News about Oracle's Solaris and Sun Hardware
System News
Oct 28th, 2013 — Nov 3rd, 2013 Generate the Custom HTML Email for this Issue
System News System News for Sun Users
Volume 188, Issue 5 << Previous Issue | Next Issue >>
Sections in this issue:
click to jump to section

Oracle eyes optical links as final frontier of data-center scaling
PCWorld Article
Stephen Lawson writes in PWorld, "Oracle is exploring silicon photonics, an optical technology drawing widespread interest, as a potential weapon in the battle against data-center power consumption.

Advances in CPU and memory design could boost efficiency dramatically over the next few years. When they do, the interconnects among components, servers and switches will effectively become the power hogs of the data center, according to Ashok..."

Oracle VM VirtualBox 4.3.2
First maintenance release of the 4.3 branch
This is a maintenance release. The following items were fixed and/or added:

  • VMM: fixed restoring of the auxiliary TSC MSR in VT-x that caused host BSODs on Windows 8.1 hosts and unpredictable behavior on other hosts (bug #12237)
  • VMM: provide fake values for a couple of MSRs to make more guests happy on certain hosts
  • VMM: fixed detection of VT-x on certain machines where the BIOS would not set the VMX LOCK feature bit, which affected the VM settings in the GUI
  • VMM: fixed TPR threshold which caused BSODs on Windows XP guests that use the I/O APIC (VT-x only; bug #12227)
  • VMM: fixed PATM saved state incompatibility for software virtualized VMs (bug #12222)
  • VMM: don't fail if AMD-V isn't available if the VM is configured to use software virtualization
  • GUI: fixed guest resize breakage on visual representation mode change (when switching from normal to fullscreen etc)
  • GUI: make sure the guest screen is resized after restoring a VM from a saved state if the host screen size changed
  • GUI: disabled SCROLL LED sync from HID LEDs synchronization (Mac OS X hosts only)
  • Webcam passthrough improvements including GUI support (see the manual for more information)
  • Guest Control: implemented more IGuestSession methods

Read on for more fixes...

Oracle Secure Global Desktop Adds Support for Android Tablets
Latest Enhancements Extend Secure Remote Access to Enterprise Applications
Oracle Secure Global Desktop 5.1 extends secure, anywhere access to Oracle Applications and other enterprise software from Android tablets, and the Chrome Web browser on Windows and Mac using HTML5. This adds to existing support for iPad tablets and other desktop browsers. The new release allows IT organizations to provide end users with more flexibility to work from their favorite devices.

Oracle announced a new release of its remote application access solution Oracle Secure Global Desktop, adding support for Android tablets.

Oracle Secure Global Desktop 5.1 also provides easier application access using HTML5 with Google Chrome on Windows and Mac, which eliminates the need for a separate install of client software on the device. The new release also adds directory integration with Oracle Unified Directory.

IT - Storage
All-Flash Storage Efficiency Is About More Than Deduplication
Storage Switzerland, October 29th, 2013
"All-Flash Storage Arrays have quickly become the go to option to solve storage performance challenges. Thanks to data efficiency technologies that reduce the effective cost per gigabyte (GB), the appeal of All-Flash Arrays now extends beyond the performance fringe and into the mainstream data center. Deduplication has captured much of the attention of data efficiency techniques, but IT planners need to be careful not to assume that all deduplication is the same nor is it the only data efficiency technology available to them..."
Deciding On The Right Flash Storage For High Density Virtual Infrastructures
Storage Switzerland, October 30th, 2013
"The modern data center consists of mission critical application and virtual server/desktop environments that are clustered for scalability and reliability. Each of the managers of these environments is trying to increase their density (the number of users or virtual machines supported on each physical host) in order to fully exploit the processing power available to them. If high density can be achieved, it drives down the cost to deliver IT services, reduces the data center footprint and minimizes power and cooling requirements..."
Java Technology
Java Spotlight Episode 150: James Gosling on Java
Interview with James Gosling, father of Java and Java Champion
This week's podcast features an interview with James Gosling, father of Java and Java Champion, on the history of Java, his work at Liquid Robotics, NetBeans IDE, the future of Java and what he sees as the next revolutionary trend in the computer industry. James Gosling received a BSc in Computer Science from the University of Calgary, Canada in 1977. He received a PhD in Computer Science from Carnegie-Mellon University in 1983. The title of his thesis was "The Algebraic Manipulation of Constraints". He spent many years as a VP & Fellow at Sun Microsystems. He has built satellite data acquisition systems, a multiprocessor version of Unix, several compilers, mail systems and window managers. He has also built a WYSIWYG text editor, a constraint based drawing editor and a text editor called 'Emacs' for Unix systems.
IT - Technology
Connected Cars: A Look at the Future of Driving (and Society)
eWeek, October 28th, 2013
"Smartphones and tablets, from the conveniences they've introduced to the functionalities they've made users comfortable with, have primed the world for connected cars. This umbrella term refers to everything that an in - car LTE connection makes possible - from cars with sensors that communicate with other vehicles for safer driving to cars that can even drive and park themselves.

