News about Oracle's Solaris and Sun Hardware
System News
Apr 7th, 2014 — Apr 13th, 2014 Generate the Custom HTML Email for this Issue
System News System News for Sun Users
Volume 194, Issue 2 << Previous Issue | Next Issue >>
Sections in this issue:
click to jump to section

Database Insider
April 2014 issue now available
The April issue of the Database Insider newsletter is now available. (Full newsletter here)

  • ODTUG President Monty Latiolais on Planning Ahead for Kscope 14
  • Oracle Independent Users Group Announces Award Winners
  • Q&A: Oracle's Paul Needham on How to Defend Against Insider Attacks
  • Oracle SQL Developer Major Feature Demonstration
  • Automate Database Storage Management and Improve Performance with Oracle Database 12c
  • Q&A: Oracle's Paul Needham on How to Defend Against Insider Attacks


Fujitsu and Oracle Enhance Fujitsu M10 SPARC Servers
New Systems Contribute to IT Investment Optimization with Industry Leading Performance
The enhanced Fujitsu M10 servers feature the new SPARC64 X+ (pronounced 'ten plus') processors that can run at speeds of up to 3.7 GHz and offer 1.3 times the performance of the previous generation. The enhanced servers provide a high-performance, scalable platform for server consolidation and modernization projects. To date, Fujitsu M10 servers have set 15 world records in major benchmark tests.

Fujitsu and Oracle announced worldwide availability of enhanced Fujitsu M10-1, M10-4 and M10-4S servers equipped with the new SPARC64 X+ processor, which has 16 cores and runs at speeds up to 3.7 GHz, providing up to 30 percent more processing power than the previous SPARC64 X processor.

The new Fujitsu M10-4S server supports mixed SPARC64 X and X+ chassis in a single system, protecting previous IT investments. In addition, the modular design and Physical Partition Dynamic Reconfiguration feature allow the Fujitsu M10-4S to grow by adding processors, memory and I/O with virtually no downtime.

Abu Dhabi Police Implements Oracle SuperCluster T5-8
for Oracle E-Business Suite
Abu Dhabi Police has been working on revamping their IT infrastructure to bring the best-in-class technologies. They selected Oracle SuperCluster T5-8 to implement a large-scale consolidation of Oracle E-Business Suite and Oracle Enterprise Database instances, consolidating data center environments for rapid deployment.

Oracle SuperCluster T5-8 was the optimal, integrated solution. Abu Dhabi Police decided on an "Oracle on Oracle" approach - running Oracle software on Oracle hardware - which provided Oracle Database RAC, Solaris zone clusters for Oracle E-Business Suite, Oracle Active DataGuard for disaster recovery, migration of database to 12g database instances, and supporting applications (CMRO). Oracle Consulting Services managed the complete end-to-end migration.

Oracle DB 12c runs best on SPARC
What makes Solaris and SPARC servers the best infrastructure for Oracle 12c enterprise databases?

Oracle's vision of Engineered Systems is transforming into reality with every new product that Oracle is launching. Oracle Database 12c, which was launched in 2013, is an example on how Oracle software is optimized for Oracle Solaris SPARC. Oracle Database 12c is co-engineered with Solaris engineering team and Oracle's world record SPARC T5 servers have best performance and maximum ROI.

Independent Software Vendors (ISV) who are developing applications using both Oracle DB 12c and Solaris are taking advantage of one core technology, one operating system, one virtualization tool for all the range of SPARC servers. An ISV application can boost its performance, flexibility and security just by using SPARC high numbers of cores and big memory, combined Oracle 12c/Solaris/SPARC multi-tenancy, zones and LDoms light-weight virtualization technologies, SPARC and Solaris build-in encryption, etc.

Let's take a look at how all this is translated into technical features. What makes Solaris and SPARC servers the best infrastructure for Oracle 12c enterprise databases?...

UL Turns to Oracle to Simplify IT Infrastructure
Supports Company Transformation and Future Growth
In an ever-changing business environment, companies need an IT infrastructure that can scale with them. To accommodate a growing customer base and numerous acquisitions, UL chose Oracle Exalogic Elastic Cloud and Oracle E-Business Suite to support its company transformation, boost performance, increase operational efficiency and dramatically simplify the management of its IT environment. As a result UL has been able to better serve its customers while laying the foundational infrastructure for significant growth...
Oracle Engineered Systems Backup Utility 2.0
Reduce hours to minutes for Oracle Engineered Systems backup setup.
The Oracle Engineered Systems Backup Utility (ESBU) streamlines the implementation by configuring Oracle ZFS Storage Appliance and the database nodes of an Oracle engineered system through a command-line-based wizard. Rather than having to enter up to 20 individual steps per database node, ESBU easily implements best-practice configurations based upon a few simple user input selections (Cut Backup Setup Time by 8X).

This ESBU release supports Oracle Exadata, Oracle SuperCluster and Oracle Database Appliance (ODA) systems.

IT - Storage
Big Data Needs Software-Defined Storage
InfoWorld, April 9th, 2014
"With demands for agility and capacity, storage systems can't be islands. IBM's Ronald Riffe explains how software-defined storage provides a broad, hardware-independent solution...

