News about Oracle's Solaris and Sun Hardware
System News
Sep 23rd, 2013 — Sep 29th, 2013 Generate the Custom HTML Email for this Issue
System News System News for Sun Users
Volume 187, Issue 4 << Previous Issue | Next Issue >>
Sections in this issue:
click to jump to section


IT - CxO
x
How to Build the Ultimate Fantasy IT Team
Network World, September 23rd, 2013
"With the fantasy football season underway, we started to wonder what would a fantasy IT team look like?

'Assembling a solid IT Team is like drafting a good fantasy football squad,' says Chris Moore, senior manager at Navigate, a management consulting firm. 'It's all about balance. You can't overstaff in one area, as it might cause other areas to suffer.' You also need to pick your position players wisely..."

Make Your IT Department Easy to fo Business With
CIO, September 19th, 2013
"It's been over twenty years since I first heard a speaker at an IT conference talk about how those of us in IT had the vendor community - the systems integrators, the packaged software vendors, the outsourcing companies - as competitors, and thus we had to treat the business as customers and win their business rather than trust to the corporate hierarchy to keep it.

In all that time, no year has gone by without that message being repeated. Yet, for years, IT groups watched their share of the business of IT in their enterprise be eroded, by business process outsourcing deals, by business areas buying packages and services around them, and by their own exit from designing and building software to simply implementing packages..."

The Tough Questions Great Managers Constantly Ask Themselves
Information Management, September 23rd, 2013
"It's all too easy to let ourselves off the hook for the performance of our teams and team members.

We often ascribe fault to others or to situations, and all too often we forget to hold ourselves accountable. Psychologists reference this as the fundamental attribution error. I describe it as lousy management.

Here are 9 sets of truly stark-naked, challenging questions that every manager must hold himself or herself accountable to asking and answering..."

Why Co-Bragging with Your CMO Is a Smart Idea
CIO Insight, September 23rd, 2013
"'Co-bragging' is the act of teaming up with a friend or colleague at work and the two of you agree to mutually tout each other's skills and accomplishments. I praise you, you praise me. The desired immediate goal, of course, is to receive appropriate recognition for a job well done.

If you haven't heard of co-bragging, you're hardly alone. You won't find the word in Merriam-Webster's, Dictonary.com, or other online dictionaries. Nor is there an entry for co-bragging in Wikipedia..."

    Features
    x
    Why Big Data Management Will Drive the Future
    Mark Hurd Keynote
    After inviting the audience to participate in sending a personalized video message to ORACLE TEAM USA as they attempt to claim the America's Cup trophy for a second time, Oracle President Mark Hurd turned his focus to the new dynamics of both customer service and big data at the Monday morning kickoff keynote at Oracle OpenWorld 2013.

    Noting that there are nearly nine billion personal devices such as smartphones and tablet PCs being used worldwide - and that number is predicted to grow to 50 billion by 2020 - Hurd's focus was on getting value out of big data. Oracle's range of products, including Oracle Exadata, Oracle Exalytics, Oracle NoSQL, Oracle Enterprise Manager, and the newly announced Oracle Database Backup Logging Recovery Appliance, is helping customers like Airbus, Thomson Reuters, Turkcell, UL, and the NYSE create a solid and extensible foundation for acquiring and making sense out of enormous volumes of data within hours rather than days or weeks.

    Everything Runs Fast
    Larry Ellison Keynote
    Oracle CEO Larry Ellison opened this year's Oracle OpenWorld 2013 conference with a series of blockbuster announcements.

    He first announced the breakthrough In-Memory Option for Oracle Database, which delivers 100X faster queries for real-time analytics, and a 2X increase in transaction processing rates. "We figured out a way to speed up query processing and at the same time at least double database transaction processing rates," he said.

    Ellison explained that Oracle's solution was to use a dual format that stores both row and column in-memory formats for the same database. Oracle can now scan billions of rows per second per CPU core, which converts join processing into fast column scans.

    Ellison then introduced the Oracle M6-32 Big Memory Machine. With a massive 32 terabytes of DRAM memory and double the cores of Oracle's previous generation M5 servers, these SMP systems use a silicon-switching network for terabyte-scale computing. Based on the new SPARC M6 processor, this is the fastest in-memory database machine available today. The Oracle M6-32 is also the core building block of the Oracle SuperCluster M6-32 engineered system, which Ellison also announced.

    SPARC
    x
    SPARC M6-32 Server Architecture
    An Oracle Technical White Paper, September 2013 (14 Pages)
    Oracle's SPARC M6-32 server is a highly reliable, easy-to-manage, vertically scalable system with many of the benefits of traditional mainframes - without the associated cost, complexity, or vendor lock-in.

    In fact, this server delivers a mainframe-class system architecture at open-systems prices. With symmetric multiprocessing (SMP) scalability from one to 32 processors, memory subsystems as large as 32 TB, and high-throughput I/O architectures, the SPARC M6-32 server easily performs the heavy lifting required by consolidated workloads.

    SPARC T5-2 Delivers Best 2-Chip MultiJVM SPECjbb2013 Result
    Benchmark designed to show modern Java server performance
    SPECjbb2013 is a new benchmark designed to show modern Java server performance. Oracle's SPARC T5-2 set a world record as the fastest two-chip system beating just introduced two-chip x86-based servers. Oracle, using Oracle Solaris and Oracle JDK, delivered this two-chip world record result on the MultiJVM SPECjbb2013 metric. SPECjbb2013 is the replacement for SPECjbb2005 (SPECjbb2005 will soon be retired by SPEC).
    SPARC T5-8 Delivers World Record Oracle OLAP Perf Version 3
    Benchmark Result on Oracle Database 12c
    Oracle's SPARC T5-8 server delivered world record query performance for systems running Oracle Database 12c for the Oracle OLAP Perf Version 3 benchmark.

    The query throughput on the SPARC T5-8 server is 1.7x higher than that of an 8-chip Intel Xeon E7-8870 server. Both systems had sub-second average response times.