An AT&T executive described the market to eWEEK as a 'massive opportunity' for all of society, while Google - which recently encouraged California to become the third state to legalize driverless cars - is prompting questions like: How many lives could be saved each year with autonomous, or self-driving, cars? How much pollution could be avoided?..."

Four Bold Predictions for the Future of Augmented Reality
Business 2 Community, October 28th, 2013
"Augmented reality in 2013 can be likened to the Internet in 1995 - still in the early stages and not quite at a 'tipping point' for mass consumer adoption. Yet the industry is full of untapped potential that we're starting to see gain traction across a number of verticals. While Google Glass has acted as a catalyst in shining the spotlight on AR, some of the most useful ways that the technology is now being used can be found at home, in the classroom and even on the operating table - like the German research institute Fraunhofer MEVIS's app, which assists doctors in planning their operations and provides a digital overlay of veins and blood vessels during procedures.

Below, I present four bold predictions for the future of this innovative technology..."

Police are Shooting James Bond-Like GPS Bullets at Cars
Network World, October 29th, 2013
"Police in four U.S. states have begun using a new "gun" installed in squad cars that, when activated with a button inside the car, emerges from behind the front grill of the car to shoot GPS tracking devices at vehicles they are pursuing, according to the BBC.

A prototype of the gun that sits behind police cruiser's front grill. Called "StarChase," the system is reportedly in use in Iowa, Florida, Arizona and Colorado, and it sounds pretty expensive. The BBC says it costs $5,000 to install to a squad car, and each GPS-enabled "bullet" it fires costs $500..."

    Oracle Solaris Cluster October 2013
    New qualifications and general news for the Oracle Solaris Cluster product
    Oracle has announced new qualifications and general news for the Oracle Solaris Cluster product.

    Hardware Qualifications

    • Sun Server X4-2 and X4-2L servers, Sun Blade X4-2B server module with Oracle Solaris Cluster 3.3
    • Sun Storage 16 Gb Fibre Channel ExpressModule Universal HBA, Emulex
    • Oracle Dual Port QDR InfiniBand Adapter M3

    Software Qualifications

    • Oracle Database 12c Real Application Cluster with Oracle Solaris Cluster 4.1
    • Oracle Database single instance and RAC with Oracle Solaris Cluster 4.1
    • Oracle VM server for SPARC 3.1
    • SAP Netweaver with new kernel versions
    • ZFS Storage Appliance Kit version 2011.1.7.0 and 2013.1.0.0
    • Application monitoring in Oracle VM for SPARC failover guest domain Storage Partner Update

    • Oracle Solaris Cluster 3.3 3/13 with the HDS Enterprise Storage arrays
    • EMC SRDF for Oracle database 12c RAC in Oracle Solaris Cluster 4.1 geo cluster configuration

    See the Oracle Solaris Cluster for details.

    MySQL Connector/Net 6.8.0 alpha
    Support for Entity Framework 6.0
    MySQL Connector/Net 6.8.0, a new version of the all-managed .NET driver for MySQL has been released. This is an alpha release for 6.8.x and it's not recommended for production environments. It is appropriate for use with MySQL server versions 5.0-5.6

    It is now available source and binary form.

    The 6.8.0 version of MySQL Connector/Net has support for Entity Framework 6.0

    MySQL Enterprise Monitor 3.0.3
    MEM 3.0 offers many significant improvements over previous releases
    MySQL Enterprise Monitor 3.0.3 is now available for download on the My Oracle Support (MOS) web site. It will also be available via the Oracle Software Delivery Cloud with the November update in about 1 week. This is a maintenance release that fixes a number of bugs. You can find more information on the contents of this release in the change log.

    You will find binaries for the new release on My Oracle Support. Choose the "Patches & Updates" tab, and then use the "Product or Family (Advanced Search)" feature.

    You will also find the binaries on the Oracle Software Delivery Cloud in approximately 1 week. Choose "MySQL Database" as the Product Pack and you will find the Enterprise Monitor along with other MySQL products.

    Based on feedback from customers, MySQL Enterprise Monitor (MEM) 3.0 offers many significant improvements over previous releases.

    Why Choose Oracle Linux for your Oracle Database 12c Deployments
    Sumanta Chatterjee and Monica Kumar
    Available On-Demand

    Oracle Database on Oracle Linux helps customers lower IT costs while delivering high quality of service. With Oracle Database 12c and Oracle Linux, customers benefit from the joint development and testing resulting in optimized features, better stability and higher performance to enable the next generation of enterprise applications.

    In this webcast, Oracle experts will cover:

    • Advantages of choosing Oracle Linux for Oracle Database
    • Key optimizations and features such as Database Smart Flash Cache, data integrity, and Cgroups that make Oracle Linux the best performing and most reliable Linux for deploying Oracle Database
    • Tools to simplify and speed deployment of Oracle Database on Linux, including Oracle VM Templates, Oracle Validated Configurations, and pre-install RPM
    • Integrated database and operating system management with Oracle Enterprise Manager
    • Real-life customer examples

    Don't miss this informative session. Register now.

