News about Oracle's Solaris and Sun Hardware
System News
Mar 24th, 2014 — Mar 30th, 2014 Generate the Custom HTML Email for this Issue
System News System News for Sun Users
Volume 193, Issue 4 << Previous Issue | Next Issue >>
Sections in this issue:
click to jump to section


IT - CxO
x
Step Up To Digital Leadership
Forrester, March 26th, 2014
"No industry is immune to digital disruption.

Globally, executives acknowledge the disruptive influence that digital technologies have on their businesses. In fact, in a recent Forrester survey fielded in conjunction with Russell Reynolds, 41% of business and IT executives believed that their industry had already been moderately or massively disrupted and over half expected to see more disruption over the next 12 months..."

    Why CIOs Need To Think About The Internet Of Things
    Forbes, March 26th, 2014
    "I've previously questioned where we are with the so-called Internet of Things, but the WashPo webinar exposed issues that CIOs will need to think about; especially, as we've noted, as they begin to pay more attention to their company's customers. Because it was Washington, much attention was paid to privacy, security, and consumer protection - Maureen Ohlhausen, head of the Federal Trade Commission, also spoke - but the webinar frequently alluded to CIO-specific issues..."
    How CIOs Can Make IT Workplaces More Productive: 11 Best Practices
    eWeek, March 25th, 2014
    "Even though most of us enjoy and get satisfaction from the work we do, sometimes the complexities of managing our work feel less like enjoyment and more like a personalized form of hell. It can be agonizing trying to adapt to evolving work trends, spending an inordinate amount of time managing emails or sitting in unproductive meetings instead of actually getting tasks done. This doesn't include standard investments of time and effort in the adoption of new tools, helping incorporate new workers into the company or keeping oneself up to date with continuing education in specific fields.

    In this eWEEK slide show, we focus on how to improve productivity in the workplace..."

      How To Run The Best Virtual Meeting Ever
      Forbes, March 19th, 2014
      "In this time of decreasing travel budgets and increasing demands and constraints on participants' time, one big question looms: How can people around the world connect and work together in ways that 1) make the most of their time and 2) make the most of our budgets.

      Few teams and organizations conduct virtual meetings effectively enough to replace in-person meetings..."

        10 Innovation Tips for Enterprise IT from the Land of Startups
        Network World, March 24th, 2014
        "Whether you're a big brand or a startup that has momentum but is not yet mainstream, how do you keep the wheels of innovation turning without cannibalizing your money-making product?"

        "That was the key question behind the Always Be Innovating: Thinking Like a Startup panel at SXSW earlier this month. Listening to Greg Tseng, co-founder and CEO of Tagged; Hetal Pandya, co-founder of EasilyDo; Ryan Magnussen, founder and CEO of the Grail Project, and moderator Mike Isaac from Re/Code, I distilled the discussion to 10 essential points for big companies who want to capture that startup innovation magic:..."

        Being a Successful Healthcare CIO Requires Vision
        CIO, March 18th, 2014
        "The vice president and CIO of the Hackensack (N.J.) University Medical Center has achieved stage 1 of meaningful use at the 775-bed facility, which is the largest provider of inpatient and outpatient services in New Jersey. He's also completed two Epic Systems electronic health record (EHR )implementations and has some big ideas about bringing EHR to the cloud - a bit of a radical idea, considering that Epic says large customers don't buy into the cloud..."
        Driving Innovation at Fidelity Investments
        Network World, March 27th, 2014
        "Fidelity Investments is one of the world's largest providers of financial services, with assets under administration of $4.7 trillion, and it didn't get there by using yesterday's technology. In fact, the company has a standalone group, Fidelity Center for Applied Technology - more commonly referred to as Fidelity Labs -- whose job it is to take the long view, to examine technologies years before they become mainstream and help the firm get a leg up..."
          How Dell CIO Turned Dell IT from Order Takers to Business Partners
          SearchCIO, March 24th, 2014
          "When founder Michael Dell announced plans last year to take his company private, IT pundits speculated that the Dell CIO would be under tremendous pressure to cut costs. That's just how it goes in deals like this. So did Andi Karaboutis' budget get cut?"

          "That's probably one of my favorite questions, because that is what everybody thinks," said Karaboutis, vice president and Global CIO at Dell since 2011. "There hasn't been a year as CIO, or even before that, where I haven't been asked to take efficiencies and drive productivity."

          Out of the Shadows: Rogue IT Is Becoming CIO Business as Usual
          SearchCIO, March 17th, 2014
          "There's no place in Bart Murphy's organization for rogue IT. The CIO/CTO at the CareWorks Family of Companies in Dublin, Ohio, makes it part of his IT mission to ensure that surreptitious technology purchases just don't happen.

          That's because another big part of his mission is to make sure the 1,000-plus employees at CareWorks don't need to buy technology on the side to get their jobs done..."

          Windows XP Security Issues: Fact Vs. Fiction
          Dark Reading, March 12th, 2014
          "In less than a month, Microsoft will stop supporting Windows XP, still the second most widely used PC operating system in the world. The company announced the OS's April 8 termination date years ago, but with as many as 500 million XP systems still active last month, not everyone is going to make a move in time..."
          Stop Coddling or Punishing Vendors, or Else They'll Treat You Badly
          TechRepublic, March 25th, 2014
          "When you exhibit bad behavior with vendors, no one winds up happy. Discover the key to any successful vendor relationship.

          I've spent most of my career as a service provider, but I've also been on the other side of the equation, helping IT leaders through vendor evaluations and selections..."

            The Dirty Little Secret of Talent Sourcing No One Ever Talks About
            TLNT, March 27th, 2014
            "Yesterday I read yet another article about how to catch a Purple Squirrel, and right on cue, it got on my damn nerves.

            Of course, employers want to hire good (even great) workers. Of course, that won't happen by accident. And of course, no one wants to expend more resources than necessary to get an employee up and running.

            But here's the unvarnished truth - the 'dirty little secret' of talent sourcing, if you will:..."

              Features
              x
              Three Busted Social ROI Myths
              Blog by Jack Newton
              Today's post is from Jack Newton, Dir. of Outbound Product Management & Strategy for Oracle Social Cloud. He dispels some of the myths around social ROI, and demonstrates how to put ROI measurement on solid ground.

