News about Oracle's Solaris and Sun Hardware
System News
Mar 31st, 2014 — Apr 6th, 2014 Generate the Custom HTML Email for this Issue
System News System News for Sun Users
Volume 194, Issue 1 << Previous Issue | Next Issue >>
Sections in this issue:
click to jump to section


IT - CxO
x
IT and Business Remain Apart -- And That's a Good Thing
InfoWorld, April 1st, 2014
"Business unit leaders claim IT organizations don't understand business needs, don't know how to deliver technology that helps the business fast enough or smart enough, and generally live in their own little world more akin to an Amish village than a modern city. So say two studies, one from the Hackett Group and one from McKinsey, both organizations that specialize in understanding business execs' views of technology..."
    New federal rule requires banks to fight DDoS attacks
    Network World, April 4th, 2014
    "Banks and financial institutions regulated by the federal government must now monitor for distributed denial-of-service (DDoS) attacks against their networks and have a plan in place to try and mitigate against such attacks, a federal regulatory body said this week.

    In what is ground-breaking regulation for bank security, the Federal Financial Institutions Examination Council (FFIEC) issued a notice defining six steps it wanted banks and other financial institutions to follow, including first setting up a program to assess risk to IT systems, then monitoring Internet traffic to the institution's website to detect attacks, and being prepared to activate incident response plans with ISPs..."

    How Can CIOs Build Higher Personal Brand Equity
    CIO & leader, April 4th, 2014
    "There is still a fair percentage of CIOs who suffer from low esteem, primarily because they have not evolved with the times. However, they also face challenges from the C-suite, who, in turn, need to change their perception about CIOs.

    As the saying goes, 'Reputation travels faster than the man himself' So, when a CIO looks for opportunities outside his or her current role, his personal brand equity can play a vital role in not only getting entry into an organisation but also in creating a strong foot print..."

    IT Spending to Reach Nearly $4 Trillion in 2014
    eWeek, April 4th, 2014
    "Worldwide IT spending is on pace to total $3.8 trillion in 2014, a 3.2 percent increase from 2013 spending, as the global economy continues to show signs of a gradual recovery, according to a report from IT research firm Gartner. Telecom services spending is projected to grow 1.3 percent in 2014, with spending reaching $1.655 trillion..."
    3 Things That Will Help You Become an Exceptional Manager
    TLNT, March 31st, 2014
    "In my most recent post on Compensation Cafe, I referenced a quote from Don Knauss, CEO of Clorox, about the 'head' part of leadership.

    In Don's terms, the 'head' is focused on, well, focus - how you communicate to and reinforce for employees the tightly focused priorities need for organizational success.

    Today, I'm digging deeper into the same interview with Don Knauss to look at the 'heart' part of leadership..."

    4 Key Trends that Every CIO Should Watch
    Federal Computer Week, March 27th, 2014
    "The dominant public-sector technology trends of 2013 -- which include cloud, big data, cybersecurity and software as a service -- are here to stay, and they continue to evolve in ways that open up new challenges and opportunities for federal CIOs.

    Four technology trends in particular are shaping up to occupy growing mindshare among government CIOs in the months ahead, and they are worth watching as the year progresses..."

    7 Blowhard Bosses Bollix up IT
    InfoWorld, April 2nd, 2014
    "If you've ever reported to a blowhard boss, you know how they sap the staff's morale and chip at the company's bottom line. It's an ongoing mystery why so many of them are put in power in the first place.

    You may end up working under a blowhard boss at some point in your career, but rest assured you're not alone. Here are seven stories written by anonymous IT pros who've lived to tell the tale..."

    7 New Faces of the C-Suite
    CIO, March 10th, 2014
    "Meet the new boss, same as the old boss," as the song goes. Not so fast; today's businesses are rapidly introducing new roles into the C-suite to address emerging technology and challenges in a digital, online age and to better manage their talent. Here are seven new faces you're likely to see in the C-suite...":
      Key Considerations in Establishing a Chief Data Office
      Information Management, April 3rd, 2014
      "Many organizations are setting up centralized data management departments. These departments may be called Enterprise Data Management, Enterprise Information Management or the Chief Data Office. Whatever they are called, these departments are accountable for getting their organizations to treat data as an enterprise asset, they share some common characteristics and they increasingly report into the business rather than IT. The leaders of these departments often carry the title of manager, director or vice president of enterprise data management or enterprise information management, and many of these leaders are now being anointed Chief Data Officers. In this article, we use the term Chief Data Office to refer to the centralized data management department, and we use the term Chief Data Officer (CDO) to refer to the leaders of these departments.

      A Chief Data Office generally breaks new ground but is also fraught with several risks. When establishing a Chief Data Office, we recommend five areas of specific consideration..."

      Leadership for the Future? It Means Boldly Tackling Challenges Today
      TLNT, April 4th, 2014
      "Let's face it: business life won't be getting any easier or slower or less complicated (unless human nature and civilization undergo a radical reversal).

      Technology will keep advancing at a rapid pace, and the changes it brings will continue to reverberate through our society.

      When I was growing up, many things we take for granted now didn't even exist: cell phones, CDs, DVDs, home computers, and satellite radio, just to name a few. Now they're commonplace things most of us enjoy.

      What might be commonplace 30 years from now?..."

        Welcome to the Age of the Customer
        ComputerWorld, March 31st, 2014
        "Don't look now, but your company is losing control. Your marketing brethren are already living with the challenge: Customers are now in the driver's seat.