    IT - Cloud
    Cloud Computing Will Become the Bulk of New IT Spend By 2016, Says Gartner
    Gartner, October 24th, 2012
    "The use of cloud computing is growing, and by 2016 this growth will increase to become the bulk of new IT spend, according to Gartner, Inc. 2016 will be a defining year for cloud as private cloud begins to give way to hybrid cloud, and nearly half of large enterprises will have hybrid cloud deployments by the end of 2017.

    Gartner describes cloud computing as a style of computing in which scalable and elastic IT-enabled capabilities are delivered 'as a service' using Internet technologies. It heralds an evolution of business in positive and negative ways. It has also become a hot industry term that has been used in many contradictory ways..."

    Cloud Strategies and Adoption
    Help Net Security, October 25th, 2013
    "The use of cloud computing is growing, and by 2016 this growth will increase to become the bulk of new IT spend, according to Gartner. 2016 will be a defining year for cloud as private cloud begins to give way to hybrid cloud, and nearly half of large enterprises will have hybrid cloud deployments by the end of 2017..."
    What's Holding Back the Cloud Industry?
    Network World, October 29th, 2013
    "While cloud enthusiasts roaming the halls of McCormick Place convention hall in Chicago last week at Cloud Connect may be high on the market, the reality is that many enterprises IT shops are still reticent to fully embrace public cloud computing.

    Network World asked some of the best and brightest minds in the industry who were at the event about what's holding the cloud industry back. Here's what they said:..."

    What Are the Real Economics of the Cloud?
    Bank Systems and Technology, October 31st, 2013
    "Buyer beware is a long-standing and foolproof guideline for any bank technology executive. Whether evaluating potential replacements for legacy core systems, considering new analytics systems or application development tools, or assessing possible BPO partners, CIOs must cut through marketing hype, management prejudices and price confusion to make informed, objective decisions about the technologies their organizations license, pay for and use. This also involves defining and applying relevant metrics and key performance indicators that can track and interpret the performance of these technology investments..."
    IT - CxO
    Pep Talk from SEC Boss to Compliance Officers
    FCA Blog, October 25th, 2013
    "SEC Chairman Mary Jo White told an audience Tuesday from the National Society of Compliance Professionals that compliance officers 'have a very tough job in a complex industry where the stakes for all concerned are extremely high.'

    The SEC, she said, has tremendous respect for compliance officers and "will do everything we can to help empower you so you can do your jobs even more effectively..."

      10 Ways to Command Influence
      CIO Insight, October 28th, 2013
      "You need more than a lofty job title or a long list of potential benefits. And, frankly, you need more than a strong proposal. No, in order to gain important advocates within your organization for your IT-driven plans, you have to emerge as influential. So what's this actually mean?

      ... But the recent book, Confidence: Overcoming Low Self-Esteem, Insecurity, and Self-Doubt (Hudson Street Press), reveals the following best practices to develop soft skill-based techniques to help elevate your wish list into a must have within your company's leadership..."

      • Seek to Influence, but not to Control
      • Never Convey Uncertainty About Your Idea
      • Don't Obsess About "Winning" Arguments
      • Don't be Overly Critical
      • Give Praise, but Only If It's Honest
      • Embrace Diverse Perspectives
      • Smile
      • Remember Names
      • Use Listening as a Tool
      • Spread the Love

      Read on for details.

      A Critical Quality You Want in Your Employees? It's Inquisitiveness
      TLNT, October 28th, 2013
      "One of the main competencies that any company today should look for in any new employee is inquisitiveness. If you are looking to build a stable of expat-eligible employees, do yourself a favor and move inquisitive to the top of the list.

      As I talk to executives across the globe, I have zeroed in on that and, like a pit bull, I will not let it go..."

        Code For America Made Me A Better IT Leader
        Information Week, October 23rd, 2013
        "Code for America, sometimes known as the 'Peace Corps for Geeks,' has been helping cities reinvent themselves since 2009. The organization has grown from sending "fellows" to help governments and citizens hack municipal processes, to creating volunteer 'brigades' of people who want to change government for good.

        At the most recent Code for America conference in San Francisco, I learned so much that it made my head spin, but the most useful lessons I took away focus on three key areas: better service design, continuous improvement and workplace engagement. Whether you're in government or corporate IT, who doesn't need a refresher on all three?..."

        Forrester: CIOs Must Embrace, Not Fight, The Employee 'Digital Self'
        SearchCIO, October 28th, 2013
        "The line between an individual's work identity and "personal cloud" is blurring -- and enterprise software is catching on to that. Microsoft's new Smart Search features in Windows 8.1, for example, will index both work and personal data on PCs, file servers and online; we expect other services to provide similar integration.

        Forrester's surveys show that individuals are using cloud technologies to store their personal and work stuff -- files, contacts, photos, music, and videos -- in online services. In the U.S., 77% of online adults use one or more of these services, while in Europe 61% do so. As a result, there is now a new Internet gold rush to help customers and employees build their "digital self" and to help them access, manage and benefit from their digital information using any smartphone, tablet, PC or Web browser. Forrester believes this gold rush for the digital self will play out over the next six years..."