    Exadata
    x
    Pinellas County Improves Financial Reporting and Transparency
    with Oracle Exalytics In-Memory Machine
    Florida County Taps In-Memory Engineered System to Maximize IT Resources, Improve Financial Decision-Making and Lower Costs

    In wake of budget cuts and public scrutiny over costs, state and local governments are constantly looking to do more with less, while still delivering valuable services to citizens. Supporting more than one million residents, Pinellas County, FL determined it could optimize its $1.7 billion annual budget by transforming its financial management infrastructure with Oracle. By running its budgeting and financial analytics software on Oracle Exalytics In-Memory Machine, the county has halved hardware costs and significantly improved budgetary decision-making, allowing officials to focus on delivering important services to its growing community.

    To maximize its resources and lower operational costs, Pinellas County, FL is using Oracle Exalytics In-Memory Machine X3-4 for financial reporting.

    IT - Storage
    x
    Top Ten Tips for Implementing a Virtual SAN
    Enterprise Storage Forum, September 23rd, 2013
    "VMware is offering a beta version of its Virtual SAN in a market full of vSAN alternatives. So let's take a look at the top do's and don'ts of implementing a vSAN..."

    • Avoid Meta-Data Controllers
    • Don't Rip and Replace
    • Watch Out for Extra Overhead
    • Pay Attention to the Big Picture
    • External SANs
    • Hypervisor Choice
    • Remember Data Protection
    • Don't Create Bottlenecks
    • Mirroring Impact
    • Third Party Tools

    Read on for details.

    When the SSD Came to Storage Land: How Flashy Upstarts got Their Break
    The Register, September 26th, 2013
    "Of all the recent changes in the storage landscape over the past five years, the most dramatic is the coming of flash-based storage devices.

    Half a decade ago, we were talking about general purpose, multi-tier arrays, automated tiering and provisioning - all coming together in a single monolithic device.

    The multi-protocol filer was going to become the dominant model; this was going to allow us to break down silos in the data centre and to simplify the estate.

    Arrays were getting bigger as were disks; I/O density was a real problem and generally the slowest part of any system was the back-end storage.

    And then came SSDs...:"

    Java Technology
    x
    Java Platform Advancements and Java Momentum
    From JavaOne 2013 Strategy Keynote
    During the JavaOne San Francisco 2013 strategy keynote, the Oracle Java Development team leaders outlined plans for the future of the Java platform and showcased the latest Java technology innovations, including the release of Project Avatar as open source technology.

    Read on for details for:

    • Java Platform, Micro Edition (Java ME) and Java Embedded Technologies
    • Java Platform, Standard Edition (Java SE)
    • Java Platform, Enterprise Edition (Java EE)

    Java Facts and Figures

    • 97% of enterprise desktops run Java
    • 9 million developers worldwide
    • #1 programming language (TIOBE Programming Community Index)
    • More than 3 billion devices are powered by Java technology
    • 80% of mobile developers target the Java platform
    • More than 125 million Java-based media devices have been deployed.
    • Over 10 billion Java Cards have been shipped since its introduction
    • There are already more than 168,000 subscribers to Java Magazine.

    Read on for details.

    Winners of the 2013 Duke.s Choice Awards
    From JavaOne 2013 Strategy Keynote
    Java is the foundation for virtually every type of networked application. As the world's largest programming and computing platform for more than 9 million developers worldwide, Java enables the efficient development and deployment of innovative applications and services. In conjunction with JavaOne San Francisco 2013, Oracle and the Java Community are recognizing 11 organizations and developers as the winners of the 11th annual Duke's Choice Awards for their creative and innovative uses of Java technology.

    The 2013 Duke's Choice Awards winners will celebrate their innovative, Java-based technologies and Java community contributions during JavaOne San Francisco 2013.

    The 11th annual Duke's Choice Award winners were selected by a multi-part process. First, the Java community was asked to submit nominations to this year's judges. Next, the judges selected the nine Duke's Choice Award winners and the five candidates for the Community Choice Award. Finally, the Community Choice Award nominees were posted on java.net, and all members of the Java community were invited to vote for their favorite candidate.

    This year's Community Choice Award was received by two companies in a tie decision. The winners were JFrog for its Bintray social network for developers, and Contrast Security for its Java Platform, Enterprise Edition (Java EE) security plug-in, Contrast.

    Read on for details of the winners.

    IT - Technology
    x
    Encryption is Still the Best Defense, Despite NSA Code-Cracking
    ComputerWorld, September 23rd, 2013
    "Though the National Security Agency spends billions of dollars to crack encryption codes, security experts maintain that, properly implemented, encryption is still the best way to secure data.

    Citing documents leaked by former NSA contract employee Edward Snowden, U.K. newspaper The Guardian and other media outlets have reported that the NSA and its British counterpart, the GCHQ, have cracked encryption algorithms that are widely used to protect online communications, banking and medical records, and corporate data.

    But Steve Weis, CTO at security vendor PrivateCore, said despite the NSA activities, the mathematics of cryptography remain very hard to crack..."

    Will 3D printing kill IP?
    ComputerWorld, September 19th, 2013
    "When 3D printing allows anyone to scan an object and create it, the concept of intellectual property and trademarks will increasingly become irrelevant.

    "IP will be ignored and it will be impossible or impractical to enforce," said John Hornick, an IP attorney with Finnegan, Henderson, Farbow, Garrett & Dunner LLP in New York and a speaker at the Inside 3D Printing Conference here today. "Everything will change when you can make anything."

    The onslaught against IP will begin with the toy industry, Hornick said..."

    Micron Ships Hybrid Memory Cube that Boosts DRAM 15X
    ComputerWorld, September 25th, 2013
    "Micron Wednesday said that it's started shipping engineering samples of its 3D Hybrid Memory Cube (HMC) to high-performance computing and network equipment makers.

    The technology changes the basic structure of DRAM by stacking layers of volatile memory dies one atop the other. Each of the layers are connected via new Vertical Interconnect Access (VIA) input/output (I/O) technology to a processor that sits at the base of the stack. Each memory layer has up to 2GB of capacity..."