        The age of the customer turns up the heat on 21st-century institutions, causing disruption and discontinuities. Traditional sources of sustainable returns melt in the glare of increasing customer power. That new brand story you spent $18 million telling? It just got undercut by a single influential blogger compiling a list of 12 counterexamples that has been tweeted 1.2 million times and picked up by the news wires..."

          Features
          x
          Learn How to Plug Into the Internet of Things.
          Webcast on Thursday April 24, 9:30am Pacific
          The Internet of Things is changing everything. From the way you start your day in the morning, to the way products are manufactured and cities operate their services, machines all around you will collect data, share it with each other, and use it to recommend and even make decisions along the way.

          When building solutions for the Internet of Things, you must ensure that devices, hubs and data centers connect effectively, that systems integrate easily, and that applications and analytics work together seamlessly. Join Oracle with our partners and customers on Thursday, April 24 to learn how you can manage the complexity of the Internet of Things, and take advantage of business opportunities you haven't yet imagined.

          Register Today

          SPARC
          x
          Oracle SPARC Processor Roadmap
          Up Through 2019, Including Solaris 12
          Oracle has published an updated SPARC roadmap.

          The slides say, "The following is intended to outline our general product direction. It is intended for information purposes only, and may not be incorporated into any contract. It is not a commitment to deliver any material, code, or functionality, and should not be relied upon in making purchasing decisions. The development, release, and timing of any features or functionality described for Oracle's products remains at the sole discretion of Oracle..."

          Java Technology
          x
          New presentation: Java ME 8 Deep Dive
          By Terrence Barr
          Terrence writes, "I just posted an expanded and updated Java ME 8 Deep Dive slide deck on SlideShare.

          Agenda

          • The Rise of the Internet of Things
          • Java ME 8: Background and Overview
          • Java ME Connected Limited Device Configuration (CLDC)8
          • Java ME Embedded Profile (MEEP) 8
          • Java ME 8 Security Device I/0 API (D10)
          • Oracle Java ME Embedded 8 Product Information
          • Conclusion 8 Resources

          Read on for details.

          IT - Technology
          x
          EU Parliament Votes to Guard 'Net Neutrality'
          Bloomberg, April 3rd, 2014
          "The European Parliament voted in favor of 'net neutrality' rules, which restrict how phone companies manage their networks, in a move meant to prevent blocking or degrading of certain websites and traffic.

          The rules also include a plan for eliminating roaming charges -- the fees mobile-device users pay when making calls or using data outside their home country -- by the end of next year within the European Union. EU members will continue to review the regulation and the Commission expects a final agreement by end of the year..."

            First Images of Reversible USB Cables Emerge
            ComputerWorld, April 2nd, 2014
            "The ubiquitous USB cable that has always required users to plug it in "right side up" will soon get a welcome upgrade: a symmetrical plug similar to Apple's Lightning connector.

            A presentation by Intel this week showed the new USB Type-C cable specification, expected to be completed by July. The new spec will initially use existing USB SuperSpeed 3.1 and USB 2.0 technologies, according to the USB Implementers Forum..."

            Hot Products at Interop
            Network World, April 1st, 2014
            "Interop is one of the definitive networking shows. It's a place where vendors from around the industry come to display their latest and greatest products. Here are some of the hottest tools we've noticed so far at this year's Interop. (Products are listed in no particular order).."
            Most Amazing War-Related Technology Of 2014
            IT World, March 28st, 2014
            "Technology will keep transforming war, because it's always been doing that. In many cases, these 'advances' will make war even worse. In other cases, it will save lives. Here's an update on war-related technologies in the works in 2014, thanks to the ever-flowing spigot of Department of Defense (DoD) spending and the ubergeeks at outfits like the Defense Advanced Research Projects Agency (DARPA)..."
              Tech Shifts that Shook Up the Status Quo and Left the Experts Behind
              IT World, April 2nd, 2014
              "I think there is a world market for maybe five computers," would in retrospect have been a pretty funny thing for IBM CEO Thomas Watson to have said 1943. He never said any such thing, as it happens, but the urban legend that he did is very persistent, in part because of what we know about how technology advances: we know that what seems reasonably stable and fixed today can be swept aside as inadequate tomorrow, and what seems impossible today will be commonplace in the future. This slideshow examines moments in tech history when the consensus that we had reached a high point or logical conclusion became suddenly, hilariously incorrect..."
              The (Mostly) Cool History of the IBM Mainframe
              Network World, April 1st, 2014
              "In its history the IBM mainframe has been hailed and vilified. It has been born, reborn (many times) and pronounced dead. And yet the Big Iron remains a key computing resource for many large companies and will do so for many years. Here we take a look at the mainframe's long history, from its use with the US space program to its prominence inside large business data centers. Take a look..."
              IT - Bitcoin
              x
              IRS Bitcoin Ruling May Have a Bright Side
              CoinDesk, March 31st, 2014
              "Last week's guidance from the IRS on tax treatment for bitcoin transactions may have temporarily impeded one avenue in a single jurisdiction, but it has opened up another more significant avenue.

              An IRS 'property' classification for bitcoin reaffirms its status as 'digital gold' because it tacitly encourages one type of monetary activity (store of value) over another (medium of exchange)..."

              Square.s Online Merchants Can Now Accept Bitcoin
              recode, March 31st, 2014
              "Square announced on Monday that businesses that sell through the Square Market e-commerce program can accept bitcoin as payment, thanks to a partnership with bitcoin startup Coinbase. But unlike bitcoin processors that typically charge merchants one percent or less to change bitcoin into a local currency, Square is charging its merchants the 2.75 percent typical of credit card purchases, a spokeswoman said..."
              Online Payment Provider PayStand Exits Beta, Announces Bitcoin Support
              CoinDesk, April 2nd, 2014
              "California-based online payment processor PayStand has launched out of private beta to provide US-based websites and mobile applications another way to accept payments such e-checks, credit cards and bitcoin.

