News about Oracle's Solaris and Sun Hardware
System News
Apr 14th, 2014 — Apr 20th, 2014 Generate the Custom HTML Email for this Issue
System News System News for Sun Users
Volume 194, Issue 3 << Previous Issue | Next Issue >>
Sections in this issue:
click to jump to section

Master Data Management:
How to Avoid Big Mistakes in Big Data
"The paradigm-changing potential benefits of big data can't be overstated - but big changes can deliver big risks as well. For example, exploding data volumes naturally create a corresponding increase in data correlations, but as leading experts warn, correlations should not be mistaken for causes.

To avoid drawing the wrong conclusions from big data, organizations first need a way to assemble reliable master data to analyze. Then they need a way to put those conclusions and that data to work operationally, in the systems that govern and facilitate their day-to-day operations..."

Total Economic Impact of Exalogic and Exadata
A Forrester Total Economic Impact Study Prepared For Oracle
"In January 2013, Oracle and Intel commissioned Forrester Consulting to examine the total economic impact and potential return on investment (ROI) enterprises may realize by deploying Oracle Exadata Database Machine ('Oracle Exadata') and Oracle Exalogic Elastic Cloud ('Oracle Exalogic') together. Oracle Exadata and Oracle Exalogic are two key members of the Oracle Engineered Systems family. Oracle Engineered Systems are preconfigured, optimized systems consisting of Oracle's latest software and hardware engineered to work together. They are designed for maximum interoperability and performance.

The purpose of this study is to provide readers with a framework to evaluate the potential financial impact of Oracle Exadata and Oracle Exalogic on their organizations..."


Avea Telecommunication Services Accelerates Reporting to Improve Campaign Analysis and New Service Delivery
Avea is the youngest GSM operator in Turkey
With 14.1 million customers, Avea Telecommunication Services A.S. is the sole Turkish Global System for Mobile Communications (GSM) operator working in the 1800 megahertz frequency band, also known as Long Term Evolution (LTE) - an extremely high performing radio-access technology.

Avea, the youngest GSM operator in Turkey, offers high-quality services to 98% of the country's population and is experiencing rapid growth in corporate and individual services. They have international roaming partnerships with 674 operators in 205 countries.

Dynamic Launch in Oracle Secure Global Desktop
Deeper Dig into dynamic launch
"In an earlier entry, Oracle Secure Global Desktop and Oracle VDI, we mentioned the dynamic launch feature in Secure Global Desktop and described how we used that feature to connect the two products. Here's a summary of that integration:..."
Solaris Guests on VMware ESXI
Best Practice

Lingeswaran writes, "VMware ESXi servers transform datacenters into scalable and aggregated infrastructure along with vCenter Server. VMware provides platform to use the various services on single physical node.For an example, we can have different Linux flavours,Solaris x86 and windows operating systems on same box as virtual guests using VMware vSphere. As we all know Oracle Sun SPARC hardware is too costly and can't be affordable for many smaller clients. But still they may need to use the Oracle solaris operating system for the application needs and performance. To meet the customers requirement, oracle/sun has released the x86 version of Oracle Solaris from Solaris 10 onwards. Since everybody behind the hardware consolidation, Solaris x86 version is mostly utilized on VMware ESXi as virtual guests..."

Oracle Virtual Compute Appliance X4-2
Latest Engineered System Expands Cloud Services Capabilities
Oracle Virtual Compute Appliance enables rapid, repeatable software-defined infrastructure deployment for virtually any x86 application and workload. An easy-to-deploy, integrated system with the elasticity needed for cloud computing, customers can go from power on to production in about an hour(1) and deploy ready-to-run virtual machines in just a few minutes. The latest release, Oracle Virtual Compute Appliance X4-2, delivers increased computing power, faster data processing and cloud lifecycle management capabilities via its integration with Oracle Enterprise Manager 12c.
Which Type of Virtualization Should I Use?
Includes Brian Bream interview
Rick writes, "I routinely ask techies which type of virtualization they'd recommend for which type of job. I seldom get an answer as crystal clear as Brian Bream's.

Video Interview: Which Type of Virtualization Should I Use?

Oracle's portfolio of virtualization technologies includes Oracle VM Server for x86, Oracle VM Server for SPARC (previously known as LDOMS), and Oracle Solaris Zones, among others. Brian Bream provides a crystal clear technical overview of their differences and examples of what you would use them to do to. After you listen to the recording, which is about 5 minutes long, you'll understand why Brian was selected Instructor of the Year for both Oracle University and Sun Microsystems University before that..."

IT - Storage
Big Data Storage - What Went Wrong?
ComputerWeekly, April 14th, 2014
"On paper, the emergence of big data seemed like a match made in heaven for the storage industry, writes Simon Robinson. But, the reality has been underwhelming to say the least. What went wrong, and is there any reconciliation on the horizon?

When the big data phenomenon first emerged around three years ago it seemed like manna from heaven for storage companies; a golden goose had seemingly fallen into their collective lap and many vendors wasted no time turning up their marketing loudspeakers to eleven about big data storage.

Fast-forward to today, and the reality for the storage industry is rather more sobering..."

The Road to the 60TB Hard Drive
IT Web, April 11th, 2014
"While capacity on hard disk drives has been doubling every 12 to 18 months -- faster than Moore's Law and integrated circuits -- there is a coming sea change that will drive the capacity up 10-fold, according to hard drive maker Seagate.

While that is remarkable, past changes and recent technology breakthroughs have led us to today's 6TB data center drives and 4TB desktop drives. Data storage is among the few techological advances that has actually surpassed our current needs..."

    SSD vs. HDD Pricing: Seven Myths That Need Correcting
    Enterprise Storage, April 17th, 2014
    "This month I am going to take a look at SSD vs. HDD pricing. In my opinion, the claims by some vendors are over the top; their assertions about SSD pricing and density and HDD pricing and density simply do not match the market realities. It is time expose the real data.

    I understand that SSDs do offer superior price per IOPS than HDDs ..."

    Flash Storage: What It Is and Where to Deploy It
    ComputerWeekly, April 14th, 2014
    "In recent years the availability of flash storage has increased significantly, providing many options for deployment. Of course, it's good for end users to have choice, but the myriad ways to deploy flash can seem confusing.

    So, what flash storage choices are available and how do they fit into today's IT environments?..."

    You've got Flash Storage, so Why Isn't Everything Faster?
    ComputerWeekly, April 14th, 2014
    "When customers invest in storage technologies such as all-flash arrays, from the likes of Violin Memory or Pure Storage, they expect to see an immediate improvement in operational speed to justify their outlay.

    Most new storage technologies are designed to deliver an immediate improvement in performance, for example by means of faster drives or a bigger cache - but this does not always happen..."

