News about Oracle's Solaris and Sun Hardware
System News
Oct 14th, 2013 — Oct 20th, 2013 Generate the Custom HTML Email for this Issue
System News System News for Sun Users
Volume 188, Issue 3 << Previous Issue | Next Issue >>
Sections in this issue:
click to jump to section


Oracle
x
Oracle Multitenant on SPARC Servers and Oracle Solaris
An Oracle Database, Enterprise Edition 12c option
By Ritu Kamboj

This article describes the advantages of using the Oracle Multitenant option of Oracle Database, Enterprise Edition 12c on SPARC servers running Oracle Solaris. It also describes the steps to enable thin provisioning and instantaneous cloning features of Oracle Database 12c when it is deployed on Oracle ZFS Storage Appliance.

About Oracle Multitenant

Oracle Multitenant - an Oracle Database, Enterprise Edition 12c option - introduces a new architecture that enables in-database virtualization for database consolidation, which delivers rapid provisioning and cloning as well as rapid database patching and upgrades. It enables administrators to manage many databases as one and allows resource management between databases. This new architecture allows a multitenant container database (CDB) to hold many pluggable databases (PDBs)...

Oracle Becomes Second Largest Software Company in the World
IBM Falls to Third
Oracle published a press release that says, "Given IBM's recently announced quarterly results, we would like to take this opportunity to point out that Oracle's software business has been growing faster than IBM's software business and now Oracle has moved up to become the number 2 software company in the world while IBM has slipped to number 3. Over IBM's last four quarters, they reported software revenue totaling $25.7 Billion, while during Oracle's last 4 quarters, we reported software revenue totaling $ 27.8 Billion."

"We will continue to develop innovative software products and related cloud services in pursuit of becoming number one," said Oracle President and CFO Safra Catz.

Features
x
Key Facts about Disaster Recovery
High availability (HA), Disaster Recovery (DR), and Continuity Of Operations Programs (COOP)
Frank Wickham writes, "From time to time I have had discussions about high availability (HA), disaster recovery (DR), and continuity of operations programs (COOP). Sometimes we dive deep into the topic without communicating several key high level messages that will guide the conversation forward.

To what degree do we implement a DR program

Many organizations have made the determination that they do not need any protection at all. They have evaluated the trade off between having some type of protection and not. Most organizations do not provide for a full DR..."

SPARC
x
Using a mirrored ZFS pool with virtual disks
Availability Best Practices - Jeff Savit
Jeff Savit writes, "With all the excitement of the past weeks (and other work assignments), I didn't publish a queued-up Availability Best Practice blog entry about using mirrored disk devices.

Previous blog entries emphasized service domain and path resiliency, rather than redundancy for disk media, though I hinted at it in Availability Best Practices - Example configuring a T5-8. In that blog entry, I configured two identically sized virtual disks, each in its own mpgroup pair, to be used as a ZFS mirrored root pool in the guest VM. That's ideal, because it provides resiliency in case a disk fails and in case a path or service domain goes down.

The purpose of this test is slightly different: we will test a configuration that does not use mpgroup, but instead relies on resiliency provided by a ZFS mirrored pool. This is similar to bare-metal configurations in which ZFS is used to provide resiliency, but using virtual disks..."

HDFC Securities Gains 3x Throughput Performance
Executes Online Trades Up to 60% Faster, and Cuts Data Center Costs
As a subsidiary of HDFC Bank, HDFC Securities is a leading financial services firm in India, serving a diverse clientele ranging from retail to institutional investors...

In November 2012, HDFC Securities consolidated 25 servers and two storage systems into a single Oracle SuperCluster and ensured a highly available, scalable, and secure online trading platform in a business where fractions of a second matter. The company accelerated throughput performance by 3x, increased online trading speed by up to 60%, produced reports 67% faster, improved risk management, and cut data center costs...

Exadata
x
Colleges and Universities Reduce Server Footprint, Improve System Performance and Simplify IT Maintenance
With Oracle Exadata Database Machine
Colleges and Universities Reduce Server Footprint, Improve System Performance and Simplify IT Maintenance with Oracle Exadata Database Machine

University of Arkansas, Northern Illinois University and Brigham Young University Improve Registration and Student System Availability and Reliability with Oracle Exadata Database Machine

Colleges and universities nationwide are driving consolidation, reducing operating expenses, and improving application performance to support peak registration periods and other critical processes through the adoption of Oracle Exadata Database Machine, a key component of Oracle Engineered Systems.