    What Nanotube Computer Means To Moore's Law
    Information Week, September 26th, 2013
    "A team of engineers from Stanford University has designed a computer that relies on carbon nanotubes, offering a way around the limitations of traditional silicon semiconductors that threaten an end to performance advances.

    In a report published in Nature magazine, Stanford doctoral student Max Shulaker and his fellow students, Gage Hills, Nishant Patil, Hai Wei and Hong-Yu Chen, along with Stanford professors Subhasish Mitra and H.S. Philip Wong, describe their work..."

    MySQL
    x
    MySQL Connect Keynotes and News
    From the second edition of MySQL Connect
    The second edition of MySQL Connect took place just a few days ago, Sept 21-23, and was a great event. Thank you very much to all participants including speakers, sponsors, exhibitors and attendees! We hope you had a fantastic time and learned a lot.

    The keynotes are now available for you to watch on demand (both highlights and full length), including:

    • The State of the Dolphin (Edward Screven, Chief Corporate Architect, Oracle)
    • MySQL at Facebook (Harrison Fisk, Manager, Data Performance, Facebook)
    • Current MySQL Usage Models and Future Developments (Featuring panelists from Facebook, Twitter, LinkedIn, and PayPal)

    There was exciting news at the conference, namely the second Development Milestone Release of MySQL 5.7, along with new early access features, as well as the General Availability of MySQL Enterprise Monitor 3.0.

    A number of blogs have been posted about what's new in MySQL 5.7. They are aggregated on Planet MySQL.

    Cloud Computing
    x
    Oracle Delivers Enhancements to Industry's Most Complete Cloud-Enabled Customer Experience
    New Social, Mobile and Interactive Capabilities Support Sales, Marketing, Commerce and Service Organizations
    New Social, Mobile and Interactive Capabilities Support Sales, Marketing, Commerce and Service Organizations

    By connecting every interaction across the entire customer lifecycle, organizations can convert customers into brand advocates by delivering exceptional experiences. To help organizations capitalize on this opportunity for revenue growth, Oracle announced significant enhancements to the world's most complete cloud-enabled Customer Experience (CX) solution. The new enhancements to Oracle CX support sales, marketing, commerce and service organizations by delivering a more interactive, social and mobile experience.

    Extending the most complete cloud-enabled customer experience portfolio in the industry, Oracle has delivered updates to the entire Oracle CX portfolio that are available immediately to customers in the Oracle Cloud.

    Oracle Adds 10 New Services to Oracle Cloud
    Expanding the Industry's Most Comprehensive Cloud Portfolio
    As organizations of all sizes move more of their information systems to the cloud, Oracle is expanding the number of Oracle Cloud services to strengthen its position as the industry's most comprehensive public cloud. Oracle Cloud offers a broad range of modern, functionally rich and integrated services running in a secure, enterprise and standards-based cloud platform. With new Application, Platform, and Infrastructure Services announced today, Oracle is helping customers and partners further capitalize on the power of cloud computing.

    Extending the industry's broadest and most advanced cloud portfolio, Oracle introduced 10 new Oracle Cloud services for its customers and partners.

    The new services expand Oracle's comprehensive portfolio of Application, Social, Platform and Infrastructure Services and are all available on a subscription basis.

    IT - Cloud
    x
    Vendor to IT: You're Blocking the Wrong Services
    Network World, September 26th, 2013
    "IT departments have only a loose handle on what types of cloud-based services are being used within their organizations, and many services are being used without the IT department's blessing. Meanwhile, in an attempt to curb this behavior, IT departments commonly block popular cloud-based services, but allow potentially more high-risk services to be used unfiltered.

    Those are findings from a review of more than 300 organizations by security vendor SkyHigh Networks. CEO and co-founder Rajiv Gupta says what surprised him most was how many cloud-based services are being used and how few of the potentially dangerous ones are being blocked..."

    10 Things to Know Before Moving E-Discovery to the Cloud
    Information Management, September 24th, 2013
    "The adoption of cloud computing has been an undeniable force spreading quickly across all segments of the technology market.

    In the legal industry, cloud or software as a service accounted for 49 percent of all e-discovery software revenues tracked in 2011.."

    • Actively involve all stakeholders across multiple departments
    • Document and define areas of potential cost savings
    • Evaluate the e-discovery platform first and the cloud options second
    • Benchmark your existing e-discovery processes including data upload, processing, review and export
    • Learn the differences between public and private clouds
    • Assess potential - and realistic - risks associated with security, data privacy and data loss prevention
    • Develop an implementation plan, including an internal communication strategy
    • Leverage the success or adoption of other SaaS solutions in the organization to lessen resistance
    • Run a pilot on a small project before moving to larger, mission-critical matters
    • Understand you are still the ultimate custodian of all electronically stored information

    Read on for details.

    Cloud Broker Services: How the Role of Cloud 'Middleman' Is Evolving
    SearchCloudProvider, September 18th, 2013
    "The cloud broker role is taking on new meaning as the cloud market matures. Cloud customers are no longer looking for discrete cloud services, but rather several cloud offerings -- potentially across different providers -- to meet their unique business requirements. But customers can't blend together disparate cloud services on their own.

    Cloud broker services have spun off into three unique roles in response to these new demands: the cloud aggregator, the cloud service broker enabler, and the cloud customizer..."

      Cloud Security Firms: NSA Spying A Double-Edged Sword For Business
      CRN, September 20th, 2013
      "Cloud security firms are growing increasingly concerned about the NSA's domestic surveillance and encryption cracking practices, which they say could have a negative impact on business.

      Recent reports claim the U.S. National Security Agency has cracked the majority of encryption technologies used to protect online data as part of its widespread Internet surveillance program.

      Cloud security firms say the NSA's practices are bad for business because it undermines customer confidence in moving data to the cloud..."

      Disaster Response Simulation Shows How to Share Cloud-Based Geospatial Data
      GCN, September 18th, 2013
      "A government/industry consortium has demonstrated how to rapidly assemble and manage a cloud-based disaster response infrastructure that will let emergency responders share geospatial and other critical data despite having disparate IT systems.

