News about Oracle's Solaris and Sun Hardware
System News
Feb 10th, 2014 — Feb 16th, 2014 Generate the Custom HTML Email for this Issue
System News System News for Sun Users
Volume 192, Issue 2 << Previous Issue | Next Issue >>
Sections in this issue:
click to jump to section

SPARC M6-32 Delivers Oracle E-Business and PeopleSoft World Record Benchmarks
Linear Data Warehouse Scaling in a Virtualized Configuration
Brian says that this result demonstrates how the combination of Oracle virtualization technologies for SPARC and Oracle's SPARC M6-32 server allow the deployment and concurrent high performance execution of multiple Oracle applications and databases sized for the Enterprise:

In an 8-chip Dynamic Domain (also known as PDom), the SPARC M6-32 server set a World Record E-Business 12.1.3 X-Large world record with 14,660 online users running five simultaneous E-Business modules.

In a second 8-chip Dynamic Domain, the SPARC M6-32 server set a World Record PeopleSoft HCM 9.1 HR Self-Service online supporting 35,000 users while simultaneously running a batch workload in 29.17 minutes. This was done with a database of 600,480 employees. Two other separate tests were run, one supporting 40,000 online users only and another a batch-only workload that was run in 18.27 min.

In a third Dynamic Domain with 16-chips on the SPARC M6-32 server, a data warehouse test was run that showed near-linear scaling.

Read on for details ....

Steps to Fast Track your Database Cloud implementation on Exadata
By Nilesh Agrawal
Nilesh writes, "Oracle Exadata Database Machine is the ideal consolidation platform for Enterprise Database Cloud and Oracle Enterprise Manager provides the most optimized and comprehensive solution to rapidly setup, manage and deliver Enterprise Clouds. Clearly, very significant innovations have been delivered via Exadata X4, Enterprise Manager 12c and Database 12c in Cloud Computing space and customers can start realizing benefits from this combination of most powerful and unique enterprise database cloud solution in industry...

In this blog post, I will walk through the steps aiming to simplify DBaaS Setup on Exadata ..."

IT - Storage
Redefining mission-critical storage tiers
Computerworld, February 11th, 2014
"The traditional model of tiered storage is broken. 'Fast and expensive vs. slow and cheap' doesn't match how people actually use storage.

But there is a better way: service classifications.

A number of years ago I was asked to put together a storage tier strategy for one of my customers. At that time, automated storage tiering as we know it was still years away and I was a little reluctant to take on the project because tiering seemed overhyped back then.

This thing is, I'd never really seen storage tiering deliver on the promises that were made for it. On the other hand, the project offered a good opportunity to review some of the underlying assumptions driving their storage requirements, such as application availability, data protection and data management..."

4TB Hard Drives Bring RAID 6 To Its Limits
Business Computer World, February 5th, 2014
"4TB hard drives are becoming increasingly common and affordable, but many administrators are doubtful whether they should really use them. The problem is that a hard drives rebuild time increases in linear fashion along with increasing size.

It can take two to four days for a new 4TB drive in a RAID array to be filled with data from the failed disk. The danger is that two further hard drives might fail in this time. RAID 6 can tolerate two simultaneous hard drive failures, but as soon as a third one fails, data is lost..."

Java Technology
10 Reasons Why You Should Opt For Java As Your Programming Language!
EFYTimes, February 10th, 2014
Here are 10 reasons why you should program in Java:

  • Java is fun
  • Java is free
  • Java is dynamic
  • Java has a wealth of free online support
  • Java is backed by Oracle
  • Java has 3rd party support
  • Java is platform independent
  • Java has powerful development tools
  • Java is advanced
  • Java is easy to learn

Read on for deails.

IT - Technology
5 issues that could hamper EMV smartcard adoption in the U.S.
Computerworld, February 11th, 2014
"Migrating U.S. payment systems to the Europay MasterCard Visa (EMV) smartcard standard could take significantly longer than envisioned and offer fewer security benefits than what's being touted by proponents of the technology.

In the weeks following the massive data breach at Target, the EMV standard has received considerable attention from stakeholders in the payment industry and from lawmakers..."

Fibre Channel Will Come with 32-Gigabit, 128-Gigabit Speeds in 2016
IDG News, February 11th, 2014
"Storage teams will be able to double the performance of their Fibre Channel infrastructure starting in 2016, while the real speed demons among them will have a chance to multiply it by eight times.

"Gen 6" Fibre Channel switches and adapters that can deliver 128Gbps (bits per second) should hit the market in 2016, the Fibre Channel Industry Association said on Tuesday. That same year, vendors will also offer Gen 6 products with 32Gbps, it said. Fibre Channel specifications are developed by a committee of ANSI (the American National Standards Institute) in cooperation with the industry group..."

How Single Use Virtual Cards Can Improve Digital Payments Security
Bank Systems & Technology, February 14th, 2014
"The recent data breaches at major retailers have brought greater public awareness to digital payments security, with much of that attention mistakenly going to EMV. EMV chip-and-PIN technology would not secure card-not-present payments like those involved in the data breaches. But there are solutions that exist that could help secure online card-not-present transactions. One example is single use virtual cards, a solution that is already gaining traction in commercial payments where the security it offers is attractive to corporations looking for a secure way to make digital payments..."
Could This Glass Orb Be The Future Of Solar Energy?
ThinkProgress, February 12th, 2014
"André Broessel's latest invention looks like something out of a superhero movie. The bifrost device depicted in Thor, perhaps, or Eric Selvig's wormhole machine in The Avengers. In reality, though, it's a stand-alone solar energy generator. And if nothing else, it's much more interesting to look at than your standard photovoltaic solar panel.

