News about Oracle's Solaris and Sun Hardware
System News
Feb 3rd, 2014 — Feb 9th, 2014 Generate the Custom HTML Email for this Issue
System News System News for Sun Users
Volume 192, Issue 1 << Previous Issue | Next Issue >>
Sections in this issue:
click to jump to section

See How Oracle Multitenant Reduced e-DBA's Hardware Spend by 75%
By David Swanger

David writes, "Last summer we introduced Oracle Database 12c and Oracle Multitenant. Over the past several months we've shared some impressive benchmarks and reports that detail how pluggable databases allow organizations to rapidly build their own Database as a Service environments that take advantage of:

  • Rapid Provisioning
  • Simple Database Tiering
  • Managing Many Databases as One

e-DBA recently deployed Oracle Multitenant for their own Database as a Service environment and the results are nothing short of impressive. .."

Database Insider
February 2014 issue
The February issue of the Database Insider newsletter is now available. (Full newsletter here)

IOUG President Michelle Malcher: Sneak Peak of COLLABORATE 14

COLLABORATE 14, the Independent Oracle Users Group conference, will take place April 7 to 11 in Las Vegas, Nevada. Michelle Malcher, IOUG president and DBA team lead at DRW Holdings, offers a sneak preview of the conference's 1,250 panels and sessions covering the full spectrum of Oracle technology.

2014 Meetings Kick Off with Oracle-Hosted BIWA Summit

Find out what transpired at the recent BIWA Summit, where attendees enjoyed a portfolio of content spanning data management, data mining, analytics, business intelligence, visualization, and more. And find out where to be for this year's hottest upcoming special interest and user group meetings.

New E-Book: Technical Primer for Securing Oracle Database 12c

Oracle security experts have written a new book for database administrators and security professionals who want to learn how to secure Oracle Databases. Written by Oracle's Paul Needham and Scott Rotondo, along with Independent Oracle Users Group President Michelle Malcher, Securing Oracle Database 12c: A Technical Primer, is available as a free download.


SPARC T5-2 server shatters another world record!
By Claudiac Caramelli
Claudiac writes, "Since their introduction last year, Oracle's T5 servers have topped performance metrics across enterprise workloads. Now SPARC T5 server has just shattered another world record...

In that test, the SPARC T5-2 server:

Showed the best performance per socket for a single system in the application tier Demonstrated 1.5 times higher performance compared to Oracle's 2-socket Sun Server X4-2 systems, running Intel's E5-2600 v2 series processor (Ivy Bridge) Delivered 29% better performance and 20% better price performance compared to a two-socket IBM PowerLinux POWER7+ processor-based server

Further details are available HERE.

CRN Names Oracle SuperCluster One of 10 Coolest Servers Of 2013
By Kevin Gee
"CRN recently gathered and reviewed computer systems of all shapes and sizes, including microservers, rack-mount servers, integrated systems, and even mainframes. The result is their list of 10 of the coolest server introductions for 2013 -- which includes the latest Oracle SuperCluster. Oracle has lead the shift from stand-alone servers to converged (or engineered, in Oracle speak) systems, starting over five years ago with the Exadata Database Machine. That accelerated four years ago with the acquisition of Sun Microsystems, as well as the introduction of the Oracle SuperCluster over two years ago. Industry analysts now recognize Oracle's leadership role in this category..."
IT - Storage
Frontiers of storage: magnetic holography
StorageMojo, February 3rd, 2014
"Optical holography has gotten lots of funding over the years - most recently with $100m for InPhase - but holography isn't limited to optical. Holography is the storage of information in the wave interference pattern produced by two beams, one that bounces physically or virtually off whatever we seek to record and the second coherent background.

Acoustic holograms are used in seismic; microwave holograms in radar. Now, magnetic holography, in a paper by F. Gertz, and A. Khitun of UC Riverside and A. Kozhevnikov and Y. Filimonov of the Kotel-nikov Institute of the Russian Academy of Sciences. Their paper Magnonic Holographic Memory (pdf) describes a solid-state device they've fabricated that uses spin wave interference to store data..."

    Just how solid is cloud storage in 2014
    The Register, February 6th, 2014
    "Searching the Reg' for "Cloud + Storage" mentions in 2013 gets you 44 pages of results. So let's take it as read that it's a hot topic.

    We're not bothering with private clouds here; they're enterprise IT re-branded, re-tooled and re-priced but they are still private enterprise IT resources. No, it's the public cloud, accessed remotely and made available through a cloud services provider (CSP) that we're considering in this review.

    This area is dominated by the AGA threesome of Amazon, Google and (Microsoft) Azure who each have large consumer businesses buttressing their enterprise cloud efforts. And Amazon is top dog with every other supplier dancing to its tune and reacting to what it does in terms of price cuts and service developments..."

    Java Technology
    Java EE 7 Survey
    Please take this anonymous survey

    Greetings Java Developers,

    Oracle has created a short survey that will help better understand which APIs and Java versions are the most important to you as a Java EE developer. This information will enable us to update our training material and certifications for Java EE 7 to better suit the Java community. If you can, please take the survey.

    Your answers will remain anonymous, and you won't be contacted by Oracle as a result of answering this survey.

    IT - Technology
    Predictions For 2014: Technology Monitoring
    Forester, February 6th, 2014
    "My new report went live this week for Forrester clients - Predictions For 2014: Technology Monitoring. Normally I am a bit of a skeptic when it comes to predictions, especially in regards to technology, because while they are interesting to read they can cause confusion and unnecessary deliberation for a buyer/strategist if they are not in context. So my aim for this report was to provide some concrete advice for I&O professionals in 2014 in regards to their technology monitoring (user experience, applications and infrastructure) strategy or approach.

    So my top level advice is that during 2014, I&O has to concentrate on monitoring business technology which serves external customers..."

    9 factors creating a 'perfect storm' driving the Internet of Things to $14.4 trillion
    VentureBeat, February 4th, 2014
    "The first computer, ENIAC, cost $6M in 1946 and had less power than a $5 animated greeting card you buy today and throw away tomorrow. That kind of technology innovation is powering the coming internet of things, and turning it into what Cisco Canada CTO Jim Seifert says will be a key component in $14.4 trillion of economic activity within the next decade.

