News about Oracle's Solaris and Sun Hardware
System News
Sep 16th, 2013 — Sep 22nd, 2013 Generate the Custom HTML Email for this Issue
System News System News for Sun Users
Volume 187, Issue 3 << Previous Issue | Next Issue >>
Sections in this issue:
click to jump to section

Oracle Fiscal Q1 Earning
fiscal 2014 Q1 GAAP and non-GAAP total revenues were up 2% to $8.4B
Oracle announced that both fiscal 2014 Q1 GAAP and non-GAAP total revenues were up 2% to $8.4B.

"Non-GAAP earnings per share increased 12% to $0.59, the best ever result for the first quarter of our fiscal year," said Oracle President and CFO, Safra Catz. "Those record level earnings were enabled by an operating margin of 45% for the quarter. We also set a free cash flow record of over $6B in Q1, and then we returned half of that to our stockholders by repurchasing $3B of our shares in the quarter."

"Engineered systems had its best ever Q1 in terms of unit sales, growing over 60% compared with the same quarter last year," said Oracle President Mark Hurd. "New software license results were especially strong in the Americas, which saw 15% growth in constant currency."

Unpack Software-Defined Storage at OpenStorage Summit (@openstorage)
October 22-24, 2013; Santa Clara Convention Center; $100 Off Registration
This Summit, hosted by Nexenta, focuses on innovation developments in open-source storage-related solutions. There is an opportunity to network, explore innovations, cloud platforms, technical solutions and so much more. Individuals from companies leveraging open-source storage will present case studies, lessons learned, and financial impact.

Reasons to attend:

  • Hear how cloud service providers are using open storage at scale

  • Pick the brain of an expert - Hear subject-matter experts present in Sessions, lead Group Discussions and then meet them one-on-one to cover topics that relate specifically to your organization

  • Arm yourself with knowledge - Create your conference agenda from the conference sessions

  • Show and share - The Solutions Exchange is the perfect place to network, learn and explore the latest in infrastructure products, services and solutions for cloud services and data centers

  • Network, network, network - Meet, connect, and share your experiences with peers from across the industry

Two of the speakers on the agenda may be familiar, Matt Ahrens and George Wilson, from Delphix. They are giving a presentation on "OpenZFS: The Future of Open-Source ZFS Deployment".

Airbus Selects Oracle Secure Global Desktop
To Increase Efficiency and Accelerate Time to Market
To improve time-to-market for new aircraft, Airbus, a world leader in the civil air transport industry, deployed Oracle Secure Global Desktop to provide secure, real-time access to its test flight performance data, as part of its telemetry applications and flight testing processes.

With an increasingly dispersed workforce across sixteen sites around Europe and a global supply chain network spanning 30 countries, Airbus needed a secure, scalable, and flexible remote access solution for its centralized telemetry applications.

Airbus' telemetry applications provide real-time information about status, and pertinent values of physical or avionic parameters, allowing critical flight data from a test flight maneuver to be evaluated in as fast as milliseconds.

Oracle Secure Global Desktop enabled Airbus aircraft designers, structural engineers, and other essential staff to access test data from server-hosted environments via a Web browser, allowing Airbus experts to provide nearly instant feedback from their off-site locations and reduce test-flight cycles.

IT - Storage
Unpack Software-Defined Storage at OpenStorage Summit (@openstorage)
October 22-24, 2013; Santa Clara Convention Center; $100 Off Registration
This Summit, hosted by Nexenta, focuses on innovation developments in open-source storage-related solutions. There is an opportunity to network, explore innovations, cloud platforms, technical solutions and so much more. Individuals from companies leveraging open-source storage will present case studies, lessons learned, and financial impact.

Reasons to attend:

  • Hear how cloud service providers are using open storage at scale

  • Pick the brain of an expert - Hear subject-matter experts present in Sessions, lead Group Discussions and then meet them one-on-one to cover topics that relate specifically to your organization

  • Arm yourself with knowledge - Create your conference agenda from the conference sessions

  • Show and share - The Solutions Exchange is the perfect place to network, learn and explore the latest in infrastructure products, services and solutions for cloud services and data centers

  • Network, network, network - Meet, connect, and share your experiences with peers from across the industry

Two of the speakers on the agenda may be familiar, Matt Ahrens and George Wilson, from Delphix. They are giving a presentation on "OpenZFS: The Future of Open-Source ZFS Deployment".

Java Technology
Java Spotlight Episode 145: Marcus Hirt on Java Mission Control @hirt
Weekly Podcast
Roger Brinkley writes about this week's Feature Interview: "Marcus is one of the founders of Appeal Virtual Machines, the company that created the JRockit JVM. He is currently working as Team Lead for the JRockit Mission Control team. In his spare time he enjoys coding on his many pet projects, composing music, and scuba diving. Marcus has contributed JRockit related articles, whitepapers, tutorials, and webinars to the JRockit community, and has been an appreciated speaker at various conferences, such as Oracle Open World and Java One. He is also one of the two authors behind a popular book about JVM technology..."
IT - Technology
CHART OF THE DAY: Technology Platforms With A Billion Users
Business Insider, September 17th, 2013
"Here's a cool, if a bit overwhelming, chart from Horace Dediu at Asymco.

