News about Oracle's Solaris and Sun Hardware
System News
Apr 21st, 2014 — Apr 27th, 2014 Generate the Custom HTML Email for this Issue
System News System News for Sun Users
Volume 194, Issue 4 << Previous Issue | Next Issue >>
Sections in this issue:
click to jump to section

Oracle Traffic Director - Part 1: Introduction
By Gokhan Gungor
Gokhan writes, "Enterprises need to support high transaction volumes and run their business applications on a highly available systems while delivering maximum performance. Oracle provides Engineered Systems which is a key technology to secure these resources. Oracle Exalogic Elastic Cloud is one of the key engineered systems which has been widely recognized for delivering breakthrough performance for packaged and custom applications. Oracle Exalogic Elastic Cloud is beyond the capabilities of typical servers used in data centers today. One of the key components of the Exalogic Elastic Cloud Software is Oracle Traffic Director. It is a fast, reliable, and scalable layer-7 software load balancer..."
High Availability Best Practices for Database Consolidation
56-Page White Paper
This paper provides MAA best practices for Database Consolidation using Oracle Multitenant. It describes standard HA architectures that are the foundation for DBaaS. It is most appropriate for a technical audience: Architects, Directors of IT and Database Administrators responsible for the consolidation and migration of traditional database deployments to DBaaS. Recommended best practices are equally relevant to any platform supported by Oracle Database except where explicitly noted as being an optimization or an example that applies only to Oracle Engineered systems.
Is IBM POWER8 a Smart(er) Choice?
Do customers really want to continue to invest in POWER8 and AIX?
Oracle writes, "On Wednesday, April 23, IBM announced new POWER8 systems at the OpenPower Forum. But IBM customers might be disappointed, as it appears that IBM is shifting its strategic R&D focus to Linux on POWER. IBM recently stated that they will 'significantly reposition POWER8' and that they are trying to displace x86 with POWER8 in hyperscale/scale-out data center deployments.

IBM seems to be re-aligning POWER8 to cover lost ground since it decided to de-invest in x86 entirely, while Oracle has instead adopted the strategy of adding/building value for enterprise environments and adding functionality to enhance customer experience (our software in silicon with SPARC processors, Oracle Solaris enhancements and Engineered Systems as examples). Ultimately IBM's strategy may lower the starting price, but IBM may not be able to sustain the model nor add significant net-new value longer term with POWER or AIX.

This represents a major shift in strategy and potentially a reduced investment in POWER AIX for the enterprise..."

American Modern Insurance Group Deploys Oracle Exadata Database Machine
Supports Insurance Claims Process
Companies in the insurance industry must be able to process vast amounts of data efficiently, with little to no downtime. With stretched IT budgets and a highly competitive economic environment, they need solutions that not only accelerate performance, but also reduce costs. To address these challenges, American Modern Insurance Group implemented the Oracle Exadata Database Machine for a new claims management system from Guidewire Software.

American Modern Insurance Group is using Oracle Exadata Database Machine to augment the performance of its new claims system, while lowering total cost of ownership.

A leading insurance organization supporting over 1.7 million policyholders, American Modern Insurance Group needed to enhance its IT architecture to support a recently implemented claims system from Guidewire Software.

April '14 Oracle Virtualization Newsletter
Latest Virtualization News
Chris Kawalek writes, "The April 2014 edition of the Oracle Virtualization Newsletter is now available! Learn why Oracle VM is the best platform for Oracle Database, read about what it takes to deploy and manage private clouds, learn about Oracle joining the OpenStack Foundation, have a look at customer stories and much more.

You can read the latest edition online right now, or subscribe to have future issues delivered straight to your inbox!..."

Configure failover LDom (Oracle VM Server for SPARC) on Solaris Cluster 4.1
Using 'live' migration
Juergen writes, "This blog shows an example to configure 'Oracle Solaris Cluster Data Service for Oracle VM Server for SPARC' on Solaris Cluster 4.1. It also mentions some hints around such a configuration. For this setup Solaris Cluster 4.1 SRU3 or higher and Oracle VM Server 3.0 or higher is required.

At least this is a summary of Oracle Solaris Cluster Data Service for Oracle VM Server for SPARC Guide and Oracle VM Server for SPARC 3.0 Administration Guide.

IT - Storage
USB 3.0 Optical Cables Available at Corning
Storage Newsletter, April 22nd, 2014
"Corning Cable Systems LLC, part of Corning Incorporated, announced the availability of its USB 3.0 optical cables capable of sending up to 5Gb/s of data at distances up to 30 meters.

Compatible with most USB 3.0 and USB 2.0 devices, these optical cables extend data transmission beyond the 3-meter limitation of comparable copper cable.

They were introduced in January 2013 and are available for sale through consumer electronic retail channels..."

    Sorting Through Storage Industry Hype
    Network Computing, April 25th, 2014
    "Vendors are pushing new storage technologies, such as software-defined storage and new types of NAND flash storage, while users try to make sense of a fast-changing storage landscape.

    The data storage industry is abuzz about the latest innovations, such as software-defined storage, MRAM flash, all the variations of cloud storage, and the monster called big data. But enterprise managers of storage systems are still learning what this technology actually means for them as they try to cut through vendor hype..."

    Scale-Out Storage Has Limits
    Network Computing, April 21th, 2014
    "Disk may scale as your storage needs increase, but what do you do when your datacenter is maxed out?

    Scale-out storage systems promise to be able to scale as an organization's data storage and capacity demands increase. The problem is that datacenters do not scale out. When you run out of room in a datacenter you have two options: build a new one, or set a policy that 'for everything that comes into the datacenter, something must come out.' How can you meet scaling demands without having to build new datacenters?..."