The proliferation of mobile devices and instrumented enterprise assets is igniting a new data explosion, from which can be gleaned new analytic insights and, in turn, open new business opportunities. At the same time, big data is placing greater demand on existing infrastructures, driving a need for instant access to resources -- compute, storage, and network -- and creating a new imperative to adopt cloud technologies. The flexibility required simply can't be obtained with a traditional hardware-centric approach..."

Data Set to Grow 10-Fold by 2020 as Internet of Things (IOT) Takes Off
ComputerWeekly, April 11th, 2014
"The amount of data on the planet is set to grow 10-fold in the next six years to 2020 from around 4.4 zettabytes to 44ZB. That's according to IDC's annual Digital Universe study, which also predicted that, by 2020, the amount of information produced by machines, the so-called internet of things, will account for about 10% of data on earth.

Key predictions included: that by 2020, one tenth of the world's data will be produced by machines; that the amount of useful data produced will increase from 22% in 2013 to more than 35% in 2020; most of the world's data will be produced in emerging markets; the amount of data that spends some of its lifetime in the cloud will double; and the amount of data will increasingly outpace available storage..."

Rethinking Typical Cloud Storage
Business 2 Community, April 9th, 2014
"Enterprises are under increasing pressure to manage the costs and logistics around an exploding volume of data. Much of that data is 'copy data' - the byproduct of enterprise data management processes such as backups, snapshots, disaster recovery programs, and test/dev - which produces excess data that must be stored, often at high costs. As of 2013, IDC estimates that copy data is a $44 billion problem, prompting enterprises to pursue solutions to reduce and better manage it.

Developing a plan for stored data is complicated by the fact that a high proportion of enterprise data exists in a disparate set of storage solutions such as backup, analytics, disaster recovery, business continuity, compliance and test and development environments..."

New Seagate 6TB HDD With Traditional PMR, Not SMR, Shipping
Storage, April 9th, 2014
"Boasting industry-leading performance, the Enterprise Capacity 3.5 HDD v4 is a step forward in scale-out data infrastructures delivering supersize storage and enterprise reliability to meet the growth of corporate and cloud-based data centers.

"Unstructured data growth is doubling exponentially and will propel the digital universe to reach 16ZB of data by as early as 2017. This will cause cloud service providers to look for innovative ways to store more within an existing footprint while lowering operational costs," said Scott Horn, Seagate VP marketing.

IT - Technology
Thorium Reactors
Business Insider, April 11th, 2014
"...Existing reactors use uranium or plutonium - the stuff of bombs. Uranium reactors need the same fuel-enrichment technology that bomb-makers employ, and can thus give cover for clandestine weapons programmes. Plutonium is made from unenriched uranium in reactors whose purpose can easily be switched to bomb-making.

Thorium, though, is hard to turn into a bomb; not impossible, but sufficiently uninviting a prospect that America axed thorium research in the 1970s. It is also three or four times as abundant as uranium. In a world where nuclear energy was a primary goal of research, rather than a military spin-off, it would certainly look worthy of investigation. And it is, indeed, being investigated..."

    The road to the 60TB hard drive
    ComputerWorld, April 11th, 2014
    "Going from 6TB to 60TB in six years

    While capacity on hard disk drives has been doubling every 12 to 18 months -- faster than Moore's Law and integrated circuits -- there is a coming sea change that will drive the capacity up 10-fold, according to hard drive maker Seagate.

    While that is remarkable, past changes and recent technology breakthroughs have led us to today's 6TB data center drives and 4TB desktop drives. Data storage is among the few techological advances that has actually surpassed our current needs..."

      IT - Bitcoin
      Mark T Williams on the Flaws and Opportunities of Bitcoin
      CoinDesk, April 7th, 2014
      "Mark T Williams isn't shy when mentioning his 'steed' - the unassuming white bicycle parked in front of the Noodle Street cafe in Boston, Massachusetts, shining in the sun near some melting remnants of the winter's snow.

      He diverts attention to it: wanting me to know that it's a choice model...'

        Mastering Bitcoin
        O'Reilly, April 7th, 2014
        "'Mastering Bitcoin' tells you everything you need to know about joining one of the most exciting revolutions since the invention of the web: digital money. Bitcoin is the first successful digital currency. It's instant, global, frictionless and it is changing money forever. Bitcoin is still in its infancy, and yet it has already spawned an economy valued at nearly $2 billion that is growing exponentially. Established companies like PayPal are considering adding bitcoin as a payment method, and investors are funding a flurry of new startups aiming to stake claims in a new industry that may rival the Internet in terms of scale and impact on daily life..."
        Inside Bitcoins NYC Day 1: Bitcoin 2.0 Takes Center Stage
        CoinDesk, April 8th, 2014
        "More than 2,000 digital currency enthusiasts gathered at the Javits Center in New York City on 7th April for the city's second Inside Bitcoins conference and expo, organised by Mediabistro.

        Attendees traveled to New York from more than 30 countries and 38 US states to hear speeches from industry leaders about the usual topics, such as the future potential and big-picture implications of bitcoin for consumers and the financial markets..."

