News about Oracle's Solaris and Sun Hardware
System News
Dec 23rd, 2013 — Dec 29th, 2013 Generate the Custom HTML Email for this Issue
System News System News for Sun Users
Volume 190, Issue 4 << Previous Issue | Next Issue >>
Sections in this issue:
click to jump to section

Are You Keeping Up With The Latest Data Warehousing Trends?
Oracle white paper highlights of the major trends, problems and breakthroughs
Most enterprises are overwhelmed with data.

Information is being generated faster than it can be consumed, yielding increasing demand for comprehensive data-management solutions.

  • Which data management issues are CIOs most eager to solve and what opportunities are at the top of their corporate agendas?
  • What are the most compelling developments in data warehousing that motivate IT leaders to undertake new initiatives?
  • How are industry leaders taking advantage of new software and hardware technologies to drive innovation in data management?

Find out by downloading this white paper. By doing so, you'll gain access to:

  • Highlights of the major trends, problems and breakthroughs in data warehouse technology.
  • Best practices for getting more from a data warehouse in the era of big data.

Whether you're looking to drive more value from your data warehouse or to lower the operational costs of your data infrastructure in 2014, this white paper can help by summarizing the latest trends and innovations in data warehousing.

How Office Depot Optimizes ERP by 20% with SPARC and Solaris

Office Depot simplifies IT architecture and reduces complexity with Oracle E-Business Suite applications, Oracle's Sun SPARC platform, and the Oracle Solaris platform

Office Depot is one of the largest retailers of office supply products in the world with over 900 stores in the United States and another 400-500 in Europe and the Middle East.

Their challenge was that they couldn't scale their Oracle ERP applications on their current hardware platform, so they made the move from an x86 architecture to a SPARC and Solaris platform to get better scalability and reliability.

This wasn't a decision to be taken lightly. Oracle ERP is Office Depot's largest application with the largest workload. The company supports over 40,000 employees on this platform alone.

"We needed something that we could just put in and operate," says Marshall Lew, Sr. Director of Computing Platforms at Office Depot.

SPARC-powered Exadata Configuration
Michael Palmeter writes, "Oracle has been shipping an Oracle Exadata configuration that runs Oracle's T and M-series (SPARC) microprocessors for more than 2 years. This database machine is called Oracle SuperCluster.

Technically, SuperCluster has always included every single Exadata feature of note. This is because every SuperCluster configuration is built around the same Exadata Storage Servers and InfiniBand switches that are used in every other Exadata system configuration..."

Exadata X4: Overview of Changes from X3
25-Page Slide Presentation
Oracle's fifth-generation flagship database machine, Oracle Exadata Database Machine X4, introduces new hardware and software to accelerate performance, increase capacity, and improve efficiency and quality of service for database deployments.

The new release focuses on Online Transaction Processing (OLTP), Database as a Service (DBaaS), and Data Warehousing and is also designed to help enterprises simplify their biggest database challenges. It includes performance increases between 50 and 100 percent and storage capacity increases between 33 and 100 percent.

This presentation provides an overview of the changes from the Oracle Exadata Database Machine X3.

A Technical Overview of the Oracle Exadata Database Machine and Exadata Storage Server
40-Page White Paper
"The Oracle Exadata Database Machine is engineered to be the highest performing and most available platform for running the Oracle Database. Exadata is a modern architecture featuring scale-out industry-standard database servers, scale-out intelligent storage servers, and an extremely high speed InfiniBand internal fabric that connects all servers and storage.

Unique software algorithms in Exadata implement database intelligence in storage, PCI based flash, and InfiniBand networking to deliver higher performance and capacity at lower costs than other platforms.

Exadata runs all types of database workloads including Online Transaction Processing (OLTP), Data Warehousing (DW) and consolidation of mixed workloads. Simple and fast to implement, the Exadata Database Machine powers and protects your most important databases and is the ideal foundation for a consolidated database cloud..."

Exadata Customer Case Studies (PDF)
10 References, Presentation Style
Learn how 19 major Exadata customers have leveraged Exadata technology to solve business problems.

References include:

PayPal: Real-Time OLTP VocaLink: OLTP Performance U.S. Customs and Border Protection Oracle Beehive: Collaboration Turkcell: DW and DB Consolidation Organic Food Retailer: OLTP Consolidation SK Telecom: Revenue Assurance DW P&G: DW and Mixed Workload Alpha Natural Resources: OLTP Garmin: OLTP Consolidation

And many more. Read on for details.

Oracle Virtualization Newsletter
December Edition
The latest Oracle Virtualization newsletter is out! Here are some of the highlights:

  • Oracle joins OpenStack Foundation
  • Replay information for Top 5 Reasons Why Oracle VM Is Best for Oracle Database webcast
  • Case study on telecommunications company that deployed IT as a service using Oracle VM
  • Oracle VM VirtualBox receives community choice award from Windows IT Pro
  • Information on the upcoming Virtual SysAdmin Day on January 28
  • A new e-book titled "Oracle VM: Application-Driven Virtualization for the Modern Data Center and the Cloud"
  • Plus, new podcasts, white papers, customer success stories, partner buzz, and much more!

