News about Oracle's Solaris and Sun Hardware
System News
Oct 7th, 2013 — Oct 13th, 2013 Generate the Custom HTML Email for this Issue
System News System News for Sun Users
Volume 188, Issue 2 << Previous Issue | Next Issue >>
Sections in this issue:
click to jump to section

Oracle Exalytics T5-8
High-end Engineered System
Oracle has added Exalytics T5-8 to the Exalytics Family. Built using SPARC T5-8 server, Exalytics T5-8 is a high-end Engineered System that delivers extreme performance for BI and EPM. It offers outstanding virtualization capabilities and is ideal for multi-departmental, shared analytic infrastructure.

Learn more.

IT - Storage
Are PCIe SSDs Breaking Your Storage Network? . And How to Stop It.
Storage Switzerland, October 7th, 2013
"Solid state drive (SSD) solutions using flash are becoming the 'go to' options for addressing storage performance bottlenecks. And within that technology category, PCIe based SSDs could represent the state of the art. By locating the flash in the server they can eliminate the latency of the storage network but can also re-introduce the storage silos that storage networking was designed to eliminate. This begs the question: 'Is there a way to leverage server-side PCIe SSDs without breaking the storage network?'..."
The Million IOPS Data Center
Storage Switzerland, September 30th, 2013
"What applications can benefit from millions of IOPS right now? A high frequency trading (HFT) environment probably tops the list. HFTs are fast paced, high volume financial trading applications that require powerful compute workstations running complex programs that are analyzing a variety of real-time data source and then running sophisticated algorithms against those data sources to make massive financial trading decisions..."
    Enterprise Storage Capacity More Than Doubled Past Two Years
    Storage Newsletter, October 4th, 2013
    "TheInfoPro, a service of 451 Research LLC, released its latest Storage Study, revealing that enterprise storage capacity is more than doubling every two years, exceeding the rate of Moore's Law.

    Consequently, automated tiering is the hottest storage technology in 2013, as it helps keep budgets under control by enabling the use of lower-cost capacity. As enterprises struggle to define an external cloud strategy, the on-premises cloud model is gaining favor..."

    The LUN Must DIE. Are You with Me, Storage Bods?
    The Register, October 4th, 2013
    "I know people think that storagebods are often backward thinking and hidebound by tradition and there is some truth in that. But the reality is that we can't afford to carry on like this.

    Demands are such that we should grasp anything which makes our lives easier.

    However, we need some help with both tools and education. In fact, we could do with some radical thinking as well - some moves which allow us to break with the past. What I am going to suggest almost negates my previous column - but not entirely.

    The LUN must die. I cannot tell you how much I loathe the mere existence of the LUN.

    Why, you ask?..."

      IT - Technology
      Gartner: Top 10 Future Strategic IT Predictions
      Network World, October 7th, 2013
      "Gartner opened its Symposium/ITxpo extravaganza with a bit of good news: Worldwide IT spending is forecast to reach $3.8 trillion in 2014, a 3.6% increase from 2013.

      But with that growth there are big changes afoot and as Gartner will, it took a look at what some of the biggest changes - including the impact of 3D printing, automation and security threats -- will mean for anyone involved in IT..."

      Proteins Help Researchers Build A Memory Device
      Chemical & Engineering News, October 7th, 2013
      "In recent years, researchers have explored using proteins as scaffolding to build electronics at the nanoscale. Compared to current fabrication techniques, using proteins to arrange nanoparticles onto surfaces could enable the design of smaller memory devices and more complex, multilayer electronics. Now, researchers in Japan and Taiwan have demonstrated the first working flash memory device made using this biological approach ..."
      solaris10 Brand Zone Clusters
      released in Oracle Solaris Cluster version 4.1
      Krishna K Murthy writes, "The solaris10 brand zone cluster, released in Oracle Solaris Cluster version 4.1 software, provides a virtualized Oracle Solaris 10 cluster environment in an Oracle Solaris 11 configuration. Using this feature enables customers to run or migrate cluster applications that are deployed on the Oracle Solaris 10 operating system, without any modification to the application.

      The following diagram depicts the coexistence of Oracle Solaris 11 and Oracle Solaris 10 cluster applications, which are isolated by using the zone cluster feature..."

      Cloud Computing
      Demand Analysis Leverages Oracle Cloud Platform Services
      Delivers Customized, Highly Scalable Demand Analysis Application
      Service organizations need to have a clear understanding of their clients' needs to improve services, increase customer satisfaction and lower costs. To help its clients meet this challenge, Demand Analysis, a fast growing technology company, selected Oracle Database Cloud Service to provide an affordable and scalable platform as a service to deliver its new software application to market. With Oracle Database Cloud Service, Demand Analysis has been able to quickly develop and deploy its flagship application to help its clients gain key customer intelligence and improve decision making.
      Oracle Linux 5.10
      tenth update release for Oracle Linux 5
      Oracle announced the availability of Oracle Linux 5.10, the tenth update release for Oracle Linux 5. ISO images will soon be available from the Oracle Software Delivery Cloud and the individual RPM packages have already been published to our public yum repository. This release includes the Unbreakable Enterprise Kernel Release 2 (2.6.39-400), Oracle's recommended kernel for Oracle Linux.

