News about Oracle's Solaris and Sun Hardware
System News
Jan 13th, 2014 — Jan 19th, 2014 Generate the Custom HTML Email for this Issue
System News System News for Sun Users
Volume 191, Issue 3 << Previous Issue | Next Issue >>
Sections in this issue:
click to jump to section

IT - Storage
What's The Difference Between Tiering And Caching?
Storage Switzerland, January 15th, 2014
"Flash storage continues to be the 'go to' option for IT professionals looking to solve performance problems, but these infrastructure designers are struggling with how to best implement flash. Automated tiering and caching are becoming common answers to that question. Instead of IT administrators having to measure the flash worthiness of each data set, the storage system or storage software can now make data placement decisions automatically. While the two terms are often used interchangeably the technologies are not the same and administrators need to be aware of those differences..."
How to Restore Your SSD to Peak Performance
IT News, January 16th, 2014
"Back in the days when mechanical hard drives with spinning platters were the norm, you could simply hand your old hard drive to a deserving relative or friend as an upgrade, get a thank you, and call it a day. It's not so simple with today's solid-state drives.

In many cases, used SSDs simply aren't as fast as newer ones. The biggest issue in retasking, reselling, or even maintaining an SSD for a prolonged period stems from an inconvenient characteristic of NAND flash memory: Previously written cells must be erased before they can be rewritten with new data. If the SSD is forced to reuse cells rather than use new ones while storing data, performance will plummet..."

When and How to Implement an Object Storage Platform
SearchCloudStorage, January 13th, 2014
"When deciding whether to implement an object storage platform into your environment, it makes sense to first outline what kind of data you're storing and how it's typically used. I would suggest you start by answering the following questions:

  • Is it time to develop a genuine content store? In other words, do I need to keep a lot of data online for compliance or other regulatory reasons or for its historical value?

  • Am I dealing with massive amounts of data that is overwhelming my file shares? Does this data become inactive shortly after it is created but stays on primary storage for long periods of time? When I need it, does it need high-speed access or would slower access be OK?

  • Do I use backups as my archives today? Is that causing backup window issues? Are most of my applications disaster recovery (DR) protected with geographic separation? If not, do I want them to be? Do I have a large amount of content that is born static, such as photos or videos, that needs to be kept online for extended periods of time? Does my company have a desire to run serious analytics on this data today or tomorrow?

If "yes" is the answer to most of these questions, then you need to seriously look into object storage..."

IT - Technology
3 Things Enterprise IT can Learn from the 2014 International CES
Network World, January 13th, 2014
"The International CES trade show that inundated Las Vegas and dominated tech headlines last week is no longer called the Consumer Electronics Show, but it's still all about consumer technology. That said, I found plenty of lessons for enterprise networking and technology professionals sprinkled among the more than 150,000 attendees, 3,000 exhibitors, and 2 million square feet of show floor.

Here are the three most important things that jumped out me over four days of blaring sound systems, sore feet, and shrimp cocktail:.."

    3D Printing is IT's Next Big Challenge
    ComputerWorld, January 13th, 2014
    "Is your enterprise evaluating 3D printing? If so, make sure IT is involved in the investigation, even if it's in the preliminary stages. You can't afford to sit this out until a move to 3D starts to look real.

    3D printing is already big, and it's getting bigger. According to the Wohlers Report, worldwide spending on products and services related to 3D printing hit $2.2 billion in 2012, and that figure is predicted to rise to nearly $6 billion in 2017. Rapidly evolving 3D printing technology is changing the way a surprising variety of products are produced. Today, Nike prints football cleats, Choc Creator prints chocolates and Continuum Fashion prints clothing..."

    5 CES Takeaways
    Business 2 Community, January 14th, 2014
    "The annual Consumer Electronics Show in Las Vegas has become the premier forum for new manufacturers to show off their latest technology in order to create buzz for the new year. Over 150,000 people attend the show. One highlight for me was moderating a panel on ways to break through the hype around Second Screen TV and come up with workable, actionable solutions. After spending the past week roaming the CES floor, here are 5 takeaways I came back with as I navigated my way through all of this year's hype:.."
      Virtual Reality: Coming to a Business Near You
      Business 2 Community, January 14th, 2014
      "Modern day console gaming has served up truly entertaining and eye opening experiences for me. Whether learning about the meaning of insanity deep within a lush jungle in Far Cry 3 or looting pirate ships in Assassins Creed IV - Black Flag, the attention to detail and level of immersion is nothing short of astounding. But lately I've had a recurring thought: How cool would it be to actually be inside the game, seeing and controlling your actions as you would in everyday life? If such a technology truly existed, could it also help businesses run better?..."
        The Benefits of Digital Training
        eLearning is considered the 'primary' delivery method of IT training for about 45% of enterprises

        "As the world becomes more and more digital, technology is changing the face of IT education. In the past, students signed up for classes and went to education centers to learn. While today's students can still go to a classroom if they prefer, it's becoming more and more popular to take training on digital devices, including desktops, laptops and tablets. Plus, it's now possible to access lab environments and classroom materials on those same machines..."