      Java Technology
      Java EE 7 with GlassFish 4 Application Server
      By David Heffelfinger
      The third edition of David Heffelfinger's Java EE book has been recently released. This updated edition is covering the latest version of the Java EE Platform, i.e. Java EE 7.

      The book gives a wide introduction on the Java EE Platform and its major APIs in their latest version: JPA 2.1, EJB 3.2, JSF 2.2, CDI 1.1, JMS 2.0, JAX-RS 2.0, Beans Validation 1.1, JAX-WS 2.2, etc. The book also cover 2 of the APIs introduced in Java EE 7 : the WebSocket API and JSON-P.

      So if you are new to Java EE 7 or if you have been stuck on an older version the platform, reading this book will give you a good technical overview of Java EE 7, its main APIs and they works. It will give a solid overall understanding of Java EE 7 to rapidly start. You will then be able to deep more easily in the Platform and its APIs.

      Java Performance: The Definitive Guide
      By Scott Oaks
      Coding and testing are often considered separate areas of expertise. In this comprehensive guide, author and Java expert Scott Oaks takes the approach that anyone who works with Java should be equally adept at understanding how code behaves in the JVM, as well as the tunings likely to help its performance.

      You'll gain in-depth knowledge of Java application performance, using the Java Virtual Machine (JVM) and the Java platform, including the language and API. Developers and performance engineers alike will learn a variety of features, tools, and processes for improving the way Java 7 and 8 applications perform.

      • Apply four principles for obtaining the best results from performance testing
      • Use JDK tools to collect data on how a Java application is performing
      • Understand the advantages and disadvantages of using a JIT compiler
      • Tune JVM garbage collectors to affect programs as little as possible
      • Use techniques to manage heap memory and JVM native memory
      • Maximize Java threading and synchronization performance features
      • Tackle performance issues in Java EE and Java SE APIs
      • Improve Java-driven database application performance


      Java Developer Day
      May 6, 9am-1pm Pacific Time
      As the world's #1 application server, Oracle WebLogic runs a lot of Java apps. And all those Java apps were built by some really smart developers who learned to code in Java.

      Coming in just a few days, Oracle is hosting a Virtual Developer Day giving Java developers of all levels another opportunity to learn more about how they can build amazing applications with the latest Java flavors; SE, EE and Embedded. Following the Virtual Developer Day, we'd love to hear how you're running your rich new apps on WebLogic. But we're unashamedly biased on this blog, of course.

      • Java Virtual Developer Day
      • May 6, 9am-1pm Pacific Time


      Big Data Appliance 3.0 and Big Data Connectors 3.0
      Big Data Appliance 3.0 includes Oracle NoSQL Database 3.0
      Jean-Pierre writes, "we are releasing Big Data Appliance 3.0 (which includes the just released Oracle NoSQL Database 3.0) and Big Data Connectors 3.0.These releases deliver a large number of interesting and cool features and enhance the overall Oracle Big Data Management System that we think is going to be the core of information management going forward..."
      IT - Technology
      8 Gadgets for the High-Tech Home
      Information Week, April 21st, 2014
      "A new day is dawning for those of you who've dreamed of being both more efficientand lazier with your household gadgets and appliances. The barriers to entry for the "connected home" fall as the IoT (Internet of Things) vision comes to life. Network bandwidth is widely available, and traditional home appliances are being rebuilt to connect to the Internet via WiFi and other wireless protocols. Smartphones and tablets double as remote controls for appliances ranging from light bulbs to thermostats to speakers..."
      10 Great Android Apps for IT Pros
      InfoWorld, April 24th, 2014
      "In the my previous roundup of IT tools for Android, I was a annoyed about having to root my Android tablets to make them useful in the enterprise. In the 18 months since, the 2013 Nexus 7 has proved amazing, and the Moto X is a great smartphone -- and both are reasonably priced and unlocked.

      This isn't to say other Android phones and tablets aren't good, but the Nexus 7 with LTE from T-Mobile gives me the power and connectivity to fix just about any minor IT problem remotely, earning it a permanent place in my cargo pocket -- and on my list of essential "MacGyver IT" troubleshooting tools.

      Here are the apps every Android-wielding IT pro should know about..."

      12 Ethical Dilemmas Gnawing at Developers Today
      InfoWorld, April 21st, 2014
      "The tech world has always been long on power and short on thinking about the ramifications of this power. If it can be built, there will always be someone who will build it without contemplating a safer, saner way of doing so, let alone whether the technology should even be built in the first place. The software gets written. Who cares where and how it's used? That's a task for somebody in some corner office..."
        How 3D Printing is Transforming Healthcare
        Network World, April 21st, 2014
        "The 3D printing world is currently in limbo - the technology is developed enough to attract some attention in the real world, but not enough to bring about change on a substantial scale. New stories emerge everyday of 3D printing breakthroughs, be it through research or the development of actual products.

        These breakthroughs tend to apply to a handful of markets, most of which have either used 3D printing in practice or have begun preparing for it. These are the five markets that will see the biggest immediate impact from 3D printing, in no particular order..."

        Seven Reminders the World Runs on IT
        IT News, April 24th, 2014
        "Information technology systems have become so ingrained in every aspect of our daily lives that it's easy to forget just how much we rely on them.

        Occasionally a system drops, and we're left without access to funds, electricity or communications. Or we're left stranded in an airport terminal or on a train station. And we're reminded that this whole systems availability thing is sort of important.

        We've compiled a list of such events below that you may find of use every time:..."