        The US Congress Examines Bitcoin
        Bitcoin Magazine, April 11th, 2014
        "The Bitcoin economy will be drastically different a year from now, as it is much different today than it was a year ago. Washington will have a huge effect on what direction the Bitcoin markets move, as Congress and regulators shape the rules Bitcoin stakeholders must adhere to. Additionally, the U.S. is the global financial leader and the regulations that come out of Washington likely will shape the treatment of Bitcoin in other nations. The discussions among members of Congress, the regulators of the regulators, cover a broad range of possibilities for Bitcoin. At the U.S. House Small Business Committee hearing on Wednesday, April 2, 2014, the possible future path of Bitcoin ranged from being a bubble with a close end in sight, to being a threat to the US dollar as the reserve currency..."
        Oracle Solaris 11.2 Launch Event
        April 29th 11:30am - 4:30pm ET
        Over the last year, the Oracle Solaris engineering organization has been tirelessly slaving away getting Oracle Solaris 11.2 ready for release, packed with a huge number of new features and capabilities. They have done a huge amount of work across all facets of the operating system to make it the best possible platform for cloud deployments - Oracle Solaris 11.2 is indeed, engineered for cloud.

        On April 29th 11:30am - 4:30pm ET, Oracle is hosting a launch event in New York City, a live event to kick off the global launch of Oracle Solaris 11.2. For those that can be there in person, register here. John Fowler, Mark Hurd, and Markus Flierl, VP of Oracle Solaris Engineering will be our hosts. Registration for live streaming will be available soon.

        Oracle Linux 7 Beta 1
        Now Available For Download
        Oracle announced the availability of the first beta build for Oracle Linux 7. The beta is available to download from the Oracle Linux download page on Oracle Technology Network.

        The Oracle Linux 7 beta includes the latest beta build of Unbreakable Enterprise Kernel (UEK) Release 3 Update 2, as well the Red Hat Compatible Kernel (RHCK). Oracle is interested in your feedback and has setup a new mailing list for users to post their questions and comments. For more information please review the Oracle Linux 7 Beta Release Notes.

        IT - Cloud
        Data Ownership Principles in the Cloud
        IT Web, April 9th, 2014
        "Risk-conscious organisations should be able to take advantage of all the benefits the cloud has to offer, while still maintaining full service functionality and independently securing their cloud data, says MD of Global Micro, JJ Milner.

        "Cloud solutions have to be secure, and have to offer organisations control over their own data security," he says. "While cloud providers should offer assurances and service level agreements, it is also important for their clients to be able to have control over and confidence about any security measures that are in place."

        Netflix Cloud Architect: How to Succeed as Disruptor
        Information Week, April 10th, 2014
        "Adrian Cockcroft, former chief cloud architect for Netflix, recently described an "evolution of business" away from familiar processes into a more digital world, where integration of teams and speed of development decide life and death for companies. During seven years at Netflix, Cockcroft became one of the chief advocates and explainers of what it means to move a business into the cloud. He was a frequent speaker at shows like Cloud Connect, and wrote about key cloud management techniques in his aptly named Adrian Cockcroft's Blog..."
        To Avoid Cloud Risk Concerns, Seek Specific Answers from Providers
        SearchCloudApplications, April 8th, 2014
        "In this Q&A, Adam Simpson, CEO of Easy Office Phone Inc., a provider of cloud-based business phone service, discusses current cloud risk concerns. This Q&A has been edited for length, clarity and editorial style.

        Could you talk about some of today's cloud risk concerns, particularly in terms of cloud vs. on-premises software?...

        Adam Simpson: Let's say that you've got an email server. Perfect example. You put that server behind your firewall. You can access it internally, and you can open it up to the Internet so that you can access your email remotely. Of course, there are security risks in doing that..."

        IT - CxO
        8 Books Every IT Leader Should Read this Year
        IT World, April 8th, 2014
        "What you know often dictates what you do. That's particularly true when it comes to IT leadership. Without clear knowledge of how the latest encryption technologies can help your company withstand a hacker attack, a CIO can't prepare for the worst. When handling employee performance issues across an entire department, knowing the latest strategies can help improve employee retention.

        What you know about leadership can help you act in a way that pushes a company forward, too. These recently released and upcoming books can help CIOs learn new business strategies and develop executive-level skills. They're the best of the best..."

        Building Team Morale Through Leadership, April 7th, 2014
        "In the movie, "Twelve O'Clock High," actor Gregory Peck plays the role of a World War II Brigadier General charged with taking command of an American B-17 bombing group stationed in Britain, and suffering from a bad case of "hard luck."

        To make matters worse, the men of the group hold a fondness for Peck's predecessor, yet were prone to making mistakes and missing targets. As a result, the group experiences heavy losses and morale worsens.

        As Peck takes command he makes it clear to his group he doesn't accept the concept of "hard luck," that the men should stop feeling sorry for themselves, and they need to build their confidence..."

          CIO Vs. CSO: Allies or Enemies?
          Dark Reading, April 10th, 2014
          "In the wake of the Target breach it's clear that the CIO and CSO must have clear boundaries of responsibility and equal representation in the board room.

