News about Oracle's Solaris and Sun Hardware
System News
Jan 20th, 2014 — Jan 26th, 2014 Generate the Custom HTML Email for this Issue
System News System News for Sun Users
Volume 191, Issue 4 << Previous Issue | Next Issue >>
Sections in this issue:
click to jump to section

Tutorials Introducing Big Data
5 to 10 minute tutorials with Marty Gubar, Director Product Manager, Oracle Big Data
Here are some direct links to access a good set of ~ 5 to 10 minute tutorials about 'Big Data' to introduce some of the software stack and to help you identify which is the right tool for a job:

For more information, visit:

KDDI Selects Oracle SuperCluster to Strengthen Authentication System for Mobile Core Network and Support Rapid Data Growth
Communications Leader to Consolidate Legacy Infrastructure on Oracle SuperCluster
KDDI Corporation has selected Oracle SuperCluster, Oracle's fastest engineered system, to help strengthen the authentication system for its mobile core network.

KDDI's mobile communication service has 40 million subscribers as of September 2013, and the company has seen a rapid increase in smartphone users and adoption of its 'au 4G LTE' next-gen high-speed service in the last year. With increased demand for data transactions and traffic, KDDI wants to strengthen its authentication system for managing subscriber information and connectivity information for smartphone and mobile phone users.

KDDI uses Oracle SuperCluster running Oracle Solaris and Oracle VM Server for SPARC with Oracle TimesTen In-Memory Database. The company chose the engineered system based on the following benefits for its mobile core network authentication system:

  • 40:1 consolidation: KDDI is consolidating 40 existing enterprise servers onto a single Oracle SuperCluster, which it expects will reduce its data center footprint by 83 percent and power consumption by 70 percent.

  • Improved System Performance and Availability: Four Oracle SuperCluster systems will help significantly improve overall system performance, and enable KDDI to scale to accommodate future growth.

  • Flexible Expansion and Resource Allocation: Using Oracle VM Server for SPARC, KDDI can reallocate resources and more easily add capacity as business demand grows. This virtualization technology also allows sub-capacity licensing of Oracle software on Oracle SuperCluster, which can dramatically lower Oracle middleware, database and application software license costs.

The project utilized the Oracle Solution Center, Oracle Japan's validation center, to jointly conduct performance and functionality validation with ITOCHU Techno-Solutions Corporation (CTC). KDDI purchased Oracle SuperCluster in July 2013.

Oracle Unveils Big Iron with New SPARC M6 Processors
32 Tb of system memory and up to 384 processor cores with 8-threads per core
"With Oracle's new SPARC M6-32 systems, customers can now run entire applications in memory. Based on the SPARC M6 12-core processor, these systems have a staggering 32 terabytes of system memory and up to 384 processor cores with 8-threads per core. The SPARC M6-32 provides twice the memory capacity of IBM Power servers and delivers extreme in-memory compute performance for large-scale, mission-critical workloads and databases. And it offers the highest levels of system availability for core business applications..."
Webcast: Oracle's Most Powerful Engineered System: Oracle SuperCluster M6-32
Very Large SMP System - 32 Processors, 384 Cores, 3,072 Threads
Ultimate Database In-Memory Performance, Platform as a Service, and Consolidation System

The new Oracle SuperCluster M6-32 offers unprecedented in-memory database and application performance with the highest levels of availability, scalability, and reliability of any engineered system. Combining Oracle Exadata Storage Server technology, Oracle's SPARC microprocessors, silicon network, highly secure virtualization, out-of-the-box platform as a service and database as a service management, Oracle SuperCluster M6-32 is the best example of Oracle's engineered systems vision thus far.

Watch this webcast and learn how Oracle SuperCluster M6-32 can help you:

  • Increase performance by 10x to 20x over the performance of standard systems for new in-memory applications, legacy applications, and Oracle Database utilizing:
  • Up to 384 microprocessor cores and 32 terabytes of high-performance memory in the most powerful and flexible system design Oracle has ever developed
  • A complete set of Oracle Exadata technology for optimal Oracle Database performance and efficiency
  • Realize rich multi-tenancy with near-zero overhead virtualization
  • Implement platform as a service and database as service management out of the box

Register for this webcast replay.

NTT Communications Leverages Oracle's Engineered Systems and In-Memory Products
Provides Customers with Real Time, Predictive Monitoring of Network Services
Oracle announced that NTT Communications Corporation, the long-distance, international communications and ICT solution provider, successfully deployed a real-time network monitoring system based on Oracle Exalogic Elastic Cloud and Oracle Exadata Database Machine, part of Oracle's Engineered Systems, as well as Oracle Coherence and Oracle Event Processing part of Oracle's in-memory products in May 2013.