          Building Web Apps with WordPress
          O'Reilly, April 21st, 2014
          "WordPress is much more than a blogging platform. As this practical guide clearly demonstrates, you can use WordPress to build web apps of any type - not mere content sites, but full-blown apps for specific tasks. If you have PHP experience with a smattering of HTML, CSS, and JavaScript, you'll learn how to use WordPress plugins and themes to develop fast, scalable, and secure web apps, native mobile apps, web services, and even a network of multiple WordPress sites.

          The authors use examples from their recently released SchoolPress app to explain concepts and techniques throughout the book. All code examples are available on GitHub..."

          IT - Bitcoin
          Small Businesses Enjoy Success After Accepting Bitcoin
          CoindDesk, April 21st, 2014
          "As bitcoin continues to grow in popularity, small businesses around the world have begun accepting the digital currency as a method of payment.

          Many of these businesses have seen only a very small portion of their customers pay with bitcoin, but that doesn't necessarily make the venture into cryptocurrencies a failure..."

          New Bitcoin Movie Introduces You To The Many White Dudes Working On Bitcoin
          Forbes, April 24th, 2014
          "Two brothers from Pittsburgh, Pennsylvania, Nicholas and Daniel Mross, are the director and star, respectively, of the first Bitcoin documentary to hit the big screen, getting its premiere at the Tribeca Film Festival this week. 'We jokingly call ourselves the Winklemross brothers,' says Nicholas, in a nod towards the famous twins who own a sizeable chunk of the cryptocurrency.

          The documentary, The Rise and Rise of Bitcoin, paints, as you might expect from the title, a rosy picture of the digital currency..."

          The World's First Bitcoin Debit Card Is Almost Here
          Wired, April 24th, 2014
          "Bitcoin may be the future of digital money, but it has a big problem here in the United States: why use it to buy anything when millions of merchants already accept debit and credit cards?

          Today, if you want to buy a bottle of lemonade with bitcoins, you need to scan a QR code with your phone or email a long bitcoin address to the seller. For most people, buying with bitcoins just isn't as easy as Visa or MasterCard.

          But that's set to change in the next two months..."

          Bitcoin better than any form of money that has ever existed before
          RT, April 25th, 2014
          "Bitcoin is shaping up to be the currency of the future, enabling people to send and receive money anywhere in the world free of charge in a currency that govts are unable to control, Roger Ver, bitcoin investor and the CEO of Memory Dealers told to RT.

          RT: Why do you think this Moscow Bitcoin conference is important?..."

          State of Bitcoin Q1 2014 Report Shows Venture Capital Soaring
          CoindDesk, April 21st, 2014
          "Much has happened since CoinDesk released its first State of Bitcoin report earlier this year and today we are publishing an update featuring brand new data and analysis.

          We were blown away by the success of the first report, which, at the time of writing, had over 110,000 views on SlideShare. So thank you for taking the time to read and share it across your networks.

          The new report focuses on data and events in the first quarter of 2014 through to the present day..."

          What to Expect from The Top Oracle Solaris 11 Training Courses
          by Mike Lanker, Senior Oracle University Instructor

          Mike writes, "After many years of working with prior versions of Solaris, I was asked to learn and teach Solaris 11 classes. I wondered what could be different?

          Old vs. New Versions of Solaris 11

          I quickly discovered there are many differences between older and newer versions of Solaris 11.

          My first course of action on my training path was to take the UNIX and Linux Essentials course. This training explored the basics, so I followed up by taking the Solaris 11 Administration course.

          If you're working toward becoming a Systems Administrator (SA), I can tell you from experience that these courses will help you excel within this position. How, you ask? Let's take a look at the skills these courses will help you develop..."

          MySQL April Newsletter
          Latest MySQL Product Releases and More
          "The MySQL April Newsletter is now available! Read this edition to learn more details about the abundant product announcements we made recently, including MySQL 5.7 Development Milestone Release, MySQL Workbench 6.1 GA, as well as the Release Candidate of MySQL Fabric. You'll also find information regarding the latest white papers, upcoming webinars and events, and technical blogs for tips and tricks using MySQL.

          Enjoy and hope you find it informative!"

          MySQL for Visual Studio 1.2.0 alpha
          Not suitable for production

          MySQL for Visual Studio is a product including all of the Visual Studio integration previously available as part of Connector/Net. The 1.2.0 version is an alpha release of this product that intents to introduce users to the new features in this version.

          This release is not feature complete and there are significant limitations but it should be stable enough for users to understand the new features and how we expect them to work. As is the case with all non-GA releases, it should not be used in any production environment. It is appropriate for use with MySQL server versions 5.0-5.6.

          Cloud Computing
          Oracle Partners Use the Cloud to Deliver Increased Customer Value at Unprecedented Speed
          More than 500 Oracle Partners, Including Diamond Level Members, Have Achieved Specialization Across Nine Cloud Offerings
          Oracle partners and Diamond-level members are using Oracle Cloud to speed time to market, grow and capitalize on new business opportunities, and deliver exceptional customer value. They're doing that in conjunction with Oracle PartnerNetwork (OPN), which offers a wide range of cloud programs and enablement resources.

          "Oracle's partner community is an invaluable asset to the company," said Oracle President Mark Hurd. "They offer knowledge that is critical to the success of our customers. Partner adoption of Oracle Cloud solutions has been tremendous and we will continue to provide the resources and technology they need to grow their business and deliver value to customers with Oracle Cloud."