    Is RAID Fading into the Sunset?
    Network Computing, April 15th, 2014
    "Many of us IT pros have been using RAID to protect our data for the entirety of our professional lifetimes. RAID has stood the pressures of technical evolution well, in part because the fundamentals of disk drives and storage didn't change much in that time.

    However, much larger drives, faster networks and SSD storage have now combined to create a fork in the road, and alternatives are needed. The first crack in the edifice was the realization that if a drive failed in an array of multi-terabyte drives, the rebuild time was so long that the possibility of a second, terminal failure was too high. This led to a much more complex RAID 6, creating two parity records for each stripe..."

    Hybrid Flash Hot, All-Flash Not, in 2014 Storage M&As
    ComputerWeekly, April 14th, 2014
    "My last column looked at the storage startup ecosystem, noting that this segment of the tech space is particularly active at present. Of course, startups don't remain startups forever, and a likely outcome for many of them is to be acquired by one of the major storage hardware makers.

    As such, it is worth taking a look at what mergers and acquisitions (M&A) we might see in "storageland" this year.

    But before we do so, let's review what happened in 2013..."

      IT - Technology
      Floating nuclear plants could ride out tsunamis
      MIT, April 16th, 2014
      "When an earthquake and tsunami struck the Fukushima Daiichi nuclear plant complex in 2011, neither the quake nor the inundation caused the ensuing contamination. Rather, it was the aftereffects - specifically, the lack of cooling for the reactor cores, due to a shutdown of all power at the station - that caused most of the harm.

      A new design for nuclear plants built on floating platforms, modeled after those used for offshore oil drilling, could help avoid such consequences in the future..."

        Breakthrough: How Scientists are 3D Printing a Human Heart That Will Work Better Than Yours
        TechRepublic, April 11th, 2014
        "Imagine your beating, pumping heart, working hard right this moment to keep you alive. Now think of a future where, if your heart failed or has a defect, you could get one that works better and lasts longer.

        It sounds like something out of a sci-fi movie, but researchers at the University of Louisville have moved a step closer in this direction by using a 3D printer to make working parts of a human heart, using fat cells and collagen.

        "We are utilizing printing and other biological manufacturing techniques to build these different parts of the heart," Dr. Stuart Williams told TechRepublic. Williams is the chief of the Bioficial Heart program at the University of Louisville's Cardiovascular Innovation Institutein Louisville, Kentucky..."

        A Swarm of Ant-Sized Robots, at Your Service
        New York Times, April 19th, 2014
        "While the robots imagined in science fiction novels have often looked like humans, today's robotic armies are emerging in all shapes and sizes.

        Take the little army of bots made by SRI International, called 'Magnetically Actuated Micro-Robots,' that are designed to build small things on small scales. They look like a swarm of ants, and they can be controlled by a central computer.

        The bots are incredibly fast for their size, able to move at 35 centimeters a second, according to a video posted by SRI..."

          Startup Claims it Can Recharge a Cell Phone Battery In 30 Seconds
          IT World, April 14th, 2014
          "If there is a technology that has consistently been overpromised and underdelivered, it's battery technology. I've heard everything, from odd new shapes to fast recharging to solar power. Nothing ever comes of it.

          So, while it's nifty to hear about Israeli firm StoreDot's claims that it has a bio-organic battery technology that can be recharged in 30 seconds, it definitely falls into the Prove-It category.

          In its current state, the StoreDot battery won't even fit inside a cell phone, but the company plans to spend the next three years and $6.25 million in funding to make the leap from prototype to production..."

            The Mainframe Isn't Dead, and Neither Is the PC
            CIO, April 11th, 2014
            "One lesson we should take away from the "death of the mainframe" talk is that we often get so excited about what's new and shiny that we forget the ecosystem and experience that surrounds what that new shiny thing is supposed to replace.

            We forget that, regardless of our excitement, we really, really don't like to change. We tend to forget that "better" is relative. Finally, we have a nasty habit of getting so excited about a new technology that we ignore the fact that it fundamentally doesn't work for us..."

              USB Type-C: Simpler, Faster and More Powerful
              InfoWorld, April 15th, 2014
              "USB has become ubiquitous as the way to connect our mobile devices to power sources and to other devices. There are currently seven different types of USB connectors already in use: USB 2.0 A, B, mini B and micro B; and USB 3.0 A, B and micro B. There's about to be one more: the USB Type-C.

              In fact, the upcoming Type-C plug just might end up being the one plug to rule them all: A single USB connector that links everything from a PC's keyboard and mouse to external storage devices and displays..."

                Photos: Looking Back to the Birth of the IBM Mainframe
                TechRepublic, April 7th, 2014
                "It's 50 years since IBM launched the first System/360 mainframe.

                The S/360 is feted as the grandfather of modern computing. It introduced processing techniques that would become commonplace, such as lookahead pipelining, branch prediction, multitasking, memory protection and generalised interrupts. It's a reminder that many architectural tricks used inside chips today date back to before man landed on the moon.

                But perhaps more importantly the System/360 achieved the modern reality of a general-purpose computer that could be easily upgraded..."

                IT - Bitcoin
                Why Know-Your-Customer Rules Won.t Work With Bitcoin
                Coindesk, April 15th, 2014
                "Allaire stressed that a middle ground must be found between privacy and the needs of governments and authorities.

                This sentiment is reflected by a majority of new industry entrants who want to see bitcoin mature quickly into a legitimate industry in the eyes of banks, Wall Street, and the mainstream in general. It also stands in stark contrasts to the very libertarian spirit still held by many in the community.

                Proponents of greater regulatory oversight, such as Allaire, can easily claim to be the practical ones in this debate, recognizing the fact that to achieve its full potential, bitcoin must be incorporated into the existing regulatory hierarchy. While there is little doubt bitcoin can't continue its Wild West free for all, it's a little more complicated than that..."

                Bitcoin Offers Monetising Solutions for Online Publishers
                Coindesk, April 19th, 2014
                "Making money from online content is hard work. A variety of different models and tactics have been tried down the years, but a solid solution is yet to be found. Could bitcoin be the answer everyone is looking for?

                Before the internet age it cost a lot of money and resources to publish content. Newspaper publishers, for example, have to pay for the paper, the printing press and the distribution. In contrast, the web provides publishers with a relatively inexpensive - if not free - platform, with very low production costs..."

                April 29 Oracle Solaris 11.2 Launch
                The Technical Details
                Larry Wake writes, "You may have already heard that we're going to hold the Oracle Solaris 11.2 launch in New York City in a few days, and that there will also be a live webcast of the event.