It tracks which platforms have hit a billion users. Windows was first, then Facebook, then Android, and iOS should hit 1 billion in the next year or so, says Dediu.

Android hit the milestone faster than any other platform, reaching 1 billion users in just five years..."

Nonstop Tech is Taking a Toll on Americans
CIO Insight, September 17th, 2013
"Consumers appear to be reaching a state of tech burnout. In fact, even your employees - dedicated to IT as they are, and fascinated by its infinite possibilities - may sometimes wish that life were a bit less plugged in. At least this is the impression conveyed by a recent Harris Poll. While a majority of Americans say tech has improved their lives, that majority is steadily shrinking, findings show..."

  • Shrinking Gains
  • Off-Point
  • Down Time
  • Fragile State
  • Cold Turkey, Part I
  • Cold Turkey, Part II
  • Gender Divide: Inspiring IT
  • Gender Divide: Bond Builder
  • Gender Divide: Protective Layer
  • Gender Divide: Big Picture

Read on for details.

    20 steps to a lean, clean machine
    ComputerWorld, September 20th, 2013
    "If your legacy laptop is showing signs of age, it could simply need some basic maintenance. Here's a step-by-step guide to how to clean out your system...

    • Get ready
    • Grab your toolkit
    • Opening it up: Single back panels
    • Opening it up: Multiple back panels
    • Opening it up: No panels
    • Dust bunnies, beware!
    • Airing out the ports
    • Keep the fan quiet
    • Changing the fan
    • The heat (sink) is on
    • Making contact

    Read on for more steps and details.

      Moore's Law bending, ready to break
      GCN, September 17th, 2013
      "Gordon Moore is a genius and one of the best technology analysts to ever live. Back in 1965, he observed that the number of transistors on chips doubled roughly every two years. This became known as Moore's Law, and it still holds true, more or less, even though Moore himself predicted the law only had about a 10-year shelf life.

      Moore's Law has been interpreted and extrapolated many ways, the most popular being that computing power is set to double every two years. And it has, though Moore was actually only talking about the number of transistors in his original theory. But it's been fairly consistent in terms of processing power..."

        Free and Open Source S/W
        The best open-source application development tools
        Bossie Awards 2013
        "Did you notice there's a lot going on with JavaScript? Node.js continues to pop up in more and more places, and then there's the explosion of JavaScript frameworks on the client side. Many of these client-side frameworks are aimed at making Web development more like "real" application development, while others tackle the challenges posed by mobile devices. Still others bring 3D and sophisticated data visualizations to the browser (without plug-ins!).

        But JavaScript wasn't the only programming language to have a good year. Among our 30 winners, there are plenty of tools here for those who build real real applications..."

        Bootstrap LESS AngularJS Backbone.js Enyo jQuery Ember.js Emscripten D3 X3DOM PhoneGap/Cordova Modo Labs Kurogo Node.js OpenShift Cloud Foundry XAMPP Adobe Brackets Notepad++ Apache Shiro Jenkins Enalean Tuleap Scala Ruby Python Django IPython Raspberry Pi Arduino

        MySQL 5.7 Development Milestone Release
        Provides Improved Manageability, Scalability and Record Performance
        Oracle announced the immediate availability of the latest Development Milestone Release (DMR) for MySQL 5.7. The new release further extends the performance, reliability, scalability, and manageability of the world's most popular open source database, allowing developers and database administrators to build modern web, cloud-based and embedded applications capable of processing ever increasing volumes of data.

        Kicking-off its second MySQL Connect conference at Oracle OpenWorld 2013, Oracle announced the availability of the second Development Milestone Release (DMR) for MySQL 5.7, continuing to drive MySQL technology innovation.

        MySQL Enterprise Monitor 3.0
        Enhancements Improve Manageability and Monitoring for Modern Web, Cloud and Embedded Applications
        Oracle announced the availability MySQL Enterprise Monitor 3.0 at the MySQL Connect conference at Oracle OpenWorld 2013.

        Database professionals are increasing their use of MySQL to power business-critical web, cloud, and embedded applications and continue to look for ways to reduce the risk, cost and time to develop, deploy and manage those applications. The latest release of MySQL Enterprise Monitor, a vital component of MySQL Enterprise Edition, addresses these challenges by enabling developers and DBAs to more efficiently deliver applications.

        Part of MySQL Enterprise Edition, MySQL Enterprise Monitor 3.0 features improved manageability while delivering new real-time monitoring and alerts capabilities, visual analysis tools, and better remote monitoring of MySQL databases in the cloud.

        MySQL Enterprise Monitor continuously monitors MySQL databases and improves productivity by warning developers, database administrators (DBAs) and system administrators of potential problems before they impact the infrastructure and recommends best practices to improve performance, security and reliability.

        MySQL Enterprise Monitor 3.0 is available for immediate download.