              I have social ROI set up as a Google Alert, and it's rare that a day goes by when there's not something posted about it. There are good reasons for this.

              One is that there are many myths about measuring ROI. And just like the definition of a myth - "a... legendary story... with or without a determinable basis of fact" -- myths tend to endure, get passed down and then repeated.

              Every good story needs a hero. That hero can be you by following some steps to get your company on solid ground with measuring ROI. And at the same time, set the company on a course to make the entire customer experience better...

              SPARC
              x
              Four High Performance Configurations for SuperCluster and SPARC Servers
              Rick Ramsey on Banking
              What first caught my interest was the idea of a bank operating system. A traditional computer OS manages hardware devices and provides services for application software. A bank headquarters does something very similar. It manages the branches (hardware) and provides services for its operations (applications). Turns out, that's the idea behind Finacle's Core Banking Solution.

              Core banking sounds dull as hell, but it's a big deal for banks. It replaces cumbersome end-of-day consolidation between branch banks and HQ. (I almost feel asleep just writing that.) In fact, centralized banks worldwide now mandate the implementation of core banking technology to prevent fraud and meet regulatory requirements.

              Exadata
              x
              cVidya's FraudView Provides Telcos with Up to 6X Faster Data Loading
              with Oracle SuperCluster
              cVidya announced it has earned Oracle SuperCluster Optimized status through Oracle PartnerNetwork (OPN), demonstrating that FraudView 10 is supported and has been tested and tuned on Oracle SuperCluster to deliver speed, scalability and reliability to customers.

              cVidya is a leading supplier of Revenue Analytics solutions to communications and digital service providers. cVidya's Fraud Management solution FraudView prevents, detects and investigates current and future threats from internal, external and partners' fraud across all business lines and services allowing for reduced TCO and increased ROI. cVidya is a Gold level member of Oracle PartnerNetwork.

              Grupo Farmacos Especializados Streamlines Business Operations with Oracle Infrastructure
              Oracle Engineered Systems Determined to be the Most Efficient, Cost-Effective Solution for Maintaining Business Growth
              The medical supply industry relies on information and streamlined processes to ensure that specialty drugs and medical equipment are delivered to the right people at the right time. While medical suppliers are looking for innovative ways to optimize their business, making changes can be risky and threaten business continuity. By leveraging Oracle Exadata Database Machine, Oracle Exalogic Elastic Cloud and Oracle Exalytics In-Memory Machine to consolidate all of its enterprise data, Grupo Fármacos Especializados, the leading supplier of specialized medical equipment and medicine in Mexico, improved service and delivery to pharmacies and medical institutions.
              Virtualization
              x
              Oracle VM VirtualBox 4.3.10
              Latest maintenance release
              Oracle VM VirtualBox 4.3.10 has just been released. This maintenance release improves stability and includes some new experimental features.

              For more details see the ChangeLog, or just simply download it now at the community or Oracle download sites.

              Java Technology
              x
              Java 8 Lambdas
              By Richard Warburton
              If you're a developer with core Java SE skills, this hands-on book takes you through the language changes in Java 8 triggered by the addition of lambda expressions. You'll learn through code examples, exercises, and fluid explanations how these anonymous functions will help you write simple, clean, library-level code that solves business problems.

              Lambda expressions are a fairly simple change to Java, and the first part of the book shows you how to use them properly. Later chapters show you how lambda functions help you improve performance with parallelism, write simpler concurrent code, and model your domain more accurately, including building better DSLs.

              8 Reasons To Love Java 8
              Forbes Article by Caroline Kvitka
              Caroline Kvitka, editor in chief of Java Magazine, writes in Forbes, "Java, the programming language used by millions of developers, is now even better. The launch of Java 8 on March 25 represents the most significant update to the Java programming model ever, and demonstrates that Java is thriving among a worldwide community of programmers, code contributors, and users.

              Technology-enabled innovation has become a top priority for businesses everywhere. Coming up with the next cool product or service and winning customers requires new ways of doing things. And software has become integral to business innovation - both for organizations that consider themselves tech companies and those that don't..."

              Learn More About New Features in Java SE 8
              By Raymond Gallardo
              Raymond Gallardo wrotes, "Java SE 8 introduces significant enhancements to the Java language and class libraries. These enhancements enable you to make code more concise without losing readability; write more reliable code; better utilize multi-core and multi-processor systems (code is no longer inherently serial or parallel); and detect more errors at compile time, rather than at run time.

              See What's New in JDK 8 and JDK 8 Adoption Guide for more detailed information on these new features and how to adopt them..."

              Java Magazine: Java SE 8
              March/April issue
              Tori Wieldt writes, "The March/April issue of Java Magazine jam-packed with information to get you started with Java SE 8, a revolutionary release of the world's #1 development platform.

              The biggest change in Java SE 8 - what some have called the most significant upgrade to the Java programming language ever - is lambda expressions, or closures."

              "Lambda expressions are anonymous methods that provide developers with a simple and compact means for representing behavior as data," explains Brian Goetz, Java language architect at Oracle. "In a few years, developers will wonder how they ever lived without [them]."

              IT - Technology
              x
              3D Printing: How Does it Really Work?
              Network World, March 24th, 2014
              "Three-D printers are the hottest thing on the IT landscape. Everyone - users and vendors alike - wants a piece of this pie and, with many 3D systems now printing candy and food, they could get their wish; that is, an actual, edible piece of pie. 3D printers are the 21st century version of Star Trek's replicators and they can, literally, print (or replicate) anything from a piece of pumpkin pie to a full-blown multi-story house. But 3D printing is not just one thing - there are many ways to do 3D printing. This slideshow illustrates the nine most common 3D printer technologies..."
              12 Bluetooth Gadgets for Geeks
              IT World, March 25th, 2014
              "Bluetooth, the short range wireless data communications technology, is in a huge range of products these days, and not just computers and phones.

              Originally created by Ericsson in 1994, Bluetooth was intended as a wireless alternative to the venerable RS-232 wired connections, and its success has been remarkable. Indeed the caretaker of the technology, the Bluetooth Special Interest Group, now boasts over 19,000 member organizations and the latest version..."