But Broessel's invention may be more than just aesthetically pleasing. According to a recent report in Fast Company, the German architect touts his orb-like system as being 35 percent more efficient than a standard panel, doing even better when combined with a tool for tracking the sun..."

    10 industries 3D printing will disrupt or decimate
    TechRepublic, February 12th, 2014
    "As it evolves, 3D printing technology is destined to transform almost every major industry and change the way we live, work, and play in the future...

    For better or worse, the 3D printing industry is poised to transform nearly every sector of our lives and jumpstart the next industrial revolution. Sound like a hyperbole? We've compiled a list of 10 major impacts the 3D printing ecosystem will have on businesses, consumers, and the global economy. If you're just diving into the world of 3D printing, first take a look at my introduction on 3D printing industry basics to quickly get up to speed: 10 facts on 3D printing: Understanding tech's next big game-changer..."

    IT - Bitcoin
    Bitcoin Touches $220 On Mtgox After Horrific 60% Price Crash
    Bitcoin, February, 16th, 2014
    "Bitcoin is currently trading at near $250, according to Bitcoin exchange MtGox. It got as low as $220.29 from a high of $540.

    Once the largest platform for trading Bitcoin, MtGox recently halted withdrawals, which exacerbated people's fears about having their wealth in the digital currency.

    The good news for Bitcoin adherents is that the currency is still trading near $600 on other exchanges..."

    Why We Accept Bitcoin
    Forbes, February, 13th, 2014
    "The following guest post is by Roger Wu, cofounder of the native advertising and storytelling platform

    Our company is now accepting Bitcoin as a valid form of payment and will soon be offering to our publishers a Bitcoin payout if they desire. While the future of Bitcoin is still undecided, we did our research and decided to accept them after speaking to a number of experts. Bitcoin is quite complex, but while understanding TCP/IP is exciting, it is not needed in order to send an email; understanding the underlying mathematics and cryptography is unnecessary although quite fascinating: Bitcoin and other related crypto currencies just work. We summarize the top five reasons that we heard consistently from our pundits..."

    For the Bitcoin app builder comes a toolkit from BitPay
    PC World, February, 14th, 2014
    "Bitcoin developers tired of working with clunky APIs to build their apps have a new option that goes straight to the source.

    Bitcore is an open-source JavaScript library introduced Friday by BitPay, a major processor of Bitcoin payments. Bitcore provides a native interface to the Bitcoin network to ease the app development process.

    The Bitcoin system itself is built on open-source software, so think of Bitcore as a return to its roots. 'We believe that developers contemplating new Bitcoin projects should not have to resort to using proprietary APIs hosted on services running closed software,' BitPay said in announcing the library..."

    Bitcoin regulation coming this year
    CNN, February, 12th, 2014
    "New York state's top financial regulator has detailed his plans to regulate bitcoins sometime this year. Benjamin Lawsky, New York's financial services superintendent, said he will issue "BitLicenses" to companies dealing with bitcoins. That would mark the most significant step thus far in the United States to regulate the digital currency.

    "Our objective is to provide appropriate guardrails to protect consumers and root out money laundering -- without stifling beneficial innovation," Lawsky said at a currency conference in Washington., D.C., on Tuesday..."

      India Raises Concerns On Bitcoin.s Credibility, But Doesn.t Call It Illegal Yet
      TechCrunch, February, 11th, 2014
      "Bitcoin traders are having a roller coaster ride everywhere, and India is no exception. After initial momentum that saw several Bitcoin exchanges emerge in India, the Reserve Bank of India issued a warning that sent many traders into a tizzy last year.

      Now, Raghuram Rajan, the RBI's new governor, has reiterated the central bank's concerns about the credibility of Bitcoin. Addressing a technology conference in Mumbai earlier today, Rajan said there are ambiguities about who controls the value of Bitcoin..."

      Bitcoin At The Wrong End Of A Gun
      Forbes, February, 12th, 2014
      "Anarchists, minarchists and libertarians all over the world have looked at Bitcoin and seen in its promise an escape from the tyranny of government and its overarching regulation.

      Most people don't mind rules in general but tend to hate the ones that apply to them in particular. So it is understandable that people don't like government and in itself that's not a bad thing.

      Too much government is bad because any monopoly is not good for customers, whether it's the phone company, an oil business or a provider of social services and safety nets. The role of government has been growing in the west and as it does more and more people have become disillusioned with it..."

      IT - FOSS
      7 Reasons Not to Use Open Source Software
      CIO, February 11th, 2014
      "Talk to an open source evangelist and chances are he or she will tell you that software developed using the open source model is the only way to go. The benefits of open source software are many, varied and, by now, well-known. It's free to use. You can customize it as much as you want. Having many sets of eyes on the source code means security problems can be spotted quickly. Anyone can fix bugs; you're not reliant on a vendor. You're not locked in to proprietary standards. Finally, you're not left with an orphaned product if the vendor goes out of business or simply decides that the product is no longer profitable..."
      MySQL February Newsletter
      Find out the latest news on MySQL products and MySQL Connect 2014
      The MySQL February Newsletter is available. Find out the latest news on MySQL products and MySQL Connect 2014, and read the technical tips written by MySQL experts at Oracle and in the community. Below are the highlights in this edition:

      • Start Preparing for MySQL Connect 2014 Call for Papers
      • New GA Release: MySQL for Visual Studio
      • Blog: State of the UNION
      • Blog: New MySQL Web Installer -- Have You Tried It Yet?
      • Blog: MySQL Workbench: Frequent Crashes on Mac OS X? This Might Be The Fix
      • Event: MySQL Seminars Are Coming to a City Near You

      You can read it online or subscribe to it to receive the latest updates right in your inbox.