          IT - Bitcoin
          Glasgow subway to accept Bitcoins as payment method
          AmongTech, January 13th, 2014
          "Glasgow has recently introduced a new ticket system to ride the subway which has replaced the old fashion tickets and people now use Smartcards to ride the subway.

          A spokeswoman told EveningTimes that 'there are still many things to add to the card, but SPT which is the company responsible for public transport in Scotland and the ones behind the idea of the Smartcard are determined to revolutionize the way we pay for the subway and public transport'..."

            Korea's biggest Bitcoin exchange gets $400,000 from Silicon Valley investors
            The Verge, January 13th, 2014
            "South Korea's first Bitcoin startup, Korbit, has received $400,000 in seed funding from a group of investors. Korbit - which is also Korea's largest Bitcoin exchange, with more than 20,000 registered users - is now profitable after less than a year of operations.

            Korbit's success is notable because of the role the South Korean government played. Korea's Ministry of Science, ICT and Future Planning funded the exchange's participation in the Silicon Valley-based pitching event that spurred much of the investment. The event was judged by Tim Draper, founder of venture capital company DFJ. Draper would go on to lead the $400,000 investment shortly afterwards..."

            How bitcoin makes transactions cheaper
            CoinDesk, January 13th, 2014
            "There are many reasons to be excited about bitcoin: it could enable totally new business and technology models; it resembles the internet in the early ‘90s in the sense that it is a network that no-one owns and everyone can contribute to; it could revolutionise legal concepts of ownership; it could disrupt the payments industry; it could even become a tax haven. It could also flop..."
            Sacramento Kings to accept Bitcoin
            ESPN, January 13th, 2014
            "The Sacramento Kings announced Thursday that they will become the first professional sports franchise to accept Bitcoin virtual currency.

            Beginning on March 1, fans will be able to buy gear in the team store and pay for tickets with the digital money.

            Kings owner Vivek Ranadive says accepting Bitcoin virtual currency is the next step in allowing fans to leave their wallets at home. "When I sold the NBA on keeping the team in Sacramento, my pitch included using the sports franchise as a social network to push the technology envelope," Kings majority owner Vivek Ranadive told "This is an example of that."

            Of Course A Book About Bitcoin Should Be Sold For Bitcoin
            Forbes, January 13th, 2014
            "Last spring, people were getting all excited about Bitcoin because its value surged from a movie ticket to a fancy dinner for two in response primarily to Cypriots freaking out that their money was going to be seized by banks with the permission of their government. All of a sudden the fringe Bitcoin gold bug movement became mainstream and many journalists began writing about what Bitcoin was and why people were so excited about it. My editor challenged me to do this in a more visceral way. Rather than just writing about it, or how to get it, I would live on it for a week..."
            Top 10 Tips and Tricks for Getting the Best Database Performance from Oracle Solaris Systems
            Presentation Available
            Oracle Solaris systems running Oracle Database are ideal for mission-critical database applications requiring high performance, best-in-class availability, and unmatched scalability. This session provides an overview of Oracle Solaris servers' unique capabilities and how to optimize your configuration for the best-possible performance. It presents tuning tips for reliable performance in a consolidated environment as well as insights into tighter integration of Oracle's SPARC hardware and software, which leads to optimal performance.
            MySQL for Visual Studio 1.1.3 GA
            Part of the set of tools available for Windows

            MySQL for Visual Studio is a new product including all of the Visual Studio integration previously available as part of Connector/Net. This is the 1.1.3 GA release of this product and it is a version suitable for production environments. It is compatible with Connector/Net 6.8.3 and it supports MySQL server versions 5.0 to 5.6.

            The MySQL for Visual Studio is included as part of the set of tools available for Windows through the MySQL Windows Installer. It can be downloaded within the full bundled or by using the web installer (MySQL Windows Installer download page).

            Cloud Computing
            Oracle Cloud Adapters Dramatically Simplify Integration Between Cloud and On-Premise Applications
            Oracle Cloud Adapter for Reduces Time, Cost and Complexity of Application Integration Projects
            Organizations need to be able to quickly, easily and efficiently integrate their on-premises business applications with new Software as a Service (SaaS) cloud applications. Addressing this challenge without the complexity of adding a disparate niche cloud integration platform has been a concern. With the introduction of Oracle Cloud Adapter for, Oracle has delivered a single integration platform to unify cloud and on-premises applications.
            Greenball Leverages Oracle Managed Cloud Services
            To Optimize Business Processes and Support Rapid Company Growth
            Greenball Corp., a leading quality tire designer, manufacturer and distributor, is using Oracle Managed Cloud Services to optimize key business processes and support its rapid growth.

            In order to cost effectively meet the operational efficiency demands of the price-sensitive tire distribution industry, Greenball needed a highly robust, scalable and available enterprise application infrastructure that would conserve the resources of its small IT team.