        Cloud Computing
        Cloud Building with Oracle Solaris 11
        Three resources to help you build clouds with Oracle Solaris 11
        Rick Ramsey offers three resources to help you build clouds with Oracle Solaris 11:

        • Training Class - How to Build a Private Cloud with Oracle Solaris 11
        • Tech Article - How to Build a Web-Based Storage Solution Using Oracle Solaris 11.1
        • Tech Article - How to Put Oracle Solaris Zones on Shared Storage for Easy Cloning

        Read on for details.

        IT - Cloud
        Organizations Shifting Cloud Strategies
        CIO Insight, September 19th, 2013
        "We know that high-profile cloud platforms are big - and are only going to get bigger. But don't assume that once an organization moves part or all of its tech functions to a public cloud system, that the migration is permanent. In fact, one-quarter of companies are transferring IT services from public cloud providers to on-premise systems and/or private cloud models, according to a recent survey from CompTIA. .."

        • Ongoing Migration
        • Mail Call
        • Cyber Footprint
        • Team Effort
        • Change Management
        • Watchful Eye
        • Overhaul
        • Shrinking Headcount
        • Top Cloud Challenges
        • Top Reasons to Switch Public Cloud Providers
        • Top Reasons to Return to an On-Premise Model

        Read on for details.

        OpenStack Grows Cloud Training Marketplace
        eWeek, September 20th, 2013
        "Strong demand for the open-source OpenStack cloud platform is fueling new efforts to get IT professionals trained and certified.

        The open-source OpenStack cloud platform is a rapidly growing effort that is driving increasing demand for skilled professionals who know what it's all it about. To that end, the OpenStack Foundation this week officially announced the OpenStack Training Marketplace to help meet the demand for skilled IT professionals.

        In 2012, a number of companies emerged that began to offer some basic training on OpenStack, Jonathan Bryce, executive director of the OpenStack Foundation, told eWEEK..."

        In a cloud world, developers and admins can't ignore each other
        InfoWorld, September 17th, 2013
        "Last week, InfoWorld's David Linthicum posted an excellent piece on the importance of maintaining a firm grasp on IT fundamentals as you steer your career toward the cloud. In it, Linthicum argues that you can't very well expect to succeed in the cloud space without having a solid understanding of what makes traditional enterprise environments tick. He couldn't be more on the money.

        However, I'd take the liberty of broadening his point to encompass what I see as a much broader trend that has emerged since server virtualization really came into its own. It used to be that a server admin building a new system would have fairly intimate knowledge of the needs of the application that it would be charged with running. If the admin got it wrong, he or she might need to rebuild the system or, worse, find funds to buy additional hardware..."

        Reaction to Nirvanix Shutdown Reiterates Importance of Backup
        eWeek, September 21st, 2013
        "Despite Nirvanix's demise, other cloud providers continue to flourish and rapidly expand, indicating that one failure doesn't signify a serious industry problem.

        Nirvanix is a cloud storage service provider with a lot of promise. It has smart technology, smart people running it, previous VC backing and a number of name-brand customers, such as Fox Sports, National Geographic and NASA.

        But even smart companies can suffer crippling business problems..."

          CIOs Embracing Hybrid Cloud Model
          CIO Insight, September 20th, 2013
          "A majority of CIOs say that hybrid cloud environments, which integrate on-premise and cloud-based applications, helps reduce complexity and increase flexibility, according to a recent SAP survey. Concerns about security, however, are a leading issue.

          Titled CIO Survey Results-Hybrid: The Next Generation Cloud, the report is based on in-depth phone interviews with 52 CIOs of large companies. While the sample size is small, it's due to the fact that the respondents needed to be CIOs of large businesses and willing to participate in an in-depth phone interview..."

          IT - CxO
          Lessons on the Future of IT From 'Future Shock' and 'The Singularity Is Near'
          Network World, September 17th, 2013
          "More than 40 years ago, Alvin Toffler unleashed the book Future Shock on the United States. In it, he used the term 'information overload' to refer to the disoriented reaction experienced by people when they feel overwhelmed by constant technological churn. Summed up, his thesis is that technology is developing faster and faster - and faster than people can respond to it, leaving them anxious and befuddled..."
            6 lessons to learn from a happy IT organization
            InfoWorld, September 18th, 2013
            "At DirecTV, IT stopped playing defense and took the lead, helping business management weigh key decisions. Here's how they pulled it off...

            People who work in IT grow accustomed to living under siege -- everyone wants everything at once, resources always fall short, priorities conflict, that kind of thing. But it's gotten worse: Today IT is in danger of being marginalized, consigned to keeping boring legacy systems running..."

            Making a Successful CIO Transition
            CIO Insight, September 18th, 2013
            "Switching industries for a CIO creates both challenges and opportunities to make a quick impact. Mark Katz, CIO of the American Society of Composers, Authors and Publishers (ASCAP), talks about what it takes to make a successful transition.

            Katz's career began in financial services and steadily progressed in a number of firms before he become the CIO of a major reinsurer. When moving to ASCAP this time last year, Katz's goal was to turn IT into a leaner, more agile organization. With the full support of the executive management team, he undertook some significant challenges to turn around the IT department..."