      Unbreakable Enterprise Kernel
      Release 3 Quarterly Update 1
      Michele Casey writes, "We are pleased to announce the availability of Unbreakable Enterprise Kernel Release 3 Quarterly Update 1 (UEK R3U1) for Oracle Linux 6. This is the first quarterly update release for UEK R3 (Version 3.8.13-26) and includes driver updates as well as a consolidation of fixes for bugs and security issues.

      Some notable highlights include:

      • Xen improvements to the block and network frontend and backend architecture
      • Support for the crashkernel=auto kernel parameter to simplify Kdump configuration
      • New feature for enabling static probes in kernel modules with DTrace
      • Device driver updates (e.g. storage devices, network cards) from key partners, such as: Broadcom, Cisco, Emulex, HP, Intel, LSI, Mellanox, Qlogic

      For more details, please review the release notes.

      The source code is available on our public git repository....

      10 Books For Linux System Administrators
      Books praised by many Linux power users
      System administration is one of the most essential task of Linux. You realise the operating system's true power only after you gain command over this aspect. There are some books that are especially useful for this purpose. These 10 books may not be free, but they have been praised by many Linux power users.

      • UNIX and Linux System Administration Handbook, by Evi Nemeth, Garth Snyder, Trent R. Hein, Ben Whaley
      • Essential System Administration, by Æleen Frisch
      • The Practice of System and Network Administration, by Thomas Limoncelli, Christina Hogan, Strata Chalup
      • Pro Linux System Administration, by James Turnbull, Peter Lieverdink, Dennis Matotek
      • Linux System Administration, by Tom Adelstein, Bill Lubanovic
      • Automating System Administration with Perl, by David N. Blank-Edelman
      • The Visible Ops Handbook, by Kevin Behr, Gene Kim, George Spafford
      • Automating Linux and Unix System Administration, by Nathan Campi, Kirk Bauer
      • Python for Unix and Linux System Administration, by Noah Gift, Jeremy Jones
      • Linux Firewalls, by Michael Rash

      Read on for details.

      OCFS2 Best Practices Guide
      27-Page White Paper
      OCFS2 is a high performance, high availability, POSIX compliant general-purpose file system for Linux. It is a versatile clustered file system that can be used with applications that are non-cluster aware and cluster aware. OCFS2 is fully integrated into the mainline Linux kernel as of 2006 and is available for most Linux distributions. In addition, OCFS2 is embedded in Oracle VM and can be used with Oracle products such as the Oracle Database and Oracle RAC solutions.

      OCFS2 is a useful clustered file system that has many general purpose uses beyond Oracle workloads. Utilizing shared storage, it can be used for many general computing tasks where shared clustered storage is required. Its high performance and clustering capabilities set it apart from many other network based storage technologies. Cluster aware applications can take advantage of cache-coherent parallel I/O from more than one node at a time to provide better performance and scalability. Uses for OCFS2 are virtually unlimited, but some examples are a shared file system for web applications, database data files, and storing virtual machine images for different types of open source hypervisors.

      See the white paper for details.

      IT - Cloud
      Cloud Computing Takes Off With SaaS
      InformationWeek, February 10th, 2014
      "IT departments have been using IaaS and PaaS as a set of training wheels for the real deal in cloud computing: SaaS. In 2013, enterprise organizations spent a great deal of time offloading servers into infrastructure-as-a-service or platform-as-a-service models. Software-as-a-service was just as popular, but you can look for the software-centric cloud to thrive as companies hand over more of the IT management reins.

      IaaS and PaaS gained popularity primarily because they allowed organizations to test cloud providers without giving up complete control over managing applications. IT decision makers often pushed brand-new applications and services into a SaaS model, but they were hesitant to offload the full management of highly customized and mission-critical software in production. As a compromise, they experimented with IaaS and PaaS to offload infrastructure to a third party while allowing application-level management by in-house IT staff..."

      3 CIO no-no's when moving to the cloud
      InfoWorld, February 10th, 2014
      If you want your cloud efforts to fail or struggle, ignore these three warnings ...

      We're well on our way to moving applications and data to the cloud. So far the results are pretty good. However, enterprise IT is collectively finding a few details can go wrong, and some of them start at the CIO level. CIOs are a bit perplexed when it comes to cloud computing. It's clearly an industry trend that all CIOs should consider, but the impact on enterprise IT is huge. The risks are big, as is the cost of moving. There are no clear paths, and you have to do some deep thinking around the true value of cloud computing..."

      When should you start firing the .cloud blockers?.
      Gigaom, February 14th, 2014
      "When you begin to discuss the use of cloud computing amongst groups in enterprise IT, you get either smiles or folded arms. It's either 'over their dead body,' or 'Let's start tomorrow.' The cloud is polarizing.

      This is nothing new. Those in the organization who don't get cloud, deny cloud, or outright fight against cloud have been around since the beginning of cloud. I know; I was there. They were once the majority..."

      6 key questions to ask when designing cloud architecture
      ZDNet, February 13th, 2014
      "Too often these days, organizations plow ahead with cloud computing projects, without considering how it fits into the rest of the enterprise. An enterprise architecture approach will help align cloud plans with the short-term and long-term needs of the organization -- just as it has helped with on-premises systems.

      In his latest book, titled Architecting the Cloud: Design Decisions for Cloud Computing Service Models, Mike Kavis, a seasoned chief technology officer and IT architect, shows how cloud proponents can map out their cloud plans.

      Mike identifies the five key questions that are essential to cloud architectural planning:..."

      Why Cloud ERP Adoption Is Faster Than Gartner Predicts
      Forbes, February 7th, 2014
      "A recent study completed by Gartner titled Survey Analysis: Adoption of Cloud ERP, 2013 Through 2023 published on January 24, 2014, written by Nigel Rayner advises CIOs and application leaders of financial services institutions to 'consider cloud ERP as a potential replacement for aging core ERP systems that are out of support or running on an old technology platforms (such as mainframes).'