              With the announcement, PayStand also revealed $1m in new investment as part of its initial seed-funding round..."

              IT - FOSS
              x
              The open source culture of freedom and responsibility at Netflix
              opensource.com, April 2nd, 2014
              "His adventure started in college with Slackware, lead him to Sendmail, then eventually to Reddit, and now his career is streaming at Netflix. Jeremy Edberg is a Reliability Architect at Netflix and will be speaking at DevNation in April 2014 in San Francisco, California.

              We decided to catch up with Jeremy and ask him a few questions in advance of his talk. I'm really looking forward to learning more about the culture of Netflix which Jeremy describes as "Freedom and Responsibly." How that ties to open source? I'm curious..."

              You can't have DevOps without open source
              opensource.com, April 1st, 2014
              "You probably think I'm going to talk about all the reasons why you should use open source tooling as the foundation for an effective DevOps culture in your organization, but that's not what this is about. Not to marginalize the complexity of the challenges faced by the team I work with, but I have confidence that the engineers are going to figure the tooling part out. Believe it or not, the daunting part is wrapped in cultural change..."
              Solaris
              x
              How to install solaris 10 branded zone on solaris 11
              UNIX Arena by Lingeswaran R
              "Oracle Solaris 10 allows you to create a Solaris 9 and Solaris 8 as branded zone on SPARC environment and not supported on x86. But oracle Solaris 11 allows you to create Solaris 10 as a branded zone on both SPARC and X86 environments. For your information Solaris 9 and Solaris 8 branded zones are not supported on Solaris 11. So customers are forced to use Oracle Solaris 10 as branded zone or Oracle Solaris 11 now a days. Here we will see how to install oracle Solaris 10 as branded zone on Solaris 11 x86 environment..."
              MySQL
              x
              MySQL Workbench 6.1.4 GA
              The MySQL developer tools team announces 6.1.4 as the GA release for MySQL Workbench 6.1.
              MySQL Workbench 6.1 is an upcoming major update for the official MySQL graphical development tool. Introducing over 30 new features, this version has many significant enhancements focusing on real-time performance assessment and analysis from the SQL statement level to server internals and file IO. You can see this in additions to the SQL Editor as well as new dashboard visualization and reporting that take advantage of MySQL Server 5.6 and 5.7 Performance Schema, and enhancements to the MySQL Explain Plans.
              Oracle Improves Database Performance with Latest Development Milestone Release for MySQL 5.7
              New Release is 2x Faster than MySQL 5.6 and Over 3x Faster than MySQL 5.5
              Continuing to lead MySQL innovation, Oracle announced the immediate availability of a new Development Milestone Release for MySQL 5.7. To meet the demands of today's web, cloud, and embedded applications, the new release extends the performance, scalability and reliability of MySQL, the world's most popular open source database, while also enhancing management capabilities. In addition, Oracle announced the availability of several other MySQL product releases and early access features.
              Data Encryption with MySQL Enterprise Backup 3.10
              Introduces support for encrypted backup

              "MySQL Enterprise Backup (MEB) 3.10 introduces support for encrypted backups by allowing backup images, or single-file backups, to be encrypted. However, backups stored in multiple files in a backup directory can not be encrypted.

              Any MEB command that produces a backup image can be optionally requested to encrypt it. The encrypted backup image can be stored in a file or tape in the same way as an unencrypted backup image. Similarly, any MEB command that reads data from a backup image accepts also an encrypted backup image. This means that encrypted backups can be used in all the same situations as unencrypted backup images..."

              Cloud Computing
              x
              Learn more about Simplified UI for Oracle Cloud Applications
              Aylin Uysal, Oracle, shows the new Simplified UI for HCM
              Visit the Voice of User Experience, or VoX, blog for a new post about the strategy behind Oracle's Human Capital Management (HCM) simplified UI. Learn what's new from the Oracle HCM Cloud UIApplications User Experience team in Release 7, and find links to new video demos on simplified UI for self-service users and managers.

              Floyd Teter, of EiS Technologies and an Oracle ACE Director, also writes about simplified UI and Oracle Fusion Applications HCM in his recent blog post.

              Oracle VM VirtualBox 4.3.10
              New Features
              Robbie De Meyer-Oracle writes, "Oracle VM VirtualBox 4.3.10 is primarily a maintenance release fixing bugs but also adds some new (experimental) features. Mac OS X users can now experience native full screen support for Mountain Lion and Mavericks. Simply press the 'Host key' + 'F' to toggle this on or off, or go the View menu to 'Switch to Fullscreen'.

              An additional (experimental) new feature is the keyboard indicators (HID LEDs) synchronization for Mac OS X hosts. This feature makes the host keyboard lights match those of the virtual machine's virtual keyboard when the machine window is selected..."

              Linux
              x
              More Tips for Remote Access with Oracle Linux
              By Robert Chase

              Robert writes, "In a previous blog, Oracle Linux Tips and Tricks, I covered alternative ways to use SSH. In this article, I will cover some additional tips and tricks for using SSH for remote access, as well as some other ways to connect remotely to a server.