NTT Communications Corporation selected the Oracle products to help improve the quality of its network services, increase predictive failure detection and maximize workload efficiency. Because Oracle Engineered Systems are pre-configured, pre-optimized hardware and software, it was possible for NTT Communications to go live with their new system in five months.

Oracle Exalogic, Oracle Coherence, Oracle WebLogic Server and Oracle Event Processing work as the core engine for real-time network traffic processing. Oracle WebLogic Server and Oracle Coherence also help to maximize application performance and scalability and improve system response time. Oracle Application Development Framework was used to create the dashboard screens for visualizing the real time network status and Oracle Exadata is used as the Big Data management infrastructure at the backend.

The new system is able to process 1.4 million packets per second through in-memory streaming, and as a result, it can provide not only predictive failure detection, but also early alerts for unusual network situations. Some actions have also been automated, resulting in greater efficiency and significant annual cost reductions.

Friday Spotlight: 10 Oracle VM Myths from 2013 Debunked
By Chris Kawalek
Chris writes, "Reflecting on 2013, we thought we'd do a summary of the many myths that were debunked in 2013. Here are the top 10:"

  • Oracle VM has no benchmarks
  • Oracle VM is not for serious enterprise applications
  • Complicated to deploy
  • Limited Enterprise Use
  • No complimentary tools for private cloud deployment
  • Oracle VM is expensive
  • A "me too" hypervisor
  • Oracle VM is only used in Test environments
  • Not ready for Oracle Database
  • No partner ecosystem

Read on for details.

IT - Storage
What's in Store for Storage in 2014, January 21st, 2014
"With the start of the new year, it's time once again for those of us in enterprise storage to look ahead and offer our predictions for what the industry will see in 2014.

So without further ado, here are ten trends that will have a big impact in the coming year:..."

    The Myth Of The Supersonic Disk Drive
    Network Computing, January 20th, 2014
    "Over the past few weeks, I've heard folks promoting solid-state storage solutions and repeating the myth that spinning disks haven't gotten faster than 15K RPM because it would mean that the airflow over the heads would become supersonic. While it's a good story, and the thought of little tiny sonic booms inside a disk drive is amusing, there's very little truth to the story..."
      IT - Technology
      Your guide to InfoWorld's best tech of the year
      InfoWorld, January 20th, 2014
      "The Technology of the Year Awards is InfoWorld's most important article of the year. It's the living, breathing manifestation of InfoWorld's dual mission: To call out the best new enterprise technologies and deliver deep tech analysis, written in plain English, by thought leaders who possess meaningful hands-on experience.

      In our 2014 edition of Technology of the Year, we've served up 35 of the best products we evaluated, with links to original product reviews for those on the cusp of purchasing anything from specialized data center hardware to programming tools and frameworks. If you know enterprise tech, it's pretty stunning to see all that innovation lined up end to end..."

      Your ultimate mobile office: The tools you need to work on any device
      PCWorld, January 24th, 2014
      "Whether work follows you out of the office or your office is wherever you happen to be, you can't be tied down. You need to edit documents, access files, track projects, and more, from your laptop or from any major flavor of mobile device. Here are the tools anyone needs to get work done anywhere..."
        How Wearable Tech Will Change the Smartphone as You Know It
        CIO, January 23rd, 2014
        "The majority of wearable gadgets today are smartphone companion devices, designed to mostly work along with your phone and serve as a secondary display for your handset. The current popularity of smartwatches, smartglasses and other wearable gadgetry raises a number of intriguing questions about how these newfangled gizmos will affect the smartphones in so many of our pockets and purses..."
          IT - Bitcoin
          Canadian Economic Institute Has High Hopes for Bitcoin
          CoinDesk, January 21st, 2014
          "Could bitcoin reinvigorate Canada's creaking payment system? A prestigious Canadian economics institute has released a report suggesting that bitcoin could become a 'common currency' and reduce payment costs, if only regulators would provide clarity. It unveiled the report just as the Canadian government declared that bitcoin wasn't legal tender..."
          Bitcoin Has Arrived in Vegas, But It's Still Far From Mainstream
          Wired, January 23rd, 2014
          "In 1906, it installed the first Las Vegas telephone. In 1959, it served the first Las Vegas shrimp cocktail. And now, the Golden Gate Hotel and Casino is pushing Las Vegas into yet another brave new world: bitcoin.