          Take-Aways from the Oracle Cloud Analyst Summit
          By Gene Eun
          Gene writes, "Every year, Oracle's product strategy, development and marketing teams spend a considerable amount of time with members of the analyst community. Even though these teams have continuous dialogues with individual customers and customer advisory boards (CABs), the fact remains that IT research analysts and consultants play an important role by providing valuable insight on industry trends and opportunities and expert advice on business strategy. Such was the case this past March when Oracle invited twenty of the most influential analysts covering Cloud to Indian Wells, CA for an Oracle Cloud Analyst Summit. During the summit, key Oracle executives discussed the latest additions to the Oracle Cloud Solutions portfolio and provided updates on our product strategy and roadmap. The gathering was also the perfect forum to hear what analysts thought about Oracle's vision and execution plans for addressing the cloud computing market.

          While not all of the details of the summit are available or suitable for sharing publically, I want to share with you some of the analyst sentiment that came out during and after the event..."

          The Logical Choice for Business Applications
          Oracle Exalogic is a fully integrated, tested and certified hardware and software platform, powered by Intel® Xeon® processors and engineered specifically for business applications. Register to access this ebook and learn why customers in 52 countries, across 21 industries, trust Oracle Exalogic for their critical applications.
          April '14 Oracle Linux Newsletter
          Latest Linux News from Oracle
          The April 2014 edition of the Oracle Linux Newsletter is now available! This issue has some fantastic stories on the new Oracle Linux 7 beta, an Oracle sponsored IDC white paper on Oracle Linux, UEK R3 Update 1, Oracle Linux and Hyper-V, accelerating MySQL on Oracle Linux, and much more.

          You can read the latest edition online right now, or subscribe to have future issues delivered straight to your inbox!

          IT - Cloud
          Cloud Computing Enters Its Second Stage - Hypergrowth Ensues
          Forrester, April 24th, 2014
          "The public cloud services market exited 2013 with $58 billion in revenues according to Forrester estimates. Strong growth and maturity over the past three years since our last forecast has put fuel in its tank which will push this market to $191 billion by 2020.

          While the last several years can best be characterized as exploratory for most enterprises, cloud services and cloud platforms are now an undeniable part of the IT landscape. And based on Forrester enterprise CIO inquiries, the shift has begun from exploration of cloud as a potential option, to rationalization of cloud services within the overall IT portfolio..."

          Avoid Hidden Cloud Computing Costs: Save Money by Doing the Research
          SearchCloudApplications, April 21st, 2014
          "While cloud computing touts its lower-than-on-premises costs, pricing a transition to the cloud is not that simple. With traditional approaches to IT infrastructure, a manager had to consider many variables, including server and other hardware, when rolling out new software and services. Cloud providers promise to reduce application environment complexity to enable easier buying decisions. It's too bad they don't simplify pricing options, said Owen Rogers, senior analyst of digital economics for 451 Research and author of 451's Cloud Pricing Codex..."
          Cloud Holdouts Face Tipping Point
          Information Week, April 17st, 2014
          "If your technology strategy doesn't emphasize a phased approach to cloud architectures during the next 18 months, it might be time to look for a new job.

          The numbers don't lie. IDC and Gartner stats cited by IBM's Marc Dietz show that 85% of new software is now being built for the cloud. One quarter of all the applications ever written will be available in a cloud model by 2016, and 72% of developers incorporate cloud-based services or APIs. This will be a $45.8 billion market by 2017..."

          Criminals Have Noticed the Cloud: Attacks on Providers on the Rise
          TechWorld, April 23rd, 2014
          "The number of cyberattacks directed at cloud infrastructure is still below that experienced by on-premises data centres but will probably reach parity at some point, an analysis by security-as-a-service provider Alert Logic has suggested.

          The firm's Cloud Security Report [reg required] looked at 232,364 verified security incidents at 2,212 organizations in North America and Western Europe over a 6-month period last year using the firm's own intrusion system, finding a predictable rise in attacks across all environments..."

          Even the Most Secure Cloud Storage May not Be So Secure, Study Finds
          Network World, April 21st, 2014
          "Some cloud storage providers who hope to be on the leading edge of cloud security adopt a 'zero-knowledge' policy in which vendors say it is impossible for customer data to be snooped on. But a recent study by computer scientists at Johns Hopkins University is questioning just how secure those zero knowledge tactics are.

          Zero knowledge cloud services usually work by storing customer data in an encrypted fashion and only giving customers the keys to unencrypt it, rather than the vendor having access to those keys. But the researchers found that if data is shared within a cloud service, those keys could be vulnerable to an attack allowing vendors to peer into customer data if they wanted to..."

          Toward Cloud Security: Understanding Your Control Levels
          Data Center Knowledge, April 21st, 2014
          "As adversaries have become better organized and more aggressive, threats to sensitive data have increased. In addition, the security of cloud computing is a growing concern as more data moves from traditional data center environments to cloud-based services.

          A recent study by Georgia Tech found that few businesses engage security measures beyond those provided by the cloud provider. While a fire-and-forget model may be sufficient for less sensitive data, it's appropriate to ask and even re-ask whether protections in all data environments are adequate to prevent undesired outcomes..."

          IT - CxO
          IT Departments Not Losing Ground to Managed Service Providers (Yet)
          CIO, April 21st, 2014
          "Many business users say they're fed up with what they perceive as sluggish IT departments, but cringe at the thought of outsourcing to a managed services provider. However, the rise of BYOD, consumer tech and cloud computing may be clearing a path for change..."
          Sensitive Data: What Constitutes 'Reasonable Protection'?
          Information Week, April 21st, 2014
          "A Federal Trade Commission lawsuit now before the federal courts, alleging that the Wyndham hotel chain failed to make reasonable efforts to protect consumer information, offers a cautionary tale to all executives. The concern: How do companies decide what constitutes 'reasonable protections' of sensitive data -- and how do they know if they're meeting that standard?..."
            10 Tech Topics IT Leaders Should Stay On Top Of
            TechRepublic, April 21st, 2014
            "At the Interop conference in Las Vegas a few weeks ago, I noticed some strong trends in the topics covered. As a matter of fact, most of the topics fit into a dozen or so categories. Here are 10 hot topics that are clearly on the minds of business and IT leaders..."