              SSH's primary use is for remote access to hosts. SSH is not only able to provide us a terminal interface to a server, it's also able to provide us a transport for a graphical interface. In order to utilize this functionality, we must have an X server running on our local workstation. On a Linux workstation with a graphical environment, this functionality is built in. On other systems, such as a Windows machine or a Mac, this functionality is not built in. Both XQuartz on the Mac and MobaXTerm are X servers for these platforms. There are also a number of other open source and paid products available for both platforms..."

              IT - Cloud
              x
              14 Questions that Drive Cloud Computing Strategies in the Right Direction
              SearchCIO, March 31st, 2014
              "Conduct a Google search on the phrase "What is the cloud?" and one of the first answers to pop up is 'the cloud is just a metaphor for the Internet.' While that statement is debatable, the bigger question is what questions CIOs should be asking to develop sound cloud computing strategies.

              In the first part of this CIO Matters column, IT and business strategy expert Harvey Koeppel discussed the quagmire of technology that is dubbed the cloud and why the technology itself does not translate into cloud computing strategies. Here, he runs through 14 cloud strategy questions that will lead CIOs to extract more business value from cloud computing..."

              Don't Let the Google-Amazon Price War Lead to the Wrong Cloud
              InfoWorld, April 1st, 2014
              "I'm beginning to view cloud providers as carnival barkers, standing on the sides of the strand, shouting out lower and lower prices for their services, in hopes of luring major enterprises to their tents. Of course, instead of peddling a two-headed goat, they're hawking on-demand and reserved instances.

              What's happing is that cloud providers are buying their way into the market, trying to create enterprise demand that isn't coming naturally. To do so, they're lowering prices and even deferring bills to attract both the Global 2000 and larger "small enterprises."..."

                Three surefire ways to screw up a cloud deployment
                Gigaom, April 3rd, 2014
                "Enterprises moving to the cloud now face the reality of moving from a PowerPoint presentation concept, to real work, with real risk and cost. The presentation is easier, trust me. However, it's the cloud implementation phase that finally starts making you money.

                The core issue is that most enterprises do not have the experience or talent to effectively leverage private or public cloud-based resources, so this becomes a bit of a trial and error type of process. Even if you use case studies from other enterprises with similar problem domains, you'll still run into issues that are unique to your enterprise, including problems with data integration, governance, poor application design, etc..."

                  IT Embracing the Cloud as Best Way to Deliver Value to Enterprises
                  eWeek, April 1st, 2014
                  "Cloud computing was once seen as an end run around the IT department, where any business manager with a credit card was a threat to the IT budget. No more'or at least no more as far as the attendees at this year's Cloud Connect conference were concerned.

                  Cloud Connect, which is held in conjunction with the Interop Las Vegas show, was all about how to make cloud computing an integral part of a company's IT strategy..."

                  A 'Cloud First' Strategy Calls for Strong Security: Five Tips to Get There
                  SearchCIO, March 31st, 2014
                  Security is still a major obstacle for IT when it comes to cloud adoption. That was made crystal clear at the Massachusetts Technology Leadership Council seminar on securing data, availability and reputation in the cloud, which attracted a mix of security, IT, entrepreneurs and business folks. As one attendee succinctly put it, "Why should we trust AWS [Amazon Web Services] when we have no visibility into their other side?"
                  How Boeing is Using the Cloud
                  Network World, April 3rd, 2014
                  "This week at Interop, Boeing's chief cloud strategist, David Nelson, outlined a couple of ways the aircraft manufacturer is not only using the public cloud, but combining that that with on-premises virtualized workloads to create a hybrid environment. The results are applications that Nelson says run more efficiently, are less expensive and serve the needs of Boeing better than if the company had done it all in-house..."
                  Security Fears Continue to Block Cloud Deployment
                  Dark Reading, April 3rd, 2014
                  "Concerns about security and governance are still the chief hurdles in deploying cloud technology, particularly when it comes to mission-critical applications, according to a study published this week.

                  The survey of more than 350 senior IT, which was conducted earlier this year by Unisys and IDG Research, reports that more than 70 percent of respondents feel that security is the chief obstacle in cloud deployment. Concerns about information governance (45 percent) and the ability to meet enterprise standards (42 percent) also ranked as top challenges..."

                  The NSA's Spying Has in Fact Hurt U.S. Cloud Providers
                  InfoWorld, March 27th, 2014
                  "When Edward Snowden ripped open the curtain and began revealing details of the NSA's data vacuuming, IT analysts warned that an unintended consequence of the program was a huge blow to the credibility of U.S. cloud providers. After all, they asked, why would anyone who cares about the security of their data put it someplace where government snoops could access it?..."
                  'State of the Cloud Report' Proclaims Hybrid is King
                  InfoWorld, April 2nd, 2014
                  "What's the state of business cloud in 2014? According to enterprise cloud SaaS provider RightScale in its newly published 2014 State of the Cloud Report, hybrid cloud is where everyone's at. Amazon is still tops for public and private cloud, but OpenStack is applying serious pressure in the hybrid world, and the next step for the cloud is making self-service IT more of a reality.

                  RightScale's report is drawn from surveys of more than 1,000 IT professionals..."

                  Inside the Shadowy World of Data Brokers
                  CIO, March 27th, 2014
                  "Most consumers would not recognize the names of the large data brokers that constantly collect detailed information on their finances, health and other personal information. It's safe to say most people probably have no idea this is happening at all. Those who are aware should be shocked by the extent to which their online and offline behaviors are being sifted through for profit..."
                  With CRM Data, More Isn't Always Merrier
                  CIO, March 27th, 2014
                  "Our current compute model has opened up numerous new possibilities into data delivery, content management, and overall improvements in user experience. The reality is simple: If you're carrying a smart device, you're probably connected into a data center somewhere. This certainly wasn't the case a few years ago. Users are demanding a continuous flow of information to any device, anytime and anywhere. Mobility has become the new normal...."
                  vBeers-SF
                  x
                  South Florida vBeers on Wed 9th and Thur 10th
                  2nd Wed of month @ hardock; 3rd Wed @Biscayne tavern
                  There will be two South Florida vBeers events this week. The first first is the monthly vBeers South Florida at Murphy's Law at the Hard Rock Hotel and Casino on Wed 9th: Details on vbeers.org.