      For further details, please see the Oracle Linux 5.10 Release Notes.

      Oracle Linux can be downloaded, used and distributed free of charge and updates and errata are freely available. For support, you are free to decide which of your systems you want to obtain a support subscription for, and at what level each system should be supported. This makes Oracle Linux an ideal choice for your development, testing and production systems - you decide which support coverage is the best for each of your systems individually, while keeping all of them up-to-date and secure.

      LIVE WEBCAST:Why Choose Oracle Linux for your Oracle DB 12c Deployments
      Oct 30, 10am PT
      Oracle invites you to the live webcast on Wed, October 30, 2013, 10am PT featuring Sumanta Chatterjee, Vice President, Database Engineering, and Monica Kumar, Senior Director Product Marketing of Oracle as speakers.

      Oracle Database on Oracle Linux helps customers lower IT costs while delivering high quality of service. With Oracle Database 12c and Oracle Linux, customers benefit from the joint development and testing resulting in optimized features, better stability and higher performance to enable the next generation of enterprise applications.

      In this webcast, Oracle experts will cover:

      • Advantages of choosing Oracle Linux for Oracle Database
      • Key optimizations and features such as Database Smart Flash Cache, data integrity, and Cgroups that make Oracle Linux the best performing and most reliable Linux for deploying Oracle Database
      • Tools to simplify and speed deployment of Oracle Database on Linux, including Oracle VM Templates, Oracle Validated Configurations, and pre-install RPM
      • Integrated database and operating system management with Oracle Enterprise Manager
      • Real-life customer examples

      You will also have an opportunity to ask your questions and chat to the speakers and Oracle experts during this webcast.

      Don't miss this informative session. Register now.

      IT - Cloud
      Can Tape Save Cloud Storage?
      Storage Switzerland, October 8th, 2013
      "'Cloud Storage' - the term invokes a vision of an infinitely scalable disk storage system assembled from commodity hardware that can provide near-instant access to the data it stores. There are two problems with this concept of cloud storage 'nirvana'. First is the inability to bulk load or unload data because of bandwidth constraints and second is the long term cost to store all this data, since it may be there for decades..."
        Cloud Encryption: Control Your Own Keys in a Separate Storage Vault
        Network World, October 4th, 2013
        "Any time a company decides it wants to host its applications in the cloud, or use a SaaS application where the company's data will be stored in the cloud, the IT security professionals have to ask a series of questions. Can we encrypt the data? If so, who will have access to the keys? How will we perform key rotation? Can we sort and search on data that is encrypted? Is the cloud vendor using a proprietary encryption technology that prevents us from moving our data to another vendor? If we use 10 SaaS applications, will we have to manage 10 different sets of encryption keys?..."
        Cloud Migration Strategies: Choosing The Right Time For PaaS Adoption, October 7th, 2013
        "If your enterprise got picked for a makeover on a reality TV show, one of the first things the judges would probably do is ask why you haven't moved to the cloud. Streamlining your ALM, ditching unnecessary infrastructure, and reducing maintenance costs can be so slimming. But the fact is that not every single app in your wardrobe is going to be a good fit for a SaaS or PaaS based solution. Let's take a some cloud adoption strategies, while focussing on a few scenarios where keeping an app out of the cloud might be the wiser choice..."
        Constricting the Growth of Cloud
        IT Web, October 7th, 2013
        "NTT Europe recently completed a study that found 56% of CIOs and senior IT leaders see complexity of their own ICT systems as the biggest barrier to their organisation's enterprise-wide adoption of the cloud.

        While that study was conducted in the UK, anecdotal evidence suggests a similar dilemma in corporate SA. During ITWeb's roundtable discussion, Patrick Evans, MD of Advanced Cloud Technologies, suggests this situation is not unique or unpredictable. 'If you look at Moore's technology adoption life cycle model, we're pretty much following that model in terms of adoption of cloud,' he says..."

          Don't Live in Fear of Your Cloud Storage Provider Going Under
          CIO, October 3rd, 2013
          "The closure of cloud storage provider Nirvanix sent a chill through the cloud storage industry and its customers, but is it really a big deal?...

          The announcement last month that cloud storage provider Nirvanix was closing up shop set off a wave of hysteria in the IT world and sparked speculation about the viability of cloud storage as an option for businesses. The fear is understandable given the value of business data. However, with proper contingency planning and a solid backup/disaster recovery plan, such a closure doesn't have to be a big deal..."

          How to Establish Trust in the Cloud
          Help Net Security, October 7th, 2013
          "Business is increasingly taking place outside the corporate firewall. Employees are using their own devices and turning to consumer-grade cloud file sharing services to allow for access across multiple devices and to collaborate with each other or with outside partners, consultants, prospects, and clients.

          Even when the use of services such as Box, Dropbox, SkyDrive, and other similar services is sanctioned by the IT department, businesses have nearly zero assurance of confidentiality when their employees store documents in the cloud..."

          Lessons Learned from a Cloud Evaporation
          ComputerWorld, October 9th, 2013
          "Cloud capacity provider Nirvanix croaked recently, giving clients two weeks to get their data out of there. I estimate that most clients would require two months or more to accomplish this. Some need two years. There is physics involved, unfortunately. The 'Beam My Data Up' feature turns out to be fictitious. Go figure.