Engineered to deliver extreme performance and the most available platform for running the Oracle Database, Oracle Exadata combines massive memory and low-cost disks to deliver petabyte scalability at a lower cost.

Virtualization
x
Oracle VM VirtualBox 4.3 is available
New Platform Support, Hypervisor and Networking improvements
Oracle VM VirtualBox 4.3 introduces a virtual multi-touch user interface, supports additional devices and platforms, and provides enhanced networking capabilities enabling developers to virtualize modern post-PC era operating system features while maintaining compatibility with legacy operating systems.

Generally available today, Oracle VM VirtualBox 4.3 delivers the latest enhancements to the world's most popular, free and open source, cross-platform virtualization software.

Oracle VM VirtualBox 4.3 adds a unique virtual multi-touch interface to support touch-based operating systems, and other new virtual devices and utilities, including webcam devices and a session recording facility.

This release builds on previous releases with support for the latest Microsoft, Apple, Linux and Oracle Solaris operating systems, new virtual devices, and improved networking functionality.

IT - Storage
x
Is Software The Key To The Flash War?
StorageNewsletter.com, October 16th, 2013
"Interest in All-Flash storage systems is on the rise from the investment community and it is certainly attracting the interest of IT planners looking to create more scalable database environments and more densely populated virtual infrastructures. All-Flash systems enable scale, and that scale leads to greater return on investment (ROI) from those projects. At the heart of the matter for All-Flash Arrays is where should the "magic" happen...in software or in hardware?...:
Software Defined Storage and Networking: Will it Work?
Enterprise Storage Forum, October 17th, 2013
"We have all heard that software defined networks are going to solve all of our networking problems. Many vendors are already using software defined storage and I think there might be more vendors coming to the table.

The questions I always ask myself: is this all good and what is going to happen and why? What are the challenges and issues that need to be considered when evaluating software solutions that were once designed using ASICs for both storage and networking?..."

    Java Technology
    x
    NTT DOCOMO Deploys Oracle WebLogic Server as Application Platform
    For Mission-Critical Customer Data Management
    NTT DOCOMO has deployed Oracle WebLogic Server as an application platform, running on Oracle Linux, for its mission-critical customer data management system ALADIN.

    ALADIN supports NTT DOCOMO's business by connecting DOCOMO shops and information centers nationwide.

    To further enhance cost efficiency and help ensure stable operation of ALADIN, NTT DOCOMO has employed Oracle WebLogic Server as a new application platform.

    NTT DOCOMO has highly valued Oracle WebLogic Server for the following features:

    • Stable system operation by real-time tracking of memory usage;
    • Ability to reduce the frequency of garbage collections, and improved system processing enabled by efficient database connection management.

    ALADIN is based on Java Platform, Enterprise Edition (Java EE), which has allowed the company to operate smoothly while minimizing additional development and modification associated with the migration of application server products.

    Java Spotlight Episode 148: Bruno Souza on SouJava and the JCP @JCP @Soujava
    Weekly Podcast
    Roger Brinkley writes, "Bruno Souza is a Java Developer and Open Source Evangelist at Summa Technologies, and a Cloud Expert at ToolsCloud. Nurturing developer communities is a personal passion, and Bruno worked actively with Java, NetBeans, Open Solaris, OFBiz, and many other open source communities. As founder and coordinator of SouJava (The Java Users Society), one of the world's largest Java User Groups, Bruno leaded the expansion of the Java movement in Brazil. Founder of the Worldwide Java User Groups Community, Bruno helped the creation and organization of hundreds of JUGs worldwide. A Java Developer since the early days, Bruno participated in some of the largest Java projects in Brazil..."
    IT - Technology
    x
    Flexible Displays: FAQ
    Business 2 Community, October 17th, 2013
    "We all know that Samsung has released the world's first smartphone with a flexible screen. Samsung Galaxy Round has marked the outbreak of such devices - LG will be the next to release its G Flex smartphone with the alike screen. Nevertheless, users do not know exactly how flexible displays work, if they are better or worse than the usual ones. Today we respond to the most frequently asked questions concerning the flexible displays for mobile devices..."
    Hitachi CTO Hu Yoshida on How Future Technology will Change Our Lives
    Information Week, October 17th, 2013
    "A well known visionary in the technology industry and the CTO of Hitachi Data Systems, Hubert Yoshida, is counted as one of the most influential technology leaders. Responsible for defining the technical direction of Hitachi Data Systems, Yoshida has been instrumental in evangelizing his company's approach to storage-related technologies. In a detailed discussion with Srikanth RP from InformationWeek, Yoshida tells us about an exciting future where Big Data analytics will be used to radically transform our lives..."
    Free and Open Source S/W
    x
    The Department of Defense (DoD) and Open Source Software
    September 2013 Whitepaper (19 Pages)
    With tight budgets organizations throughout the U.S. Department of Defense (DoD) see the appeal of the open source model. Open source software (OSS) includes operating systems, applications, and programs in which the source code is published and made available to the public, enabling anyone to copy, modify and redistribute that code without paying royalties or fees. Open source 'products' typically evolve through community cooperation among individual programmers as well as very large companies. An open source license permits anybody in the community to study, change and distribute the software for free and for any purpose.