                  The second event will be at Brewzzi CityPlace ... just after the South Florida VMUG User Conference.

                  Just show up at Brewzzi after the conference, have beer while the traffic subsides and network.

                  Brewzzi details

                  Software
                  x
                  Oracle Announces Oracle NoSQL Database 3.0
                  Latest Release Empowers Developers by Extending Security, Usability, and Performance
                  Continuing its leadership in enterprise-class database solutions, Oracle announced Oracle NoSQL Database 3.0. With this latest release, Oracle offers developers an enhanced NoSQL solution for building high performance, next generation applications. The combination of security, availability, scalability, and data model flexibility delivers a comprehensive high performance NoSQL solution for application developers.

                  Available today, Oracle NoSQL Database 3.0 is the latest version of Oracle's distributed key-value database, designed to simplify the development of next generation applications, while enabling greater security and availability for real-time, web-scale, workloads.

                  The enhancements to Oracle NoSQL Database 3.0 extend the security, usability, and performance required to support enterprise development and IT needs, including:..

                  IT - PM
                  x
                  20 Great Ideas to Steal in 2014
                  Information Week, April 2nd, 2014
                  "This is InformationWeek's 26th year ranking US companies that use technology in innovative ways. This time the recognition is even more special because we've narrowed the number of honorees from 500 to 100; we now call our ranking the InformationWeek Elite 100. The creativity represented by this year's 100 organizations has not narrowed, though. An overriding theme in their accomplishments: innovative use of big data. Out of this elite 100 we've chosen 20 of the best ideas to present in this slideshow..."
                  Debacle or Triumph: The Deciding Factors
                  Federal Computer Week, April 1st, 2014
                  "Ever since the Obama Administration's health care websites crashed last fall, Washington has been trying to figure out what's wrong with the federal government's ability to do large-scale IT projects. Last week's story about the cave in Pennsylvania where federal retiree applications are processed manually, as reported in The Washington Post, only added to the overall impression that when it comes to information technology the federal government is the gang that can't shoot straight..."
                  Events
                  x
                  Oracle Virtual Compute Appliance Webcast on April 16
                  Hosted by Charlie Boyle
                  Jeff Savit writes, "You may have heard of the Oracle Virtual Compute Appliance, an Oracle Engineered system for running virtual machines using Oracle VM. I've been working a lot with this product over the past several months, so I'm overdue to blog about it. It's really a powerful platform with built-in compute, network, and storage resources - something often referred to as "converged infrastructure".

                  What makes it most powerful, in my opinion, is that the environment is automatically discovered and configured when you power it up, so you can create and run your virtual machines right away and without having to go through laborious design and planning..."

                  IT - Networks
                  x
                  Intel, Arista Head Up Latest 100G Optics Effort
                  eWeek, April 1st, 2014
                  "Intel and Arista are spearheading the latest effort to fuel widespread adoption of 100 gigabit-per-second optical networking to data centers. At the Interop Las Vegas event April 1, the two vendors announced a new consortium of two-dozen tech companies - including Hewlett-Packard, Dell, Brocade, Oracle and eBay - that is developing a proposed standard for 100G bps links for data center switches that can support distances up to 2 kilometers and will address the need for faster and more cost-efficient ways to manage and move the increasingly massive amounts of data now inundating data centers..."
                  Attacks Rise on Network 'Blind' Spot
                  March 27th, 2014
                  "Interop speaker says DDoS attacks are not the only forms of abuse on the Domain Name Server.

                  The most high-profile attacks on Domain Name Service (DNS) servers are distributed denial-of-service (DDoS) attacks, but there are even more nefarious attacks on these systems underway today as cyber criminals and APT actors abuse commonly vulnerable DNS servers..."

                  Three Essential Tools for Solving the Worst Wi-Fi Headaches
                  IT News, March 28th, 2014
                  "Thanks to improvements to routers and network management software, connecting to Wi-Fi is vastly easier than it used to be. But that doesn't mean the experience is seamless quite yet. Even now you can still run into problems like poor signal quality, dropped connections, lack of public hotspots, and slow speeds.

                  Sick of the hiccups? These three programs can help take the headache out of Wi-Fi woes..."

