News about Oracle's Solaris and Sun Hardware
System News
Dec 2nd, 2013 — Dec 8th, 2013 Generate the Custom HTML Email for this Issue
System News System News for Sun Users
Volume 190, Issue 1 << Previous Issue | Next Issue >>
Sections in this issue:
click to jump to section

Why Database As A Service (DBaaS) Will Be The Breakaway Technology of 2014
Forbes, December 5th, 2013
Alexander Wolfe writes in Forbes, Database as a Service (DBaaS) is arguably the next big thing in IT. Indeed, the market analysis firm 451 Research projects an astounding 86% cumulative annual growth rate, with annual revenues from DBaaS providers rising from $150 million in 2012 to $1.8 billion by 2016.

The reason is simple. DBaaS is gaining converts because it enables businesses to deploy new databases quickly, securely, and cheaply..."

Database Insider
December 2013 issue
The December issue of the Database Insider newsletter is now available.


  • New On-Demand Webcast Delivers Blueprint for Database as a Service
  • Real-Time Data Replication for the Cloud: Meet Oracle GoldenGate 12c
  • Top Database Security Trends in 2014

See the website for details.

Gartner Hype Cycles
Where is Gamification?
Erika Noll Webb, Senior Manager User Experience from the Fusion Applications User Experience group, writes "I was looking at the Gartner Hype Cycle for Emerging Technologies to see where they currently position Gamification. The latest Hype Cycle has moved to the tippy top of the expectations curve.

A little history... In 2010, Gartner didn't even include gamification in the Hype Cycle, so it hadn't even registered on the Technology Trigger end of the cycle..."

First Investment Bank Cuts Day-End Close from Six Hours to Three
Processes Customer Transactions 30% Faster
First Investment Bank AD offers retail, private, and corporate banking services in Bulgaria and the Balkans. It is the third-largest bank in Bulgaria with 200 branches, 650 automated teller machines, 960,000 active customers, and 1.4 million accounts.
    Top 5 Reasons why Oracle VM is Best for Oracle Database
    Webcast: Tuesday, December 17, 2013; 10:00 AM PST

    Oracle VM's application-driven architecture is designed for rapid deployment and ease of lifecycle management providing IT a highly scalable and cost effective virtualization solution for Oracle Database and business-critical applications.

    Join oracle for a webcast featuring Francisco Munoz Alvarez, a seasoned expert, and Oracle ACE Director as he shares his performance benchmark findings highlighting key reasons why Oracle VM is the best virtualization technology for Oracle Databases.


    • Francisco Munoz Alvarez, Oracle Professional Services Manager, Revera Limited
    • Doan Nguyen, Senior Principal Product Marketing Director, Oracle

    Time and date

    • Tuesday, December 17, 2013
    • 10:00 AM PST

    Don't miss this insightful webcast and an opportunity to hear real-world benchmarking results. Register Now.

    IT - Storage
    Speedy storage: Pros and cons of SSDs and flash
    ComputerWorld, December 5th, 2013
    "Enterprise storage architects have developed many ways to increase application performance by implementing flash memory. This has raised the bar for IT professionals, who need to be able to understand the differences in order to evaluate their options.

    So here's a handy guide, including use-cases and caveats for typical applications.

    The building blocks for flash storage systems

    Enterprise-class flash storage is currently offered in three basic flavors:..."

    Fujifilm Global Executive IT Summit in Review
    DrunkenData, December 4th, 2013
    "I have been meaning to write a brief blurb about this year's Fujifilm Global Executive IT Summit, which I had the pleasure of attending in Houston in October. I thought I would just go to cover the event for the trades, having spoken there for the two years prior. But the Fujifilm folks asked me to speak on stage once again, so being the ham that I am, I cheerfully obliged.

    I can't tell you what a great event this is. Not only is the speaker slate (other than me) top notch, but the attendees are hardworking IT folk, typically with as many decades in IT as yours truly, and always with refreshingly candid and down to earth ideas about technology and business. In short, very good signal to noise characteristics and well worth the trip..."

      IT - Technology
      The Moore's Law Blowout Sale is Ending, Broadcom's CTO Says
      CIO, December 5th, 2013
      "At a wine bar in San Francisco on Wednesday, Broadcom Chairman and CTO Henry Samueli delivered some sobering news: Moore's Law isn't making chips cheaper anymore.

      The famed law of microprocessors predicts that packing more transistors onto a silicon wafer will make processors smaller, faster and cheaper with each generation. The ability to get more chips out of each wafer should cut the cost per transistor with each new generation, according to the logic of the law, which was first proposed by Intel co-founder Gordon Moore in the 1960s..."

      Next-gen USB connector will (finally!) fit both ways
      PCWorld, December 4th, 2013
      "The next version of the USB connector will accept the plug either way up, the USB 3.0 Promoter Group said Tuesday.

      The USB Type-C connector, initially intended for USB 3.1 and 2.0 devices, will be a complete redesign, the group said. It will be similar in size to the USB 2.0 Micro-B plug found on most modern cellphones, and will support scalable power charging. In comparison, the USB 3.0 Micro-B plug is wider than that for USB 2.0 devices..."

        Why is everyone so sure EV range will double in just 6 years?
        Gigaom Research, December 6th, 2013
        "Perhaps the week that it was revealed that 300 mile range EV promiser and battery startup Envia Systems' deal with GM was canceled after Envia failed to produce breakthrough battery results and that Envia is facing a lawsuit over an allegation that it stole battery tech from another company, is the perfect time for Renault to make the claim that it'll produce a sub-compact with a 250 mile range by 2020. Right?..."
          IT - Bitcoin
          China, Bank of America weigh in on Bitcoin
          USA Today, December 5th, 2013
          "Two major financial players, China's central bank and the Bank of America, weighed in Thursday on opposite sides on the viability of the wildly popular virtual currency Bitcoin.