        Picking Your Successor
        CIO Insight, October 15th, 2013
        "For CIOs who aspire to excellence, and who may seek another corner office in the company, succession planning is one of the responsibilities that come with the job.

        With apologies to Pete Townshend and The Who, the title of one of the British band's iconic rock albums seems a fitting place to start, and the question to ask, when it comes to CIO succession planning: Who's next?

        Some have referred to succession planning as planning for one's eventual obsolescence. It's not a trivial issue given the importance of technology in nearly every industry today, which makes it's all the more curious that most organizations and CIOs give short shrift to succession planning for this critical position..."

        Tearing Down IT Silos
        ComputerWorld, October 28th, 2013
        "Silos. Stovepipes. Ping Pong. Finger pointing. We've all heard these terms when people talk about IT. The silos that plague IT organizations and the constant finger pointing back and forth when issues arise are preventing IT from moving at the speed of business. We need to find a way to bridge the gap between the various functions to ensure that IT keeps up with the business' needs. Getting there will require a combination of people, process and technology.

        Why is this so important now? In previous blogs, I've shared my perspective on the unintended consequences of IT transformations..."

          Why You Really Should Move Quickly to Get Rid of Bad Hires
          TLNT, October 29th, 2013
          "Everyone knows that the average hiring process is less than perfect.

          In fact, most selection processes have high failure rates (i.e. even after months or even years of '0assessment,' nearly 60 percent of the marriages in California end in divorce).

          So it shouldn't be a surprise that as many as 46 percent of new hires fail within 18 months, according to Leadership IQ. Research also reveals that 61 percent of new hires are unhappy because they feel that they had been misled during the hiring process, according to Harris Interactive..."

            ITPalooza 12/12/13 Ft. Lauderdale
            Network - Learn - Connect - Community
            Last year, on 12/12/12, ITPalooza raised over $30,000 in charitable donations from 1,200 members of the local IT community.

            In keeping with the spirit of bringing together the whole South Florida Technology community, this year, on 12/12/13, ITPalooza will be a full day of vendor-prospect interaction, tech education sessions, hackathons, professional networking and a tech employment fair.

            Organized by over 50 local technology groups and industry partners, from the iCoast CIO Council to the Cloud Security Alliance and hands-on programming groups, the day culminates with a grand courtyard holiday party with live music by the all-IT professional ITPalooza House band.

            • Join 1500 IT Professionals for South Florida's premier user group meetings and holiday party
            • Multiple tracks presented by South Florida IT Professionals - All in one place
            • Find your niche, Join a user group. Over 50 to choose from
            • Marine Toys For Tots will be on hand to collect your new unwrapped toys

            Details and Registration Link.

            Sun Flash Accelerator F80 PCIe Card
            800GB capacity, delivers 2x the capacity of the previous F40 Flash Card for less than half the $/GB
            Oracle's Sun Flash Accelerator F80 PCIe Card accelerates IO-starved applications and server performance by reducing storage latencies and increasing I/O throughput for greater productivity and business response!

            Sun Flash Accelerator F80 PCIe Card offers the following:

            • Helps servers and their applications run faster and more efficient, while reducing power and space
            • With 800GB capacity, delivers 2x the capacity of the previous F40 Flash Card for less than half the $/GB
            • Accelerates I/O constrained databases with increased IOPS and consistent low-latency response timers

            Current and planned server support includes:

            • The F80 is currently supported in Oracle's SPARC T4-1, T4-2 and X4-2L servers.
            • SPARC T5, M5, M6 and Fujitsu M10 server support is planned for December 2013 (Preliminary only)

            See the Sun Flash Accelerator F80 PCIe Card page for details.

            IT - DR
            10 Post-Sandy Business Continuity Must Dos
            Wall Street and Technology, October 28th, 2013
            "Superstorm Sandy rewrote the book on business continuity/disaster recovery in ways that are still being sorted out. Here are 10 recommendations worth considering when assessing your BC planning and priorities:.."

            • Up To Date
            • Communication
            • Contact Lists
            • Worst Case Scenario
            • Powerless
            • Hidden Talents
            • Location, Location, Location
            • Telecom In Focus
            • Mission Critical Systems
            • Check Your Partners

            Read on for details.

            Shelter from the Storm: Business Continuity & Rethinking Disaster
            Wall Street and Technology, October 28th, 2013
            "Just one year ago, Superstorm Sandy devastated many parts of the US, proving more than a match for businesses and regional and national government agencies. Some 24 states were affected, including the entire eastern seaboard from Florida to Maine and as far west as Michigan and Wisconsin. Damage in the US has been conservatively estimated at approximately $50 billion, with some 159 people killed.

            Ram Nagappan, Pershing The effects on the US Northeast, the center of financial services and international commerce, were shattering. For organizations with any kind of exposure to Sandy, this calamity raised fundamental questions about business continuity (BC) and disaster recovery standards..."

            IT - PM
            Why Do Big IT Projects Fail So Often?
            Information Week, October 29th, 2013
            "By now nearly every American has heard about or witnessed the poor performance of Early on, only one of every five users was able to actually sign in to the site, while poor performance and unavailable systems continue to plague the federal and some state exchanges. Jeffrey Zients, the Obama appointee called in to fix, promised on Oct. 25 that the site "will work smoothly for the vast majority of users" by the end of November.

