News about Oracle's Solaris and Sun Hardware
System News
Feb 24th, 2014 — Mar 2nd, 2014 Generate the Custom HTML Email for this Issue
System News System News for Sun Users
Volume 192, Issue 4 << Previous Issue | Next Issue >>
Sections in this issue:
click to jump to section

Oracle Buys BlueKai
Extends the World's Largest Marketing Cloud with the Leading Data Management Platform to Personalize Marketing Programs and Customer Experience
Oracle announced that it has signed an agreement to acquire BlueKai, the industry's leading cloud-based big data platform that enables companies to personalize online, offline and mobile marketing campaigns with richer and more actionable information about targeted audiences.

The BlueKai solution includes its Data Management Platform, which centrally organizes a company's customer and audience data in the cloud to help implement personalized marketing campaigns across all channels and deliver better results and higher marketing ROI. BlueKai also runs the world's largest third party data marketplace to augment a company's proprietary customer data with actionable information on more than 700 million profiles.

BlueKai will be integrated with both Responsys for B2C marketing automation and Eloqua for B2B marketing automation in order to deliver orchestrated and personalized customer interactions across all marketing activities and channels.

BlueKai combined with Oracle's Marketing and Social solutions provide customers with the ability to build the richest user profiles combining information from first party and third party sources including media, advertising, social, and mobile sources.

March/April 2014 digital edition of Oracle Magazine
Register for Print and/or On-line Editions
Cover Story: Cloud Engineered

Technology: REST for Everyone (Nimphius)

An Easy Drive to .NET (Shay); Playing Nice Together (Nanda)

Writing PL/SQL in Oracle Application Express (Feuerstein)

On Oracle Database 12c, Part 4 (Kyte)

CSX Corporation Upgrades Databases 2x Faster with Oracle Real Application Testing
Oracle Real Application Testing Helps Premier Transportation Company Streamline and Accelerate Upgrade of 400 Oracle Databases
In a fast growing CSX Corporation, a premier transportation company, upgraded 400 of its Oracle databases to take advantage of new capabilities. To ensure a smooth transition, CSX used Oracle Real Application Testing, an Oracle Database option, in conjunction with Oracle Enterprise Manager to perform comprehensive testing of the upgrade. With this technology CSX completed its upgrade more than twice as fast as its previous database upgrade while avoiding business disruption and mitigating risk.
LDom Direct-IO gives fast and virtualized IO to ECI Telecom
By Orgad Kimchi
Not long ago, ECI a leading telecom networking infrastructure vendor and a long-time Oracle partner, was asked by a customer to "provide a scalable solution with a smaller footprint, with a preference for a VM-like environment that can be rapidly deployed onto the carrier infrastructure and provide faster time-to-market. The main prerequisite was however not to compromise the application's performance, as the database disk I/O performance requirements can be especially demanding when the carrier has peak network traffic usage in its infrastructure..."
What's up with LDoms: Part 8 - Physical IO
By Stefan Hinker
Stefan writes, "Finally finding some time to continue this blog series... And starting the new year with a new chapter for which I hope to write several sections: Physical IO options for LDoms and what you can do with them. In all previous sections, we talked about virtual IO and how to deal with it. The diagram at the right shows the general architecture of such virtual IO configurations. However, there's much more to IO than that.

From an architectural point of view, the primary task of the SPARC hypervisor is partitioning of the system. The hypervisor isn't usually very active - all it does is assign ownership of some parts of the hardware (CPU, memory, IO resources) to a domain, build a virtual machine from these components and finally start OpenBoot in that virtual machine. After that, the hypervisor essentially steps aside. Only if the IO components are virtual components, do we need hypervisor support..."

Oracle VM VirtualBox 4.3.8
Maintenance release
Oracle VM VirtualBox 4.3.8 has just been released. This maintenance release included bug fixes and improves stability.

For the full list of fixes see the ChangeLog, or just simply download it now at the community or Oracle download sites.

The February 2014 Oracle Virtualization Newsletter
Includes an updated Oracle VM cost calculator

The February 2014 Oracle Virtualization Newsletter is now available! It includes content on an updated Oracle VM cost calculator (now including Oracle Linux!), 2014 IT Predictions, community demonstration videos, what's new in Oracle Secure Global Desktop, and much more!

Read the February edition online right now, or subscribe to get future issues delivered straight to your inbox.

IT - Storage
Data Storage Industry: Buy, Buy or Bye-Bye?
SearchStorage, February 24th, 2014
"These are very treacherous times in the realm of data storage, or are they? With shutdowns, bankruptcies, and mergers and acquisitions happening at what might be an unprecedented rate, it could make for some very nervous times for storage and IT managers. On the other hand (the one you haven't chewed the nails off yet), all this activity might be a sign of the healthy evolution of the data storage industry.

Part of the reason so much seems to be happening at the same time -- Nirvanix and Symantec scuttling cloud storage services, for example, plus OCZ's imminent demise (or acquisition by Toshiba) -- is that there's been an enormous amount of activity around storage technologies and products over the last couple of years. It doesn't take much effort to easily tick off a half-dozen or so technologies and tools that are challenging the storage status quo: cloud storage, object-based systems, flash, prepackaged appliances, virtual storage controllers, virtual machine-specific storage systems, cloud disaster recovery, file sync and share, Hadoop and Hadoop-ish storage constructs …"

Weapons of Mass Data Destruction
IT Pro, February 24th, 2014
"There's more to IT security than protecting the valuable data an enterprise obtains, uses and stores. How you dispose of it when the hardware it's sitting on reaches end-of-life should be a major concern too.