              3D Printing: 10 Companies Using it in Ground-Breaking Ways
              TechWorld, March 26th, 2014
              "A growing number of innovative companies are experimenting with 3D printers, propelling the technology closer to the mainstream market.

              From the big whig corporations down to the smallest startups, there are plenty of companies utilizing 3D printers to create new products, improve old ones, and better their business processes. As the technology becomes more accepted in the enterprise, it will quickly become more mainstream.

              We've compiled a list of 10 companies innovatively using 3D printers..."

                Researchers Explore Growing Solar Panels from Bacteria
                IT World, March 25th, 2014
                "MIT engineers have succeeded in creating "biofilms," which combine bacterial cells with nonliving materials, such as gold nanoparticles, that can conduct electricity or emit light.

                The hope is that biofilm, that slippery, slimy material made of bacteria that forms substances like dental plaque, may someday create functioning circuits that could be used to manufacture photovoltaic solar panels or act as 'biosensors' that could sense toxins..."

                  A Futurist on Why Lawyers Will Start Becoming Obsolete This Year
                  Wired, March 28th, 2014
                  "Karl Schroeder is one of the best of the current generation of hard science fiction writers. He's also an accomplished futurist who works for the design firm Idea Couture. In his new novel Lockstep, he presents the idea of a civilization that uses synchronized cryonics to maintain a thriving interplanetary society without the need for faster-than-light travel. This far future civilization has also replaced their entire legal system with all-knowing AIs. But we won't have to wait thousands of years for technology to start replacing lawyers..."
                    Science vs. Fiction: 15 Sci-Fi Technologies That are (Almost) Here
                    Network World, March 27th, 2014
                    "Classic science fiction examines social or scientific issues by projecting them forward to a kind of notional event horizon. As society and technology advance, the line between science and fiction gets thinner every year. We take a look at 15 classic sci-fi tech ideas, and the scientific and technological efforts to make them a reality -- some of which have already succeeded..."
                      What is 3D printing?
                      Network World, March 24th, 2014
                      "3D printers are the hottest new technology on the IT landscape. Everyone - users and vendors alike - wants a piece of the pie and, with 3D systems now printing candy and food, they could get their wish; that is, an actual, edible piece of pie.

                      Why are 3D printers so popular? Because they are the 21st century version of Star Trek's replicators and they can, literally, print (or replicate) anything from a piece of pumpkin pie to a full-blown multi-story house..."

                        IT - Bitcoin
                        x
                        Stripe now supports Bitcoin
                        VentureBeat, March 27th, 2014
                        "Online merchants who use Stripe for their payment-processing needs will soon be able to accept payments in Bitcoin.

                        Stripe chief executive Patrick Collison touted the faddish payment method in a conversation with Re/code. But he also noted in passing that Stripe will soon be adding something far more useful: The ability to process payments via the Automated Clearinghouse, or ACH..."

                        Cybersecurity Expert and CIO: Internet of Things is Scary
                        CIO, March 25th, 2014
                        "The terms 'Internet of Things' (IoT) and 'connected home' are two of the trendiest buzzwords in the technology world today. And while both clearly offer very real potential, they also introduce their own share of risk, particularly if they're not approached with caution, according to Jerry Irvine, an owner and CIO of IT outsourcing services firm, Prescient Solutions..."
                        Internet of Things (IOT): Seven Enterprise Risks to Consider
                        SearchSecurity, March 17th, 2014
                        "The day when virtually every electronic device -- from phones and cars to refrigerators and light switches -- will be connected to the Internet is not far away. The number of Internet-connected devices is growing rapidly and is expected to reach 50 billion by 2020.

                        However innovative and promising it seems, this so-called Internet of Things (IoT) phenomenon significantly increases the number of security risks businesses and consumers will inevitably face..."

                        IP Address Does not Identify a Person
                        Network World, March 24th, 2014
                        "A Florida District Court Judge recently determined that an IP address does not identify a specific individual guilty of infringing. She then dismissed a copyright troll's case. This is considered an important ruling that may help set a trend that others will follow.

                        Copyright trolls like to use IP addresses as evidence to ask courts to grant subpoenas so they can get their hands on account details from ISPs. The problem with that, as TorrentFreak points out, "is that the person listed as the account holder is often not the person who downloaded the infringing material."

                          IRS demands Bitcoins to be taxed as they are "property" and not currency
                          AmongTech, March 25th, 2014
                          "The IRS (Internal Revenue Service) officially announced on Tuesday March 25th 2014 that from now on any Bitcoin transaction made should be taxed, if not, taxpayers will be subject to penalty, users must also report any transaction made. This currently only affects people in the US and since Bitcoins are now treated as property for U.S. federal tax purposes, it means the following:..."
                          Building security around Bitcoin
                          SC Magazine, March 26th, 2014
                          "Recent news reports have already indicated that as cryptocurrencies such as Bitcoin become more widely used, the risk of a cyber attack also increases. The latest string of stories revealing high-value digital heists of cryptocoins from exchanges, users and service providers has highlighted the ever-present skepticism of the currency's viability as well as its security..."
                          MySQL
                          x
                          Buongiorno Relies on MySQL Enterprise Edition to Power its Mobile Services
                          Goal: Maintain a low Total Cost of Ownership (TCO)
                          Buongiorno's strategic goal is to deliver directly to consumers around the world a broad portfolio of content & services on all their personal devices, exploiting social and location based propositions, and letting telecom operators be in control of the billing.

                          MySQL was selected to power Buongiornos platform. The team especially valued its performance and scalability for mobile applications, including the ability to very quickly open and close connections to the database. MySQL was moreover extremely easy to use, and would allow the company to cost-effectively scale-out, adding more database servers at low cost to fuel its growing business.

                          MySQL instances are hosted on virtualized servers. The architecture currently consists of over 50 MySQL database instances ...

                          How To - Guide to appending data from Excel to an existing MySQL table
                          Javier Rivera
                          Javier Rivera writes, "Today we're going to talk about one of main features from MySQL for Excel.

                          There may be times when you have a MySQL Database table that you want to add new rows to. In this blog post we're going to show you how you can do that from within excel directly.

                          This guide assumes you already have a MySQL Server set up and running, Microsoft Office Excel 2007 or newer and MySQL for Excel installed. We will explain how to dump data into an existing MySQL table using the Append Excel Data to Table feature.