          If you never contracted with Nirvanix, it's easy for you to think, 'Well, serves them right for using a little startup. I would never do that!' Think again. IBM and HP resold Nirvanix. They put a lot of customers on that cloud..."

          Monitoring Security In Cloud Environments
          Dark Reading, October 8th, 2013
          "The cloud is no longer outlying technology. Indeed, any organization that isn't using cloud computing technology is probably considering it. The benefits can be enormous: flexible, on-demand access to superior resources -- but only when and where needed -- usually with lower unit costs and reduced complexity.

          But concerns over the security of data held in the cloud remain a barrier to adoption. The news of PRISM, a surveillance program that gives the National Security Agency access to users' data held by major websites, has further increased cloud paranoia and fears over data privacy. Forrester Research estimates that the impact of PRISM on the cloud computing industry could be as much as $180 billion..."

          Three Lessons from Netflix on How to Live in the Cloud
          Network World, October 9th, 2013
          "Netflix is a big company, and a big cloud user. With 38 million members across 40 countries, it streams a billion hours of content per month.

          Almost all of the Netflix's customer-facing services - like a massive database that creates personalized content recommendations based on prior viewing history - are run in Amazon Web Service's public cloud.

          The company has a content-delivery platform named Open Connect that it manages with partnering ISPs to actually stream movies to users..."

          Why CIOs Should Encourage Rogue Clouds
          InfoWorld, October 4th, 2013
          "CIOs hate rogue clouds -- at least that's the impression I get when I'm called into enterprises to look at the number of Dropbox, Google, and Amazon Web Services implementations existing off the books of IT. The CIOs are mad: They want those cloud services gone and the perpetrators punished.

          Indeed, Gartner predicts that "in less than three years, 35 percent of enterprise IT expenditures will happen outside of the corporate IT budget. Employees will regularly subscribe to collaboration, analytic, and other cloud services they want, all with the press of a button. Others will simply build their own applications using readily available cloud-based tools and development platforms."

          Will the Snowden Leaks Hurt U.S. Cloud Providers?
          Datamation, September 30th, 2013
          "Much has been written about NSA eavesdropping and the Snowden leaks, but one thing mostly lost in the cacophony of outrage, defensiveness and spin is the fact that cloud computing adoption rate could be significantly lessened, or - worse case - adopters could avoid U.S.-based providers.

          The Cloud Security Alliance estimates that U.S. cloud providers could lose as much as $35 billion as Canadian, European, Brazilian and other overseas businesses decide they've had enough with U.S. governmental security overreach, and it's in their best interest to store their data at home..."

          Why everyone wants a private cloud
          TechRepublic, October 8th, 2013
          "Concerns about security and control make the "private" cloud a more palatable model for many companies. How sound is this kind of thinking?

          'We're going to the cloud for VDI (virtual desktop infrastructure), and we're going to have our own cloud,' said an IT manager of a one-man shop (himself) at a manufacturing company with 20 employees..."

          IT - CxO
          Exploring the Risky Business of Cyber Insurance and IT Services Contracts
          SearchITChannel, October 7th, 2013
          "In my time as a security consultant and managed services provider, I've seen some questionable behavior and attitudes. Prime among them is the common belief in the business community that indemnity offered by cyber insurance and contracts replaces prudent actions taken for regulatory compliance and for data breach prevention. VARs or technology consultants dealing with high-risk clients in the healthcare and finance industries, among many others, will likely confront this same mindset..."
          IT's Reputation: Broken Bad
          Information Week, October 4th, 2013
          "William Murphy, CTO of the investment firm Blackstone Group, seemed like a pleasant enough fellow when he came onto the Interop New York tech conference stage this week. He even promised to kick things off on a high note.

          Then he proceeded to describe the perception of IT departments as at best adequate -- a cost center and a back-office necessity at many companies. Worst case, "we're categorized as people who say 'No' first and ask questions later," Murphy said. IT's too often considered defensive, late, overprice, uninformed and unhelpful..."

            Most CEOs Lack Vision, Leadership on New Computer Tech
            Network World, October 8th, 2013
            A majority of CEOs are failing to steer their companies toward effective use of new computer technologies, which precludes their organizations from making major business improvements.

            That's the conclusion of a new study released Tuesday by the MIT Sloan Management Review and Capgemini Consulting titled "Embracing Digital Technology: A New Strategic Imperative."

            Startups Share Hiring Tips on How to Find Technical Talent
            SearchCIO, October 7th, 2013
            "Desperate to hire talent for your next big technology project -- and constantly finding yourself outcompeted by the likes of Facebook, Google and a legion of other tech heavy-hitters?

            You might want to take a page from some successful startup companies in the Boston area. At a recent Massachusetts Technology Leadership Council panel discussion on how startups hire with limited resources, these entrepreneurial leaders offered up some of their tried-and-true methods..."

            Will CDO Steal CIO's Leadership Role?
            Information Week, October 3rd, 2013
            "Asking whether CIOs have a future isn't a new question. Nicholas Carr in 2003 famously challenged whether we needed IT at all. He compared IT to the spread of electric power: at some point, it becomes a commodity that gives no competitive advantage. The CIO is thus in the same lights-out position as those early CEOs (chief electricity officers).