            • Software-defined networking
            • Software-defined data centers
            • Cloud
            • Software-as-a-service
            • Mobility
            • BYOD
            • Internet of Things
            • IPv6
            • Big data
            • CIO and IT management

            Read on for details.

            A Simple Cure for the Cybersecurity Skills Shortage
            ComputerWorld, April 16th, 2014
            "There's a simple solution to the lack of skilled cybersecurity professionals. Which is not to say that it will be easy.

            People constantly bemoan the dearth of skilled cybersecurity personnel, especially after a high-profile breach. And we hear a lot of proposals for fixing the problem: more certifications, more training, more research. All of these solutions amount to lobbying; they come from certification bodies, training companies and university researchers..."

              Buzzword Engineering, or the Curse of Nicholas Carr
              GCN, April 23rd, 2014
              In a recent working group meeting, I was stunned to see a government official present a hand-drawn, cartoonish technical architecture as a proposed solution for a major initiative with presidential-level visibility. By the end of the meeting, in conjunction with his inability to answer a few basic questions on the 'architecture,' the government manager admitted to everyone, 'Well, I'm not a system architect.'

              Unfortunately, this is not the first time I have encountered 'pseudo-engineering' or 'buzzword-engineering' inside and outside the government. The root cause of this is what I call the 'curse of Nicholas Carr.'..."

                IT Leader or IT Manager? How to Be the Best of Both
                CIO, April 17th, 2014
                "The best leaders aren't necessarily great managers and great managers aren't always the best leaders. A company needs both types of personalities to be competitive. Here's a look at the separate skills and traits associated with each, so you can be the best leader and/or manager for your IT team..."
                  Survey Shows that Stressful Work is Pushing Many Employees Out
                  TLNT, April 23rd, 2014
                  "We all know that a stressful work environment can impact employees' mental, physical, and emotional health, as well as impact their engagement and productivity, but a new study from Monster reveals just how many employees are saying no to 'sticking it out' in stressful work environments, and seeking jobs elsewhere.

                  Monster's international Workplace Stress study surveyed nearly 1,000 job seekers on the Monster database..."

                  Why You Need A Chief Information Security Officer
                  Information Management, April 21st, 2014
                  "Consider: Threats to the security and privacy of patient data in the U.S. healthcare system are increasing, healthcare organizations continue to struggle with the increasingly complex federal and state privacy and security regulations, and many, if not most, providers have experienced a data breach.

                  Those are among the findings of the Fourth Annual Benchmark Study on Patient Privacy & Data Security, which was conducted by Ponemon Institute and published in March 2014.

                  Here's a quick summary of some of the study's other takeaways:.."

                  Working-at-Home a Win-Win for Employers and Employees
                  CIO, April 18th, 2014
                  "More than a year after prominent businesses like Yahoo and Best Buy rescinded their telecommuting policies, Premiere Global Services, International's survey reveals that those high-profile decisions did little to impact the general trend toward an increasing mobile and remote workforce.

                  According to PGi's survey, 89 percent of respondents reported telecommuting policy did not change during the past year. For those who did report a change, only six percent stated that their company ended an established program, according to PGi..."

                    The New How: Creating Business Solutions Through Collaborative Strategy
                    O'Reilly, April 21st, 2014
                    "Once in a generation, a book comes along that transforms the business landscape. For today's business leaders, The New How redefines the way companies create strategies and win new markets.

                    Management gurus have always said "people matter." But those same gurus still relegate strategy to an elite set of executives who focus on frameworks, long presentations, and hierarchical approaches. Business strategy typically has been planned by corporate chiefs in annual meetings, and then dictated to managers to carry out. The New How turns that notion on its head. After many years of working with Apple, Adobe, HP, and many other companies, Nilofer Merchant discovered the secret sauce: the best way to create a winning strategy is to include employees at all levels, helping to create strategy they not only believe in, but are also equipped to implement..."

                    vBeers South Florida
                    3 Separate Monthly Events - @ Broward; @ Boca; @ Miami
                    The upcoming events are:

                    • vBeers @ Broward 2nd Wednesday of Month May 14th
                    • vBeers @ Boca 3rd Wednesday of Month May 21st
                    • vBeers @ Miami 4th Wednesday of Month May 28th

                    Look to the vBeers South Florida vBeers group and to for announcements.

                    IT - DR
                    Stop Procrastinating: Formulate a Big Data Disaster Recovery Plan Today
                    TechRepublic, April 17th, 2014
                    "Few enterprises have defined disaster recovery (DR) plans for big data, but as big data plays a more mission-critical role in companies, DR should become a focal point.

                    Not everyone agrees, of course.

                    When Lockwood Lyon, a systems and database performance specialist, asked database administrators how they implemented disaster recovery in their big data environments, he said there were two common responses:..."

                    A Guide to Cloud Encryption and Tokenization
                    Help Net Security, April 22nd, 2014
                    "Cloud adoption shows every sign of continuing to grow. The sharing of resources helps businesses achieve savings and agility based on economies of scale but there's a problem: cloud computing can also be an attractive target for cyber thieves.

                    Businesses using the cloud are now increasingly looking to security experts for help on how to protect their data against unwanted intrusion. With Edward Snowden's continuing revelations on government spying, and a string of headline-grabbing incidents like the recent Heartbleed security vulnerability, many are calling 2014 the year of encryption..."

