News about Oracle's Solaris and Sun Hardware
System News
Nov 25th, 2013 — Dec 1st, 2013 Generate the Custom HTML Email for this Issue
System News System News for Sun Users
Volume 189, Issue 4 << Previous Issue | Next Issue >>
Sections in this issue:
click to jump to section

Database Cloning in Minutes using Oracle Enterprise Manager 12c Snap Clone
Webinar: Tuesday, December 3, 2013 - 7:00 a.m. PST/10:00 a.m. EST
Oracle Enterprise Manager 12c Snap Clone allows administrators to create fully functional copies of databases using the copy-on-write capabilities of the underlying storage layer. Users can request databases from Oracle Enterprise Manager 12c's self-service portal and have them provisioned within minutes instead of hours while keeping storage needs to a minimum. Part of Oracle Enterprise Manager 12c Cloud Management Pack for Oracle Databases, Snap Clone can fundamentally improve the efficiency and agility of administrators and QA engineers while saving storage costs and other capital expenses.

Join Oracle for this webcast to learn how Oracle Enterprise Manager 12c Snap Clone can help:

  • Leverage storage copy-on-write technologies for fast provisioning
  • Integrate cloning with other Oracle Enterprise Manager 12c Lifecycle Management features, such as data masking and sub-setting
  • 'Time travel' across multiple database snapshots to restore and access past data
  • Reduced administrative overhead from integrated lifecycle management

Register Now!

Managing Many Databases as One: Pluggable Databases from Oracle
IDC Whitepaper by Carl W. Olofson
Javier Puerta writes, "A constantly increasing quantity of databases drives a 'complexity crisis' that causes DBA workload, and errors, to skyrocket. Oracle Multitenant addresses this by managing multiple databases in bulk. IDC spoke with three customers who verify that Oracle Multitenant drives dramatic savings in DBA time, performance gain, and lower resource use.

Report is posted to at the below link (rights expire November 2014).

Big Data - Real and Practical Use Cases
Data Factory - Data Warehouse Expansion - Information Discovery - Closed Loop Recommendation and Analytics System
Jean-Pierre Dijcks writes, "The goal of this post is to explain in a few succinct patterns how organizations can start to work with big data and identify credible and doable big data projects. This goal is achieved by describing a set of general patterns that can be seen in the market today.

Big Data Usage Patterns

The following usage patterns are derived from actual customer projects across a large number of industries and cross boundaries between commercial enterprises and public sector. These patterns are also geographically applicable and technically feasible with today's technologies.

This paper will address the following four usage patterns:..."

Smart Metering Operations Suite Achieves Oracle Exadata Optimized Status
For Smart Metering Operations Suite (SMOS)
GE's Digital Energy business announced it has achieved Oracle Exadata Optimized status through Oracle PartnerNetwork (OPN), demonstrating that its Smart Metering Operations Suite (SMOS) version 4.0.1 has been tested and tuned on Oracle Exadata Database Machine to deliver speed, scalability and reliability to customers. Oracle Exadata provides a database of massive flash memory to store crucial metering information for smart metering operations. Together with this hardware, GE's SMOS provides a complete meter and transaction management system capable of housing and analyzing raw usage data. GE is a Gold level member of OPN.
Volante Technologies Achieves Oracle Exalogic Optimized, Oracle Exadata Ready, and Oracle SuperCluster Ready Status
Volante Suite is Optimized for Speed and Reliability on Oracle Exalogic Elastic Cloud
Volante Technologies Inc. announced that Volante Suite 4.0 has achieved Oracle Exalogic Optimized, Oracle Exadata Ready, and Oracle SuperCluster Ready status through Oracle PartnerNetwork (OPN). This announcement demonstrates that Volante Suite 4.0 has been tested and tuned with Oracle Exalogic Elastic Cloud to deliver speed, scalability and reliability to customers. Additionally, Volante Technologies supports VOLANTE SUITE 4.0 with Oracle Exadata Database Machine and Oracle SuperCluster Oracle Solaris 11, Oracle Linux, and Oracle VM 3.

The Volante product is a model-driven code generator that enables data integration and helps firms navigate and manage the diverse, complex and constantly growing mass of message formats, standards and protocols throughout the lifecycle of any financial transaction. Volante works with commercial and retail banks, corporate treasury departments, buy and sell side organisations, exchanges, custodians, clearing houses and financial industry utilities. Volante is a Gold level member of Oracle PartnerNetwork.

IT - Storage
Top Seven Use Cases for Business-class Cloud File Sync
MSPmentor, November 27th, 2013
"Business-class cloud file sync services support a multitude of use cases that can help organizations work more efficiently and effectively with information resources in this increasingly mobile environment. For managed services providers (MSPs) and value-added resellers (VARs), knowledge of these use cases will likely help them to convince clients of the value of business-class cloud file sync.

The following are seven key areas where business-class cloud file sync can deliver value for organizations. Most of these use cases can apply to any size business in virtually any type of industry..."

    Java Technology
    Java Mission Control
    Production Time Profiling Out of the Box
    Marcus Hirt writes, "With the release of 7u40, there is a new kid on the JDK tooling block - Java Mission Control. This article will try to explain why it is worthwhile to take a closer look at this technology, as well as provide pointers on how to get started.


    Mission Control is a production time profiling and diagnostics tools suite that originated with the tooling available for the JRockit JVM..."

    Java Platform Standard Edition 8 Early Access Documentation
    Java SE 8 - JDK 8 - JRE 8
    Oracle has two products that implement Java Platform Standard Edition (Java SE) 8: Java SE Development Kit (JDK) 8 and Java SE Runtime Environment (JRE) 8.

    JDK 8 is a superset of JRE 8, and contains everything that is in JRE 8, plus tools such as the compilers and debuggers necessary for developing applets and applications. JRE 8 provides the libraries, the Java Virtual Machine (JVM), and other components to run applets and applications written in the Java programming language. Note that the JRE includes components not required by the Java SE specification, including both standard and non-standard Java components.