            Priorities for the CIO: What We can learn from the Local Government
            AITS, September 16th, 2013
            "Today's CIO has to stay on top of his game to prepare for the IT changes of tomorrow. When the information being dealt with is the government's, the changes are even more important. Steve Towns, of, examines the top 3 priorities of state and local government CIOs right now.

            Cybersecurity: More and more states are investing in new security programs, and with good reason. Organized crime has now gone digital, and cybersecurity is no longer a technology problem but a business risk..."

            Why Clever And Lazy People Make The Best Leaders
            Business Insider, September 17th, 2013
            "You're looking for three things, generally, in a person," says Warren Buffett. "Intelligence, energy, and integrity. And if they don't have the last one, don't even bother with the first two."

            "Ideally you want all three but people don't always cooperate. These qualities tend to be difficult to judge in hiring someone.

            So we end up with all sorts of combinations and permutations in organizations..."

              The Elevator Pitch: An Executive Summary, Not Platitudes!
              AITS, September 16th, 2013
              "A client had mentioned to me, 'I might be able to speak to most of the latest IT issues, I pretty much keep abreast of them, but we are not quite sure how to get our arms around all of them, operationally. How do we get started?'

              Whether we're talking about developing a crisis management plan or a due diligence effort, whether understanding the TCO of key business processes or preparing for client audits, it's not surprising to hear the question. And it's not reserved for a new intern. The “How to get started” question will arise from many senior executives..."

              IT - Networks
              4 Ways to Defend Against DDoS Attacks
              CIO, September 17th, 2013
              "Given that Distributed Denial of Service (DDoS) attacks are becoming more frequent, it is a good time to review the basics and how you can fight back.

              A DDoS is an attack method used to deny access for legitimate users of an online service. This service could be a bank or e-commerce website, a SaaS application, or any other type of network service. Some attacks even target VoIP infrastructure.

              An attacker uses a non-trivial amount of computing resources, which they either built themselves or, more commonly, by compromising vulnerable PC's around the world, to send bogus traffic to a site. If the attacker sends enough traffic, legitimate users of a site can't be serviced..."

              WiFi Access Essential, but Lacking for Mobile Workers
              eWeek, September 17th, 2013
              "Access to wireless Internet in a hotel is as important as a comfortable bed, according to a survey of the mobile workforce. However, 81 percent have had unsatisfactory experiences with hotel WiFi in the past year, according to enterprise mobile services provider iPass. The survey revealed 82 percent feel that free hotel WiFi services are limited, slow and unreliable, and nearly three-quarters (74 percent) said that a bad WiFi experience in a hotel would prevent a return visit. The survey also found 69 percent of respondents think that accessing and registering for WiFi access in hotels is difficult or cumbersome..."
                SDN Meets Data Analytics
                Network Computing, September 20th, 2013
                "If you're going to compete in the software-defined networking (SDN) space, you need to have the right tools. You need to have a programmatic API of some kind. You need to have a software controller somewhere directing all the traffic to the right location. And you need to be able to integrate with commonly used programs like Chef and Puppet. That's the minimum you need to be an SDN-focused company today. To be successful, though, you're going to need a bit more. And Plexxi has the little something extra..."
                  Where Do SDNs Fit in the Data Center?
                  CIO, September 17th, 2013
                  "As CIOs try to make sense of the hype surrounding software-defined networks (SDNs) and their potential in data centers, some experts and vendors say IT leaders are looking for answers in all the wrong places...

                  While most of the conversation about software-defined networks (SDNs) focuses on their impact on the data center -- virtualizing networks to cut hardware and personnel costs, reduce on-site footprints, remove bottlenecks and traffic flow problems and make network management easier -- the true benefit of SDNs may lie outside the data center..."

                  IT - Operations
                  Midsize IT Outsourcing Providers Offer Hidden Value
                  CIO, September 20th, 2013
                  "There's a growing shift from tier 1 offshore outsourcing providers to midsize IT services players. Scale and price are no longer the sole interest of outsourcing customers. They are seeking agility, flexibility, vertical alignment, responsiveness and trust -- all of which they are more likely to find in a smaller, more focused provider..."
                  IT - Security
                  3 Steps To Secure Your Business In A Post-Signature World
                  Dark Reading, September 18th, 2013
                  "While phishing, reconnaissance scans, social engineering, and other opportunistic attacks still comprise the lion's share of malicious activity seen by most companies, a growing proportion of attacks are able to evade signature-based defenses. Cybercriminals using fully undetectable (FUD) services can create variants that are unrecognizable to antivirus programs, and targeted attacks increasingly use custom-built malware designed to tiptoe past the target's defenses..."
                    Keep Security Simple: 10 Ways to Prevent Damaging Data Leaks
                    eWeek, September 19th, 2013
                    "Last May, Edward Snowden, a 29-year-old mid-level IT technician employed by National Security Agency contractor Booz Allen Hamilton, collected and turned over highly classified information to a U.K. newspaper reporter about U.S. surveillance programs, shaking federal security agencies and their private contractors to their foundations... While this instance primarily affected the federal government, the implications for enterprises are equally significant. What exactly can enterprises do to ensure that an Edward Snowden situation does not hit them? eWEEK and business collaboration security provider Brainloop suggest some fundamental precautions in this slide show:"

                    • Don't Rely On Compliance Policy Alone
                    • Support Efficient Workflows
                    • Focus on Protecting Information vs. Infrastructure
                    • Ubiquitous Security Through Access Control
                    • Beware of Consumer-Grade Cloud File Sharing
                    • 'He Who Guards Everything Guards Nothing'
                    • Guard Against Inside Jobs
                    • Security Can't Be an Afterthought; Ease of Use Is Important
                    • Security Should Be Selective but Simple
                    • Turn Employees From Liabilities to Security Assets

                    Read on for details.