    Accelerating change is the key..."

    IT - Bitcoin
    57% of Young Americans Believe Bitcoin Boosts Global Economy
    CoinDesk, February 6th, 2014
    "The majority of young consumers in the US believe that bitcoin 'helps the global economy' a new survey commissioned by The Street has revealed.

    57% of the 18- to 25-year-olds that took part in the nationwide GfK survey believe bitcoin benefits the global economy, while 33% believe it helps the US dollar..."

    Gavin Andresen: It's Going to be Tough for Governments to Control Bitcoin
    CoinDesk, February 6th, 2014
    "Bitcoin Foundation's chief scientist Gavin Andresen addressed the subject of bitcoin regulation as part of the US Council on Foreign Relations' (CFR) latest 'Voices of the Next Generation' discussion in Washington' DC today.

    During the 60-minute question-and-answer session' attendees and moderator Douglas Rediker asked Andresen probing and sometimes pointed questions about the emerging virtual currency' as well as its implications for governments and the world economy..."

    You Can Now Pay Cash For Bitcoin at 28,000 UK Stores
    Coindesk, February 6th, 2014
    "Bitcoiners can now pay cash for bitcoins at 28,000 shops across the UK, thanks to a new service set up by ZipZap.

    The service enables people to head to their nearest ZipZap payment location, hand over cash and see bitcoins deposited in their wallets almost instantly..."

      IT - FOSS
      The Trend To "Open Source" Software And What It Means For Businesses And Consumers
      Forbes, February 4th, 2014
      "Wikipedia defines 'open-source' software as computer software with its source code made available and licensed with a license in which the copyright holder provides the rights to study, change and distribute the software to anyone and for any purpose. Translated into English this just means it's free to anyone who wants to download it. Linux, Mozilla Firefox, and Google's Android are open source operating systems and are available and easy to download even for computer illiterates like myself..."
      DARPA? Open Source? Yes, Of Course
      CIO Today, February 6th, 2014
      "The Department of Defense is interested in building communities around government-funded software and research. If the R&D community shows sufficient interest, DARPA said it would continue to make available oopen-source information generated by its programs, including software, publications, data and experimental results..."
        DARPA demo clearinghouse site for open-source code
        CIO UK, February 5th, 2014
        "The Defense Advanced Research Projects Agency debuted a new website dedicated to sharing open-source data and publications today, calling it the DARPA Open Catalog.

        There are a number of different aims for the Open Catalog. By sharing open-source code freely, DARPA says it hopes to create a community of developers who are experts in software for government use. Program manager Chris White said that the collaborative nature of open-source was another incentive for the project.

        "Our hope is that the computer science community will test and evaluate elements of our software and afterward adopt them as either standalone offerings or as components of their products," he said in a statement..."

          Why open source will rule the data center
          InfoWorld, February 5th, 2014
          "According to Michael Bushong of networking startup Plexxi, three commonly occurring conditions ensure that open source software will steadily widen its data center footprint...

          Open is playing an increasingly vital role in IT infrastructure. The current, dominant position of open source in server-side computing is well understood, and networking is now edging its way toward open source with the OpenDaylight movement. But is open source a natural evolutionary path for all IT disciplines, or do certain characteristics make some areas more attractive for open source than others?..."

          Oracle Solaris, Pluribus Networks and OpenStack
          By Larry Wake
          Larry writes, "It's been a newsworthy week for Sun alumni -- first the word that Satya Nadella, who came to Microsoft from Sun, will be their new CEO, and now some interesting new technologies and other announcements from Pluribus Networks, a company founded by a few ex-Sun folk.

          The Oracle Solaris news here is the agreement between Oracle and Pluribus, following Oracle Solaris 11's certification on Pluribus' Freedom Server-Switch platform. Oracle and Pluribus have announced they will be working to further integrate OpenStack management capabilities, allowing Oracle Solaris 11 compute nodes to be managed via OpenStack's Nova plug-in. This will also bring in Oracle's storage systems such as the ZS3 series, allowing them to be managed via OpenStack Cinder..."

          MySQL Enterprise Monitor 3.0.6
          By Andy Bang
          Andy writes, "We are pleased to announce that MySQL Enterprise Monitor 3.0.6 is now available for download on the My Oracle Support (MOS) web site. It will also be available via the Oracle Software Delivery Cloud with the February update in about 1 week. This is a maintenance release that includes a few new features and fixes a number of bugs. You can find more information on the contents of this release in the change log.

          You will find binaries for the new release on My Oracle Support. Choose the "Patches & Updates" tab, and then choose the "Product or Family (Advanced Search)" side tab in the "Patch Search" portlet..."

          Cloud Computing
          Oracle Cloud - The Modern Cloud for Your Modern Business
          By Kathryn Perry
          Kathryn writes," People listen to EVP Steve Miranda from Oracle Applications Development (pictured) because he's a credible thought leader. He says things that are worth repeating. Here are some nuggets from his keynote at Oracle CloudWorld in San Francisco.

          Miranda says we too often talk about the cloud in technical terms; instead, we should talk about the cloud in business benefits..."

          Oracle's Got Your Cloud Covered
          by Jim Lein
          Jim writes, "When I meet with customer decision makers, the first question I ask them is, 'Do you want Cloud?' If they say, 'Yes' my second questions is, 'Why?'

          The use of the word 'Cloud' in reference to technology solutions has been around for awhile now, maybe longer than you thought. It is a metaphor, and as such, its definition is open to interpretation. From a practical, decision-maker perspective, it's a single word that doesn't tell you much of anything about what it does. For example, if a vendor tells you they have 'ERP in the Cloud' what does that really mean?..."

            OCFS2 Best Practices Guide
            By Chris Kawalek
            Chris writes, "Our spotlight this week is on a brand new white paper, "OCFS2 Best Practices Guide". In this paper, Oracle's Robert Chase describes in detail how to get the most from OCFS2 in Oracle Linux..."

            Read OCFS2 Best Practices Guide.