          The Golden Gate and its sister casino, The D Las Vegas, are now accepting payments in the increasingly popular digital currency. It's one more milestone for bitcoin, which has also reached its first major online retailer and its first pro sports team. But there's a catch. The two Vegas hotels are not yet accepting the digital currency on the casino floor, only at their front desks and inside hotel restaurants and gift shops..."

          The Economics of Trust: Bob Geldof, Aid and Remittance
          CoinDesk, January 21st, 2014
          "Yesterday, the Huffington Post reported on Sir Bob Geldof's recent response to Russell Brand's call for a revolution, in which Geldof claimed 'bitcoin is a nice idea but it simply won't work'

          Geldof's criticism wasn't based on his ignorance of the technology per se, or ignorance of economics in general, as Max Keiser suggested, but rather was an attack on monetary systems generally.

          According to the Huffington Post he 'blamed the failure of capitalism on the banks going 'out of control' and due to human greed, inventing 'completely spurious' financial products'

          The Future of Bitcoin: Corporate Mines and Network Peering?
          Data Center Knowledge, January 24th, 2014
          "What's the end game of the Bitcoin mining arms race? Miners are building ever-more powerful hardware and larger data centers, trying to stay a step ahead of their rivals and keep pace with 'the difficulty' - algorithm changes that make it progressively harder to earn new bitcoins.

          Some Bitcoin watchers believe the network will ultimately shift from mining for new coins to a model based on transaction fees, which could accelerate a shift of Bitcoin hardware into data centers and the creation of peering networks to manage fees, just as current peering agreements seek to reduce network transit costs..."

          Miami Bitcoin Conference Day 1: Crime, Krugman, and BitLicenses
          CoinDesk, January 26th, 2014
          "The temperate winter climate of Miami, Florida is serving as a pleasing backdrop for the numerous attendees of the North American Bitcoin Conference.

          The symposium, being held at the Miami Beach Convention Center this weekend, brought a huge crowd. Many of the talks were held with all seats full.

          In the afternoon, the second hall, used in the morning for merchant vendor workshops, was used as an additional seating area with the speakers being broadcasted on a large video screen.

          Here are some highlights from Day One of the conference..."

          How to Identify Solaris Processor Cores
          Lingeswaran R writes,"For hardware inventory, we may need to provide the Processor details like number installed physical processors , number core per processor on Solaris SPARC and X86 system.

          SunMicro system doesn't make any complication to identify the CPU information on Solaris Operating system.To list the physical processor and core,we have the binary called "prsinfo" to pull the information. We can also look at the prtidag command to identify number of physical processors and cores. Here we will see some examples..."

          Cloud Computing
          Oracle Managed Cloud Services Enable Bellevue University to Cost Effectively Increase Educational Opportunities for its Students
          University Leverages Oracle Applications Managed Cloud Service to Meet the Needs of Current and Future Students
          In order to cost effectively increase opportunities for students while complying with state and federal government regulations, educational institutions face unique business challenges. To address these challenges, Bellevue University selected Oracle Managed Cloud Services to help meet current and potential student needs and reduce technology maintenance costs.

          Having its applications deployed in a private cloud that's fully managed by Oracle, has allowed Bellevue to increase educational opportunities for both on-campus and remote students and benefit from a robust,cost-effective, secure and highly available enterprise application framework.

          Friday Spotlight: Maximizing Oracle Linux Performance
          By Chris Kawalek
          Chris Kawalek writes, "Happy Friday!

          Our spotlight this week is on a fantastic screencast video by Oracle's Greg Marsden. In the video, Greg covers a number of specific tips to help maximize performance of your Oracle Linux deployment. Give it a watch..."]

          IT - Cloud
          IT infrastructure: The role of the cloud
          Federal Computer Week, January 21st, 2014
          "In my previous columns on IT infrastructure, I discussed the importance of moving to a modern, standardized and consolidated IT infrastructure, at least at an agency-by-agency level. Such infrastructure rationalization is foundational for enabling IT to be most effective in helping government mission or business customers.

          In my columns, I presented four structural obstacles that have greatly inhibited the federal government's ability to make significant progress on IT infrastructure rationalization, along with six approaches government can take to surmount those obstacles..."

          IT Departments Losing Control Through Cloud Services Say Cisco and Intel
          CIO Today, January 25th, 2014
          "The cloud offers senior executives the business control they demand, according to international research from Cisco and Intel, meaning IT departments need to "become more collaborative and innovative as result."