                    One in ten consumers lost money to online fraud
                    Help Net Security, September 17th, 2013
                    "More than one in ten consumers globally have been victims of online fraud that cost them money, according to a recent F-Secure survey which fleshed out consumer concerns about online safety. The survey also showed that computers and laptops are regarded as the most risky devices to go online with..."
                      Bank Hacking Plot Shows New Cybercrime Potential
                      CIO Today, September 17th, 2013
                      "A bogus maintenance engineer attempted to install a keyboard-video-mouse -- a device typically used to control several computers at once -- onto a computer at a London branch of Spanish bank Santander. The hardware would have allowed the suspects to take control of the bank's computer remotely. The scale of the potential theft was huge..."
                        Study: Enterprises Fail To Test End User Awareness Training, Password Policies
                        Dark Reading, September 18th, 2013
                        "Security awareness programs and strong password policies are standard procedure in most organizations, but most enterprises don't do enough to reinforce them, according to a new survey. According to a study published Friday by security firm Rapid7 (PDF), most companies don't go back and test their employees to see whether they have learned from security training and policy..."
                        Small Businesses Lack Proper Security Policies
                        eWeek, September 20th, 2013
                        "The research also found when the owners have been victims they are more likely to be extremely or very concerned about the potential for fraud.

                        Many small businesses, from industries as diverse as retailers to professional services firms, are not as protected as they should be from increasingly sophisticated and rampant fraud schemes such as business identity theft, mobile malware and money mules, according to an online survey of 803 small business owners by Harris Interactive and sponsored by Bank of the West..."

                          Interim Report: Top Cyberthreats
                          Dark Reading, September 19th, 2013
                          "NISA today presented its list of top cyber threats, as a first 'taste' of its interim Threat Landscape 2013 report. The study analyses 50 reports, and identifies an increase in threats to: infrastructure through targeted attacks; mobile devices; and social media identity thefts carried out by cyber-criminals over Cloud services.

                          Some key trends identified in the study are:..."

                          IT - Careers
                          4 ways to stand out from your peers
                          IT World, September 18th, 2013
                          "We saw a link that proclaimed James Caan had written a story on management and leadership and we were in. In.

                          Sonny Corleone on leadership. We'd read that every day and twice on Sunday. Of course, no doubt, any pearls of wisdom would be too after-dark to share on a nice, family IT site such as this.

                          Except: 'No more meetin's, no more discussions, no more Sollozzo tricks. You give them a message from I want Solozzo if not it's all out war we go to the mattresses.'

                          See, even Sonny Corleone knows businesses need to cut down on meetings..."

                          Managers Offering Larger Raises to Compete
                          CIO Insight, September 20th, 2013
                          "CIOs and other managers will need to budget more for raises to keep retention levels high, according to recent research from Aon Hewitt. While forecasted raises for the next year are by no means lavish, they represent a sizable increase from those seen during the recent recession. Meanwhile, organizations are setting aside considerably more funding to provide performance-based awards which must be re-earned every year..."

                          • Senior Leaders
                          • On the Payroll
                          • Clock Management
                          • Meritocracy
                          • Underperformers
                          • Prove It or Lose It
                          • Results-Based Benefit
                          • Top Cities for Raises?
                          • Bottom-Feeders

                          Read on for details.

                          16 IT skills in high demand right now
                          InfoWorld, September 16th, 2013
                          "That resolution to update your tech toolbox may seem like a distant memory, but now more than ever you need to work to increase your professional value.

                          One way to increase your brand to employers is to learn new skills, but choosing the ones that offer the most bang for the buck is challenging. To help you better understand the market, spoke with David Foote, CEO at Foote Partners and other industry professionals to identify what IT skills are experiencing the most growth and what those skills are worth.

                          This data is based on statistical analysis that looks at the demand for more than 289 skills both certified and noncertified and what is being paid for those skills over and above base salary..."

                          • Requirements engineering and analysis skills
                          • SAP Supply Chain Management skills
                          • HBase skills
                          • Quantitative analysis and regression analysis skills
                          • IT governance skills
                          • C# skills
                          • ITIL skills
                          • Enterprise architecture skills
                          • Infrastructure architecture skills
                          • Security architecture skills
                          • Business intelligence skills
                          • Business analysis skills
                          • Unified communications and messaging skills
                          • Risk assessment and analysis skills
                          • Runner-ups: Mobile application development skills
                          • Runner-ups: Cloud computing skills

                          Read on for details.