          Whenever a breach occurs it reveals weaknesses in how an organization approached security. In the case of the Target breach, the ongoing trickle of new details coming out is a gift that keeps on giving. One of the most interesting reveals was the fact that all security responsibilities at Target were buried under the CIO and that the company did not even have a CSO..."

          FTC Can Sue Companies Hit with Data Breaches, Court Says
          ComputerWorld, April 10th, 2014
          "A federal court in New Jersey this week affirmed the Federal Trade Commission's contention that it can sue companies on charges related to data breaches, a major victory for the agency.

          Judge Esther Salas of the U.S. District Court for the District Court of New Jersey ruled that the FTC can hold companies responsible for failing to use reasonable security practices.

          Wyndham Worldwide Corp. had challenged a 2012 FTC lawsuit in connection with a data breach that exposed hundreds of thousands of credit and debit cards and resulted in more than $10.6 million in fraud losses..."

          vBeers - Miami (Wednesday, April 23rd, 2014)
          After Work Hours Enterprise IT Networking Event
          This will be a Sponsored event so drinks and are on us! Please join us for the second vBeers event in Miami and encourage your enterprise IT colleagues to attend as well. Over 60 people attended March's event.

          Join us for an evening of creating connections and building your network in a relaxed and fun environment.

          Networking is an essential aspect of your professional growth and development. Connect with an array of professionals while enjoying a drink or two. Who knows, you just may meet your next client, business partner, employer or employee!

          • Location: Biscayne Tavern
          • Address: 146 Biscayne Blvd, Miami, FL 33132
          • Date: Wednesday, April 23rd
          • Time: 6pm to 9pm - arrive and depart any time
          • Sponsors: Biscayne Tavern, SherlockTech Staffing, Vault Networks, Nexenta Systems and PCS

          Join the vBeers LinkedIn group. Network with fellow vBeers participants on-line.

          Please RSVP via EventBrite

          IT - PM
          Identifying and Managing Troubled Projects
          Federal Computer Week, April 4th, 2014
          "We all have troubled projects that are at risk of not achieving their expected business outcomes. These watermelon projects, which appear green on our project dashboards but are actually red if we dig deeper, are all too common in agencies' project portfolios.

          CEB research shows that as many as 30 percent of projects in an average portfolio are troubled at some point during their life cycles..."

            IT - Networks
            DIY vs DIFY Networking
            Business 2 Community, April 9th, 2014
            "There is probably never going to be a perfect balance in the industry between Do-it-yourself (DIY) and Do-it-for-you (DIFY) networking. It seems exceedingly unlikely that there is a one-size-fits-all type of solution out there. And so we will invariably end up with a bifurcated market that requires multiple solutions for its constituents. But if there is not a perfect balance, which one of these is likely to see the most action?

            If you were to base your guess on industry chatter, you would have to conclude that DIY has the upper hand..."

              SDN and Wi-Fi: Will They Ever Be Friends?
              Network World, April 9th, 2014
              "Given that we're in an age where most IP-based technologies converge on networks without borders, it stands to reason that SDN and WLAN -- both white-hot topics in the industry today -- should buddy up. But the story is a lot more complicated than that.

              SDN initiatives are gathering steam on many fronts..."

              IT - Operations
              Forgotten Risks Hide in Legacy Systems
              CSO Online, April 3rd, 2014
              "Investing in new tools and solutions and making sure they're doing their job may be top-of-mind in your security department, but older, less-used systems could be quietly costing you money and putting you at risk..."
              The 'Always-On' IT Culture: Get Used to It
              ComputerWorld, April 7th, 2014
              "A couple of weeks into his job as lead QT developer at software development consultancy Opensoft, Louis Meadows heard a knock on his door sometime after midnight. On his doorstep was a colleague, cellphone and laptop in hand, ready to launch a Web session with the company CEO and a Japan-based technology partner to kick off the next project..."
              The Time is Right for DCIM as a Service
              Data Center Knowledge, April 7th, 2014
              "The Data Center Infrastructure Management Market has been a bit of a paradox, in that everyone seems to now understand the value of DCIM but the market continues to grow at a much slower pace than projected.

              In Pinpoint Worldwide's DCIM adoption survey, the main blockers to DCIM adoption were 'Cost' and/or 'Lack of Features'. Would a lower cost, full feature, option lead to greater market adoption? Could DCIM-as-a-Service be the answer? Pinpoint believes that the market is ready for DCIM as a Service (DCIMaaS)adoption and that it could provide a foundation for quicker DCIM growth..."

              IT - Security
              More Than A Half-Million Servers Exposed To Heartbleed Flaw
              Bank Systems and Technology, April 10th, 2014
              "The newly exposed Heartbleed bug plaguing some 17 percent of SSL-secured websites as well as various VPN products has caused a massive case of Internet heartburn over the past 48 hours as companies rushed to confirm their exposure and lock down their SSL/TLS software. But just how bad is it?..."
              56% of Employees Still Receive No Security Awareness Training
              Help Net Security, April 9th, 2014
              "A new research survey by EMA takes you inside today's organizations to reveal how employee decisions related to information security can significantly increase organizational risk. The report examines the implementation of security awareness training in government, public and private companies and non-profit groups.

              According to employee responses in the survey report:..."