You can read the December edition online here.

Top 5 Reasons why Oracle VM is Best for Oracle Database
Webcast available on-demand
Oracle VM's application-driven architecture is designed for rapid deployment and ease of lifecycle management providing IT a highly scalable and cost effective virtualization solution for Oracle Database and business-critical applications.

View an Oracle webcast featuring Francisco Munoz Alvarez, a seasoned expert, and Oracle ACE Director as he shares his performance benchmark findings highlighting key reasons why Oracle VM is the best virtualization technology for Oracle Databases.


  • Francisco Munoz Alvarez, Oracle Professional Services Manager, Revera Limited
  • Doan Nguyen, Senior Principal Product Marketing Director, Oracle

Original Broadcast Time and date

  • Tuesday, December 17, 2013
  • 10:00 AM PST

Watch this insightful webcast, an opportunity to hear real-world benchmarking results.

IT - Storage
Top Six Reasons to Use Object Storage, December 23rd, 2013
"As cloud storage technology is increasingly adopted for a broad range of consumer and business applications, the storage landscape is transitioning away from traditional disk arrays to object-based storage systems.

A recent IDC report predicts that the market for File- and Object-Based Storage (FOBS) will experience an annual growth rate of 24.5% through 2017, reaching $38 billion. 'Increased versatility will result in more diverse use cases for FOBS,' said IDC.

Software-based object storage is not saddled with the cost, complexity and vendor lock-in of legacy storage arrays or the scalability limitations of traditional file system storage..."

IT - Technology
What to Expect at CES 2014 - Wearable Computing
Gartner, December 19th, 2012
"Wearable computing is one of the hottest topics being discussed today, and with CES 2014 taking place next month in Las Vegas, new innovations are sure to be on display. While wearable cameras and smart watches will be much looked at, Angela McIntyre, research director at Gartner, said digital health and fitness will be one of the hottest segments at the event with 40 percent of exhibitor floor space being expanded for digital health/fitness exhibitors. Ms. McIntyre provided her thoughts on what to expect from the wearable market, with a focus on the digital health and fitness segment..."
2014 in preview: A look at upcoming tech trends
ZDNet, December 22nd, 2013
"The year ahead should be an interesting one for business tech as multiple tectonic plates are shifting all at once and rejiggering industry leadership.

Here's a look at the key themes for 2014 from our editors around the world:..."

  • Larry Dignan: Post PC fallout hits hard
  • Eileen Yu: China's increasing footprint, local players to battle global leaders
  • Chris Duckett: Fragmentation in mobile
  • Steve Ranger: Wearable devices become mainstream: whether we like it or not
  • Jo Best: All change in telecoms
  • Jason Hiner: The rise of contextual computing

Read on for details.

    IT - Bitcoin
    FinCEN: Bitcoin Miners Need Not Register as Money Transmitters
    CoinDesk, December 29th, 2013
    "Bitcoin miners who mine 'for themselves' do not have to register as Money Services Businesses (MSBs) with the US Financial Crimes Enforcement Network (FinCEN), according to an official letter from the agency this week.

    FinCEN was replying to a request for clarification by Atlantic City Bitcoin (AC Bitcoin), aka advocate Milly Bitcoin, who maintains an array of ASIC miners in New Jersey. According to the letter, miners are still free to purchase goods or trade with exchanges with the bitcoins they produce whether operating as individuals or businesses..."

    PRISM, Bitcoins and iPhone 5S biometrics: Security in 2013, December 27th, 2013
    "For the past few years cyber security has been an increasingly big focus for both governments and businesses. This is because the steady stream of cyber threats targeting them has been growing in both frequency and complexity. In today's world even off-the-shelf exploit kits now have the potential to cause crippling damage. However, in 2013 we've seen some of the biggest and most dangerous attacks and data-stealing campaigns ever uncovered, and it wasn't just criminals behind them, but our own governments. The nature of the revelations has made 2013 a defining moment in history for the security industry..."
    The Best Real-World Bitcoin Merchant Pioneers of This Year
    CoinDesk, December 29th, 2013
    "Amid all the excitement and speculation surrounding bitcoin's price over the last couple of months, it's important to remember: to be worth anything at all, bitcoin must be accepted by merchants and used by regular customers on a day-to-day basis.

    Several online businesses accept bitcoin as a fast and simple, fee-free way to transact, but there have been a few more hurdles in introducing the currency to physical traders..."

    How to keep your Bitcoin wallet safe
    AmongTech, December 23rd, 2013
    "Usually you would just keep your wallet in your pocket when going out and every once in a while you tap your pocket to see if its still there, but with Bitcoins it is a bit different as many of you may know.