          The price of a Bitcoin fell below $1,000 after China's central bank banned financial institutions from trading the emerging currency, while Bank of America Merrill Lynch, in its first research report on Bitcoin, said the currency has potential to become a 'major means' of payment.

          The People's Bank of China said in a statement on its website that Bitcoin isn't a currency with 'real meaning' and that its legal status was different from other currencies.

          Bloomberg reported that Bitcoins traded at $980.00 early evening in Beijing on BitStamp, a currency exchange, after trading as high as $1,138.58 prior to the Chinese announcement..."

          Why the Chinese can't get enough of Bitcoin - despite bank ban
          The Christian Science Monitor, Dec 6th, 2013
          "At the Garage Café, a dimly lit magnet for young programmers and entrepreneurs in Beijing's hi-tech Zhongguancun district, one topic dominates the low hum of conversation: Bitcoin.

          The crypto-currency's value has soared more than fivefold over the past month, driven in large part by hectic speculative trading on Chinese exchanges.

          'Most of our customers talk Bitcoin, and some of them trade as much as ten million RMB's worth ($1.6 million) at a time,' says Xu Tianhai, who manages the Garage.

          Now they are holding their breath, in the wake of a Chinese Central Bank notice Thursday that banned financial institutions from trading in Bitcoin and forbade its use as a currency. The value of Bitcoin on Chinese exchanges fell after the announcement, and one expert said he thought it could drop by half in the next few weeks..."

          Bank of America deems Bitcoin the next big thing
          CNET, December 5th, 2013
          It appears not only people in the tech world believe Bitcoin is the currency of the future -- one of the US' biggest banks also sees legitimacy in the virtual currency.

          Bank of America published its first research report PDF) on Bitcoin on Thursday saying that the digital currency could become a major contender to other types of online money-transfer providers.

          "We believe Bitcoin could become a major means of payment for e-commerce and may emerge as a serious competitor to traditional money-transfer providers," Bank of America wrote in its report. "As a medium of exchange, Bitcoin has clear potential for growth, in our view."

          Ron Paul: Bitcoin could 'destroy the dollar'
          CNNMoney, December 4th, 2013
          "Imagine a world in which you can buy anything in secret. No banks. No fees. No worries inflation will make today's money worth less tomorrow. The digital currency Bitcoin promises all these things. And while it's far from achieving any of them -- its value is unstable and it's rarely used -- some have high hopes..."

          "There will be alternatives to the dollar, and this might be one of them," said former U.S. congressman Ron Paul. If people start using bitcoins en masse, "it'll go down in history as the destroyer of the dollar," Paul added.

          World powers react to the Bitcoin boom
          Aljazeera, Dec 7th, 2013
          "World powers have scrambled in recent weeks to react to the rise of Bitcoin, a decentralised digital currency created in 2009.

          Publicity from US Senate hearings and a black-market website that used the currency saw the value of Bitcoin skyrocket from $13 in January to $1,242 on November 29 - higher than the price of gold at the time. The currency is stored in a digital "wallet" and is "mined" by computers solving mathematical puzzles.

          But on Saturday the value of the crypto-currency plummeted to $830 on BTC China, the world's largest Bitcoin exchange by trading volume, after China banned its banks from providing related services and products on Thursday. Data on the Bitcoin Charts website shows that about one-third of the world's Bitcoin transactions are made on the BTC China exchange, which is open only to Chinese users..."

          Bitcoin draws accolades and feverish investing, but may also require FBAR filings
          Forbes, Dec 6th, 2013
          "Remember when you got out of school and started having to abide by all sorts of rules? Bitcoin and its aficionados probably feel that way, starting to feel the pinch of responsibilities. That's growing up.

          Bitcoin seems newly minted from a desirable school with incredible promise. The appreciation is heady, but rules are rules. Bank of America thinks Bitcoin has arrived, starting analyst coverage. And as China Restricts Banks' Use of Bitcoin, the heady news of big values is tempered.

          Do I know Bitcoin draws FBAR filing obligations? No, but it's not a stretch to imagine it in some cases. After all, FinCEN is on to Bitcoin, requiring some to register as Money Service Businesses. FinCEN, the Financial Crimes Enforcement Network, is part of the Treasury Department. Its mission is to safeguard the financial system, combat money laundering and promote national security..."

          Western Union responds to Bitcoin buzz, sort of
          Gigaoam, Dec 6th, 2013
          "Bitcoin watchers say the virtual currency could displace Western Union as a way to transfer money from place to place. Here's what Western Union says about that...

          Western Union executives are probably not shaking in their boots about the chart just yet since Bitcoin's value has been fueled by speculation, and very few people are using it to actually buy things or transfer money. But they may be worried about how Western Union's transfer service, which charges around $8 to move $100 worth of money, will fare in the future against a service that charges nothing at all..."

          Bitcoin Boom Spreads to IPhones With Mobile-Payment Apps
          Bloomberg, December 5th, 2013
          "Matt Tuzzolo, who used to split restaurant bills by sending money via PayPal, now wields his iPhone to pay his fellow diners -- in Bitcoins.

          'It's more convenient than PayPal,' said Tuzzolo, a software developer in Portland, Oregon, who uses the Gliph mobile application to transfer digital money on the go. 'It's as easy as sending a text.'

          Gliph Inc., which has more than 25,000 users, has raised more than $350,000 from venture capitalists including Tim Draper, who has backed such companies as Skype and Tesla Motors Inc. It's one of hundreds of Bitcoin-related programs available from Google Inc. (GOOG) and Apple Inc. (AAPL) app stores..."

          Kentucky Town Agrees To Pay Police Chief In Bitcoin
, Dec 6th, 2013
          "Vicco, Kentucky, a town of 300 about 120 miles east of Lexington, has agreed to their police chief's request to be paid in Bitcoin. Vicco is likely the first city in the country to offer a government employee the option of payment with a virtual currency.