          The rising adoption of cloud services is "fundamentally changing" how businesses consume IT, according to the Cisco Consulting Services report, in conjunction with Intel..."

          Multiple, Multipath, Multifactor, or how about Multi-Cloud?
          ESG, January 20th, 2014
          "About this time last year, I published a report on cloud service management (Enabling IT's Transformation to Cloud Service Provider) where I outlined the software components needed to become a cloud service provider on-premises. Primary capabilities include orchestration and automation but also things like CMDB, federation, and chargeback. Like everything in this industry, there has been a lot of change in the past year, which I will cover in detail in the update to the CSM report later this quarter. In the meantime, I thought it would be useful to write about some of the trends I'm seeing in this space..."
          IT - CxO
          10 trends in IT spending for 2014
          ComputerWorld, January 20th, 2014
          "Optimism is finally returning to the IT sector after years of fiscal gloom as companies intensify spending and open the door to new hires.

          IT departments are girding to move full speed ahead with projects in the hot areas of big data, mobile and the cloud, according to TEKsystems' 2014 Annual IT Forecast, an online survey of 900 IT leaders in the United States and Canada.

          "IT leaders have more overall confidence," reports Jason Hayman, research manager for TEKsystems, an IT services, staffing and talent management company. "The 'do only maintenance, stand on the sidelines' mentality is finally being put aside."

          Read on to find out where IT plans to spend its money in 2014...."

          CIOs and CMOs must work together to satisfy customers
          CIO, January 20th, 2014
          "The strained, dysfunctional relationship between CIOs and marketers can be overcome, in part by rallying around the customer. After all, we're in an age that requires IT and business people to put aside their differences in order to bring business technologies to bear that will win, serve and retain customers.

          At least this is the key finding in a new report by Forrester Research. "The age of the customer places new demands on organisations, requiring changes to how they develop, market, sell and deliver products and service," the report says. "IT and business teams frequently inhibit successful digital experience execution by failing to work cooperatively."

          5 hybrid IT roles your business needs to succeed in 2014
          IT World, January 20th, 2014
          "It's clear that the 2014 corporate agenda will be dominated by the integration of big data analytics, cloud computing, mobile technology, and social media into the enterprise. But the focus must not be on the technologies themselves. Everyone has access to the same systems and tools. The differentiator will not be the technology itself, but the business value it delivers -- or doesn't..."
          State of the CIO Survey Results
          CIO, January 24th, 2014
          "CIOs expect to continue to control the majority of the IT budget, see shadow IT as a looming concern, are more closely aligned with other business executives, consider revenue growth and customer acquisition as critical priorities, and are focused on aligning IT initiatives with business goals.

          Those are the findings of CIO Research's 2014 State of the CIO Survey. The objective of 13th annual survey of CIOs was to gain an understanding how the role of the CIO continues to evolve in today's business environment. Results are based on 722 respondents who indicated they are the head of IT at their company or business unit..."

          Five Great Ways to Optimize Your Data Center
          Data Center Knowledge, January 22nd, 2014
          "It's a new year and once again data center professionals are looking at new ways to make their infrastructure even more efficient. At this point, the modern data center has become the central hub for almost all technologies. Whether it's content delivery, data distribution, or just overall business support, the data center is absolutely critical for today's business to thrive.

          The proliferation of cloud computing and IT consumerization has all driven a pretty big boom in data center demand. Because of this, data center administrators are constantly trying to find ways to improve performance, enhance infrastructure density, and increase multi-tenancy capabilities. As more converged systems make their way into the data center, infrastructure optimization will be critical to maintain a high level of service..."