    IT - Technology
    Two-Seat Electric Octodecacopter Completes Early Flight Tests
    Wired, November 25th, 2013
    "A German company has developed and flown a scaled-up version of the electric quadcopters normally seen darting around parks and fields, but this version will carry two people and could fly for up to an hour. E-volo's new model has made 'multiple flights lasting several minutes' according to the company, including flights to 22 meters (limited by flying indoors). The VC200 uses carbon fiber and 18 separate motors and propellers powered by multiple batteries for redundancy..."
      Fleet of CubeSat nanosatellites now orbiting earth, sending back data
      ComputerWorld, November 25th, 2013
      "Scientists are already receiving and analyzing information coming in from a fleet of tiny satellites launched into space last week.

      NASA and the U.S. Air Force teamed up to launch an Air Force Minotaur 1 rocket carrying 28 small satellites, some built by college students, on Nov. 19 from Wallops Flight Facility in Virginia.

      The satellites, dubbed CubeSats because of their cube shape, were built by people from various organizations and universities, including NASA, Vermont Technical College, University of Kentucky and University of Louisiana at Lafayette..."

        To secure the Internet of things, assume failure'
        InfoWorld, November 25th, 2013
        "The Internet of things (IoT) is due to become reality sooner rather than later. Instead of a handful of Internet-connected devices in the average home, we might see dozens. From thermostats to refrigerators to water meters to hot water heaters, these devices will soon be transmitting data to and receiving data from sources on the Internet..."
          5 factors to consider when selecting an open-source vendor
          Federal Computer Week, November 25th, 2013
          "Government agency adoption of open source in many ways mirrors the path followed by many in-demand technologies in the public sector. Early on, agencies evaluate the benefits and drawbacks of the emerging technology -- whether it is open source, big data, cloud computing, mobility, etc. -- relative to the traditional, legacy alternative. Then, as more agencies experience the tangible benefits of the technology and demand increases, the market follows, and suddenly agencies are facing not one or two vendor options but dozens..."

          • The credibility of the open-source stack
          • The vendor's commitment to support, services and innovation
          • The platform's commitment to open standards
          • Mobile capabilities and the future compatibility of the stack
          • The platform's value beyond software cost savings

          Read on for details.

          Presentations from Solaris Day, Nov 27th, Moscow
          Oracle Solaris Overview and Roadmap, Consolidation Tools, Optimization Tools
          Frederic Pariente writes, "Thanks for attending the Moscow Solaris Day on Wednesday! I am posting here presentations from the event, as promised. I am also pointing you to the Oracle OpenWorld 2013 keynote presentations from John Fowler and Markus Flierl, for further reading on Solaris Sparc roadmap, and to the dimSTAT tool, if you are looking for a powerful monitoring solution for Solaris systems."

          • Oracle Solaris Overview and Roadmap
          • Solaris 11 Consolidation Tools
          • Oracle Solaris Optimization Tools

          Read on for links to the presentations.

          Oracle Solaris 11 in the Cloud
          Hands-On Labs of the System Admin and Developer Community of OTN
          This lab demonstrates how Oracle Solaris can provide the best cloud environment by setting up a multilayer application environment, effectively creating a "cloud in a box."

          • Lab Introduction
          • Prerequisites
          • The Environment
          • Lab Outline
          • Lab Goals
          • Exercise 1: Configuring the System and Setting Up the Network
          • Exercise 2: Configuring the Storage Layer
          • Exercise 3: Configuring the Web Layer
          • Exercise 4: Configuring the Database Layer
          • Exercise 5: Configuring the WordPress Application
          • Exercise 6: Monitoring Zones
          • Exercise 7: Performing Resource Management
          • Exercise 8: Ensuring Availability
          • Exercise 9: Securing the Environment
          • Conclusion
          • For the Adventurous

          Read on for details.

          ContactLab Extends Commitment to MySQL
          Digital Direct Marketing Solutions Provider Standardizes on MySQL Enterprise Edition
          "In Building business-critical applications exhibiting high levels of availability, reliability and security requires a solid, high-performance database. Since 2009, digital direct marketing provider ContactLab has relied on MySQL Enterprise Edition to strengthen the data management of email and SMS campaigns. To help ensure the company continues to benefit from the high performance, secure and reliable database infrastructure it needs for on-going innovation, ContactLab has standardized on MySQL Enterprise Edition."

          "MySQL has a long history of supporting ever-increasing volumes of data. Using MySQL Enterprise Edition to power our platform ensures high reliability and also offers us operational tools that highlight potential problems and allow us to take immediate action," said David D'Amico, Director of Operations, ContactLab. "With MySQL Enterprise Edition we were able to evolve our platform to support the increase in the volume of data managed, ensuring quality customer service. Our continued commitment to this technology will allow us to keep achieving our business objectives, and will enable us to further extend the functionality of the platform and our services."

          IT - Cloud
          7 Things We Learned at AWS Re:Invent 2013
          CIO, November 26th, 2013
          "Amazon Web Services' second Re:invent conference was a big, noisy, sprawling extravaganza spread across the multiple floors and endless hallways of the Las Vegas Venetian Convention Center. If a theme could be distilled from the conference, you could say it's 'Yeah, we do enterprise.'..."

          • New Customers Validating AWS Business Model
          • AWS Adoption Growing at Remarkable Rates
          • AWS WorkSpaces Making VDI Easy
          • AWS AppStream Enabling Mobile
          • AWS Supporting High-computation Workloads
          • AWS Supporting Enterprise Compliance
          • AWS Transforming Disaster Recovery Market

          Read on for details..."

