News about Oracle's Solaris and Sun Hardware
System News
Apr 28th, 2014 — May 4th, 2014 Generate the Custom HTML Email for this Issue
System News System News for Sun Users
Volume 194, Issue 5 << Previous Issue | Next Issue >>
Sections in this issue:
click to jump to section


IT - CxO
x
Bye-Bye, Traditional IT Buyer
Network Computing, April 28th, 2014
"For decades, the standard model for IT procurement has typically involved an IT manager being aware of an IT need and then quantifying it. This happens with more or less involvement from organizations' buying and legal departments (which is either more or less welcome!). The IT manager will then hold some type of beauty contest among the usual-suspect vendors (directly or virtually via a partner). Then a winner is selected, usually based on criteria the buying IT manager determined before going into the decision-making fray..."
    How to Become a Better Leader
    CIO, April 30th, 2014
    "In the world of tech and non-tech managerial roles, if you want a seat at the big table or you have aspirations of greatness, then certain leadership skills are necessary to take you to the next level. But how can you actualize leadership and define what makes a great leader? We spoke with authors, industry and IT career experts to find out what you can do to build your leadership skills to world-class..."
      If I Had Me for a Boss, Would I Like Coming to Work?
      TLNT, April 28th, 2014
      "If I had me for a boss, would I like coming to work?"

      "Face it, the people who work for you have other options. (If they don't, you not only have the wrong people on your bus, you've got a lousy bus.)

      Offering a competitive wage and benefit package may be enough to attract talent to your team, but it's not going to keep them from moving on to another suitor that's offering the same or better. And if your people don't like coming to work, another suitor doesn't even have to match what you're offering..."

        IT Control is an Illusion
        Information Week, April 23rd, 2014
        "With all due respect to GM's Randy Mott, doing most IT work in-house and outside the cloud isn't a winning strategy.

        The InformationWeek Conference a few weeks ago featured two speakers with polar opposite views on IT management. General Motors CIO Randy Mott argued for more IT span of control. Former Netflix cloud architect Adrian Cockcroft argued for less. They both made compelling cases, but I think Cockcroft's view eventually will prevail..."

        It's Not Just About the Money
        Federal Computer Week, April 29th, 2014
        "Salary is only one obstacle to attracting technology experts to the federal workforce. Integrating IT employees into broader agency cultures and being willing to adopt innovations might be just as important, according to panelists at a New America Foundation event on the technology deficit faced by government.

        Dan Tangherlini, administrator of the General Services Administration, said bringing IT employees out of the data center dungeons is essential to attracting others to work in government technology..."

          Lessons in Marketing IT's Value
          CIO, April 28th, 2014
          Three IT executives share how they were able to boost their department's credibility by educating their peers about the business benefits they deliver.

          Integrate Marketing Into Your Day Job

          Gene P. Berry, VP & CIO, OneAmerica Financial Partners: As technologists, we tend not to be very adept at marketing--it doesn't come naturally, and we often let it fall by the wayside because IT has other things to do. But it is very important; IT provides a lot of value that's not always showcased appropriately.

          The Chief Data Officer as Mr. Spock
          ComputerWorld, April 29th, 2014
          "Logic clearly dictates that the needs of the many outweigh the needs of the few." -- Mr. Spock, Star Trek II: The Wrath of Khan, 1982

          "The CEO of an enterprise is a lot like that most famous of Enterprise leaders, Capt. Kirk, commander of the starship Enterprise. Reporting to the CEO are other C-level executives in command of functional areas such as finance, sales and marketing, much as Chief Medical Officer Leonard McCoy and Chief Engineer Scott Montgomery reported to Kirk.

          So if an enterprise's top finance guy is like Bones ('Look, I'm a CFO, not a doctor!') and the sales honcho is like Scotty ('Captain, if I push the sales team any harder, it's gonna blow.'), what can we make of that new resident of the C-suite, the chief data officer (CDO)? How can CDOs achieve success in working with their established peers? They are the science officer. They are Mr. Spock..."

          The Technology World's Sexism Needs to End
          ComputerWorld, April 30th, 2014
          "The technology industry is sexist, and it will take years before endemic discrimination dissolves.

          In fact, it might take decades. A Deloitte report cites Catalyst CEO Ilene H. Lang, who suggests that, when it comes to the imbalance on corporate boards, "it could take until 2075 for women to reach parity with men" if progress continues at its current pace.

          Think about what that means. A 21-year-old woman graduating from college this month wouldn't see women occupying equal space on corporate boards until she is 82..."

          Why CIOs shouldn't Block Rogue Cloud Apps
          CIO, April 30th, 2014
          "Employees at a pharmaceutical company went rogue using a cloud service provider to crunch clinical trials data, only for the CISO to discover later that the company was out of compliance because HIPAA data was potentially finding its way into some of the loads -- and so he blocked HIPAA data from uploading.