      The methodology is based on a survey of Gartner Research Circle members from North America, EMEA, APAC and Latin America from companies that range in size from $10M to $10B.

      Key take-aways of the study including the following:..."

      Three Flawed Issues About Cloud Computing
      CIO Insight, February 11th, 2014
      "When cloud computing first became the rage, a lot of IT executives who were dismissive of it as the latest fad and went back to business as usual. Now that cloud computing has made significant inroads in the marketplace, many CIOs are feeling threatened by it. They are acting defensive, using legitimate issues like security, compliance and outages as counterarguments as to why companies shouldn't migrate services to the cloud.

      While these are legitimate concerns, the progressive CIO will look as these issues as we do any other reasonable risk in a service delivery model - not as an excuse to avoid using the service, but as a variable that needs to be addressed by proactive contingency planning and thoughtful architectural design..."

      IT - CxO
      Are CIOs losing power?
      Computerworld, February 7th, 2014
      "IT departments are becoming centers of collaboration between CIOs business leaders working to acquire new technoloigies...

      There's a school of thought that IT departments -- and CIOs -- are disappearing. As more and more businesses buy cloud-based services, and turn to self-service and bring-your-own-device models, IT decision making is spreading throughout an organization, some experts say.

      A new study by Forrester illuminates the changing IT landscape. It found that the share of IT projects primarily or exclusively run by IT department will decline from 55% in 2009 to 47% in 2015..."

        Dealing With Divas
        Enterprise Efficiency, February 12th, 2014
        "As a senior manager or CIO, you're probably blessed with a few star employees whom you count on to make your department run smoothly -- people you can count on to be 'left alone to get the job done.' However, new research shows you might be going about it the wrong way.

        Everyone who follows sports or any kind of entertainment knows about the fragile star. Whether it is the actor who is annoyed because you don't get his good side or the star basketball player who goes into a slump after missing a game-winning shot, the emotional diva is an understood concept. But they don't exist in business, do they?..."

        An executive guide to IT investment, growth, and development in 2014
        SearchCIO, February 14th, 2014
        "After years of razor-thin margins, IT executives finally have the necessary resources at their disposal to drive value to the business. So, now that you have the essential staff and required funds available, what should you tackle first? In this exclusive guide, uncover emerging IT trends that are sure to benefit your company's overall health, lead to continued growth, and ensure you're realizing maximum performance potential, no matter what industry you're in..."
        Long Live the CDO
        Enterprise Efficiency, February 14th, 2014
        "Chief Digital Officers already make more money than CIOs, but they're not satisfied with that, oh no. Next thing they'll do is make all CIOs assimilate or die. You want to survive? Become thine enemy. Prepare yourself to fight to the death, or become a CDO now, because chances are, only one of you is coming out of this fight alive..."
        What CIOs Need to Know About Business Alignment
        CIO Insight, February 11th, 2014
        "By now, CIOs are highly aware of the C-suite's growing interest in aligning IT planning, investment and deployment with strategic business goals. Despite the fact that much of this activity is driven by the increasingly unpredictable and rapid pace of market shifts, many organizations are still moving too slowly toward this goal. CIOs and tech departments are hardly the sole parties to blame, findings show. In many cases, their best efforts are undermined by the existing corporate culture. It's difficult, after all, to work with business teams on optimal IT acquisition and usage when those same business teams go out and buy a load of apps without even telling the CIO or his or her tech team..."
        CIOs: Frame the Game Your Staff Is Playing
        Enterprise Efficiency, February 13th, 2014
        "If you've got trouble managing your staff or getting them to work together it might be because they're all playing a different game. We often call this a culture problem, but it might be more about how you frame the game you want everyone to play.

        A recent MIT Sloan Management Review post pointed to research from 2012 that can really help CIOs and managers change their culture (and that of their enterprise) through some rather simple steps. (The original research is gated but it is here.).."

        Elevating the conversation: How to better communicate with business
        ComputerWorld, February 12th, 2014
        "A new year is an opportunity to reflect. For me, how IT positions itself within the business is top of mind. How are we communicating our value to the rest of the organization? While we'll always have to address delivery challenges, IT won't be considered partners and peers with business if we focus our dialog solely on tactical issues or technical difficulties.

        Instead, the discussion needs to be framed in terms of our strategic business value and how we are growing it. Here are my plans going forward, and some other ideas to help you form a communication plan of your own..."

          Many CIOs Are Unprepared For The Next Era In Enterprise IT
          Forbes, February 11th, 2014
          "The next era of enterprise IT is upon us, but many CIOs are not prepared to manage the demands that come in this new era. We refer to this next era as the digitalization of IT, and it's the beginning of the digital industrial economy.

          According to Gartner's annual CIO Agenda survey, the CIOs responded to say that they often feel overwhelmed by the prospect of building digital leadership while, at the same time, renovating the core of IT infrastructure and capability for the digital future. The survey found that 51 percent of CIOs are concerned that this change is coming faster than they can cope and 42 percent don't feel that they have the talent needed to face this future..."

          CIOs still control most IT spending
          Computerworld, February 10th, 2014
          "CIOs still have the last word over most IT spending, but over time they will work more closely with business units on buying decisions, a Forrester Research survey finds.

          Only 6.3 percent of new technology purchases in the U.S. were made and implemented solely by business units in 2013, according to the report's author, Forrester vice president and principal analyst Andrew Bartels. Some 9 percent of spending involved technology the business unit chose but the CIO's team implemented and managed.