            IT - Cloud
            Unlikely Allies: File Servers and the Cloud
            MSPmentor, February 5th, 2014
            "By some accounts, there are roughly 27 million traditional file servers (i.e. non-cloud) that remain active. At the same time, it's been estimated that nearly one-third of the population now works remotely. One might assume that these numbers represent something of a technological stand-off: either businesses eventually ditch the file servers for a cloud-based model, or workers accept the fact that company data will remain on-premise even if they will not..."
              The Consequences of Blocking the Personal Cloud
              MSPmentor, February 7th, 2014
              "Here's how it normally goes: Company A lacks a file-sharing solution designed for business use. Employees of Company A, realizing that file sharing is an essential part of their work lives, begin to adopt the cloud services they are familiar with from their personal lives. Meanwhile, the IT department at Company A reads article after article on how these solutions put sensitive data at risk and fail to comply with various laws and regulations.

              The IT department then implements their first solution by passively forbidding the use of these tools - a tactic that works for about two hours. Eventually, left with no other choice, the personal cloud is actively blocked within the organization. Problem solved, right? Wrong..."

                Defining the Third IT Platform: Key 2014 Trends Identified by IDC
                eWeek, February 5th, 2014
                "IT industry research firm IDC describes the Third Platform as IT that is built on mobile devices, cloud services, social networks and big data analytics. The First Platform, of course, is the mainframe computer system, which began in the 1950s and continues today. The Second Platform is the client/server system, which began in the 1980s with PCs tapping into mainframe databases and applications. Looking ahead, the researcher sees a number of key market skirmishes that will determine winners and losers..."
                When Your App Is in the Cloud
                New York Times, Feb 1st, 2014
                "The telecommunications services business, worth about $1 trillion in annual, global sales, is starting to feel the effects of cloud computing, one of this era's most important advances in high tech.

                For the most part, the gear for telecom work comes from incumbents like Cisco or Avaya.

                The more software-based alternatives for what is called 'unified communications' are things like Microsoft's Lync.

                The telecom gear business has not been touched by the crushing economics of software delivered via cloud computing, the kind of low-price, high-versatility product that has caused so many problems for companies making business software, and for many traditional high-cost computer hardware makers.

                But that's starting to change..."

                Prepare for the cloud data explosion
                InfoWorld, February 3rd, 2014
                "The gizmo culture of tech has a tendency to distort priorities. Ask people what MDM means, and you'll probably hear "mobile device management" in response. The vastly more important meaning of MDM, "master data management," seems lost to history.

                Last week I spoke with Shoaib Abbasi, CEO of Informatica, which is an enterprise data integration company that's moving aggressively into a new cloud space known as iPaaS (integration platform as a service). Abbasi argues that as we plug into a cloud world and throw mobile, social, and the Internet of things into the mix, the imperative to maintain clean, consistent, deduplicated data is greater than ever..."

                23 Signs Your Cloud Project May Be in Trouble
                CIO, February 5th, 2014
                "All readers have their share of successful and failed software projects. Everyone has a favorite war story. But for software project managers, either in a company or in a consulting organization, there's surprisingly little up-to-date information about what causes budget overruns and schedule slips. Of course, management consultants worth their name will claim that their methodology will fix the problem - and they'll almost certainly have a two-dimensional graph showing how their expertise will take your organization up and to the right. Reductio ad Gartner Group..."
                5 things to consider when weighing public cloud against private cloud
                NetworkWorld, February 5th, 2014
                "A few years ago the only cloud game in town was the public cloud, but today private and hybrid clouds are also true contenders. In fact, private cloud implementations address a prevalent set of challenges and issues that public clouds cannot and can help speed up and smooth the way of cloud adoption.

                Here are five core tenets you should assess when weighing private cloud against public cloud options:..."

                  IT - CxO
                  Five Counterintuitive Ways to Spur IT Innovation
                  CIO Insight, February 7th, 2014
                  "CIOs can boost their odds of success by considering these five approaches:

                  View resistance as an opportunity. By now, it's clear that consumer technology has turned IT upside down. It's tempting to bemoan the loss of control and complain about the growing challenge of dealing with shadow IT and a general defiance to abide by polices. But what this situation points out is that these policies interfere with the ability of employees to get their work done. Savvy CIOs spend time talking to others - from department heads to cubicle workers - to better understand connection and communications points. This helps them build an IT infrastructure that more closely fits today's business requirements..."

                  What the Internet of Things Will Mean for CIOs
                  CIO, February 3rd, 2014
                  "In a recent blog post, Frost & Sullivan analyst Andrew Milroy predicts that more data will be generated by machines, or things, this year than by human beings. For that reason, 2014 is poised to be the year when the focus of both IT buyers and IT sellers shifts to the Internet of Things, a term coined by Kevin Ashton, cofounder of the Auto-ID Center at MIT, when he and his team created the global standard system for RFID and other sensors. Cisco Systems has re-termed this phrase the Internet of Everything, as it believes that, eventually, everything will be connected..."
                  A Big Data POV for the C-Suite
                  Forbes, February 4th, 2014
                  "As 'Big Data' continues to mature from hype and techno-jargon to operational reality, business leaders must ask themselves two key questions: What are Big Data's implications for my organization? How do we tap its wealth-building power to create value and competitive advantage?

                  Defining a 'point of view' about Big Data, however, is bit like trying to define the Internet. A bit hard to get your arms around..."

                  Revenge is a dish best served electronically: 12 cautionary tales
                  InfoWorld, February 3rd, 2014
                  "With great power comes great responsibility -- and great temptation. As more and more of an organization's infrastructure is shifted to IT, the IT staffers find themselves with more and more concentrated power, often without the recognition or compensation they feel should go along with it. And when they're fired or quit in a huff, well, bad things can happen. Submitted for your approval: some cautionary tales of what miffed techies can do to your company if vengeance is on their minds. (They're cautionary for all parties: most end up doing time for their misdeeds.) ..."
                  10 Tough Disaster Recovery Questions for CIOs
                  CIO Insight, February 3rd, 2014
                  "What's worse than having a CEO and board of directors grill you about your disaster recovery plan? Well, not having a good answer for every question, especially if they're asking after the worst has happened, as opposed to before. Given that the future of your organization (not to mention your career) is at stake here, we're presenting the following 10 questions that every CIO should be ready to address about the company disaster plan..."
                  7 things marketing wants to say to IT
                  Computerworld, February 5th, 2014
                  "Chief marketing officer David Perry knows exactly what he needs from his organization's IT department.