          According to the Hazard Herald, Police Chief Tony Vaughn appeared before the city commission last month to request that he receive his salary in Bitcoins rather than dollars. The commission opted to hold off on granting Vaughn's request in order to research the logistics and legalities of such a move. On Monday, the commission ruled that it would not be a problem and approved a city measure that would allow the transactions..."

          MySQL Enterprise Monitor 3.0.4
          Offers many significant improvements over previous releases
          Andy Bang writes, "We are pleased to announce that MySQL Enterprise Monitor 3.0.4 is now available for download on the My Oracle Support (MOS) web site. It will also be available via the Oracle Software Delivery Cloud with the December update in about 1 week. This is a maintenance release that adds a few features and fixes a number of bugs. You can find more information on the contents of this release in the change log.
          Cloud Computing
          Securing The Cloud: How To Avoid A Greek Tragedy
          Forbes, December 2nd, 2013
          Oracle writes in "Forbes", "In early 2014, Oracle will release 'Cloud Odyssey: A Hero's Quest' - a sci-fi movie about the heroic journey of an ordinary man embracing the cloud. While the movie is set in the future, the name of the movie alludes to Homer's epic tale, 'The Odyssey,' which chronicles the journey of Odysseus, king of Ithaca, returning home from the Trojan War.

          Like Odysseus, IT organizations preparing to adopt cloud solutions must have a strategy and battle plan to secure the cloud. Today's cloud heroes - the CIOs and IT staffers who are venturing bravely into the cloud-must put controls in place to secure private information and applications from the possible siege of malicious users and hackers. That explains why the cloud security services market is expected to reach $3.1 billion by 2015..."

          Oracle Releases Oracle Linux 6.5
          Includes Unbreakable Enterprise Kernel Release 3, Integration of DTrace, Linux Containers Support, and More
          Oracle Linux 6.5 includes the innovative Unbreakable Enterprise Kernel Release 3, installed by default, to enable immediate access to the latest Linux features and enhancements. The only Linux distribution to support DTrace, Oracle Linux now offers complete integration with this popular dynamic tracing framework for superior observability, troubleshooting, and performance analysis. In addition to numerous other enhancements, it also offers production support for Linux Containers, enabling operating system virtualization.

          With Oracle Linux 6.5, the latest Unbreakable Enterprise Kernel Release 3 is installed as the default kernel, enabling customers and partners to test, validate and certify against the most up-to-date Oracle Linux distribution.

          Freely available for download from Oracle's Software Delivery Cloud, Oracle Linux 6.5 features full integration with DTrace, support for Linux Containers, and InfiniBand updates.

          Oracle Linux 6.5 also includes new security features such as: the ability for applications to share a cryptographic data store that crypto toolkits can use for processing trusted certificates; and smartcard authentication support in a larger number of application subsystems for single sign on (SSO).

          Oracle Linux provides the performance and reliability to support business-critical workloads such as Oracle Database 12c, and is available on all x86-based Oracle Engineered Systems.

          For details, see the "Oracle Linux" page.

          IT - Cloud
          GE Healthcare CTO Says IT Needs to Embrace Mobile, Cloud to Remain Relevant
          CIO, December 5th, 2013
          "Nevin Zimmermann has a lot on his plate right now -- mobile, cloud, big data, running hosted solutions for a couple hundred major customers. Oh, and don't forget helping GE Healthcare capture new global business opportunities -- especially in emerging markets -- and navigating the dramatic changes reshaping the healthcare industry everywhere..."
          Cloud Computing Predictions for 2014: Cloud Joins the Formal IT Portfolio
          Forrester Research, December 4th, 2013
          "In 2013 enterprises got real about cloud computing. In 2014 we will integrate it into our existing IT portfolios - whether IT likes it or not. The moves by DevOps and line of business aren't going to stop and can't be ignored. So 2014 will be the year IT Ops relents, stops fighting and gets with the program formally by developing real strategies for embracing the cloud, managing cloud-based application deployments and empowering the business to keep being agile. As the Age of the Customer arrives, all the focus shifts to the Systems of Engagement and the agility in refining these critical customer tools..."
          Don't believe any claim about private cloud market share
          Gartner, December 6th, 2013
          "Despite all hype, the private cloud computing market is still in its infancy. The enterprise customers deploying what we call at Gartner 'cloud management platforms' (CMPs) are in the order of the thousands. Not insignificant, especially given the size of the accounts that buy CMPs, but far away from mainstream adoption.

          Evaluating the few dozen alternatives (you can read a list of them in my research document Market Profile: Cloud Management Platforms, 2013), IT organizations naturally try to understand which vendor is preferred by industry peers, or more in general which CMP is the most deployed. Answering the question is all but simple, and it's easy to be misled..."

          Does a Hybrid Offshore IT Outsourcing Model Make Sense for Your Company?
          CIO, December 6th, 2013
          "Companies have often used a mix of captive offshore centers and outsourcing deals with offshore service providers to meet their global IT and business process needs. In recent years, however, some mature outsourcing customers have embraced hybrid models that, theoretically, deliver the best of both worlds.

          With the build-operate-transfer model, customers partner with an offshore outsourcer who builds a service center, runs it for specified number of years, and then transfers ownership to the customer..."