          However, "the ideal tech-buying process is one in which the business and the CIO's team work together to identify a need, find and fund a solution, choose the right vendor or vendors, implement it, and manage it," Bartels wrote in the report. "We estimate that more than a third of tech purchases will fit that profile by 2015."

          Verizon Report: Many Organizations Still Fall Short On PCI Compliance
          Dark Reading, February 11th, 2014
          "Enterprises have improved their compliance with the Payment Card Industry Data Security Standard (PCI DSS), but they tend to fall out of compliance between audits, a new report says.

          According to the Verizon 2014 PCI Compliance Report, which was released today, more than 82 percent of organizations were compliant with at least 80 percent of the PCI standard at the time of their annual baseline assessments in 2013, compared to just 32 percent in 2012..."

          IT - PM
          Despite security worries, 4 out of 5 pros pressured to roll out IT projects, study finds
          SC Magazine, February 12th, 2014
          "An overwhelming majority of decision makers are pressured to roll out IT projects that aren't 'security ready,' a global survey found.

          On Wednesday, Trustwave released its '2014 Security Pressures Report,' which showed that nearly 80 percent of respondents were pushed to back these projects in spite of reservations.

          Trustwave, a Chicago-based data security and compliance firm, commissioned a third-party research firm to survey IT professionals for the 23-page report..."

          IT - Networks
          The next-generation Internet protocol IPv6 gets real
          ZDNet, February 12th, 2014
          "Everyone in networking knows that we must move to IPv6 before we completely run out of IPv4 addresses .The clock is counting the seconds until we run out of old-style Internet addresses. That hasn't stopped us from being really, really slow about making the switch anyway. At long last, however, a significant number of users, and the networks that connect them to the Internet, have made the jump to IPv6..."
          How To Avoid Network Outages: Go Back To Basics
          Network Computing, February 10th, 2014
          "While there's a lot of hype about hacking and DDoS attacks, the reality is most network outages are caused by an organization's own people. A recent Gartner study projected that through 2015, 80% of outages impacting mission-critical services will be caused by people and process issues, and more than 50% of those outages will be caused by change/configuration/release integration and hand-off issues..."
          IT - Operations
          How DevOps Can Accelerate the Cloud Application Lifecycle
          CIO. February 11th, 2014
          "In the past, infrastructure deployment and application updates both slowed the development lifecycle. Now that cloud computing lets organizations provision resources in minutes, not months, it's time to alter the application lifecycle accordingly. DevOps can help -- but only if it extends beyond 'culture change' to actually achieve continuous deployment...

          As I wrote in my last column, it's clear that cloud computing enables, and imposes, enormous change in applications. In that article, I focused on the technical changes cloud computing is forcing on application architecture - all designed to support the increased scale and load variability, higher performance expectation and changed pricing that cloud computing imposes..."

          IT - Security
          Shift to EMV cards expected to increase online fraud
          CSO Online, February 8th, 2014
          "Next year's scheduled changeover to chip-and-pin debit and credit cards is expected to reduce in-store fraud, while significantly increasing fraudulent purchases online, experts say.

          Recent high-profile break-ins of electronic cash registers at retailers Target and Neiman Marcus has added urgency to Visa and MasterCard's plan to dump the swipe-and-sign cards used today by U.S. consumers. In their place will be so-called EMV cards that store security data in an embedded chip.

          Carolyn Balfany, head of MasterCard's U.S. product delivery group, told The Wall Street Journal that a key deadline, called the "liability shift," would occur October 2015. That's when retailers and banks still supporting the kind of debit- and credit-cards used today will be liable for losses resulting from fraudulent use of the cards..."

          Tips for handling your first security breach
          Help Net Security, February 10th, 2014
          "When it comes to data breaches, the risk for organizations is higher than ever before - from the calculable costs of leaked data to the less tangible effects on the companies' brands and customer loyalty. Therefore, with targeted security breaches on the rise, defining an action plan is critical for every security practitioner.

          Getting breached does not determine whether or not you have a good security program in place, rather how you respond to one does. Before you begin to stress out about how to keep your head (and your job) intact when the worse case scenario happens, here are the top five tips for handling an organization's first security breach..."

          Can the FIDO Alliance Act as a Game-Changer and Help Obsolete User Name/Password Authentication?
          ESG, February 14th, 2014
          "It seems like yesterday when I was logging onto the VAX system at my alma mater UMass so I could work on a market research project with a statistics program. When my time slot came up, I would sit in front of a VT100 terminal, input my username and password, and voila - a timesharing session at the cutting-edge of high tech.

          Well this memory may seem recent but in truth it was back in the mid-1980s. I probably had a mullet and was hankering to listen to Flock of Seagulls at the time. The VAX, mullet, and new wave music are now ancient history but we're still using user names and passwords for authentication most of the time..."

            IT innovation challenging security pros' knowledge, resources
            CSO Online, February 11th, 2014
            "Pressure from upper management and boards is pushing security pros beyond their knowledge and resources, forcing them to roll out technology that is not properly secured, experts say.

            Nearly four in five IT pros were pressured last year into deploying inadequately secured software, according to a report from Trustwave set for release next week. The report, provided exclusively to CSO Online prior to release, shows that more than 60 percent of the respondents said that such rollouts occurred once or twice a year, while 16 percent said they happened frequently..."

            Banks turn to smartphone tech to fight online fraud
            Network World, February 13th, 2014
            "To ward off cyber-crooks trying to break into customers' accounts, banks are expanding their security efforts beyond desktops and onto iPhones and other mobile devices.

            Take HSBC Bank USA, for instance, which this week announced it's handing out free two-factor authentication tokens in the next few months for customers to use in their personal Internet banking. These digital and physical security tokens from Vasco Data Security can generate unique one-time passwords each time a customer logs in. And another financial institution, U.S. Bank, this week said it's testing how voice biometrics in a mobile banking app for smartphones can let customers authenticate via their own voice for access to their payment-card accounts rather than having to type passwords..."