                          If you are already familiar with MySQL for Excel and have a connection to a MySQL server instance you can skip directly to step 4.

                          Today we're going to talk about one of main features from MySQL for Excel..."

                          MySQL March Newsletter
                          By Wei-Chen Chiu
                          Wei-Chen writes, "Have you read the MySQL March Newsletter? Check it out to learn more about the Call of Papers for MySQL Connect @ OpenWorld 2014, MySQL in action in the finance, retail and channel management sectors, as well as numerous technical tips written by MySQL experts at Oracle and in the community. The highlights in this edition include:

                          Submit Sessions for MySQL Connect @ OpenWorld 2014

                          • MySQL Connector/NET 6.8.3 Available as Official MySQL NuGet Packages
                          • New Case Studies: MySQL in Action in Finance, Retail, and Channel Management
                          • New White Paper: Guide to the MySQL Workbench Migration Wizard: From Microsoft SQL Server to MySQL
                          • Featured Video: How to Export Your Database with MySQL for Visual Studio
                          • Blog: Today's Practical Use Case for MySQL Performance Schema
                          • Blog: Repos and Distros: Upstream and Downstream

                          You can read it online or subscribe to it to receive the latest copy in your inbox automatically every month. Watch this tutorial to learn step-by-step instructions for newsletter subscription.

                          MySQL for Excel 1.2.1
                          A maintenance release for 1.2.x

                          The MySQL Windows Experience Team is proud to announce the release of MySQL for Excel version 1.2.1. This is a maintenance release for 1.2.x.

                          MySQL for Excel is an application plug-in enabling data analysts to very easily access and manipulate MySQL data within Microsoft Excel. It enables you to directly work with a MySQL database from within Microsoft Excel...

                          Cloud Computing
                          x
                          Oracle Has Sunny Forecast for Cloud Computing
                          By Ventana Research
                          At Oracle's recent cloud computing analyst summit in sunny Palm Springs, the company's executive team insisted that it sees clear skies for its efforts in cloud computing. The summit was led by senior executive Thomas Kurian, who runs the entire product organization and reports directly to CEO Larry Ellison. He affirmed that Oracle intends to offer the full range of cloud computing - public, private and hybrid models - to its customers and partners.
                          Building a Cloud-Based Data Center with Oracle Solaris 11
                          by Ron Larson and Richard Friedman
                          This article discusses the factors to consider when building a cloud, the cloud capabilities offered by Oracle Solaris 11, and the structure of Oracle Solaris Remote Lab, an Oracle implementation of an Oracle Solaris 11 cloud. This is the first in a series of articles that show how to build a cloud with Oracle Solaris 11.
                          IT - Cloud
                          x
                          Cloud Security Alliance Taking on Modern Threats
                          eWeek, March 28th, 2014
                          "The Cloud Security Alliance (CSA) is a multi-stakeholder non-profit organization that aims to improve cloud security through a variety of activities. Sitting in the CEO chair of the CSA is Jim Reavis, who is tasked with leading the organization and moving the state of cloud security forward.

                          In a video interview with eWEEK, Reavis explained what his role is within CSA and what is the role of CSA within the cloud community. Reavis said that the CSA develops a meta-framework that is focused on how cloud computing can be secured..."

                          Attack of the Killer Clouds and the Coming IT Storm
                          InfoWorld, March 25th, 2014
                          "I mentioned it recently: Private cloud is killing the IT pro. However, I was being somewhat facetious, and my prediction applies solely to hardware IT "pros" who spend their days looking for red lights on server and switch bezels to swap out components.

                          At this point, I'm not even sure we're categorizing that job as a strictly IT-oriented profession. Isn't that slowly blending into facilities management? For me, an IT pro covers both hardware and software: bezel green light configuration along with software server configuration..."

                          Cloud Deniers Are the Flat Earthers of the Tech World
                          InfoWorld, March 26th, 2014
                          "Last week, I wrote about the simple trend that anyone can see: The cloud is coming, so prepare yourselves for a shift in IT focus if you want to remain relevant. But somehow, some people read it as the eventual demise of the on-premises IT admin, perhaps because they saw only the headline "There's no future in on-premises IT -- it's time to move to the cloud."

                          It's unbelievable how many people angrily responded without actually reading the story..."

                            Lawsuit Raises Red Flags for Government Cloud Users
                            Information Week, March 25th, 2014
                            "A California lawsuit suggests the federal government must take stronger steps to protect government data from data mining and user profiling by cloud service providers.

                            In the technology-rich world we live in, it's critical for everyone to understand how their data is processed and used. For the government, it is arguably even more important, given the massive amounts of sensitive citizen data it possesses and stores..."

                              Surveillance is Driving Organizations Away from the Cloud
                              Help Net Security, March 27th, 2014
                              "A third of IT security professionals do not keep corporate data in the cloud because of fear of government snooping, with the majority of them preferring to store sensitive corporate data within their own networks, a new survey from Lieberman Software reveals.

                              The survey was carried out at RSA Conference 2014 in San Francisco and looked at the attitudes of nearly 280 IT security professionals towards cloud security..."

                              The 'OK, Well, Now What?' of Cloud Infrastructure
                              Business 2 Community, March 25th, 2014
                              "High atop the soap box here on Beard Mountain, I've been thinking (and quietly pontificating) about technology adoption, particularly the 'state of cloud'. People are listening to me because infrastructure is sexy now. We are at the stage of adoption where technology is adopted for the sake of the technology. How many times do you find yourself starting with a new gadget, and once it's in hand, the first thought crossing your mind is 'OK, well, now what?'..."
                              vBeers-SF
                              x
                              vBeers - South Florida (Wednesday, April 9th, 2014)
                              2nd Wednesday of every month
                              Join us for the next vBeers South Florida. We meet on the 2nd Wednesday of each month at Murphy's Law at the Hard Rock Hotel and Casino.

                              This will be a non-sponsored event so bring your wallet, your sense of humor and get ready for some great IT and virtualization conversations with some of the best people in South Florida's IT community (including YOU!).

                              Location: Murphy's Law Irish Bar

                              • Address:1 Seminole Way, Hollywood, FL 33314 USA
                              • Date: Wednesday, April 9th
                              • Time: 6pm to 9pm - arrive and depart any time

                              Parking is free. I recommend using the lot off 441. Park on the 4th floor and the elevator will drop you off right next to Murphy's.