                          How to tell if a co-worker is gunning for you
                          IT World, September 16th, 2013
                          "Workplace intrigue and cloak-and-dagger office politics always seem a little too made-for-TV to exist. Until, that is, you have an incident with a colleague that trips your radar, and you wonder: Am I watching too much Breaking Bad or is this person really out to get me?

                          Monster's Catherine Conlan offers several suggestions that will help you gauge if you have a potential problem on your hands..."

                            A surprising secret shortcut to becoming a rising star at work
                            IT World, September 20th, 2013
                            "So we're reading Businessweek online and spot this story: 'Pursue the Passionate; Avoid the Zombies.' And even though it's an article about careers and management, let's face it, 'Avoid the zombies' is just solid life advice, period.

                            We all know that water sinks to its own level and, in effect, the same is true when it comes to people. Jocks hang out with the jocks, nerds hang out with the…well, of course, we wouldn't know that.

                            Moving on, that truism extends into any office. Look around the cubes. Notice who hangs around with whom and the common traits they share. Are they ambitious? Annoying? Constant complainers? Helpful? Smart?..."

                            Computer Science Major Ranks No. 8 for Salary Potential
                            CIO, September 17th, 2013
                            "PayScale, which analyzes salary data, ranked 129 college majors based on earning potential. Engineering, math, science and technology fields dominated the highest rankings in the College Salary Report, which provides the median starting pay and median mid-career pay for the alumni of more than 1,000 schools.

                            Engineers, in particular, nabbed seven of the top 10 spots. Petroleum engineering ranked first with a median starting salary of $103,000 and a mid-career median salary of $160,000..."

                              Here Are The Countries That Work Hard And The Ones Where They like To Relax
                              Business Insider, September 16th, 2013
                              "Which countries work like crazy and which ones work hard?

                              Our friend Seth Kadish who runs the fantastic Visual Statistix Tumblr put together this graphic of OECD [Organisation for Economic Co-operation and Development] countries, to answer exactly this question.

                              The more red or orange a country is, the harder it works. So, countries like South Korea and Mexico get the work-ethic prize.

                              The more blue a country is, the more workers like to chill: Congrats France!

                              The index combines average hours worked per year and average retirement age to create the ultimate index...

                                Take a quick tour of Oracle Database X3-2
                                Oracle Database Appliance: Simple. Reliable. Affordable.
                                See a 4 minute tour of the Oracle Database Appliance: "Oracle Database Appliance delivers a high-availability database solution in a single box with remarkable affordability. It's a complete package of software, server, storage, and networking based on Intel Xeon processors to ensure high performance."
                                Intel and Oracle: 21 Years Of Partnering to Deliver Innovation
                                See Oracle's commitment to the x86 architecture
                                Kelvin Gee writes, "As this year is heading to a close, it will complete 21 years of partnership between Intel and Oracle. For over two decades, both firms have worked together to drive increased performance for Oracle Database on Intel's CPU architecture. In addition, Oracle and Intel have worked together to deliver innovation and hardened reliability for Oracle Solaris. However, what may get overlooked is Oracle's commitment to the x86 architecture and Intel's family of processors, through the continued development of Oracle's x86 servers..." Read on for details.
                                Oracle ZFS Storage ZS3-2 Beats Comparable NetApp
                                on SPECsfs2008 NFSv3
                                Oracle ZFS Storage ZS3-2 storage system delivered outstanding performance on the SPECsfs2008 NFSv3 benchmark, beating results published on NetApp's fastest midrange platform, the NetApp FAS3270, the NetApp FAS6240 and the EMC Gateway NS-G8 Server Failover Cluster.

                                The Oracle ZFS Storage ZS3-2 storage system, on the SPECsfs2008 NFSv3 benchmark:

                                • delivered 210,535 SPECsfs2008_nfs.v3 Ops/sec with an Overall Response Time (ORT) of 1.12 msecrk
                                • delivered 10% higher throughput than the NetApp FAS6240
                                • has 52% higher throughput than the NetApp FAS3270
                                • has 5% better Overall Response Time than the NetApp FAS6240
                                • has 33% better Overall Response Time than the NetApp FAS3270

                                Complete SPECsfs2008 benchmark results

                                IT - Database
                                Database Misconfigurations: Windows To Vulnerable Data
                                Dark Reading, September 17th, 2013
                                "Experts recommend developing configuration baselines and regularly comparing database configurations to those standards to prevent configuration drift...

                                As enterprises continue to struggle with large-scale data breaches and quiet exfiltration of sensitive information from databases, database security experts warn of the big role misconfigured databases play in these compromises..."

                                IT - Backup
                                When Cloud Backup Fails
                                Information Week, September 18th, 2013
                                "In my last column, we discussed some of the limitations of cloud-based backup and why more cloud providers should provide some form of external, portable storage to overcome those challenges. I used tape technology as an example. The second and potentially larger problem with tapeless cloud backup is the recovery process. Vendors' claims about the lack of tape value are getting out of hand.

                                If you lose an entire server, the data deduplication that helps you in backup is not going to save you from an extended period of downtime while this data trickles through the Internet. There is no baseline to compare it to and, even if there were, most software solutions can't do a deduplicated recovery..."