          Personal Clouds Challenge India's CIOs
          Enterprise Efficiency, November 29th, 2013
          "CIOs in India and elsewhere are facing a growing challenge from the use of so-called personal cloud services for storing work-related information. But despite the use of "personal," recent research reveals that such services are increasingly being used by workers for purely business interactions, collaborations, and even transactions -- often without permission from enterprise IT.

          These services, which allow users to access any content, service, device, data, or community, may well become the enterprise's next bugbear. It's up to CIOs and enterprise IT departments to get out ahead of the trend and come up with policies that address enterprise security concerns and ensure sensitive data is not at risk..."

          Businesses Emphasize Basics for Cloud Deployments
          Internet Evolution, November 23th, 2013
          "The state of cloud deployments is a glass-half-empty/glass-half-full thing. On the one hand, businesses are still dealing with only basic goals for cloud deployments. On the other hand, they have plenty of room to grow and enjoy new benefits.

          Riverbed Technology, a company that works to improve the performance of networks and networked apps, surveyed users at the recent Amazon Web Services AWS re:Invent conference to find out how companies are using infrastructure-as-a-service (IaaS)..."

          How to determine if your application is suitable for the cloud
          Network World, November 22nd, 2013
          "We know by now that cloud computing offers significant benefits, but is it ready for mission critical applications? After all, failure of these applications can result in the failure of the business.

          According to a recent survey, concerns about security and availability are the barriers stopping organizations from moving mission critical apps to the cloud. Only about 30%-40% percent of large enterprise applications are in the cloud - most of which are for collaboration, conferencing, email and sales force automation..."

          16 Secrets of Google Drive
          Macworld, November 25th, 2013
          "Google Drive - formerly Google Docs - has come quite a way in nearly a decade of existence. Originally launched as Writely, a startup's clever collaborative word processor, Google quickly acquired the app, changed the name to Google Docs, and released it as a new way to help people work together more efficiently using little more than a browser.

          Google changed the name again to Google Drive in April 2012, reflecting the ever-expanding goals and capabilities of the suite. Google Drive's many and varied capabilities - from chat with collaborators in a document to the ability to automate your entire Drive - can sometime be surprising. I rounded up a few tips to help you get even more out of this online productivity platform..."

          • Search by person
          • Search Google Docs and Gmail
          • Sync, work on documents with your Mac or PC
          • Save to Drive while browsing the Web
          • Keep the conversation within your document
          • Get social with your documents
          • Tap into apps
          • Obligatory keyboard shortcuts
          • Who needs a new tab? Use the research pane
          • Work in over 60 languages

          Read on for more tips and details.

          Cloud Traffic Poised to Quadruple by 2017, Challenge CIOs
          CIO, November 26th, 2013
          "Cisco Systems's third annual Global Cloud Index forecasts that global cloud traffic will more than quadruple, from 1.2 zettabytes in 2012 to 5.3 ZB in 2017. That works out to about 443 exabytes a month, or about 476 billion GB.

          More than three-fourths of that data will originate in the data center, 'largely generated by storage, production and development data in a virtualized environment' and 'used in activities that are virtually invisible to individuals,' the report says. An additional 7 percent, 'primarily driven by data replication and software-system updates,' will flow between data centers. The remaining 17 percent of this traffic will come from end users' multimedia and project-oriented cloud services..."

          Watch the Keynotes from AWS re:Invent 2013
          AWS, November 11th, 2013
          re:Invent 2013 was the largest gathering of developers and technical leaders from the AWS community. Videos of the keynotes from Day 1 and Day 2 are now available.
          A Sneak Peek at the Next Wave in Cloud Computing
          Wired, November 25th, 2013
          "The world of cloud computing is a complicated place. But Lucas Carlson boils it down to a simple analogy: Amazon is the Apple of cloud computing.

          With its enormously popular collection of web services - services where anyone can build and run their own online software without setting up their own hardware - Amazon is well out in front of the cloud computing competition, just as Apple was in the mobile game with those seminal creations, the iPhone and the iPad and the iOS mobile operating system..."

          Why Salesforce1 ramps up a new PaaS era of enterprise apps
          TechRepublic, November 25th, 2013
          "The big news at Dreamforce was Salesforce1, a new architecture that exposes core Salesforce functionality through public APIs to enable extensible mobile apps and seamless access to the AppExchange.

          Salesforce's strategy is for Salesforce1 to fuel 'a golden age in enterprise apps' by acting as a platform upon which both enterprise customers and independent software vendors (ISVs) can develop and run new apps that are fully integrated into the Salesforce user experience.

          This heralds a new platform-as-a-service era for enterprise applications. CIOs that were blindsided by the rise of software-as-a-service should not make the same mistake again. Cloud service platforms will drive an even bigger revolution in enterprise IT as we all try to make sense of the opportunities created by tens of billions of connected devices, thousands of apps, and the customers and citizens that own and use them..."

            Cloud Accelerates Competitive Advantage to Banking and Financial Markets
            Bank Systems and Technology, November 25th, 2013
            "Agility isn't a word that is often associated with some IT departments, especially in the banking industry. But cloud computing is changing that.

            Banks have many reasons to like cloud computing: lower cost, standardization, consistency. But increasingly they are embracing the cloud because it makes them more agile and responsive to changing market conditions and customer needs. Cloud is becoming a way for banks to deliver new products to market faster, accelerate their growth agendas, and enter new foreign markets..."

            IT - CxO
            A CEO's Guide to Setting Goals for 2014
            CIO, November 25th, 2013
            "One CEO gains inspiration from quotes by business luminaries such as John Chambers, Jeff Bezos, Jack Dorsey and Howard Schultz...

            With the new year quickly approaching, it is always nice to reflect a bit while looking forward to the year ahead. Given how technology continues to affect every element of our life, personal and professional, the following quotes are worth thinking about as we set our goals for the coming year..."