      On Sept. 12, the Network Centric Operations Industry Consortium led a real-time demonstration for the National Geospatial-Intelligence Agency in McLean, Va., where 150 government and business leaders watched a disaster-response simulation based on the 2010 Haiti earthquake.

      In an effort to improve communication in disaster response, NGA wanted to see how industry can deliver open standards-based geospatial data to first responders..."

      Dropbox File Brouhaha: Use Case Is The Issue
      Information Week, September 17th, 2013
      "Some are shocked by the revelation last week that Dropbox is indeed opening files that are stored in its cloud-based file service. It's now clear that there was a good reason for this -- Dropbox was processing a word processing file in an automated manner in order to provide an additional feature to users. Those who are shocked simply haven't thought through what the use case is.

      From the time that cloud technology hit the streets, responsible cloud proponents were cautioning that not every use case for cloud was an appropriate one. Should you put your city government emails in Google mail? ..."

      Employees Keep Using Personal Cloud Services to Store Work Documents
      Help Net Security, September 25th, 2013
      "Nearly 30% of employees are using personal cloud services to store work-related documents, according to a survey conducted at recent technology trade shows in which 5% of respondents also admitted to uploading confidential data to their personal cloud accounts.

      The survey of over 120 companies was conducted by Varonis at Microsoft TechEd events in June. It was aimed at uncovering how much confidential information is being leaked beyond corporate walls. One of the leading causes for data leakage is from employees who upload sensitive, work-related data to their personal cloud accounts..."

      How to Ensure Rogue Cloud Services Don't Leave You in the Lurch
      Network World, September 26th, 2013
      "Bring Your Own Cloud (BYOC) is often associated with personal services like Dropbox, but internal business units have also been known to sign up for cloud services without IT's knowledge, raising questions about everything from security to business service expectations.

      But if you have a plan in place when it comes to business units accessing external cloud services for projects, IT and the business can get what they want without jeopardizing services or security. Here are the key things to consider:..."

      How to Provision Users in a Cloud World
      Information Week, September 26th, 2013
      "When subscribing to multiple SaaS offerings serving many users, it gets complicated quickly. Here's how to address the problem now and in the future..."

      "...there's a fly in the ointment of wholesale SaaS adoption. I first noticed this when trying to commit some code to a Bitbucket repo, only to find that, while my Google account allowed me to log in, I had not given the necessary permissions to commit. When I went in to talk to our de facto system administrator, we found that finding and fixing this permissions problem was quite involved..."

      Nirvanix Killed By Unforgiving Cloud Economics
      Network Computing, September 19th, 2013
      "In what is just about every public cloud user's worst nightmare, cloud storage pioneer Nirvanix quietly informed its customers and reseller partners that it would close its doors at the end of September. Customers have two weeks to migrate all their data off the Nirvanix platform or risk losing that data forever.

      Nirvanix concentrated on large customers with petabytes of storage, so customers face the daunting prospect of migrating all that data into their data centers or to an alternative cloud provider..."

        Nirvanix Shutdown has Cloud Users Wondering Who's Next
        ITWorld, September 24th, 2013
        "Do you have data stored on Nirvanix's cloud storage? Guess what -- it's shutting down, and you could be screwed. Customers have been given two weeks to migrate their data elsewhere.

        The word came to me last week from a reporter calling to ask for a quote. That was followed by a few worried discussions with companies that use cloud-based storage -- it's very concerning to get those kinds of calls from users because the public cloud requires a certain amount of trust to be viable..."

          NSA Spying Fiasco Sending Customers Overseas
          ComputerWorld, September 23rd, 2013
          "The spectacle of National Security Agency contractor Edward Snowden exposing the covert spying nature of US federal officials has sent ripple waves through the technology industry -- especially in the outsourcing arena.

          Experts predict the NSA fiasco could result in the loss of business for some hosting vendors, but it's hard to say exactly what the impact has been or will be..."

          Organizations Face Hurdles Deploying Clouds
          Baseline, September 16th, 2013
          "These are heady days for the cloud, according to a recent survey from TheInfoPro/451 Research Market Monitor. There's considerable interest among organizations in launching internal cloud resources, as well as in deploying infrastructure as a service (IaaS) and software as a service (SaaS). Overall, the worldwide cloud market is growing at a 36 percent clip (as a compounded annual growth rate, or CAGR), and it's expected to reach $19.5 billion by 2016..."

          • Financial Stake
          • Lumped Sum
          • Inside Job
          • Plan and Advance
          • Foundation Focus
          • Soft Sell
          • Tech Issues
          • Non-Tech Issues
          • Biggest Non-IT Roadblocks
          • Top Cloud-Related Pain Points

          Read on for details.

          Your Cloud Computing SLA Can't Be a Marketing Gimmick
          SearchCloudProvider, September 23rd, 2013
          "Every industry is guilty of perpetuating some kind of marketing gimmick, but it's in a cloud provider's best interest to ensure that its service-level agreement (SLA) isn't one of them.

          Offering aggressive cloud computing SLAs to customers is certainly a way to gain trust and secure an edge over competitors, but providers have to be willing and able to pay up if they fail to meet the terms of an SLA; otherwise, the entire operation could become unprofitable. SLAs have the potential to spark adoption and keep customers happy, but if mishandled, they can result in dire consequences..."

          IT - PM
          x
          The Business Impact of Failed IT Projects
          CIO Insight, September 23rd, 2013
          "It's hard to think of a single significant business process these days that is not dependent on IT. As a result, any time there is a problem with IT, the cascading effects on the business can be catastrophic. A recent global survey of 304 executives conducted by Intellitrends on behalf of Compuware finds that the average cost of an IT failure from a business perspective is $10.8 million, which doesn't include longer term effects that could include loss of market share and damaged brand equity..."