    All though Bitcoin is a secure payment and is getting more popular by the minute there is also a higher chance that it could be hacked. But it is not the currency where you should worry about, its is more your private wallet that contains your bitcoins, many things can go wrong which could lead to losing all of your bitcoins. We understand this is a huge problem for Bitcoin users and decided to help you decrease the chance that you lose all of your money, here are a few things you can do in order to keep your bitcoins safe..."

    Maybe Oracle Isn't The MySQL Villain So Many People Think
    readwrite, December 16th, 2013
    Matt Asay writes, "When Oracle acquired Sun in 2010, open sourcerors (including me) worried that Oracle would kill MySQL by under-investing in its development or turning it proprietary. Neither has happened. In fact, MySQL performance has dramatically improved under Oracle's stewardship, with the bulk of MySQL code remaining completely open.

    Yet some in the open-source community continue to pummel Oracle for its management of MySQL. Is it fair?..."

    Oracle Linux Newsletter
    December Edition
    The latest Oracle Linux Newsletter is now available! Like always, this issue is full of fantastic content. Here are some highlights:

    • Oracle Linux 6.5 Now Available
    • What Makes Oracle Linux the Best Platform for Oracle Database 12c white paper
    • New Oracle Linux screen cast series
    • Virtual SysAdmin Day on January 28
    • Customer and partner spotlights
    • And much more!

    You can read the latest edition online.

    IT - Cloud
    Cloud 2014: Top 10 Trends to Watch in The Year Ahead
    Data Center Knowledge, December 23th, 2013
    "Cloud computing is more than just a buzzword. It's a mega-trend that has become an umbrella term for the ongoing shift from in-house data centers to third-party facilities. Within that mega-trend are many smaller trends, which have important implications for the industry and your IT operations. Here's a look ahead at the trends that cloud thought leaders believe will be the most significant in 2014..."
    Cloud Security: An Interview with a Professional White Hat
    Data Center Knowledge, December 26th, 2013
    "The amount of information current traversing the cloud continues to grow. We've crested the zettabyte threshold and continue to push even more data, applications and workloads through a cloud model. As with anything in technology, the more users on the platform, the bigger the target becomes.

    Security has always been a major concern in cloud computing. The transmission of valuable data, the increased utilization of WAN resources and the growth of device connectivity are all pushing the boundaries of how we compute. There have been many discussions around cloud computing and security concepts. Today's conversation is different..."

    Why 2014 will be the year of cloud assimilation and confusion
    GIGAOM, December 23rd, 2013
    "The New Year is a time when many analysts reflect on what occurred over the last year, and what is likely to occur in the forthcoming year. However, I think it's a good time to look at what has occurred in the last several years, and what is likely to occur in the years to come.

    A lot of people write about cloud computing these days. However, I've been in this space since the 1990s. With the rise of the Internet, it seemed like a natural thing to leverage this massive network to share IT resources, not just content. However, it's an idea that most found difficult to grasp. So, I knew the movement to cloud computing was going to be a long trod of attempts and failures. Moreover, enterprises pushed back on the idea of cloud computing, typically for lots of pretty good reasons..."

    Ten Trends For Cloud Computing In 2014 To Dominate Digital Disruption
    Software Insider, December 28th, 2013
    "Constellation's cloud computing research falls under the Tech Optimization and Innovation business theme and throughout other areas where applications are applied. The trends for 2014 cover across the entire cloud stack.

    Holger Mueller, VP and Principal Analyst, covers the impact of Infrastructure as a Service (IaaS) and Platform as a Service (PaaS) as well as HR Technologies in the Future of Work. R 'Ray' Wang researches the impact of Cloud Computing on business strategy and the application landscape..."

    SaaS predictions for 2014
    Network World, December 23rd, 2013
    "While the bulk of enterprise software is still deployed on-premises, SaaS (software as a service) continues to undergo rapid growth. Gartner has said the total market will top $22 billion through 2015, up from more than $14 billion in 2012.

    The SaaS market will likely see significant changes and new trends in 2014 as vendors jockey for competitive position and customers continue shifting their IT strategies toward the deployment model. Here's a look at some of the possibilities..."

    IT - CxO
    Leadership Void Threatens Global Businesses
    CIO Insight, December 26th, 2013
    "A generation ago, it was standard practice to fill senior-level positions with lower-level managers who had hung around the longest. After all, seniority ruled. But the rapid pace of tech innovation and economic shifts are changing the game. As a result, organizations must overhaul the way they evaluate - and groom - future leaders, according to a recent survey from Egon Zehnder. One key to success: Prioritizing personal comportment over job-specific skills and knowledge, the latter being qualities that can often be learned..."
      CIO/CMO impact: Three disruptions that demand your attention
      ZDNet, December 23rd, 2013
      "Venture capital investor, Fred Wilson, is a keen and deep-thinking observer of enterprise software trends. During a talk at the LeWeb conference, in Paris, Wilson presented his framework for evaluating startup investments.