          Does the industry have cloud computing wrong?
          ZDNet, December 4th, 2013
          "While at the Cloud Forum sponsored by IBM I had the opportunity to speak with IBM's Jim Comfort, General Manager, IBM Cloud Managed Services. He thinks that the market has cloud computing all wrong and is doing his best to convince others to think differently about the cloud..."
          Cloud Providers Reveal More Big Data Analytics To Enterprises
          Dark Reading, December 2nd, 2013
          "Cloud services aim to simplify the implementation and management of business applications, a goal that has generally worked well for security services. Yet simplified interfaces and aggregated data can often hide the details that management needs to make decisions about attacks. Responding to customers' requests for more access to security-event data, cloud providers are exposing customer-specific aspects of their massive data sets to help businesses better defend themselves..."
          The CIO & Cloud Brokerage in India
          Enterprise Efficiency, December 2nd, 2013
          "As the cloud matures in India, enterprises which were earlier grappling with the 'to deploy or not to deploy' question are now faced with a new challenge -- the management and customization of different cloud services. Not to mention, integration of in-house systems, solutions, and apps with the newly deployed cloud services..."
          Cloud Security Alliance Offers Ultra-High Cloud Security Plan
          CIO, December 6th, 2013
          "The Cloud Security Alliance (CSA) is putting forward an innovative encryption-based security architecture for software-defined networks and cloud environments that draws some of its inspiration from high-security networks used by the U.S. Department of Defense and intelligence agencies..."
          3 reasons perimeter security is not enough for the cloud
          ComputerWorld, December 4th, 2013
          "The 'M & M' model of data security (hard shell, soft inside) has been the standard for most enterprises for decades, based on a number of assumptions:

          • All our mission-critical and Tier 1 applications are maintained inside our secure network.
          • The bad guys are outside the firewall.
          • We train our IT organization well, so they minimize mistakes.

          Just a quick glance at the recent headlines and analyst reports illustrates how drastically the world has changed..."

          Why CIOs Stick with Cloud Computing Despite NSA Snooping Scandal
          CIO, December 6th, 2013
          "Explosive revelations in the past six months about the U.S. government's massive cyber-spying activities have spooked individuals, rankled politicians and enraged privacy watchdogs, but top IT executives aren't panicking -- yet.

          So far, they are monitoring the issue, getting informed and taking steps to mitigate their risk in various ways. But the alarming reports haven't prompted them to roll back their decisions to host applications and data in the cloud..."

          IT - CxO
          CIOs Say Cost, Complexity Impede True Mobile Gains in Enterprise
          CIO, December 5th, 2013
          "A new survey of 300 CIOs found that while the majority of IT executives see real value in mobilizing existing enterprise apps or rolling out brand new mobile innovations, they also see the costs and complexity of these initiatives as real challenges..."
            Rethinking Your IT Workforce
            Government Technology, December 6th, 2012
            "A little more than six years ago, as the economy careened toward the cliff we now call 'The Great Recession,' a national study revealed that a large number of senior government IT executives were eligible for retirement, while recruiting new employees was increasingly difficult. 'The upcoming drop-off in qualified IT employees to replace outgoing senior management and technical expertise appears to be certain and imminent,' the study concluded.

            But the recession put the problem on hold..."

            Why Human Beings Are Predictably Wrong
            Gartner, December 6th, 2013
            "Prediction is very difficult, especially if it's about the future."

            "So said physicist Niels Bohr, a very smart man. About the only reliable prediction we can make about people is that we will never stop making predictions. Disappointment does not deter us. And ironically enough, our predictions tend to be wrong in predictable ways..."

            • Be self-centered
            • Mistake habits for human nature
            • Trust our first impressions
            • Overestimate the speed of change
            • Overuse the 'word revolution'

            Read on for details.

              CIOs need to get out more
              CIO, December 5th, 2013
              "Research into IT expenditure published recently by CEB has provided some interesting and potentially worrying insights for CIOs. The finding that has grabbed all the headlines is that technology spending by non-IT functions adds another 40% to the official IT budget. Put another way, this means that CIOs control just over 70% of the total IT spend within their organisations..."
                What CIOs can expect in 2014
                Help Net Security, December 6th, 2013
                "While the 3rd platform of mobile, social, big data, and cloud services is just beginning to mature, it will require an entirely different set of IT skills and roles - many of which are yet to be invented. These are just some of the long-term industry trends that will most impact the role of the CIO..."
                Lessons Learned as a CIO: Prioritizing IT Projects
                Enterprise Efficiency, December 3rd, 2013
                "How should CIOs prioritize their projects? When you are a CIO, almost everybody seems to have a pet project for the IT department. Completing every project is unrealistic. Budget and staff realities limit the number of projects IT can complete.

                Believe it or not, being forced to choose among projects can be a good thing..."

                Watching the Bosses
                Enterprise Efficiency, December 2nd, 2013
                "We've become accustomed to systems that let us spy on employees. Systems that spy on executives may change the formula.

                For the longest time companies have been quite open about putting systems in place to keep track of how employees spend their time (and their use of corporate resources). Keystroke loggers, video cameras, deep-packet inspectors, and filters -- all these and more have been used to ensure that employees are doing everything they're supposed to do and nothing that's forbidden..."

                  If you keep chasing the puck you may never get there
                  Real Story Group, December 6th, 2013
                  "Perennial NHL all-star Wayne Gretzky famously advised skating to where the puck was going, not where it had been - a phrase that has since gotten widely adopted in a tech world fraught with endemic change.

                  Of course this approach makes sense. But on the other hand, I often see it used to justify over-buying technology in anticipation of unrealistic future capacity, ultimately undermining the very speed and agility you seek..."

                    "People Problems" Stymie CRM Initiatives
                    Forrester Research, December 3rd, 2013
                    "To succeed in the age of the customer, business and IT professionals who support front-office business processes cannot afford failed technology initiatives. But how do you acquire and deploy the appropriate supporting technologies and lead and sustain the necessary organizational changes to be successful?

                    Knowledge workers have a great deal of control over the tools they use to get their jobs done, and you must convince them of the value of using a new technology tool. The cost of poor adoption is twofold: underutilized investment and unmet business objectives. Driving adoption needs to be a top priority of any customer relationship management (CRM) initiative, and getting there requires skills and resources to drive effective change management..."

                    8 key duties of the chief digital officer
                    ZDNet, December 4th, 2013
                    "What is this new thing called 'chief digital officer'? How does this role differ from that of chief information officer? What should a job description look like?

                    Sam Ramji, vice president of strategy at Apigee, has been watching the emergence of this new C-title, and made some observations as to where these individuals should be focusing their efforts. He describes his epiphany coming from listening to digital leaders at the recent Chief Digital Officer Global Forum..."