              10 Questions Every Good CIO Should Ask Himself
              CIO Insight, November 25th, 2013
              "Great leaders don't stick to their job descriptions. After all, such a mindset goes against the grain of every great achiever in the history of the workplace. However, CIOs may get so busy "minding the tech shop" that they could overlook some of less tangible but still critical roles that make for strong oversight of an IT department..."

              • Dialed In
              • 20/20 Vision
              • Best Practices
              • Unwritten but Understood
              • Above and Beyond
              • Problem Solver
              • Personal Assessment
              • On Point
              • In Conference
              • Follow-Through

              Read on for details.

                How IT will transform business in 2014
                Help Net Security, November 27th, 2013
                "Generally speaking, I'm not a big fan of predictions. I've never met anyone with a crystal ball that doesn't work near a boardwalk or a table ensconced in velvet. In other words, it's usually a two-bit show that leaves you scratching your head or saying 'anyone could have predicted that.' I won't disillusion you into thinking that I can do a better job seeing the future, but I certainly won't leave you scratching your head either. What I will say is that when it comes to enterprise IT, 2014 is going to be anything but dull.

                So let me get right to it, here are five predictions for 2014, hopefully some of them will surprise you:..."

                  CIOs Must Learn the Politics of No
                  CIO, November 21th, 2013
                  "Saying no--the right way--may be the most powerful skill a CIO can learn. A smart 'no' can set boundaries and enhance your leadership position. A stupid "no" can diminish your authority and make enemies.

                  How a CIO gets to no depends on the context, of course. Telling the CEO he can't connect his iPad to the corporate network is different from letting down an employee keen to be promoted..."

                  Small Businesses Put Themselves at Risk by Not Taking Security Seriously
                  CIO, November 27th, 2013
                  "Senior management at small and mid-size businesses (SMBs) are failing to take cyber security seriously and are putting their organizations at risk, according to a recently released study by security research firm Ponemon Institute..."

                  "Small and mid-size organizations simply cannot afford to disregard security," says Larry Ponemon, president of the Ponemon Institute. "Without it there's more chance that new technology will face cyber attacks, which is likely to cost the business substantial amounts. CIOs are under pressure to implement new technology that informs agile and efficient ways of working, but this should not take precedence over security. The industry needs to recognize the potential dangers of not taking cyber security seriously and create support systems to improve SMB security postures."

                  IT Leadership: 6 Lessons From the Pros
                  Enterprise Efficiency, November 25th, 2013
                  "Nobody ever said leadership was easy. That's especially true for those working in today's enterprise IT environments.

                  So, what separates the successful IT leaders from the rest? Over the past year, we've had the opportunity to explore this question with members of the community, and their answers go well beyond what you'll find in any management textbook.

                  We've compiled what we think are six of the best leadership lessons we've learned from CIOs, CTOs, career coaches, and others. We hope these tips will help you as you develop your own career path..."

                  IT - Networks
                  Global 4G connections to pass 1bn mark by 2017
                  ComputerWorld UK, November 26th, 2013
                  "The number of 4G-LTE mobile connections worldwide is forecast to pass one billion by 2017, according to a new study by GSMA Intelligence, the research arm of GSMA, the international trade body for mobile operators.

                  By 2017, it is expected that 4G will account for about one in eight of the eight billion-plus total mobile connections forecast by that point, up from 176 million 4G connections at the end of 2013.

                  Nearly 500 4G networks are forecast to be in service across 128 countries by 2017, roughly double the number of live LTE networks today..."

                    How has the enterprise network evolved? [infographic]
                    Enterprise AppsTech, November 26th, 2013
                    "The corporate network used to trundle along nicely - but with corporate device policies, not to mention the ever increasing amounts of data, enterprise networks are straining under the pressure.

                    Indeed, Easynet's UK MD Adrian Thirkill wrote for Enterprise AppsTech that he felt 'sorry' for the corporate network, noting that 'every day it's squeezed from all sides with video, voice, cloud, big data and mobile putting more pressure on it than an elephant on a tightrope.'

                    It's becoming more prevalent from the end user perspective too. With users more comfortable in performing sophisticated operations on their tablets such as editing and publishing, the tide has irrevocably turned.

                    But it wasn't always that way..."

                    IT - Operations
                    5 Considerations Around Leasing vs Buying a Data Center
                    Data Center Knowledge, November 25th, 2013
                    "Build vs. Buy? Many administrators and data center operators are still asking this question. The reality here is that this is always going to be a bit of a challenge when the decision has to be made. The modern business continues to ask more from their IT department, while still spending less. So what is happening around the data center environment? Why are we seeing this boom in data center demand?..."
                      Getting Your Data Center Out of the Dark Ages
                      MSPmentor, November 25th, 2013
                      "As I prepared for a podcast interview on the topic of Data Center Infrastructure Management (DCIM), I was amazed to learn how quickly the industry is beginning to demand management of power, space and cooling inside those four walls. Ironically, just as I was in the middle of researching data center outages the lights went out! I feared I would be stuck capturing my ideas for the podcast on quill and parchment and there would be countless candle-lit days ahead, living like a modern day Benjamin Franklin..."
                      Data Integrity, Networked Devices Among Top Health IT Hazards for 2014
                      eWeek, November 29th, 2013
                      "The independent nonprofit research organization ECRI Institute recently announced its Top 10 Health Technology Hazards list for 2014, which is distributed to raise awareness of the potential dangers associated with the use of medical devices and to help health care providers minimize the risk of technology-related adverse events. New topics this year include hazards related to radiation exposure in hybrid operating rooms and complications arising from insufficient training in the application of robotic surgery..."