                  To maximize the success of his marketing strategies, he needs a CIO and a technology team that go beyond conventional support, Perry says -- he's looking for a partner that can help transform marketing. "The CIO has to have a broad view and help us figure out what works," says Perry, CMO at Bentley University in Waltham, Mass.

                  Of course, IT must continue to keep the infrastructure running and the systems secure. But these days especially, marketing needs more than that -- sometimes much more..."

                  The 7 Ways You're Not Engaging Your Employees
                  Forbes, February 6th, 2014
                  "With all the disgruntled and restless employees out there - a recent study put the percentage of employees who are not fully engaged at 75% - employee engagement is as high a concern as ever. Company leaders do somersaults to maximize the engagement of their employees and, by extension, their bottom lines. Administrators scour the landscape for tools and programs - such as volunteer and giving programs - that will increase employee engagement. And employees, well, they just want to be engaged. And if they're not, they'll leave. Or never join your company in the first place..."
                    6 Habits Of Great Connectors
                    Business Insider, February 6th, 2014
                    "The second part of the 1936 Dale Carnegie classic book, "How to Win Friends and Influence People," is called 'Six Ways to Make People Like You.' All these years later, connecting with new people remains a vital skill for any entrepreneur hoping to grow her network. But that doesn't mean it's easy, especially for introverts.

                    Not long ago entrepreneur Scott Dinsmore formed a list of the habits he's observed in skillful connectors. In the spirit of Carnegie's 'Six Ways,' here are six habits from Dinsmore's list, supplemented with timeless tidbits from "How to Win Friends." ..."

                      11 ways to improve your IT team's productivity
                      ITWorld, February 6th, 2014
                      "How can CIOs and IT executives help their teams be more productive (besides providing them with free food)? Here are the top 11 tips -- from CIOs, IT executives, productivity and leadership experts and project managers -- for getting the most out of your IT team..."
                        IT - DR
                        Disaster recovery options for smaller companies
                        ITWorld, February 6th, 2014
                        "The growing number of natural disasters and the rise in data loss has increased the significance of having an effective disaster recovery (DR) strategy. Thankfully new capabilities are helping smaller companies keep pace. Here's a look at the prominent trends shaping disaster recovery today:.."
                        Case study: Putting disaster recovery into action when revellers strike
                        ComputerWeekly, February 4th, 2014
                        "Infrastructure managers are no strangers to worrying about disaster. Preparing for eventualities such as fires, floods and power cuts goes with the territory.

                        Most, however, don't spend too much time thinking about protecting their servers from drunken revellers. So when Jon Helgason, IT manager for Icelandic software development and IT management specialist Midverk, left the building one Friday evening last winter just as a party was livening up in one of the other offices in the building, he never suspected that just a few hours later this Nordic knees-up would put his business perilously close to the point of collapse..."

                        Two-Thirds of Organizations Measure DR Time in Days, Not Hours
                        StorageNewsletter, February 7th, 2014
                        "TwinStrata, Inc. announced the results of its Industry Trends: Backup in 2014 survey.

                        Conducted between December 2013 and January 2014, the report analyzes responses from 209 IT personnel. The results indicate an urgent need for organizations to make significant improvements to their backup strategies with one in five organizations experiencing backup failures at least monthly and one in 10 weekly. As a result, 53% of organizations plan to make changes to their backup strategy this year. Incorporating cloud storage was the remedy most often cited by these respondents..."

                          IT - Networks
                          10 Networking Predictions For 2014
                          CRN, February 3rd, 2014
                          "Software-defined networking and the shift toward virtualized networking platforms no doubt dominated the networking conversations of 2013. That trend will likely continue into 2014 and beyond, but other technologies -- ranging from wireless to video to unified communications -- are also expected to make major strides that definitely can't be ignored.

                          Here are 10 predictions for the networking industry in 2014..."

                          OpenDaylight, open-source, software-defined networking, gets real with first release
                          ZDNet, February 4th, 2014
                          "When the Linux Foundation announced that it had gotten ever-warring networking vendors to agree to work together on the open-source software-defined network (SDN) project, OpenDaylight, the haters spoke loud and clear. The "OpenDaylight Project will likely delay the adoption of enterprise software-defined networking solutions and stifle innovation," said Gartner.

                          Almost no one at the standing-room only OpenDaylight Summit would agree. When Neela Jacques, executive director of OpenDaylight, announced the first release of the program, Hydrogen, the news was greeted with a round of applause. This was an audience made up of developers and executives from both the biggest companies supporting OpenDaylight, such as Microsoft, IBM, Red Hat, and Cisco to people from the smallest start-ups - even individual programmers..."

                          SDN Management: Risks And Challenges
                          Network Computing, February 6th, 2014
                          "Software-defined networking (SDN) has the potential to be transformational and disruptive, but opinions vary about how widespread adoption will be. One hindrance to adoption is network management, which tends to be an afterthought with a bright and shiny new technology. However, to help fuel SDN adoption, a conversation needs to happen now about how to manage it..."
                          Open Networking Moving Ahead 'Very Quickly'
                          Data Center Knowledge, February 7th, 2014
                          "If software is going to eat the world, it must first nibble on networking. And the networking community seems to have a large appetite for change.

                          That was the message last week at the annual summit of the Open Compute Project (OCP), which has taken a leading role in developing an open approach to networking. It's one of several efforts to bring about a future in which commodity networking hardware will be easily managed by software, all of which will be open.

                          Last year the OCP said it would begin building network switches. Within six months, Broadcom, Intel and Mellanox each submitted specifications for a top-of-rack switch..."

                          IT - Operations
                          Reduce IT failures with good CONOPS
                          GCN, February 5th, 2014
                          "Of late I have been working my way through a detailed and exceptional example of a concept-of-operations (CONOPS) document for a particular Navy IT system now under development. I am happy to say that this CONOPS actually accompanied the request for proposal to the vendors competing to build the proposed IT system. With the news full of government failures on large-scale IT projects, I contend that this one document, if done well, can be a strong indicator as to the success or failure of a large IT system.