                One of the things that the webcast will feature that won't be part of the live event will be additional technical presentations where Solaris engineers will go into more detail about some of the new features that are being added. VP for Solaris core engineering Markus Flierl gives a quick rundown: "

                Modernizing IBM AIX/Power Progfram
                Move to Oracle Solaris/SPARC

                Customers can gain proficiency and begin managing Oracle Solaris environments quickly, by moving off IBM AIX systems and onto Oracle's cutting edge Solaris-powered platforms.

                For more information on this exciting new program click here. You can also find technical resources on the Oracle Technical Network (OTN) here!

                MySQL Enterprise Monitor 2.3.16
                Updated to use OpenSSL 1.0.1g

                Andy Bang writes, "We are pleased to announce that MySQL Enterprise Monitor 2.3.16 is now available for download on the My Oracle Support (MOS) web site.

                The Service Manager, Agent, and bundled MySQL Server binaries included in 2.3.16 are all updated to use OpenSSL 1.0.1g.

                for further information. You can also find additional details about Enterprise Monitor 2.3.16 in the change log..."

                MySQL Enterprise Monitor 3.0.9
                Includes OpenSSL Security Bug Fix

                Oracles is pleased to announce that MySQL Enterprise Monitor 3.0.9 is now available for download on the My Oracle Support (MOS) web site.

                The Service Manager, Agent, and bundled MySQL Server binaries included in 3.0.9 are all updated to use OpenSSL 1.0.1g. You can also find additional details about Enterprise Monitor 3.0.9 in the change log.

                You will find binaries for the new release on My Oracle Support. Choose the "Patches & Updates" tab, and then choose the "Product or Family (Advanced Search)" side tab in the "Patch Search" portlet.

                You will also find the binaries on the Oracle Software Delivery Cloud within about 7 days of this announcement. Choose "MySQL Database" as the Product Pack and you will find the Enterprise Monitor along with other MySQL products..."

                MySQL High Availability, 2nd Edition
                Charles Bell, Mats Kindahl, Lars Thalmann
                Server bottlenecks and failures are a fact of life in any database deployment, but they don't have to bring everything to a halt. This practical book explains replication, cluster, and monitoring features that can help protect your MySQL system from outages, whether it's running on hardware, virtual machines, or in the cloud.

                Written by engineers who designed many of the tools covered, this book reveals undocumented or hard-to-find aspects of MySQL reliability and high availability - knowledge that's essential for any organization using this database system. This second edition describes extensive changes to MySQL tools. Versions up to 5.5 are covered, along with several 5.6 features.

                • Learn replication fundamentals, including use of the binary log and MySQL Replicant Library
                • Handle failing components through redundancy -Scale out to manage read-load increases, and use data sharding to handle large databases and write-load increases -Store and replicate data on individual nodes with MySQL Cluster -Monitor database activity and performance, and major operating system parameters -Keep track of masters and slaves, and deal with failures and restarts, corruption, and other incidents -Examine tools including MySQL Enterprise Monitor, MySQL Utilities, and GTIDs


                Cloud Computing
                Oracle Continues Oracle Cloud Expansion with New Oracle Database Backup and Oracle Storage Cloud Services
                Oracle Cloud Platform and Infrastructure Services Provide Enterprise-Grade Solutions to Help Organizations Gain a Competitive Advantage

                To help organizations more rapidly adopt and utilize hybrid cloud solutions, which can securely and seamlessly integrate public cloud solutions with on-premises and private cloud environments, Oracle announced the availability of Oracle Database Backup Service and Oracle Storage Cloud Service. Part of Oracle's commitment to providing the industry's broadest and most advanced cloud portfolio, the new services empower customers with choice and deliver the flexibility to easily move critical applications and data from on-premises to the cloud and vice-versa.

                Oracle Storage Cloud and Oracle Database Backup Service
                latest additions to the Oracle Cloud service portfolio
                Gene Eun writes that, "Oracle announced that the Storage Cloud Service and Database Backup Service are now generally available in the Oracle Cloud. I thought it would be worth discussing the significance of these two new services beyond what's stated in today's press release. But before I do, let me first start with the basics of each service. The Oracle Storage Cloud Service is an IaaS offering that provides a secure, scalable, and reliable object storage solution for easily storing and managing data backups and archives in the cloud. The Oracle Database Backup Service is a PaaS offering that provides a simple, low-cost, and secure cloud-based backup and restore solution for on-premise Oracle Databases..."
                Utilize Oracle Linux - A High Performance Operating System
                by Diana Gray, Principal Curriculum Product Manager, Oracle University
                Oracle Linux is a high-performance operating system. It is free to download and distribute, and includes source code, binaries, patches and updates.

                The code has been optimized for database servers and is used in the following Oracle systems:

                • Oracle Exadata Machine
                • Oracle Exalytics In-Memory Machine
                • Oracle Exalogic Cloud
                • Oracle Database Appliance

                Oracle University provides industry-leading training courses and certification exams to help you develop and validate the skills that hiring managers are seeking.

                Through hands-on training with expert Oracle University instructors, you'll gain the knowledge to deliver extreme performance, advanced scalability and reliability for enterprise applications and systems...

                IT - Cloud
                In Public Cloud Computing Fight, the Gloves Come Off
                CIO, April 10th, 2014
                "The past two weeks brought big news in the public cloud computing market. In the course of four days, three technology giants made bold statements about their intent to be one of the most important public cloud providers - and, indeed, position themselves to be the No. 1 cloud company on the planet. For anyone using cloud computing, what happened last week indicates how critical the biggest companies in technology view it and how cloud adopters need to evaluate their strategy in light of the ongoing price competition upon which the leaders have embarked.

                Here's the high-level overview of what was announced:..."

                IaaS Series: Cloud Storage Pricing . How Low Can They Go?
                Architecting IT, April 18th, 2014
                "With recent 'price wars' between Google, Amazon and Microsoft, the cost of storage in the cloud has never been cheaper. The question is, how long can these vendors keep reducing their prices and are we any closer to the bottom as far as Infrastructure as a Service is concerned?

                The latest price drops from the big IaaS players puts the cost of storage as follows:..."

                More cloud and more outsourcing
                Gigaom, April 15th, 2014
                "The shift to cloud continues to accelerate, with a resultant increase in both small- and large-scale outsourcing. One new report demonstrates the pace of cloud acceptance, with the 50 largest public cloud providers reporting a 47% gain in revenue for 4Q13 over the year-earlier period; while another study out this week chronicles the demand for both high- and low-end outsourcing deals. I posit that the two trends are linked, with the adoption of public cloud services leading to changes in outsourcing trends..."
                Bring Your Own Cloud: The Movement Companies Can't and Shouldn't Stop
                SearchCloudApplications, April 14th, 2014
                "There is absolutely no question that the industry craze over the term "bring your own…" has been taken so far that the concept is almost useless as a descriptor of a trend.