          IT Unprepared for a Bolder Digital Future
          CIO Insight, January 21st, 2014
          ""Do it right or do it fast?" This is the dilemma that CIOs and their IT teams face today. And, for many, the answer is "Both!" This reality will reach new levels of organizational pressures in 2014, according to a new annual survey of CIOs from Gartner Inc.'s Executive Programs. Recruitment and training remain key, as CIOs and other tech managers can no longer afford to keep on team members who are passive or adverse to swift, disruptive change..."
          10 Ways to Ask Great Questions
          CIO Insight, January 23rd, 2014
          "Let's face it: Most of us love great interrogation scenes in movies or TV shows. From countless detective shows to 24 to the climax of A Few Good Men ("You can't handle the truth!"), we get a vicarious rush when we see a protagonist grasp the essence of reality under adverse conditions. In real life, of course, running an IT department is seldom this dramatic. However, CIOs need to routinely conduct inquiries in which actionable information is sought, which an often challenging pursuit..."
            IT - Networks
            WiFi in 2014: 10 Rising Trends That Will Affect Us at Work, Home
            eWeek, January 21st, 2014
            "If you aren't a WiFi user at home or work, you're in the minority. According to ABI Research, by the end of 2013 there were an estimated 1.4 billion smartphones in use, and all of which have WiFi connectivity. Keep in mind, this doesn't take into account all the personal computers, tablets, printers, appliances and more that flooded the marketplace this past holiday season..."
              Will 2014 Be The Year Of 10 Gigabit Ethernet?
              Network Computing, January 22nd, 2014
              "One of the big surprises in IT over the last few years has been the slow uptake of 10 gigabit Ethernet. With production available in 2006, we would have expected it to become industry standard by 2009. But with a recession beginning at the end of 2008, the driving force for replacement weakened considerably, and took the sails (and sales) out of the launch.

              Four years later with the recession diminishing, we are starting to see signs of a turnaround, with nearly 5 million 10GbE ports shipped in the third quarter of 2013, a 40% growth year over year..."

              Software-Defined Networking Takes Shape
              CIO Insight, January 21st, 2014
              "As organizations and their CIOs look for ways to manage enterprise networks more efficiently, a growing number are eyeing or adopting software-defined networking (SDN). The technology, which separates the control layer from the physical hardware that routes network packets, aims to simplify the configuration process for network components and boost overall performance by, among other things, automating provisioning, reducing latency, providing better analytics for traffic engineering, and boosting quality of service..."
              IT - Operations
              7 Tips for Managing Preventive Maintenance at Data Centers
              Data Center Knowledge, January 23rd, 2014
              "Can you afford to have one of your critical power distribution assets fail because you missed your scheduled preventative maintenance? According to a recent study by Ponemon Institute, one minute of data center downtime now costs $7,900 on average. With an average reported incident length of 90 minutes, we can calculate that the average incident now costs $700,000. This large cost is related to the fact that modern data centers are supporting critical websites and cloud software applications..."
                Indian Telcos Face Heat on Global Warming
                Enterprise Efficiency, January 24th, 2014
                "Telecommunication companies in India have to start their green journey by next year. Targets are in place, but the path is looking rather steep and rocky. The holistic approach involves the greening of telecom networks, green telecom equipment manufacture, environmentally friendly design of telecom buildings, and safe telecom waste disposal. However, unless preparations begin in earnest, none of these companies will be able to comply with the stiff requirements spelled out by the Telecom Regulatory Authority of India (TRAI) as far back as in 2012. Here's a sample..."
                  IT - Security
                  Most non-IT employees don't 'get' company IT security policies
                  Help Net Security, January 22nd, 2014
                  "DataMotion released results of its second annual survey on corporate email and file transfer habits.

                  Among the findings is a far-reaching communications disconnect between IT management and non-IT employees on security and compliance policies. This encompasses such critical areas as effective communication of policies, as well as the use of free consumer-type file transfer tools and corporate email on mobile devices..."

                  DDoS Web Attacks Rise in 2013, Harder To Fend Off
                  CIO Today, January 22nd, 2014
                  "No matter what sector a business is in, protecting against DDoS attacks is important. Now that DDoS attacks are becoming more common, even large organizations and government-funded institutions have been taken offline for hours or days. Along with the troublesome downtime is an even more significant amount of lost money..."
                    Secure Networks: How To Develop An Information Security Policy
                    Network Computing, January 23rd, 2014
                    "Security is often referred to as an overlay to a network topology. While security methods provide protection for access and infrastructure, these methods should be the result of a carefully defined security policy. An effective security policy integrates well-known protection methods into a network in a way that meets both security standards and the goals of the entity being secured.

                    An information security policy builds the foundation for a secure network, but it must be seen as valuable to an entity. The selling point for a security policy is showing how it maps to key business drivers such as:..."

                    Punish Careless Employees to Reduce Security Breaches, Vendor Says
                    CIO Today, January 24th, 2014
                    "Security could be vastly improved by holding employees accountable for carelessly clicking on emailed links and attachments that lead to malware being downloaded to a corporate network, an awareness-training vendor says.

                    Rather than simply re-training employees who are prone to fall for phishing attacks, KnowBe4 advocates reporting them to immediate supervisors and human resource departments that can pressure workers into becoming more careful..."