    This paper seeks to answer two questions: 1. What are the tangible and intangible costs that the government should bear under an open source licensing model? 2. What are the tradeoffs and risks associated with open source licensing models in relation to commercially available software?

    Solaris
    x
    Elfsign Object Signing on Solaris
    Verify that binaries are as they should be
    Dan Anderson writes, "Solaris elfsign(1) is a command that signs and verifies ELF format executables. That includes not just executable programs (such as ls or cp), but other ELF format files including libraries (such as libnvpair.so) and kernel modules (such as autofs). Elfsign has been available since Solaris 10 and ELF format files distributed with Solaris, since Solaris 10, are signed by either Sun Microsystems or its successor, Oracle Corporation.

    When an ELF file is signed, elfsign adds a new section the ELF file, .SUNW_signature, that contains a RSA public key signature and other information about the signer. That is, the algorithm used, algorithm OID, signer CN/OU, and time stamp. The signature section can later be verified by elfsign or other software by matching the signature in the file agains the ELF file contents (excluding the signature)..."

    Linux
    x
    Oracle Database and Oracle Linux on Oracle x86 Hardware
    Driving Database Innovation Down the Stack
    Kelvin Gee writes, "Oracle has always been a database company, but more recently we are driving database innovation even further down the stack through the operating system all the way down to the hardware.

    Oracle x86 servers are the building blocks for Oracle's engineered systems such as Exadata. These engineered systems run Oracle Database and Oracle Linux and are highly optimized to work together and provide unique features and benefits. For example, there is code in Oracle Linux and Oracle Database to make it run faster on Oracle x86, and there are firmware enhancements embedded in the server that make Oracle x86 the best x86 platform for running Oracle Database..."

    IT - Cloud
    x
    Complex Clouds Must be Managed with Automation
    InfoWorld, October 11th, 2013
    "Native cloud interfaces don't scale in real-world business deployments -- so spring for a cloud management system...

    Many enterprises end up with more than a few types of clouds when they round out their final enterprise cloud computing solution. This typically means a few types of private clouds, a few types of public clouds, and perhaps other development and configuration management systems. As a result, these complex, multicloud deployments are now more the rule than the exception.

    There are two basic ways to manage such complex cloud platforms, such for provisioning and deprovisioning storage and compute..."

    Expert Advice For Selecting A PaaS Vendor
    SearchCloudApplications, October 14th, 2013
    "Picking a Platform as a Service (PaaS) provider can be a nerve-wracking task. This guide offers articles, tips and other editor-selected content designed to help any organization find the right PaaS vendor..."

    GUIDE CONTENTS:

    • PaaS basics: Questions and concepts
    • Making PaaS a success
    • PaaS multimedia deployments
    • Glossary of PaaS-associated terms
    • Test your PaaS knowledge

    Read on for details.

    Lessons Learned from a Cloud Evaporation
    IT World, October 10th, 2013
    "Cloud capacity provider Nirvanix croaked recently, giving clients two weeks to get their data out of there. I estimate that most clients would require two months or more to accomplish this. Some need two years. There is physics involved, unfortunately. The "Beam My Data Up" feature turns out to be fictitious. Go figure.

    If you never contracted with Nirvanix, it's easy for you to think, "Well, serves them right for using a little startup. I would never do that!" Think again. IBM and HP resold Nirvanix. They put a lot of customers on that cloud..."

    Where it Makes Sense to Avoid the Cloud
    InfoWorld, October 18th, 2013
    "The notion that it's a good idea to move data and applications to public cloud providers, or even private clouds, is not always true. In the majority of cases, using public clouds adds a great deal of value. However, in certain instances, cloud computing doesn't make sense.

    No technology is a good fit for everything. Yet both people and companies like to treat new technologies as a universal silver bullet, using it where it does not make sense -- a mistake they're repeating now with cloud computing..."