            After a comprehensive evaluation of cloud offerings, Greenball selected Oracle Managed Cloud Services to help modernize its IT environment, improve customer service and reduce operational costs.

            With Oracle Applications Managed Cloud Service, Greenball was able to gain a fully supported and expertly managed Enterprise Resource Planning (ERP) infrastructure that increased visibility into financial processes and supply chain costs, while providing the flexibility to scale with the company's growth.

            What Makes Oracle Linux the Best Platform for Oracle Database 12c
            Oracle products are designed and tested to work together
            Because Oracle products are designed and tested to work together, there are distinct advantages in running Oracle Database servers and applications on an end-to-end Oracle solution stack, especially when that stack includes Oracle Linux For Oracle Database workloads on Oracle Linux, deep testing and integration between the layers brings substantial benefits: fast transaction speeds, scalable performance, and the security and reliability needed to meet strict service level agreements (SLAs). In addition, an end-to-end Oracle stack increases administrative efficiency since there's no need for cross-platform skill sets to manage multiple vendor technologies. And there's the added benefit of a single point of contact - from industry's leading database infrastructure experts - for your most critical service and support issues ...
            IT - Cloud
            The Difference Between Public and Private Cloud
            Business 2 Community, January 15th, 2014
            "Cloud computing is on the rise in the business world for a variety of reasons.More and more businesses are electing to make use of a Private Cloud in order to streamline their business. By making use of this type of feature a business can quickly improve productivity and can ensure quality assurance in the business place.

            The problem is that many business owners are not aware of the difference between a Public Cloud and a Private Cloud. The good news is that understanding the differences is quite simple. The first thing one must understand is that both of these elements work with an external server that is efficient, flexible, and scalable..."

            5 Cloud Tools That Will Help Your Business
            Business 2 Community, January 16th, 2014
            "Cloud computing has been a real game-changer for small businesses. Thanks to the proliferation of this technology, the cost of running your own business today is just a faint fraction of what it used to be a decade or two back. If you are a business owner who is looking to improve your team's efficiency and the overall bottom line, here are some cloud tools that will help you in your endeavor..."
            Dropbox Glitch Makes a Strong Case for Encryption by Default
            InfoWorld, January 14th, 2014
            "Though Dropbox's recent outage wasn't a hack -- rather, it was a glitch during planned maintenance -- that didn't make it any less upsetting for users of the service worried about the security of their files, especially because Dropbox, like most every other consumer cloud storage service, doesn't provide a native, transparent way for users to encrypt files before they're transmitted to the cloud..."
            The Demise Of Nirvanix Shines A Light On The Broken Cloud Model
            CRN, January 6th, 2014
            "The spectacular demise of Nirvanix could one day be a business school case study.

            The provider of cloud storage technology announced its quick death via a Sept. 17, 2013 letter to customers giving them to the end of that month to migrate their data to other clouds, causing a panic as customers and their technology and channel partners scrambled to find an alternative.

            Nirvanix shortly thereafter declared bankruptcy, leaving technology partners such as Equinox, CA, and especially Dell (NSDQ:Dell) trying to recover millions of dollars owed them by the company..."

            IT - CxO
            Pressure for More Agile IT Organizations Grows
            CIO Insight, January 13th, 2014
            "On one hand, IT organizations acknowledge that they are under pressure to deliver applications more rapidly than ever. On the other hand, a new survey of 155 senior IT professionals at Fortune 1000 companies, conducted by Forrester Consulting on behalf of Chef, finds that the majority of IT organizations feel very good about the their ability to deliver IT services. The conundrum is that there may not be enough of an impetus for IT organizations to rapidly modernize their processes by quickly embracing higher levels of IT automation..."
              Foiled! How to Beat Software Vendors' Sneaky Price Increases
              InfoWorld, January 13th, 2014
              "If you think software is getting more expensive, you're right. Not only that, it's getting harder to even find the price hikes, so you can avoid them or know it's time to switch to another vendor's software. It's only natural vendors will pull out all the stops to maximize their revenue. IT organizations need to do the same to maximize the value they get from their tight IT budgets..."
                The Vice that Can Squeeze IS Departments
                IT World Canada, January 13th, 2014
                "Executives want to trim the IT budget but the rest of the company always wants more spending. Here's how a skillful CIO can respond

                I'm fascinated by the paradox that IS department budgets are cut during annual budget-setting exercises precisely when the demand for IT service for mobile apps, social media engagement, better security and improved data quality is going up.

                Executives want the IS budget to go down because it has become such a large percentage of total expenses. But during the rest of the year all business departments want more service than the budget-constrained IS department can possibly deliver.

                The result are small, informal, rogue IS groups that spring up in various business departments which contract for IT services, such as SaaS or cloud, without the involvement of the IS department..."