          • Top Three Goals Driving IT Investments
          • Most Perceived Technology-Critical Areas
          • How Often Are There IT Issues That Affect Performance or Productivity?
          • The Frequency of Technology Failures
          • Last Significant IT Failure
          • Which Areas Suffer From Tech Performance Issues?
          • Causes of IT Failures
          • Action Taken in Response to IT Failure
          • Length of Time to Return to Normal Operations
          • Does Your Company Collect and Quantify the Impact of IT Failures?
          • Cost Impacts That Are Quantified
          • Long-Term Business Impact

          Read on for details.

          You Are Not Over Budget -- You Underestimated
          Dark Reading, September 25th, 2013
          "We all know horror stories of IT projects that run over budget, deliver the wrong result, or simply fail to cross the finish line at all. I bet you've been involved with such projects.

          Even if businesses and governments rarely admit it publicly, IT disasters are more common than IT successes, and it's a rare project that actually delivers a great solution on time, within budget..."

            IT - Networks
            x
            Protecting The Network From Bring-Your-Own Vulnerabilities
            Dark Reading, September 25th, 2013
            "Companies that allow employees to use their own devices for work inherit their employees' vulnerabilities. How should companies secure networks in the age of BYOD?

            The bring-your-own-device (BYOD) business model is here to stay, much to the chagrin of security professionals. The arguments for allowing employees to work with company data on their personal devices and bring those devices into the workplace are almost unassailable: increased productivity, flexible working hours, and a more agile business..."

            Where do SDNs Fit in the Data Center?
            ComputerWorld, September 17th, 2013
            "While most of the conversation about software-defined networks (SDNs) focuses on their impact on the data center -- virtualizing networks to cut hardware and personnel costs, reduce on-site footprints, remove bottlenecks and traffic flow problems and make network management easier -- the true benefit of SDNs may lie outside the data center.

            The true value of SDNs may be for managed service providers (MSPs) and for enterprises with multiple branch offices, says Kurt Marko, a networking consultant and analyst..."

            IT - Operations
            x
            Facebook: Data Centers Do Not Need Air Conditioning
            v3.co.uk, September 20th, 2013
            "Data centre operators can dramatically cut energy costs and their impact on the environment by doing without air conditioning, according to Facebook. The findings come from the firm's Open Compute Project, aimed at making the social network's IT operations as efficient as possible. Facebook said that it uses "100 percent outside air" to cool all of its own data centres, and that other data centre operators are typically over-cooling their facilities when they do not really need to do this..."
            Facebook Tries Putting Spuds in Servers to Make Them More Eco-Friendly
            TechWorld, September 20th, 2013
            "Facebook revealed today that it tried using potatoes in its servers to make them more environmentally friendly.

            Under the Open Compute Project (OCP), Facebook is on a mission to improve the efficiencies of the servers, storage devices and data centres that are used to power its social networking platform. Any breakthroughs that the company makes are shared with the rest of the OCP community so that they too can improve their own efficiencies and reduce the overall environmental impact of IT on the world..."

            Three Ways to Recycle Your E-waste
            Business 2 Community, September 19rd, 2013
            "You probably have a few old cell phones stashed in a junk drawer. Maybe you or someone you know has taken a hammer to a computer and tossed it in the trash, right beside that big box TV. But why let electronics go to waste? By recycling your electronic waste, or e-waste, you can help people, support nonprofits and preserve the environment.

            Corporations are doing their part to protect the environment through e-waste cleanup initiatives, like Recycling Rallies. These rallies are being held throughout the country and allow people to get rid of their electronic 'junk' without turning it to waste..."

              Why General Motors Went Green (But Not Cloud)
              Information Week, September 20th, 2013
              "General Motors is in the midst of shutting down 23 data centers worldwide and moving its computing into two modern data centers that the company is building in Michigan. The choices GM makes along the way are interesting for anyone curious about the future of large-scale business computing.

              One decision GM made is to go green..."

                Utility Sets IT Department on Path to Self-Destruction
                ComputerWorld, September 23rd, 2013
                "Northeast Utilities has told its IT employees that it is considering outsourcing tech work to India-based services providers -- a plan that puts as many as 400 IT jobs at risk.

                That's a scary prospect for anyone to face, but the company, which is based in Connecticut and Massachusetts and operates New England's largest energy delivery system, is also saying that a final decision has not been made. Where does that leave the utility's IT employees and IT department?..."

                IT - Security
                x
                7 Ways to Beat Fingerprint Biometrics
                IT World, September 20th, 2013
                "Apple dropped $356 million to buy the biometric security firm Authentec back in July, 2012. So nobody was surprised when the latest version of the iPhone, Apple's 5S, introduced finger scanning technology to replace traditional alphanumeric passwords... The truth is that fingerprint scanning technology, tools and implementations vary widely. Despite vendor claims, there's a long history of hackers fooling the devices with surprisingly simple hacks. Here are some ways hackers have figured out to fool them..."

                • Rubber cement or Silicon Gel
                • Gelatin (aka Gummi finger)
                • Tape
                • A photocopy
                • Cadaver finger
                • Printed circuit board
                • Software-based attacks

                Read on for details.

                3 Steps To Keep Down Security's False-Positive Workload
                Dark Reading, September 20th, 2013
                "A high rate of false positives is a problem that affects many types of security systems, but a few proactive steps can help cut them down to size

                Security needs to be better automated, but while detecting attackers is great, all too often automation means that security teams are left with chasing down a list of security events that turn out not to be an attack but unexpected system, network, or user behavior..."

                How to Implement and Nurture a Security Compliant Culture
                Business 2 Community, September 24th, 2013
                "Now more than ever, it's important to be compliant with industry and government regulations. For the last several years, governments and industry groups on both sides of the Atlantic have been increasing the level of regulation for organisations, forcing them to prove that they have the proper controls in place.

                What happens if an organization doesn't comply with security rules? They could be subject to expensive fines: breaching the Payment Card Industry (PCI) security standards imposed by credit card companies can result in fines of up to $100,000 each month, for example..."