                    Best practices to help prevent online data breaches
                    Help Net Security, January 23rd, 2014
                    "The Online Trust Alliance (OTA) recommended a series of best practices to help prevent online data breaches and other exploits.

                    Leveraging preliminary year-end data from the Open Security Foundation and the Privacy Rights Clearinghouse, the OTA estimated in its guide that over 740 million records were exposed in 2013, making it the worst year in terms of data breaches recorded to date..."

                    Spam, Mobile Malware Lead Security Trends of 2013
                    eWeek, January 24th, 2014
                    "Year after year, the volume of Internet threats rises, and 2013 was no exception. Not every type of Internet threat, however, has been on a continuously growing trajectory. In fact, at least one common threat 'spam' is apparently on the downswing, with moderate declines over the last year. The same cannot be said for mobile attack volumes. Multiple vendors reported a growth in mobile attacks in 2013, with Android being identified as the primary target for malware authors..."
                      Top 10 DDoS attack trends
                      Help Net Security, January 23rd, 2014
                      Throughout the year, metrics were collected from all DDoS attacks launched against the company's client base by the Prolexic Security Engineering & Response Team (PLXsert). Through digital forensics and post-attack analysis, PLXsert is able to build a global view of the evolving DDoS threat.

                      'It was a dynamic 12 months for DDoS attacks,' said Stuart Scholly, president of Prolexic. 'The tools used by malicious actors in 2013 and the tactics they adopted changed considerably, reflecting the on-going evolution of the DDoS threat.'

                      IT - Careers
                      The Cybersecurity Skills Gap Is Worse Than You Think
                      ESG, January 21st, 2014
                      "If you've read my blog with any regularity, you know that the cybersecurity skills shortage is a topic that is near-and-dear to me. Forget about things like the threat landscape, mobile security, and cloud security; if we don't have enough skilled security professionals, we are all in trouble..."
                      1 in 4 IT pros plan to change jobs in 2014
                      IT World, January 22nd, 2014
                      "IT is a booming field with excellent pay, solid job prospects and a tiny unemployment rate, but that won't stop pros from seeking better opportunities this year, according to a new survey.

                      New data from a joint CareerBuilder/ survey finds that 25% of IT pros plan to change jobs in 2014. That figure is up significantly from 2013, when only 15% intended to find a new employer..."

                        7 simple rules for hiring great developers
                        IT World, January 21st, 2014
                        "The war for developer talent is hotter than ever. Whether you're trying to build mobile apps, redesign the user experience on your public website, or keep business-critical applications on the cutting edge, everyone needs code.

                        "Engineers are king right now," notes Sam Schillace, senior vice president of engineering at cloud storage and collaboration company Box. "Coders are superimportant to everyone."

                        With an unemployment rate roughly half the national average, software engineers can write their tickets and demand generous salaries and legendary perks -- and big tech companies are more than happy to provide them..."

                        Finding Tech Talent: Midwest Competing With the Two Coasts
                        eWeek, January 21st, 2014
                        "The war for tech talent may be moving away from the two coasts. Five of the top 12 most challenging cities in which to recruit tech talent are in the Midwest, according to a new survey from online technology jobs resource Dice. The five Midwest cities on the list span a distance apart of more than 700 miles and are tough recruiting locations based on a combination of supply and demand issues, according to Dice, which polled U.S. recruiters and hiring managers..."
                          How Proper Etiquette Can Help You Land Your Dream Tech Job
                          CIO, January 20th, 2014
                          "Some of the most crucial interactions with a potential employer occur before you even set foot in their office for a job interview and in the time immediately following your interview. While acing the technical and soft-skills requirements of a job interview are up to you, here are some tips for handling the tricky times before and after that interview..."
                            Is cybersecurity the right job for you?
                            Federal Computer Week, January 23rd, 2014
                            "Headlines, reports and keynote addresses describing a cybersecurity workforce crisis continue to dominate the IT security landscape, with thousands - even hundreds of thousands - of open positions for cyber pros. Are you one of the many IT workers looking to make the jump, only to fall short of getting hired? It's all too common, and there are some surprising reasons why..."
                            IT - Virtualization
                            Storage: The ugly truth about virtualization
                            ComputerWorld, January 20th, 2014
                            "Server virtualization has revolutionized the way we deploy systems in our data centers. It has sparked a gold rush along the way, creating outlandish wealth. It has also left a wake of destruction, and it very well may cause catastrophic failures in a lot of shops.

                            It certainly is going to raise blood pressure and cause hair loss among admins.