                    ITPalooza 12/12/13 Ft. Lauderdale
                    Come Early for Storage "Lunch and Learn"
                    Last year, on 12/12/12, ITPalooza raised over $30,000 in charitable donations from 1,200 members of the local IT community.

                    In keeping with the spirit of bringing together the whole South Florida Technology community, this year, on 12/12/13, ITPalooza will be a full day of vendor-prospect interaction, tech education sessions, hackathons, professional networking and a tech employment fair.

                    Come early for the storage "Lunch and Learn" Driving Down Storage Costs with Software Defined Storage and SSDs.

                    • Join 1500 IT Professionals for South Florida's premier user group meetings and holiday party
                    • Multiple tracks presented by South Florida IT Professionals - All in one place
                    • Find your niche, Join a user group. Over 50 to choose from
                    • Marine Toys For Tots will be on hand to collect your new unwrapped toys

                    Details and Registration Link.

                    IT - PM
                    Why Are So Many IT Projects Failing?
                    CIO, December 4th, 2013
                    "Fifty percent of businesses had an IT project fail during the last year, according to a survey by cloud portfolio management provider Innotas. The primary reason, according to 74 percent of respondents, was a lack of resources to meet project demands.

                    Where have all the project managers gone? Is the IT industry suffering a shortage of employees with these skills?..."

                    IT - Networks
                    Telcos' digital services/OTT businesses make Net Neutrality more important than ever
                    Disruptive Wireless, December 5th, 2013
                    "Telcos actually need Net Neutrality to survive & thrive, even though some don't realise it.

                    The current US & European softening of regulatory stance about 'managed services' and Net Neutrality potentially hands suicide pills to operators, who mistake them for candy.

                    The problem is that some telco executives - and most of their lobbyists and industry associations - are still living in the past, and haven't actually caught up with the realities of creating and delivering new services, working with customers' preferred behaviour, and interacting with the innovators and developers of tomorrow's propositions..."

                      Understanding where 802.11ad WiGig fits into the gigabit Wi-Fi picture
                      Network World, December 2nd, 2013
                      "The wireless world is evolving rapidly in response to the explosion of intelligent devices, applications and data, and the IEEE 802.11ad standard, commonly known as WiGig, is poised to help.

                      WiGig is a step change from the 802.11 evolution we have witnessed over the last 10 years, adding a new frequency band, 60 GHz, to existing products: 802.11n operates in the 2.4-GHz and 5-GHz bands, while newer 802.11ac products operate in the 5-GHz band.

                      By enabling the emergence of tri-band products -- such as 802.11n/ac + 802.11ad -- WiGig opens the door to exciting applications and makes it more possible for all intelligent devices to be connected through a high speed Wi-Fi network..."

                      Planning for SDN
                      Network World, December 2nd, 2013
                      "Software-defined networking (SDN) is the hottest thing going today, but there is considerable confusion surrounding everything from the definition of the term to the different architectures and technologies suppliers are putting forward.

                      Given the confusion, some IT shops are probably taking a wait-and-see attitude. But while that response would be understandable, it isn't the right approach because, even though no reasonable person would claim to know how SDN and network virtualization will evolve over the next several years, there is no doubt these emerging technologies will have a significant impact..."

                      You're Under Attack
                      Enterprise Efficiency, December 2nd, 2013
                      "If you're looking for something to fear in IT security, don't look at the NSA: Look at the Man in the Middle.

                      As a general rule, if you're using the Internet you're vulnerable to a man-in-the-middle attack. They're malicious, dangerous, hard to detect, and according to an article in Wired, it's entirely possible that you've already been a victim. Got your attention yet?..."

                      IT - Operations
                      Study: Data Center Downtime Costs $7,900 Per Minute
                      Data Center Knowledge, December 2nd, 2013
                      "Unplanned data center outages are expensive, and the cost of downtime is rising, according to a new study. The average cost per minute of unplanned downtime is now $7,900, up a staggering 41 percent from $5,600 per minute in 2010, according to a survey from the Ponemon Institute, which was sponsored by Emerson Network Power. The two organizations first partnered in 2010 to calculate costs associated with downtime..."
                        Ten Trends For The Progressive Retailer
                        Jeremiah Owyang, November 26th, 2013
                        "Today's face of retail is changing. New people behaviors and technologies are causing new business models, strategies and tactics to change beyond the traditional retail mall. Below is a list of trends I'm watching, experimenting, and adopting. As we head into the holidays, and help retailers earn their major revenue share, here's some future trends to be tracking..."
                          Security Assurance and Testing: No Surprises
                          Securosis, December 5th, 2013
                          "The methods by which applications and supporting infrastructure are developed and deployed are undergoing fundamental change. Avoiding the predictable hyperbole, new methods including DevOps and Cloud Computing promise to disrupt most of IT over the next 5-10 years. But embedded infrastructure and legacy applications are not going away. IT professionals need to walk a fine line between delivering critical services at the lowest price for acceptable performance, and doing it quickly and reliably.

                          As usual, security is at the end of the tail being wagged..."

                          IT - Security
                          Alert: Your Password is Probably Compromised...Again
                          CIO, December 6th, 2013
                          "Hackers have exposed millions of passwords from Facebook, Google, and Twitter. Sadly, password compromise is so common that it barely even registers as news any more. Suffice to say that it's probably time to change your password again..."
                          Asia Pacific Governments Must Learn From Recent Cyberattacks
                          Forrester Research, December 2nd, 2013
                          "The digital age brings some inherent security risks, like cyberattacks and hacking, that can have a significant impact on governments. The governments of Singapore, Philippines, South Korea, India, and Japan are some of the recent major victims - and the list is growing by the day.

                          Why are Asia Pacific (AP) governments a soft target for cyberattacks?..."