                However, it's also true that what we are seeing in worker support and cloud computing is a critical shift from supporting applications to supporting workers. One natural result of that shift is to try to harness the tools a worker is already familiar with to help the worker be more productive. The "bring your own cloud" (BYOC) movement is really about that, and it's especially relevant as workers move to "always with me" mobile devices for their social interactions and entertainment..."

                Change Your Company Culture and Get Onto the Cloud
                InfoWorld, April 11th, 2014
                "Technology issues don't typically stop cloud implementations. More often than not, it's the people. Office politics, unrealistic expectations, and general stupidity are the common culprits that hinder cloud computing use at many enterprises.

                The vocal opponents to cloud computing we heard in 2008 are mostly quiet in 2014. However, they are still lurking. Today, they use closed-door conversations to call the cloud into question, often for the wrong reasons. By doing so, they create a toxic culture around the use of cloud computing -- or any new technologies that may prove to be innovative and helpful but threaten the status quo..."

                Eight Business-Class Alternatives to Dropbox
                ZDNet, April 17th, 2014
                "If you're a subscriber to the Tech Pro Research service, you can read my detailed analysis of the business criteria to consider in choosing a cloud service (see Six business-class cloud storage services: Which one is right for you?).

                In this post, I offer a capsule summary of eight worthy alternatives to Dropbox. Most of the services on this list, which is presented in alphabetical order, offer basic consumer storage as well as more feature-rich business-oriented offerings..."

                Google Drive Re-Kindles Price War between Cloud Storage Services
                Storage Newsletter, April 11th, 2014
                "The perfect cloud storage service does not exist. Prices for all the major cloud storage companies had been stagnant for a while now, so choosing what services to use mostly came down to what ecosystem you're more comfortable in.

                If you're a heavy Microsoft/Windows Phone user the recently rebranded OneDrive was the way to go, the same applied for Android and Google Drive. Dropbox, while not tied to an ecosystem, was widely available across all major platforms, and the recently IPOed company Box targeted mostly enterprise user.

                Because all of these services were pretty much on par feature-wise, Google decided to fight on another ground and cut drastically the price of its cloud service:..."

                9 Things You Need to Know Before You Store Data in the Cloud
                CIO, April 16th, 2014
                "The amount of electronic information (e.g., documents, images, emails, videos) organizations produce is staggering. Storing all your digital data in your data center can be expensive. That's why cloud storage -- which often comes at a fraction of the cost of storing the information on-premises -- has become increasingly popular.

                But before you think of storage in the cloud, you need to be sure to clearly identify your needs, says Chris Poelker, vice president, Enterprise Solutions, FalconStor Software, a provider of data protection, virtualization, backup, disaster-recovery and deduplication services. "Is high performance [and availability] important, or are you just looking to archive data?"

                IT - CxO
                10 Questions to Ask When Interviewing Candidates for IT Positions
                TechRepublic, April 15th, 2014
                "Finding the best person for an IT position requires more than just matching up skills with job requirements. These questions will help you determine how well a candidate can really meet your needs.

                Hiring IT staff is a difficult task, and too many IT leaders leave it solely in the hands of HR. Here are 10 questions you can ask potential IT hires -- and an explanation of what each question can tell you about the candidate..."

                  10 Tips for Preparing for a Deposition
                  Business Management Daily, April 14th, 2014
                  "I've been taking and defending more depositions than usual lately, and, naturally, I've been thinking a lot about the art of the deposition.

                  Because very few cases get to trial, the deposition is the event during which the key players have their opportunity to tell their stories. It is also often the key event in employment cases that decides whether a summary judgment motion is granted or whether a case results in a fair settlement.

                  A deposition may feel like a simple conversation between the parties in a lawsuit, but it isn't. It is a tool used by a highly skilled practitioner to lock-in your side of the story, build his or her case through your admissions and evaluate you as a trial witness.

                  As there is a skill in taking a deposition, there is also a skill in testifying at a deposition. The following are my top 10 things to think about as you prepare to give testimony in a deposition..."

                    CIOs to Become In-House Brokers -- and That's a Good Thing
                    CIO, April 15th, 2014
                    "The IT department is fast becoming a brokerage house, an intermediary between buyers (as in lines of business managers) and sellers (as in cloud service providers). More than one-third of IT departments already act primarily as services brokers, and this model is expected to expand rapidly in the next 12 months, according to new research commissioned by Avanade, a managed services provider.

                    The idea of IT as a brokerage is just one aspect of the emerging role of the new CIO, one that looks more like a consultancy to the business rather than the keeper and controller of all things technical..."

                    Five Characteristics of a New Breed Of CIO
                    ComputerWorld, April 14th, 2014
                    "CIOs are facing an unprecedented level of conflicting stakeholder expectations. For the past 10 years, they have been required to focus on cost, control and quality in response to global economic conditions. Although these remain important, the emphasis is shifting to demand for technology that is digital, dynamic and diverse, as business leaders look to drive growth over the next 10 years. The personal success of CIOs in the coming decade will be heavily influenced by their abilities to manage the transition to a new role in response to new business expectations, while ensuring continuity in the management of traditional enterprise IT..."
                    Hire for Cultural Fit, Train for the Right IT Skills
                    CIO, April 2nd, 2014
                    "s organizations struggle to adjust to the new growth economy, finding top talent is one of their biggest challenges. According to a recent study from Deloitte's Global Human Capital Trends 2014, "Critical new skills are scarce -- and their uneven distribution around the world is forcing companies to develop innovative new ways to find people, develop capabilities and share expertise."

                    But equally important is retaining talent once you've found it ..."

                      Mid-Air Collision? The CIO/CFO Cloud Computing Debate
                      Business 2 Community, April 11th, 2014
                      "Successfully managing IT strategy is no simple task, particularly when the decision makers' roles vary from company to company. Research findings from Gartner and Financial Executives Research Foundation, for example, found that 42 per cent of organisations said their IT division reports to the CFO, 33 per cent to the CEO, 16 per cent to the COO, 2 per cent to a chief administrative officer and 7 per cent to other officers.

                      So with finance frequently involved in sanctioning IT expenditure, it's no surprise that CIOs and CFOs have often had a troubled relationship..."

                      Shiny Objects and the Senior Management Team
                      Information Management, April 15th, 2014
                      "One of the value-killers found inside many organizations is the out of control pursuit of too many new initiatives. The resultant too few resources chasing too many projects, is a sure-fire way to create organizational stress as initiatives fall short, inefficiencies skyrocket and employees, stakeholders and customers grow perturbed.