These days, only a fool thinks clicking 'delete' is enough to wipe data from a hard drive or that a quick disk reformat will do the trick. Smashing the drives with a hammer isn't a smart move either. So how should the enterprise tackle this problem, and what are the best weapons of data destruction? IT Pro has been investigating..."

IT - Technology
High-Profile US National Labs Team to Build 200 Petaflop Supercomputers
Network World, February 26th, 2014
"Three principal US national labs today affirmed they will team-up to build supercomputers that operate about 10 times faster than today's most powerful high performance computing (HPC) systems.

The project, known as the Collaboration of Oak Ridge, Argonne and Livermore (CORAL) national labs will build 200 peak petaflops (quadrillions of floating point operations per second) systems for each of the labs, at a cost of about $125 million each, in the 2017-2018 timeframe, the group stated..."

13 of Today's Coolest Network Research Projects
Network World, February 26th, 2014
"Here's a whirlwind look at some of the wildest and potentially most useful technology research projects from university and vendor labs related to computer networking.

Time travelers, where are you?

Michigan Technological University has published a paper "Searching the Internet for evidence of time travelers" in which they used three search implementations for signs of content that should not have been known about at the time it was posted. This search for 'prescient knowledge' hasn't located any full-fledged time travelers yet on Twitter, email or Facebook, though the researchers did note that it's possible such people could cover their tracks. "Although the negative results reported here may indicate that time travelers from the future are not among us and cannot communicate with us over the modern day Internet, they are by no means proof." ...

From Burgers to Buildings: 10 Things You Didn't Know 3D Printers Could Make
ComputerWorld, February 24th, 2014
"As the technology for 3D printers moves forward, more and more items are being made with them. No longer are we limited to using plastics, paper or metal to create 3D printed objects.

Now, researchers are using biomaterials and food with 3D printers, and the objects made using more traditional materials are becoming more complicated every day. Here are 10 intriguing items in development or currently being made with 3D printers..."

    Robot Challenges Top German Player at Ping-Pong
    The Register, February 24th, 2014
    "Everyone knows that the robots can already beat the best the human race can offer at chess, Jeopardy, probably global thermonuclear war etc. But for games of agility, until now the human athlete has in general retained his or her superiority.

    But that's set to change, as a powerful German robot reckons it can take on a former world number one table-tennis player at his own game - and beat him..."

      What You Need to Know About 3D Printers for Today And Tomorrow
      Information Week, February 26th, 2014
      "Consumer technologies seem to have invaded business a lot in the last few years: mobile devices, cloud services, social networking, and so on. You can soon add another one to the mix: 3D printing. But 3D printing is not just a consumer technology -- it's also an industrial technology. What's really happening is that the ability to create objects via printers is getting to consumer-level prices, meaning it will be affordable for individuals and businesses alike to use more broadly.

      Because the technology is coming from two very different markets, you can expect to see real differences in 3D printers -- and ways you might use them..."

      IT - Bitcoin
      (Almost) Everything You Want to Know About Bitcoin, in One Report
      <re/code>, February 27th, 2014
      "Twelve months from now, this report could end up in a trash heap of great tech ideas gone bust, thanks to the recent implosion of bitcoin exchange Mt. Gox. But for now, the 'State of Bitcoin 2014' report, published yesterday by bitcoin trade publication CoinDesk, is a reminder that while Gox was a major player in the rise of bitcoin, the digital currency ecosystem does not depend on it.

      The 91-slide report, embedded below, "is not intended to be another guide answering the question 'what is bitcoin?'" CoinDesk wrote yesterday in a post introducing the report. 'Instead, the main aim is to provide an overview of key cryptocurrency trends, challenges, and opportunities, while also highlighting the most important developments over the last year.'

      Here are the highlights:.."

      Spain to be the first country in Europe to widely adopt Bitcoin ATMs
      Among Tech, February 19th, 2014
      "A Spanish company located in Barcelona called PayMaQ will be the first European company to launch more then 40 Bitcoin ATMs during the next couple of months.

      The Bitcoin ATM allows you to easily purchase and sell Bitcoins, worlds most popular virtual currency can be bought by using your credit card or inserting cash money into the ATM. The first ATM will be launch 22 February in the Diagonal Mar shopping center located in Barcelona (If you are attending MWC 2014, it is definitely something worth checking out)..."

      Will Bitcoin Survive This Test?
      Forbes, February 25th, 2014
      "Since its inception, Bitcoin has survived several tests.

      In the beginning, came the user test. The digital currency passed it, as many companies and organizations began to accept Bitcoins as a medium of exchange. According to 12,000 businesses and charities accept Bitcoin, including the University of Nicosia (Unic), the largest private university in Cyprus, as discussed in a previous piece..."

      Simplify your Migration from AIX to Solaris
      By Roy Swonger

      There is a brand new white paper available that will be of interest to anybody contemplating a database and/or application migration from AIX to Solaris.

      Simplify the Migration of Oracle Database and Oracle Applications from AIX to Oracle Solaris gives a good description of the steps involved in planning and executing a migration project, along with the benefits you can expect to achieve and a solid example of migration using Oracle Data Pump, complete with scripted steps.

      Of course, if your migration will include moving up to Oracle Database 12c, don't forget to sign up for Mike's webcast on February 26!

      Cloud Computing
      Webcast: Data Intensity Presents Building Private Clouds on Oracle VM
      Now on-demand
      Join Oracle in this live webcast replay and learn how Data Intensity, a long time Oracle partner, built a successful database and application hosting business using Oracle Linux and Oracle VM. Valuable IT best practices and insights on building a private cloud infrastructure from this seasoned hosting provider will prove to be a valuable and informative 60 minutes time investment.