          "I'm sure they're not the only ones," says Jaime Barnett, vice president of marketing at Netskope, a cloud apps analytics company, who related the incident.

          Business users at another company signed on with a cloud service provider without IT's knowledge and made the mistake of assigning one of their own as the sole admin -- a single point of failure..."

          Why Companies Should Hire Slow and Fire Fast
          Human Capitalist, April 17th, 2014
          "In most cases, we actually hire fast and fire slow - the opposite of what we should do.

          Let me share a real example: a client's business was expanding and they needed to fill a critical operations role. In their minds, they needed the role filled yesterday. Because they had built accurate performance qualification summaries (they had taken the time to define the behaviors, skills and experience needed to be successful in the role), they were able to place a job posting right away. This was well done..."

          Oracle
          x
          Oracle #1 in DBMS for 2013
          Per Gartner
          Gartner has published their market share numbers for 2013 based on total software revenues. According to Gartner, Oracle:

          • Remains #1 in worldwide DBMS subsegment software revenue share
          • Leads next closest competitor revenue share by 28%

          Source: Gartner, Market Share: All Software Markets, Worldwide, 2013, Colleen Graham, Yanna Dharmasthira, Chad Eschinger, et al., March 28, 2014

          SPARC
          x
          SPARC and Solaris Leadership in the Cloud
          Oracle's SPARC systems and Solaris OS are co-engineered to provide efficient virtualization technology
          SPARC virtualization is 'Built into Firmware' which reduces costs and improves performance.

          Oracle has proved its virtualization performance advantages through rigorous public testing. SPEC1, the performance standards group, defined the SPECvirt_sc2010 benchmark to uniformly measure the end-to-end performance of all system components that make up a virtualized environment. The SPECvirt_sc2012 benchmark is a good indicator of virtualization performance, which is critical for any cloud environment.

          IT - Storage
          x
          Seagate Plans to Put Out 8TB and 10TB MONSTERS
          The Register, April 30th, 2014
          "We got all excited about Seagate's latest 6TB drive but, really, we haven't seen anything yet. It has been revealed that the spinning rust company is anticipating 8TB and 10TB drives later this year.

          This info came out in the company's third quarter results earnings call, where chairman, president and CEO Steve Luczo was talking about price erosion with nearline storage, high-capacity 3.5-inch drives:..."

          SanDisk announces 4TB SSD, hopes for 8TB next year
          ComputerWorld, May 1st, 2014
          "SanDisk this week announced the industry's first 4TB enterprise-class SAS solid-state drive (SSD) in its Optimus MAX product based on 19-nanometer process technology.

          The company also unveiled three new Lightning II 12 Gbps performance SAS SSDs with capacities of up to 1.6TB.

          In all, SanDisk announced four new data center-class SSDs. As the drives are enterprise-class, which are typically sold through third parties, SanDisk did not announce pricing with the new drives..."

          Enterprise SSHD and Flash SSD Part of an Enterprise Tiered Storage Strategy
          StorageIOblog, April 24th, 2014
          "The question to ask yourself is not if flash Solid State Device (SSD) technologies are in your future.

          Instead the questions are when, where, using what, how to configure and related themes. SSD including traditional DRAM and NAND flash-based technologies are like real estate where location matters; however, there are different types of properties to meet various needs. This means leveraging different types of NAND flash SSD technologies in different locations in a complementary and cooperative aka hybrid way..."

          Java Technology
          x
          Java Micro Edition (ME) 8
          By Tori Wieldt
          Tori Wieldt writes, "Oracle announces the General Availability of Oracle Java Micro Edition 8. This release is the culmination of a two-year effort driving a major update of the Java ME technology as a modern embedded software platform, built as a foundation for new services in the Internet Of Things.

          Java ME provides a robust, flexible environment for applications running on embedded and mobile: microcontrollers, sensors, gateways, mobile phones, personal digital assistants (PDAs), TV set-top boxes, printers and more. It includes robust security, built-in network protocols, and support for networked and offline applications..."

          Java ME 8: Getting Started with Samples and Demo Code
          By Terrence Barr
          "Now that Java ME 8 is released a lot of people trying it out and are asking for sample code and demos. We've got you covered:

          1) The first place you should go is the 'Java ME SDK 8 Developer Guide'. This is your one-stop-shop for getting started with Java ME 8 development on your PC (no external hardware required). Chapter 2 is 'Creating a Java ME SDK 8 Sample Project', and part IV is all about 'Sample Applications'.

          2) Next, you will want to browse the 'Java ME Embedded Developer Guide', which covers important topics for developing Java ME 8 embedded applications. Chapter 5 talks about 'General Purpose I/O', chapter 6 about 'Working with the I2C Bus', and chapter 7 about 'The Serial Peripheral Interface (SPI) Bus

          ..."