                            The Good Parts: Server virtualization lets you bring a virtual machine online in minutes, gets you enormous utilization gains on your hardware, and enables mobility unlike anything we've ever seen before..."

                              IT - Email
                              Corporate Email, File Sharing Pose Problems for Businesses
                              eWeek, January 22nd, 2014
                              "The report indicated a large percentage in IT management are taking compliance risks and turning off essential capabilities due to tech issues. There is a far-reaching communications disconnect between IT management and non-IT employees on security and compliance policies when it comes to corporate email and file transfer habits, according to a survey of more than 400 IT decision makers by email encryption provider DataMotion. The report also indicated a disturbing percentage in IT management are knowingly taking compliance risks and even turning off essential capabilities due to technology issues..."
                              HTG Explains: Why Is Spam Still A Problem?
                              How-To Geek, January 26th, 2014
                              "Bill Gates famously said 'two years from now, spam will be solved' back in 2004. It's now ten years later and more than 70% of emails are spam, according to Kaspersky. Why is spam still such a problem?

                              While spam may never be fixed as long as email is around, the situation has improved a bit. Spam filters have become much more effective - it's easy to forget how much they've improved over the past decade..."

                                IT - Backup
                                Backup is Broken But More than New Technology is Likely Required to Fix It
                                DGIG, January 24th, 2014
                                In doing some research this past week for a paper I am working on, I ran across a number of articles from 2013 that discuss how to repair broken backup environments. As anyone close to the IT industry knows, backup has been broken for at least a decade or more. But as these same individuals also likely know, organizations must adopt more than new backup technology to fix it.

                                To someone who worked in the trenches for many years, the knowledge that 'backup is broken' dates back to at least the mid-1990's. Even then backup was barely functional at best and broken at worst. By the time 2001 rolled around when I took a job at a Fortune 500 data center, the knowledge that backup was broken was so prevalent that even my upper management acknowledged there was an issue and wanted to see it fixed.

                                IT - Big Data
                                FBI: Era of Big Data = Era of Big Data Thefts
                                CIO Today, January 24th, 2014
                                "Crime targeting big data is expected to be a major issue of 2014, and not only in the United States. Germany recently saw a major e-mail breach and South Korea saw a counterfeit credit card scheme affecting some 60 million accounts. "The high dollar value gained from some of these compromises can encourage intruders," the FBI said..."
                                Leading HR Toward Predictive Analytics
                                Big Data Republic, January 24th, 2014
                                "If data analysis is to deliver predictive insights that affect the bottom line, the executive team must set the tone for HR.

                                Why do psychics, fortune tellers, astrology, and time-travel tales keep going strong even into the 21st century? Simple: We want to know the future. Just as everyday folk want to know if their current love interest is the one or if they should take that new job, business folks want to know what's coming down the pike..."

                                  IT - Mobile
                                  Mobile Phone's History in 10 Industry-Changing Devices
                                  eWeek, January 24th, 2014
                                  "The history of the mobile phone can be divided into everything that happened before 2007 and everything that happened after Steve Jobs took the stage at MacWorld that January and introduced the iPhone. Apple awakened a great swath of the world to technologies and capabilities that until then only workers in major enterprises had been enjoying. Even then, Apple radically simplified those capabilities and made the experience of using a smartphone fun..."
                                    Looking back at 10 years of mobile malware
                                    Help Net Security, January 24th, 2014
                                    "From Cabir to FakeDefend, the last decade has seen the number of mobile malware explode. In 2013, Fortinet's FortiGuard Labs has seen more than 1,300 new malicious applications per day and is currently tracking more than 300 Android malware families and more than 400,000 malicious Android applications.

                                    Besides the sheer growth in numbers, another important trend to note is that mobile malware has followed the same evolution as PC malware, but at a much faster pace..."

                                      IT shops face ever greater mobile demands from users
                                      ComputerWorld, January 20th, 2014
                                      "Nearly two-thirds of mobile device users own three or more network-connected devices, according to an online survey of 5,000 people conducted in November in the U.S. and eight other countries (download PDF).

                                      That finding shows just how popular smartphones, tablets and other connected devices -- including cars -- have become in the past two years. And it also shows the challenges facing IT shops that manage workers who now expect to have constant network connections in the office and while on the road..."

                                        IT - BYOD
                                        BYOD IT Skills in High Demand
                                        CIO Today, January 24th, 2014
                                        "If you think BYOD is more media hype than reality, think again. The mega trend is making a very real impact on IT jobs. Tech job positions in highest demand are those associated with BYOD, according to results of a recent salary survey from Janco Associates.