            Soon after the launch on Oct. 1, former federal CTO Aneesh Chopra, in an Aspen Institute interview with The New York Times' Thomas Friedman, shrugged off the website problems, saying that "glitches happen." Chopra compared the downtime to the frequent appearances of Twitter's "fail whale" as heavy traffic overwhelmed that site during the 2010 soccer World Cup..."

            IT - Networks
            10 Free Network Defense Tools
            Dark Reading, October 28th, 2013
            Affordably protect the perimeter and beyond with these handy network security utilities and toolkits

            • DataSoft Nova
            • Fierce Domain Scan
            • Hping
            • Wireshark
            • Kismet
            • Ettercap
            • Xplico
            • Evader
            • Nmap
            • Network Security Toolkit

            Read on for details.

            How to More Easily Upgrade Your Network to 40/100G Ethernet
            Network World, October 28th, 2013
            "Upgrading you network from 10G Ethernet to 40G and 100G is not as easy as swapping out switches and line cards.

            Several factors have to be weighed, such as synchronizing switch clocks for the higher-speeds, especially among multivendor equipment; ensuring latency remains at acceptable levels; keeping the network design and architecture optimal for 40/100G; and making sure the existing cabling infrastructure can accommodate the 4x to 10x increase in bandwidth..."

            SDN Licensing: Please Keep It Simple
            Network Computing, October 28th, 2013
            "As SDN products come to market, networking vendors are looking at new ways of charging customers. The talk is about consumption models, tiered licensing and variable costing. I'm asking vendors to use common sense to design pricing plans that are easy to comprehend and consume.

            Vendors should recognize that early deployments of SDN will largely be performed in test beds, proof-of-concept labs, or skunkworks projects with little or no funding. Vendors would be smart to offer zero cost for pilots and early adopters to help spur these kinds of deployments..."

              Six Questions to Ask Your SDN Supplier
              Network World, October 28th, 2013
              "Let's face it - real-world deployments of SDN are currently few and far between. While deployments have started to reach beyond the leading-edge Googles and Microsofts of the world, most enterprises and service providers are still in research mode with respect to SDN and the related Open Networking and Network Functions Virtualization (NFV) movements. The good news is that suppliers - even the leading-edge suppliers - are also more SDN researchers and developers than installers and integrators right now..."
                IT - Operations
                6 Dirty Secrets of the IT Industry
                InfoWorld, October 28th, 2013
                "IT pros usually know where the bodies are buried. Sometimes that's because they're the ones holding the shovel.

                We asked InfoWorld readers to reveal the dirtiest secrets of IT -- the less-than-white lies and dark sides of technology that others may not be aware of. We then ran those 'secrets' through a BS detector, fact-checking them with experts in the relevant field. In some cases the experts concurred, in other cases they did not."

                IT - Security
                Browser Fingerprinting: 9 Facts
                Information Week, October 24th, 2013
                "Not all firms that track consumers' browsing behavior by using advanced browser fingerprinting techniques fail to honor 'Do Not Track' (DNT) flags or opt-out preferences.

                So said James Brentano, VP of solutions at BlueCava, responding to a recently released study -- 'FPDetective: Dusting the Web for Fingerprinters' -- from privacy researchers in Belgium and the United States. The study reported that at least 404 of the world's one million most popular websites were using advanced techniques to fingerprint users and devices and to tie an individual consumer's identity to multiple devices. The researchers warned that latest-generation techniques, based on JavaScript and Flash fingerprinting of devices, aren't technically cookies, and thus might allow advertisers to bypass European cookie laws..."

                Control System Security: Safety First
                Help Net Security, October 30th, 2013
                "Every large utility, pipeline, refinery and chemical plant has a cyber security program, but most are IT-centric. Anti-virus programs, software update programs and programs of integration with corporate active directory controllers are all managed by IT teams, along with some degree of convergence and consultation with operations technology (OT) teams. While we have seen few large-scale cyber attacks in these industries, IT-style defenses invite such attacks. Cyber-sabotage is a real threat and it will take more than yesterday's firewall-level protections to ensure the safety and reliability of today's industrial sites..."
                Electronic Privacy? There's No Such Thing
                ComputerWorld, October 28th, 2013
                "Most people suffer from the delusion of privacy. They think it can be guaranteed somehow for their various electronic gadgets. But that is a delusion, and sadly even many in the information security field don't know it. Still, it's surprising how strong the desire to believe otherwise is, and how tech companies will sometimes try to feed that illusion..."
                Enterprise Security's Overlooked Factor -- The End User's Age
                Dark Reading, October 26th, 2013
                "When it comes to security policy, most enterprises treat all users the same way. But perhaps this is a mistake. When you take a closer look at the age of your end users -- their 'generational identities' -- you may find that users of different generations have very different attitudes and practices with regard to online privacy and security.

                Currently, there are four clear-cut generations of end users in the workforce: Traditionalists, Baby Boomers, Generation X, and Gen Y, sometimes called Millennials. A fifth generation -- let's call them Gen Z for now -- is about to enter. Let's look at the profile of each generation of user and discuss how the history and background of each one might shape the group's attitude toward online security..."