                      • Alarm Hazards Lead the List
                      • Infusion Pump Medication Errors Place Second
                      • CT Radiation Exposures a Concern for Pediatric Patients
                      • EHRs Can Be Helpful or Harmful for Patients
                      • Occupational Radiation Hazards Could Impact Hybrid ORs
                      • Inadequate Reprocessing of Endoscopes and Surgical Instruments
                      • Neglect of Change Management for Networked Devices and Systems
                      • Risks to Pediatric Patients From 'Adult' Technologies
                      • Robotic Surgery Complications Due to Insufficient Training
                      • Retained Devices and Unretrieved Fragments

                      Read on for details.

                      IT - Security
                      Study: Companies are not as secure as they think
                      CSO Online, November 25th, 2013
                      "CompTIA, the nonprofit association for the IT industry, has a warning for companies: You are likely less prepared then you think for defending against security threats.

                      In a recent survey of 1,000 IT professionals and companies, CompTIA found that more than 80 percent believed their current level of security was completely or mostly satisfactory. This high level of confidence was expressed despite the fact that only 13 percent of the respondents had made drastic changes to their security approach over the last two years..."

                      As Holiday Shopping Rises, So Does Threat Of Identity Theft
                      Dark Reading, November 26th, 2013
                      "The Hanover Insurance Group offers tips to help shoppers keep their identities and wallets safe this holiday shopping season, both at the mall and online...

                      The holiday shopping season brings more shopping activities and, unfortunately, also the increased risk of identity theft. In 2012 alone, $21 billion was stolen through identity theft.

                      With this in mind, The Hanover Insurance Group, Inc. (NYSE: THG) offers tips to help shoppers keep their identities and wallets safe this holiday shopping season, both at the mall and online..."

                        Holiday travel tips: How to keep your data safe and accessible while traveling
                        PCWorld, November 22nd, 2013
                        "The holidays may be a time for reconnecting with family, but long flights and the promise of plenty of unscheduled time make the temptation to bring work along irresistible. But the parade of planes, trains, and taxis - along with the highly coveted nature of laptops and mobile devices - put your data at immense risk. Lose your laptop during a layover or leave your phone in a cab, and you may be looking for a new job come New Year's. Follow these tips to secure your data while traveling this season and avoid a holiday horror story..."
                          Preventing Security Breaches Caused By Audio Devices
                          Dark Reading, November 26th, 2013
                          "For Internet-connected computers located inside high security zones where classified calls and meetings take place, using audio devices may cause a security breach if not properly protected. Such computers are often used with headphones, speakers, or microphones to enable conference calls. These Internet-connected computers can be compromised by hackers to remotely enable their microphones or headsets, using them to 'listen' in to surrounding environment..."
                          The more you know, the less likely you are to be a victim of cybercrime
                          CSO Online, November 22nd, 2013
                          "Security awareness and user education are the most effective tools for avoiding the rising costs of cybercrime

                          Cybercrime is more costly than most organizations realize, and those costs are continuing to rise. The cost per victim has increased 50 percent, and the total cost of cybercrime is a staggering $113 billion - with a 'B.' One way to avoid becoming a victim of cybercrime is to make sure users are trained to recognize potential threats..."

                          Top signs that you've been breached
                          Network World, November 26th, 2013
                          "Because data is often the most valuable corporate asset - especially when customer information is concerned - staying alert for potential compromise is a critical IT job. Unfortunately, looking into a potential data breach is not easy.

                          In a typical organization there are usually a great number of privileged users accessing sensitive data on a daily basis. Where, then should organizations start looking for potential cracks? What behavior should they be on the lookout for, and when is an attack just a smokescreen, creating cover for a more targeted, critical breach?..."

                            Security Needs To Focus On Architecture, Not Products
                            Network Computing, November 25th, 2013
                            "Based on current market trends, Gartner predicts security spending worldwide will reach $86 billion by 2016. But it doesn't appear that increased spending is leading to better security. According to Tom Foremski of Silicon Valley Watcher, although security startups are plentiful, the general feeling is that we aren't any more successful at protecting our organizations. Maybe the problem is that we're too focused on products and not placing enough attention where it matters: good security architecture..."
                            Survey: DDos Is Hot, Planning Is Not
                            Dark Reading, November 26th, 2013
                            "Distributed denial-of-service (DDoS) attacks continue to plague major corporations today, but half of organizations don't have a plan or defense against DDoS attacks, a new survey found. Nearly 45 percent of organizations surveyed by Corero have no DDoS response plan, while some 21 percent don't have a response team set up in the case of a DDoS attack targeting their networks. Around 60 percent say they don't have a designated DDoS response team, and 40 percent say they don't have a point of contact within their organizations when a DDoS hits, according to the survey of some 100 respondents..."
                              Lessons Learned From 4 Major Data Breaches In 2013
                              Dark Reading, November 26th, 2013
                              "In many respects the breach trends of 2013 have borne out some good news for the security industry. Unlike the past four to five years, this one has not been awash with mega database breaches of tens of millions of records containing personally identifiable information (PII). And according to statistics compiled by the Privacy Rights Clearinghouse, both the number of breaches publicly reported and the volume of records breached have declined. Last year at this time, the running count already totaled approximately 27.8 million records compromised and 637 breaches reported. This year, that tally so far equals about 10.6 million records compromised and 483 breaches reported. It's a testament to the progress the industry has made in the fundamentals of compliance and security best practices. But this year's record is clearly far from perfect..."
                              Why security benefits boost mid-market adoption of virtualization
                              CSO Online, November 25th, 2013
                              "With virtualization on the rise in small- to medium-sized business, its security benefits may be a significant contributing factor...

                              While virtualization has undoubtedly already found its footing in larger businesses and data centers, the technology is still in the process of catching on in the middle market. But a recent study conducted by a group of Cisco Partner Firms, titled 'Virtualization on the Rise,' indicates just that: the prevalence of virtualization is continuing to expand and has so far proven to be a success for many small- and medium-sized businesses.

                              With firms where virtualization has yet to catch on, however, security is often the point of contention..."