                      In one client firm, the sure-fire path to success was to attach oneself to as many high visibility initiatives as possible, in the hope of being associated with the success of one of them. It was a political portfolio game, with most projects flailing and failing. Nonetheless, the politically charged environment and the visible path to success catalyzed a seemingly endless number of new initiatives designed to optimize the visibility and executive attachment of the idea generator without really focusing on solving critical problems..."

                        vBeers - Miami (Wednesday, April 23rd, 2014)
                        After Work Hours Enterprise IT Networking Event
                        This will be a Sponsored event so drinks and are on us! Please join us for the second vBeers event in Miami and encourage your enterprise IT colleagues to attend as well. Over 60 people attended March's event.

                        Join us for an evening of creating connections and building your network in a relaxed and fun environment.

                        Networking is an essential aspect of your professional growth and development. Connect with an array of professionals while enjoying a drink or two. Who knows, you just may meet your next client, business partner, employer or employee!

                        • Location: Biscayne Tavern
                        • Address: 146 Biscayne Blvd, Miami, FL 33132
                        • Date: Wednesday, April 23rd
                        • Time: 6pm to 9pm - arrive and depart any time
                        • Sponsors: Biscayne Tavern, SherlockTech Staffing, Vault Networks, Nexenta Systems and PCS

                        Join the vBeers LinkedIn group. Network with fellow vBeers participants on-line.

                        Please RSVP via EventBrite

                        IT - PM
                        Kathleen Sebelius: Failed IT Project Manager?
                        Information Week, April 11th, 2014
                        "Sebelius didn't write the code for, but she is paying the price for failing to oversee those who did.

                        It's time for Kathleen Sebelius to polish her resumé, but I doubt she will be seeking work as an IT project manager. After overseeing the rollout and reboot of the federal government's health insurance exchange website, I suspect she will stay as far away as possible from any further venture that hinges on the success of an IT system..."

                        IT - Networks
                        Network Virtualization the Right Way
                        Network Computing, April 7th, 2014
                        "To some, the term "network virtualization" might seem like the latest version of "cloud" - a technology that can do it all, evoked by vendors to allow them to sell more products or expand market share. But listening to Martin Casado, CTO of networking at VMware, explain the use cases for network virtualization at Interop -- and seeing the reaction of the audience -- the possibilities seem very real.

                        VMware is no slouch when it comes to innovative technology, but it owes much of its success in the networking arena to Casado, the man who authored the OpenFlow protocol and founded Nicira, which VMware acquired and used as the basis for its NSX platform..."

                        Still Deploying 11n Wi-Fi? You Might Want to Think Again
                        Network World, April 16th, 2014
                        "The newest version of the 802.11 standard - 802.11ac - is ready for prime time. The official IEEE standard is finished, the Wi-Fi Alliance has issued a specification for interoperability, essentially all enterprise-class Wi-Fi system vendors are shipping (or have at least announced) 802.11ac products, and price/performance is significantly improved over 802.11n products. The price differential between .11n and .11ac access points is, in fact, so low that the continued purchase of .11n access points can legitimately be called into question..."
                        Networking, Security, and Grand Unified Theory
                        Network Computing, April 11th, 2014
                        "Security has been a hot topic in the networking world recently. For example, Martin Casado, CTO of networking at VMware, has been talking quite a bit about his vision for security. He appeared on the keynote stage with Pat Gelsinger at Interop Las Vegas and talked at length about the increasing amount of IT spending focused on security. He also laid the groundwork for his next big project, namely the integration of open policy-driven security through initiatives such as the OpenStack Congress project.

                        Casado's shift from open networking to security should not be surprising. He was once involved in the intelligence community early in his career, so he's well versed in security. Many think that this move signals his departure from the networking he has spent the last few years building. I believe it's exactly the opposite..."

                        IT - Operations
                        Infrastructure as a Service: Really Only a Three-Horse Race?
                        ZDNet, April 14th, 2014
                        "The chase is on to catch up to Amazon Web Services, a leading infrastructure as a service player, and Google has launched an all-out price war that Microsoft's Azure, Rackspace, and the rest of the pack will have to follow.

                        It's a infrastructure as a service (IaaS) pack that's getting increasingly crowded too. IBM's SoftLayer, Hewlett-Packard, Oracle, Verizon, and a bevy of others are all playing the IaaS game.

                        But Bernstein analyst Carlos Kirjner is betting that IaaS really boils down to a three-horse race. Amazon, Google, and Microsoft. The other players either have economic conflict of interests or won't be able to scale in the deflationary cycle that AWS and Google are about to start in technology infrastructure..."

                        What DJs can Teach DevOps Cynics
                        Information Week, April 17th, 2014
                        "Just as new tools transform a DJ's musical options, DevOps revolutionizes what IT can do for the business.

                        I understand some people don't buy the idea that DevOps will revolutionize IT. We've all heard big ideas that never really panned out. But the skeptics miss the radical transformation that's already underway. It's not just a matter of better-faster-cheaper. The ability to create higher-level constructs incredibly quickly will change the way we think about IT and what it can do for the business..."

                        IT - Security
                        The Real Wakeup Call from Heartbleed
                        Help Net Security, April 16th, 2014
                        "There's nothing special about Heartbleed. It's another flaw in a popular library that exposed a lot of servers to attack. The danger lies in the way software libraries are built and whether they can be trusted.

                        In case you live under a rock, a serious security flaw was disclosed last week in the widely used OpenSSL library. On a threat scale of 1 to 10, well known security expert Bruce Schneier rated it an 11. Essentially, an attacker can send a "heartbeat" request that tricks the server into sending random memory contents back to the attacker. If the attacker gets lucky, that memory contains interesting secrets like passwords, session IDs, Social Security numbers, or even the server's private SSL key..."

                        CDX Pits NSA Hackers against Service Academies
                        Federal Computer Week, April 10th, 2014
                        "A low-slung building in a suburban office park might seem an unlikely setting for military war games, but that's exactly what's taking place at the Columbia, Md., outpost of the Parsons Corporation. The open laptops and the white board wouldn't be out of place in any corporate workroom; less so the Jolly Roger that hangs from the ceiling. Here, several teams of cyber warriors from the National Security Agency and across the military are acting as adversaries, referees, and bystanders in a cyber-defense exercise that pits students from the five U.S. service academies against each other for bragging rights as top network defenders..."
                        CISOs Must 'Think Different'
                        Network World, April 15th, 2014
                        "Remember the "Think Different" advertising campaign from Apple? It ran from 1997 to 2000 and featured bigger-than-life personalities like Buckminster Fuller, Martin Luther King, and Pablo Picasso.

                        The "Think Different" ads coincided with Steve Jobs's return to Apple and exemplify his somewhat contrarian and analytical mindset. In a PBS interview, Jobs offered this philosophical insight about life:.."