                                IT - Mobile
                                70 Percent of Business Users Vulnerable to Latest Internet Explorer Zero-Day
                                CIO, September 19th, 2013
                                "According to Microsoft, a zero day flaw in Internet Explorer (IE) , which impacts all versions of the browser, is being actively exploited in the wild. Reports of exploitation, according to Microsoft, seem to have criminals focused on IE versions 8 and 9.

                                Complicating matters, researchers at Websense have discovered that nearly 70 percent of Windows business users are susceptible to this IE zero-day exploit..."

                                White House Petitions FCC To Allow Phone Unlocking
                                CIO Today, September 20th, 2013
                                "Some carriers have raised concerns -- citing the Digital Millennium Copyright Act -- that unlocked cell phones could carry copyright-protected software between service providers. But the movement to make unlocking legal again has received widespread support including from the White House, the FCC and Congress.

                                Unlocking a cell phone, currently illegal, may become legal again. The Obama Administration has sent a petition to the Federal Communications Commission (FCC) requesting such an action, and there is support in Congress and at the FCC..."

                                  CIOs, CMOs Battle Over Mobile Strategies
                                  eWeek, September 22th, 2013
                                  "The CMO is focused on improving aspects of the customer experience, while the CIO is more aware of the challenges in delivering the CMO's requirements.

                                  There is a battle brewing in the C-suite over the way corporate mobile strategy gets decided, and chief marketing officers (CMOs), chief information officers (CIOs) and other C-level executives are driven by conflicting motivations across the business, according to a survey sponsored by Netbiscuits and conducted by Vanson Bourne..."

                                  Healthcare IT Security Is Difficult, But Not Impossible
                                  CIO, September 19th, 2013
                                  "Data breaches threaten healthcare organizations from all angles -- from hackers, thieves and forgetful employees -- and touch all facets of IT infrastructure. Updated HIPAA rules make organizations responsible for the actions of their business associates, too. Healthcare IT security is a daunting task, but with a little planning, it's not an impossible one..."
                                  IT - Big Data
                                  3 Roadblocks to Big Data ROI
                                  Big Data Republic, September 20th, 2013
                                  "Most organizations that implement big data platforms expect to derive significant value from their investment. But nearly half of these firms aren't achieving the level of value or return on investment (ROI) that they had expected.

                                  According to a new study by Wikibon, an open-source research firm that competes with Gartner and Forrester, the ROI of these big data projects is proving to be a big letdown for most enterprises..."

                                  Big-Data a Big Deal for Executives
                                  Internet Evolution, September 20th, 2013
                                  "If you've been following the big hype around big-data of late, you might have asked yourself the question: What's the big deal?

                                  Which is kind of like what I would ask of all those people standing in lines in the rain today waiting for the new Apple iPhone 5S and 5C -- did you know you can order those things over the Internet?

                                  Well, New Vantage Partners, who serve as advisers and consultants to Fortune 1000 business and technology executives, have released the results of their 'Big Data Executive Survey' for 2013..."

                                  Top 5 Big Data Trends Highlighted in Major Enterprise Projects
                                  eWeek, September 18th, 2013
                                  "Major enterprise projects presented at the Big Data Innovation Conference show why this analysis technique is becoming more of a reality than just a buzzword...

                                  Big data often comes across as more of a buzzword than reality. But listening to users speak about their projects at the Big Data Innovation conference in Boston last week provided insight into what the power of big data can mean to a company. Here are my top five takeaways from the conference.

                                  • The hybrid data cloud
                                  • Mobility is driving big data investment
                                  • Big data can surround and enhance existing applications
                                  • The Internet of Things
                                  • Big innovation is coming to the front end of the data spectrum

                                  Read on for details.

                                  NSA Disclosures, Mass Shootings Expose Big Data Problem
                                  CIO, September 20th, 2013
                                  "Sure, the government may know everything about you, but those tidbits of information sit in disconnected, proprietary databases. Unfortunately, that means it's harder than it should be to identify someone who's likely to be behind a mass shooting or terrorist attack...

                                  Look at the layered disclosures from Edward Snowden, who it turns out is a finalist for the top humanitarian award in the European Union. Then look at America's mass shootings, most of which could have been avoided if the shooter's characteristics had identified him as a threat well in advance..."

                                    5 Ways Big-Data Can Save Publishing
                                    Big Data Republic, September 16th, 2013
                                    "As publishers scramble to find the right mix of strategies and revenue streams to stay afloat, they're learning that the ability to provide information instantaneously is essential. But they dare not stop there if they are to attract and retain readers consistently and constantly.

                                    Big-data can provide publishers with valuable insights into customer usage, giving them the ability to dig deeper into potential cross-sell and upsell opportunities for existing customers. Armed with these insights, personalized marketing -- via apps and website offerings such as Random House's BookScout app and vertical online communities such as Globe Pequot Press' for outdoor enthusiasts -- becomes far more effective.

                                    Here are five ways I think the publishing industry can make the most of big-data in propelling their businesses forward:..."