                              Join the vBeers LinkedIn group. Network with fellow vBeers participants on-line.

                              Please RSVP via MeetUp.com or EventBrite.

                              IT - DR
                              x
                              What Makes an Effective Emergency Notification System?
                              CSO Online, March 20th, 2014
                              "Confidential company data can make its way onto mobile devices, where it's no longer under the protection of your toughest network defenses. Does that make your data vulnerable? To find out, review some strategies for preventing data loss on mobile devices..."
                                IT - Networks
                                x
                                Big Data Means Big Pipes
                                Network Computing, March 20th, 2014
                                "Crunching big data continues to challenge the industry to deliver faster and bigger solutions. Not only is data growing, but the advent of the Internet of Things and data-rich streams, such as those generated by retail store traffic pattern monitoring, are accelerating both the need to move data and the requirement to analyze it rapidly.

                                The IT industry is responding. For example, Intel has created a reference design for a memory-oriented system with 6TB of DRAM. This is aimed at extending the reach of in-memory databases, which are currently the leading edge of database performance."

                                SDN Changing the Shape of Networking, IT Careers
                                Network World, March 27th, 2014
                                "Cisco recently announced new certifications for its Application Centric Infrastructure (ACI) programmable networking initiative, its response to software-defined networking. The certifications are designed to tailor new roles for IT practitioners looking to transition their company's infrastructures to programmable, application policy driven, SDN-type environments.

                                Such certifications are expected to be the norm industrywide as SDN takes hold..."

                                IT - Operations
                                x
                                Customizing Chef
                                O'Reilly, March 27th, 2014
                                "Learn how to customize Chef by examining the internal structure of this configuration management tool and navigating its source code. This practical book also shows you how to integrate external tooling with Chef via the API, and takes a look at more advanced customization.

                                By the time you finish this book, you'll have a thorough understanding of how Chef fits together and be able to position your customization in the most appropriate place. And you'll have the skills to go ahead and write it. If you have intermediate-to-advanced Chef experience - particularly with knowledge you'd gain from O'Reilly's Learning Chef - you're ready to get started..."

                                DevOps as big a transformation as IT outsourcing?
                                ZDnet, March 24th, 2014
                                DevOps will soon be transforming IT departments in a way not seen since outsourcing hit the scene more than a decade ago.

                                That's the prediction of Steve Shah of NetScaler, who sees DevOps methodologies emerging in IT shops in which outsourced operations have been brought back in-house. In essence, he writes in a recent InformationWeek post, "DevOps is the new outsourcing."

                                Learning Chef
                                O'Reilly, March 27th, 2014
                                "Solve configuration management issues in enterprises large and small with Chef, the software tool that helps system administrators unravel configuration problems and explore new avenues in automation, deployment, and orchestration. With this practical guide, you'll quickly learn the basics of Chef before diving into complex use cases.

                                Not will this book enable you to solve detailed issues, such as the best way to manage 400 EC2 nodes, but it will also help you understand the changing organizational politics and thought-processes that come with infrastructure automation..."

                                Bank Of America Sees Software-Defined Data Centers as 'Irresistible'
                                ComputerWorld, March 24th, 2014
                                'Driven by a very strong belief in the future of software-defined data center technology, Bank of America is steering its IT to almost total virtualization, from the data center to desktop.

                                The technology does for the entirety of a data center what virtualization did for servers: It decouples hardware from the computing resources. Its goal is to enable users to create, expand and contract computing capability virtually, quickly and efficiently.

                                The software-defined data center is not yet a reality. But there are enough parts of the technology in place to convince David Reilly, Bank of America's global infrastructure executive, that it is the future..."

                                IT - Security
                                x
                                New non-profit against cyber crime launches
                                Help Net Security, March 24th, 2014
                                "Experts and companies in the information security industry formed the Secure Domain Foundation (SDF), a non-profit, community-driven organization devoted to the identification and prevention of Internet cyber crime utilizing the DNS.

                                Launched at ICANN's 49th Public Meeting, the SDF is backed by some of the industry's leading information security companies and organizations..."

                                Don't Put too Much Faith in Cyberinsurance
                                Dark Reading, March 26th, 2014
                                "Cyberinsurance is great for covering discrete costs like breach notifications and legal fees, but don't rely heavily on it for much else.

                                When contemplating threats to your organization (perhaps counting them instead of sheep while you shiver in a cold sweat on another sleepless night), you might be comforted by the thought of transferring risk to someone else -- like, for instance, a cyberinsurance provider. The trouble is that not all risks can be transferred, no matter how much you pay for a policy..."

                                  Security Tools You Should Try
                                  Network World, March 25th, 2014
                                  "Who doesn't like free stuff? There's a long tradition of free or open-source security tools, and one of the best sites to learn more about them is Security Tools, a running list of what it claims are the 125 best free security tools around.

                                  The Security Tools list, which is maintained by the Nmap Project, is a great spot to search for the best of the free network analysis tools that unfortunately, are used for evil as well as good..."

                                  Hacker's Delight: Internet of Everything
                                  CIO Today, March 25th, 2014
                                  "Thanks to smaller, cheaper processors, speedier wireless connections and the explosion of smartphones and tablets, it's becoming easier and more affordable to digitally link just about any object. Like a PC, the devices have operating systems and processors. And when they are connected to the Internet, hackers can break in and seize control..."
                                    How Do the FBI and Secret Service Know Your Network Has Been Breached Before You Do?
                                    Network World, March 26th, 2014
                                    "Knock, knock! Secret Service here. "Is this your customer payment card data?"

                                    By all accounts, many of the massive data breaches in the news these days are first revealed to the victims by law enforcement, the Secret Service and Federal Bureau of Investigation (FBI). But how do the agencies figure it out before the companies know they have been breached, especially given the millions companies spend on security and their intense focus on compliance?..."

                                    In Rare Move, Banks Sue Target's Security Auditor
                                    ComputerWorld, March 26th, 2014
                                    "Two banks that claim to have suffered losses from the recent data breach at Target have sued Trustwave Holdings Inc., the company that was responsible for validating Target's compliance with the Payment Card Industry Data Security Standard.