                  IT - Operations
                  x
                  The Software-Defined Data Center: Potential Game Changer
                  Network Computing, March 31st, 2014
                  "If I were to choose one technology breakthrough that completely revolutionized the way data centers are designed and managed, I'd choose server virtualization platforms like VMware, Hyper-V, Xen, and KVM. There are a number of reasons why server virtualization has been so beneficial, including hardware cost savings, decreased data center footprint, and eliminating vendor lock-in..."
                  Top Initiatives in IT Operations for 2014-2015
                  Network World, April 1st, 2014
                  "In conversations with I.T. executives over the past couple months, I found the I.T. 'projects' and initiatives that seemed to float to the top of all of the organizations fell into a handful of core initiatives. Most of the initiatives were aimed at updating technologies to improve I.T. efficiencies, lower costs, and optimize operations. In no particular order, the initiatives are as follows:.."
                    Why the Next-Generation Data Center Needs to Be Agnostic
                    Network Computing, March 28th, 2014
                    "Our current compute model has opened up numerous new possibilities into data delivery, content management, and overall improvements in user experience. The reality is simple: If you're carrying a smart device, you're probably connected into a data center somewhere. This certainly wasn't the case a few years ago. Users are demanding a continuous flow of information to any device, anytime and anywhere. Mobility has become the new normal..."
                    IT - Security
                    x
                    12 Biggest Data Breaches of the Last 12 Months
                    CIO, April 1st, 2014
                    "Recent security breaches prove that regardless of the technology you have in place, if you are targeted by cyber-attackers -- whether through social engineering, a phishing attack or an employee opening a malicious file on the company network -- they will penetrate your defenses and steal whatever data they choose. Smart organizations are evolving their approach from a perimeter defense to a more a multi-layered, risk-based security approach, but in the meantime it seems as if most organizations are vulnerable..."
                    550k+ Card Details Stolen in 17-Month Long Spec's Breach
                    Help Net Security, April 2nd, 2014
                    "Texan liquor chain Spec's has been breached, and personal and financial information of over half a million of its customers has been compromised in a breach that lasted nearly a year and a half.

                    According to a statement published by the company, the attack apparently began on October 21, 2012, and may have continued through March 20, 2014. The company didn't say when they first found out about it, but according to the Houston Chronicle, indications that a breach might have happened date back to last year..."

                      Data Breach Response Leaves Something to be Desired
                      Federal Computer Week, April 3rd, 2014
                      "The number of government data breaches involving personal identifiable information has more than doubled since 2009, and the Government Accountability Office wants federal agencies to adhere more closely to existing security protocols to better protect people's data.

                      An April 2 GAO report found that the number of data breaches involving information such as taxpayer data, census data, Social Security information and patient health information have increased..."

                      How Hackers Use Employees to Break Through Security Walls
                      ZDNet, March 26th, 2014
                      "No one wants to think about the idea of their company's customer data, infrastructure, IP or network security as the full-time target for hired-gun hackers, government spies or crime syndicates around the world.

                      Unfortunately, it's true. Your most vulnerable point of attack is often the people you trust the most: your employees..."

                      How to Build Stronger Password Hashes? Hold a Contest
                      InfoWorld, March 28th, 2014
                      "In the password security arms race, the bad guys are winning. Once-sturdy cryptographic "hashing" algorithms -- pillars of online data security -- are proving vulnerable to brute force attacks that use souped-up hardware to make tens of billions of password guesses a second..."
                      Patch Management Flubs Facilitate Cybercrime
                      Network World, March 27th, 2014
                      "Failures in patch management of vulnerable systems have been a key enabler of cybercrime, according to the conclusions reached in Solutionary's annual Global Threat Intelligence Report out today, saying it sees botnet attacks as the biggest single threat.

                      The managed security services provider, now part of NTT, compiled a year's worth of scans of customers' networks gathered through 139,000 network devices, such as intrusion-detections systems, firewall and routers, and analyzed about 300 million events, along with 3 trillion collected logs associated with attacks..."

                      Simple Steps to Prevent Data Theft
                      Dark Reading, March 31st, 2014
                      "HID Global offered four tips for protecting organizations against the types of data breaches that recently occurred at major retailers.

                      An effective defense against the multiple threats these organizations faced requires numerous elements, including strong authentication and a five-layered security strategy in the enterprise IT infrastructure, plus more secure payment card technology at the point of sale..."

                      The Right Stuff: Staffing your Corporate SOC
                      Dark Reading, April 2nd, 2014
                      "What makes a top-notch security analyst? Passion, experience, and communication skills trump certifications and degrees. But you get what you pay for.

                      Building a Security Operations Center (SOC) from scratch or revamping an underperforming one is a daunting leadership challenge. If a cyber adversary gets past your SOC analysts, there is nobody else in the organization who can find them..."

                      'Thingularity' Triggers Security Warnings
                      Dark Reading, March 28th, 2014
                      "The Internet of Things is a security nightmare waiting to happen.

                      Part of the challenge is scale. By 2020, predicts Cisco, 50 billion different objects will be connected to the Internet, creating an Internet of Things market worth $19 trillion.

                      But at what cost? Indeed, the problem with the impending "thingularity" -- as some technology pundits describe the current rush to connect everything to the Internet -- is that we lack a way to keep billions of consumer devices updated with the latest security patches or firmware..."

                      Tips for Improving Your Cyber Security
                      Dark Reading, March 31st, 2014
                      "With cyber threats around the globe evolving and becoming more sophisticated, evidenced by the recent data breach at retailer Target, it is important that consumers protect themselves when using technology for sensitive information or data.

                      There are a number of steps that individuals can take to help improve their security both on and off the internet, including a few suggestions from Condor Capital:..."

                      What.s Quality Got to Do, Got to Do With It?
                      CSO Online, March 28st, 2014
                      "At the CSO40 conference next week, I'll be speaking on ISO 9001 and its application to information security. Pretty boring topic, huh? If I just had the legs and voice of Tina Turner, I think I could really get people to sit up and take notice -- albeit for the wrong reasons. But she's onto the right question: What's ISO 9001, an international standard of quality management, got to do with information security anyway?..."
                      Whose Fault is It that Users Are the Weakest Link?
                      CSO Online, April 1st, 2014
                      "An organization can spend mountains of cash on best of breed network defenses and security tools, but it can all come crashing down with one click from a user. Users are the weakest link when it comes to network and computer security, but a new survey from Globalscape reveals that the users themselves aren't entirely to blame.