                          So, what is a CONOPS document and why is it important?..."

                            Effective incident response
                            Help Net Securiity, February 6th, 2014
                            "Organizations are bombarded with potential threats every day. Most of these are small and irritating, not truly critical - but among those needles are little threads of larger actions at work. An incident response program enables you to pull out the needles that make up the haystack of the big picture, according to Jaime Blasco, Director at AlienVault Labs..."
                              Facebook Rethinks How It Builds Data Centers: Legos or IKEA?
                              Data Center Knowledge, February 6th, 2014
                              "Is Facebook ready to ditch its penthouse? The company is working on ways to streamline its data center construction, but it hasn't yet decided whether to go the Lego route or try the IKEA approach.

                              Facebook has built three massive data center campuses, but wants to accelerate the process and create a repeatable design for a 'Rapid Deployment Data Center' that can work anywhere in the world. The goal is to effectively cut construction time in half..."

                              IT - Security
                              IT Pros' Biggest 2014 Fear: Data Loss
                              CIO Insight, February 7th, 2014
                              "IT professionals face a multitude of issues each day, but none are larger than the threat of losing data or failing to properly backup and secure mission-critical information, according to a new survey of 230 IT workers by Iron Mountain. "As the volume of data continues to explode, companies are strapped with how to cost-effectively archive that information and protect it from potential data loss," says Jay Livens, director of product and solutions marketing at Iron Mountain..."
                              No One Solution in the Cybersecurity War
                              Bank Systems & Technology, February 5th, 2014
                              "In the fallout of the data breach that affected Target, Neiman Marcus, and other major retailers, many solutions have been proposed to ensure similar incidents don't happen in the future.

                              Many have claimed that a switch to EMV cards in the U.S. market would hinder future attacks such as these. In fact, Target CEO Gregg Steinhafel is one such advocate. In a CNBC interview shortly after the breach was made public he used the opportunity to push for EMV adoption in the U.S. Additionally, Target CFO John Mulligan told the Senate Judiciary Committee recently that the company is speeding up the process of implementing EMV-enabled POS terminals at its stores. He said the company's own credit cards would be EMV-enabled by the end of 2014, and all Target stores would be ready to accept EMV cards of any kind by January 2015..."

                              11 sure signs you've been hacked
                              Network World, February 3rd, 2014
                              "In today's threatscape, antivirus software provides little piece of mind. In fact, antimalware scanners on the whole are horrifically inaccurate, especially with exploits less than 24 hours old. After all, malicious hackers and malware can change their tactics at will. Swap a few bytes around, and a previously recognized malware program becomes unrecognizable.

                              To combat this, many antimalware programs monitor program behaviors, often called heuristics, to catch previously unrecognized malware. Other programs use virtualized environments, system monitoring, network traffic detection, and all of the above at once in order to be more accurate. And still they fail us on a regular basis..."

                              What do government security pros think?
                              Help Net Security, February 7th, 2014
                              "Tripwire and the Government Technology Research Alliance (GTRA) announced the results of a U.S. government cybersecurity survey that evaluated the attitudes and responses of 111 security and compliance professionals from U.S. government agencies and contractors.

                              'Cybersecurity continues to be one of the top priorities of senior executives in the federal government,' said Ron Ross, fellow at National Institute of Standards and Technology (NIST). 'Studies, such as this one, bring together important data points that help decision makers assess trends and take part in an ongoing dialog that will help us craft effective solutions to our difficult and challenging cybersecurity problems...

                              Despite Target data breach, PCI security standard remains solid, chief says
                              ComputerWorld, February 3rd, 2014
                              "The head of the organization in charge of maintaining security controls over credit card transactions insisted Monday that its standards remain solid despite the concerns raised by data breaches at Target and other companies.

                              Speaking with Computerworld, Bob Russo, general manager of the PCI Security Standards Council, downplayed criticisms about the effectiveness of the Payment Card Industry Data Security Standard (PCI DSS) and said it remains a vital part of the multi-layered approach needed to secure payment card data..."

                              Defending against drive-by downloads
                              Help Net Security, February 3rd, 2014
                              "In case you haven't heard the term before, a drive-by download (DbD) is a class of cyber attack where you visit a booby-trapped web site and it automatically, and silently, downloads and executes malicious code on your computer.

                              By default, web sites can't just download and run code on your computer, so a successful DbD attack relies on some sort of programmatic flaw or vulnerability in the software you use to surf the web. For instance, browsers like Internet Explorer, Firefox, Safari, and Chrome make the most obvious targets..."

                                Should you worry about memory-only malware?
                                InfoWorld, February 3rd, 2014
                                "The recent Target data heist of more than 40 million credit card records has many worrying about the impact of memory-only malware. The Target malware, a variant of BlackPOS, is part of a Trojan horse family known as Trojan.POSRAM. After the initial exploitation, these programs simply load themselves into RAM -- they don't install themselves on the hard drive.

                                The lack of "software footprint" makes RAM-only malware programs elusive. Some people say they're to be truly feared. Should we worry about them more than other malware programs?.."

                                  Going There: The Year Ahead in Cyber Security
                                  Re/code, February 5th, 2014
                                  "Last year, we saw some of the most significant events in the history of cyber attacks, including the largest DDoS attack on record, the Edward Snowden NSA revelations and evidence of nation-state cyber warfare against not only governments but also civilian organizations. What became clear in 2013 is that cyber threats are coming from complex operations funded by nation-states and private enterprises moving so quickly that they have outpaced many of the systems designed to stop them.

                                  Looking forward to the rest of 2014, we see a landscape of highly motivated bad actors continuing to attack organizations of all types. These bad actors are able to execute sophisticated and highly targeted attacks, and will remain an ongoing threat as they continually refine their strategies. Meanwhile, organizations are struggling to protect their confidential assets, and nation-states become more assertive about their offensive and defensive cyber capabilities. With that in mind, here's what the year could bring:..."

                                    Target breach happened because of a basic network segmentation error
                                    ComputerWorld, February 6th, 2014
                                    "The massive data breach at Target last month may have resulted partly from the retailer's failure to properly segregate systems handling sensitive payment card data from the rest of its network.