            Ten years later there are still plenty of CIOs, and global IT spending is supposed to rise to $3.7 trillion this year. Carr was wrong, then; CIOs are safe.

            Not really..."

            IT - DR
            4 Ways CIOs Can to Respond to a Service Outage
            CIO, September 30th, 2013
            "Clearly, it hasn't been a good few weeks for Nasdaq. First, trading on the exchange halted for more than three hours on Aug. 22. Nasdaq's brief post-mortem statement blames a software bug and a backup system that failed to actually activate when a fault was detected. However, Reuters reports that a person familiar with what happened says connection problems with NYSE Euronext's Arca Exchange triggered the entire event.

            Adding insult to injury, Nasdaq suffered a six-minute outage on Wednesday, Sept. 4. Though it involved the same system that was the culprit of the larger outage, a Nasdaq statement says "hardware memory failure in a back-end server" caused this outage..."

              Simplify and Accelerate Oracle Database deployment with Oracle VM Templates
              Live Webcast: October 24 at 9am US PT
              Oracle VM application driven architecture is designed to enable rapid application deployment. With the use of Oracle VM Templates, sophisticated applications such as Oracle Database or Oracle Real Application Clusters (Oracle RAC) can be deployed in minutes - 10x faster than with other solutions. With more than 100 preconfigured, pretested templates for Oracle applications, Oracle has done the heavy lifting for you, enabling the virtualization of complex applications with near-zero application knowledge.

              Join our webcast to:

              • Interact directly with Oracle experts who have deep development experience
              • Learn more about use cases for Oracle VM Templates
              • Get in-depth knowledge to easily deploy Oracle Database 12c and Oracle RAC using Oracle VM Templates

              Register now.

              IT - Networks
              5 Wi-Fi Security Myths You must Abandon Now
              PCWorld, October 7th, 2013
              "Wi-Fi has evolved over the years, and so have the techniques for securing your wireless network. An Internet search could unearth information that's outdated and no longer secure or relevant, or that's simply a myth.

              We'll separate the signal from the noise and show you the most current and effective means of securing your Wi-Fi network.

              • Myth No. 1: Don't broadcast your SSID
              • Myth No. 2: Enable MAC address filtering
              • Myth No. 3: Limit your router's IP address pool
              • Myth No. 4: Disable your router's DHCP server
              • Myth No. 5: Small networks are hard to penetrate
              • No myth: Encryption is the best network security

              Read on for details.

              802.11ac 'Gigabit Wi-Fi' Starts to Show Potential, Limits
              Network World, October 7th, 2013
              "Vendor tests and very early 802.11ac customers provide a reality check on "gigabit Wi-Fi" but also confirm much of its promise.

              Vendors have been testing their 11ac products for months, yielding data that show how 11ac performs and what variables can affect performance. Some of the tests are under ideal laboratory-style conditions; others involve actual or simulated production networks. Among the results: consistent 400M to 800Mbps throughput for 11ac clients in best-case situations, higher throughput as range increases compared to 11n, more clients serviced by each access point, and a boost in performance for existing 11n clients..."

              OpenFlow Vs. Fabrics
              Network Computing, October 8th, 2013
              "Network vendors have been looking for ways to get around the inherent limitations of Spanning Tree Protocol and the traditional three-tier network design of core, distribution and access layers. One option is a fabric, which can increase speed and create short cuts for data flows. However, fabrics are being challenged by the rise of OpenFlow and software-defined networking.

              First, let's review fabrics..."

                Sidestepping SDN Security Woes
                Dark Reading, October 7th, 2013
                "As IT departments consider the potential security upsides of building out software-defined networking (SDN) infrastructure, they should also mull over the flip side of the coin. The earlier they can prepare for SDN control issues and bake in protection, the less likely they'll be surprised by security issues that could present themselves without proper foresight, experts say.

                Even if it can be used for the greater security good, SDN is a design strategy, not an out-of-the-box security tool. That means security needs to be thoughtfully architected from the beginning..."

                IT - Operations
                How to Build the Immortal Data Center
                Network World, October 10th, 2013
                "If your data center is reaching capacity and you're thinking about cracking open the corporate piggy bank to fund a new data center, stop right there.

                By following some simple best practices, you may be able to take your existing data center and retrofit it to last pretty much forever, says Gartner analyst David Cappuccio.

                'If you do it right, there's a good chance you could live in a fairly well designed data center for decades,' Cappuccio says.

                So, how do you get there?..."

                IT Leaders Who (Literally) Keep the Lights On
                ComputerWorld, October 7th, 2013
                "First-world tech executives can learn from the way CIOs in developing countries maintain connectivity and keep services flowing...

                Any IT leader in the mood to complain about excessive regulation should first have a cocktail with Murat Mendi of Nobel Ilac, an Istanbul-based manufacturer of generic pharmaceuticals.

                Mendi, formerly CIO and now general manager of the company, which operates in 25 countries around the world, can talk about the time an overzealous bulldozer operator started excavating the foundation for a new structure next to his company's building without bothering to first confirm what might have been underground. It tore through Nobel's Internet cables, leaving hundreds of employees offline all day..."