              Capabilities-Based - Rather than Actuarial - Risk Analysis Would Make Businesses Safer
              Homeland Security News Wire, April 3rd, 2014
              "Many businesses and organizations, when applying cost-benefit analysis and a risk-management analysis to measure cyber risk, are relying on the assumption that the likelihood of a future attack depends heavily on how many attacks have occurred in the past. Since there has yet to be a full-scale attack on critical infrastructure in the United States, it is simple to conclude that the risk of a cyberattack on critical infrastructure is low, therefore justifying low investment in additional security initiatives. An actuarial risk analysis may conclude that there is little likelihood of such as attack occurring, but a capabilities-based risk analysis recognizes that since adversaries are capable of such an attack, it is in an organization's best interest to secure against it..."
              CISO Challenges and Security ROI
              Help Net Security, April 7th, 2014
              "Mark Brown is the Director of Information Security at EY. In this interview he offers guidance for CISOs, discusses the technical competence of company leaders, tackles security ROI, and more.

              What risk areas should CISOs focus on today so that they are prepared for what the threat landscape will deliver tomorrow?..."

              Emerging Trends in Cyber-Attack Methodology
              Help Net Security, April 7th, 2014
              "Websense documented the latest shift in complex attack trends, evolution in the threat ecosystem and shifting motivation of cyber-attacks.

              "Cybercriminals continue to evolve their attack planning and execution to stay ahead of most existing security measures," said Charles Renert, vice president of security research for Websense. "While the determined, persistent attackers continue to have success in advanced, strategic attacks using zero-day exploits and advanced malware, there has also been a boom in cybercriminal activity on a massive scale. Even these more 'common' forms of attack are easily slipping past organizations without real-time defenses."

              If Mother Nature Were a CISO
              Dark Reading, April 7th, 2014
              "There are many defensive patterns in nature that also apply to information security. Here's how to defeat your predators in the high-stakes game of corporate survival and resiliency.

              People say the Internet is a hostile network (which is true), and that got me thinking about other hostile environments, where a successful strategy results in resiliency and continuity. What if Mother Nature were the CISO? What would her strategy be? What capabilities could she give the prey species, so they could survive in the presence of many predators?..."

              Police Forces Still Struggling on Cyber Front
              ComputerWeekly, April 10th, 2014
              "Less than 7% of police forces in England and Wales have a comprehensive plan to deal with a large scale cyber incident, reveals an official report.

              Cyber incidents are one of just five threats government set as police priorities in 2012.

              The report notes that the culmination of individual cyber crimes or the commission of a single attack could cause a large scale cyber incident..."

                Repeat after Me: Model Your Security Threats First
                InfoWorld, April 8th, 2014
                "If you haven't seen this hilarious fake consulting video, you need to check it out. It's full of enough nonsensical business jargon to fill a year's worth of 'Dilbert' cartoons. More to the point, it shows the customer and other business partners ignoring the expert's advice.

                It's so, so true..."

                  The Critical, Widespread Heartbleed Bug and You: How to Keep Your Private Info Safe
                  Network World, April 9th, 2014
                  "No matter how hard you try to stay safe, some aspects of securing your online data are completely out of your hands. That fact was made painfully obvious on Monday, when the Internet got caught with its collective pants down thanks to a critical vulnerability affecting a fundamental tool for secure online communications.

                  Called Heartbleed, the bug has been in the wild for more than two years now. It allows attackers to exploit a critical programming flaw in OpenSSL - an open source implementation of the SSL/TLS encryption protocol..."

                  The Worst Data Breaches of 2014.So Far (Q1)
                  Network World, April 8th, 2014
                  "The Identity Theft Resource Center, which tracks data breaches, has counted 204 of them through March of the this year for a loss of 4,238,983 records related to sensitive personal information exposed through hacker cyberattacks, stolen laptops or dumb mistakes. Here's the worst of it..."
                    IT - Careers
                    4 creative approaches to technical recruiting
                    IT World, April 7th, 2014
                    "Loren Larsen, HireVue Let's face it: Finding the right technical talent nowadays is no easy task. With low single-digit unemployment for IT workers and a scarcity of qualified candidates, organizations large and small are struggling to keep their technical teams stocked with good talent.

                    The unemployment rate for IT professionals fell from 3.9% in Q3 2013 to 3.5% in Q4 2013, according to tech jobs portal Dice. At HireVue, we're seeing demand for tech workers stretch beyond the typical fields and into categories such as healthcare, education, and sales and marketing.

                    In this environment, the IT workforce isn't sitting still. A recent Dice survey found that 42% of tech-related hiring managers saw an uptick in voluntary departures last year..."

                    What do IT workers want?
                    IT World, April 7th, 2014
                    "As the economy continues to rebound and the competition for qualified IT professionals reaches new heights, employers seeking to attract or retain staffers are increasingly becoming like anxious suitors, desperate to figure out how to please their dates: "What do you want? What will make you stay? What really matters in our relationship?"

                    According to Computerworld's 2014 IT Salary Survey, tech workers are looking for many traditional benefits of a good partnership: financial security, stability and reliability -- all represented by salary and benefits. But this year's results confirm a growing trend: IT professionals are placing increasing importance on 'softer' factors in the workplace, which have less to do with dollars and cents and more to do with corporate culture, personal growth and affirmation..."