                How to Get Work Done
                CIO Insight, January 14th, 2014
                "This is the time of year that we think about resolutions, both personal and professional. It's also a time to think about the workplace advice we hear about positioning ourselves for business success in 2014, such as create and communicate high-impact goals; plan, plan, and plan some more; and execute tasks and projects in an efficient and timely manner. This is good and well-intended work advice, but let's face it, you can do all of these things and still not accomplish what you set out to accomplish. Despite the best of intentions, the reality of an average business day has your team facing seemingly endless meetings, multiple workplace interruptions, and changing and often-competing demands. How do you provide leadership and help your workers balance the reality of the present-day office with the need to get their work accomplished?

                Here's my time-tested managerial advice on meetings, collaboration and setting goals..."

                  CIOs Must Prepare for a Digital Future: Gartner
                  eWeek, January 15th, 2014
                  "The majority of CIOs surveyed said they expect more than half of their company's business to be running over public cloud by 2020. Many chief information officers (CIOs) feel overwhelmed by the prospect of building digital leadership while renovating the core of IT infrastructure and capability for the digital future, according to a survey from IT research firm Gartner.

                  While the third era of enterprise IT, digitalization is beginning, the survey results indicated most CIOs do not feel prepared for this next era, with 51 percent of CIOs concerned that the digital torrent is coming faster than they can cope and 42 percent feeling that they don't have the talent needed to face this future..."

                  Get a Closer Look at Oracle Database Appliance
                  See new research note from Nucleus Research
                  Margaret Hamburger writes, "A new research note from Nucleus Research takes a closer look at the specific experiences of Oracle Database Appliance customers currently using the appliance to support business-critical data and transactions.

                  Nucleus's initial assessment of the Oracle Database Appliance found that companies could typically avoid 30 to 40 percent of the hardware expense needed to build a comparable platform, while accelerating time to value and increasing business flexibility.

                  In this research, customers exceeded their expectations with these amazing business results:..."

                  • Accelerated monthly billing processes by 5 times
                  • Reduced time to complete upgrades by 80 percent
                  • Reduced support staff requirements by 60 percent
                  • Avoided an 80 percent increase in 3-year software and hardware costs
                  • Increased flexibility for future growth
                  • Accelerated time to production by 50 times
                  • Increased administrator productivity through reduced management and monitoring time
                  • Accelerated revenue capture from new customers

                  Nucleus Research research note.

                  Yodlee Supports International Growth with the Oracle Database Appliance
                  Leading Financial Platform Provider Meets International Data Regulations and Supports Growing Customer Base
                  Oracle announced Yodlee, the platform for global financial innovation, is successfully using the Oracle Database Appliance to support its international growth requirements.

                  With more than 800 customers and 50 million users of Yodlee-powered services across 10 different countries using its financial platform, Yodlee needed a data management solution to help meet its expanding customer base and international privacy and regulatory requirements.

                  The company looked at more than 15 architecture solutions and tested five for cost, performance and scalability, ease of management, and security. With results in all four categories that beat all other alternatives during a six month proof of concept, including a 20 percent increase in application transactions per second and an 11 percent improvement in average page view response time, Yodlee decided to implement the Oracle Database Appliance.

                  An Oracle Engineered System, Oracle Database Appliance comes complete with out-of-the-box software, hardware, database, and storage engineered for speed and simplicity. Leveraging it, Yodlee achieved 50 percent reduction in CapEx and 10 percent faster performance.

                  Additionally, with its unique capacity-on-demand licensing model, the Oracle Database Appliance offers the company a scalable environment for future growth, including planned implementation in two additional international data centers.

                  IT - DR
                  Disaster Recovery in the cloud
                  IT Web, January 15th, 2014
                  "Cloud computing makes disaster recovery (DR) more cost-effective and lowers the bar for enterprises to deploy comprehensive DR plans. So says Graham Vorster, head of emerging technologies and alliances at T-Systems in SA. "Depending on the implementation of the source systems, DR into the cloud can be as easy as replicating log files onto a database instance with low processing capability, which scales up in the event of a disaster. More complex solutions do require more work, but most requirements can be satisfied," says Vorster.

                  "Enterprise resource planning (ERP) and other entire company systems are mirrored in the cloud for enhanced redundancy and recovery capability," he adds.

                  IT - PM
                  Let Them See You Sweat
                  InformationWeek, January 9th, 2014
                  "Never let them see you sweat? This antiquated leadership rule must go. This is the year I'm letting go of a leadership commandment that smart people have preached to me for decades: Never let them see you sweat.

                  Inspiration? Yes. Motivation? Hell, yes, share it. Perspiration? Never, I was taught. Never, ever. Especially not if you're a woman. If people see you worrying, you'll be branded a nervous Nellie. That term conjures images of a woman lying on a daybed, sipping tea, and frowning while trying to avoid a breakdown. No one would see me sweat.

                  Then I survived the fall of 2013, when my group went through the most intense three-month change management project that I've ever experienced, as we re-launched with a new design and on a new platform. I had an endless to-do list, ambitious goals, and a team of people depending on me. If I messed up, the blame would fall on me and several close colleagues. I wasn't going to let that happen..."

                  IT - Networks
                  14 Questions to Ask SDN Vendors Before Investing
                  SearchSDN, January 8th, 2014
                  "SDN is a new technology with an array of offerings and possible use cases, so shopping for an SDN product suite is a challenging task.