                                      Move Big Data at the Speed of Life, or Follow the Dinosaurs
                                      Big Data Republic, September 20th, 2013
                                      "Life moves fast. You should move your data just as fast in order to ensure business success. It's hard to believe we're into September already. This year has passed very quickly, but at times it feels as if I'm stuck in a loop in the space/time continuum, still thinking and writing about all I learned at the Big Data Show 2013 in London at the end of April.

                                      Those three days of intense, vibrant swimming in the sea of big data and sipping cocktails of big data knowledge are still vivid in my memory. I was lucky enough to collect plenty of material, and interviews to share with you here, at Big Data Republic..."

                                      IT - BYOD
                                      The legal implications of BYOD
                                      Help Net Security, September 16th, 2013
                                      "The legality of the common practice of remotely wiping or tracking an employee's mobile device while asking workers to sign waivers giving their consent for such a policy remains highly ambiguous, as there is little to no case law in this area.

                                      Employee resentment over these invasions of personal privacy is growing with concerns about losing personal data when using their own devices for work, and the potential violation if their employer viewed their personal information..."

                                        Ten Things To Consider When Developing An Enterprise BYOD Security Policy
                                        Dark Reading, September 16th, 2013
                                        "BYOD, or bring-your-own-device, is a trend that is not going away. In InformationWeek's 2013 State of Mobile Security report, based on a survey of 424 business technology professionals, 68% of respondents said their mobility policy allows employees to use personal mobile for work, with 20% saying they are developing such a policy.

                                        In fact, BYOD can hardly be called a trend anymore: The model is here to stay in the enterprise, and it's expanding to include all manner of employee-owned technology ..."

                                        'It's a BYOD World' With a Catch -- At New York Law School
                                        CIO, September 16th, 2013
                                        "The 'Bring Your Own Device' trend can cause a lot of disruption, but not at New York Law School, the downtown Manhattan college where students, faculty and visitors have always been allowed to use any mobile device they want on the wireless network. But that doesn't mean anything goes..."
                                          BYOD Brings Benefits, but Don't Ignore the Risks
                                          eWeek, September 17th, 2013
                                          "The Information Security Forum (ISF) is a 24-year-old nonprofit research organization whose Fortune 500-type member companies make clear the topics they're interested in and participate in research surveys. While historically reluctant to share its findings with nonmembers, ISF is beginning to loosen up. On Sept. 17, it made publically available a new report on managing the risks that come along with the benefits of the bring-your-own-device (BYOD) trend. "It's difficult to avoid mixing home and corporate data, and people will always look for ways to skirt controls," Steve Durbin, ISF's global vice president of information security, told eWEEK during a July meeting...."
                                          Top Ten Articles for last few Issues
                                          Vol 187 Issues 1 and 2 ; Vol 186 Issues 1, 2,3 and 4; Vol 185 Issues 4 and 5
                                          We track how frequently each article is viewed on the web site to determine which the readers consider the most important. For last week, the top 10 articles were:

                                          • Oracle ZFS Storage Outperforms IBM and HP
                                          • Sun Server X4-2
                                          • Oracle ZS3 Storage Appliances: Tier-1 Performance at Tier-3 Prices
                                          • ZS3 Storage
                                          • Advanced Network Monitoring Using Oracle Solaris 11 Tools
                                          • Happy 10th Birthday, DTrace!
                                          • Sun Server X4-2L
                                          • StorageTek T10000D Tape Drive
                                          • Java Spotlight Episode 144: Danny Coward on his Java WebSocket Programming Book
                                          • Podcast of Oracle Cloud Computing experts

                                          The longer version of this article has list of top ten articles for the last 8 weeks.

                                            Top Tips for Updating Solaris 11 Systems
                                            By Gerry Haskins
                                            Gerry Haskins writes, "We now have quite a bit of experience of IPS and Repositories under our belt.

                                            Feedback from customers has been extremely positive. I recently met a customer with 1000+ Solaris servers who told me that with Solaris 10 it took them 2 months to roll out a new patchset across their enterprise. With Solaris 11, it takes 10 days.

                                            That really helps lower TCO.

                                            As with anything, experience teaches us how to optimize things. Here's a few Top Tips around IPS / Repo management which I'd like to share with you from my experience with SuperCluster:..."

                                            NetBeans IDE 7.4 Release Candidate 1
                                            Extends the advanced HTML5 development support introduced in NetBeans IDE 7.3
                                            The complete list of new features is available in the New and Noteworthy document. Please test it and report all the issues or enhancements you find in NetBeans Bugzilla.

                                            NetBeans IDE 7.4 extends the advanced HTML5 development support introduced in NetBeans IDE 7.3 to Java EE and PHP application development, while offering new support for hybrid HTML5 application development on the Android and iOS platforms. In addition, this release provides support for working with preview versions of JDK 8, and includes continued enhancements to JavaFX, C/C++ and more.

                                            NetBeans IDE 7.4 Release Candidate is available in English, Brazilian Portuguese, Japanese, Russian, and Simplified Chinese.

                                            Trending in
                                            Vol 234, Issue 2
                                            Trending IT Articles