                              Why we are losing the cyber security war and what we can do about it
                              Network World, November 26th, 2013
                              "If this year's attacks on Adobe, LexisNexis, NASDAQ, US Airways, and dozens of other large and technologically sophisticated US enterprises didn't provide sufficient evidence that we are losing the cyber security war, the ongoing breaches by Anonymous make it undeniable. Why are the world's most IT savvy companies unable to keep attackers out of their networks?..."
                              Malware: War without end
                              ComputerWorld, November 25th, 2013
                              "Ceaselessly, with no end in sight despite outlays that amount to a tax on doing business, the decades-long struggle against malware drags on.

                              Today, around 5% of the average IT budget is devoted to security, estimates John Pescatore, a director at the SANS Technology Institute. Cybercrime (including malicious insider attacks and theft of devices) costs U.S. corporations an average of $11.6 million yearly, according to an October 2013 study by the Ponemon Institute that was sponsored by HP Enterprise Security. This cost represents a 23% increase over last year's average of $8.9 million per company...

                              CryptoLocker & DNS Poisoning -- PandaLabs Q3 Report
                              Dark Reading, November 27th, 2013
                              "PandaLabs, Panda Security's anti-malware laboratory, has just published the results of its Quarterly Report for Q3 2013, drawn up by PandaLabs, the company's anti-malware laboratory. One of the main conclusions that can be drawn from this global study is that malware creation has hit a new record high, with nearly 10 million new strains identified so far this year. In fact, the number of new malware samples in circulation in just the first nine months of 2013 has already met the 2012 figure for the entire year. Trojans remained the most pervasive threat, accounting for most new threats and infections worldwide..."
                              Automation, Exercises Shorten Response Time To Advanced Attacks
                              Dark Reading, November 27th, 2013
                              "When Fenwick & West LLP upgraded its security with next-generation firewalls and advanced malware detection systems, the law firm had to deal with a stark increase in alerts of potentially serious incidents.

                              Each incident required the IT security staff to investigate, collecting relevant log files and checking the system of any user involved in the event. While detection remains a problem for most companies, responding to those alerts as quickly as possible became the main hurdle for the firm, says Kevin Moore, Fenwick & West's director of information technology..."

                              IT - Careers
                              12 tech jobs with big raise potential in 2014
                              Network World, November 25th, 2013
                              "The average salary for newly hired IT pros is expected to increase 5.6% in the coming year...

                              Looking to make your next career move? Staffing firm Robert Half analyzed 70 tech positions and found certain titles will be getting particularly big salary hikes in 2014. Read on to learn more about the 12 positions with the biggest raise potential. (Only base salaries are calculated; totals don't include bonuses, perks or other compensation elements.)..."

                              • Projected Increases in US Starting salaries
                              • Pre-sales/technical engineer
                              • Mobile applications developer
                              • Software developer
                              • Software engineer
                              • Business intelligence analyst
                              • Data architect
                              • Developer/programmer analyst
                              • Wireless network engineer
                              • Network engineer
                              • ERP technical developer
                              • Network architect
                              • Information systems security manager

                              Read on for details.

                              Tech Salaries: Increasing, but Not Much
                              Internet Evolution, November 25th, 2013
                              "High unemployment and flat inflation will lead to 'only modest upward pressure on wages' in 2014, with typical increases of 3%, finds a projection from Computer Economics..."

                              According to the '2014 IT Salary Report,' "IT workers will do better than the civilian workforce in general, and hiring will improve, but wage inflation will remain modest..."

                                Effect of IT megatrends on your career
                                IT World, November 25th, 2013
                                "To those who have emailed me asking what specific technologies they should learn or what IT trends you should follow, here is my reply...

                                I often receive emails asking me questions such as:

                                • Should I learn Java or .NET?
                                • What cloud technologies should I learn?
                                • Should I become a Business Analyst or a Project Manager?
                                • Will learning PHP and MySQL help my career?
                                • Is web design a good thing for me to learn?
                                • What types of jobs could I get with a Masters in Computer Science?

                                These are all very important questions to ask and are very difficult to give quality generalized answers because everyone's skills, strengths, weaknesses, career aspirations, are different..."

                                7 Tech Talent Recruitment Tips
                                WallStreet & Techology, November 25th, 2013
                                "Among my many roles in my last full-time financial services position was serving as the school captain for our recruiting relationship with MIT. I went into the assignment naively assuming that it would be easy -- after all, we were a large, global financial services firm with a sterling reputation for the quality of our IT architecture and systems..."
                                  Update Your Job Search
                                  Harvard Business Review, November 25th, 2012
                                  "Month by month, the job market keeps easing upward. Although we haven't fully made up the number of jobs that were lost in this recession, almost every industry has grown jobs since the economy hit rock bottom in February 2010. And there are plenty of new kinds of jobs that have been created since then, too.

                                  Now this optimism is starting to spread. People who stayed glued to their jobs during the downturn are starting to dip their toes in the water to see if there is a new position out there for them. But while they have been hunkered down waiting for the recession to pass, the job market has been changing. If you have been at the same organization for five or more years, you are in danger of making some big mistakes that can completely derail your job search. Here's a handful of those pitfalls and how to avoid them..."

                                  8 Tips to Organize Your Office (and Yourself) for Better Productivity
                                  CIO, November 26th, 2013
                                  "Do you spend more time looking for documents, supplies, emails or your mobile phone charger than you do working? If so, you're losing valuable productivity. However, the good news is getting back on track requires only a little planning, commitment and consistency.

                                  These eight office organization tips culled from the National Association of Professional Organizers (NAPO) and Simplify Me Now can help you transform your workspace from stressful to serene, and help boost your productivity by making it easy to find files, documents, supplies, and keep up with ongoing projects and deadlines..."

                                  • Purge Your Workspace
                                  • Rearrange Your Office
                                  • Organize Your Desktop
                                  • Develop a Filing System
                                  • Time Management
                                  • Communicate on a Schedule
                                  • Organize Digitally
                                  • Ritualize Your Work Day

                                  Read on for details.