                                    In a lawsuit filed in federal court in Chicago, Trustmark National Bank and Green Bank N.A, sued both Target and Trustwave for not doing enough to protect customer payment card data. The lawsuit, which seeks class action status, accused both companies of negligence, deceptive practices, negligent misrepresentation and other misdeeds..."

                                    Internet Giants can Access Your Data, Too
                                    ComputerWorld, March 22nd, 2014
                                    "Security protections have been tightened at many of the major online services, as firms like Google and Microsoft pledge to protect their users against unwanted prying eyes. But while many people fret about unwarranted government access to their data, the Internet firms themselves play by their own set of rules.

                                    Some of the heat directed lately at the U.S. National Security Agency was focused this week on Microsoft instead. On Wednesday, Microsoft revealed that it had taken a peek at a French blogger's personal Hotmail emails as part of a company investigation into trade-secret leaks..."

                                    IT Leaders Share Tips on Managing Security Risks
                                    CIO, March 24th, 2014
                                    "IT security is a tricky issue: Too much security -- or too little -- could bankrupt your company. The key is to strike the right balance. These three IT executives share their advice.

                                    Martin Gomberg, global director of security, governance and business protection, A&E Networks: Security is a slide switch. Slide it all the way to the right, and nothing will get in, nothing will get out -- and nothing will get done. Slide it all the way to the left, and we will all have a party, it will be a great day -- but we'll only have one of them. My approach is to find the setting where risk is not too high, nor is risk mitigation an impediment to innovation..."

                                    Why employees are the biggest not-so-hidden threat to your business data
                                    EnterpriseAppsTech, March 26th, 2014
                                    "Which is the bigger security threat to your business; cyber criminals, or your own employees?

                                    Increasingly that question is being answered with the latter - and research from EE out today has revealed that nearly 10 million devices were lost by UK employees last year..."

                                    Natural Security Alliance Releases Specs for Strong Authentication Standard
                                    Help Net Security, March 27th, 2014
                                    "The Natural Security Alliance has released the newest specifications for its world first strong authentication standard...

                                    The standard defines a strong authentication method, for payment and access to services, across all channels (e.g. home, store, branch), without compromising security or privacy. This authentication method combines local biometric verification, a personal device and wireless technology, and can be implemented into various form factors, including a smartcard, micro-SD Card, mobile phone, secure element and token..."

                                    Security Should No Longer Be 'Cementing' the Status Quo
                                    CSO Online, March 20th, 2014
                                    "When considering the alarming number of mega-data breaches and other such security incidents as they occur almost daily, and then compare the announced "root causes" and "used attack paths" of the incidents with the current state-of-the-art strategies to defend against attacks, I have come to conclusion that, unfortunately, security (risk, audit, and compliance, and any other assurance functions) is more often than not only "cementing" the status quo, that is the currently used processes or ways of doing business in a somewhat "secure" fashion..."
                                    Stopping Vendors from Making Us a Target
                                    ComputerWorld, March 24th, 2014
                                    "Thank you, Target! It's a pity that security managers have to capitalize on other organizations' misfortunes to broker change within their own enterprises, but the notorious Target breach of late last year just might get me some things I think my company has needed.

                                    The breach may have occurred due to a gap in Target's vendor management program. Although the incident is still under investigation, it is suspected that an outside service provider that managed some of Target's heating and ventilation systems fell victim to a phishing attack that let the hackers gain access to Target's internal infrastructure and exploit resources containing customer data..."

                                    This is a Great Time to Start a Career in Cybersecurity
                                    Network World, March 21th, 2014
                                    "This is a great time to consider a new career as a cybersecurity professional. According to CIO magazine, experts in cybersecurity are among the most sought-after professionals in the tech sector, with demand for workers in that field outpacing other IT jobs by a wide margin.

                                    According to a recent report from Burning Glass Technologies, the demand for cybersecurity professionals has grown more than 3.5 times faster than the demand for other IT jobs over the past five years and more than 12 times faster than the demand for all other non-IT jobs. Current staffing shortages are estimated between 20,000 and 40,000 and are expected to continue for years to come..."

                                    You Want to Know Who Has Access to What? Good Luck
                                    InfoWorld, March 25th, 2014
                                    "Access control sounds simple, until you try to tease out rights and permissions for every user in your environment...

                                    There's a dirty little secret in the computer security world that makes the dream of least-privilege access control very hard to attain: It's often literally impossible to determine who has what level of access to which objects..."

                                    IT - Careers
                                    x
                                    Ten Job Search Rules To Break
                                    Forbes, March 26th, 2014
                                    "Our client Rick got a job offer last week. The offer took him by surprise. He'd talked about compensation in a general way with his hiring manager Kristin ten days before, but Rick didn't know an offer was coming, much less what the offer would contain.

                                    After ten days, Rick's offer arrived via Fedex. 'Are you going to accept it?' we asked him..."

                                      11 Tips for Working with IT Recruiters
                                      CIO, March 26th, 2014
                                      "IT is, by its nature, a technical, fast-paced and many times specialized industry. The necessary skills for career advancement are constantly evolving. With legacy systems, changing business goals and the constant march of new technology, companies are hard-pressed to find the necessary talent to keep their organization growing.

                                      Hot areas like big data, analytics, CIOs Forced to Grow Their Own Talent and mobile development are among the tech sectors struggling to find talented IT pros. In fact, in the recent Manpower Growth 2012 Talent Shortage Survey, 49 percent of employers report difficulties filling jobs..."

                                      Free Data Science Courses from Johns Hopkins, Duke, Stanford
                                      Network World, March 26th, 2014
                                      "The big data buzz has companies scrambling to bolster their tech ranks with skilled data gurus -- data scientists, data architects, data visualizers, data engineers, and more. If you've thought about trying to boost your skills and explore a new career path, check out Coursera's catalog of free classes. In particular, Johns Hopkins University is about to start a nine-class specialization in data science..."
                                      Tech Pros Name Their Most-Wanted Perks
                                      Network World, March 20th, 2014
                                      "The IT job market is as hot as it has been in years with high salaries, challenging projects and jobs available across all sectors nearly everywhere in the U.S. Companies are fighting for top talent, which has led them to re-examine the perks they can offer to attract and retain IT pros. Dice.com has examined the most-wanted perks across four hot tech fields: software engineering, cloud computing, big data and mobile development. Click ahead to see what matters most to IT pros..."
                                      The Top 10 Most-Searched-for Tech Skills
                                      IT World, March 21th, 2014
                                      "Companies and recruiters are clamoring for top IT talent, and HiringSolved has the list of exactly what they're looking for.