                    FirstNet Explained
                    Emergencey Management, April 18th, 2014
                    "The attacks of 9/11 revealed the incompatible and balkanized state of emergency and public safety communications in America, with police unable to communicate by radio with firefighters. When Hurricane Sandy hit New York and New Jersey in 2012, the situation was remarkably different. Police commanders talked with fire officials as they battled power failures in the wake of the storm. Yet when emergency officials from other cities showed up to help, their radios could not communicate with public safety commanders in New York.

                    The solution?..."

                      IT - PM
                      How to Avoid a Healthcare.Gov Fiasco in Your Cloud
                      InfoWorld, April 18th, 2014
                      "Last week, Kathleen Sebelius, secretary of the U.S. Health and Human Services Dept. and the public face of the Affordable Care Act (aka Obamacare), announced her resignation. She had been under attack by Congress and others ever since the botched rollout of the federal Obamacare signup site,, last fall.

                      At launch, was able to sign up only a few subscribers per hour. These days, the site is pretty much fixed, and the total signups ultimately exceeded the government's original prediction of 7 million (8 million actually signed up). But the debacle's stain continues to dog in particular -- security concerns persist, for example -- and Obamacare in general..."

                      IT - Operations
                      Four Signs It's Time to Break up with Your IT Services Provider
                      Business 2 Community, April 23rd, 2014
                      "Abba got it right in their classic song about love gone wrong: 'Breaking up is never easy . . . but I have to go.' So when your relationship with your IT provider hits the rocks, the chances are that the signs have been obvious for a long while. It's just that you weren't looking. This can be a downside of outsourcing: diminishing standards of business IT support. The most important thing is to size the situation up objectively and make a strategic decision to change partners before the relationship deteriorates to a state that could seriously damage your business..."
                      IT - Security
                      7 Tips to Improve 'Signal-to-Noise' In the SOC
                      Dark Reading, April 22nd, 2014
                      "When security analysts are desensitized to alerts because of sheer volume, they miss the true positives that can prevent a large-scale data breach. Here's how to up your game.

                      Reports on the recent Target and Neiman Marcus breaches have indicated that, in both cases, there were numerous alerts fired as a result of the intrusion activity. Yet, according to news accounts, the alerts were not properly handled, allowing system compromises to go undetected and giving attackers the crucial footholds needed to pull off large-scale breaches..."

                      9 Attack Patterns Describe 92% of 100,000 Security Incidents
                      Network World, April 22nd, 2014
                      "There are some big changes to Verizon's 2014 Data Breach Investigations Report (DBIR) (pdf), including a deep dive into two different datasets that came from 50 different sources and 95 countries. One set of data looks back at 1,367 confirmed data breaches and 63,437 security incidents from 2013. Another looks back over a decade of data covering about 3,800 data breaches and 100,000 security incidents. Guess what? Nine types of attack patterns accounted for 92% of 100,000 incidents spanning the last 10 years. Put another way by Verizon RISK team researchers, "Nine out of 10 of all breaches can be described by nine basic patterns."
                      Federal CIOs moving Cybersecurity Beyond Compliance
                      CIO, April 17th, 2014
                      "As federal agencies struggle to keep pace with the mounting threats to their far-flung digital systems, IT professionals must move away from treating security as a compliance exercise and adopt dynamic, real-time monitoring, government CIOs said in a recent panel discussion.

                      In many agencies, that shift toward continuous monitoring is already well underway, as CIOs have been working to further automate their systems so that networked assets scan for and report potential security incidents..."

                      Heartbleed: Security Experts Reality-Check the 3 Most Hysterical Fears
                      PCWorld, April 17th, 2014
                      "Heartbleed has dominated tech headlines for a week now. News outlets, citizen bloggers, and even late-night TV hosts have jumped on the story, each amping up the alarm a little more than the last one. But while it's true Heartbleed is a critical flaw with widespread implications, several security experts we've spoken with believe the sky-is-falling tone of the reporting is a bit melodramatic.

                      "While this is technically a 'big deal,' the exposure that this has received by the media is overblown," says Greg Foss, senior security research engineer for LogRhythm ..."

                      Heartbleed could Cost Millions, Could have Been Prevented
                      CIO Today, April 22th, 2014
                      "So, could IT best practices have caught Heartbleed sooner? Following best practices to prevent bugs like Heartbleed isn't enough, but technology does exist that IT can use to prove programs meet certain properties, such as ensuring the program never reads from a place in memory where it didn't write, said security expert Richard Kenner.

                      Early estimates of Heartbleed's cost to enterprises are running in the millions. Revoking all the SSL certificates the bug leaked will come at a hefty price, according to CloudFlare, a Web hosting service provider..."

                      How to Get Creative with Your Penetration Testing
                      Help Net Security, April 21st, 2014
                      "It's a busy day in your company and everyone is rushing around trying to respond to requests. Audrey gets an email that looks like it's from a partner asking her to look into a recently placed order. She clicks on the PDF to check it out. But instead of seeing the partner's order, she sees a landing page from the company's security team letting her know she fell prey to a simulated phishing attack. As she looks around the room, she sees that a few co-workers also have stunned looks on their faces..."
                      Michaels Data Breach Response: 7 Facts
                      Help Net Security, April 22nd, 2014
                      "Retail chain Michaels last week disclosed that 2.6 million credit and debit cards may have been compromised at its stores over an eight-month period, beginning in May 2013.

                      When evidence of the breach came to light in January, Michaels launched a related investigation, with CEO Chuck Rubin issuing a statement to customers, warning them of what may have occurred..."