                    IT - Compliance
                    Compliance Misconceptions, Challenges and Tips
                    Help Net Security, April 7th, 2014
                    "In this interview, Paul Koziarz, President and General Manager of Regulatory Compliance at CSI, talks about the misconceptions related to compliance, provides advice for CSOs and discusses the difference between being compliant and being secure.

                    High-profile breaches have shown that there's a difference between being compliant and being secure. What does that say about compliance?..."

                      IT - Big Data
                      Big Data's Seat at the Table
                      Information Management, April 7th, 2014
                      "The expanding scope and reach of data is changing the way insurers succeed or fail in the marketplace yet many are not getting the message, according to Kevin Toth, vice president at Harleysville, a Nationwide Insurance company.

                      More directly, data management can no longer be considered merely a skill or function or a job. 'When done correctly and embraced by the sophisticated insurer,' Toth said in his keynote address at the IDMA 2014 Annual Meeting and Seminar in Philadelphia this week, 'data management is the basis on which we can compete in an industry that never changes' ..."

                      3 Trends Driving Big Data Breakthroughs: A CIO's View
                      Information Week, April 7th, 2014
                      "The LTO Program Technology Provider Companies (TPCs), HP, IBM and Quantum, announced that LTO generation 6 tape has reached a cost-per-gigabyte of 1.3 cents based on the current market price of tape media. (Assuming LTO-6 cartridge price of $80 based on a pricing survey of more than two dozen websites offering LTO-6 cartridges and assuming 2.5:1 compressed capacity of a single cartridge. Actual prices may vary.)..."
                      From Big Data to Just Data
                      Information Management, April 8th, 2014
                      "Unless you have been hiding in a cave for the past two years, you will certainly agree that the hype surrounding big data has been dramatically rising, probably faster than any technology hype to date. And if you believe Gartner, you won't argue that big data is just about to reach the all-dangerous 'peak of inflated expectations' before starting to slide into the infamous 'trough of disillusionment' of the hype cycle. After all, this slide into the trough happens to all technologies as they mature, usually right after they 'cross the chasm.' Some technologies make it across, some don't. The ones that come out, do so stronger and deflated of their hype..."
                      The Science and Art of Customer Matching for MDM
                      Information Management, April 8th, 2014
                      "What do a consumer catalog in someone else's name delivered to your door, a spelling error and mathematical set theory have in common? The answer is that all are factors affecting the quality of a customer master data management system. It should go without saying that a critical success factor of any business is to know its customer. The proliferation of enterprise software and the need to link data from different systems has placed a renewed spotlight on MDM solutions and, more specifically, customer MDM solutions..."
                      Analytics: Needing to Know or Wanting to Know?
                      Information Management, April 9th, 2014
                      "There is a big difference between what someone needs to know and wants to know. For example, if you are going to walk to a destination and you see dark clouds, you need to know if it will rain so that you take an umbrella. However, what you want to know is when and where it will rain as well as how intensely and for how long. Let's apply this 'needs versus wants' discussion to the emerging analytics movement.

                      One can debate if there is a substantial difference between business intelligence and business analytics. I prefer to not enter this debate. My observation is that BI involves reporting from previously stored data, possibly stored from two or more sources. In contrast, analytics creates new information from the stored data. Analytics involves asking questions that lead to more complex and interesting questions, and ideally answering the questions..."

                      Big Data is Not Little Data Writ Large -- It Changes Everything
                      SearchCIO, April 8th, 2014
                      "The real challenge with big data is that it is called big data. The nomenclature (thanks, marketing!) stimulates a reflexive response -- an almost instantaneous, emotional and physiological need to compare the target term big data with its seemingly diminutive predecessor, simply data -- or, as I now like to call it, little data..."
                      When does More Data Trump Clean Data?
                      SearchCIO, April 7th, 2014
                      "The days of scrubbing data until it's squeaky clean are quickly becoming a luxury, especially as IT departments answer the business' call to arms for more speed and more agility. But providing real-time data use raises a fundamental question for CIOs: Just how clean is clean enough? Experts like Farzad Mostashari, former national coordinator of health information technology for the U.S. Department of Health and Human Services, have persuasively argued that the solution to dirty data is more dirty data..."
                      Big Data, Big Headache?
                      IT Web, April 10th, 2014
                      "Big data has been named a game changer, a paradigm shifter, a cure-all and a must have for all businesses wishing to thrive. Harnessing big data to gain a competitive advantage is a must for today's organisations, but big data can be a threat too, as it is laden with legal, compliance and privacy issues.

                      Gerald Naidoo, CEO of Logikal Consulting, says in terms of compliance, many laws have not taken into account the challenges presented by big data warehousing. "Regulations don't always address rules around protecting data from different customers at different levels..."