    Why Biotech Startups Should be Cautious About the Cloud
    Business 2 Community, October 12th, 2013
    "Cloud computing solutions have helped relieve a lot of common IT problems. They allow easy and immediate scalability of an IT infrastructure at a fixed price. Plus, they facilitate remote access and data backup, issues that were major headaches in the past.

    As exciting as this new technology is, it is not perfect. There are dozens of different cloud service providers offering a wide range of services and myriad promises. Selecting the right cloud provider for your company, and implementing the service effectively, is not as simple as you might expect..."

    IT - CxO
    x
    9 Forces That Are Changing The Way Businesses Run
    CRN, October 10th, 2013
    "If the only constant is change, why are we so bad at it?" a PricewaterhouseCoopers study asked Wednesday of the technology industry.

    While technology has always adapted, the changes affecting the industry right now are different than ever before, the study said. Changes are coming faster and are overlapping one another, Tom Archer, PwC's U.S. Technology Industry Leader said, while also turning toward an end-user focus..."

    • Disruptive Innovation
    • Managing Cost And Complexity
    • Convergence
    • Consumerization Of IT
    • Changing Dynamics Between Developed And Developing Countries
    • Social Media
    • Data Explosion
    • Intellectual Property And Data Protection
    • Changing Political And Regulatory Landscape

    Read on for details.

      CIO Leadership Lessons from a Pro
      SearchCIO, October 14th, 2013
      "Suggest to Carl Wilson the CIO role is going to be absorbed by the business, and the former CIO and executive vice president of Marriott International has a response you're not likely to hear elsewhere these days..."

      "It's more likely the business might be absorbed into the CIO role as IT takes on a bigger role within the enterprise," Wilson said.

      "No career is over quips here..."

      Planning Failures Unleash IT Chaos
      CIO Insight, October 3rd, 2013
      "Your IT staffers are devoting far, far too much time dealing with unanticipated tech problems, as opposed to initiating proactive efforts to support organizational goals, according to a recent survey from TeamQuest. In fact, tech employees spend an average of 32 hours every week responding to situations such as network slowdowns, equipment failures, tech-upgrade requests, and capacity and availability issues, findings reveal..."
        The End of the CIO As We Know It -- And IT Feels Fine
        InfoWorld, October 11th, 2013
        "Fifteen years after it became a top-level job, the CIO notion no longer makes sense in the emerging post-IT world...

        It's a painful irony: As technology permeates the workplace, the CIO is becoming less relevant. I predict the position's stature will further decrease in the coming years for many -- though not all -- companies..."

        Three CIOs Who Made Revenue Generation their Business
        SearchCIO, October 14th, 2013
        "There are those CIOs who seek to align IT with the business. Then there are those who make IT an inextricable part of the business by creating or fostering projects that become vital revenue generators.

        The days of CIOs being strictly technologists are long over. And while revenue generation may not be explicitly stated in the job description for CIOs, IT departments are increasingly being looked at as centers of moneymaking innovation...

          IT - DR
          x
          What Banks Should Know About Disaster Recovery in the Cloud
          Bank Systems and Technology, October 11th, 2013
          "The cloud offers faster recovery from disasters, but banks need to be on the same page with their providers on issues like data ownership and interoperability...

          Disaster recovery in the cloud, or let's term it 'disaster resilience,' is still a relatively new concept. But it has distinct advantages for financial institutions - and some challenges as well..."

          IT - PM
          x
          7 Top Wishes of IT Project Managers
          CIO, October 10th, 2013
          "Ah, the joys of being a project manager. From being treated like a servant of management and not being included in key decisions, to having priorities, tasks and deadlines constantly changed on them -- and then being blamed for delays and slipups -- IT project managers have a lot to deal with.But what if project managers could change all that? What if a genie could grant IT project managers three (project-related) wishes? What would project managers wish for?..."

          • To be involved from project inception.
          • The ability to put -- and keep -- together the perfect team for each project.
          • To have powerful yet simple-to-use project management tools.
          • To have clearly defined project objectives and requirements.
          • To get buy-in from stakeholders and end-users.
          • To be treated with respect.
          • To be allowed to adjust projects as needed (without being second-guessed).

          Read on for details.

          IT - Networks
          x
          Enterprise WLAN Security Essentials
          Network Computing, October 10th, 2013
          "The wired world enterprises have come to know is increasingly turning wireless, and the proliferation of wireless networks makes WLAN security increasingly critical to corporate security.

          In its annual Network Barometer Report, IT services firm Dimension Data said most of the clients it assessed had networks composed of roughly 80% wired ports and 20% wireless LAN ports, but it expects that ratio to reverse in the future. Meanwhile, analysts with research firm TechNavio estimate the global WLAN equipment market will see an annual growth rate of nearly 18% between 2012 and 2016..."