      Data Intensity Presents Building Private Clouds on Oracle VM

      Learn how Oracle VM can help users:

      • Accelerate deployment of Oracle Database and business-critical applications
      • Significantly save on the cost of hosting applications or services
      • Respond and scale quickly as customer demands grows

      Register Here

      The package installer/remover for rpm systems
      Yum is a package installer/remover for rpm systems. It can also update your system and is used mainly by the Linux systems such as Oracle Linux to simplify these tasks.

      Some simple tasks using yum is to list,install, search, remove the packages on your system.

      To list if you've a package installed do:

      • yum list installed

      To list all packages in yum repository:

      • yum list

      To search for a package:

      • yum search pkg; e.g. yum search kernel

      Read on for details and links.

      February 2014 Oracle Linux Newsletter
      Stories on OCFS2, Ksplice, using Oracle Database with Oracle Linux

      The February 2014 edition of the Oracle Linux Newsletter is now available! This issue has some fantastic stories on OCFS2, Ksplice, using Oracle Database with Oracle Linux, new customer success stories, and much more!

      You can read the latest edition online right now, or subscribe to have future issues delivered straight to your inbox!

      IT - Cloud
      Cloud security concerns are overblown, experts say
      Computerworld, February 27th, 2014
      "Security concerns should not deter enterprises from using public cloud technologies when it makes business sense.

      A panel of practitioners said at the RSA Security Conference here this week agreed that if cloud providers are vetted properly, most enterprise workloads and data can be safely migrated to cloud environments.

      Any lingering questions by IT security pros about data security and privacy of cloud computing will be allayed just as concerns about virtualization were in the past, they said..."

      Help! Most enterprises turn to consultants when using the cloud
      Network World, February 27th, 2014
      "Customers using the cloud overwhelmingly turn to professional service consultants to execute or plan out projects, according to a report from Technology Business Research.

      The cloud professional services industry has ballooned internationally from a $5 billion market in 2010 to an estimated $17 billion in 2013, TBRI reports in a study out this week. It could grow to a $30 billion industry by 2018, the researchers added. TBRI is an independent research firm and does not provide cloud integration consulting services..."

        Cloud storage: It's not just about the files
        ZDNet, February 26th, 2014
        "As in nature, the cloud is everywhere. Just about every platform and OEM that makes mobile devices have cloud storage available for customers. Odds are one of the first things a tablet, laptop, or phone buyer sees is an offer to provide cloud storage.

        Device owners should give some thought about a cloud storage solution. It's not a matter of backing up files to the ether, it's about protecting important information..."

        5 Signs It's Time to Ditch Your IT Hardware
        Business 2 Community, February 24th, 2014
        The onset of Cloud computing and offsite IT services means that there is less and less need for businesses to continue investing in IT systems. But how do you know when it's time for your company to make the move? Here are five things to look out for

        • It's time to upgrade
        • Maintenance costs continue to rise
        • You've made a new commitment to responsible business practices
        • Discussions about your server make the finance director cry
        • You need added flexibility

        Read on for details.

        Cloud Service Providers Fight Back, Challenge NSA
        InfoWorld, February 26th, 2014
        "For U.S. cloud computing companies that have long been fighting to defend the privacy protections involving data stored in their servers or passing over their networks, the ongoing revelations about the extent of the NSA's surveillance activities could carry a huge price tag.

        For years, in markets such as Western Europe, cloud providers like Google and Microsoft have been trying to beat back concerns voiced by would-be customers -- and stoked by competitors and governments -- that the Patriot Act and other laws render data stored with American firms readily accessible to the U.S. government..."

        Data Protection in the Cloud: The Basics
        Network Computing, February 24th, 2014
        "What is data protection in the cloud? This isn't an easy question to answer, since it comes in various forms and the tools and technologies for data protection are extremely numerous and can be used in different combinations. From IT's perspective, a large number of choices can make cloud more difficult than traditional schemas. Still, we can cut the Gordian knot of cloud complexity with three steps that will help guide further exploration of data protection.

        First, we need to understand in general what data protection models the cloud might solve. Second, we need to understand that big decisions related to the cloud and data protection include what is managed internally and what is managed by a third party. Third, we need a rough basis for putting together an inventory that an organization can consider when moving to the cloud. We can then use this foundation as a basis for future discussion of data protection in the cloud..."

          How IT Can Establish Better Cloud Control
          CIO, February 24th, 2014
          "There's no getting around it: Employees who use SaaS applications are more irresponsible about password security, file transfer and IT compliance. But IT's failure to communicate about risky behavior and provide tools to help employees do their work is part of the problem. Here are steps you can take to bring SaaS back under control..."
          The Mainframe Evolves Into a New Beast in the Cloud Era
          TechRepublic, February 21st, 2014
          "The cloud world inherited some concepts from the mainframe world that came before it. The consumption-based pricing model, Linux virtual machines, and multi-tenancy came from that previous mainframe generation. NASA got rid of its mainframes, but these massive machines can still be found in many large organizations.

          In the age of cloud IT, aren't mainframes irrelevant? Why won't the mainframe die?..."

          IT - CxO
          People are Not Your Biggest Asset
          IT World Canada, February 26th, 2014
          "You read the headline right. And it's true.

          In his book 'Good to Great' Jim Collins presents the research that bears this out. I re-read it the other day, and his work still holds up. He says clearly: 'PEOPLE are not your biggest asset. The RIGHT people are your biggest asset.'