                NSA Data Center Suffers 'Meltdowns,' is Delayed by a Year, Report Says
                TechWorld, October 8th, 2013
                "A massive data center being built by the National Security Agency in Utah has been plagued by 'chronic electrical surges;' that have destroyed equipment and delayed its opening for a year, according to a report Monday.

                The facility has suffered 10 "meltdowns" in the past 13 months that destroyed hundreds of thousands of dollars' worth of machinery, The Wall Street Journal reported Monday, citing project documents and unnamed officials..."

                Switching IT Outsourcing Providers Easier (and Less Costly) Than Ever
                CIO, October 4th, 2013
                "Until recently, the decision to change IT outsourcing providers almost always came at a high cost. But the advantage that incumbent IT service providers once had is disappearing as transitioning from one vendor to another becomes less painful.

                'Back in the day, with the big 'one-neck-to-choke' model, when you switched providers you had to switch everything,' says Thomas Young, partner with outsourcing consultancy Information Services Group (ISG)..."

                IT - Security
                5 Lessons from Real-World Attacks
                Dark Reading, October 3rd, 2013
                "Take it from Harry Sverdlove, CTO of security firm Bit9: No organization -- regardless of size or business -- is immune to today's attacks.

                The security whitelisting vendor earlier this year revealed details of how attackers had stolen one of its digital code-signing certificates and then used it to sign malware attacks against three of its customers, who were the ultimate targets. It was an awkward and painful position for a security vendor, but Bit9 provided a detailed firsthand account of some of the key specifics of the attack, as well as the malware that was used..."

                • Lesson No. 1: Everyone is a target
                • Lesson No. 2: Attackers are constantly raising the bar
                • Lesson No. 3: You've already been infiltrated
                • Lesson No. 4: Traditional security methods don't solve today's problems
                • Lesson No. 5: Don't despair

                Read on for details.

                Actually, You Do Need to Share Your Passwords
                IT World, October 7th, 2013
                "No one stays healthy forever. At some point, your loved ones will need access to all of your accounts. You can make that job easier for them.

                No reader questions today. Instead, I'm answering a question that someone should ask: In our password-protected digital world, how do you prepare for that inevitable day when you die or otherwise become incapacitated?

                This is no small problem. When you're gone, or have otherwise lost the ability to remember or communicate, loved ones will need access to your email, contacts, bank accounts, and more. Without your pre-planned help, this can be quite a challenge..."

                  Average Cost of Cybercrime Grows Again Due to Sophisticated Attacks
                  SearchSecurity, October 8th, 2013
                  "Sophisticated cyberattacks are hitting enterprises more frequently and attackers are staying on networks undetected for longer periods, contributing to an increase in the average cost of cybercrime for the fourth year in a row, according to a new report.

                  The fourth-annual Cost of Cybercrime Study, produced by the Ponemon Institute and sponsored by Hewlett-Packard's enterprise security unit, showed the cost enterprises pay to clean up after a cyberattack has increased 26% from 2012, and has gone up a staggering 78% since the first report was released four years ago..."

                  Best Security Tools for Under $3,000
                  CSO Online, October 1st, 2013
                  "Unified Threat Management devices integrate five basic security features: firewall, IDS/IPS, anti-virus/anti-spam, VPN and outbound content filtering. UTMs offer easy setup and can support a 25-person office for around $1,500.

                  We tested eight devices: Check Point Software's 640, Dell/Sonicwall's NSA250MW, Elitecore Technologies' Cyberoam CR35iNG, Fortinet's FortiGate 100-D, Juniper Networks' SSRX220H-POE, Kerio Technologies' Control 1100, Sophos/Astaro's UTM 220, and Watchguard Technolgies' XTM330. Here are the results:..."

                  Data Security Issues at Adobe are Everyone's Problem
                  SearchCIO, October 7th, 2013
                  "Can't data get a little privacy around here? Nope. One moment someone is secretly stealing it and the next a government agency is outright demanding it be handed over (and also secretly stealing it). Like they say, information is the new oil. Those who are in control of it can wield a lot of power. So long as this is true --and really there's no end in sight -- data security issues are everyone's problem..."
                  Despite Risk of Aiding Hackers, Experts Favor Disclosing Vulnerabilities
                  CSO Online, October 3rd, 2013
                  "A recent Microsoft presentation on the ethics of disclosing vulnerabilities before a patch is available sparked a debate Thursday among experts who tended to lean in favor of releasing information sooner than later.

                  The joint presentation from Microsoft and Lancope, given this week at the Virus Bulletin conference in Berlin, brought a new twist to what has been a hot topic for years in the security industry..."

                  How to Prepare for the CISSP
                  IT World, October 6th, 2013
                  "The CISSP is a valuable certification, but it takes a lot more than just your many years of experience to prepare for it. You will likely have to learn about a lot of technology and processes that you've never worked with, some of it not especially current and all of it a lot less vendor-specific than you've ever imagined..."
                    Is Data Security Software Good Enough?
                    Insurance & Technology, October 4th, 2013
                    "The solution of most enterprises to meeting complex data security challenges is to deploy software that combats their risks. But that software isn't always used to the extent of its abilities, according to a panel discussion at the Interop conference this week in New York."