                  Buyers must start by assessing what each SDN vendor offers -- and this can vary radically. Some SDN vendors offer a traditional approach to SDN that separates data and control planes from the physical network and uses a centralized controller to direct forwarding paths. Others offer software overlays with hypervisors or virtual switches that control the virtual network. Still, others are not proposing SDN at all, but are touting virtual appliances that could play a role in network programmability..."

                  Remote Access Security: What is ABAC and Can It Protect My Network?
                  SearchNetworking, January 13th, 2014
                  "Internal corporate networks are a lot like bank vaults. The information contained within them can be highly valuable and a prime target for criminals. Many modern-day bank vaults require two separate keys possessed by two different individuals in order to be opened. The idea here is that if one of those individuals is compromised or if one of the keys is stolen, thieves still won't be able to get their hands on your valuables.

                  When it comes to remote access security best practices, the same approach is being taken at corporate networks. For a long time, role-based access control (RBAC) has been used to grant remote access to data stored on corporate servers. User roles, defined in a specific database, dictate what an employee can access remotely. This approach helps to reduce the risk of cyber-breaches when mobile endpoints or unsecured networks are used by employees to connect with corporate servers..."

                  IT - Operations
                  NSA Data Center to Be Cooled by Wastewater
                  GCN, January 10th, 2014
                  "In a move anticipated to save money and mitigate the environmental impact of its new Maryland-based data center, the National Security Agency will be using wastewater to cool its servers at the facility in Fort Meade.

                  Up to five million gallons a day of treated wastewater, also known as graywater, will be used for cooling systems at the data center, due to open in 2016, reported Matthew Hay Brown of The Baltimore Sun...."

                  Software Robots are Taking Over the Data Center!
                  ComputerWorld, January 15th, 2014
                  "By now, you're probably familiar with IT's new business mindset: that of a highly efficient service provider. Cloud services, consumerization and BYOD are just a few of the business-driven topics that are currently generating buzz.

                  However, another major trend has begun to silently transform the data center by providing IT equipment with an intelligence all its own. It turns out that, in order to truly modernize IT, your application servers, networks, data storage systems, and even end-user devices must live intelligently - often, independently.

                  What do I mean by that? Read on..."

                  The World's Coolest, Greenest Data Centers
                  Network World, January 13th, 2014
                  "Power efficiency is the driver for new data centers. It has some of the world's largest providers scrambling north and toward the shore in order to take advantage of naturally cool air and water that can siphon off the enormous amounts of heat their gigantic computing centers generate. They are also exploring more environmentally friendly power sources such as hydro-electric, solar and fuel cell in order to reduce their carbon footprints. Here are 10 notable examples from around the world..."
                    What Should You do with Old Servers and Outdated Data Center Equipment?
                    SearchDataCenter, January 13th, 2014
                    "For problems encountered when renovating data center facilities to choosing between reducing, reusing or recycling assets, SearchDataCenter offers guidance on the process. We've gathered several helpful tips into this list of frequently asked questions about old servers and data center overhauls.

                    • Are newer, high-density servers too much for older rack cooling technology?
                    • Which is better for your data center: DC or AC power?
                    • How do you prevent cable damage in a data center?
                    • What are your options to recycle old servers?
                    • How do you securely remove data when you donate servers?

                    Read on for details.

                      IT - Security
                      Metadata has had .Minimal' Effect on Catching Terrorists: Report
                      IT World Canada, January 13th, 2014
                      "Law enforcement and intelligence agencies can't get enough information - especially if governments are squeezing them for results.

                      So it is that the U.S. National Intelligence Agency, among other electronic spy agencies, insists it has to have access to communications metadata to do their jobs.

                      But a report Monday from the New America Foundation casts doubt on how valuable the information is..."

                        Nanotechnology Holds Promise for Security Applications
                        Security InfoWatch, January 13th, 2014
                        "The world today is seemingly filled with multiple threats from every direction and of every type; physical damage caused by fire or water, natural events like seismic activity or floods, disruption of essential services like electricity or communication, and compromise or loss of information. In most cases, it is obvious that damage has been done. Computers may no longer be operative, physical structures may be destroyed and communication systems may not work. However, in the case of the more insidious harm that may be caused by chemical, biochemical, radiological or disease-causing agents, it may be some time before overt effects can be detected..."
                          RIP, Information Security, Done In by Backdoors and Secret Deals
                          InfoWorld, January 13th, 2014
                          "Another day, another revelation about massive government data collection on citizens domestic and abroad, including (but not limited to) phone calls, Internet transactions, backdoors in encryption algorithms, man-in-the-middle attacks. Heck, for all we know, the NSA is probably behind the BGP hijacking that's been happening sporadically. Now we've learned that the NSA has been paying information technology vendors for backdoors.