                          Data Breaches have Eroded Consumer Faith in Security, Fujitsu Finds
                          CIO, December 6th, 2013
                          "A decade of data breaches has left barely one in ten UK consumers with faith in the ability of large organisations to safeguard their personal data, a survey for Fujitsu has revealed.

                          The poll of 3,000 consumers from around the country found consistently low levels of trust regardless of the sector holding the data. Things are apparently so bad that the usually disliked banks were actually rated the highest for data trust at 36 percent, ahead of supermarkets, online retailers, local and central government. Social media came bottom on 15 percent..."

                          Security Professionals Report Weaknesses in Malware Prevention Processes
                          ESG, December 5th, 2013
                          "As the old adage states, 'security is a process, not a product.' True, but understated. In reality, enterprise security is a plethora of processes requiring constant management and oversight. Your organizations can be fabulously adept in 99% of all security processes but weaknesses in the remaining 1% can still result in massive vulnerabilities.

                          In a recent research survey, ESG asked enterprise security professionals (i.e., more than 1,000 employees) to pinpoint security process weaknesses as they relate to malware prevention. Here are the top five weaknesses identified:..."

                          Shadow IT is undermining your security
                          CSO Online, December 2nd, 2013
                          "Once upon a time, not so long ago, the IT admin chose exactly what hardware and software would be used by employees. Recent trends like the consumerization of IT and BYOD (bring your own device) have shifted the balance of power, but IT still has to maintain some degree of control over the applications used and where sensitive data is stored. Many users just download apps or start using unsanctioned services, though, and introduce unnceccesary security risks through 'shadow IT.'"
                          Edward Snowden Beyond Data Security
                          ESG, December 3rd, 2013
                          "Nearly every day, some security vendor reaches out to me describing how its products and services could have prevented the Edward Snowden public-disclosure of NSA surveillance programs. These vendors talk about strong authentication, privileged account auditing, sensitive data controls, etc.

                          Yup, old Ed stirred the security pot in the vendor community but security professionals are also paying attention. In working with Vormetric on its 2014 Insider Threat Report, ESG research discovered that 45% of enterprise security professionals say that the Edward Snowden incident (i.e., his public disclosure about the NSA and its PRISM program) changed their organizations' perspective on insider threats..."

                          IT - Careers
                          18 hot IT certifications for 2014
                          IT World, December 2nd, 2013
                          "Foote Partners just released the November update to their quarterly report, the 2013 IT Skills Demand and Pay Trends Report in which they look at both certified and non-certified IT skills, 641 in all. They use what David Foote, founder and CEO of Foote Partners, refers to as, "a specialized methodology for collecting, and validating compensation data for workers with identical jobs titles that need to be differentiated pay-wise for specific IT and tech skills they possess."

                          • Certified in Risk and Information Systems Control (CRISC)
                          • CWNP Certified Wireless Security Professional
                          • CWNP/Certified Wireless Network Expert
                          • GIAC Certified Forensics Analyst (GCFA)
                          • GIAC Certified Intrusion Analyst (GCIA)
                          • HP/Accredited Solutions Certification
                          • Information Systems Security Engineering Professional (ISSEP/CISSP)
                          • Microsoft Certified Architect (MCA)
                          • Microsoft Certified Solutions Master (all)
                          • Open Group Certified Architect (Open CA)

                          Read on for more details.

                          High CISO Employment Rates Means Shortage for Security Industry
                          CIO, December 5th, 2013
                          "The good news for qualified information security professionals at the C-suite level is that it is pretty difficult to be unemployed.

                          Earlier this year, the Bureau of Labor Statistics (BLS) reported that unemployment in that sector had "spiked" to 3 percent in the fourth quarter of 2012, although the rate for the entire year was all of 0.9 percent. In general, 4% is considered full employment..."

                          4 New Use Cases for Video in Recruiting
                          BrandonHall Group, December 3rd, 2013
                          "Unless you've spent the last couple of years under a rock, you know that video recruiting tools have become increasingly popular for screening and interviewing candidates. While some would go so far as to say that they're an essential part of a high-performing talent acquisition process - including my friend Bridget Webb, vice president of marketing at WePow - I think it's safer to say that video has proven to be a viable medium for executing critical workflows.

                          The most obvious value proposition is two-fold: they save time and money. The significant reduction of time recruiters and hiring managers spend screening candidates is a big win. But as more employers are taking candidate experience into consideration, a different story is emerging in video - one focused on the value of video for candidates..."

                          How and Why to Backdoor Into Jobs
                          Job Tips for Geeks, December 2nd, 2013
                          "When I read anecdotes from frustrated job seekers in the tech industry, they usually start out the same way.

                          'I applied to dozens of jobs but I am not getting any response.'

                          Sometimes the low response is warranted due to lack of qualifications or less obvious factors, but often the problem is simply that the job seeker never got access to the person/people who matter most in the hiring of technical professionals..."

                            CIOs opting for IT contractors over hiring full-time staff
                            IT World, December 2nd, 2013
                            "The latest Bureau of Labor Statistics data reveals that over the last 12 months, only 77,600 IT jobs were added, as CIOs and hiring managers remain cautious about the slow economic recovery, says Victor Janulaitis, CEO of Janco Associates, a management consulting firm that specializes in IT.

                            According to the BLS data, September's IT jobs number was adjusted down from a gain of 2,500 jobs to a loss of 3,600 jobs. At the same time, the number of jobs reported as gained in October was only 5,200. But amid these dismal numbers, Janulaitis says, there's a bright spot companies are increasing thier budgets for hiring skilled IT contractors..."

                            'Tis the Season to Ramp Up Your Job Search
                            CIO, December 6th, 2013
                            "Thinking of putting your job search on hold until the hustle and bustle of the holiday season is past? You might want to rethink that strategy, says Piera Palazzolo, senior vice president of marketing at Dale Carnegie Training.

                            While it may seem counterintuitive, the holiday season could be the perfect time to start searching for a new job or to ramp up efforts on a search that's already underway, Palazzolo says..."

