                            • So, what makes Solaris Zones so cool?
                                            • Oracle's Next-Generation Application Engineered Storage
                                            • Administering Solaris Zones
                                            • OpenStorage Summit to be Held With Open Server Summit
                                            • Oracle VM VirtualBox 4.2.16
                                            • Direct I/O and SR-IOV features are now extended to Non-Primary root domains
                                            • Oracle VM Server for SPARC 3.1
                                            • Misys Kondor+ runs best on SPARC T5
                                            • DTrace with PHP Update

                                            The longer version of this article has list of top ten articles for the last 8 weeks.

                                              IT - Encryption
                                              Encryption Still Best Way to Protect Data -- Despite NSA
                                              Network World, September 6th, 2013
                                              "Though the National Security Agency spends billions of dollars to crack encryption technologies, security experts maintain that properly implemented, encryption is still the best way to maintain online privacy.

                                              The Guardian newspaper and other media outlets this week published stories based on internal internal NSA documents that explain how the spy agency bypasses encryption technologies by using backdoors, brute force attacks, lawful intercepts via court orders and partnerships with tech vendors..."

                                              Keep Calm, Keep Encrypting -- With A Few Caveats
                                              Dark Reading, September 9th, 2013
                                              "Encryption remains a key security tool despite newly leaked documents revealing the National Security Agency's efforts to bend crypto and software to its will in order to ease its intelligence-gathering capabilities, expert say. But these latest NSA revelations serve as a chilling wake-up call for enterprises to rethink how they lock down their data.

                                              "The bottom line is what Bruce Schneier said: For all of these [NSA] revelations, users are better off using encryption than not using encryption," says Robin Wilton, technical outreach director of the Internet Society. "But if you're a bank [or other financial institution], and you rely on the integrity of your transactions, what are you supposed to be doing now? Are you compromised?"

                                              Here's How to Best Secure Your Data Now that the NSA Can Crack Almost Any Encryption
                                              PCWorld, September 6th, 2013
                                              "The latest Snowden-supplied bombshell shook the technology world to its core on Thursday: The NSA can crack many of the encryption technologies in place today, using a mixture of backdoors baked into software at the government's behest, a $250 million per year budget to encourage commercial software vendors to make its security 'exploitable,' and sheer computer-cracking technological prowess.

                                              To some extent, it's not surprising to hear that the U.S. spy agency is doing spy agency stuff but, given the recent surveillance revelations and the fact that other countries likely have similar capabilities, the news is certainly worrying. To make matters worse, it came just a day after Pew reported that 90 percent of Internet users have taken steps to avoid surveillance in some way..."

                                              New Approach Enhances Quantum-Based Secure Communication
                                              Homeland Security News Wire, September 9th, 2013
                                              "Scientists have overcome an Achilles' heel of quantum-based secure communication systems, using a new approach that works in the real world to safeguard secrets. The research also removes a big obstacle to realizing future applications of quantum communication, including a fully functional quantum network..."
                                                Advanced Network Monitoring Using Oracle Solaris 11 Tools
                                                by Orgad Kimchi
                                                In this article, we will examine three use cases in order to demonstrate the capability of Oracle Solaris 11 tools. The first use case will show how to measure the network bandwidth between two systems. The second use case will demonstrate how to observe network statistics on a specific TCP port, and the last use case will demonstrate, by example, how to collect and display historical statistics of network resource usage for a given date and time range.

                                                The following are benefits of using these tools:...

                                                Trending in
                                                Vol 234, Issue 3
                                                Trending IT Articles