          Network Configuration Management: Old Tools, New Tricks
          SearchNetworking, October 14th, 2013
          "Network performance monitoring (NPM) tools have long been indispensible, used by network administrators of every variety, every day. They keep us out of trouble by generating alerts, help us quickly troubleshoot and close tickets and make quick work of historical analysis for capacity planning.

          On the horizon is software-defined networking (SDN), which promises to accomplish two goals at once: create flexibility by virtualizing the network and provide standardized, application-based, non-command line interface (CLI) administration. But SDN is only just beginning to be used in everyday networks..."

          Seeking Network Efficiency? SDN May -- Or May Not -- Be the Answer
          SearchSDN, October 14th, 2013
          "Almost every vendor pushing software-defined networking (SDN) of any flavor sells the technology on its efficiency -- networking that is programmable, flexible and can simply do more with less hardware and labor.

          The problem is that the efficiency everyone is looking for is operational efficiency -- which at its core means a more favorable ratio of business input versus business output as measured against some benchmark like operating profit. Yet the efficiency that SDN truly delivers is more aptly described in terms of long-term improvement, largely because the time to recoup operational efficiencies is longer than most people realize..."

          IT - Operations
          x
          The Right Questions to Ask About Data Center Locations
          SearchDataCenter, October 14th, 2013
          "With large businesses looking to upgrade their data centers to meet modern computing needs, or build out in a colocation facility, the first question should be: Where? That is, what are the best data center locations?

          Many businesses would say to build the new data center right where the old one stands. This is the easiest data center location to choose, but could be the one with the biggest problems. The business won't be able to operate the old data center during the build, unless there is sufficient spare ground for the new facility..."

            Snap, Crackle, Pop: Electrical Troubles Shed Light on NSA's Data Center
            ComputerWorld, October 17th, 2013
            "The National Security Agency's new data center in Utah was built for a 65 megawatt load, making it one of the world's largest data centers. But it has had a rough start.

            The $1.53 billion data center was built on a "very aggressive" schedule, according to the government, with groundbreaking in early 2011 and completion scheduled by the end of this year. But a report of "meltdowns," "flashes of lightning" and damaged equipment caused by arc faults raised questions about the timetable.

            There are many potential points of failure in this approximately 1 million-square-foot facility..."

            IT - Security
            x
            A Five-Pillar Survival Guide for an Insecure Cyber World
            CSO Online, October 14th, 2013
            "Edward Snowden's action demonstrated that an ordinary insider with a U.S. security clearance can intercept and distribute highly confidential information, even in an age of complex technology designed to prevent such action. What further risks are there?

            Here are five pillars to consider in rethinking your approach to data security in a cyber-environment in which both values and risks increase daily:..."

            • Rely Not On Compliance Policy Alone
            • Focus on Protecting Data vs. Infrastructure
            • Security is Ubiquitous
            • "He Who Guards Everything, Guards Nothing."
            • Security should be made as simple as possible, but not any simpler

            Read on for details.

            3 Things To Consider to Keep Your Company.s Data Secure
            Business 2 Community, October 14th, 2013
            "These days, we put our most private and valuable information in the cloud. It's time for small businesses to start taking data security seriously. Just because you're small, doesn't mean your information is any less valuable than the big guys'. There are currently dozens of cloud storage systems that make it easy to share and secure endless amounts of data.

            Today, cloud storage is a valuable asset that helps individuals and businesses solve their need for more storage space to hold their digital property. Keep in mind that every service claims to keep your files safe, so when it comes to selecting the ideal cloud storage for your business, consider these three things:.."

            Best Practices for Threat Management
            Help Net Security, October 14th, 2013
            "With threats of all types on the rise and increasing costs of security breaches growing (analyst approximate $840,000 per breach), enterprises are investing in numerous threat detection and 'early warning' solutions in an attempt at mitigating risk and gaining some level of control..."
            Biggest Data Security Threats Come from Inside
            PCWorld, October 13th, 2013
            "While threats to data security and privacy are often perceived to come from the outside, all signs point to internal threats being just as dangerous, intentional or not.

            Forrester recently released its Understand the State of Data Security and Privacy report, which offered insight on the reasons behind data breaches, with internal threats emerging as the leading cause. The survey-which featured respondents from Canada, France, Germany, the U.K., and the U.S. from companies with two or more employees-also covered other topics, including how security budgets are being allocated and the changing landscape of security teams' responsibilities..."