                          In all of the tech press talking about new operating systems, new hardware, new processors, as well as advancements in storage, networking, and even security, this is the elephant in the room: Under no circumstances can we trust a piece of network hardware or software again, unless the code is available for inspection from stem to stern. From the code on the ASICs to the BIOS, OS, and the application itself, we need to see it. Every iota of trust has vanished..."

                          Top 7 Security Concerns for 2014
                          Help Net Security, January 13th, 2014
                          "AhnLab announced its 'Top 7 Security Concerns for 2014' Because AhnLab is immersed in the cyber trenches and the cloud, its team is very experienced monitoring trends and keeping tabs on what is being developed by cybercriminals worldwide..."

                          • Malware targeting end users will grow more sophisticated, just like the ones used in APT-type of attacks
                          • Hardware-based malware distribution will increase
                          • Acceleration of industrialization of online banking fraud and cybercrime
                          • Attackers will find easier ways to distribute malware
                          • Increased probability of encountering malware, as Microsoft stops the support of Windows XP
                          • Targeted mobile malicious app will appear
                          • Cyber warfare will become more visible and intense

                          Read on for details.

                          IT - Careers
                          Do Good Manners Still Matter on the Job?
                          TLNT, January 14th, 2014
                          "Good manners will open doors that the best education cannot," according to Supreme Court Justice Clarence Thomas.

                          "In a culture where many seemingly have no time for courtesy, minding your manners when others have forgotten theirs can get you a job, a promotion, or a date.

                          Manners make the man - or the woman - distinctive, memorable. Yet, I encounter and hear complaints about these workplace faux pas weekly:

                          • Failure to respond on RSVPs;
                          • Improper introductions;
                          • Late arrivals to conference calls and meetings;
                          • Late thank-you calls or notes;
                          • Unreturned calls or emails;
                          • Inattention when people speak to you.

                          "So here are a few reminders:..."

                            Top 5 Trends to Watch in 2014
                            Business 2 Community, January 13th, 2014
                            "Every week we bring you the FreshMinds Friday picks - ideas to help you make the most of digital technologies and understand how they are helping brands to grow and innovate. This week we're looking at the top 5 trends to watch in 2014 including the collaborative economy, wearable tech, personalisation, consumer privacy concerns and adopting lean start-up principles..."
                              IT - Virtualization
                              Preparing Your Checklist for a Flawless Hypervisor Switch
                              SearchServerVirtualization, January 13th, 2014
                              "There many reasons why an organization might choose to switch to a different hypervisor. The new hypervisor might offer better functionality or a more attractive licensing model, but whatever the reason, migrating is rarely a simple matter. There are several important questions to consider before you begin the transition process and make a hypervisor switch..."
                                IT - Compliance
                                3 Best Practices for Regulatory Compliance
                                Bank Systems and Technology, January 13th, 2014
                                "Since the financial crisis, banks have had to navigate a more complex regulatory environment than ever before. The sweeping Dodd-Frank Wall Street Reform and Consumer Protection Act was designed to prevent another such collapse, and in the process added many more compliance statutes banks have had to meet. Additionally, in 2009 the Federal Reserve began issuing its Supervisory Capital Assessment Program, and the subsequent annual Comprehensive Capital Assessment Review tests..."
                                  Compliance is Hot -- Why Hiring is On the Upswing
                                  The FCPA Blog, January 13th, 2014
                                  "If 2013 and the last two weeks have shown us anything, the rollout of regulation and pace of enforcement actions related to corporate wrongdoing are not showing signs of slowing. In corresponding fashion, is the hiring of professionals dedicated to creating and monitoring corporate compliance policies and procedures on the upswing?

                                  Turns out, yes..."

                                  IT - Email
                                  Net Neutrality: We Need a Hero, from the Unlikeliest of Places
                                  InfoWorld, January 15th, 2014
                                  "The Federal Circuit Court of Appeals in Washington, D.C., threw out the FCC's Net neutrality rules yesterday, ruling that the FCC lacked the authority to enforce those rules. Also known as the open Internet rules, Net neutrality forbids landline carriers from favoring content or services from any provider, as well as from penalizing content from any provider. Carriers, led by Verizon, want the ability to steer customers to or away from providers based on their business relationships and own services, such as to throttle or block Netflix in favor of their own TV services -- what my colleague Bill Snyder calls 'Web pay-per-view'..."
                                  Securing Email Attachments: File Transfer Trends for 2014 - See more at:
                                  eWeek, January 13th, 2014
                                  "Despite the huge impact in the last five years of social networks, video conferencing and texting, email is still the killer app for most enterprise communication infrastructures. Email has also served as the main load-bearer for attached documents' de facto file transport system for most organizations, a role it was never intended to play. As a result, large file transfers sent through email often impede efficient email server performance, resulting in slow message delivery times, higher storage costs, slower backups and slower restores. If file-size limitations prevent users from sending particularly large files through email, they will find alternative methods to send their content, which could drive up cost and sacrifice security..."
                                  IT - Database
                                  Fear of Data Sharing on the Rise
                                  Help Net Security, January 10th, 2014
                                  "U.S. consumer attitudes and behavior related both to data sharing and social media oversharing have shifted significantly just within the last two years, according to a new study by McCann Worldgroup.