            Study: Most Security Pros Unsure Whether They Could Handle A Breach
            Dark Reading, February 13th, 2014
            "Most security professionals are not confident in their ability to quickly detect and find the source of a breach, and many fear they will fumble their incidence response efforts, according to a study published Wednesday.

            A survey conducted by the Ponemon Institute and sponsored by security company AccessData reports that many security pros are worried that they would not know the root cause of a breach, or that they would be able to prioritize their responses..."

            Maintaining PCI compliance is a big challenge for most companies
            Computerworld, February 7th, 2014
            "A majority of companies that achieve annual compliance with the Payment Card Industry Data Security Standard (PCI DSS) fail to then maintain that status. As a result, they often remain exposed to potential data breach risks and other security threats, Verizon said in a report this week.

            Verizon's report is based on the results of annual PCI compliance assessments the company performed at more than 500 large organizations between 2011 and 2013. The results are based on actual compliance data gathered from companies in the retail, financial services, travel and hospitality sectors and other vertical markets..."

            Can Highly Secure Computing Defeat Cybercrime?
            CIO Insight, February 14th, 2014
            "The EastWest Institute is calling for a new computing paradigm called Highly Secure Computing (HSC), in a new report, "Resetting the System: Why Highly Secure Computing Should be the Priority of Cybersecurity Policies."

            The EastWest Institute's goal is to make the world safer by addressing seemingly intractable problems that threaten regional and global stability. Current IT paradigms have "tolerated inherent structural security deficits of information technology for too long," according to authors Sandro Gayacken and Greg Austin. Traditional IT security and its social management are not up to the task of combating state-sponsored cyber-attacks, the EastWest Institute report says..."

            IT - Careers
            How to land a job in IT security
            InfoWorld, February 11th, 2014
            "One of the most common questions readers ask me is how they can break into an IT security job. Normally they already have a job in IT, but they have a special interest in security and want a career in it. They are usually frustrated because, like any job seekers, they realize that without the necessary experience it's tougher to get a good paying job doing what they would love to do.

            Here's what I always reply..."

            How To Negotiate Your Salary
            Forbes, February 14th, 2014
            "Forbes talked to three employment experts about the best way for job candidates to negotiate salary and perks. Orville Pierson, author of The Unwritten Rules of the Highly Effective Job Search, used to be a senior vice president at the outplacement firm Lee Hecht Harrison. Rusty Rueff wrote Talent Force: A New Manifesto for the Human Side of Business and used to head up human resources at PepsiCo and Electronic Arts. Roy Cohen is a longtime New York City job coach and author of The Wall Street Professional's Survival Guide. Read on for their advice..."
            Better Compensation Key to Retaining Top IT Talent
            CIO, February 11th, 2014
            "Money isn't everything, but it's a good place to start. As the economy slowly improves, revisiting your compensation strategy can help you both retain and recruit top-performing tech talent.

            As the economy continues its slow recovery, businesses must rethink their compensation strategy or risk losing their top talent -- and a significant competitive advantage.

            According to a survey by Payscale's, a company that specializes in compensation data, 72 percent of respondents expect their financial situation to improve this year, and 60 percent cite retention of top-performing talent as a major concern during the economic rebound..."

              How to get a job in energy IT
              ComputerWorld, February 13th, 2014
              "IT pros in search of a salary windfall should look to energy and utilities, where new exploration techniques, demand for renewable energy and new regulations are opening up jobs...

              Nick Broskey likes to call the U.S. power grid "the most complex machine ever made -- but never designed."

              The grid encompasses massive legacy infrastructure, owned and operated by a patchwork of power companies. It's subject to extensive levels of regulation, and is expected to be reliable 24 hours a day without a hiccup. And the industry is only going to get more complex, says Broskey, senior business systems analyst for OnDemand Energy Solutions, an energy broker in Moon Township, Pa., as solar and wind seek to join in..."

              15 Surprising Tips For Standing Out At Work
              Business Insider, February 13th, 2014
              "We'd all like to shine at work and land that promotion we feel we deserve. But when it comes to standing out, we've heard the same advice over and over: take initiative, help others, get involved.

              It's time to freshen up that list. We uncovered 15 surprising and unconventional strategies you can use to take your reputation from lackluster to brilliant:.."å

                5 biggest mistakes of IT hiring managers
                Network World, 10th, 2014
                "As IT hiring ramps up in 2014, many job market experts are predicting a tech talent shortage. And certainly among the hot skill sets - security, Big Data, .NET and Java developers, project managers, business analysts and anyone with cloud or mobile experience - you can expect to see some sort of talent war, says Matthew Ripaldi, senior vice-president at Modis, a global provider of IT staffing services.

                However, while recruiters agree that demand is growing faster than supply, they also say that better hiring practices can go a long way toward helping companies achieve the hiring goals..."

                Top 10 Programming Languages for Job Seekers in 2014
                eWeek, February 10th, 2014
                "Looking for a job as a programmer? An eWEEK study found that employers are looking for skills in the tried-and-true languages, with Java topping the list of in-demand programming languages. Java development was even among the 10 most in-demand flexible jobs overall in 2013, ranking fifth. Evaluating which languages will best get you a programming position early in 2014 is not exactly scientific. Several Websites, including career sites and programming sites, maintain numbers on language popularity among employers and applicants, as well as figures on the overall number of searches on programming languages on popular search engines.."
                IT - Email
                Locking Down E-Mail With Security Services
                Dark Reading, February 12th, 2014
                "Three years ago, eliminating spam and viruses from e-mail meant installing an e-mail security gateway at the perimeter. Today, that's no longer true. Companies are increasingly moving their office processes and systems to the cloud, and e-mail is leading the way. By 2022, 60 percent of workers will be using a cloud-based office system, such as e-mail, up from 8 percent in 2013, according to business-intelligence firm Gartner..."
                Run Oracle Database Like a Ferrari, But Save Like a Prius with Oracle Storage
                Webcast with Steve Zivanic, VP, Storage Business Group at Oracle
                Join Dave Vellante, Co-Founder and chief research officer of Wikibon and Steve Zivanic, VP, Storage Business Group at Oracle to learn how optimizing storage infrastructure and exploiting database services results in significant CAPEX and OPEX savings and lower overall TCO.