            Internet Sites "Fingerprint" Users by Secretly Collecting Browser Info
            Help Net Security, October 14th, 2013
            "A group of European researchers have released the results of their research into just how many of the most visited Internet websites track users without their knowledge with the help of "device fingerprinting", and the answer is 145 out of 10,000..."
              New NIST Cybersecurity Standards Could Pose Liability Risks
              ComputerWorld, October 11th, 2013
              "Once passed, the standard will become the benchmark to measure critical infrastructure security programs...

              Critical infrastructure companies could face new liability risks if they fail to meet voluntary cybersecurity standards being developed by the National Institute of Standards and Technology.

              The slated release of a draft of the standard on Thursday was delayed, apparently due to the federal government shutdown. NIST's main website was shuttered on Thursday.

              The standards effort was launched after an Executive Order by President Barack Obama earlier this year..."

              'Spaf' On Security
              Dark Reading, October 10th, 2013
              "He was one of the first computer scientists to dissect the game-changing worm that hit the Internet 25 years ago and took down thousands of computers. He's also credited for defining software forensics and shaping other security technologies. But Eugene "Spaf" Spafford says security still isn't taken seriously enough today.

              Spafford -- who goes by Spaf -- is the executive director of Purdue University's Center for Education and Research in Information Assurance and Security, as well a professor of computer sciences at Purdue. He spoke with Dark Reading senior editor Kelly Jackson Higgins just prior to his keynote address this week at the ISSA International Conference..."

              User-Selected Passwords Still Getting Cracked
              Dark Reading, October 16th, 2013
              "The case against passwords has never been stronger.

              While easily guessed passwords have made media headlines, today's password-cracking systems can make short work of passwords, even those created using seemingly complex mnemonic devices. Current cracking techniques, fueled by cheap parallel computation using off-the-shelf graphic processors, can guess trillions of combinations every hour..."

                A Second Look at Awareness Training in Action
                CSO Online, October 14th, 2013
                "The one constant about user awareness training is that the awareness part is supposed to stick with you. Learning how to spot one type of phishing email is only good for that particular email, thus the concept of awareness is learning to trust your gut when something looks suspicious.

                On Tuesday, the CSO editorial team was once again reminded of why awareness training works. Last month, we explored a Phishing campaign aimed at the CSO editorial team, but our most recent encounter targeted IDG as a whole. Today, we're going to examine this latest attempt, as there are some valuable lessons to be learned..."

                  IT - Careers
                  x
                  12 Challenges Facing IT Professionals
                  Global Knowledge, October 14th, 2012
                  "The coming year will have 12 main challenges for IT management and staff. Since each organization is unique in how it functions and where it places its priorities, these are offered in no particular order. The issues include New Technology, Cloud, Big Data, Virtualization, BYOD and BYOA, Shadow IT, Boomers, Energy Efficiency, User Systems, Interoperability, Creating Value, and Social Networks. After a brief comment on each area, there is one or more suggestions for dealing with that situation..."

                  • New Technology
                  • Cloud
                  • Big Data Analytics
                  • Virtualization
                  • BYOD and BYOA
                  • Shadow IT
                  • Boomers
                  • Energy Efficiency
                  • User Systems
                  • Interoperability
                  • Creating value
                  • Social Networks

                  Read on for details.

                  How Federal Cronies Built -- and Botched -- Healthcare.Gov
                  Info World, October 14th, 2012
                  "Many contractors for Healthcare.gov site seem to have been picked based on past government work rather than IT expertise...

                  The biggest problem with Healthcare.gov seems simple enough: It was built by people who are apparently far more familiar with government cronyism than they are with IT.

                  That's one of the insights that can be gleaned from the work done by the Sunlight Foundation Reporting Group, a Washington, D.C.-based nonprofit that focuses on government transparency..."

                  The Unsung Women of Technology
                  ComputerWorld, October 15th, 2013
                  "Most people already know about Ada Lovelace, Grace Hopper and the ENIAC programmers of World War II, of course, but many other women have made their mark in technological fields who don't have the same level of recognition.

                  In celebration of Ada Lovelace Day, we've compiled an homage to 13 women you might never have heard of but who have made huge contributions to technology or science without quite becoming household names.

                  Perhaps they will inspire a new generation of women to enter the STEM fields; a smaller percentage of women are earning degrees in computer science now than they were 20 years ago..."