                                  10 rudest behaviors in the workplace
                                  TechRepublic, November 27th, 2013
                                  "Most of us aim not to be rude in the workplace, but sometimes the line is thin between adorable quirkiness and just plain annoying. Here are some behaviors to avoid..."

                                  • Gossiping
                                  • Being a slob
                                  • Announcing your victories
                                  • Being a snob
                                  • Aggressive typing
                                  • Being a glory-stealer
                                  • Abusing trust
                                  • Smelling like an old ash tray
                                  • Being a smartphone junkie
                                  • Being late all the time

                                  Read on for details.

                                    IT - Social Media
                                    Encrypted Social Network Vies for Disgruntled Whatsapp, Facebook Users
                                    CIO, November 28th, 2013
                                    "With the look of Google Plus and Facebook-like elements, a new social network named "Syme" feels as cozy as a well-worn shoe.

                                    But beneath the familiar veneer, it's quite different. Syme encrypts all content, such as status updates, photos and files, so that only people invited to a group can view it. Syme, which hosts the content on its Canada-based servers, says it can't read it..."

                                    14 Ways to Use Twitter to Market Your Business
                                    CIO, November 25th, 2013
                                    "At the time of its SEC filing in early November 2013, Twitter had more than 232 million active monthly users, 53 million of which were in the United States. That makes Twitter a potentially powerful marketing tool -- if you know how to use it..."

                                    • Optimize your Twitter bio
                                    • Find out who the influencers and experts are in your target area(s) and interact with them on a regular basis
                                    • Get colleagues involved
                                    • Tweet regularly
                                    • Don't be afraid to ask for some Twitter love
                                    • Track mentions -- and respond if appropriate
                                    • Retweet
                                    • Favorite tweets
                                    • Follow trends/hashtags
                                    • Offer discounts or special deals to Twitter followers

                                    Read on for more tips and details.

                                      IT - Mobile
                                      Salesforce and the banking industry align as both bet on mobility
                                      Enterprise AppsTech, November 26th, 2013
                                      "For bankers, mobility has become key. Customer-facing mobile banking applications are increasing the flow of traffic through digital channels, which is eroding traffic in bank branches. But it does not stop there: the mobile-enablement of services to increase the productivity of banking employees and drive sales effectiveness in remote locations is also on the rise.

                                      The digital channel revolution is having a significant impact on banking via physical channels, and mobile apps for banking employees will play a pivotal role in this. More and more, branch-based employees move around with their tablets and smartphones to assist customers, while mortgage brokers, financial advisors, and corporate bankers increasingly conduct duties and work with clients outside branches..."

                                        Mobile doesn't need the cloud as its engine
                                        InfoWorld, November 26th, 2013
                                        "There's no doubt: The cloud makes mobile computing more useful. But that truism can quickly lead you to a bad place -- namely, that mobile devices should just be portals to cloud services. I was reminded of that with's announcement last week of its AppStream service, which lets game developers run the compute-intensive rendering for their games on Amazon's cloud service and deliver the results to mobile game players over the Internet. The pitch is that basic smartphones without high-end GPUs can still play graphics-rich games..."
                                        Are we giving up on mobile payments already?
                                        ComputerWorld, November 23rd, 2013
                                        "Paying for things with our phones takes a backseat to innovative new debit cards...

                                        Aren't credit cards supposed to be obsolete by now?

                                        A credit card is basically a slab of plastic with a strip of VHS tape glued to the back. That magnetic tape holds a few numbers and letters which identify the bank, the account, the user and other minor data. Plus, everything an unauthorized user needs to buy things with your credit card is easily readable on the front and back of the card..."

                                        Five enterprise and CIO lessons from the BlackBerry decade
                                        Enterprise AppsTech, November 28th, 2013
                                        "BlackBerry changed the world. It made wireless email a killer app that every salesperson and travelling executive absolutely needed to have to get their work done. It gave us devices with batteries that lasted a full week, connectivity that made email feel real-time even over very slow networks, and a user experience that everyone LOVED. And, for IT, BlackBerry established a standard of security that protected even the most sensitive information with comprehensive policy support from a central management console.

                                        Great email and great security were the hallmarks of the BlackBerry solution and no one else even came close to matching them in the first decade of this millennium..."

                                        • The enterprise smartphone is dead
                                        • The NOC does not rock
                                        • Email is not enough
                                        • A shiny paperweight is still a paperweight
                                        • Migration is the new norm

                                        Read on for details.

                                        IT - Big Data
                                        Video Search: Hollywood's Big Data Dilemma?
                                        Information Week, November 25th, 2013
                                        "Hollywood trails other industries when it comes to using data to enhance its business decisions or improve the customer experience. Can the Video Genome Project help? It's a lot easier to find cheap airfares or low insurance rates -- or just about anything else -- than to search for video content online. And the entertainment industry could do a lot better, said Xavier Kochhar, CEO of Structured Data Intelligence (SDI), a Santa Monica, Calif.-based video search startup.

                                        SDI is developing the Video Genome Project (VGP), which analyzes and categorizes metadata contained in more than 7.5 million records of professionally produced film, TV, and online video content, the company said..."

                                          Can we use Big Data to stop healthcare hacks?
                                          CSO Online, November 25th, 2013
                                          "Despite the aggressive efforts of government regulators, the health care industry's reputation for security hasn't been stellar. Multiple breaches are reported on a weekly basis and with health care exchanges popping up under the federal Affordable Care Act, the situation could get worse before it gets better.

                                          One way custodians of health care data might be able to better protect patient information is by integrating 'big data' security solutions into their systems. That, however, can present health care organizations with even more security challenges..."