      [We discussed Wilson's presentation on CxOTalk with JP Rangaswami, the Chief Scientist of Here is my summary: Putting customers first: Hierarchies, scarcity, and the illusion of control.]

      His ideas offer an interesting view for CIOs and CMOs who want to drive beneficial organizational change by innovating with technology..."

        The Cost of Bad Online Experiences
        CIO Insight, December 26th, 2013
        "You'd think we would have the online shopping thing down pretty well by now, wouldn't you? Apparently not, according to a recent survey from LivePerson. Companies are losing sales opportunities every day due to their failure to establish a positive, interactive experience, findings show. And the manner in which organizations treat shoppers when they need to ask a question about a product - or simply can't log in - remains a primary culprit. The remedy? Deploy online solutions and tactics that enable service agents to make meaningful, engaging connections with customers..."
          BAE Systems Choose Big Data Appliance for Critical Projects
          Solving complex problems such as financial crime, cyber security
          Oracle has another great story about how to use data warehousing and big data technologies to solve real world problems using diverse sets of data using Oracle technology. BAE Systems is taking unstructured, semi-structured, operational and social media data and using it to solve complex problems such as financial crime, cyber security and digital transformation.

          The volumes of data that BAE deals with are very large and this creates its own set of challenges and problems in terms of optimising hardware and software to work efficiently and effectively together. Although BAE had their own in-house Hadoop experts they chose Oracle Big Data Appliance for their Hadoop cluster because it's easier, cheaper, and faster to operate.

          IT - DR
          New book on implementing business continuity according to ISO 22301
          Help Net Security, December 24th, 2013
          "'Becoming Resilient: The Definitive Guide to ISO 22301 Implementation' describes the process of implementing business continuity according to ISO 22301, an international standard for business continuity management.

          It's author, Dejan Kosutic, wanted to provide an easy-to-read practical handbook for business continuity implementation that will be helpful both for the beginners in this area, but also for experienced business continuity professionals..."

          4 Ways to Make the Business Case for BDR
          The Var Guy, December 27th, 2013
          "It's a painful reality that 94 percent of businesses close their doors within two years if they suffer a major data loss. Another alarming truth is that as many as 96 percent of the PCs in the market today are not adequately backed up - and let's face it, I am sure in many cases we could extend that stat out to hardware in general and come close to that same percentage. Further compounding this issue here is that 44 percent of the more than 350 channel partners recently surveyed on this topic said they are not proactively selling backup and disaster recovery (BDR) to their customers. Instead, they are taking a wait-and-see approach to the problem, which is never good..."
          IT - PM
          5 IT Megatrends that are Changing the Project Management Profession
          IT World, December 26th, 2013
          "My belief is that the role of Project Manager will continue to increase in importance in future years and the need for project managers within IT will increase in both stature and in numbers. My reason for this belief is that there are a number of long term IT megatrends that will increase the demand for professional project management including the following:..."

          • Cloud Computing
          • Bring Your Own Device (BYOD)
          • Server Consolidation and Virtualization
          • Social Media
          • Big Data

          Read on for details.

          Agile Development: Agile Project Management
          Enterprise Efficiency, December 26th, 2013
          "This is the final part of a four part series on agile development. For part one of the series start here. Parts two and three can be found here and here.

          As an agile team is using the first six core techniques to finish the project, they need a daily 'Big Picture' that shows them what's happening. They need to see how their tasks relate to what everybody else is doing and the consequences if certain tasks take longer to get done or if new tasks are added. Without this continuous updated visibility there can be no effective coordination between team members. And without visibility and coordination, agility gets bogged down as people on the project trip over each other and don't get things done in time..."

            IT - Operations
            It's That Time of Year: How to Prepare Your Data Center for 2014
            Data Center Knowledge, December 24th, 2013
            "As 2013 draws to a close, demands continue as high as ever for increased data center efficiency, capacity, and reliability. Given this focus on improving computer room cooling efficiency and that the typical data center today has cooling capacity that is nearly four times the IT load, data centers could reduce their operating expense by an average of $32,000 annually simply by improving airflow management (AFM). In addition, the stranded cooling capacity that is released from these improvements could result in deferring capital expenditure that would have been required for adding additional cooling units or building a new data center. Moreover, releasing stranded capacity makes increasing computer room density and reducing carbon emissions possible..."
            Every Brand Should Have A Plan For A Data Breach
            Software Insider, December 24th, 2013
            "The confluence of centralized personally identifiable information, reliance on digital channels, ease of hacking of magnetic stripes, and the application of the Willy Sutton rule ( a.k.a. you rob banks because that's where the money is) improve the odds that many organizations will face a data breach. The question is not whether one will happen, but more a question of when and to what extent. How a brand addresses the customer experience component during a data breach will have significant impact that will subsume all other brand efforts up and until the data breach..."
              DevOps: 5 Signs Enterprises Need to Unite the Dev and Ops Camps
              eWeek, December 25th, 2013
              "DevOps methodology unites software development (Dev) and production and operations (Ops) into a single, integrated and continuous process. While Dev focuses on innovation and speed, the mandate to Ops is about stability, control and predictability. DevOps is catching on among more agile IT groups and now, based on survey data from CA Technologies, DevOps is not only a way to produce better software faster but also to drive revenue. The relationship between Dev and Ops could often be characterized as a “church and state" situation, where each side often blames the other for shortcomings. However, DevOps stresses communication, collaboration and integration between software developers and IT pros..."
              IT - Security
              The Coolest Hacks Of 2013
              Dark Reading, December 23rd, 2013
              "A look back at some of the year's most extreme, creative, and -- in some cases -- just plain bizarre hacks by security researchers..."