                          Heartbleed 'a billion times worse' than we thought?
                          IT World Canada, April 14th, 2014
                          "We already knew that the OpenSSL Heartbleed security vulnerability that blew up in the headlines last week was bad news. So we're probably not ready to hear that it could be way worse than we thought. But that's the message of one technology expert.

                          The problem, says Bob Egan, is that the publicity surrounding Heartbleed has focused on its potential impact on 'desktop' browsers. That leaves out the potential global effects on some 40 - 60 billion smartphone applications that are connected to the same servers..."

                          Heartbleed Havoc: 10 Passwords You Need to Change Right Now
                          CRN, April 10th, 2014
                          "The serious Heartbleed bug that has plagued OpenSSL, the open-source encryption protocol, has system administrators scrambling to patch the back-end systems supporting many popular online services. Administrators also are revoking keys associated with the digital certificates that validate the authenticity of a website or service, according to Finnish security testing firm Codenomicon, which has set up a thorough website addressing the issue.

                          Users of online services need to take action as well, say security experts, as hundreds of thousands of servers, including those that support Google, Yahoo and Dropbox, may have been impacted. Many of those services are urging users to change their passwords. Here are 10 of those services. .."

                          How a Little Obscurity can Bolster Security
                          Dark Reading, April 17th, 2014
                          "Most security professionals deride the idea of "security by obscurity." Is it time to re-evaluate the conventional wisdom?

                          One of the first maxims I remember learning when I began my formal information security (InfoSec) training was, "Security by obscurity is no security at all." If you haven't heard this saying before, security by obscurity refers to relying on an aspect of secrecy to protect your systems, rather than on truly secure design. Most security professionals utter the phrase with derision..."

                          How to Create Awareness of the Insider Threat
                          CSO Online, April 15th, 2014
                          "One of the legacies of Edward Snowden's treason is that companies are now concerned about the insider threat more than they ever were before. He demonstrates that a single person inside an organization can devastate the organization. While technology should have caught Snowden, there is also the realization that his coworkers and managers should have noticed indications of unusual activities..."
                            Rushed Heartbleed Fixes May Expose Users to New Attacks
                            InfoWorld, April 16th, 2014
                            "In the race to protect themselves from the Heartbleed vulnerability, enterprises could be opening themselves up to new attacks if they aren't careful.

                            Perpetrators of some of the most virulent cyberattacks on the Internet will try to take advantage of the chaos that's bound to occur in some IT shops as administrators and developers hurriedly respond to Heartbleed, the widespread OpenSSL flaw that was discovered last week, a top researcher at Kaspersky Lab said..."

                            Security Pros Actively Hiding Negative Facts from Executives
                            Help Net Security, April 16th, 2014
                            "A new Ponemon Institute study exposes a severe gap in security visibility and perception between C-level executives and IT security staff.

                            In nearly 60 percent of the organizations, responsibility for managing the impact of business or technology change on security posture resides with C-Level executives (CSO, CISO, CIO, CTO, etc.), and in 66 percent of the organizations surveyed, executive and Board perception of security is 'high.'..."

                            Website Admins Will be Busy Dealing with Heartbleed
                            ComputerWorld, April 10th, 2014
                            "Website and server administrators will have to spend considerable time, effort and money to mitigate all the security risks associated with Heartbleed, one of the most severe vulnerabilities to endanger encrypted SSL communications in recent years.

                            The flaw, which was publicly revealed Monday, is not the result of a cryptographic weakness in the widely used TLS (Transport Layer Security) or SSL (Secure Sockets Layer) communication protocols, but stems from a rather mundane programming error in a popular SSL/TLS library called OpenSSL that's used by various operating systems, Web server software, browsers, mobile applications and even hardware appliances and embedded systems..."

                            Why You Need a Password Manager
                            CNET, April 15th, 2014
                            "RoboForm, LastPass, and other password managers would not have defended your individual passwords from the Heartbleed bug. But they make the cleanup process a whole lot easier.

                            Revealed last week, Heartbleed is a flaw discovered in certain versions of OpenSSL, open-source software that uses SSL (Secure Sockets Layers) to encrypt and protect your private information as it connects from one place to another across the Internet. CNET offers an FAQ with more details about the Heartbleed flaw and advice on how to protect yourself from the bug..."

                            IT - Careers
                            5 Job Interview Tips Via Alice in Wonderland
                            Information Week, April 10th, 2014
                            "Curiouser and curiouser! Use these techniques during your next interview to win that IT or security job offer.

                            Even though Alice couldn't resist the bottle labeled "DRINK ME," her story does offer some tips to help security experts and other IT pros nail interviews. Before you sit down with a prospective employer, spin these quotes into your strategy to win a job offer..."

                            10 Tech Products that Are Built to Last
                            IT World, April 16th, 2014
                            "Indestructible, that's what you are. Indestructible...

                            When you think about tech products, you probably think "refresh cycle" more than "built to last." But as it turns out there are plenty of tech products that put up with hard, daily use year after year.

                            Thanks to the BuyItForLife (BIFL) subreddit we've got solid recommendations for tech products that are durable, practical, and built to last, if not for life, at least for a suitably long time. Or, as Reddit user elf_dreams put it: '[BIFL] are well made products that are expected to perform their function well after their peers have given up.'..."

                              An Unnecessary Path to Tech: A Bachelor's Degree
                              ComputerWorld, April 14th, 2014
                              "Bill Gates, Steve Jobs and Edward Snowden all launched tech careers without four-year college degrees, and that may be true for a large percentage of techies.

                              A study of New York City's tech workforce found that 44% of jobs in the city's "tech ecosystem," or 128,000 jobs, "are accessible" to people without a Bachelor's degree. The category covers any job that is enabled by, produced or facilitated by technology..."

                                7 hot IT jobs that will land you a higher salary
                                ComputerWorld, April 15th, 2014
                                "If you're looking to give your career a boost, there's no better place to look than the IT field. Whether you're a marketing professional or a hard-core hacker, the talent shortage has organizations clamoring for talent to fill their vacancies.

                                "Clients can't throw enough money at these positions," says Tom Cirri, regional director of recruiting for consulting, sourcing and staffing firm Mondo. "Our clients have to follow these trends closely; some of these titles and roles are so new and in-demand that they aren't able to find the talent. When they do, they are willing to throw budgets out the window to get it," he says. Here are seven roles to consider if you're looking for a higher salary in 2014..."

                                  Rogue IT Driven by Need for Speed
                                  Information Week, April 11th, 2014
                                  "We've lost control to business users before. But this time, the thing that initiated our pain (the cloud) may also be the cure. Over the last 35 years I've seen technologies come and go. For the most part, I can drop them into one of three buckets. (Keeping track of more than three is tough at my age.)