                              Find jobs 'hiding in plain sight' on LinkedIn
                              IT World, December 2nd, 2013
                              "Recruiter and career coach Artie Fertig says there are jobs posted on LinkedIn "so out in the open that they're ignored."

                              Fertig tells U.S. News & World Report that a scroll through the Updates section on LinkedIn's main page reveals openings posted by hiring managers, HR and recruiters, a la, "my company is looking to hire a XXX," complete with a link to the posting..."

                                IT - Social Media
                                10 of the Best Ecommerce Tools to Help You Win this Holiday Season
                                Compete, December 4th, 2013
                                "The most jolly time for both consumers and retailers is on in full force, the holiday season has started. So how can retailers, or more specifically, eRetailers, take advantage of the holiday season and receive the gift of a record high sales quarter?

                                The solution is most likely the perfect combination of marketing, sales promotions, and optimization. Unfortunately I can't provide you with that perfect solution. What I can provide you are the tools to help make sure that your web store is performing to its maximum potential..."

                                  Only 30% of Top CEOs Use Social Networks
                                  CIO, December 6th, 2013
                                  "Only 30% of the CEOs at the top companies traded on the NASDAQ stock exchange are active on social media sites, gathering spots for millions of potential customers.

                                  CEOs not using social media include some very well known high tech execs, according to a search of active social networking profiles by Augure, a maker of software for public relations professionals. The study of the profiles was conducted between Jan. 12, 2012 and Nov. 31, 2013..."

                                    IT - Email
                                    Google to Let Users Download Portable File with All Their Gmail Messages
                                    CIO, December 5th, 2013
                                    "In a major move for data portability, Google will let users download their entire set of Gmail messages in a single file and do the same with their Google Calendar items.

                                    This capability, announced Thursday, is aimed at people who want to create Gmail and Calendar backups or move their data to other email and calendar services. People will also be able to download part of their Gmail inbox and some of their calendar..."

                                    IT - Database
                                    The new databases, part one (of three): a proliferation of analytical engines
                                    Gigaom Research, December 8th, 2013
                                    "Most enterprise databases have come in two basic flavors over the past 25 years:

                                    • relational databases optimized for transaction processing, and
                                    • relational databases optimized for data warehousing.

                                    But that has started to change dramatically. George Gilbert, a Gigaom analyst and Co-Founder and Partner at TechAlpha, says there will be a great proliferation of databases and associated analytics over the next several years as new levels of optimization for different workloads become feasible..."

                                    Prediction for 2014: Memory Optimized ("In-Memory") Database Technology Is Taking Over Enterprise Databases
                                    IDC Insights, December 5th, 2013
                                    "Some are saying that the chip cache is the new RAM, and RAM is the new disk. In the DBMS world, this means that disk-optimized DBMSs (those that optimize their operations around the management of data on disk storage) are giving way to memory-optimized DBMSs (those that optimize operations around the management of data in memory, using disk for overflow and recovery purposes). A number of startups have unveiled exciting new technology along these lines..."
                                    IT - Big Data
                                    How operations, design, and data affect software and business: Ops edition
                                    Redmonk, November 11th, 2013
                                    "I've been doing a lot of thinking recently about the interaction between software development and three key areas: operations, data, and design. After conversations this week with Dell's James Urquhart (courtesy of the enStratius acquisition) and Rod Smith from IBM's emerging-tech group, I decided that it's worth writing up to hopefully drive some discussion around these ideas..."
                                    Big Data security, privacy concerns remain unanswered
                                    CSO Online, December 5th, 2013
                                    "Big Data creates new security and privacy challenges that de-identification can't meet...

                                    Approaches to storing, managing, analyzing and mining Big Data are new, introducing security and privacy challenges within these processes. Big Data transmits and processes an individual's PII as part of a mass of data - millions to trillions of entries - flowing swiftly through new junctions, each with its own vulnerabilities..."

                                    Data Scientist: The Sexiest Job No One Has
                                    Information Week, December 2nd, 2013
                                    "The data scientist has been called the sexiest job of the 21st century, but it's largely going unfilled. That's a huge problem for the business world.

                                    I've spent most of my career working with new technology, most recently helping companies make sense of mountains of incoming data. This means, as I like to tell people, that I have the sexiest job in the 21st century. That's not me talking. SmartData Collective, an online community moderated by Social Media Today, has called big data scientist "the sexiest job of the 21st century." Who am I to disagree?..."

                                    Your Big Data Is Just a Hot Mess Without Latent Variables
                                    Big Data Republic, December 2nd, 2013
                                    "Of the hyped up V's of big data, 'variety' is one that is often only superficially understood. It is easy to say that we want lots of different types of data to analyze -- e.g., transaction data, clickstream data, social data, demographic data, sensor data, etc. -- but just having a mountain of data from many sources is not enough. Even if you are able to gather all this data, there is still a giant barrier between your enterprise data warehouse (EDW) and value-generating analysis; the problem is that much of raw data is too granular and unstructured to be effectively used for learning..."
                                    Big Data hugely important for business, study notes
                                    CIO, December 2nd, 2013
                                    "The power of Big Data for businesses, governments and regulators is substantial but potential legal and ethical pitfalls remain a worry, according to a new survey of finance professionals.

                                    A poll conducted by ACCA and the Institute of Management Accountants, found that 52% of respondents in the UK and 62% globally had cited Big Data as hugely important to the future of business, potentially giving savvy businesses an edge over their competitors..."

                                    New European Data Privacy Laws: Another Twist In The Tale
                                    Forrester Research, December 5th, 2013
                                    "Many organizations will have been relieved to find that the implementation of the update to existing European data privacy laws, the EU Data Protection Regulation, has been postponed. Adoption of the Regulation is now scheduled for 2015, which means it'll be 2017 (possibly end of) before it's actually applicable.

                                    At least, that's what it looks like..."