                    IT - Virtualization
                    x
                    Accelerating Application Performance in the Virtualized Environment
                    Storage Switzerland, October 17th, 2013
                    "Hyper-V, like any other virtualized server environment, puts specific strains on (some say it breaks) the traditional storage infrastructure. While a variety of designs have been created to address that issue few systems actually get at the heart of the problem. Virtualized server environments can scale rapidly, both in number of virtual machines (VMs) and in VM density (number of VMs per host). This can create highly randomized storage I/O demands and unpredictable capacity requirements, difficult things for most storage systems to accommodate. The result is often degraded application performance..."
                    Old NFS is the New Darling in Virtualization
                    InfoWorld, October 14th, 2013
                    "The resurgence of NFS in virtual environments shows that some good ideas do not fade away...

                    Some technologies work so well that they've become immortal -- not, perhaps, because they are perfect, but instead because newer technologies have not improved on their advantages enough to unseat them, even if they may make inroads.

                    One example of this would be NIS. Though there are a host of newer network authentication mechanisms available, NIS is still ubiquitous. Another would be IPv4. Even though IPv6 is far more extensible and modern, most of us are still working with IPv4 and will be for a long time to come.

                    Then there's NFS, which is turning 30 next year..."

                    IT - Compliance
                    x
                    Dodd Frank, Data Governance & Compliance: Band-Aids vs. Platforms
                    WallStreet & Techology, October 11th, 2013
                    "In what's commonly referred to as the most sweeping piece of financial regulatory reform since the great depression era, the US government has imposed among (many) other things a range of new record keeping and reporting obligations on the swaps community.

                    Of course record retention is hardly new to the capital markets, where registered broker dealers have long been compelled to keep orderly and durable records of everything from transactions logs to customer communications ..."

                      Storage
                      x
                      How Does Oracle Make Storage So Freaky Fast?
                      Short Videos Available
                      Rick Ramsey writes, "The sound quality of these videos is not very good because I taped them while people around me were watching the America's Cup, but the content is worth your time. Jason Schaffer, from Oracle Storage Engineering, explains ...

                      How the ZS3 Storage System is Engineered by Jason Schaffer (3 minutes)

                      The ZS3 is the fastest storage system "on the planet." Jason Schaffer explains what makes it so fast, how it was engineered, and what you can do with it.

                      How the ZS3 Storage Appliance Tunes Itself by Jason Schaffer (2 minutes)

                      Jason Schaffer, from Oracle Storage Engineering, explains how the ZS3 Storage System uses the Oracle Intelligent Storage Protocol (OISP) to automatically tune its I/O patterns to make Oracle Database 12c run faster.

                      How Oracle Makes the ZS3 Storage System Go Fast by Jason Schaffer (4 minutes)

                      Jason Schaffer explains how the ZS3 Storage Appliance uses DRAM to get its crazy fast performance. Taped at Oracle OpenWorld 2013."

                      Read on for links to the videos and More Resources About the ZS3 Storage Appliance

                      IT - Database
                      x
                      What Does Next-Generation MDM Look Like?
                      Information Management, October 14th, 2013
                      "The MDM Institute's 12 strategic planning assumptions for 2013-14 present an experience-based view of the key trends and issues facing IT organizations by highlighting master data management, data governance and related areas

                      Master data management is quickly broadening its attractiveness both as a key enabler of strategic business initiatives as well tactical P&L initiatives. As of 2013, MDM is no longer "fast follower" technology strategy but is clearly a business strategy for the masses..."

                      IT - Backup
                      x
                      Backing Up Distributed Data
                      StorageNewsletter.com, October 14th, 2013
                      "The modern data center is no longer confined to four walls. Instead, data is highly distributed across remote branch offices, end-user laptops and even on devices like smartphones and tablets. The data protection process and the hardware and software that runs that process needs to handle the challenges of diverse data types (databases, files) and a broad distribution of those data assets (mobile, remote office, data center and DR site)..."
                        IT - Mobile
                        x
                        Do Smartphone Sensors Present Security Risk?
                        Information Week, October 14th, 2013
                        "Privacy alert: Every smartphone's sensors record data in slightly different ways, and those differences are substantial enough to be measured and used to identify the device.

                        That warning comes via security researcher Hristo Bojinov, a computer science Ph.D. candidate at Stanford University who's been working with a team of researchers to test whether the sensors inside smartphones might pose a privacy risk, the San Francisco Chronicle first reported..."

                        IT - Big Data
                        x
                        Can Analytics Outperform The Machine Whisperer?
                        Information Week, October 18th, 2013
                        "Thanks to analytics software and the Internet of Things, we're opening a new round in the never-ending bout of man vs. machine.