                                      Functioning like a search engine for recruiters, the site allows companies to find tech pros by mining social media sites such as LinkedIn, Facebook, Twitter, GitHub, Quora, Tumblr and more to compile a full picture of potential hires: skill sets, contact information, geographic location, etc..."

                                      IT - Virtualization
                                      x
                                      Virtualization 2014: Are we still having this conversation?
                                      ZDnet, March 24th, 2014
                                      "It's hard to believe we're still having this conversation in 2014, but it's true. There are still companies that haven't made the technological leap to virtualized infrastructure. But there's an easy answer as to why. It's the economy..."
                                      IT - Email
                                      x
                                      Brazil Passes Groundbreaking Internet Governance Bill
                                      ZDNet, March 26th, 2014
                                      "Brazil has made history with the approval of a groundbreaking post-Snowden Bill which sets out principles, rights and guarantees for Internet users.

                                      Last night (25), an overwhelming majority of Brazil's Chamber of Deputies voted in favor of the Marco Civil da Internet and its provisions around net neutrality, right to privacy and freedom of expression online..."

                                        IT - Mobile
                                        x
                                        5 Ways to Prevent Data Loss in Mobile Environments
                                        CSO Online, March 20th, 2014
                                        "Confidential company data can make its way onto mobile devices, where it's no longer under the protection of your toughest network defenses. Does that make your data vulnerable? To find out, review some strategies for preventing data loss on mobile devices..."
                                          Prevent BYOD from Becoming Bring Your Own Disease
                                          TechRepublic, March 24th, 2014
                                          "With BYOD initiatives seeing exponential growth, security has become an utmost concern for network managers dealing with mobile users.

                                          Everybody likes "free." But that likeability takes a hard hit when "free" is combined with "network security", particularly when BYOD (Bring Your Own Device) issues are involved..."

                                          The great IT and mobile user peace treaty
                                          SC Magazine, March 24th, 2014
                                          "The conflict between IT and users appears to be coming to a peaceful end as together they are finding unprecedented common ground. For years, users have pushed software companies for easy-to-use applications to help them do their jobs, while IT has maniacally focused on delivering highly available, secure and reliable systems and applications with simplicity and intuitiveness taking a backseat..."
                                            Location-Based Service Market to Reach Nearly $4 Billion by 2018
                                            eWeek, March 28th, 2014
                                            "The mobile location-based service (LBS) market in North America is forecasted to grow at a compound annual growth rate (CAGR) of 16.1 percent from $1.8 billion in 2013 to reach $3.8 billion in 2018, according to a report from IT research firm Berg Insight. The social networking and entertainment category has now become the largest LBS segment both in terms of number of active users and revenues..."
                                              The 12 Pros and Cons of a Cellular Smartwatch
                                              ComputerWorld, March 21st, 2014
                                              "Samsung is reportedly working on a variant of its Gear 2 smartwatch that works over cellular networks and doesn't require a Bluetooth or other connection to a smartphone.

                                              The Korea Herald reported this week that Samsung and wireless carrier SK Telecom of South Korea are working together on the project, according to unnamed sources. Initially, the new device would be sold in South Korea but could eventually be sold globally..."

                                              IT - Big Data
                                              x
                                              Big Business Culture Leading to Big Data Failure
                                              IT News, March 28th, 2014
                                              "Much of big data comes from people. Web logs, mobile phone usage, financial transactions, insurance claims are being recorded for potential further analysis to generate business value and improved customer experience.

                                              It goes by the name of customer analytics, and large retailers and service providers, at least in the US, are obsessed with it.

                                              Online businesses are significantly ahead of traditional bricks and mortar businesses when it comes to leveraging data to drive business value. The major reasons are cultural, social and operational..."

                                              Big Data Analytics: The Future of IT Security?
                                              ComputerWorld, March 21th, 2014
                                              "Big data analytics tools will be crucial to enterprise security as criminals deploy faster and more sophisticated methods to steal valuable data, according to security firm RSA.

                                              "We are really at the beginning of intelligence-driven security: it is just the tip of the iceberg. Looking forward we are going to have to be smarter [to deal with threats], and we are going to be looking at better data science," said RSA's head of knowledge delivery and business development, Daniel Cohen..."

                                              Big Data Means Big Pipes
                                              Network Computing, March 20th, 2014
                                              "Crunching big data continues to challenge the industry to deliver faster and bigger solutions. Not only is data growing, but the advent of the Internet of Things and data-rich streams, such as those generated by retail store traffic pattern monitoring, are accelerating both the need to move data and the requirement to analyze it rapidly.

                                              The IT industry is responding. For example, Intel has created a reference design for a memory-oriented system with 6TB of DRAM. This is aimed at extending the reach of in-memory databases, which are currently the leading edge of database performance..."

                                              Big Data, Big Pay: 10 Data Jobs with Climbing Salaries
                                              Network World, March 18th, 2014
                                              "The corporate appetite for big data is translating into rising salaries for IT pros. In its 2014 Salary Guide, Robert Half Technology (RHT) identifies 10 IT jobs in the data/data administration field. The highest paying is data warehouse manager, with starting salaries ranging from $115,250 to $154,250. The biggest raise goes to business intelligence analysts, who can expect a 7.4% boost this year. Read on to learn more about the salaries, skills requirements and typical duties of 10 data-centric IT jobs."
                                              Government Open Data Proves a Treasure Trove for Savvy Businesses
                                              ComputerWorld, March 24th, 2014
                                              "When President Barack Obama signed the Open Data Executive Order last May, many IT leaders applauded the White House's decision to release treasure troves of public data as part of an important government initiative for greater transparency.

                                              However, what many didn't bargain for was the state in which they'd find these once-buried data sets. "A dog's breakfast," "a train wreck," "a massive hairball" -- those are a few of the terms IT leaders have used to describe the vast volumes of public data now being made available to the general public..."