                      With Heartbleed, IT Leaders Are Missing the Point
                      IT World, April 17th, 2014
                      "The IT response to Heartbleed is almost as scary as the hole itself. Patching it, installing new certificates and then changing all passwords is fine as far as it goes, but a critical follow-up step is missing. We have to fundamentally rethink how the security of mission-critical software is handled.

                      Viewed properly, Heartbleed is a gift to IT: an urgent wake-up call to fundamental problems with how Internet security is addressed. If the call is heeded, we could see major improvements. If the flaw is just patched and then ignored, we're doomed. (I think we've all been doomed for years, but now I have more proof.).."

                      CompTIA Security+ Study Guide, 6th Edition
                      O'Reilly, April 21st, 2014
                      All the test prep you need for Exam SY0-401

                      In this highly anticipated new edition of the popular CompTIA Security+ Study Guide, top security authorities Emmett Dulaney and Chuck Easttom prepare you for the latest CompTIA Security+ exam, SY0-401. They cover exam essentials such as network security, compliance and operational security, threats and vulnerabilities, and application, data, and host security - and they offer vital insights from their decades of security experience. This CompTIA approved courseware includes:...

                      IT - Careers
                      15 Tips for Surviving -- And Thriving -- As an IT Contractor
                      ComputerWorld, April 23rd, 2014
                      "William Deegan started his IT career as a full-time staffer. But during the dot-com bust, when hours became long and stressful, Deegan met a contractor who was working fewer hours and making more money. "I liked his quality of life. That's how I started contracting," says Deegan, now sole proprietor of Bad Dog Consulting in Mountain View, Calif.

                      In a 2013 survey of more than 200 IT decision-makers, tech recruiting firm Mondo found that 48% of respondents planned to hire more IT contractors than full-time staff in the next 12 to 18 months.

                      If you're considering contracting, read these 15 tips from seasoned veterans..."

                        The Sorry State of IT Education
                        Information Week, April 18th, 2014
                        "As our traditional corporate silos continue to collapse, IT professionals will need to take on more cross-discipline responsibilities to advance their careers. Unfortunately, our education systems are failing to prepare IT pros for those responsibilities, and it will fall on employers to pick up the slack.

                        First, a little history to understand how we ended up where we are today..."

                          Who Came Up with Your Least Favorite Tech Buzzwords?
                          IT World, April 21st, 2014
                          "One of my favorite things in the world is etymology, the study of the origins of words, the "wheel-ruts of modern English" in the words of the indispensable Online Etymology Dictionary. One of my least favorite things is the swarm of buzzwords, both technical and marketing, that seem to surround the tech industry. So why not combine the two? Here are ten tech buzzwords or buzzphrases, identified as some of the most hated on a number of online lists, along with their supervillain origin stories. Read on, and perhaps you'll think twice before introducing the next "disrupt" or "phablet" into the tech vernacular..."
                            Seven Reasons Technical Women Quit and How to Keep Them
                            aNewDomain, April 21st, 2014
                            "So, you've worked hard to recruit talented technical women to your company, and you certainly don't want to lose them. While there are myriad reasons why people leave jobs, there are practices in the tech industry that can create caustic work environments for women.

                            Here are seven things not to do if you want to retain your female employees..."

                              IT - Database
                              The Accidental Database Administrator
                              Federal Computer Week, April 17th, 2014
                              "Some things in life can be considered happy accidents. Just ask government IT administrators, many of whom find themselves in the unexpected position of becoming accidental database administrators (DBAs).

                              Data has become the centerpiece of new government initiatives in the areas of health care, social welfare, biometrics and intelligent inspections. But although data has grown, the size of federal IT teams has remained stagnant. A recent survey by my company, SolarWinds, found that most IT organizations have not added any new headcount in the past two years. As a result, many federal IT administrators have, by default, become DBAs..."

                              IT - Backup
                              Identify data backup solutions for today's challenges
                              SearchDataBackup, April 21st, 2014
                              "Over the last several years, data protection has evolved to address a variety of new or growing challenges. Factors such as exponential data growth and the need for near real-time data protection have driven organizations to abandon legacy backups. For some organizations, producing a nightly backup is long gone. Or those nightly backups are being supplemented with additional data protection measures that offer more frequent data protection and faster restores.

                              This primer on data protection by independent backup expert Brien Posey looks at backup challenges that IT shops face today..."

                                Crump: A robust data protection strategy includes more than backup
                                SearchDataBackup, April 25th, 2014
                                "A data protection strategy means having a plan for backing up and recovering an organization's information, but it's important to know how long that a restore will take -- and application stakeholders all know how long it will take, as well.

                                "The application owner is assuming you're going to get it up and running instantly, and you're assuming you're going to get it up and running as fast as you possibly can. And the problem is there's generally a pretty wide delta there," said George Crump, founder of Storage Switzerland, to his Storage Decisions audience.

                                He said that most environments that his firm encounters have about three "really critical" applications, but most don't require what he called "zero-second" recovery times..."

                                  IT - Mobile
                                  Is it Wear Your Own Device (WYOD) time?
                                  TechRepublic, April 17th, 2014
                                  "As the excitement of wearables gives way to more users bringing them into the workplace, it means it might be time to review your company's Bring Your Own Device (BYOD) strategies to support the entry of the devices into your enterprise. Some analysts and pundits have even gone as far as calling for the advent of Wear Your Own Device (WYOD) policies..."
                                  Wearable Computing Devices: Can They Pass the Acid Test?
                                  Network Computing, April 22nd, 2014
                                  "I've been reading and writing technology product reviews far longer than I'd like to admit. Fortunately, the years have actually taught me a thing or two about which products are likely to make a lasting difference and which are mere flashes in the pan. In fact, I've learned that there's a relatively simple test that's all too seldom applied by tech reviewers, who tend to get all excited by a given product's whiz bang features. I think it's past time to start applying that test to wearable computing devices..."
                                    How to Save On Mobile Plans: Your Guide to 16 No-Contract Carriers
                                    ComputerWorld, April 24th, 2014
                                    "The mobile-phone industry is in a state of flux. Where once you had little choice but to buy a subsidized phone from a major carrier and pay two years' worth of whatever monthly fees it chose to levy, now you have options aplenty.