              • Highway To Hell: Cars Get 0wned
              • Hacking The Brain
              • ICS/SCADA Scare
              • Zombie Drone Hijacker
              • Hacking The Laptop Docking Station
              • Nosy 'Snoopy' Sniffs Users' Movements
              • Nautical Nightmare
              • Kids School App Developers
              • Busting Building Alarm Systems
              • What Happens When You Hack Back

              Read on for details.

              NIST Cybersecurity Framework Has Rocky Foundation
              Internet Evolution, December 24th, 2013
              "The recently published draft NIST Cybersecrity Framework is not based on any academic information assurance model. And that's bad news for the voluntary but de facto standard for litigators and regulators.

              Information assurance, cybersecurity, or information security -- whatever your favorite term may be -- has three key goals: confidentiality, integrity, and availability. Organizations address these goals using technology, policy and process, and people..."

              What can we expect next year?
              Help Net Security, December 26th, 2013
              "WatchGuard revealed its annual security predictions for 2014. Assembled by WatchGuard's security research team, the list includes expected advances in ransomware, hacking of IoT (Internet of Things) devices, critical infrastructure exploits and a data breach of

              "With shadowy government agencies building their own botnets, huge data breaches like the one Adobe suffered, and nasty file damaging malware like CryptoLocker, 2013 was an exhausting year for cyber defenders," said WatchGuard Technologies' Director of Security Strategy, Corey Nachreiner..."

              New Paper: Defending Against Denial of Service Attacks
              Securosis, December 24th, 2013
              "Just in case you had nothing else to do during the holiday season, you can check out our latest research on Application Denial of Service Attacks. This paper continues our research into Denial of Service attacks after last year's Defending Against Denial of Service Attacks research. As we stated back then, DoS encompasses a number of different tactics, all aimed at impacting the availability of your applications or infrastructure. In this paper we dig much deeper into application DoS attacks. For good reason - as the paper says:..."
              Lessons From 5 Advanced Attacks Of 2013
              Dark Reading, December 26th, 2013
              "Distributed denial-of-service attacks targeted application and business-logic weaknesses to take down systems; fraudsters used encryption to scramble victims' data until they paid a ransom; and, attackers increasingly targeted providers as a weak link in the chain of the digital security protecting businesses. In 2013, there were no major revolutions in the way that attackers compromised, cut off, or just plain inconvenienced their victim's systems, but their techniques and tactics evolved. From more pernicious encryption in ransomware to massive DDoS attacked fueled by reflection, attackers showed that they still had options available in their bag of tricks..."
              Lucky 2013: Count these 5 security blessings
              InfoWorld, December 23rd, 2013
              "Amid a spying scandal and endless corporate data breaches, blessings might seem in short supply. But these five bright spots will cheer you up...

              Like most years, 2013 proved that some things in the computer security world never change: Java continues to be the most popular attack vector, Chinese APT owns most of the world's corporations, criminals swipe millions of customers' credit card info, and John McAfee is on the run again. Nonetheless, I'm happy to report that several welcome security developments in 2013 are likely to have lasting positive impact..."

              Security Management 2.5: Changing Needs
              Securosis, December 27th, 2013
              "Today's post discusses the changing needs and requirements organizations have for security management customers, which is just a fancy way of saying 'Here's why customers are unhappy.' The following items are the main discussion points when we speak with end users, and the big picture reasons motivating SIEM users to consider alternatives..."
              IT - Careers
              Your next job, next year, may be self-employment
              IT World, December 24th, 2013
              "The tech industry is seeing a shift toward a more independent, contingent IT workforce. And while that trend might not be bad for retiring baby boomer IT professionals, it could mean younger and mid-career workers need to prepare to make a living solo.

              About 18% of all IT workers today are self-employed, according to an analysis by Emergent Research, a firm focused on small businesses trends. This independent IT workforce is growing at the rate of about 7% per year, which is faster than the overall growth rate for independent workers generally, at 5.5%..."