          That one word makes a big difference.

          Who are the right people?

          They are problem solvers ..."

            Resign or Be Fired: Compassionate Offer or Legally Risky Ultimatum
            Business Management Daily, February 26th, 2014
            "Have you ever offered an employee the option to resign or get fired? Maybe you believed you were helping the employee to graciously exit the workplace without the embarrassment of a termination. However, doing so today just may fall under the no-good-deed-goes-unpunished category. As this new court ruling this month shows, such ultimatums might ultimately give you ulcers in court under the 'ultimatum theory' of liability.

            Case in Point: Richard Lawson, a high school history teacher in Mississippi, had a one-year employment contract. The principal told Lawson that his contract wouldn't be renewed for the following school year because of a reduction in force (RIF). Two teachers were being eliminated and the principal decided Lawson was one of them..."

              Why CIOs should act more like venture capitalists
              ZDNet, February 27th, 2014
              "There must come times when the modern CIO feels like a medieval bear being tormented in a pit - everybody is demanding a piece of him.

              As the consultants Deloitte put it: "More and more CIOs, faced with disruptive forces such as crowdsourcing, mobile-only, big data, and cyber security are shifting from a world of known problems into one filled with unknowns."

              The issue is simply that CIOs are realising that their current tools for managing risk and making the most of their assets may well not be adequate for these changing conditions..."

              Is Your IT Shop a Scrambler or a Leader?
              CIO, February 26th, 2014
              "Technology organizations evolve on a four-step path, with each step enhancing the value of the organization to its customers. Most IT organizations are in the first two stages: Scrambler and Producer.

              Scramblers have a great deal of difficulty getting the basics right and spend much of their time reacting to events. Producers get the basics right but haven't yet evolved further.

              To better understand Scramblers and Producers, it's important to define the basics--the distinguishing criteria..."

                Deja Vu All Over Again, Or Why CIOs Still Fail At Communicating Value
                Forrester, February 25th, 2014
                "One of my colleagues, Karen Rubenstrunk, is a principal advisor for our CIO Executive Program. I've known Karen for close to 20 years; she is a superior CIO coach. Recently, we found ourselves discussing the challenges CIOs have communicating business value. Here is Karen's point of view:

                If you've been around tech management as long as I have, at some point you've had the conversation that keeps on giving (like heartburn): how to better communicate the value of technology to the business.

                Like me, I'm sure you've continued to wonder why we keep having this conversation over and over and over..."

                Johnson & Johnson's CIO Leverages A Proven Blueprint For Success In The First 100 Days
                Forbes, February 25th, 2014
                "When Stuart McGuigan began his tenure at Johnson & Johnson, he had already been the CIO at CVS Caremark and at Liberty Mutual. A leader with a master's degree in cognitive sciences from Yale, McGuigan thinks more than the average leader about how the mind works, and thus how to motivate people. As he notes in my interview with him, learning the culture of an organization is the first order of business for a new leader. Only then can the appropriate changes be made during the window of change afforded a new executive during the early days of his tenure..."
                vBeers - South Florida (Wednesday, March 12th, 2014)
                Wednesday, March 12th, 2014
                Join us for the next vBeers South Florida. We meet on the 2nd Wednesday of each month at Murphy's Law at the Hard Rock Hotel and Casino.

                This will be a non-sponsored event so bring your wallet, your sense of humor and get ready for some great IT and virtualization conversations with some of the best people in South Florida's IT community (including YOU!).

                Location: Murphy's Law Irish Bar

                • Address:1 Seminole Way, Hollywood, FL 33314 USA
                • Date: Wednesday, March 12th
                • Time: 6pm to 9pm - arrive and depart any time

                Parking is free. I recommend using the lot off 441. Park on the 4th floor and the elevator will drop you off right next to Murphy's.

                Join the vBeers LinkedIn group. Network with fellow vBeers participants on-line.

                vBeers - Miami (Wednesday, March 26th, 2014)
                After Work Hours IT Networking Event
                This will be a Sponsored event so drinks and are on us! Please join us for the Our first vBeers event in Miami and encourage your IT colleagues to attend as well.

                Join us for an evening of creating connections and building your network in a relaxed and fun environment.

                Networking is an essential aspect of your professional growth and development. Connect with an array of professionals while enjoying a drink or two. Who knows, you just may meet your next client, employer or employee!

                Location: Biscayne Tavern

                • Address: - 146 Biscayne Blvd, Miami, FL 33132
                • Date: Wednesday, March 26th
                • Time: 6pm to 9pm - arrive and depart any time


                • Biscayne Tavern
                • SherlockTech Staffing
                • Vault Networks
                • Nexenta Systems
                • PCS

                Join the vBeers LinkedIn group. Network with fellow vBeers participants on-line.

                Please RSVP via EventBrite.

                IT - DR
                5 Questions You Need to Answer About Your DR Plan
                Bank Systems and Technology, February 27th, 2014
                "If you manage your company's DR processes and plans, you're already intimately involved in the technical nuances of your technologies and vendors. However, a successful plan requires total company buy-in, including that of your leadership team. When your C-level executives and the Board of Directors ask about your DR plan, they want your answers to provide the confidence that says the business will continue to be successful and secure, no matter what.

                It can be easy to stay in the details and nuances, but those don't always connect to the bigger business concerns. Be fully prepared for a conversation about your current DR plan, and potentially, the gaps that need to be filled by walking through the following five questions. Answering these questions will set the stage for proper buy-in, which leads to adequate budgeting and coverage to empower you with a solution guaranteed to be successful..."