                                  The first bucket is technologies that move the industry forward -- Ethernet on twisted pair instead of coax, mini computers instead of mainframes, routers instead of bridges, tablets instead of laptops..."

                                  Hubble Turns 24: 5 Biggest Discoveries
                                  Information Week, April 15th, 2014
                                  "The Hubble Space Telescope turns 24 this month. The telescope launched on April 24, 1990, as a joint project between NASA and the European Space Agency (ESA). It has since observed more than 30,000 celestial objects and captured in excess of 570,000 pictures.

                                  Every year, NASA and ESA release new images taken by Hubble to mark its anniversary. This year's colorful collection is of the Monkey Head Nebula, a region of star birth 6,400 light years away. The images reveal a dense knot of gas and dust against a background of bright glowing gas in the nebula also known as NGC 2174 and Sharpless Sh2-252..."

                                    IT - Email
                                    Data Protection in Internet of Things Era
                                    Information Week, April 14th, 2014
                                    "If the digital revolution was one of the most transformative events of our time, then the Internet of Things (IoT) is about to redirect history. Today three billion Internet users are demanding digital content anytime, anywhere, and on multiple platforms. Next year it's estimated that there will be 15 billion connected devices. By 2020 that number will reach 50 billion. These devices will include more than just smartphones and tablets. Cars, sensors, and even appliances -- nearly anything will be connected in the emerging IoT era..."
                                    IT - Big Data
                                    Data Protection and Disaster Recovery for Big Data
                                    ESG, April 15th, 2014
                                    "Big data is being talked and written about a lot these days. Myriad vendors from disruptive startups to dominant IT titans are pushing the value propositions of better analytics on more sources of data. That makes for thorough awareness and education, and leads directly to big data initiatives that bring very real benefits for companies.

                                    What is most interesting is what is not being said. Few are talking about data protection, disaster recovery, and business continuity for big data..."

                                    4 Qualities to Look for in a Data Scientist
                                    CIO, April 15th, 2014
                                    "It's hard to resist the sparkly nirvana that big data, leveraged appropriately, promises to those who choose to embrace it. You can transform your business, become more relevant to your customers, increase your profits and target efficiencies in your market all by simply taking a look at the data you probably already have in your possession but have been ignoring due to a lack of qualified talent to glean value from it.

                                    Enter the data scientist - arguably one of the hottest jobs on the market. The perfect candidate is a numbers whiz and savant at office politics who plays statistical computing languages like a skilled pianist. But it can be hard to translate that ideal into an actionable job description and screening criteria..."

                                    5 Ways Agencies can Use Hadoop
                                    GCN, April 10th, 2014
                                    "The federal government is drowning in big data. Agencies are facing the reality that the government's legacy IT systems were not designed to handle the volume, variety and velocity at which data is being generated today. When relational databases were created more than four decades ago, they were not intended to handle the massive amounts of data generated by high-definition video, photographic images, blog posts or social media content that is flooding the federal landscape..."
                                    AI Gets its Groove Back
                                    ComputerWorld, April 14th, 2014
                                    "In the left-hand input box, type, "The spirit is willing, but the flesh is weak." In the right-hand box, decide which language you want it translated to. After it's translated the first time, copy the translated text and paste it into the left-hand box for conversion back into English.

                                    If you don't get exactly the original text, the back-translation will in all likelihood still reflect at least part of the original thought: That the actions of the subject fell short of his or her intentions and not that the wine was good but the meat was tasteless, which the phrase could mean in a literal translation..."

                                      As Companies Grow, Managing Risks Gets more Complex
                                      CSO Online, April 11th, 2014
                                      "Size matters when it comes to security, according to Davi Ottenhelmer. Ottenhelmer, senior director of trust at EMC, titled his presentation at SOURCE Boston Wednesday, 'Delivering Security at Big Data Scale,' and began with the premise that, 'as things get larger, a lot of our assumptions break.'

                                      The advertised promise of Big Data is that it will help enterprises make better decisions and more accurate predictions, but Ottenhelmer contends that is placing far too much trust in systems that are not well secured..."

                                      Big Data in Marketing: Passing Power from Businesses to Consumers
                                      SearchSOA, April 11th, 2014
                                      "The days of clumping customers together based on zip code, age and income are falling by the wayside, thanks to the power of big data integration. Instead, chief marketing officers are getting personal. Business leaders are using personal data to better understand -- and serve -- customers. IT leaders, too, need to be aware of the shift taking place with big data in marketing if they want to keep up with trends.

                                      At Big Data TechCon 2014 in Cambridge, Mass., MindStream Analytics Executive Vice President Robert Dayton discussed how big data integration, the cloud, and consumer engagement are prompting business leaders to focus more on technology investments if they want to succeed..."

                                      Big Data Security Context
                                      CSO Online, April 15th, 2014
                                      "I just finished up a lengthy tour through Latin America and Asia, as described in many of my latest blogs. Most recently I was in Australia and New Zealand (ANZ). I had the opportunity to work with various government agencies, organizations within critical infrastructure and general enterprise businesses across ANZ. Their primary topic of interest: big data. More specifically, they were interested in determining what needs to be part of a successful big data security strategy..."
                                      How Not To Do Big Data in Health Care
                                      Information Management, April 14th, 2014
                                      "I got a letter from my health insurer last week. It looked like junk to me at first, but my wife opened it up and left it at my place on the dining room table, so I eventually got around to reading it.

                                      According to my health plan, I would benefit from taking part in their disease management program. They have nurses who serve as personal "health coaches," who could help me to "reach my best health," or "understand treatment plans or medications from my doctor," and "discuss the online resources available for me to live a healthier life."...

                                      IBM Watson: A Shining Example of How to Take Big Data to the Next Level
                                      TechRepublic, April 10th, 2014
                                      "For big data and analytics vendors, the market is approaching an inflection point that takes analytics past early implementations and into more mature realms of how these analytics are ultimately going to impact business.

                                      In the past two years, companies have internally grappled with this question of how to make big data and analytics relevant to the business, and how both can make payoffs on initial budgetary investments.

                                      In many cases, enterprises have seen big data and analytics pay off..."

                                      Seven Not-So-Obvious Roles Your Analytics Pro Will Have to Play
                                      IT Knowledge Exchange, April 8th, 2014
                                      "What skills do CIOs and IT leaders either need to develop or bring in-house to take on big data and advanced analytics? According to Carol Rozwell, that question isn't necessarily the best place to start.

                                      'We should begin with the problems we're trying to solve,' said Rozwell, an analyst for the Stamford, Conn.-based consultancy Gartner Inc., at the recent Gartner Business Intelligence and Analytics Summit.