                Five Habits IT Security Professionals Need To Break
                Dark Reading, September 25th, 2013
                "If security professionals want to take their craft in new directions, then they need to stop thinking in old ways, experts said in a panel here Tuesday.

                In a panel, entitled "Cyber Security -- Where the Industry Is Headed Next Year and Beyond," seven industry leaders said security is sometimes stuck in a continuous loop because professionals continue to make the same mistakes and sometimes have trouble thinking in new ways..."

                • Treating IT security as something that's separate from the business
                • Saying "no"
                • Preaching to the choir
                • Confusing security and compliance
                • Failing to reach out to students and young professionals

                Read on for details.

                How To Train Your Users
                Dark Reading, September 10th, 2013
                "Let's face it: Getting users to understand and practice good security is hard. Really hard. It would be difficult enough if the technology environment remained constant for a while, but we all know how often that happens.

                That's why it's especially important that we focus on raising user awareness of basic security concepts that are independent of specific technologies. One example is helping people understand what needs to be protected and why. I have encapsulated the basics of this in a mnemonic I call 'The Four Cs.' ..."

                Mother of All Data Breaches Shows Need for Layered Security
                CIO Today, September 26th, 2013
                "The hacks into the internal systems of Lexis Nexis and Dun & Bradstreet merely reinforce the notion that knowledge of personal information -- on its own -- should not be used for conclusive authentication of the user. A layered security approach, rather than relying on any single technology or approach as the silver bullet, according to one security expert..."
                The International Security Community Should Embrace the STIX and TAXII Standards
                Network World, September 20th, 2013
                "Most experts agree that security technologies based upon signature files (DATs) alone can no longer provide adequate security protection. Why? There is simply too much malware volume so it's harder for the security industry to keep up with the bad guys. Furthermore, polymorphic and metamorphic malware is designed to change its appearance. You can't match a pattern if the pattern keeps changing..."
                Choosing, Managing, and Evaluating a Penetration Testing Service
                Dark Reading, September 20th, 2013
                "Hiring a security consulting company to perform penetration testing can make a company more secure by uncovering vulnerabilities in security products and practices -- before the bad guys do. It can also be an extremely confusing and frustrating experience if deliverables don't meet the needs or requirements of the business units. Understanding and properly managing relationships with outsourced security providers can be the difference between an expensive mistake and a well-executed exercise in security risk management..."
                Gang Exploits Both Physical and System Security During Bank Robbery
                CSO Online, September 20th, 2013
                "The Metropolitan Police Central e-Crime Unit (PCeU) arrested eight men, aged between 24 and 27, on Thursday, in connection to a robbery from the Swiss Cottage branch of Barclays Bank in April. According to police statements, the theft resulted in the loss of 1.3 million pounds ($2 million), but the bank managed to recover most of the stolen funds.

                In an unusual twist, one rarely mentioned or seen when it comes to financially motivated cybercrime, the men allegedly mixed physical penetration and social engineering with system compromise in order to carry out their crimes..."

                  IT - Careers
                  x
                  10 Tips to Prepare for an IT Job Video Interview
                  CIO, September 24th, 2013
                  "Video interviews, while not new, are becoming an increasingly mainstream option in IT as companies look for ways to shorten the hiring cycle and lower costs. According to research from the Aberdeen Group, 32 percent of organizations participating in firm's talent acquisition study invested in video interviewing this year, compared to 21 percent in 2012.

                  More employers, recruiters and hiring managers are turning to this technology because of the time involved in finding the perfect candidate. 'Everybody is out of time. Bringing somebody in for a face-to-face interview is time-consuming -- not just the interview, all the logistics of synchronizing calendars, getting settled &. By comparison, the video interview is easy and flexible. Here in NYC, just clearing the candidate for entrance into the office building requires a few minutes,' says Donald Burns, a resume writer, executive career coach and strategist..."

                    For Security Pros, Maintaining Credibility Means Walking A Fine Line
                    Dark Reading, September 16th, 2013
                    "In the old fable, the Boy Who Cried Wolf was capricious and stupid. He cried "wolf" the first two times because he wanted to see who would come. The third time, when the wolf actually appeared, he cried out and no one came. He became wolf chow.

                    But what if the Boy Who Cried Wolf had actually seen a wolf the first two times? Would help still have come the third time? What would have happened, in that wolf-infested forest, if he had cried five, six, seven times?"

                      Life Lessons from Apple.s Forgotten Founder
                      IT World, September 18th, 2013
                      "If you're much of an Apple fan, or a tech history buff, you probably know the story of Ronald Wayne. He was one of the three founders of Apple computer in 1976, along with Steve Jobs and Steve Wozniak. After just 12 days, though, he cashed out his 10% share of the partnership for $800, a stake which would eventually be worth $35 billion.

                      You'd think someone who missed out on a fortune might be bitter or regretful, but Wayne seems far from it in an interview he recently gave to NextShark..."

                        What Keeps IT Pros Up at Night?
                        Help Net Security, September 19th, 2013
                        "A new EiQ Networks survey reveals several concerns among IT professionals. The survey reflects responses from 272 IT decision makers including security managers, and network and systems engineers across a number of industries including healthcare, government, financial services and retail, among others.

                        The survey highlights that regulatory compliance to protect corporate data continues to be one of the greatest challenges faced by businesses and organizations across all industries..."

                        Ten Ways You Can Lose a Job Promotion
                        Baseline, September 18th, 2013
                        "Even if you're a star performer, that doesn't mean you're a lock for a promotion. There are a number of behaviors that will red-flag an employee's suitability for advancement, according to a recent survey from CareerBuilder..."

                        • Passing the Buck
                        • Time Challenged
                        • Big Fib
                        • False Ownership
                        • Early Dismissal
                        • Running a Tab
                        • MYOB
                        • What Not to Wear
                        • Potty Mouth
                        • Wall Flowers

                        Read on for details.

                          What to Do Before and After a Job Interview
                          Baseline, September 24th, 2013
                          "The interview continues to be the essential make-or-break stage of any job hunt. At that point, you've already proven yourself on paper and now have to prove yourself in a face-to-face meeting. A great resume is not enough: Employers are reluctant to hire candidates who appear uninformed or unprofessional during the interview - or seem to be a generally bad fit for the job and the organization..."