                                    For example, that two-year contract? Now you can bypass it and purchase an unsubsidized, unlocked phone -- including such leading-edge models as the Google Nexus 5 and Motorola Moto X..."

                                    NASA to Test Laser Communication System
                                    ComputerWorld, April 18th, 2014
                                    "The SpaceX cargo spacecraft ... will carry equipment needed for astronauts on the International Space Station to test optical laser communications...

                                    As the space station moves in its orbit around Earth, the ground telescope will track it and transmit a laser beacon carrying a video uplink in 100-second bursts to the orbiting instrument. The tests will help scientists better calculate the ability to point the laser, along with beam acquisition and tracking -- all while the space station is traveling at approximately 17,500 miles per hour.

                                    The new laser communications initiative is a key part of NASA's Space Technology Mission Directorate, an arm of the space agency focused on developing technology for future space missions, as well as for life here on Earth..."

                                      IT - Big Data
                                      Big Data Quality: Certify or Govern?
                                      Information Management, April 17th, 2014
                                      "We've been having an intersting conversation with clients and internally about the baggage associated with Data Governance. As much as we (the data people) try, the business thinks it is a necessary, but the commitment, participation, and application of it is considered a burden worth avoiding. They wonder, "Is this really helping me?" Even CIOs roll their eyes and have to be chased down when the data governance topic comes up. They can't even sell it to the business..."
                                        Big Data Vendors should Stop Dissing Data Warehouse Systems
                                        SearchBusinessAnalytics, April 21st, 2014
                                        "I've heard so many big data vendors bash data warehouses as a way to justify their new technologies that it's getting annoying. To them, data warehouse systems are monolithic, costly and inflexible, while their technologies are fast, flexible and affordable. "Buy our products," they shout in their shiny collateral, "and we'll save you from data warehousing hell."

                                        As if technology were the problem. Or the solution...

                                        Who's Afraid of Big Data?
                                        Wall Street and Technology, April 22nd, 2014
                                        "Big data promises a new kind of knowledge and understanding for broker-dealers that will overhaul firm productivity. We all know the theories of what we can do with big data and how it relates to product management, easier customer engagement, and improved information access.

                                        With these tools, questions about which clients have the highest returns per effort and time expended, or about how to best organize an advisor's time, can now be answered. Even so, the implementation of big data strategies has stalled on how to take advantage of these possibilities. How do you go about actually integrating big data into your firm?..."

                                        Top Ten Articles for last few Issues
                                        Vol 194 Issues 1, 2 and 3; Vol 193 Issues 1, 2, 3 and 4; Vol 192 Issue 4
                                        We track how frequently each article is viewed on the web site to determine which the readers consider the most important. For last week, the top 10 articles were:

                                        • April 29 Oracle Solaris 11.2 Launch
                                        • Oracle Virtual Compute Appliance X4-2
                                        • Solaris Guests on VMware ESXI
                                        • Java in a Nutshell
                                        • Java 8 Pocket Guide
                                        • The Apache Software Foundation Announces 100 Million Downloads of Apache OpenOffice
                                        • Total Economic Impact of Exalogic and Exadata
                                        • Oracle Storage Cloud and Oracle Database Backup Service
                                        • Modernizing IBM AIX/Power Progfram
                                        • Master Data Management

                                        The longer version of this article has list of top ten articles for the last 8 weeks.

                                          Nexenta News
                                          Nexenta Liberates Storage to Deliver a Better ROI
                                          12-Page Whitepaper
                                          Nexenta was pleased to have worked together with Citrix in testing NexentaStor as part of the VDI Capacity Program. The results were a validation that NexentaStor provides a superior storage backend for VDI with a cost per seat of less than $15 as it liberates enterprises from costly storage hardware systems that have abrogated many best efforts to deploy VDI environments. And using a software-defined storage solution which liberates storage management from the underlying hardware doesn't mean giving up features as NexentaStor is a fully featured NAS/SAN software platform with capabilities that meet and even exceed the capabilities of legacy storage systems.
                                          The real cost of VDI storage
                                          By Gunnar Berger, Research Director, Gartner
                                          Gunnar writes, "Anyone that has seen me present in the past two years has listened to me rant about the high cost of desktop virtualization and I did not hesitate to put the blame directly where it belonged: storage vendors. We've seen some crazy numbers at Gartner, upwards of $1000 per desktop for storage alone! Every time I hear that number I think of Seth and Amy on SNL doing the #Really skit.

                                          $1000 for just the storage on 1 desktop!!!..."

                                          Level3 News
                                          tw telecom Expands Network
                                          In Louisville and Southern Indiana

                                          tw telecom inc., a leading provider of Business Ethernet and networking solutions, announced it is expanding its existing market reach in Louisville as well as Indiana. The expansion adds new fiber to extend the company's network footprint from the city's central business district and into the cities of Jeffersonville, Clarksville, and New Albany, IN.

                                          The company will leverage this market expansion to further deploy its industry-leading portfolio of data and Internet services to more enterprises, including its innovative Business Ethernet and Intelligent Network capabilities.

                                          Trending in
                                          Vol 234, Issue 3
                                          Trending IT Articles