                Attend the Webcast to learn how the combination of Oracle Database and Oracle storage helps:

                • Reduce your storage footprint by 3x-5x
                • Accelerate database queries by 5x
                • Reduce storage admin tasks by 65%

                Register for this Webcast.

                IT - Backup
                8 Suggestions for Every Data Protection Strategy
                ESG, February 10th, 2014
                "As a 'data protection dude', I have the best job in the world - I have the opportunity to talk to hundreds of IT Pros on what they are doing (or are thinking about doing) in data protection, and then survey thousands more on the same ideas.

                So, for all of the IT Pros who are now into the fray of 2014 and asking 'What else should I be doing to ensure my organization's recover-ability?' - this video includes eight suggestions to consider as part of your data protection strategy (including the ESG data that supports those suggestions)..."

                  IT - Mobile
                  7 Enterprise Mobile Security Best Practices
                  Network World, February 13th, 2014
                  "Information security experts are fond of the certain language they use to explore and explain the security threats that companies and organizations routinely face. One particularly interesting notion from this lexicon is that of an "attack surface," which identifies a potential point of attack on one's information or financial assets, intellectual property or ability to conduct business..."
                  10 Mobile Security Issues That Should Worry You
                  eWeek, February 11th, 2014
                  "This year, manufacturers will ship more than 1 billion Android devices, and Apple has already said that 2014 could be a banner year for iPhone and iPad sales. Based on mobile device sales and adoption alone, one might think that it's smooth sailing ahead for the mobile industry and its customers.

                  But there is a dark side to this success story. The security risks associated with smartphones and tablets are nothing short of scary. In just the last few months, we've heard reports from research companies saying that mobile devices will be the biggest security risk in 2014; that employees' smartphones and tablets will be a major security risk inside enterprises; and that a majority of popular applications have security holes just waiting to be exploited..."

                  Mobile App Security Needs Improvement
                  CIO Insight, February 14th, 2014
                  "By now, it's fairly apparent that the mobile genie is way out of the bottle. The growing array of mobile devices - smartphones, tablets and more - is transforming many facets of consumer and business life. Fortunately, business and IT executives are recognizing that they're increasingly the key to enterprise productivity - and long-term profits.

                  It's arguable that BYOD and mobile consumer technology have changed the enterprise and business processes more than anything else in the entire history of IT. Yet, they're also part of a growing problem related to securing data and systems. According to Hewlett-Packard's Cyber Risk Report 2013, mobility - along with open source web apps - creates threats that may not entirely register among enterprise executives, and even security experts..."

                  6 tips for smartphone privacy and security
                  CSO Online, February 8th, 2014
                  "Computer forensic expert Ronald Kaplan thinks you should stop using your smartphone if you want any semblance of privacy in today's digital world. But, if you insist on keeping yourself electronically tethered, here are some ways to minimize the privacy and security risks...

                  In the digital world, things are getting worse rather than improving with regard to the populist quest for personal privacy and security. Our smartphones track wherever we go, what we say, who we say it to, our likes and dislikes, and when we are playing games instead of working. Our computers track and record the same types of information day in and day out..."

                  Enterprise Security Professionals Identify Mobile Computing Security Challenges
                  ESG, February 12th, 2014
                  "Most companies now provide network access and application support for non-PC devices like smartphones and tablets and many are developing new applications and business processes designed specifically for these devices. Business managers look at iPhones, Android devices, and even Windows phones and see opportunities for revenue growth, cost cutting, and improved communication everywhere.

                  Okay so business folks are gaga over mobile, but ask any CISO about mobile computing and you'll probably get a frustrated look in return. Security professionals know that mobile computing means securing thousands of various devices as well as the applications and content that resides on them. These mobile gizmos are often loaded with suspicious software for gaming, social networking, file synchronization/storage, etc. Furthermore, many are owned by employees, not employers, which means the security team needs to walk on eggshells as they protect the confidentiality, integrity, and availability of organizational assets. What a nightmare!..."