                    "I have several million dollars in software were not using right now," said Jay Leek, chief information security officer for Blackstone. "I have a lot of bells and whistles that I've turned off as well."

                    Most Unauthorized Data Access goes Undetected
                    Help Net Security, October 7th, 2013
                    "With a focus primarily on large enterprise organizations, a Vormetric study of 700 IT security decision-makers indicates that there are major gaps between existing security processes and the technologies currently in place to address insider threats.

                    Only 27 percent of respondents block privileged user access to data, a proven method of mitigating insider attacks, while 66 percent of respondents use perimeter focused network intrusion detection and prevention tools to identify and prevent insider threats although it is well understood that these tools weren't designed for insider threat detection but to protect from external threats..."

                    Poor Planning is the Main Reason for iPad Security Glitches In Schools
                    CITEworld, October 4th, 2013
                    "Over the past couple of weeks there are have two major stories problems affecting iPads in schools.

                    The first story, which broke last week, came from the Los Angeles Unified School District. The district, which is the country's second largest school district, recently embarked on the most ambitious one-to-one iPad deployment to date with an eventual goal or providing iPads to 640,000 students. As iPads were being rolled out to high school students, it became clear that students were removing restrictions and content filters implemented by the district's IT team..."

                      Security Skills For 2023
                      Dark Reading, October 1st, 2013
                      "About a year ago, I wrote a post at Securosis describing the big changes I see coming in the practice of security during the next 10 years. Though we never seem to have a shortage of town criers singing out our industry's doom, I actually think we are at the start of some insanely positive changes. I don't mean nebulous concepts like "influencing the business," "baking in security early," or "getting a seat at the table." I mean honest-to-goodness security technologies and techniques that will not only materially change how we approach security, but are pretty darn interesting and compelling.

                      These days many security professionals are relegated to roles that often are only tenuously related to directly improving an organization's security..."

                      Too Much Security Data Or Not Enough?
                      Dark Reading, October 8th, 2013
                      "As security gurus and professional surveys try to examine the stumbling blocks that await organizations seeking to mature their security analytics programs, enterprises' complaints seem to be at odds with one another. On one hand, organizations say they have too much security data and too many types of data to sift through and analyze in a timely fashion. On the other hand, they also say they don't have enough data on hand to make analytics-based security decisions..."
                      Top 15 Indicators Of Compromise
                      Dark Reading, October 9th, 2013
                      "In the quest to detect data breaches more quickly, indicators of compromise can act as important breadcrumbs for security pros watching their IT environments. Unusual activity on the network or odd clues on systems can frequently help organizations spot attacker activity on systems more quickly so that they can either prevent an eventual breach from happening -- or at least stop it in its earliest stages.

                      According to the experts, here are some key indicators of compromise to monitor (in no particular order):..."

                      • Unusual Outbound Network Traffic
                      • Anomalies In Privileged User Account Activity
                      • Geographical Irregularities
                      • Other Log-In Red Flags
                      • Swells In Database Read Volume
                      • HTML Response Sizes
                      • Large Numbers Of Requests For The Same File
                      • Mismatched Port-Application Traffic
                      • Suspicious Registry Or System File Changes
                      • DNS Request Anomalies

                      Read on for mopre indicators and details.

                      IT - Careers
                      Got an Offer Letter? Read it Carefully
                      IT World, October 7th, 2013
                      "Important Task #1: Get the job. Important Task #2: Go over the offer letter with a fine-tooth comb.

                      Recruiter and careers expert Arnie Fertig says new hires should examine their offer letters thoroughly to ensure nothing verbally agreed upon is left out.

                      'If you regard an employment offer letter as being non-negotiable and sign it without careful review and clarification, you may set yourself up for trouble down the road,' he notes in U.S. News & World Report..."

                        Debunking the IT Control Freak Myth
                        Network Computing, October 9th, 2013
                        "The most pernicious perception of IT by people in other parts of the organization is that of the IT department as a fiendish group of 'command and control' junkies who covet nothing but power. While this seems to be something out of a B-grade movie, it's a view that persists in many quarters and must be relegated forever to the dustbin.

                        It's worth spending time to deconstruct this view:..."

                          Quiz: What Do You Know About the NSA?
                          IT World, October 4th, 2013
                          "Information leaked by former NSA consultant Edward Snowden documented domestic surveillance programs that had been suspected for years but never officially confirmed. Now, though, the curtain has been drawn back some to give the public a better view of what the NSA is up to and how they do their work. Here's a handful of questions about the agency and some of its more arcane aspects. Keep track of your score til the end and see how well you did..."
                            IT - Social Media
                            Few Firms Have Cohesive Social Media Strategy: Study
                            IT World Canada, October 7th, 2013
                            "Organizations are increasingly trying to get closer to customers through social media and collaboration, according to an IBM study of C-level executives.

                            However, a majority admit they still don't have a cohesive social media strategy.

                            'Our research with C-suite leaders over the past decade has shown that organizations have steadily shifted to embrace more open, collaborative and reciprocal models,' Bridget van Kralingen, senior vice president of IBM Global Business Services, said in a statement..."