                                  This "pendulum swing" is occurring across the board generationally, but is most pronounced among teens, whose "migration" across social media channels reflects growing concerns about bullying in addition to evolving opinions about what's cool or not.

                                  Research found the following striking changes over the last two years:..."

                                    Why Columnar Database Technology Should Matter to IT
                                    SearchDataCenter, January 13th, 2014
                                    "Effective use of a columnar database will have a significant impact on the business's top line and IT's bottom line.

                                    If you aren't using columnar databases appropriately, you aren't getting the best price/performance out of your data -- not even close, in most cases. Columnar database technology lets you go deeper in big data analytics, speeds up enterprise reporting and cuts down on the number of administrators needed for storage..."

                                    IT - Backup
                                    How Tape Can Fix The Unstructured Backup Problem
                                    Storage Switzerland, January 13th, 2014
                                    "The fastest growing data set in just about every organization today, and typically the largest, is unstructured data. This is data that's outside of a database; essentially file data, stored on file servers or Network Attached Storage (NAS) systems. The unprecedented growth of unstructured data combined with its increased importance has created an overwhelming data protection challenge that is crippling most backup processes..."
                                    Top Backup Takeaways from 2013
                                    Storage Switzerland, January 13th, 2014
                                    "As we usher in 2014, industry prognosticators are publishing their predictions about what will be the hot trends in the New Year. While backup technology may not be towards the top of this list, there were some interesting developments that took place in the world of enterprise backup in 2013 that are worthy of review...

                                    • Virtualized Backup Image Recovery
                                    • Backup Appliances Moving Beyond Backup
                                    • Backup 'Copy' Data Continues To Move Upstream
                                    • Recovery Based Licensing Could Portend A New Trend
                                    • Backup Data In The Cloud Needs a Back Door

                                    Read on for details.

                                      IT - Big Data
                                      Big Data Takes a Bite Out of Credit Card Bust-Out Fraud
                                      SearchCIO, January 13th, 2014
                                      "Fraud is a headache, no doubt about it, but some types of fraud are a bigger headache for financial institutions than others. Take credit card bust-out fraud. That's when fraudsters create a bunch of identities, open up new accounts and buy stuff to drive up the lines of credit before maxing out the cards and disappearing..."

                                      "If you're really crafty, you'll write fake checks to clear off the [credit card] balance because [financial institutions] will zero your balance before they clear a check, and then you max out the cards a second time," Ari Gesher, software engineer for Palo Alto, Calif.-based Palantir Technologies Inc., said during a webinar on data, crime and conflict hosted by O'Reilly Media.

                                        Getting in the Big-Data Game
                                        Federal Computer Week, January 14th, 2014
                                        "Every day, people, machines, sensors and systems produce more data than they did the day before.

                                        The rapid growth of available information presents opportunities for the U.S. government -- the largest holder of information in the world -- but getting into the big-data game poses serious challenges for individual agencies.

                                        Understanding those challenges is essential for agency employees to successfully make the case for big-data programs and ultimately succeed in any big-data initiatives, said Rajib Roy, president of Equifax Identity and Fraud Solutions..."

                                          It's Coin-Flip Time in the Human vs. Data Debate
                                          Big Data Republic, January 9th, 2014
                                          "In the discussions over human intuition versus analytics, I'm just so confused. Both sides make sense, and I feel as if I'm caught in a revolving door, indoors, now outdoors, indoors again. I suppose there's a middle ground, but in a revolving door that leaves staring at nothing but glass.

                                          When do we trust human intuition to make business decisions? When should data speak volumes?

                                          Well, the Harvard Business Review isn't helping me get through my dilemma. In one article a respected expert says that great analytics are often born of intuition. Yet, another expert says that even in a noisy, real-world environment intuition holds no real edge over analytics..."

                                          IT - Mobile
                                          3 Mobile Marketing Trends for 2014
                                          CIO Today, January 13th, 2014
                                          "2013 was the year of BYOD. Mobility and productivity were at the fore of discussions from corporate America to entrepreneurs and companies of all sizes. So what's in store for 2014 on the mobility front?

                                          Thomas Husson, a vice president and principal analyst at market research firm Forrester Research, is making some keen predictions about mobile Relevant Products/Services trends for marketers. While he admits that his mobile trend predictions for 2013 are still evolving -- making them still relevant for 2014 -- he has some new thoughts worth exploring..."

                                          CES To CIOs: Watch Out for Wearable Technology
                                          SearchCIO, January 13th, 2014
                                          "Not all of the smart machines are going to take our jobs. Some might actually make our lives better and improve how we do our jobs. And unlike those pesky employment snatchers, we're going to invite them into our personal space -- clutching our wrists and perched on our heads. The real world hasn't yet been saturated with wearable technology, but rest assured -- it's coming..."
                                            The 5 Critical Lessons CES Taught Us about Wearable Tech
                                            IT World, January 9th, 2014
                                            "If you begin to see smartwatches dangling from tree branches, and activity-tracking wrist bands collecting in rain gutters, then you can thank the Consumer Electronics Show for belching out something akin to a pyroclastic flow of wearable tech over half the earth's surface.