                Incident Response Matters
                CSO Online, October 28th, 2013
                "When the social media management and sharing site Buffer was hacked over the weekend, it seemed like yet another embarrassing hack. 'The incursion is no doubt a major black-eye for the upstart Buffer,' wrote David Berlind at Programmable Web. '[Buffer CEO Joel] Gascoigne has entered the dreaded damage-control zone that no start-up CEO wants to be a part of.'

                I think David's post is an absolutely excellent overview of some of the realities and politics faced by developers when dealing with Twitter and Facebook (and by extension, other API providers), and I also think that his post accurately summed up the general risks faced by Buffer and Gascoigne.

                I am going to disagree, though, that it was necessarily a black eye..."

                So You Have an IT Security Policy, but Have You Changed the Culture? Part 1
                Business 2 Community, October 25th, 2013
                "Is your firm ticking all the boxes when it comes to information security? Now more than ever, it's important to be compliant with industry and government regulations. For the last several years, governments and industry groups on both sides of the Atlantic have been increasing the level of regulation for organizations, forcing them to prove that they have the proper controls in place.

                What happens if an organization doesn't comply with security rules? They could be subject to expensive fines: breaching the Payment Card Industry (PCI) security standards imposed by credit card companies can result in fines of up to $100,000 each month, for example..."

                Visual Investigations of Botnet Command and Control Behavior
                Help Net Security, October 29th, 2013
                "One of the classic debates in computer science concerns whether artificial intelligence or virtual reality is the more worthwhile pursuit. The advocates of artificial intelligence argue that computers can replace the need for human cognition, and will eventually be able to out-think us. The advocates of virtual reality argue that computer systems augment human intuition more effectively than they replace it, and that a human/machine symbiosis will always be more powerful than machines alone.

                This debate has considerable relevance for the world of computer security..."

                When the Phone Call is More Dangerous than Malware
                Help Net Security, October 30th, 2013
                "During Social Engineer Capture the Flag contest, one of the most prominent and popular annual events at DEF CON 21, a pool of 10 men and 10 women, from diverse backgrounds and experience levels, tested their social engineering abilities against 10 of the biggest global corporations, including Apple, Boeing, Exxon, General Dynamics and General Electric. The complete results of the competition are in, and they don't bode well for businesses..."
                  With Security, Prayer is Not the Answer
                  InfoWorld, October 29th, 2013
                  "Are you a mathematician or a priest?

                  What I mean: I'm always amazed by the lack of real data brought to bear in computer security and how people push agendas that have little basis in fact. It can leave an old computer security pro like me disillusioned.

                  We're told that buying the latest and greatest security product will be the answer to all our prayers. We buy it and implement it -- yet it doesn't stop the bad guys from breaking in.

                  If you want to become a better computer security practitioner, use your own data to make better decisions. It's there for the taking..."

                  IT - Careers
                  Ten Signs It's Time to Find a New Employer
                  Baseline, October 24th, 2013
                  "You can give yourself pep talks on the way to work every morning. You can load up on caffeine to give yourself an artificial boost. You can keep saying, 'It's going to get better.' However, there's a big difference between trying to maintain a positive attitude and allowing yourself to 'die on the vine' in a work environment that's just not right for you. There are certain fixed dynamics-corporate culture, products and services offered, advancement opportunities, co-workers' performance and personalities, etc.-that you can't change no matter how talented, dedicated and driven you are. And when your workplace drains your energy, enthusiasm and passion for your job, it's time to find a new employer...":

                  • You Obsess About "What Ifs"
                  • You Worry What Will Go Wrong Next
                  • "Trash-Talking" Is Out of Control
                  • You Promise to Quit, but Never Do
                  • Your Bosses Openly Hate Their Jobs
                  • Your Work Is Mediocre and You Don't Mind
                  • You Don't Care What Your Company Does
                  • You Get No ROI on Your Successes
                  • You Let Little Things Bug You
                  • You Get Not-So-Subtle Hints

                  Read on for details.

                  9 Frightening Realities from Within the IT Department
                  InfoWorld, October 28th, 2013
                  "In the spirit of Halloween, CSO recently spoke to Adam Stewart, VP of engineering at Autotask, to outline the most frightening aspects of working in IT..."

                  • Money, money, money
                  • Backup corruption
                  • Unrealistic deadlines
                  • Lapses (no, not in judgment -- although those are scary, too)
                  • Power loss
                  • Uncontrollable barriers
                  • (Cuts to) money, money, money
                  • Password death
                  • Disaster preparedness?

                  Read on for details.

                    Ten Ways to Get Buy-In for Your Proposal
                    Baseline, October 21st, 2013
                    "You may have the greatest idea in the world, but it won't go anywhere if you don't know how to sell it to your company's stakeholders - and they can range from employees to the C-suite to customers and business partners. Any proposal that affects the organization must gain support and buy-in..."