                  IT - Networks
                  The Evolution of the Ethernet Switch
                  Network Computing, February 21st, 2014
                  "Buying an Ethernet switch is no longer a simple task. While there are several reasons for this, perhaps the greatest one is that of innovation. Today, buyers must learn a variety of technical nuances that set switches apart from one another, match those capabilities to their organization's needs, and then move ahead to a purchase.

                  If you think faster speeds are the extent of the new Ethernet technology, you're focusing on one detail of a much larger picture..."

                  IT - Operations
                  DARPA Wants to Scrub Scourge of Counterfeit Computer Gear
                  Network World, February 24th, 2014
                  Few things can mess up a highly technical system and threaten lives like a counterfeit electronic component, yet the use of such bogus gear is said to be widespread.

                  A new Defense Advanced Research Projects Agency (DARPA) program will target these phony products and develop a tool to "verify, without disrupting or harming the system, the trustworthiness of a protected electronic component."

                    8 Tips to Deal with Liability When Outsourcing to Multiple IT Vendors
                    CIO, February 21st, 2014
                    "There's little question that multi-sourcing -- parceling out the IT services portfolio among a number of vendors -- is the new normal for IT outsourcing. But what happens when things go wrong and there's no proverbial single throat to choke?..."

                    "Multi-vendor outsourcing arrangements are more complicated because services can very rarely be performed in isolation from other services," says Lois Coatney, partner with outsourcing consultancy Information Services Group (ISG). "Because of this risk, providers will use commercial language to 'carve out' where they will not be held accountable."

                    IT - Security
                    Poorly managed SSH keys pose serious risks for most companies
                    Computerworld, February 22nd, 2014
                    "Many companies are dangerously exposed to threats like the recently revealed Mask Advanced Persistent Threat because they don't properly manage the Secure Shell (SSH) cryptographic keys used to authenticate access to critical internal systems and services.

                    A Ponemon Institute survey of more than 2,100 systems administrators at Global 2000 companies discovered that three out of four enterprises are vulnerable to root-level attacks against their systems because of their failure to secure SSH keys..."

                    FTC: Identity theft is the plague of the country
                    Network World, February 27th, 2014
                    "The Federal Trade Commission today issued its annual look at what consumers in the United States are complaining about the most.

                    And for the 14th consecutive year the winner, or loser really, for 2013 was identity theft, receiving over 290,000 or 14% of the agency's 2 million overall complaints. Thirty percent of these incidents were tax- or wage-related, which continues to be the largest category within identity theft complaints, the FTC stated.

                    The identity theft totals were actually down from 2012 when the agency said it got 369,132 or 18%, of the complaints were related to identity theft. Of those, more than 43% related to tax- or wage-related fraud, the agency stated..."

                      6 Lessons Learned About the Scariest Security Threats
                      InfoWorld, February 24th, 2014
                      "Advanced persistent threats have garnered a lot of attention of late, deservedly so. APTs are arguably the most dangerous security concern for business organizations today, given their targeted nature.

                      An APT attack is typically launched by a professional organization based in a different country than the victim organization, thereby complicating law enforcement. These hacking organizations are often broken into specialized teams that work together to infiltrate corporate networks and systems and extract as much valuable information as possible. Illegally hacking other companies is their day job. And most are very good at it..."

                      How I Secure My Personal Cloud
                      Information Week, February 24th, 2014
                      "As global cloud traffic grows exponentially, IT pros face the daunting task of securing their personal cloud, data, and workloads. Trends around cloud computing are moving fast. The latest Cloud Index Report from Cisco shows that by 2017, global cloud IP traffic will reach 443 exabytes per month -- up from 98 exabytes per month in 2012. In five years, global cloud IP traffic will increase nearly fivefold..."
                      How to Test the Security Savvy of Your Staff
                      CIO, February 24th, 2014
                      "Security can be an acute pain point for CIOs. There might be nothing that causes more sleepless nights than ensuring the security of an organization's data and systems. Specialists fortify the network perimeter with firewalls and IDPSs, segment the network and perform regular audits and rigorous assessments. They also classify data and isolate critical files, and follow best practices regarding least privilege and security policies..."
                      Juniper Security Chief Takes Swipe at Security Apathy
                      Dark Reading, February 26th, 2014
                      "Juniper Network's security honcho urged security professionals to be bolder in their outrage for what was happening to their information and to take risks on approaches that challenge current conventions...

                      "Our privacy is being invaded, or IP is being stolen, the public trust is at an all-time low, and the attack on our information is outrageous," said Nawaf Bitar, senior vice president and general manager of the security business unit at Juniper. "But you know what? I don't think we give a damn. I'm fed up with talking about outrage."

                      The Next Security Perimeter? You're Wearing It.
                      GCN, February 21th, 2014
                      "The idea of wearable technology is not new to government. In the military, the concept of using hands-free technology to integrate soldiers in the field into mobile ad hoc networks is part of the Defense Department's vision of network-centric warfare. But what happens when unmanaged personal or wearable devices are brought into the workplace to connect with the enterprise network?

                      The result is another layer of security concerns for agencies that still are struggling with the challenges presented by the bring-your-own-device movement..."

                      To Build the Best Defense, Know Which Attack is Which
                      InfoWorld, February 25th, 2014
                      "As you mount your defense against the bad guys, it's important to make the distinction between the two major types of attack: the initial compromise and movement.

                      The initial compromise is simply the break-in. Movement, however, can be in two different "directions": horizontal or vertical. Moving horizontally means the attacker is shifting between similar roles of computers (client to client, server to server); vertical movement means the attack is maneuvering between different roles (client to server to domain controller)..."