                                          The 360 Degree View of a Customer
                                          Big Data Republic, November 27th, 2013
                                          "Customers have been historically viewed through several lenses. One is a 'process' lens, which reflects their linear relationship with a firm. This relationship can be broken down into the sub stages underlying of the customer-firm relationship: customer acquisition; customer product selection choices; the sales transaction processes; and the customer retention relationship.

                                          Firms have used this approach for decades and built up customer profiles along these dimensions. Traditional CRMs are based upon this approach and allow firms to aggregate the data together, thus building up a better pipeline for customer capture and revenue generation. A second adjacent lens is based on behavioral marketing, in which firms try to understand their customer's individual behaviors and respond to them in a personalized way through automated means..."

                                            Are You Recruiting A Data Scientist, Or Unicorn?
                                            Information Week, November 21st, 2013
                                            "Many companies need to stop looking for a unicorn and start building a data science team, says CEO of data applications firm Lattice.

                                            The emergence of big data as an insight-generating (and potentially revenue-generating) engine for enterprises has many management teams asking: Do we need an in-house data scientist?

                                            According to Shashi Upadhyay, CEO of Lattice, a big data applications provider, it doesn't make sense for organizations to hire a single data scientist, for a variety of reasons. If your budget can swing it, a data science team is the way to go..."

                                            IT - BYOD
                                            Gartner: BYOD is an Applications Strategy
                                            MSPmentor, November 27th, 2013
                                            "Managed services providers (MSPs) looking to leverage their expertise in bring your own device (BYOD) may want to take a look at another way to approach the topic by examining applications strategy. This blueprint for BYOD is being pushed by Gartner, Inc. (IT).

                                            'BYOD is not just a purchasing policy and needs to be approached more broadly with the applications and strategies designed for today's world,' the IT research firm said..."

                                            BYOD Programs: A 10-Point Checklist for a Successful Strategy
                                            eWeek, November 25th, 2013
                                            "You're in charge of rolling out a bring-your-own-device (BYOD) program for your company, and you have to figure out what actions to take. BYOD is an approach that allows employees, business partners and others to use personally selected and purchased client devices to execute enterprise applications and access data..."

                                            • Establish the Objective
                                            • Get a Baseline
                                            • Define the Allowed Devices
                                            • Secure Apps and Data
                                            • Enforcing the Policy
                                            • Set Parameters
                                            • Test Before Rolling It Out
                                            • Employee Training
                                            • More Complex Than One Might Think
                                            • Use Shortcuts as Needed

                                            Read on for details.

                                            How to Prepare for Cloud-based Enterprise Mobility Management
                                            CIO, November 26th, 2013
                                            "What's the fastest, easiest, low-cost way for your organization to achieve multi-platform enterprise mobility management (EMM) without sacrificing security or performance? Using the cloud, of course. Here are tips to help you on that journey..."
                                            Top Ten Articles for last few Issues
                                            Vol 189 Issues 1, 2 and 3; Vol 188 Issues 1, 2, 3, 4 and 5
                                            We track how frequently each article is viewed on the web site to determine which the readers consider the most important. For last week, the top 10 articles were:

                                            • How is UNIX Solaris for a Linux Admin
                                            • OpenZFS Developer Summit - November 18-19, 2013
                                            • Oracle SuperCluster M6-32
                                            • How to Limit Upgrades Beyond a Prescribed Version of Oracle Solaris
                                            • How CEOs Can Transform HR into a Revenue Driver
                                            • The Staggering Costs When Your Cloud Goes Down
                                            • Best Microsoft Windows Virtualization Product of 2013
                                            • Oracle Mainframe Re-hosting Solutions
                                            • Gogo Deploys Oracle Service Cloud to Support Enhanced Customer Experience
                                            • MySQL 5.6 Developer Certification and Training

                                            The longer version of this article has list of top ten articles for the last 8 weeks.

                                              IT - Server
                                              Server Management Tools: A Closer Look at HP's iLO and Dell's iDRAC
                                              ServerWatch, November 25th, 2013
                                              "Most servers shipped from the major manufacturers today come with some type of out-of-band management tool or baseboard management controller (BMC). You've probably used HP's Integrated Lights-Out (iLO), Dell's Integrated Dell Remote Access Controller (iDRAC) or Lenovo's ThinkServer EasyManage.

                                              Each of these tools has similar functionality to the other two, and each has been improved over the years to add new capabilities. Today we'll take a closer look at HP's iLO and Dell's iDRAC for purposes of comparison..."

                                              IT - Tape
                                              Magnetic tape to the rescue
                                              The Economist, November 25th, 2013
                                              "WHEN physicists switch on the Large Hadron Collider (LHC), between three and six gigabytes of data spew out of it every second. That is, admittedly, an extreme example. But the flow of data from smaller sources than CERN, the European particle-research organisation outside Geneva that runs the LHC, is also growing inexorably. At the moment it is doubling every two years. These data need to be stored. The need for mass storage is reviving a technology which, only a few years ago, seemed destined for the scrapheap: magnetic tape..."
                                              NetBeans Podcast 67
                                              NetBeans Community News with Geertjan and Tinu
                                              • NetBeans IDE 7.4 has been released, and we read out a few "favorite" tweets (carldea, MukDaGr8, glen_a_smith, realreyez) about the new release.
                                              • Geertjan traveled to OreDev (Video: Unlocking the Java EE Platform with HTML5) and Devoxx, and now prepares for DroidCon and Java2Days.
                                              • Watch our latest video series: AngularJS for Busy Developers Part 1, Part 2 & Part 3; and AngularJS meets Java EE 7
                                              • Coming up in Karma and Grunt support, and videos from Geertjan demonstrating these features.
                                              • HTML5 corner: How are you using HTML5 support in NetBeans? Let us know and be a podcast guest!

                                              Download mp3: 41 minutes - 34mb

                                              Trending in
                                              Vol 234, Issue 3
                                              Trending IT Articles