                26 Time Management Hacks I Wish I'd Known At 20
                Business Insider, April 2nd, 2013
                "Most people learn time management the hard way, by trial and error, working late nights to meet deadlines. Etienne Garbugli, a Montreal-based product and marketing consultant, distilled the lessons he wishes he'd known when he was starting into a presentation posted to SlideShare.

                • There's always time. Time is priorities.
                • Days always fill up.
                • Work more when you are in the zone. Relax when you're not.
                • Respect your time and make it respected.
                • Stop multi-tasking. It merely kills your focus.
                • Set up a work routine and stick to it.
                • We're always more focused and productive with limited time.
                • Work is the best way to get working.
                • Work iteratively. Expectations to do things perfectly are stifling.
                • More work hours doesn't mean more productivity

                Read on for details.

                Tech Jobs 2014: IT Hiring, Salaries on the Rise
                Enterprise Efficiency, December 23rd, 2013
                "The next six to 12 months look bright for IT professionals in the US in terms of tech hiring trends and salary increases. Hiring executives are planning to bring on new tech talent in that time period, according to the December 2013 hiring survey from tech employment site Meanwhile, another job resource firm, Robert Half Technology, is projecting salary increases of 5 percent or more for a wide range of IT jobs, from the C-level to database administrators..."
                  The future of work: 4 trends for 2014
                  GIGAOM, December 25th, 2013
                  "I confess that at times I feel whiplash from swinging back and forth from the review of the new release of a tool to broad prognostications about society and culture, but the Oscar Wilde quote at the top is a good backdrop to my feelings about that.

                  This past year has been a time of great change and turbulence in the tools, practices, and thinking around the rapidly shifting world of work. Social technologies have been a key part of that, but practices like remote work - due to Marissa Mayer's decision to drastically curtail it at Yahoo - and new approaches to management occupied as much of the 2013 news hole here at Gigaom Research as the release of new devices and software..."

                  5 IT Hiring Trends In 2014
                  Wall Street & Techology, December 27th, 2013
                  "The New Year is shaping up to be a bright one for technology professionals, according to a new report from job site

                  In a survey of 860 tech-focused hiring managers and recruiters, 73% reported planning to hire more candidates in the next six months, and 24% percent said their additional hiring will be substantial. That's good news for anyone looking to make a change in 2014.

                  But expect the IT landscape to change, too. Here's a look at five predictions on hot skills, evolving roles, and how social media will change recruiting..."

                    IT Pros Won't Get a Break This Christmas
                    CIO Today, December 23rd, 2013
                    "Even the holidays can't provide a brief respite for many hardworking IT professionals. They may be giving up downtime with friends and family to make sure company networks have uptime, according to a survey by Ipswitch. After compiling the data, Ipswitch found that most IT professionals shouldn't expect anything more than Christmas day off..."
                      IT - Virtualization
                      Recapping the World of Server Virtualization in 2013
                      ServerWatch, December 23rd, 2013
                      "2013 is almost over, and it's been quite a year in the server virtualization world. There was plenty of news from VMware, a little from Citrix and Red Hat, and some frozen custard from Microsoft.

                      After a few quiet early months at the start of the year, things got interesting in April with the news that VMware software was to be removed on 10,000 PayPal servers during the summer, Virtually Speaking according to a report in Business Insider. It was to be replaced by software from OpenStack. "PayPal's strategy is to leverage open source products and provide meaningful insight and contribution to help advance the ecosystem," explained a PayPal spokesperson..."

                      IT - Database
                      Cloud computing and database 2014: The trend is your friend
                      GIGAOM, December 26th, 2013
                      "The cloud-computing market faced some unique challenges in 2013, including the fact that moving clouds into production means new and difficult issues, many of which were not initially understood. Enterprises need to understand how to work properly with cloud-computing technology. In 2013 they had to learn how to design applications to take advantage of cloud-native features such as the ability to self- and auto-provision, as well as self- and auto-scale. Enterprises also learned to define strategic architectures that go beyond a single cloud deployment, and figured out an approach and management technology to make the cloud resources all march in the proper directions to provide automation in support of resources governance and DevOps..."
                      Why CIOs will screw things up in 2014
                      GIGAOM, December 22nd, 2013
                      "More evidence is appearing that supports the theme that CIOs are madly out of sync with business needs (see IT leaders are out of sync with the enterprise's new prioritities).

                      Shvetank Shah of CEB confirmed that 70% or more of IT experimentation in the business is done outside of IT, and they try to cast aspersion on this by calling it shadow IT. The reason that more business leaders don't pull in CIOs to their experiments? The IT teams have the wrong mindset, and instead of working with business leaders, they seek to preempt all experimentation by others..."

                        IT - Backup
                        5 Tips to Ensuring a Secure Backup Recovery Solution in 2014
                        MSPmentor, December 27th, 2013
                        "A wide gap still exists between the nature of malware threats and the defense mechanisms some companies use to defend against them, despite warnings from a variety of resources ranging from telcos including Verizon and its 2013 Data Breach Investigation Report, and industry associations such as CompTIA.