                        IT - Careers
                        Keep Learning Linux - It's The Future
                        readwrite, February 26th, 2014
                        "Everyone's a tech company these days. From new-school video streaming services like Netflix to old-school grocery businesses and government agencies, technology increasingly drives business productivity. At the heart of this movement is Linux, resulting in exceptional, highly paid job opportunities for Linux professionals.

                        Software developers are the new kingmakers, according to Redmonk analyst Stephen O'Grady. Small wonder, then, that the most recent US News & World Report list of the top 100 jobs now ranks software developer at #1, with system administrator positions in the top 20.

                        Clearly, the economy is rebuilding around tech as every company seeks competitive advantage by making more intelligent use of their data and seeks to improve agility with cloud and open-source technologies, among other means.

                        What's perhaps less clear is just how much this new tech economy depends on Linux..."

                        Situation Normal, All Farked Up
                        Network World, February 20th, 2014
                        "Fark is one of my favorite funny places on the Internet, both because it speaks to my fondness for wordplay in the service of even low-brow humor and because the site has been kind enough to link to a lot of my Buzzblog silliness over the years.

                        So I thought I'd share with you Fark's 502 Bad Gateway error page, which I've seen from time to time, including a few minutes ago:.."

                          IT - Social Media
                          How to Craft a Legal Social Media Policy for Employees
                          Bank Systems and Technology, February 27th, 2014
                          "The legal and regulatory framework for corporate social media policies is still being formed as more cases are being brought before courts and regulators. Currently companies have to take into consideration a range of different regulatory guidelines and laws, including the National Labor Relations Act, anti-discrimination laws, FTC guidance and different regulatory directives. Those different guidelines and laws can sometimes conflict with each other, making crafting a legal social media policy a task that requires special attention for employers, particularly those in highly regulated industries like financial services, Christine Lyon, a partner at Morrison & Foerster LLP, said at a Practising Law Institute forum on law and social media yesterday in New York City..."
                            IT - Virtualization
                            Is the Hypervisor Security's Goldilocks Zone?
                            Dark Reading, February 21st, 2014
                            "During the past several years, there's been much attention spent at security events on handwringing over the security risks of cloud and virtualization adoption in the enterprise. The upcoming sessions at RSA will be no exception, but one security researcher with VMware will be turning the theme on its head. He's got a talk planned on how the fundamental technology around virtualization and cloud could actually hold the key to solving a lot of security's architectural problems..."
                            IT - Email
                            The Broadband Barbarians Will Soon Control the Gates
                            InfoWorld, February 24th, 2014
                            "I suppose I could write about network monitoring or virtualization architecture or maybe app dev, but it all seems pointless in the wake of what's happening with the Internet in the United States. On the one hand, we're building out robust, scalable infrastructures to support all kinds of magic, known and as yet unknown. On the other hand, we're watching the gates close on the very people who would use these infrastructures..."
                            IT - Big Data
                            Everyone's Doing It, But is It Legal?
                            January 28th, 2014
                            "Predicting Oscar winners at the Academy of Motion Picture Arts and Sciences annual Academy Awards show is a longstanding tradition among movie geeks, entertainment industry press, and people with too much time on their hands. Who else likes guessing the Oscars? Data scientists demonstrating the power of their prediction models, that's who. That's the case with Farsite, an analytics division of IT services provider ICC.

                            The analytics folks at Farsite have posted their annual Oscar night predictions, as well as a brief overview of how their statistical model works. If last year's predictions are any indication, Farsite's data geeks are either very good at movie-award prognostication -- or really lucky..."

                            How Bad Data Can Lead to Good Decisions (Sometimes)
                            ComputerWorld, February 20th, 2014
                            "Before companies can profit from big data, they often must deal with bad data. There may indeed be gold in the mountains of information that firms collect today, but there also are stores of contaminated or "noisy" data. In large organizations, especially financial institutions, data often suffer from mislabeling, omissions, and other inaccuracies. In firms that have undergone mergers or acquisitions, the problem is usually worse.

                            Contaminated data is a fact of life in statistics and econometrics. It is tempting to ignore or throw out bad data, or to assume that it can be "fixed" (or even identified) somehow. In general, this is not the case..."

                            Master the Mechanics of Facilitating a Decision with Your Data Science Team
                            TechRepublic, February 21st, 2014
                            "Perhaps the hardest part of being a leader is making decisions. That's why the luckiest leaders are the ones cradled in the comfort of a data science team. It's no secret that big data analytics can dramatically improve the quality of your decisions; however, it's pretty easy to mess this up with poor leadership.

                            Part of the issue lies in the belief that simply having more information--and the resources to analyze it--automatically improves your decisions. That's not true..."

                            NOAA Wants to Turn Its Ocean of Data Into Jobs
                            ComputerWorld, February 25th, 2014
                            "From ocean sensors to orbiting satellites, the National Oceanic and Atmospheric Administration (NOAA) collects about 30 petabytes of environmental data annually. But only about 10% of the data is made public, something the agency now wants to change.

                            NOAA wants to move its vast amount of untapped data into a public cloud, but without having to pay a whopping cloud services bill.

                            The agency believes the data has a lot of value to it, and is now seeking partnerships with commercial entities, universities and others. An ideal partner might be someone who can apply advanced analytics to the data to create new products and value-added services that also generates new jobs..."

                            Thirst for Better Data Analysis Drives Demand for Data Architecture Skills
                            InfoWorld, February 24th, 2014
                            "With businesses looking to mine their vast amounts of data for a competitive edge, data architecture skills are in great demand and can lead to hefty salaries, an analyst report reveals.