                                        "If you have knowledge and ability to work with BYOD, either in implementation, support or development, this increases your value," says CEO M. Victor Janulaitis at Janco Associates. "It's the hot skill of the day."

                                        BYOD Policy Guidebook
                                        Help Net Security, January 24th, 2014
                                        "This policy guidebook was created to help guide you through the questions to ask and provide some best practices to consider when establishing your own BYOD policies.

                                        Your employees want to use their own mobile devices for work. This represents a tremendous opportunity for you to extend the benefits of mobile technology to all employees. As more companies embrace the Bring Your Own Device (BYOD) model, many questions arise..."

                                        BYOD would be a 'nightmare' if not managed properly, says research
                                        Enterprise AppsTech, January 24th, 2014
                                        "According to the latest research from digital print and documents supplier Altodigital, more than half of UK organisations operate BYOD, yet nearly two thirds (63%) don't have a specific IT strategy in place for it.

                                        The research polled over 1000 decision makers across UK businesses, and concluded that in the main, less than half the workforce would be on a BYOD strategy. Around a third (31%) of those surveyed confirmed that less than a tenth of its employees brought in their own personal devices, while 14% admitted that more than three quarters of their staff were on BYOD..."

                                        Top Ten Articles for last few Issues
                                        Vol 191 Issues 1, 2 and 3; Vol 190 Issues 1, 2, 3 and 4; Vol 189 Issue 4
                                        We track how frequently each article is viewed on the web site to determine which the readers consider the most important. For last week, the top 10 articles were:

                                        • Top 10 Tips and Tricks for Getting the Best Database Performance from Oracle Solaris Systems
                                        • Bitrot and atomic COWs: Inside 'next-gen' filesystems
                                        • What Makes Oracle Linux the Best Platform for Oracle Database 12c
                                        • Java 8 is Coming to EclipseCon
                                        • January 2014 Critical Patch Update Released
                                        • Lab: How to Deploy a Four-Node Oracle RAC 12c Cluster in Minutes
                                        • The Benefits of Digital Training
                                        • StorageTek Linear Tape File System
                                        • MySQL for Visual Studio 1.1.3 GA
                                        • Greenball Leverages Oracle Managed Cloud Services

                                        The longer version of this article has list of top ten articles for the last 8 weeks.

                                          IT - Tape
                                          Fujifilm Manufactured 100 million LTO Cartridges
                                , January 24th, 2014
                                          "Fujifilm Recording Media USA, Inc., a subsidiary of Fujifilm Holdings Corporation, a manufacturer of storage media, has manufactured over 100 million LTO (Linear Tape-Open) Ultrium data cartridges since its release of the first generation of LTO in 2000.

                                          This equates to over 53 thousand petabytes of storage and more than 41 million miles of tape, enough to wrap around the globe 1,653 times..."

                                          Celebrating 15 Years of Netbeans
                                          15 Years of First-Class Development Tools for Java Innovation
                                          Java's award-winning, free, open source integrated development environment (IDE) celebrates the 15-year mark, with a worldwide community of users and developers.

                                          Rapid Applications Development for Java

                                          NetBeans is both an open-source IDE and an application platform that enables developers to rapidly create web, enterprise, desktop, and mobile applications using the Java platform, as well as HTML5 and JavaScript, PHP, Groovy and Grails, and C/C++.

                                          The Original Free Java IDE

                                          The NetBeans story begins in 1996, when students at Charles University in Prague attempted to write a Delphi-like Java IDE in Java. Originally called Xelfi, the student project delved into what was then the uncharted territory of Java IDE. Xelfi generated enough interest in the community that after they graduated, the students decided to put their new product on the market. In 1997, a company was formed and the name was changed to NetBeans.

                                          It wasn't long before Sun Microsystems began searching for better Java development tools and became interested in NetBeans...

                                          What's New in Oracle Identity Manager 11gR2 PS2?
                                          By Arda Eralp
                                          Arda writes, "Oracle Identity Manager is a highly flexible and scalable enterprise identity administration system that provides operational and business efficiency by providing centralized administration & complete automation of identity and user provisioning events across enterprise as well as extranet applications. Part of the Oracle Identity Governance Suite, it provides role lifecycle management and privileged account management, ensuring consistent enforcement of identity based controls thereby reducing ongoing operational and compliance costs. This blog post highlights key new features introduced in Oracle Identity Manager 11gR2 PS2. .."
                                          Trending in
                                          Vol 235, Issue 3
                                          Trending IT Articles