                        In fact, earlier this year, Intronis sponsored an IT services industry survey in conjunction with the 2112 Group based on feedback from 350 channel IT companies. One of the most shocking findings was that 44 percent of the group admitted to not proactively selling business continuity and data recovery (BCDR) services to their clients - their strategy is to simply wait for clients to come to them with problems. This is exactly the approach to security and disaster recovery the creators of malicious attacks like the CryptoLocker ransomware virus want you to take..."

                        IT - Mobile
                        What (and what not) to expect in mobile in 2014
                        GIGAOM, December 24th, 2013
                        "We predicted 2013 would be a tremendously eventful year for the mobile industry, and we weren't disappointed: Some major carriers began to move away from handset subsidies and two-year contracts, a small army of new operating systems came to market, and mobile marketing finally began to take off in a big way. And 2014 may be even more tumultuous. As we enter the holidays, then, I offer a few important things to look for in the coming year - and one market to expect very little from..."
                          2013 - The year in mobile
                          Chetan Sharma, December 23rd, 2013
                          "Just like there is no “year of electric cars” or “year of razor blades” or “year of the Greek yogurt,” there is no “year of mobile” or “year of this or that.” However, as we have seen over the 30+ years of mobile evolution, the next year is better than the previous one and so on and so forth. So, 2013 ends in the long tradition and continuum of human endeavor to make significant progress in multiple mobile dimensions and make an impact on individuals and societies alike. 2013 proved that connectivity has become the core of our fabric and we are entering the “connected intelligence era” that will enable the Golden Age of Mobile.

                          In no particular order, here were some highlights of mobile 2013:..."

                            The Rise of Mobile Enterprise Apps
                            CIO Insight, December 27th, 2013
                            "As more businesses operate 24/7 and seek to expand globally, those most likely to succeed will embrace enterprise mobility as a key communications strategy, according to a report by Global Industry Analysts, Inc. The market researcher expects the global market for enterprise mobility solutions to reach $217 billion by 2018. All types of industriesw - from health-care to logistics and transport to manufacturing, distribution wholesale, warehousing and retailw - have adopted enterprise mobility..."
                            IT - Big Data
                            Data Visualization: The Way to Save Big Data From the Naysayers
                            Big Data Republic, December 27th, 2013
                            "As with any business trend, we start off with a huge wave of interest, then we enter a period of hype, which sometimes leads to a crash. With big data, we are at a similar point, where the hype is obscuring the reality. Analyst leader Gartner described big data technologies as nudging the 'peak of inflated expectations' in a recent report.

                            With big data, the question is: 'Will another wave follow close behind?' Well, perhaps. What we can be certain about is that if we become determinedly pragmatic, big data could escape languishing for years on the CIO's desk. If the industry forgot 90% of the noise and concentrated on just one thing -- making big data the powerful driver of useful data visualization -- we might yet ride the incoming waves that are not projected to stop any time soon..."

                            10 Big Data Myths Enterprises Must Come to Terms With
                            eWeek, December 23rd, 2013
                            "The worldwide enterprise software market, growing at a 4 to 5 percent rate year over year, reached a total market size of $342 billion in 2012, according to IDC's Worldwide Semiannual Software Tracker. This huge market, which may edge close to $375 billion this year, is being driven largely by the growth of big data collection and processing..."

                            • Having More Rapidly Accessible Data Is Everything
                            • Siloed Data Can Easily Be Connected Across Business Units
                            • Insights Remain Relevant Indefinitely
                            • Tracking, Measuring All Enterprise Data Sets Is Key to Success
                            • One IT Solution Is the Answer to Big Data
                            • Big Data Transforms Everything and Everyone
                            • Big Data Requires Data Scientists for Any Successful Project
                            • Big Data Is Brand New
                            • Big Data Requires a Big Budget
                            • Big Data Is Clean, Structured Data

                            Read on for details.

                            IT - BYOD
                            BYOD: How To Have It All
                            Business Solutions, December 26th, 2013
                            "Offering choice means you understand that one size doesn't fit all - even when it comes to the technology people can use most comfortably and efficiently. Just as people and their preferences tend to differ, however, bring your own device (BYOD) choices can seem almost endless.

                            Ron Hassanwalia, COO of SOTI, a mobile device management (MDM) provider with more than 10,000 enterprise customers worldwide, says adding MDM to BYOD is the way 'to give choice without sacrifice.' Designing the right solution, though, might take some creativity..."

                            New tech device? Make the most of it
                            ComputerWorld, December 25th, 2013
                            "'Tis the season for giving and receiving new tech devices. But don't stop there -- whether you're the lucky recipient of a new tablet, smartphone or computer, or you provide tech support to someone who is, check out and share these Computerworld stories.