                                            Every CES needs a pre-packaged narrative, and this year the hardware industry decided wearable tech should dominate the script. Wearables are novel. They're visual. And manufacturers are juicing the category with R&D and capital, so we need to scrutinize the hell out of wearables, and figure out exactly how and where they fit into our lives.

                                            I'm leaving CES with five key takeaways..."

                                              Understanding Mobile Security Pressure Points and Vulnerabilities
                                              Help Net Security, January 14th, 2014
                                              "41 percent of the government employees who used the assessment tool are putting themselves and their agencies at risk with existing mobile device habits, according to a Mobile Work Exchange report.

                                              The report notes that 90 percent of government employee respondents use at least one mobile device - laptop, smartphone, and/or tablet - for work purposes. Many government respondents are taking basic steps to secure agency data. Eighty-six percent lock their computer when away from their desk; additionally, 86 percent have a safe and alternative workplace compatible for work, and 78 percent always store files in a secure location..."

                                                IT - BYOD
                                                3 Things to Consider When Deciding If BYOD is Right for You
                                                Business 2 Community, January 12nd, 2014
                                                "The business and IT world continues to trend into a 'Bring Your Own Device' future, where the company furnish computer and mobile hardware for their employees. However, just because Gartner predicts that 50 percent of the workplaces in 2017 will have BYOD requirements for employees doesn't mean you have to jump on board immediately. When you're a small business owner writing a BYOD policy, you have to consider more than just the cost benefits.

                                                Concerns such as device damage liability, data security and network security need to be considered as well..."

                                                Secret to BYOD: Make Security an Enabler
                                                GCN, January 10th, 2014
                                                "When it comes to IT security, data is the crown jewel. This is not to say that networks and other systems are not important. A compromise anywhere could expose resources in your enterprise to manipulation or theft. But it is the data your systems store and use that are the most valuable targets. This is why mobile computing and BYOD are problematic. How do you protect your data when it is being accessed by and used on devices outside your control? The immediate reaction to this challenge is to forbid access, but that can be counterproductive, warns Alexander Watson, director of security research at Websense..."

                                                'People will find a way around things that stop them from getting their jobs done,' says Watson.

                                                Top Ten Articles for last few Issues
                                                Vol 191 Issues 1 and 2; Vol 190 Issues 1, 2, 3 and 4; Vol 189 Issues 3 and 4
                                                We track how frequently each article is viewed on the web site to determine which the readers consider the most important. For last week, the top 10 articles were:

                                                • Larry Ellison and Mark Hurd Emphasize Oracle's Cloud Growth
                                                • Oracle Linux: Free as in Speech AND Free as in Beer
                                                • Oracle Buys Corente
                                                • The Top 10 Strategic CIO Issues For 2014
                                                • How to Configure x86 Memory Performance for Large Databases
                                                • WebLogic in Comparison: RebelLabs Java Servers Report
                                                • Interview with Authors of 'NetBeans Platform for Beginners'
                                                • 8 Predictions for Customer Service in 2014
                                                • OTech Magazine - Winter 2014
                                                • Securing Oracle Database 12c: A Technical Primer eBook

                                                The longer version of this article has list of top ten articles for the last 8 weeks.

                                                  IT - Encryption
                                                  New Fujitsu Labs Tech can do Batch Searches of Encrypted Data
                                                  IT News, January 16th, 2014
                                                  "If snooping by the U.S. National Security Agency isn't enough to make you worry about your privacy, Japan's Fujitsu Laboratories has developed a fast method to perform secret searches of data that is encrypted.

                                                  The technology makes use of homomorphic encryption, which allows for operations to be performed on encrypted data without having to decrypt it.

                                                  Fujitsu developed a batch search method that can rifle through 16,000 characters per second using any search term without the need for pre-registering keywords..."

                                                  Life Sciences Platform on the NetBeans Platform
                                                  GenBeans is a tool for DNA sequence analysis
                                                  Geertjan writes, "GenBeans is a tool for DNA sequence analysis created in San Diego, California, for molecular biologists. Research scientists working with DNA molecules face the dilemma of manipulating DNA sequences, often represented as simple text strings, and integrating vast amounts of sequence-dependent features at the same time. For genome-wide analysis, both are rather unchangeable static entities that can be easily represented together.

                                                  On the other hand, sequence editing is complicated by an ever-changing set of features, some wanted, some desirable, some not. Design errors may translate in months of work. A fascinating aspect, from that point of view, of NetBeans IDE is its language support with its automatic annotation as you type and rich set of meta-information because DNA sequence is comparable to a language where features and motifs are the words, it is interesting to approach DNA sequence editing & analysis in the same way NetBeans IDE handles programming languages..."

                                                  Trending in
                                                  Vol 235, Issue 2
                                                  Trending IT Articles