                          • Before: Do Your Homework
                          • Before: Anticipate Questions
                          • Before: Acknowledge Shortcomings
                          • Before: Interview the Interviewer
                          • Before: Dress the Part
                          • Before: Plan, Plan, Plan
                          • After: Get Business Cards
                          • After: Send a "Thank You" Note
                          • After: Ask How to Follow Up
                          • After: Avoid Stalking
                          • After: Be Concise and on Target

                          Read on for details.

                            IT - Social Media
                            x
                            Firms Fined $350,000 After Yogurt Sting Uncovers Review Rigging
                            The Register, September 24th, 2013
                            "A year-long investigation by New York prosecutors has found 19 local businesses guilty of faking reviews on sites such as Google and Yelp, a practice that has now earned them over $350,000 in fines and penalties.

                            As part of "Operation Clean Turf," investigators from the office of the New York Attorney General posed as yogurt shop owners from Brooklyn, and asked leading search engine optimization (SEO) companies for help in improving their presence online..."

                            Want to Protect Your Corporate Data and Manage Millennials? Better Rethink That Social Media Policy
                            CSO Online, September 20th, 2013
                            "Want to protect your corporate data and manage Millennials? Better rethink that social media policy...

                            Employee use of social media could mean a world of trouble for your organization, so developing a better social media policy may be the way to go..."

                              Servers
                              x
                              SPARC M6-32 and Oracle SuperCluster M6-32
                              Oracle's Big Memory Machines are Ideal for In-Memory Applications and Consolidation
                              Oracle's new systems dramatically redefine the price/performance equation in the high-end server market, offering customers entry-level price/performance, while maintaining extreme performance and the highest levels of availability. SPARC M6-32 servers with up to 32 terabytes of memory and up to 384 processor cores can run entire applications and databases in-memory to deliver unprecedented performance. Oracle SuperCluster M6-32 is Oracle's fastest and most scalable engineered system and integrates SPARC M6-32 servers with Exadata Storage Servers optimized for Oracle Database performance.

                              Oracle announced the SPARC M6-32 server and SuperCluster M6-32 engineered system, based on new 3.6 GHz, 12-core SPARC M6 processors.

                              Oracle SuperCluster M6-32 running Oracle Solaris demonstrates 5x better price/performance than the IBM Power 795 based solution. With 32 TB of main memory, the SPARC M6-32 has 2x the memory capacity of IBM's largest Power server.

                              IT - Database
                              x
                              How to Use Visualization Tools to Derive Data Intelligence from Unstructured Data
                              Network World, September 19th, 2013
                              "Like their bigger brethren, mid-sized companies are struggling to manage tens of terabytes of data about their customers, markets and products - a veritable gold mine of information, if only they knew how to excavate it.

                              In the last two years alone, businesses have generated more data than we saw in the previous 60 years. Thanks to innovations in deduplication, compression, incremental increases in hard drive density and falling solid state drive (SSD) prices, companies are finding ways to store the massive influx of data. The real challenge, however, goes beyond storage..."

                              IT - Backup
                              x
                              Rationalizing Backup Licensing Strategies
                              Storage Switzerland, September 24th, 2013
                              "The backup process has a myriad of costs associated with them. There is the obvious cost of the hardware - backup servers, backup storage and network infrastructure. There is also the cost of operations to manage the backup process. One of the biggest costs and one that is seldom addressed is the cost associated with the backup software itself; upfront purchase price, upgrade and expansion costs as well as on going support and maintenance costs..."
                              OpenStorage
                              x
                              Keeping up with Leading Edge OpenStorage Technology
                              OpenStorage Summit 2013, Santa Clara Convention Center, October 23-24, 2013
                              Learn more about how cloud hosting companies and others in multiple industries are using the best combination of OpenStorage technologies in their data centers, at the OpenStorage Summit. Presentations by industry, senior IT and business leaders will cover lessons learned, financial impact, comprehensive solutions for performance, disaster recovery, archiving and so much more. Get the latest on object storage. Why is it so critical? What are the benefits? More than 25 sessions, exhibits and lots of networking opportunities. Agenda details.

                              OpenStorage Summit 2013

                              • Dates: October 23-24, 2013
                              • Location: Santa Clara Convention Center

                              Nexenta has arranged a $200 full conference pass for OpenStorage Summit! When registering use priority code Nexenta. Registration.

                              IT - Mobile
                              x
                              Developing a Strategy to Manage Mobile Devices
                              Baseline, September 18th, 2013
                              "Savvy enterprises are developing a strategic plan for managing mobile devices in order to maximize business opportunities and minimize IT challenges and risk.

                              As mobility has taken root and the walls of the workplace have disappeared, there has been a profound shift in the way organizations approach information technology. Workers are no longer chained to desktops, and there's no need to track down an Internet connection. Ubiquitous WiFi and cellular networks have transformed enterprise communication and collaboration into a 24x7x365 proposition..."

                                Mobile Data Security Remains Weak
                                Help Net Security, September 19th, 2013
                                "Coalfire surveyed 400 individuals working in a variety of industries across North America who are not affiliated with their company's IT department. Survey findings show that companies are not taking steps to educate employees on mobile device security to help protect company data.

                                The increasing popularity of smartphones and tablets underscores the importance of corporate data protection on these devices..."

                                Execs Say IT Is Too Slow to Deliver on Mobile
                                Baseline, September 23rd, 2013
                                "A growing number of enterprises are in a hurry to move into customer-benefiting mobile initiatives. However, many top business decision-makers feel that IT can't respond rapidly enough to accommodate the swift speed of the market, according to one finding from a commissioned study conducted by Forrester Consulting on behalf of OpenMarket...:"
                                • Agenda Item
                                • Need for Speed
                                • Unclear Commitment
                                • Staffing Shortfall
                                • Top Mobile Strategic Priorities
                                • DIY
                                • External Affairs
                                • Top Tech Deployed for Mobile Services
                                • Critical Challenges of Mobility
                                • Opportunity Knocking

                                Read on for details.