                                      Phrasing initial questions from a business perspective - such as, 'How will the analysis be used once it's completed?' - can shine a light on both specific skills and soft skills that can help round out a candidate profile. That, in itself, could be a differentiator because, Rozwell said, most companies look for a candidate who can fill vague requirements such as excellent communications skills or works well with others. 'Will those types of general statements bring us the people we'll need?' she asked..."

                                      The Well-Rounded Data Scientist
                                      Information Management, April 15th, 2014
                                      "The work of interpreting data to help decision-makers goes back some 5,000 years to the bureaucrats and businessmen of ancient Sumer. But dealing with the astronomical size and complexity of modern data sets requires a new, multifaceted set of computational, statistical, and communication and people skills, called 'data science.'

                                      Data scientists are among the most sought-after professionals today, and the need for them will only increase as our world grows ever more complex and interconnected..."

                                        IT - Mobile
                                        How MDM Works - Or Doesn't Work - For SMBs
                                        CSO Online, April 8th, 2014
                                        "In large-scale organizations, implementing mobile device management (MDM) is typically given. After all, with so many employees using mobile devices that either contain or connect to sources of sensitive information, there needs to be some way to keep everything in check. But what about those companies that aren't big enough to be able to afford an MDM implementation and a full-sized IT department to manage it? Without a means to centralize the control of mobile devices, how can these smaller companies protect their data?..."
                                        Connected Stuff is Catching On -- Just Don't Call it IoT
                                        Network World, April 14th, 2014
                                        "Many organizations today are looking for things that talk to the Internet. Sensors, cameras, medical equipment and even snowplows are on that wish list.

                                        The "Internet of Things" is not.

                                        The municipalities that come to systems integrator AGT International are already sold on so-called IoT technologies, such as wireless traffic sensors embedded in streets, said Gadi Lenz, a senior technical fellow at AGT.

                                        But they aren't interested in IoT, nor in "smart cities," another term that's been getting a lot of play lately. What they want, Lenz said, is a solution to their problems..."

                                        Six Tips for Avoiding Mobile Security Problems with Mobile Apps
                                        SearchCIO, April 14th, 2014
                                        "Companies of all sizes feel the need to have a mobile app to be taken seriously. But the rush to mobile has also exposed companies to privacy-invasion and security problems, generating customer anger and angst from an application intended to be a customer perk. These mobile app security problems are more daunting -- and potentially more damaging -- for small businesses, where budgets are small and IT support is minimal, if it exists at all.

                                        Our advice? Put your bigger brethren to work by learning how to avoid the mobile app security mistakes they've made..."

                                        Top Ten Articles for last few Issues
                                        Vol 194 Issues 1 and 2 Vol 193 Issues 1, 2, 3 and 4; Vol 192 Issues 3 and 4
                                        We track how frequently each article is viewed on the web site to determine which the readers consider the most important. For last week, the top 10 articles were:

                                        • Fujitsu and Oracle Enhance Fujitsu M10 SPARC Servers
                                        • Oracle Solaris 11.2 Launch Event
                                        • x86 Product Sun Server X4-4
                                        • Oracle DB 12c runs best on SPARC
                                        • How to Migrate Solaris 10 zones to Solaris 11 as branded zone?
                                        • IDC Big Data in the Enterprise
                                        • Database Insider
                                        • Oracle Linux 7 Beta 1
                                        • vBeers - Miami (Wednesday, April 23rd, 2014)
                                        • LibreOffice 4.2.3

                                        The longer version of this article has list of top ten articles for the last 8 weeks.

                                          IT - Encryption
                                          Heartbleed Bug can Expose Private Server Encryption Keys
                                          ComputerWorld, April 14th, 2014
                                          " Four researchers working separately have demonstrated a server's private encryption key can be obtained using the Heartbleed bug, an attack thought possible but unconfirmed.

                                          The findings come shortly after a challenge created by CloudFlare, a San Francisco-based company that runs a security and redundancy service for website operators.

                                          CloudFlare asked the security community if the flaw in the OpenSSL cryptographic library, made public last week, could be used to obtain the private key used to create an encrypted channel between users and websites, known as SSL/TLS (Secure Sockets Layer/Transport Security Layer)..."

                                          The Apache Software Foundation Announces 100 Million Downloads of Apache OpenOffice
                                          OpenOffice moved to apache in 2011
                                          The Apache Software Foundation (ASF), the all-volunteer developers, stewards, and incubators of more than 170 Open Source projects and initiatives, announced today that Apache OpenOffice™ has been downloaded 100 million times.

                                          Apache OpenOffice is the leading Open Source office document productivity suite, available in 32 languages on Windows, OS X, and Linux. OpenOffice includes a word processor ("Writer"), a spreadsheet ("Calc"), a presentation editor ("Impress"), a vector graphics editor ("Draw"), a mathematical formula editor ("Math"), and a database management program ("Base"). As Open Source software, Apache OpenOffice is available to all users free of charge; the C++ source code is readily available for anyone who wishes to enhance the applications.

                                          Originally created as "StarOffice" by StarDivision and after further development as an Open Source product under the name "", OpenOffice entered the Apache Incubator in 2011 and graduated as an Apache Top-level Project in October 2012.

                                          Nexenta News
                                          10+ Lessons from my Software-Defined (SDx) Life
                                          By Jill Orhun Marketing & Chief of Staff Nexenta Systems
                                          Jill writes, "After an exciting week in Amsterdam, Paris and London, where we had Nexenta's quarterly sales meeting, the first of our global OpenSDx Summits, our French launch in Paris, and my first TV interview for Nexenta in London (@cloudchantv) a number of key themes are bubbling up. Multiple industries, organizations, people and technologies are energized by the promise of Open, SoftwareDefined 'everything' - from storage, servers, and networks, to data centers, infrastructure and ultimately enterprises. Few vendors are delivering on this promise, and few organizations understand that Software Defined Storage (#softwaredefinedstorage) (SDS) is the first critical step on this journey.

                                          Here's what's top of mind from a week with the movers, shakers and influencers of OpenSDx:..."

                                          Level3 News
                                          tw telecom Extends Nationwide Network
                                          Salt Lake Valley and Portland

                                          tw telecom, a leading provider of Business Ethernet and networking solutions, announced it is expanding its nationwide network and extensive product suite by introducing service to enterprises and data center customers in the Salt Lake Valley and Portland.

                                          The company is now deploying its industry-leading portfolio of data and Internet solutions to more enterprises, including its innovative Business Ethernet and Intelligent Network capabilities, to connect Portland and Valley customers to local and national destinations.

                                          Trending in
                                          Vol 235, Issue 3
                                          Trending IT Articles