                            Data architecture was ranked number 1 in the highest-paid noncertified skills list featured in the Foote Partners IT Skills and Certifications Pay Index covering the fourth quarter of 2013. A senior data architect with 10 or more years experience could command an average salary approaching $125,000, according to David Foote, chief analyst at Foote Partners. "It's just on fire," with data architecture and database skills demand likely being driven somewhat by data analytics and big data, Foote said..."

                            What CIOs Say about Big Data
                            Federal Computer Week, February 24th, 2014
                            "The IBM Center for the Business of Government recently interviewed 28 public-sector CIOs at the federal, state and local levels about the challenges of implementing big-data projects. The findings below are excerpted from a larger report, 'Realizing the Promise of Big Data,' written by Arizona State University's Kevin Desouza..."
                            IT - Mobile
                            7 Hidden Dangers of Wearable Computers
                            ComputerWorld, February 25th, 2014
                            "Wearable computers, like fitness bands, digital glasses, medical devices and smart phones promise to radically transform the manner in which information is collected, delivered and used by, and about, people. Many of the emerging technologies promise significant, and potentially revolutionary, user benefits. But as with most Internet-connected devices, the growing proliferation of wearables has spawned both privacy and security concerns.

                            Wearable technologies enable capture and collection of amazingly detailed information about an individual's life, including their lifestyle choices, personal health, location, movement and daily routines. Without the right privacy controls, such data could end up being used in ways never imagined or intended. And without the right security controls, data gathered by such devices could enable identity theft, stalking, fraud and other crimes..."

                            Beware of Employees' Cheap Android Phones
                            CSO Online, February 20th, 2014
                            "An Android vulnerability known since 2012 has recently been found to be more serious than previously thought, particularly in phones that cost less than $150.

                            When first discovered, the vulnerability in the WebView class used to embed a browser component to display online content in an app was thought to require an ongoing man-in-the-middle attack to be exploited. Security vendor Rapid 7 recently found that not to be the case..."

                            The Mobile Spy in Your Pocket
                            InfoStor, February 24th, 2014
                            "A big chunk of the big data trend is about collecting and processing information to predict what you want to buy at any given moment. No wonder, because the incentive is huge.

                            Global spending on Internet advertising topped $100 billion last year. Big data processing to create rich user profiles -- based on cookies, clickstreams, keywords in social media content, and so on -- can go a long way toward delivering more targeted and effective advertising..."

                            Wearable Computers Could Act Like a Sixth Sense
                            ComputerWorld, February 25th, 2014
                            "People will one day depend on wearable computers to monitor not just their activities but a myriad of data about their health, making the devices basically like a sixth sense.

                            That's the vision that was laid out during the MIT Tech Conference on disruptive technologies in Cambridge, Mass. this past weekend. The wearable computer market will see the kind of dramatic growth that the smartphone market has over the last decade and wearables will morph from Fitbit-like bracelets to patches that stick to users' skin and sensors embedded in t-shirts and sneakers..."

                            Wearable Technology: It's About the Work, Stupid
                            SearchCIO, February 24th, 2014
                            "So much of the focus on wearable technology has been about its coolness factor. (And its fashion fails.) But there's plenty more to be excited about than looking at your wrist to find out who's calling the phone in your pocket -- especially for CIOs and IT leaders.

                            It's true that where businesses are concerned, much of the wearable tech talk has centered on how to defend against the coming onslaught. It will be BYOD all over again (presuming you figured it out the first time), trying to keep employees from spilling company secrets from their Google Glasses..."

                            Why CYOD is Hotter than BYOD
                            Business 2 Community, February 26th, 2014
                            "The term Bring Your Own Device was first coined in 2005; however, it didn't go into use until 2009. This is when Intel realized their employees were increasingly bringing their own devices to work and using them to connect to company data. Although, it wasn't until 2011 that it started to gain a much larger stature within the corporate world. The BYOD trend has been linked to an uptick in employee morale, in addition to making a company more attractive to potential staff. Here are some BYOD statistics:

                            • The Middle East has the highest adoption rate at 80%.
                            • There is a 75% adoption rate in Brazil and Russia.
                            • Developed markets have a 44% adoption rate.

                            CYOD - Choose your own device came about as a direct result of BYOD ..."

                            Top Ten Articles for last few Issues
                            Vol 192 Issues 1, 2 and 3; Vol 191 Issues 1, 2, 3, 4 and 5
                            We track how frequently each article is viewed on the web site to determine which the readers consider the most important. For last week, the top 10 articles were:

                            • Larry Ellison Talks Talent, Teamwork, And 'Insanely Great' Products
                            • SPARC T5-2 Produces SPECjbb2013-MultiJVM World Record
                            • Java+EE Basic Training
                            • Virtual Sysadmin Day and Hands On Labs
                            • Oracle Database Appliance 2.9
                            • Oracle Advanced Security Blog
                            • The CEO's Perfect Storm: Demographics, Data, and Devices Change Everything
                            • Oracle Extends Industry's Most Comprehensive Marketing Cloud
                            • Oracle Delivers Enterprise Financial Planning and Budgeting in the Cloud
                            • Zyme Relies on MySQL Enterprise Edition

                            The longer version of this article has list of top ten articles for the last 8 weeks.