                                  IT - Big Data
                                  x
                                  Five Approaches to Extract Value from Big Data
                                  Information Management, September 23rd, 2013
                                  "In the age of big data, the world's most successful companies will be data-driven enterprises. That is to say, data will be hardwired into their decision-making through automated processes that enable them to move with great speed and agility. To reach this level of performance, however, many businesses will need to overcome three significant challenges, which in many cases are now holding them back..."
                                  Big Data Investments Continue to Rise
                                  Help Net Security, September 26th, 2013
                                  "Big data investments in 2013 continue to rise, with 64 percent of organizations investing or planning to invest in big data technology compared with 58 percent in 2012, according to a survey by Gartner. However, less than eight percent of survey respondents have actually deployed..."

                                  "The hype around big data continues to drive increased investment and attention, but there is real substance behind the hype," said Lisa Kart, research director at Gartner. "Our survey underlines the fact that organizations across industries and geographies see 'opportunity' and real business value rather than the 'smoke and mirrors' with which hypes usually come."

                                  Gartner: 64% of Organizations Looking at Big Data Projects this Year
                                  Network World, September 23rd, 2013
                                  "Gartner Monday said its survey of 720 companies asked about their plans to invest in Big Data gathering and analysis show that almost two-thirds are funding projects or plan to this year, with media/communications and banking firms leading the way.

                                  More than one-third of media and communications companies said they have already invested in Big Data projects, according to Gartner, which said these companies are trying to better understand customer needs in order to make sure their businesses are pointed in the right direction..."

                                  Application Developers: Ignore Big Data at Your Own Peril
                                  Information Management, September 24th, 2013
                                  "Don't make the mistake of thinking that big data is only about analytics for business intelligence. Big data is the fuel, and predictive analytics the engine, that will power the next generation of predictive applications, as I wrote in a prior post (Predictive Apps Are The Next Big Thing In App Development). Sure, there are absolutely many exciting use cases in traditional business intelligence. But the same knowledge, insight, and predictive models gained from big data analytics can transform boring business and consumer apps with the ability to design and develop predictive apps. What are predictive apps?

                                  Predictive apps anticipate user intent and provide the right functionality and content on the right device, at the right time, for the right person by continuously learning about them..."

                                  IT - BYOD
                                  x
                                  BYOD Security Issue: Your Employees Are Likely Using Public Wi-Fi
                                  IT Business Edge, September 19th, 2013
                                  "According to a new survey from GFI Software, 83 percent of the 1,000 office workers surveyed reported using their mobile device on public transportation, and many of them are using the public Wi-Fi if available. The survey also found that 95.6 percent of respondents acknowledged that they used open, public Wi-Fi connections at least once a week to carry out work-related tasks such as sending and receiving email, reviewing and editing documents, and accessing company servers. Another 34.2 percent of those respondents reported they accessed public Wi-Fi at least 20 times per week during their commutes, with some employees saying they connect more than 70 times per week..."
                                    'It's A BYOD World' - with a Catch -- At New York Law School
                                    Network World, September 20th, 2013
                                    "Bring Your Own Device is fine, says technical director, but no network access without a clean machine...

                                    The "Bring Your Own Device" trend can cause a lot of disruption, but not at New York Law School, the downtown Manhattan college where students, faculty and visitors have always been allowed to use any mobile device they want on the wireless network. But that doesn't mean anything goes..."

                                      Top10
                                      x
                                      Top Ten Articles for last few Issues
                                      Vol 187 Issues 1, 2 and 3 ; Vol 186 Issues 1, 2,3 and 4; Vol 185 Issue 5
                                      We track how frequently each article is viewed on the web site to determine which the readers consider the most important. For last week, the top 10 articles were:

                                      • Top Tips for Updating Solaris 11 Systems
                                      • OpenZFS: the truly open source successor to the ZFS project
                                      • Cloud Building with Oracle Solaris 11
                                      • Oracle ZFS Storage ZS3-2 Beats Comparable NetApp
                                      • Oracle Fiscal Q1 Earning
                                      • Airbus Selects Oracle Secure Global Desktok
                                      • Take a quick tour of Oracle Database X3-2
                                      • Unpack Software-Defined Storage at OpenStorage Summit (@openstorage)
                                      • Intel and Oracle: 21 Years Of Partnering to Deliver Innovation
                                      • Java Spotlight Episode 145: Marcus Hirt on Java Mission Control @hirt

                                      The longer version of this article has list of top ten articles for the last 8 weeks.

                                        IT - Server
                                        x
                                        The ROI of Server-Side Caching
                                        Storage Switzerland, September 23rd, 2013
                                        "Implementing server-side caching with the right solid state disk (SSD) can be like conducting a 'surgical strike' on storage performance problems. Installing this combination of hardware and software can eliminate the storage roadblock to increased transactions per second, while not requiring changes to the rest of the storage infrastructure. But this performance precision comes at a price..."
                                        Debunked! 5 Myths of Thin Client Computing
                                        InfoWorld, September 25th, 2013
                                        "In this week's New Tech Forum, Flynn debunks five common myths about thin client computing today and touts the improved capabilities of modern thin client systems. If you haven't considered thin client computing recently, Flynn thinks it might be time for another look. -- Paul Venezia

                                        Contrary to popular belief, the thin client market is growing. With companies like HP selling more than 1 million thin client devices each year to hospitals, libraries, government agencies, and retail stores, you have to wonder why misconceptions linger about these devices..."

                                        • Thin clients are the dinosaurs of client computing and suffer a slow adoption rate
                                        • Mobile thin clients are impossible to secure
                                        • Thin clients deliver a poor user experience
                                        • Investment and maintenance is more expensive than with traditional PCs
                                        • Thin clients are a huge power suck

                                        Read on for details.

                                        Trending in
                                        Vol 231, Issue 4
                                        Trending IT Articles