                      Why Every Data Architect Should Be an Analyst First
                      Information Management, April 8th, 2014
                      "'Context' is the new buzz-word for data. Jeffery Hammond talks about it in Systems Of Automation Will Enrich Customer Engagement, Robert Scoble and Shel Israel talk about it in their book 'Age of Context', and you can't ignore it when it comes to a discussion for Cognitive Computing and the Internet of Things. We've live in a world where data was rationalized, structured, and put into standardized single definition models. The world was logical. Today, we live in a world where the digital revolution has introduced context, the semantic language of data, and it has disrupted how we manage data..."
                        IT - Mobile
                        Gartner Urges CIOs to Craft Analytics Strategy for Smart Devices -- Now!
                        CIO, April 7th, 2014
                        "Smart light bulbs from Philips conserve energy and can be controlled by a mobile application; smart contact lenses from Google will soon measure glucose levels in the eye in an effort to battle diabetes; smart textiles will use machine-washable (!) sensors to monitor a person's health and mood..."
                        In France, It's Now Illegal to Work After 6 P.M.
                        Network World, April 10th, 2014
                        "In response to a trend that has affected anyone with the ability to check email on their phones, the French government has signed a labor agreement prohibiting employees from responding to work messages on their personal phones after 6 p.m. Companies where employees feel pressured to work after that hour could find themselves at the wrong end of a lawsuit.

                        According to the Guardian, the agreement is the result of ongoing pressure from labor groups to enforce a 1999 law limiting the national work week to 35 hours, which many companies have encroached by leveraging at-home use of smartphones and tablets to reach employees during off hours..."

                          IT - BYOD
                          BYOD Adoption Continues to Grow, Led by Tablets
                          eWeek, April 10th, 2014
                          "BYOD demand in the Asia-Pacific region is expected to grow at the fastest rate of 20.6 percent from 2014 to 2020, a new study finds.

                          The growing proliferation of smartphones and tablets, coupled with the preference to use a single device, is expected to fuel growth in the bring-your-own-device (BYOD) market over the next six years, and is expected to reach $238.39 billion by 2020, according to a study by Grand View Research..."

                          Top Ten Articles for last few Issues
                          Vol 194 Issue 1 Vol 193 Issues 1, 2, 3 and 4; Vol 192 Issues 2, 3 and 4
                          We track how frequently each article is viewed on the web site to determine which the readers consider the most important. For last week, the top 10 articles were:

                          • Oracle SPARC Processor Roadmap
                          • Unix: 7 habits of highly successful Unix admins
                          • Learn How to Plug Into the Internet of Things
                          • Oracle Solaris 11.1 Gets Common Criteria Certification
                          • New presentation: Java ME 8 Deep Dive
                          • MySQL Workbench 6.1.4 GA
                          • Oracle Improves Database Performance with Latest Development Milestone Release for MySQL 5.7
                          • Learn more about Simplified UI for Oracle Cloud Applications
                          • Enhanced Oracle Solaris Cluster Security Framework
                          • Data Encryption with MySQL Enterprise Backup 3.10

                          The longer version of this article has list of top ten articles for the last 8 weeks.

                            IT - Server
                            7 Habits of Highly Successful Unix Admins
                            IT World, April 5th, 2014
                            "Unix admins generally work a lot of hours, juggle a large set of priorities, get little credit for their work, come across as arrogant by admins of other persuasions, tend to prefer elegant solutions to even the simplest of problems, take great pride in their ability to apply regular expressions to any challenge that comes their way, and are inherently lazy -- at least they're constantly on the lookout for ways to type fewer characters even when they're doing the most routine work..."
                            New IDS project spots anomalous system behavior
                            Help Net Security, April 10th, 2014
                            "A team of researchers from Binghamton University have been working on a new intrusion detection approach based on monitoring the behavior of systems and spotting when it differs from the one that is considered normal.

                            The project, titled 'Intrusion Detection Systems: Object Access Graphs' and funded by Air Force Office of Scientific Research, is conducted by doctoral students Patricia Moat and Zachary Birnbaum, research scientist Andrey Dolgikh, and they are mentored by Victor Skormin, professor of electrical and computer engineering..."

                            Save Your Servers: Three Ways to Reduce the Threat of Viruses
                            Business 2 Community, April 4th, 2014
                            "In the modern age, many businesses now use cloud computing and servers to maintain highly-sensitive data that can include customers' personal information. One virus can place the information of thousands of customers at risk. Every business needs to take preventative measures to ensure that a computer system is not exposed to a virus. Cybercafe is now a major crime that poses great threats to thousands of businesses around the world. The business that does not prepare for the risk of cyberfraud is putting its customers at risk as well as the future success of the business at risk. Here are three ways that businesses can reduce the threat of viruses and continue to preserve their servers..."
                            IT - Encryption
                            Inspired by Nature, Researches Develop .Unbreakable. Security Codes
                            Homeland Security News Wire, April 7th, 2014
                            "A revolutionary new method of encrypting confidential information has been patented by scientists who have been inspired by their discoveries from human biology, which model how the heart and lungs coordinate their rhythms by passing information between each other. A mathematical model based on the complex interaction between these organs has now been transferred to the world of modern communications..."
                              Scientists Apply Physics To Biology To Create Uncrackable Encryption Scheme
                              ComputerWorld, April 7th, 2014
                              "Scientists from the Department of Physics at Lancaster University in the UK have come up with an uncrackable encryption scheme inspired by the way the heart and lungs interact, which gives it an 'infinite number of choices for the secret encryption key shared between the sender and receiver.