                            Sun Storage 2500-M2 Drives
                            600GB 10k 2.5. SAS2 hard drive
                            Oracle announced the availability of a new 600GB 10k 2.5" SAS2 hard drive for Oracle's Sun Storage 2500-M2 arrays. The new 600GB 10k 2.5" SAS-2 hard drive will be in a new carrier that:

                            • Is compatible for use in current 2540M2 and 2530M2 arrays, as well as 2501M2 enclosures Can be added to existing arrays either within the same system or within the same enclosure along side 3.5" drives
                            • Is NEBS-compliant
                            • Is only supported in 2540M2, 2530M2 and 2501M2 trays and can not be deployed in earlier generation 2540M1, 2530M1, 2510M1 arrays or 2501M1 enclosures or any 6000 arrays

                            Oracle is also announcing end of life for 300GB/600GB 15k 3.5" SAS-2 hard drives.

                            IT - Database
                            Ten Steps to Improving Data Hygene
                            Software Magazine, October 7th, 2013
                            "Your database, like your health, requires constant care and attention. Just as you wouldn't go years without a physical or a dental check-up, your company's data deserves the same cleaning and upkeep. Good data hygiene is important because it fuels marketing campaigns and sales initiatives. In the absence of accurate, fresh data, managers can't make optimal decisions or tactical investments...

                            Here are ten hygiene tips for improving data quality:..."

                            IT - Backup
                            Developing a Service Oriented Approach to Data Protection
                            Storage Switzerland, October 9th, 2013
                            "There is a never ending quest by IT professionals to standardize the data center on a single enterprise backup application. It's time for companies to re-think that approach, by instead looking at providing backup for their services, instead of foisting a single application on to users. The focus should be on how to best solve the specific applications' data protection requirements and not limiting the options to best meet those needs. The key advantage of taking a services approach is that data will be better protected and users will feel more confident that their critical information is properly safeguarded..."
                              5 Ways to Disaster-Proof Your Data Backups
                              PCWorld, October 1st, 2013
                              "The anniversary of Hurricane Sandy reminds us that businesses can fall victim to the forces of nature. Whether it's a blaze that burns through your office, or a flash flood that sends water coursing through your server room, disasters can hit at any time, and the most likely casualty is your data.

                              According the U.S. Small Business Administration, 25 percent of businesses never reopen after being hit by a disaster. But you can beat the odds..."

                              Avoid MSP Backup Sprawl: Less is More in the Cloud
                              Storage Switzerland, October 10th, 2013
                              "Outsourcing backup remains one of the most popular ways for businesses to embrace cloud related services. In fact, many managed services providers (MSPs) and value added resellers (VARs) have forged their initial entry into the cloud through cloud backup offerings. The challenge is some MSPs are supporting multiple point backup solutions, resulting in increased complexity and a higher total cost of ownership. In order to remain competitive, MSPs need an all-in-one backup solution..."
                              Unpack Software-Defined Storage at OpenStorage Summit
                              October 23-24, 2013 at the Santa Clara Convention Center in Santa Clara, CA
                              The OpenStorage Summit, hosted by Nexenta, focuses on innovation developments in open-source storage-related solutions. There is an opportunity to network, explore innovations, cloud platforms, technical solutions and so much more. There's a great line-up of companies and presenters leveraging information on open-source storage for case studies, lessons learned, and financial impact.

                              Two of the speakers on the agenda may be familiar, Matt Ahrens and George Wilson, from Delphix. They are giving a presentation on "OpenZFS: The Future of Open-Source ZFS Deployment".

                              The conference kicks off on Wednesday October 23 and runs through Thursday, October 24. Register now. Use priority code Nexenta for a $200 full conference pass. Don't miss out. Sign up NOW!

                              IT - Big Data
                              Big Data's Dirty Little Secrets
                              Network World, October 9th, 2013
                              "Big Data is one of the hottest trends in enterprise IT right now, and for good reason. The ability to collect, store, and analyze unprecedented quantities of all kinds of data promises to remake everything from weather forecasting to consumer marketing.

                              But while that promise is being realized at a few pioneering companies, from Amazon and Macy's to Google and Facebook, many other organizations are still struggling to get the expected returns out of their big data investments.

                              That wasn't the theme at SAP's dinner for journalists and analysts in San Francisco last night, but as I chatted with company execs about SAP's analytics strategy and what its customers were doing, a few key points came into focus:..."

                              Big Data Storage doesn't Have to Break the Bank
                              ComputerWorld, October 7th, 2013
                              "The era of big data requires new storage strategies. And with faster and smarter technology, these approaches don't have to break the bank...

                              Big data is nothing new to Quicken Loans. The nation's largest online retail mortgage lender is accustomed to storing and analyzing data from more than 1.5 million clients and home loans valued at $70 billion in 2012.

                              But the big data landscape got a little more interesting for the Detroit-based company about three years ago..."

                              IT - Mobile
                              Be Wary in Google, Apple App Stores, Report Suggests
                              IT World Canada, October 7th, 2013
                              "With hundreds of thousands of Android and Apple apps in their respective markets, the world may seem to be a smart phone owner's delight.

                              But availability doesn't mean security. As security writer Graham Cluley notes in this posting, the issue was the subject of a paper presented last week in Berlin by researchers from antivirus software maker Bitdefender.