                                      IT - Mobile
                                      10 Awesome Facts About the Mobile Revolution
                                      CIO Insight, December 2nd, 2013
                                      "You may think that everyone on the planet already has a smartphone. Well, guess again: smartphone-based subscriptions actually account for the vast minority of overall mobile subscriptions in the world, which means there's plenty of room for user share to grow..."

                                      • Onward and Upward
                                      • Broad Perspective
                                      • Twice as Nice
                                      • Meet the New Boss
                                      • High Volume, Part I
                                      • High Volume, Part II
                                      • Visual Sensation
                                      • Big Reach
                                      • Biggest Regions for Mobile Subscriptions
                                      • What Users Spend the Most Time Doing on Smartphones Every Month

                                      Read on for details.

                                        Cash Not Accepted Here
                                        Bank Systems and Technology, December 2nd, 2013
                                        "As a culture, we've been conditioned to think that paying with cash is always better, whether it's for taxis, gas stations, or shopping on the street. Trips to a local bank branch or an ATM are still normal for largely this reason- because cash is still the universal method of payment accepted at all locations.

                                        The reality, however, is that smart phones are gradually chipping away at the physical dollar's dominance..."

                                          India And China Will Lead Asia Pacific Enterprise Mobile Software Spending In 2014
                                          Forrester Research, December 3rd, 2013
                                          "Consumer mobility in India and China is flowing into enterprises. Recent Forrester survey data shows that nearly three in five IT execs and technology decision-makers in these countries - 58% in India and 57% in China - plan to increase their spending on mobile software (including applications and middleware) in 2014.

                                          India has leapfrogged Australia/New Zealand and now leads the Asia Pacific region in terms of expected mobile software spending growth. China has made the biggest move over the past year, jumping from eighth place to second..."

                                            Holiday Shopping? Android, Apple, or Microsoft
                                            ESG, December 6th, 2013
                                            "Have you ever noticed how we are all considered IT experts come the holiday time? Brothers, mothers, grandfathers, aunts, cousins and close friends all turn to us for their latest technology purchasing decision. Since I am a bit of a gadget guy, I enjoy these conversations. It's fun to step through what they think they want and what they actually need. Here are a few of my observations:..."
                                              US Mobile Market Update Q3 2013
                                              Chetan Sharma, November 14th, 2013
                                              "The US mobile data market grew 5% Q/Q and 15% Y/Y to reach $22.8 billion in mobile data revenues. Data is now 48% of the US mobile industry service revenues and as we had forecasted a few years back, the cross-over point of 50% might occur next quarter. For the year 2013, we are expecting $90 Billion in mobile data service revenues for the US market making it the number one market in mobile data revenues ahead of Japan and China. Q4 2013 is looking to be another record breaking holiday quarter for the industry at many levels, which is setting up 2014 quite nicely..."
                                                IT - BYOD
                                                Don't say no to BYOD and personal clouds, but understand the legal risks when you say yes
                                                Network World, December 5th, 2013
                                                "While you have undoubtedly heard all the gloom and doom stories regarding individuals using personally owned devices or personally controlled cloud services like Dropbox, SkyDrive, Google Drive, Idrive, Evernote and similar services, don't forget the law of unintended consequences.

                                                IT can't possibly anticipate every possible risk presented by the use of these technologies, but one thing is for certain: If employees store corporate information on their own devices or in the cloud using one of these services, they may open the company up to legal implications under the U.S. Federal Rules of Civil Procedure (FRCP)..."

                                                BYOD's Achilles heel: Billing and losing group buying power
                                                ZDNet, December 2nd, 2013
                                                "Bring your own device plans hold a lot of promise. Employees get to use the device they want and the enterprise doesn't have to hand out smartphones anymore. But the returns on these plans have been sketchy. Why? No one has figured out proper billing arrangements.

                                                The big knock on BYOD plans for corporations is simple: Companies lose all leverage in carrier contracts because they can't buy in bulk..."

                                                Top Ten Articles for last few Issues
                                                Vol 189 Issues 1, 2, 3 and 4; Vol 188 Issues 2, 3, 4 and 5
                                                We track how frequently each article is viewed on the web site to determine which the readers consider the most important. For last week, the top 10 articles were:

                                                • Presentations from Solaris Day, Nov 27th, Moscow
                                                • World Record Single System TPC-H @10000GB Benchmark on SPARC T5-4
                                                • Big Data - Real and Practical Use Cases
                                                • Oracle Solaris 11 in the Cloud
                                                • Database Cloning in Minutes using Oracle Enterprise Manager 12c Snap Clone
                                                • Java Mission Control
                                                • ContactLab Extends Commitment to MySQL
                                                • Managing Many Databases as One: Pluggable Databases from Oracle
                                                • Java Platform Standard Edition 8 Early Access Documentation
                                                • NetBeans Podcast 67

                                                The longer version of this article has list of top ten articles for the last 8 weeks.

                                                  IT - Server
                                                  IT Managers Are Increasingly Replacing Servers with SaaS
                                                  CIO, December 6th, 2013
                                                  "IT managers want to cut the number of servers they manage, or at least slow the growth, and they may be succeeding, according to new data.

                                                  IDC expects that anywhere from 25% to 30% of all the servers shipped next year will be delivered to cloud services providers.

                                                  In three years, 2017, nearly 45% of all the servers leaving manufacturers will be bought by cloud providers..."

                                                  Oracle Key Manager 3
                                                  centrally manage keys for end-points
                                                  Now, your customers' data center security has become easier to manage. With Oracle Key Manager 3, they can centrally manage keys for end-points such as Java applications, Oracle Database, Oracle ZFS File System, Oracle Solaris 11, OEL Operating Systems, StorageTek Enterprise tape drives and StorageTek LTO 4/5/6 tape drives. Oracle Key Manager 3 also gives them server power, replication acceleration, and faster encryption capabilities with on-chip cryptography support with a new server platform (Netra SPARC T4-1).
                                                  Trending in
                                                  Vol 235, Issue 3
                                                  Trending IT Articles