                      A recent Ponemon Institute study found that two-thirds of all data breaches can be attributed to negligence, human error, and system glitches..."

                      IT - Careers
                      x
                      Do You Have the Body Language of a Champion?
                      Entrepreneur, April 3rd, 2014
                      "The NCAA Tournament is winding down to the Final Four, and even if you're not a basketball fan you can benefit from doing the little experiment I'm about to suggest. Turn your television on and watch one of the semifinal games for a few minutes, then mute the sound and cover the bottom of the screen where they show the score. Now, see if you can tell who is winning and who is losing based just on watching the players' and coaches' body language and how they are moving on the court. You'll only need to watch for a few minutes and I bet you'll nail it..."
                        Hire for cultural fit, train for the right IT skills
                        IT World, April 2nd, 2014
                        "As organizations struggle to adjust to the new growth economy, finding top talent is one of their biggest challenges. According to a recent study from Deloitte's Global Human Capital Trends 2014, "Critical new skills are scarce -- and their uneven distribution around the world is forcing companies to develop innovative new ways to find people, develop capabilities and share expertise."

                        But equally important is retaining talent once you've found it -- making sure that your efforts to identify, recruit, hire and develop talent aren't in vain. Sourcing and hiring with retention in mind requires companies to focus less on skills and experience and more on cultural fit and development potential, says Chris Duchesne, vice president of Workplace Solutions, Care.com..."

                          IT - Email
                          x
                          Canonical and Secret: The Dot-Com Bubble Springs Two Slow Leaks
                          InfoWorld, April 3rd, 2014
                          "Is it starting? We've all been waiting for it: the next Silicon Valley implosion.

                          The signs are there: ridiculous amounts of money thrown at barely birthed startups guaranteeing fantastic financials with no real evidence, debauched frat boy entrepreneurs who firmly believe their business plan is worth several billion dollars, and Fox contemplating a reality show starring the antique car hoarders of Mountain View. The most recent indications of a digital doom redux are Canonical shuttering its cloud service and the new online Silicon Valley bitch bin, Secret..."

                            CIOs Chime in on Maine Texting Scandal
                            Government Technology, April 3rd, 2014
                            "In response to allegations that some state employees were using text messaging to avoid their conversations being captured by public-records requests, Maine Gov. Paul LePage recently outlawed texting to conduct state business. But a number of public-sector CIOs believe the harsh reaction could cause further problems down the road.

                            Speaking to Government Technology on condition of anonymity, one state CIO likened text messaging to telephone conversations that happen in the course of state business every day that aren't recorded and don't become part of the public record. The CIO believed that taking away texting could start a dangerous precedent that may cost states a valuable means of communication..."

                            IT - Mobile
                            x
                            Bring Your Own Wearables (BYOW) on the Way, Google Exec Warns Cios
                            TechWorld, April 3rd, 2014
                            "A senior Google executive warned CIOs yesterday that they need to prepare for the the next big technology trend - bring your own wearables (BYOW).

                            Thomas Davies, Google Enterprise director for Northern, Eastern and Central Europe, said: 'The BYOD [bring-your-own-device] boat has sailed...the next wave is going to be bring-your-own-wearables.'

                            Davies told CIOs and CEOs at Google's annual enterprise conference that there's no longer any such thing as an IT perimeter for the enterprise..."

                            Invasion of the body snatchers: wearable devices are coming for you
                            IT World, March 28th, 2014
                            "A place in your pocket is no longer enough for mobile gadget makers: now, they want your body.

                            Just last week, Google trotted out Android Wear, its first big push to extend the dominant smartphone OS to wearable devices. The first Android Wear device, an LG smartwatch, was also announced and more are sure to come. They'll add to scores of wearables that have been unveiled this year, starting at International CES in January..."

                            IT - Big Data
                            x
                            Big Data, Privacy and Ethics
                            IT World Canada, March 30th, 2014
                            "To some big data, privacy and ethics are three silos that organizations deal with separately. But the fact is they are all tied together.

                            When the data includes personal information - or information that can be used to identify a person - then privacy and ethics automatically become involved.

                            However as Jonathan King, a vice-president at cloud provider CenturyLink Technologies, and lawyer Neil Richards point out in a column for O'Reilly.com, the knot doesn't have to be constricting..."

                            Big Data Showdown: Cassandra vs. HBase
                            InfoWorld, April 2nd, 2014
                            "In this brave new world of big data, a database technology called "Bigtable" would seem to be worth considering -- particularly if that technology is the creation of engineers at Google, a company that should know a thing or two about managing large quantities of data. If you believe that, two Apache database projects -- Cassandra and HBase -- have you covered..."
                            IT - BYOD
                            x
                            CIOs Embracing Mobility Must Tackle Security, BYOD Concerns
                            eWeek, March 31st, 2014
                            "Mobility has introduced disruptive business and employee demands that are causing chief information officers (CIOs) to shift to a new model of enterprise IT, according to the results of a MobileIron survey of more than 400 IT and IT security practitioners in financial services organizations conducted by the Ponemon Institute..."
                            Top10
                            x
                            Top Ten Articles for last few Issues
                            Vol 193 Issues 1, 2, 3 and 4; Vol 192 Issues 1, 2, 3 and 4
                            We track how frequently each article is viewed on the web site to determine which the readers consider the most important. For last week, the top 10 articles were:

                            • A few Thoughts about Single Thread Performance
                            • 8 Reasons To Love Java 8
                            • Four High Performance Configurations for SuperCluster and SPARC Servers
                            • Oracle Solaris Studio 12.4
                            • SPARC M6-32 Produces SAP SD Two-Tier Benchmark World Record for 32-Processor Systems
                            • Three Busted Social ROI Myths
                            • Java 8 Lambdas
                            • Java Magazine: Java SE 8
                            • Learn More About New Features in Java SE 8
                            • Telefonica's Digital, Telstra Corporation and Verizon Enterprise Solutions Recognized

                            The longer version of this article has list of top ten articles for the last 8 weeks.