                                    Security blogger Brian Krebs, who was the first to report on the Target breach, yesterday reported that hackers broke into the retailer's network using login credentials stolen from a heating, ventilation and air conditioning company that does work for Target at a number of locations.

                                    According to Krebs, sources close to the investigation said the attackers first gained access to Target's network on Nov. 15, 2013 with a username and password stolen from Fazio Mechanical Services, a Sharpsburg, Pa.-based company that specializes in providing refrigeration and HVAC systems for companies like Target..."

                                    Survey: Most Employees Are Unaware of Their CompanyâÂÂs Data Security Protocols
                                    Bank Systems & Technologies, February 6th, 2014
                                    "The majority of employees have sent sensitive work documents via personal email, and most of them are unaware that their company doesn't allow that file-sharing behavior, according to a recent survey by GlobalSCAPE, a secure data-sharing solutions provider.

                                    The survey of more than 500 employees from various companies found that 63% of them had sent sensitive work documents from a personal email address, and 71% of those employees were wrongly under the impression that their company approved such use of personal emails. Of those employees that use personal email to share work documents, 73% of them said they do so at least once per month. And of that group, nearly a third said they have had their personal email hacked in the past..."

                                      Biometric authentication adds layers of IT security, one blood vessel at a time
                                      SearchCIO, February 6th, 2014
                                      "Our new Future State column focuses on an emerging technology and its potential impact on CIOs and their organizations. In this month's installment, SearchCIO's Senior News Writer Nicole Laskowski discusses the future of biometric authentication technology.

                                      Google most common passwords 2013, and you'll find that 123456 has nudged out password for the No. 1 spot. Yep, those easy-to-remember and oh-so-easy-to-hack favorites are still in play. (Cue the collective CIO sigh.) But there's good news on the not-so-distant horizon..."

                                      Is user activity monitoring the only way to spot stolen credentials?
                                      SearchSecurity, February 7th, 2014
                                      "Stolen account credentials have played a part in several massive data breaches, including the recent Target Corp. payment card data breach, leaving enterprises to question just how they can fend off attacks utilizing legitimate login details. One expert said user activity monitoring may be the only answer.

                                      Minneapolis, Minn.-based Target suffered a massive data breach over the holiday shopping period, exposing approximately 40 million customers' credit and debit card information, along with the personal details -- names, addresses, email addresses and phone numbers -- of as many as 70 million additional customers..."

                                      DDoS Attacks Against Datacenters On The Rise, Report Says
                                      Network Computing, February 6th, 2014
                                      "Despite widespread efforts to curtail them, distributed denial-of-service attacks continue to stake their place among the greatest threats enterprises face today.

                                      The likely reason? DDoS attackers -- who increasingly have extortion as their objective -- continue to evolve their strategies, seemingly staying one step ahead of information security teams..."

                                      IT - Careers
                                      IT Helps Fuel Record Jobs Demand as Skills Crisis Bites
                                      CIO, February 7th, 2014
                                      "Job vacancies rose at their fastest pace since May 1998 last month, with the technology sector helping to drive the market.

                                      The monthly Recruitment and Employment Confederation (REC) and KPMG Report on Jobs recorded the strong growth in demand, and says the rate of growth of permanent staff salaries remained "elevated" at the start of the year, holding at a pace broadly in line with December's six-year peak..."

                                        When the Headhunter Calls, Do This
                                        Forbes, February 5th, 2014
                                        "'That was an awesome speech!' said the young man carrying my suitcase. 'The second-years gave us a hint of what to expect. You're a riot in person. I can't believe you got our MBA class to sing 'Bohemian Rhapsody.'"

                                        'Are you excited about graduation,' I asked the young man.

                                        'Yes and no,' he said. 'Excited to be working and finished with the program. Nervous about my job search. Know any good headhunters?'

                                        Why do all the people who aren't search-friendly candidates - new college graduates' freshly-minted MBAs' and mid-life career-changers - always ask for search firm recommendations? I have to imagine they don't understand how the search business works..."

                                          Top 10 Ways to Improve Your Cloud Career and IT Skill Set
                                          Data Center Knowledge, February 3rd, 2014
                                          "It's early 2014 and what have you done to progress your IT career? Technology is moving at a scorching pace. The latest report from Cisco's Cloud Index shows that annual global cloud IP traffic will reach 5.3 zettabytes by the end of 2017. Furthermore' by 2017' global cloud IP traffic will reach 443 exabytes per month (up from 98 exabytes per month in 2012).

                                          All of this activity creates new types of positions. New data center demands are creating a wide array of new types of specialists. Engineers become architects' programmers become cloud designers' and database administrators become data scientists! There are a lot of new and interesting options out there to help you push your career to the next level..."

                                          Breaking Down Worker Silos
                                          Re/code, February 5th, 2014
                                          "Data silos occur when data stored in separate servers or services can't interact with information in other systems. They're a major problem that causes limited workplace collaboration - according to a recent Oracle survey' in the past six months' 54 percent of IT execs have been forced to stop working when cloud apps weren't properly integrated with other apps in the enterprise. Another 83 percent say they can't get the most out of the apps their department uses' because of integration issues.

                                          While data silos are a major purveyor of diminished workplace efficiency, 'worker silos' may be an even worse problem. These are organizational human architectures that prevent employees from collaborating. Luckily, three megatrends of tech - mobile, social and video technology - may offer a recipe to end such disjointed systems. To explore how, I spoke with David Boyll, director of digital media technology at Oracle, and David Birnbaum, vice president of learning at Coldwell Banker Real Estate..."

                                          12 predictions for the future of programming
                                          ComputerWorld, February 3rd, 2014
                                          "If hitting a target is hard and hitting a moving target is even harder, then creating a new hit technology is next to impossible because the shape and nature of the target morphs as it moves. Think of building a swish new laptop just as laptops are heading out of favor, or a must-have mobile app just as smartphones plateau, or a dynamite tablet experience just as the wearable future takes hold..."
                                            IT - Email
                                            Email proliferation demands robust, scalable records management
                                            GCN, February 6th, 2014
                                            "With the 2012 President's Managing Government Records Directive (MGRD), federal agencies were required to finally make the transition to electronic record keeping and address the challenge of managing email for both records management and e-discovery purposes.