                              The staffers looked at over 800,000 apps in the Google Play and iOS App Store and didn't like what they saw, including apps that downloaded sensitive information from mobile devices over unsecured connections..."

                              Mobile Security Trends, Concerns and Misperceptions
                              Help Net Security, October 10th, 2013
                              "PayPal and the National Cyber Security Alliance unveiled the results from a new Zogby Poll highlighting the latest trends, concerns and misperceptions around mobile security and commerce.

                              The national survey of more than 1,000 U.S. adults underscores how deeply entrenched in American's daily lives mobile devices have become. For example, two-thirds of the people surveyed told us that their smartphone is never further than one room away, and one in ten said they keep their phone handy everywhere they go, with the possible exception of the bathroom..."

                              Why Enterprises Must Consider Pick Your Own Device (PYOD) Over BYOD
                              Information Week, October 3rd, 2013
                              "IT organizations of all sizes have never been confronted with as much diversity and complexity in terms of the devices they are being asked to support.

                              The average end user has access to a smartphone, tablet, and PC. But very rarely are they from the same manufacturer or for that matter run the same operating system. That's why enterprises should consider pick your own device (PYOD) over BYOD..."

                              The Legal Implications of BYOD
                              Government Technology, October 7th, 2012
                              "Let's face it - public-sector employees are likely using their personal mobile devices for government business, even if they're not supposed to. So what should be your first move when considering a formal BYOD program? Call a lawyer.

                              While it's easy to allow devices onto a public-sector agency's network, handling the fallout from lost or stolen smartphones could be a bigger headache than you think. Sure, you may be able to remotely wipe data, but there are privacy issues that may challenge even the clearest BYOD policy..."

                              Top Challenges Facing Bank CIOs Over the Next Year
                              Bank Systems and Technology, October 4th, 2013
                              "As Bank Systems & Technology rolls out our 2013 Elite 8 award honorees this week, we acknowledge innovative work done by bank technology executives over the past year or so. But the work of a CIO is never done; in today's rapidly changing landscape the bleeding-edge technology of today could be commonplace six months from now. And CIOs may be tackling problems they don't even know exist at this point. So, what might be some of the projects our 2014 Elite 8 honorees will be working to solve? We asked a panel of industry experts to the question: What will be the biggest challenge facing bank CIOs over the next year?..."
                              Top Ten Articles for last few Issues
                              Vol 188 Issue 1, Vol 187 Issues 1, 2, 3 and 4 ; Vol 186 Issues 2,3 and 4
                              We track how frequently each article is viewed on the web site to determine which the readers consider the most important. For last week, the top 10 articles were:

                              • Oracle Introduces New x86 Servers
                              • Impressions from Oracle Open World 2013
                              • The Best x86 Platforms for Oracle Solaris
                              • Maximizing Application Reliability and Availability with the SPARC M6-32 Server
                              • LibreOffice 4.1.2
                              • GNU system, free software celebrate 30 years
                              • SPARC T5 Encryption Performance Tops Intel E5-2600 v2 Processor
                              • Release Candidate for Unbreakable Enterprise Kernel Release 3
                              • SPARC T5-2 Server Beats x86 Server on Oracle Database Transparent Data Encryption
                              • Look Who's Coming to Town - OpenStorage Summit at the Santa Clara Convention Center

                              The longer version of this article has list of top ten articles for the last 8 weeks.

                                IT - Encryption
                                Is Your Security Vendor Colluding with the NSA?
                                InfoWorld, October 8th, 2013
                                "A few weeks ago, I disagreed with security luminary Bruce Schneier when he asserted that most vendors have NSA-friendly backdoors and cannot be trusted. Make no mistake, I don't dismiss the idea that some vendors capitulated to the NSA -- but I doubt it's most.

                                Bruce was probably alluding to the fact that some vendors have willingly worked with the security agency and inserted hidden backdoors the NSA can use..."

                                NSA Battles Tor: 9 Facts
                                Information Week, October 8th, 2013
                                "The National Security Agency has devoted substantial resources to tracking, unmasking and even attacking users of the anonymizing Tor network. But just how good are the NSA's Tor-attacking capabilities?

                                That question has persisted since former NSA contractor Edward Snowden turned whistleblower earlier this year and began leaking top-secret agency documents. By June 2013, those leaks had revealed some of the agency's operating guidelines, which suggested that anyone attempting to avoid the NSA's digital dragnet -- for example, by encrypting their data or using Tor to disguise their Web browsing -- might actually be making themselves more of a target. Indeed, the NSA's leaked operations manual allows intelligence analysts treat all such activity as suspicious, and to retain intercepted communications indefinitely..."

                                Improve Office Productivity with JavaFX and the NetBeans Platform
                                With CaseLnk Case Management System
                                Geertjan writes, "CaseLnk Case Management System, by CaseForge Technology, is a brand new piece of software for improving office productivity, user collaboration, and customer satisfaction. It supports cases, documents, tasks, events, processes, and contacts.

                                The technologies used are Java 7 with NetBeans Platform 7.3 and JavaFX..."

                                Trending in
                                Vol 235, Issue 2
                                Trending IT Articles