                    • Establish Clarity
                    • Keep It Tight
                    • Conduct an Assessment
                    • Identify and Recruit Supporters
                    • Identify and Win Over Adversaries
                    • Be Honest About Potential Problems
                    • Adjust Your Pitch to the Audience
                    • Pump Up Your Presentation
                    • Explain Shareholders' Roles
                    • Create a Project Community

                    Read on for details.

                      IT - Virtualization
                      Maximizing Value in VMware Caching
                      Storage Switzerland, October 30th, 2013
                      "Maximizing the value of a VMware caching solution involves more than developing algorithms to determine the hottest data and figuring out ways to keep that data in the cache. It also means getting the most out of that expensive flash capacity supporting the VMware cache implementation. This requires understanding VMware data types and eliminating redundant data in the cache. It's also important to understand how data is written to NAND flash to get the best performance from the flash medium and to minimize the impact of those writes on flash endurance..."
                      Seven Essentials for VM Management and Security
                      CSO Online, October 28th, 2013
                      "Virtualization isn't a new trend, these days it's an essential element of infrastructure design and management. However, while common for the most part, organizations are still learning as they go when it comes to cloud-based initiatives.

                      CSO recently spoke with Shawn Willson, the Vice President of Sales at Next IT, a Michigan-based firm that focuses on managed services for small to medium-sized organizations. Willson discussed his list of essentials when it comes to VM deployment, management, and security..."

                      IT - Mobile
                      Bad Mobile Sites Hurt Business - 7 Mistakes to Avoid
                      Yahoo! Small Business Advisor, October 30th, 2013
                      "Going mobile isn't a task that should be pieced together in an attempt to keep up with the Joneses. In fact, a poor mobile website may do more harm than good. Without analyzing the strategy and functionality of your mobile presence, you may actually negatively impact your company by providing a poor user experience. That doesn't mean businesses should forego mobile websites, it means that a quality mobile presence should be a priority. Here are seven common pitfalls of poor mobile websites:

                      • Redirect SEO penalties
                      • No auto-sync
                      • Slow load times
                      • Generic Templates
                      • Not thumb-friendly
                      • Hidden call-to-actions
                      • Poor ecommerce or bookings

                      Read on for details.

                        IT - Big Data
                        Data Industry Must Step Up to Protect Consumer Privacy
                        AdAge, October 28th, 2013
                        We are awash in data. Every time we go online or use a smartphone or credit card, our purchases and movements are tracked. We keep our schedules, plan trips and celebrate birthdays online. When we go outside, ubiquitous CCTV and security cameras capture our movements. And a world of interconnected refrigerators, thermostats and other everyday devices -- the Internet of Things -- lies just ahead...

                        To reap these rewards, we're told we need to scrap many of the basic privacy principles. Some big-data enthusiasts dismiss transparency, choice, accuracy, data minimization and other protections as unworkable. Others argue that the drawbacks of applying basic privacy principles outweigh the benefits..."

                        Hadoop in Production: 5 Steps to Success
                        Information Week, October 28th, 2013
                        "Bringing a proof-of-concept project into production is only the beginning. Postproduction, Hadoop differs greatly from other information technologies. Deploy SAP or Salesforce, for example, and the transition typically means a shift into a lower-intensity "maintenance" mode, where less attention and fewer resources are required. With Hadoop, in contrast, delivery of the first production application is just the start of the journey. Trust me: Pressure will soon mount to develop new applications. And these new applications will require integration with new data sources. Your users will want to run more and more exploratory jobs..."
                        Ten Big Data Case Studies in a Nutshell
                        SearchCIO, October 28th, 2013
                        "You haven't seen big data in action until you've seen Gartner analyst Doug Laney present 55 examples of big data case studies in 55 minutes. It's kind of like The Complete Works of Shakespeare, Laney joked at Gartner Symposium, though 'less entertaining and hopefully more informative.' (Well, maybe, for this tech crowd.) The presentation was, without question, a master class on the three-Vs definition of big data: Data characterized by increasing variety, velocity and volume. It's a description, by the way, that Laney -- who also coined the term infonomics -- floated way back in 2001..."
                        What's the Best Path to Big Data Insight?
                        Information Week, October 25th, 2013
                        "How is your company going to get to the promised land of big data insight? Technology vendors, as always, stand ready to be your guide, but who can really take you where you want to go? On the one hand there are the incumbents, companies like Teradata and SAS that have been solving your large-scale data problems and most advanced analytics challenges for decades. Then there are the big data startups and visionaries, including the likes of Pivotal and Platfora, that are "all in on Hadoop" and insist that big data opportunities and new platforms demand new tools. Then there's the wild west of purely open source options..."
                        IT - BYOD
                        BYOD Program: Device and Infrastructure Gotchas
                        SearchCIO-Midmarket, October 28th, 2013
                        "Barry Porozni, CIO of The Reinvestment Fund in Philadelphia, recently spoke with SearchCIO-Midmarket Editorial Director Christina Torode about TRF's bring your own device (BYOD) program. Here, in part 1, he discusses the surprises he encountered and how he prepared the infrastructure for mobile devices. TRF is a community development financial institution that manages more than $700 million in capital and has made more than $1.2 billion in community investments, financing more than 2,750 projects since it was founded in 1985..."
                        Top Ten Articles for last few Issues
                        Vol 188 Issues 1, 2, 3 and 4; Vol 187 Issues 1, 2, 3 and 4
                        We track how frequently each article is viewed on the web site to determine which the readers consider the most important. For last week, the top 10 articles were:

                        • Oracle VM Server for SPARC: which domain types should be used to run applications
                        • How to Set Up a Hadoop Cluster Using Oracle Solaris
                        • State of the Java platform and all the roadmaps
                        • Oracle's Full Line of Integrated Sun Servers
                        • Oracle Licenses VMware vSphere Storage APIs for Oracle Storage
                        • October 2013 Virtualization Newsletter
                        • Temenos T24 achieves Oracle Exadata Optimized and Oracle Exalogic Optimized status
                        • Unbreakable Enterprise Kernel Release 3 for Oracle Linux
                        • October 2013 Oracle Linux Newsletter
                        • Java Spotlight Episode 149: Geertjan Wielenga on NetBeans 7.4

                        The longer version of this article has list of top ten articles for the last 8 weeks.

                          IT - Encryption
                          Email Goes 'Dark' -- Encrypted, That Is
                          InfoWorld, October 31st, 2013
                          "In the light of a seemingly endless series of revelations about the NSA's multifaceted infiltrations of just about every network there is, including the private fiber used by Google and Yahoo, more and more folks are stepping up to offer possible solutions.

                          But because both the Internet and encryption aren't as singular or straightforward as they could be, it isn't likely to be something that can be delivered as a single product anytime soon.

                          The most common analogy used about email security is that it's no better than a postcard written in pencil and sent via conventional mail. To do something about it, two big names in security, Lavabit and Silent Circle, are joining forces to create a project they call the Dark Mail Alliance..."

                          LibreOffice 4.1.3
                          Third minor release of the LibreOffice 4.1 family
                          The Document Foundation (TDF) announces LibreOffice 4.1.3, for Windows, Mac OS X and Linux. This is the third minor release of the LibreOffice 4.1 family, which features a large number of improved interoperability features with proprietary and legacy file formats.

                          The new release is another step forward in the process of improving the overall quality and stability of LibreOffice 4.1. For enterprise adoptions, The Document Foundation suggests LibreOffice 4.0.6, supported by certified professionals.

                          LibreOffice 4.1.3 is available for immediate download.

                          LibreOffice 4.0.6
                          Sixth and probably last minor release of the LibreOffice 4.0 family
                          The Document Foundation (TDF) released LibreOffice 4.0.6, for Windows, OS X and Linux, the sixth and probably last minor release of the LibreOffice 4.0 family, targeted to corporate deployments - when backed by professional support - and conservative users.

                          LibreOffice 4.0.6 solves almost 70 bugs and regressions over the previous release, thanks to the work of an increasing number of QA volunteers.

                          Fundamental Concepts for VLAN Networks
                          With Oracle VM Server for x86 by Gregory King and Don Smerker
                          Oracle VM Server for x86 supports a wide range of options in network design. This article discusses the basic concepts relevant to Oracle VM networking. Understanding these concepts will help you make informed design choices and enable you to build a scalable, robust network architecture that has high degree of channel separation.

                          This article focuses on understanding a complex Oracle VM network infrastructure that uses bonded interfaces with VLAN tags specifically for Oracle VM 3.1 and 3.2. (For information on other releases, see the release-specific documentation.) Topics include Xen domains, physical hardware choices including network bonding, logical Oracle VM networks and network channels, and VLAN segments and groups.

                          Oracle Enhances Oracle Virtual Networking
                          Fastest Data Center Fabric Platform Adds Support for Oracle SPARC M6-32 and Fujitsu M10 Servers
                          Oracle announced new enhancements to Oracle Virtual Networking to help customers further improve infrastructure performance, reduce cost and complexity, and simplify storage and server connectivity.

                          Oracle Virtual Networking is the industry's first and only open architecture data center fabric that simplifies complex data center deployments with a wire-once solution and simple software defined network configurations.

                          Oracle Virtual Networking is the only data center fabric with up to 80 Gb/sec bandwidth to the server that can deliver large server pools with scalable I/O configurations.

                          Building on Oracle Virtual Networking's support for a broad range of x86 and SPARC servers, operating systems and leading hypervisors, the enhancements announced today are:

                          • SPARC M6-32 Server Support
                          • High Availability for Storage:
                          • Oracle Linux and Oracle VM Integration

                          Oracle Virtual Networking continues to experience significant growth across a wide range of industries and with added support for Oracle's SPARC servers, it is gaining traction in new industries like financial services and retail.

                          Security Inside Out Newsletter
                          October Edition
                          The latest October edition of the Security Inside Out newsletter is now available and covers the following important security news:

                          • Securing Oracle Database 12c: A Technical Primer
                          • HIPAA Omnibus Rule Is in Effect: Are You Ready?
                          • The Internet of Things: A New Identity Management Paradigm

                          Read on for details.

                          Trending in
                          Vol 234, Issue 3
                          Trending IT Articles