                              IT - Server
                              Proprietary And Unix Systems Decline In Q4, X86 Up A Smidgen
                              IT Jungle, March 3rd, 2014
                              Timothy Prickett Morgan writes, "Let me start by saying that I did not create the language that is used in the computer business, particularly in the server racket, with a few exceptions. I don't like the terms "proprietary," and I don't like the terms "industry standard" as if all of the customers and vendors got together and created a non-proprietary machine. Best I can figure, the X86 architecture is still pretty much ruled by Intel and Windows was still the dominant operating system on X86 machines.

                              It is with this in mind that we go over the final quarter of server sales for 2013 using statistics from Gartner. The company, like its rival IDC, has a multidimensional database that allows analysts to dice and slice the market in a zillion different ways, but the data they provide for free looks at the market in only a few ways. The top five vendors by revenue and shipments, and then some ancillary data for pesky members of the press (like me) who want a little more detail that breaks out RISC and Itanium machines running Unix and machines based on X86 processors by revenue and shipments..."

                              NetBeans Podcast 68
                              Podcast Guests: Brett Ryan (John Sands), Andreas Stefik (University of Nevada), Petr Pisl (NetBeans)
                              NetBeans Community News with Geertjan and Tinu

                              • NetBeans 8.0 Beta was released in January; we read out "favorite" tweets that caught our attention: AndrewDyster, dipetr, ErazoZamudioEd.
                              • The NetBeans Partners page is revamped! Check it out for a listing of companies that are extending NetBeans with plugins and services.
                              • Congratulations to the 21st NetBeans Governance Board members: Tim Boudreau, Zoran Sevarac and Ashwin Rao!

                              Community Interview: Brett Ryan on Java 8 and NetBeans IDE

                              Australian developer Brett Ryan (John Sands) wrote a blog entry about experimenting with JDK 8 features in NetBeans. We stumbled across the post, liked it, and invited him to tell us more about his experience.

                              Community Interview: Andreas Stefik on the Quorum Programming Language

                              What makes a programming language more intuitive or a headache to learn? Find out as Andreas Stefik (a return guest!) chats about Quorum, the world's first evidence-oriented programming language.

                              See the detailed schedule and download the podcast.

                              Lessons from the Field: A directory transition from DSEE to OUD 11gR2PS1
                              By Sylvain Duloutre
                              Sylvain writes, "I was recently involved in a LDAP directory services transition project, from DSEE to OUD 11gR2PS1, for a large manufacturing enterprise. Directory service is medium-sized with a few of million LDAP entries, and is accessed by a wide range of services and applications, ranging from Corporate Directory to Identity Store for Identity Management and user management for intranet and extranet portals.

                              Here is an overview of the steps we followed and the issues we addressed during this project to successfully transition the infrastructure to OUD..."

                              Oracle Introduces Oracle Mobile Security Suite to Enable Organizations to Securely Deploy Applications and Access Data on Mobile Devices
                              New Suite Extends Leading Identity Management Platform with Unified Security to Support Mobility

                              As the workforce becomes increasingly mobile, the need for organizations to control access and protect company data on mobile devices has become more critical than ever. When it comes to mobile security, organizations need a solution that offers advanced security controls for corporate devices and personal devices (also known as Bring Your Own Device/BYOD or Corporate Owned Personally Enabled/COPE), while providing a simplified user experience. With the Oracle Mobile Security Suite, organizations have the flexibility to permit enterprise access from users' devices with more granular control by isolating corporate and personal data, enabling secure enterprise application access.

                              Nexenta News
                              NexentaStor 4 will be available in 2Q2014
                              Nexenta Delivers Next Generation Software Defined Storage Solutions
                              "Nexenta, the global leader of Software Defined Storage (SDS) solutions, announced the latest release of NexentaStor, the award-winning SDS solution and a key building block of the Software Defined Data Center. The announcement was made today at Cloud Expo Europe 2014 in London. This release of NexentaStor will be available in 2Q2014.

                              NexentaStor has strategically impacted the storage industry to lower TCO, and with the imminent release of NexentaStor 4.0 the business and technology benefits will exceed basic economics. NexentaStor is the leading commercial-grade SDS implementation, and SDS is key components of the mounting shift towards a Software Defined Data Center..."

                              Nexenta - Helping to Define the Software-Defined Enterprise
                              New report from IDC.
                              Nexenta is well-placed to take advantage of the growing market for software defined storage (SDS), as noted in a new report from IDC.

                              To date, Nexenta has more than 5,000 commercial and community users of NexentaStor, its award-winning enterprise SDS solution has strategically impacted the storage industry to lower total cost of ownership (TCO).

                              NexentaStor has been widely adopted across most market sectors around the world where scalability, storage management and costs are of significant concern to the end user. Demonstrating the global uptake of SDS, sixty percent of Nexenta's revenues now come from outside the USA.

                              The report highlights that the emergence of SDS will help to address top CIO and IT concerns around convergence, big data, hybrid architectures, cloud, and agnostic platforms, while helping companies to avoid vendor lock-in, and achieve performance and scalability, all with attractive economics.

                              Register for the IDC Report

                              Level3 News
                              tw telecom Chief Executive Larissa Herda Addresses the Pace of Innovation in an "On-Demand" World
                              tw telecom, February 27th, 2014
                              "We are embarking on a new paradigm for networking and computing," said Larissa Herda, Chairman and CEO of tw telecom, during her keynote speech to a group of industry leaders today at the opening of the Metro Connect USA 2014 conference in Miami.

                              "We are evolving to a world where our networks are connected ... intertwined, really, with the computer and the applications we need to run our business. This has become an on-demand world, and the model for communications networks has to change to meet the pace of change we're seeing with computing environments," Ms. Herda said...

                              Trending in
                              Vol 235, Issue 2
                              Trending IT Articles