                  Why California's Kill-Switch Mandate Might Save Your Phone
                  CIO, February 7th, 2014
                  "If you're reading this story on a smartphone in Bangor, Maine, Key West Florida, Spokane, Washington, or really any point in between, you wouldn't think that a bill making its way through the California state legislature would have much of an impact on your mobile device. But a new proposal for a mandatory kill-switch on mobile devices in California figures to have ramifications felt far beyond the borders of the Golden State should it come to pass..."
                    IT - Big Data
                    Turn Big Data into Smart Data: You'll Have Happier Customers
                    CIO Today, February 12th, 2014
                    "It takes advanced analytical methods to find the correlations and underlying patterns that help us understand the present and predict the future," data scientist Ingo Mierswa explains. "If a company understands which customers will quit their contracts, or when a machine will break down, they can be proactive, solving problems before they occur."
                      Big Data Helping Enterprise Decision-Making
                      CIO Insight, February 14th, 2014
                      "EMC Corporation's '2013 Transforming IT' study finds that big data is giving rise to markedly improved corporate decision - making. It is also having an impact on a company's ability to differentiate itself competitively and to avert risk. The EMC study found better business processes, innovating products and solutions, and enhancing customer experience to be the top three drivers transforming IT systems and infrastructure..."
                      Big Data & Advanced Persistent Threat Mitigation
                      Enterprise Efficiency, February 11th, 2014
                      "Much of the focus around big data has been in electronic health records, customer data mining, and financial prediction models, but big data can be a big help in the field of IT security. Big data is increasingly being used to combat one of the most difficult and serious problems yet -- Advanced Persistent Threats (APTs)..."
                      Thornton May: The path to big data mastery
                      Computerworld, February 10th, 2014
                      "The think-tankers on the Executive Leadership Council at AIIM systematically use a four-box matrix to reduce uncertainty, allocate investments and calibrate new product/service initiatives. This simple tool -- with 'important and difficult' in the upper right and 'unimportant and easy' in the lower left -- produces surprisingly powerful insights..."
                        Top Ten Articles for last few Issues
                        Vol 192 Issue 1; Vol 191 Issues 1, 2, 3, 4 and 5; Vol 190 Issues 3 and 4
                        We track how frequently each article is viewed on the web site to determine which the readers consider the most important. For last week, the top 10 articles were:

                        • SPARC T5-2 server shatters another world record!
                        • illumos watch
                        • CRN Names Oracle SuperCluster One of 10 Coolest Servers Of 2013
                        • 13 Resources To Learn The VI/VIM Text Editor
                        • See How Oracle Multitenant Reduced e-DBA's Hardware Spend by 75%
                        • Oracle Cloud - The Modern Cloud for Your Modern Business
                        • Benchmarking the Cloud
                        • Java EE 7 Survey
                        • Back Up a Thousand Databases Using Enterprise Manager Cloud Control 12c
                        • MySQL Enterprise Monitor 3.0.6

                        The longer version of this article has list of top ten articles for the last 8 weeks.

                          IT - Encryption
                          Encryption use continues to grow
                          Help Net Security, February 11th, 2014
                          "Use of encryption continues to grow in response to consumer concerns, privacy compliance regulations and on-going cyber attacks and yet there are still major challenges in executing data encryption policy, according to a Ponemon Institute study..."
                          LibreOffice 4.1.5
                          Targeted to large deployments in enterprises and public administrations
                          The Document Foundation (TDF) has released LibreOffice 4.1.5, for Windows, MacOS X and Linux, the fifth minor release of the LibreOffice 4.1 family targeted to large deployments in enterprises and public administrations.

                          Meet the Community

                          From March 10 to March 14, The Document Foundation will exhibit at CeBIT in Hannover (Hall 6, Booth H14) to showcase LibreOffice 4.2 and LibreOffice 4.1.5. In addition, Florian Effenberger and Italo Vignoli will speak about LibreOffice at the Open Source Conference, of the project infrastructure and of a reference protocol for large migrations.

                          Support The Document Foundation

                          LibreOffice users, free software advocates and community members can support The Document Foundation with a donation at Money collected will be used to expand the infrastructure, and support marketing activities to increase the awareness of the project, both at global and local level.

                          Download LibreOffice

                          LibreOffice 4.1.5 is available for immediate download from this link.

                          Extensions for LibreOffice can be obtained from this link.

                          The Non-Beginner's Guide to Syncing Data with Rsync
                          single solution for data redundancy needs
                          How-To-Geek writes, "The rsync protocol can be pretty simple to use for ordinary backup/synchronization jobs, but some of its more advanced features may surprise you. In this article, we're going to show how even the biggest data hoarders and backup enthusiasts can wield rsync as a single solution for all of their data redundancy needs..."
                            Oracle Solaris 11 Integrated Load Balancer
                            By Isaac Rozenfeld
                            Isaac writes, "The Oracle Solaris 11 Networking technologies portfolio provides an in-kernel L3/L4 load balancer, with support for multiple load-balancing algorithms. It has built-in health-check capabilities and is configured and managed using the ilbadm(1M) command. We also provide support for Virtual Router Redundancy Protocol (VRRP), which offers high-availability of routers through redundancy and fail-over -- which can be used with the Integrated Load Balancer (ILB) to provide additional redundancy for it. VRRP is configurable with the vrrpadm(1M) command..."
                            New NetBeans Book by Oracle Press
                            Create Next-Generation Enterprise Applications
                            Geertjan writes, "Build and distribute business web applications that target both desktop and mobile devices. Cowritten by Java EE and NetBeans IDE experts, 'Java EE and HTML5 Enterprise Application Development' fully explains cutting-edge, highly responsive design tools and strategies.

                            Find out how to navigate NetBeans IDE, construct HTML5 programs, employ JavaScript APIs, integrate CSS and WebSockets, and handle security.

                            This Oracle Press guide also offers practical coverage of SaaS, MVVM, and RESTful concepts..."

                            Level3 News
                            tw telecom Reports Fourth Quarter and Full Year 2013 Results
                            Delivers 6.4% Revenue Growth, $36.5 million of Net Income and 35.3% M-EBITDA Margin for 2013
                            tw telecom inc. (NASDAQ: TWTC), a leading national provider of managed services, including Business Ethernet, converged and IP VPN solutions to enterprises across the U.S. and to their global locations, today announced its fourth quarter 2013 financial results, including $400.0 million of revenue, $15.4 million of net income, $0.11 basic earnings per share, and $140.7 million of Modified EBITDA1 ("M-EBITDA").

                            For the year, the Company reported $1.56 billion in revenue, $36.5 million in net income, $0.25 basic earnings per share, and $552.5 million of M-EBITDA.

                            Trending in
                            Vol 234, Issue 2
                            Trending IT Articles