                                                IT - BYOD
                                                x
                                                5 things to consider before implementing BYOD
                                                Real Business, March 27th, 2014
                                                "Of today's Generation Y, around 90 per cent check their smartphones first thing in the morning - reinforcing the fact that today we are in an 'always on' environment.

                                                Whilst BYOD can bring a number of benefits to businesses, including cost savings, there are some steps every organisation should take before implementing it organisation-wide..."

                                                Top10
                                                x
                                                Top Ten Articles for last few Issues
                                                Vol 193 Issues 1, 2 and 3; Vol 192 Issues 1, 2, 3 and 4; Vol 191 Issue 5
                                                We track how frequently each article is viewed on the web site to determine which the readers consider the most important. For last week, the top 10 articles were:

                                                • JDK 8: General Availability
                                                • Oracle VM Server for SPARC 3.1.1
                                                • What's the #1 Ranked Tape Library?
                                                • Using COMSTAR and ZFS to Configure a Virtualized Storage Environment
                                                • Server Consolidation For Dummies
                                                • Hello Java 8 and NetBeans 8!
                                                • Enterprise Computing with Oracle Solaris For Dummies
                                                • NetBeans IDE 8.0 provides tools for Java 8 technologies
                                                • Exporting data from Excel to a new MySQL table
                                                • How NAB improved customer service using the cloud

                                                The longer version of this article has list of top ten articles for the last 8 weeks.

                                                  IT - Encryption
                                                  x
                                                  Quantum Cryptography to Help Us Keep Our Secrets Secret
                                                  Homeland Security News Wire, March 27th, 2014
                                                  "In the history of secret communication, the most brilliant efforts of code-makers have been matched time and again by the ingenuity of code-breakers. Sometimes we can even see it coming. We already know that one of today's most widely used encryption systems, RSA, will become insecure once a quantum computer is built. An article in Nature reviewing developments in quantum cryptography describes how we can keep our secrets secret even when faced with the double challenge of mistrust and manipulation..."
                                                  Developer
                                                  x
                                                  New NetBeans IDE Release with Comprehensive Support for Java 8
                                                  New Release Allows Developers to Take Advantage of the Latest Java Developments and Enhances HTML5 Development Features
                                                  Web and application developers are facing continuing pressure for efficiency and are seeking to adopt the latest standards and advancements in the Java language and platform. To address this need, Oracle has released NetBeans IDE 8.0. The new release allows developers to quickly take advantage of the latest enhancements in Java Platform, Standard Edition (Java SE) 8 and Java Platform, Micro Edition (Java ME) 8. It also provides new features that enable developers to work more efficiently with HTML5.
                                                  Oracle Solaris Studio 12.4
                                                  Beta version available for download

                                                  Oracle has announced the Oracle Solaris Studio 12.4 Beta release. Oracle Solaris Studio is a suite of compilers and code analysis tools that assist developers in creating highly optimized, robust, and secure applications for the Oracle Solaris and Linux Operating Systems. These tools help application developers achieve the best performance on Oracle's newest T-series and M-series SPARC servers, Fujitsu's M10 servers, and Intel-based servers.

                                                  MySQL Workbench 6.1.3 RC
                                                  final release candidate for MySQL Workbench 6.1

                                                  The MySQL developer tools team has announced 6.1.3 RC - the final release candidate for MySQL Workbench 6.1.

                                                  MySQL Workbench 6.1 is the upcoming major update for the official MySQL graphical development tool. Introducing over 30 new features, this version has many significant enhancement focusing on real-time performance assessment and analysis from the SQL statement level to server internals and file IO. You'll see this in additions to the SQL Editor as well as new dashboard visualization and reporting that takes advantage of MySQL Server 5.6 and 5.7 Performance Schema, and enhancements to the MySQL Explain Plans.

                                                  Nexenta News
                                                  x
                                                  How can organizations deal with rising data volumes and tight IT budgets?
                                                  Blog porting by Seagate
                                                  Cloud storage appliances and applications are evolving rapidly, which shouldn't surprise anyone who's been keeping a close eye on how organizations are managing their information. For small and midsize businesses and large enterprises alike, data requirements are becoming more demanding and unpredictable, straining the legacy infrastructures these companies have long relied on.

                                                  New data requirements, applications create need for cost-effective storage

                                                  In this context, organizations need cloud storage solutions that are efficient, scalable and economical...

                                                    Nexenta and Other Industry Leaders Initiate Worldwide Event Series
                                                    Focused on Software Defined Storage and Infrastructure

                                                    Nexenta, the global leader in Software Defined Storage (SDS), announced the full line up of leading industry speakers for its OpenSDx Summit EMEA (@OpenSDx) on April 9 at the DoubleTree Hotel, Amsterdam Centraal Station in Amsterdam.

                                                    Formerly known as Open Storage Summit, OpenSDx Summit EMEA is in its fourth year and is Europe's leading event focused entirely on the Software Defined Storage market.

                                                    In 2014, Software Defined solutions are edging on to the C-suite agenda, and OpenSDx is a unique nexus where key influencers and operators in the Software Defined marketplace get educated, share intelligence, and learn how to take best advantage of the SDx market opportunity.

                                                    Level3 News
                                                    x
                                                    tw telecom Announces Network Expansion
                                                    Colorado Springs, Memphis, and Orange Country

                                                    Colorado Springs

                                                    tw telecom it is nearly doubling its network reach in southern Colorado. The expansion will complement and extend network presence to the company's existing service area of central Colorado Springs, north to Monument, south to Pueblo and west to Cripple Creek and Woodland Park. read more

                                                    Memphis

                                                    tw telecom is expanding its existing network reach in Memphis with the addition of nearly 100 new route miles of fiber. The expansion extends the company's network footprint from the city of Memphis east to Germantown and Collierville, as well as north to Millington including access and connection capabilities to the Millington Naval Base. read more

                                                    Orange Country

                                                    tw telecom announced that it is expanding its existing market reach in Orange County with expansion efforts across nine cities. The expansion enables the company to provide service in new areas of the county, as well as boost economic development and jobs by adding key sales and technical positions to its local workforce. read more

                                                      Trending in
                                                      Vol 232, Issue 2
                                                      Trending IT Articles