                        During a panel discussion this week at a General Electric Industrial Internet event (GE's name for the Internet of Things), the insight that got the most heads nodding came from Jay Neidermeyer, CIO of GE Aviation's supply chain and manufacturing operations..."

                        Five Key Principles of a BI Program
                        Information Management, October 14th, 2013
                        "The partner to the data warehouse in most cases is business intelligence. The proper foundation for data storage is critical, but enabling the business to drive value and make good decisions will take your organization to the next level. To achieve this, a business intelligence program has to be put in place. To get started, here are five fundamental principles of an effective business intelligence program..."

                        • Visible executive support
                        • Data must be accurate
                        • Business user participation is critical
                        • Understand technology and trends
                        • Know your organization and industry

                        Read on for details.

                          Video Surveillance Driving Big Data
                          DefenseSystems, October 10th, 2013
                          "The proliferation of high-definition surveillance cameras has generated an “extraordinary deluge of data,” according to a survey of the enterprise and IP storage market.

                          Market researcher IHS estimates that HD surveillance cameras are generating an astounding 413 petabytes, or quadrillion bytes, a day. With shipments of HD surveillance expected to grow, the data dump is forecast to double to 859 petabytes by 2017, IHS estimates...:"

                            IT - BYOD
                            x
                            BYOD for Biotech? A Good Idea or Not?
                            Business 2 Community, October 17th, 2013
                            "The advanced features offered by smartphones and tablets have changed the way that people do business. With these devices, there is no need to be in the office or in front of your computer to keep up with emails, access important files, and share information. In a data-driven industry like biotech, remote access can facilitate a lot of important business.

                            However, Internet-enabled devices present new risks and challenges that many new businesses overlook..."

                              BYOD Implications on Staff Privacy . Facts and Fictions
                              Business 2 Community, October 15th, 2013
                              "Hardly a day passes now when the subject doesn't raise its head. BYOD is now ubiquitous in the workplace; it is also very much love-hate subject among employees. On one hand, the Bring Your Own Device trend (the possibility for employees to use their personal devices to access business data) offers greater flexibility to staff, often leading to increased productivity and job satisfaction. On the other, devices need to be audited and monitored by IT teams in order to ensure the continued online security of the business. Consequently privacy concerns are raised..."
                              Top10
                              x
                              Top Ten Articles for last few Issues
                              Vol 188 Issues 1, and 2; Vol 187 Issues 1, 2, 3 and 4 ; Vol 186 Issues 3 and 4
                              We track how frequently each article is viewed on the web site to determine which the readers consider the most important. For last week, the top 10 articles were:

                              • Java Takes on the Internet of Things
                              • solaris10 Brand Zone Clusters
                              • Oracle Linux 5.10
                              • Java Spotlight Episode 147: Javier Fernandez Gonzalez on Java 7 Concurrency Cookbook
                              • Oracle OpenWorld Presentations
                              • Sun Storage 2500-M2 Drives
                              • OpenWorld 2013 in Small Bites
                              • Unpack Software-Defined Storage at OpenStorage Summit
                              • Sun Server X4-2 Performance Running SPECjbb2013 MultiJVM Benchmark
                              • LIVE WEBCAST:Why Choose Oracle Linux for your Oracle DB 12c Deployments

                              The longer version of this article has list of top ten articles for the last 8 weeks.

                                IT - Tape
                                x
                                Tape Rocks for Storage - If You Don't Need to, Um, Access Your Data
                                The Register, October 14th, 2013
                                "Watching the SpectraLogic announcements from afar and getting involved in a conversation about tape on Twitter has really brought home the ambivalent relationship I have with tape; it is a huge part of my professional life but if it could be expunged from my environment, I'd be more than happy.

                                Ragging on the tape vendors does at times feel like kicking a kitten but ultimately tape sucks as a medium. Its fundamental problem is that it is a sequential medium in a random world..."

                                NetBeans
                                x
                                What's New & Cool in NetBeans IDE 7.x
                                50 slides presenting all the key features of the IDE
                                Loads of new features have been added to NetBeans IDE during the NetBeans IDE 7.x release cycle, i.e., 7.0 together with all the minor releases that have come after that, up to 7.4, which was released during the last few days.

                                Hard to keep track of everything added over all those releases, so instead of making a "What's New in NetBeans IDE 7.4" slide deck (which would only cover the highlights of the NetBeans IDE 7.4 Release Notes), as we would normally do, we've instead produced "What's New in NetBeans IDE 7.x", which is around 50 slides presenting all the key features of the IDE, together with all the key newest features.

                                Trending in
                                Vol 234, Issue 3
                                Trending IT Articles