                              Sysadmin
                              x
                              Unix: 7 habits of highly successful Unix admins
                              By Sandra Henry-Stocker
                              Sandra Henry-Stocker writes, "Unix admins generally work a lot of hours, juggle a large set of priorities, get little credit for their work, come across as arrogant by admins of other persuasions, tend to prefer elegant solutions to even the simplest of problems, take great pride in their ability to apply regular expressions to any challenge that comes their way, and are inherently lazy -- at least they're constantly on the lookout for ways to type fewer characters even when they're doing the most routine work.

                              While skilled and knowledgeable, they could probably get a whole lot more done and get more credit for their work if they adopted some habits akin to those popularized in the 1989 book by Stephen R. Covey -- The 7 Habits of Highly Effective People. In that light, here are some habits for highly successful Unix administration..."

                              Networking
                              x
                              About link aggregation, water and buckets
                              By Joerg Moellenkamp

                              Despite popular belief ethernet networks aren't lossless, on the long way between the TCP/IP stack from one side to the TCP/IP-stack of the other side there is a lot that can happen to the data. Datacenter Bridging is a mechanism to put some kind of losslessness on the network needed for shoehorning storage protocols on it (FCoE). That said most of the time ethernet networks appear as lossless, even to that extent that protocols are used for important traffic that were used once for traffic considered as "nah, not that critical, when the packet doesn't arrive" ... UDP for example...

                              Security
                              x
                              Oracle Solaris 11.1 Gets Common Criteria Certification
                              EAL4+ under the Canadian Common Criteria Scheme (CCCS)

                              The Oracle Solaris 11.1 operating system achieved a Common Criteria certification on March 18, 2014 at EAL4+ under the Canadian Common Criteria Scheme (CCCS) conformant to the BSI Operating System Protection Profile v2.0 2010-06-01 with the following 4 extended packages.

                              • Advanced Management v2.0, 2010-05-28
                              • Extended identification & Authentication v2.0, 2010-05-28
                              • Labeled Security v2.0, 2010-05-28
                              • Virtualization v2.0, 2010-05-28

                              The evaluation is summarized in the list of certified products.

                              Enhanced Oracle Solaris Cluster Security Framework
                              By Krishna K Murthy

                              "Besides providing high availability (HA) & reliability to the applications, Oracle Solaris Cluster data services (agents) strive to provide a very secure HA environment by leveraging some of the salient security features implanted in the Oracle Solaris Cluster software. Oracle Solaris Cluster Resource Group Manager (RGM) callback methods such as Start, Stop or Validate execute with a high level of privilege and must be protected against modification by a non-privileged user. These callback methods in turn might execute application programs that often do not require elevated privilege. If an application program is to be executed with elevated privilege, it must similarly be protected against modification by an unprivileged user..."

                              Nexenta News
                              x
                              Nexenta to Present and Showcase Software Defined Storage Solutions at 451 Research's Hosting and Cloud Transformation Summit 2014
                              Nexenta's Chairman and CEO, Tarkan Maner, to Present
                              Nexenta announced that it is a Gold Sponsor of the Hosting and Cloud Transformation Summit, organised by 451 Research.

                              Storage is a top of mind issue for the growing number of cloud and hosting service providers looking to provide large scale, highly flexible solutions at an attractive price point. Software Defined Storage will help take the cloud to the next level and enable end users to achieve the Software Defined Infrastructure (SDI) they seek.

                              By leveraging SDS to embark on the journey to SDI, these agile service providers will help deliver greater performance, better reliability, and lower TCO to their industry-leading end users.

                              A Bridge Over Troubled (v)Storage
                              Blog Posting

                              At Nexenta, we are obviously big believers in the software defined data center (SDDC), and the importance of software defined storage (SDS). The SDDC makes too much sense not to take hold; the only variables are around timing and adoption speed.

                              We see VMware's release of their Virtual SAN SDS solution as an important catalyst to address these variables. A larger player such as VMware can have significant impact on the way that enterprises run their datacenter.

                              Read the rest of the Blog ...

                              Level3 News
                              x
                              tw telecom Selected by Digital Realty to Provide Customers Direct Connection to Amazon Web Services
                              Will use eLynk Express for AWS service
                              tw telecom, a leading provider of Business Ethernet and networking solutions, announced it was selected by Digital Realty Trust, the global data center and colocation company, to connect Digital Realty customers in 12 key North American markets to Amazon Web Services (AWS). tw telecom will use its innovative eLynksm Express for AWS service to ensure Digital Realty's customers have better, faster and easier connections to the AWS cloud.

                              "Through its eLynk Express service, tw telecom provides a fast, secure and private solution for our enterprise and midmarket customers to effortlessly connect to AWS in many of our North American markets," said Bill Stein, interim CEO, Digital Realty.

                              "We are committed to providing our customers secure, reliable and cost-effective data center solutions that enable their growth. Our relationship with tw telecom and this capability will certainly help meet clients' critical needs now and into the future."

                              Trending in
                              Vol 231, Issue 3
                              Trending IT Articles