                              This makes it virtually impossible for hackers and eavesdroppers to crack the code.' Professor Peter McClintock stated, 'This promises an encryption scheme that is so nearly unbreakable that it will be equally unwelcome to internet criminals and official eavesdroppers'..."

                              IT - Tape
                              1.3 Cents/GB When Using LTO-6, Said LTO Program
                              Storage, April 9th, 2014
                              "The LTO Program Technology Provider Companies (TPCs), HP, IBM and Quantum, announced that LTO generation 6 tape has reached a cost-per-gigabyte of 1.3 cents based on the current market price of tape media. (Assuming LTO-6 cartridge price of $80 based on a pricing survey of more than two dozen websites offering LTO-6 cartridges and assuming 2.5:1 compressed capacity of a single cartridge. Actual prices may vary.).."
                              LibreOffice 4.2.3
                              Now Available For Download
                              The Document Foundation announces LibreOffice 4.2.3, the third minor release of the LibreOffice 4.2 family. LibreOffice 4.2.3 'Fresh' is the most feature rich version of the software, and is suited for early adopters willing to leverage a larger number of innovations. For enterprise deployments and for more conservative users, The Document Foundation suggests the more mature LibreOffice 4.1.5 'Stable'.

                              In addition, the released version of LibreOffice 4.2.3 adds a security fix for the Heartbleed Bug (CVE-2014-0160).

                              LibreOffice 4.2.3 and LibreOffice 4.1.5 are both available for download.

                              Extensions and templates to complement the installation of the software and add specific features are available.

                              Oracle Mobile Authenticator
                              A new component of Oracle Access Management Suite
                              As digital security risk continues to grow, the need for organizations to authenticate user identities using 2-factor strong authentication, before providing employees and customers access to sensitive information, is crucial. However, the cost of providing secure authentication methods beyond a password have historically been prohibitive, and most users have bristled at the idea of carrying around a token or card to validate their identity.

                              To address these challenges, Oracle is introducing Oracle Mobile Authenticator, a new component of Oracle Access Management Suite. With this solution, an employee's or consumer's personal phone or tablet can be turned into a second factor authentication device, eliminating the complexity associated with supplying, maintaining and revalidating security devices such as tokens or smart cards. This provides a more cost effective approach to securing consumer access for companies looking to secure their customers and employees from fraud.

                              Oracle Enhances Oracle Identity Management Platform to Secure the Extended Enterprise
                              New Features Enable Customers to Consistently and Securely Deploy Enterprise, Cloud and Mobile Environments While Helping Reduce Total Cost of Ownership

                              As organizations increasingly adopt cloud and mobile applications, user identities are proliferating and becoming unmanageable. This causes organizations to struggle to embrace new business opportunities while keeping their corporate user information and data secure. Enterprises often end up adopting separate solutions for enterprise applications, cloud applications and mobile device management - with increased cost, complexity and risk. Instead, what companies need is a complete and integrated identity management platform that can help ensure the security of their data, regardless of where it is accessed, or through which kind of device. With the latest updates to the Oracle Identity Management platform, Oracle is providing organizations with new and enhanced features to further secure enterprise, cloud and mobile applications. Oracle refers to this expanding technology perimeter as the Extended Enterprise, which includes employees, customers, contractors, partners and their respective devices and applications that reside within the enterprise or in public or private clouds.

                              Nexenta News
                              Nexenta Accelerates Global Expansion in Software Defined Storage
                              New Distributor in France to Capitalise on the Increased Demand for Software Defined Infrastructure Solutions in Southern Europe
                              Nexenta announced the expansion of its EMEA operations with the opening of a new office in Paris. The office will drive Nexenta's business development and marketing efforts across Southern Europe. To support the launch, it has also appointed a leading distributor in the region, Feeder, to drive its channel growth strategy.

                              The Nexenta France organization will be led by Philippe Bruiant, an experienced sales and business development leader, who held executive positions at leading infrastructure solution providers, including Dell. Nexenta is focused on building teams and partnerships locally that can educate and support end users on the benefits of SDS solutions enterprise class functionality and features, at a compelling price point compared to the traditional legacy proprietary storage vendors.

                              Nexenta Disrupts Storage Market with the First Enterprise-class Software Defined Storage Solution
                              NexentaStor 4.0 now available for download
                              This latest version of NexentaStor delivers significant performance, reliability and functionality improvements to the award-winning SDS solution, having passed through rigorous engineering, customer and partner testing with flying colors. NexentaStor will continue to be available in two editions: Community Edition (free, full-featured, community supported software for configurations up to 18TB), and Enterprise Edition (licensed by the size of the storage pool). NexentaStor 4.0 is Citrix and VMware Ready and certified to run on a variety of reference hardware configurations from strategic technology and channel partners.

                              Building on its leadership position in the emerging, high-growth Software-Defined Storage market, Nexenta delivers on its promise of providing software with SMARTS - ever higher levels of Security, Manageability, Availability, Reliability, lower TCO, and Scalability.

                              Trending in
                              Vol 235, Issue 2
                              Trending IT Articles