                                            Email represents perhaps the highest volume and greatest risk to agencies in the event of litigation, Freedom of Information Act requests and investigations - and the volume is growing to where many agencies are creating well over 1 million email messages daily..."

                                            Companies Are Banning E-mail to Improve Efficiency
                                            Bank Systems & Technologies, February 6th, 2014
                                            "The short answer points to a number of studies have that conclude internal e-mails and productivity do not mesh well: Independent research by Atos Origin highlighted that the average employee spends 40 percent of the week dealing with internal emails which add no value to the business. Read full story on Wall Street & Technology

                                            Post a comment to the original version of this story on Wall Street & Technology..."

                                              Malware laden emails at five year high
                                              Help Net Security, February 4th, 2014
                                              "This past month of January we saw a pretty incredible spike in virus traffic. Other unsolicited emails ebbed and flowed throughout the month resulting in a regular average amount of traffic after all was said and done.

                                              The biggest news that everyone was talking about at the top of the2014 was all of the major breaches that made the headlines. Target was the first to enter the spotlight first announcing that between the period of Black Friday and December 6th malware that was placed directly on their POS systems siphoned off around 40 million customer credit and debit card numbers as well as information associated with those accounts..."

                                                9 Email Productivity Secrets That Will Get Your Life Back
                                                Forbes, February 5th, 2014
                                                "Does it sometimes feel like email is taking over your life? Considering that reading and responding to email accounts for about 28% of our total workweek, this isn't much of an exaggeration.

                                                The good news is that there are practical and proven ways to help reduce the time you spend dealing with email. Most will take a little planning and a commitment to simplifying your daily email routine, but all are easily within your reach..."

                                                  Making The Right Hybrid Storage Array Buying Decision: Oracle Zs3 Series Stands Out As A Hybrid Enterprise Storage Solution
                                                  By Claudiac Caramelli
                                                  Claudiac writes, "In a new Head-to-Head Product Report on Hybrid Storage Arrays, the Data Center Infrastructure Group (DCIG) concluded that "the EMC VNX5400 is probably the most ill-equipped of these arrays to meet enterprise performance demands short and long term". The report goes on to say that "the Oracle ZS3 Series stands out in stark contrast to other offerings from enterprise storage providers. It gives enterprise organizations the features they need in a hybrid storage array without having to compromise."

                                                  What to say more? Just review the full report HERE..."

                                                  IT - Mobile
                                                  By 2016, 30% of organizations will use biometric authentication on mobile devices
                                                  Help Net Security, February 4th, 2014
                                                  "The consumerization of IT and business BYOD programs have resulted in potential security problems for IT leaders, according to Gartner. User expectations of a clean and simple mobile user experience often outweigh security concerns, and the same valuable data guarded by complex passwords and security measures on PCs can be left vulnerable on mobile devices.

                                                  Gartner predicts that, by 2016, 30 percent of organizations will use biometric authentication on mobile devices, up from five percent today..."

                                                  Make the case for mobility
                                                  CIO Insight, February 3rd, 2014
                                                  "The cavalcade of new mobile devices hitting the market forces agencies to continually reassess their mobility choices: Is this smartphone something we should support? How can we secure this tablet? Is building our infrastructure to support this device worth our budget dollars?

                                                  Yet tried-and-true approaches to mobility by federal leaders suggest that success begins not with a device, but with a proper business case that outlines the need for a mobile application or service..."

                                                  Payments made via mobile devices surge to about 20% of all transactions, processor says
                                                  IT World, February 3rd, 2014
                                                  "Payments made with mobile devices such as smartphones and tablets rose 55% over last year, reaching a total of 19.5% of all transactions processed worldwide in December by Amsterdam's Adyen.

                                                  Apple iPads and iPhones were the most used devices for mobile payments, according to Adyen's tally, with the iPad accounting for 41% of mobile transactions during the busy September to December holiday shopping period. The Apple iPhone took the second spot with 31.6% of mobile-payment transactions, while Android smartphones stood at 20% and Android tablets at just 6.6%. Microsoft Windows Mobile and BlackBerry devices each accounted for less than 1%..."

                                                  Mobility is the weakest security link
                                                  Help Net Security, February 7th, 2014
                                                  "Surveying more than 750 security decision makers and practitioners, a CyberEdge Group report found that more than 60 percent had been breached in 2013 with a quarter of all participants citing a lack of employer investment in adequate defenses.

                                                  Key findings include:..."

                                                  Mobile data traffic is expected to explode 11-fold by 2018
                                                  Computerworld, February 5th, 2014
                                                  "Networking experts are running out of superlatives to describe the coming tidal wave/explosion/cataclysm of mobile data traffic.

                                                  Cisco today said mobile data is expected to grow by 11 times in the next four years, reaching 18 exabytes per month by 2018. An exabyte is 1 billion gigabytes.

                                                  Mobile data traffic is expected to grow by 61% annually into 2018, with the extra traffic from just one year -- 2017 -- expected to be triple the entire mobile Internet in 2013..."

                                                  IT - Big Data
                                                  CIOs Fall Short in Reaping Gains From Big Data
                                                  CIO Insight, February 3rd, 2014
                                                  "They set aside big bucks to gather it. They hire hotshot IT talent to analyze it. And the highest levels of the C-suite are determined to fully exploit it in the interest of ROI. So why do so many organizations struggle with big data? Because they're still trying to figure out the best way to gather, integrate and make sense out of it..."
                                                  Big Data Won't Happen if People Can't Use the Apps
                                                  Big Data Republic, February 6th, 2014
                                                  "As we move from a busy 2013 for big data and into what is shaping up to be an even bigger year -- with IDC telling us that the big data technology and services market will grow at a massive 27% compound annual growth rate (CAGR) in the next five years, hitting $32.4 billion by 2017 -- it seems timely to remind ourselves that technology won't do this by itself..."
                                                  The dirty truth about big data and NoSQL
                                                  InfoWorld, February 6th, 2014
                                                  "If I asked you for the defining characteristic of a big data customer, you'd probably say they're sitting on large amounts of data. If I asked for the defining characteristic of a NoSQL customer, you might answer they require high levels of concurrency.