                            We've got tips for the latest OS versions, roundups of excellent apps and key accessories, and advice on how to safely dispose of old devices. Click a link below to skip directly to your chosen topic..."

                            • Android phones and tablets
                            • iPhones and iPads
                            • Smartphones and tablets (general)
                            • Windows 8 computers and tablets
                            • Macs
                            • Laptops and desktops (general)
                            • Safely disposing of old devices

                            Read on for details.

                            Top Ten Articles for last few Issues
                            Vol 190 Issues 1, 2 and 3; Vol 189 Issues 1, 2, 3 and 4; Vol 188 Issue 5
                            We track how frequently each article is viewed on the web site to determine which the readers consider the most important. For last week, the top 10 articles were:

                            • Java Rocks More Than Ever
                            • Oracle Buys Responsys
                            • Become a Better Architect
                            • LibreOffice 4.1.4
                            • Oracle Reports Quarterly Revenues of $9.3 billion; EPS up 5% to 56 Cents
                            • IT-as-a-Service with Oracle VM Enables Higher Business Availability
                            • Oracle Linux Friday Spotlight
                            • Performance Analysis in a Multitenant Cloud Environment
                            • MySQL Notifier 1.1.5
                            • Oracle Exalogic Elastic Cloud X4-2

                            The longer version of this article has list of top ten articles for the last 8 weeks.

                              IT - Tape
                              The year when Google made TAPE cool again...
                              The Register, December 29th, 2013
                              "Tape has pretty much been rescued over the past year by revelations that both Google and Amazon were using tape libraries for data archiving purposes.If these glamorous, bleeding edge online cloud service provider firms used boring old legacy tape then, hey, the stuff must still really be useful.

                              It was a mixed picture though. Tape for archive use strengthened while tape use for backup declined some more.

                              Later in the year, the Santa Clara Consulting Group revealed that the decline in tape media sales had slowed significantly. SpectraLogic announced its Black Pearl technology to have object data stored on tape, the first major access protocol advance for tape in years. Up until this point, object storage, with its disk media bias, had been seen as another attack on tape..."

                              How to Use Distribution Constructor on Solaris 11
                              To customize Solaris 11 bootable images
                              Lingeswaran R, a Unix Architect, writes in the UnixArena blog, "Distribution Constructor is a new term which is introduced in Solaris 11 to customize the Solaris 11 bootable ISO images. These bootable Solaris 11 images can be edited according to the environment.For an example, if you do not want to install some of the default packages from ISO which you have downloaded from oracle website,you can remove it and additional software or third party software can be added on top of the image.So the image is custom, re-distributable ISO or bootable USB image..."
                              Unix: Making ssh connections easier
                              Need a way to make connecting to lots of servers using different settings and usernames easier?
                              Look no further than the ssh config file

                              Sandra Henry-Stocker writes, "I rely on ssh for connecting to dozens of servers. The problem is that my username is often different from one system to the next and I often have trouble remembering which username goes with which system. One easy way to keep them straight is to take advantage of a not-so-obvious SSH feature -- the SSH config file. By creating and configuring a ~/.ssh/config file, you can create a profile for each of the servers that you use and make connecting to those systems quite a bit easier..."

                              Solaris 11.1 STIG update
                              Security Technical Implementation Guide (STIG)
                              Jim Laurent writes, "I am still in the process of creating a Solaris 11.1 Security Technical Implementation Guide (STIG) with DISA Field Security Office. The process is long and detailed requiring significant testing and review by DISA for final approval. The STIG items are complete (pending DISA's approval). While I can't predict how long the final approval will take, if you are a DoD customer wishing to run Solaris 11, you may contact your Oracle systems sales team to receive a draft copy in spreadsheet form.

                              STIGs are guidelines to assist DoD customers in securing their systems. It is NOT required to have a DISA STIG document to run Solaris 11 in your environment. In the absence of a DISA approved STIG, customers may use industry or vendor recommended guidelines. We already have a number of DoD customers running Solaris 11..."

                              Level3 News
                              tw telecom Announces Accelerated Market Expansion
                              Extends Powerful Metro and Regional Fiber Network Across U.S. with 5 New Markets and Expansion of more than a Third of Existing Markets
                              tw telecom inc. announced a multi-market expansion that increases its addressable market by expanding its metro fiber footprint approximately 17%. As part of the expansion, in 2014 the Company expects to enter into five new high-demand markets and accelerate the density of its metro-fiber footprint in 27 existing markets.

                              "Our multi-market expansion will leverage our proven investment model, national network, Ethernet leadership and our powerful and scalable integrated nationwide platform to rapidly rollout products and services across our expanding footprint," said Larissa Herda, tw telecom's Chairman, CEO and President.

                              The Company expects to leverage this market expansion to further deploy its industry-leading portfolio of data and Internet services to more enterprises, including its innovative Ethernet and Intelligent Network services.

                              Trending in
                              Vol 234, Issue 3
                              Trending IT Articles