                                                  Well, if that's the total market for NoSQL and big data, then both MongoDB, Inc., as well as the various companies supporting Hadoop should probably shut their doors and call it a day..."

                                                  Big Data skills pay top dollar
                                                  Network World, February 7th, 2014
                                                  "Tech salaries saw a nearly 3% bump last year, and IT pros with expertise in big data-related languages, databases and skills enjoyed some of the largest paychecks.

                                                  Average U.S. tech salaries climbed to $87,811 in 2013, up from $85,619 the previous year, according to Dice's newly released 2013-2014 Salary Survey. Significantly, nine of the top 10 highest paying IT salaries are for skills related to big data, says the tech career site..."

                                                  Preparing for the Big Data Deluge
                                                  CIO Insight, February 3rd, 2014
                                                  "These days, discussions about big data and analytics are inescapable. Virtually every field - from medicine and financial services to manufacturing and science - is being redefined and rewired by the ability to put ever-growing data sets, both structured and unstructured, to work.

                                                  And we've only just begun. The deluge of data will become a flood in the months and years ahead. Cisco Systems predicts the number of Internet-connected devices will reach about 15 billion by 2015, which is twice the world's population. The figure is expected to rise to 40 billion by 2020. And Cisco anticipates that 99 percent of all devices will eventually be connected. Of course, these devices will generate exponential increases in data volume..."

                                                  Big data today will be the norm tomorrow
                                                  FCW, February 6th, 2014
                                                  "Big data seems like a complex, complicated and potentially expensive investment that leaves many executives pondering whether they should jump aboard this latest and greatest analytics boom or wait for the next big thing in IT.

                                                  Bill Franks, author of "Taming the Big Data Tidal Wave" and chief analytics officer at Teradata, believes that public- and private-sector organizations that capitalize on big data in the technology's infancy will seize an early competitive advantage. Those that wait for answers to early questions about big data -- and there are many -- will almost certainly lag behind early adopters in formulating intelligent IT initiatives..."

                                                  CIOs Need Predictive Analytics to Excel
                                                  CIOInsight, February 6th, 2014
                                                  "CIOs must turn to predictive analytics to help their organizations navigate the swift pace of business changes, according to a new research report from Gartner. The report, "Predicts 2014: Business Process Reinvention Is Vital to Digital Business Transformation," compiles information and findings from a cross section of Gartner's highly followed surveys, reports and presentations. Gartner concludes that technologies depending solely upon historical measures are quite literally a thing of the past, and that solutions which effectively use predictive metrics or leading indicators will ensure a competitive edge..."
                                                  IT - BYOD
                                                  Our Love Affair With the Tablet Is Over
                                                  re/code, February 6th, 2014
                                                  "Back in 2011 I was having an all-consuming love affair with tablets. At the time I was the first-ever head of mobile at Netflix. I saw tablets in my sleep, running apps that would control homes' entertain billions and dutifully chug away at work. Tablets, I was convinced, were a third device category; a tweener that would fill the vacuum between a phone and a laptop. I knew that was asking a lot - at the time, however, I didn't know just how much..."
                                                  Top Ten Articles for last few Issues
                                                  Vol 191 Issues 1, 2, 3, 4 and 5; Vol 190 Issues 2, 3 and 4
                                                  We track how frequently each article is viewed on the web site to determine which the readers consider the most important. For last week, the top 10 articles were:

                                                  • How to Get the ZFS Disks List with ZPOOLName
                                                  • SPARC T5-2 Server Shatters Another World Record and Gets Single-Processor Configuration
                                                  • Oracle Book: The World of Big Data
                                                  • Revolutionizing Server Economics: Terabyte-Scale Computing Without the Premium
                                                  • New Version of LibreOffice - 4.2
                                                  • Java EE 7 Adoption Looking Pretty Good
                                                  • January issue of the Enterprise Manager Indepth Newsletter
                                                  • SaskTel to Upgrade Network Infrastructure
                                                  • Oracle PSRM v2.3.1 Exadata Performance Benchmark Data Sheet
                                                  • Gina Tricot Scales Online Sales with MySQL Enterprise Edition

                                                  The longer version of this article has list of top ten articles for the last 8 weeks.

                                                    IT - Encryption
                                                    A case for opportunistic encryption on the web
                                                    SC Magazine, February 5th, 2014
                                                    "When, in 2010, I scanned about 90 million web sites (all .com, .net, and .org domain names that existed at that time) in order to determine their support for encrypted communication, I was dismayed to discover that only about 0.5 percent had means to protect their data in transit. The vast majority made no attempt to encrypt anything. Looking at only the top one million websites, the situation is better, but - with only about 10 percent of those sites supporting encryption - not significantly better..."
                                                    13 Resources To Learn The VI/VIM Text Editor
                                                    Screencasts, Tutorials, Cheatsheets
                                                    Making the switch from one text editor to another is not easy. Most programmers agree that the time it takes to become comfortable with the new editor becomes a major hindrance for their work. As a result, many don't make the switch.

                                                    Still, VIM is one of the most popular text editors around. So, if you're looking to make the switch then these resources will make the transition much smoother for you. Watch the screencasts and read through the tutorials if you need. Keep the cheatsheets handy to get around the editor easily.

                                                      Back Up a Thousand Databases Using Enterprise Manager Cloud Control 12c
                                                      by Porus Homi Havewala
                                                      Porus writes, "Oracle has long supplied a powerful utility, Oracle Recovery Manager (RMAN), along with the database software install, which is used to backup and recover Oracle databases, either as a complete or incremental backup. The scripts are placed in a shell script wrapper at the Unix level, and then scheduled using the Unix cron job facility. These scripts need to be tested, verified and maintained.

                                                      While this task is manageable for one or two databases, the same task must be repeated with every new database or every new database server that is provisioned-and the time spent on setting up such backups increases correspondingly.

                                                      In this technical article, we will see how the DBA can set up and schedule RMAN database backups for thousands of databases using Enterprise Manager Cloud Control 12c more easily and efficiently than the older, more time-consuming, manual method of performing Unix shell scripting and cron jobs for each database to be backed up..."

                                                      Trending in
                                                      Vol 234, Issue 2
                                                      Trending IT Articles