          IT - Technology
          x
          50 Years after BASIC, Most Users Still Can't or Won't Program Anything
          ZDNet, April 30th, 2014
          "People who got their first taste of IT during the microcomputer boom in the 1970s and 1980s almost certainly started by writing programs in Basic - or, at least, they debugged programs typed in from popular magazines. If you needed to do a complex calculation, and weren't lucky enough to own a copy of Software Arts' pioneering VisiCalc spreadsheet, then you could do it in a few lines of code. You couldn't download an app - most people didn't even have modems - and the web hadn't been invented, so you couldn't use Google or Wolfram Alpha..."
          3D Printing Moves from Prototypes To Production
          ComputerWorld, April 26th, 2014
          "The 3D printing market is expected to quadruple over the next decade to $12 billion, moving from its main use today of creating prototypes to the most complex of production parts, according to Lux Research.

          3D printing, which has been around for 30 years, has mainly been used to create product prototypes. That's because product designs are easily manipulated in computer-aided design (CAD) software before being sent off to a printer..."

          IT Shops Losing Control over Technology
          ComputerWorld, April 29th, 2014
          "A global survey of more than 1,000 C-level executives shows that IT organizations are losing control over new technology adoption at their companies but are still held accountable for integrating the technologies securely into their company's infrastructure.

          Increasingly, spending and control of technology budgets are moving out of traditional IT organizations, the survey commissioned by technology consulting firm Avanade found.

          Non-IT departments control more than 37% of enterprise technology spending, and that number is likely to grow over the next few years. Some 71% of C-level executives believe they can make technology decisions more quickly and effectively than IT organizations, the survey found..."

          Relics of Technology
          Network World, April 28th, 2014
          "The seeds for the Relics of Technology project started when I found a brick cell phone at a thrift store in rural Oregon. Since finding it, similar bits and pieces of old technology and media kept grabbing my attention. The fascination was equal parts nostalgia for the forms, and curiosity as to what had become of them. One thing led to another and I was on the hunt for groups of media and key pieces of technology, most of which have now been downsized to fit in the palm of our hand. These photos are reminders that progress has a price and our efforts have an expiration date."
            Researchers Try New 'Twist' on Smartwatches
            InfoWorld, April 30th, 2014
            "If smartwatch development can be thought of in terms of dance crazes, the next phase might become the Twist.

            Researchers at Carnegie Mellon University have developed a prototype smartwatch that expands user interface possibilities with a tactile face that can be rotated.

            Instead of just scrolling through a touchscreen, talking or pushing buttons, users can manipulate the face of the prototype to interact with the display in more ways.

            Exhibited at the ongoing ACM CHI Conference on Human Factors in Computing Systems in Toronto, the prototype is being billed as a way to overcome the small form factor and input limitations on standard smartwatches, unlocking their powerful computer potential.

            Users can twist, pan in two dimensions, tilt or click the prototype's face, as well as using the conventional scrolling or button functions..."

              When BASIC was Young: Great Memories
              Information Week, April 30th, 2014
              "The programming language BASIC will be 50 years old in May. Though much has changed it's still alive and well in the form of Microsoft Visual Basic, presently the sixth most popular programming language, according to the TIOBE index for April 2014.

              Although there are many modern programming languages better suited to today's technology -- Python and Lua are personal favorites -- BASIC still matters to many who write code. And it matters as an example of openness..."

              Solaris
              x
              Oracle Introduces Oracle Solaris 11.2
              Engineered for Cloud
              Oracle introduced Oracle Solaris 11.2, a modern cloud platform that melds efficient virtualization, application-driven software-defined networking (SDN) technology and a full OpenStack distribution.

              This powerful combination of an enterprise-class operating system and other components creates a highly efficient, compliant, secure, open and affordable software platform for cloud computing.

              With deep integration among Oracle Database, Java and Oracle Applications, businesses can use Oracle Solaris 11.2 to deliver the most reliable, high-performance, efficient and secure IT services and accelerate time-to-market for new deployments. Oracle Solaris is an important component of Oracle's Systems business.

              Oracle Solaris 11.2 is a complete, integrated and open platform engineered for large-scale enterprise cloud environments. It combines OpenStack, SDN technology, clustering, and virtualization with a proven enterprise-class OS, all in a single product.

              Introducing SMF Stencils
              By Sean Wilcox

              Sean writes, "As much as we'd like to believe that every application that runs on Oracle Solaris 11.2 uses SMF directly to maintain configuration, the reality is that it's a difficult or downright impossible goal for many types of software. Be it a 3rd party service, some piece of FOSS, or software for which the maintainers are long forgotten; some services simply must continue to use files to store their configuration. Does this mean managing Oracle Solaris machines eternally dooms you to multiple configuration management tools? It did, until now.

              Enter SMF Stencils..."

              MySQL
              x
              MySQL Enterprise Monitor 3.0.10
              maintenance release that includes a few new features and fixes a number of bug
              Andy Bang writes that, "We are pleased to announce that MySQL Enterprise Monitor 3.0.10 is now available for download on the My Oracle Support (MOS) web site. It will also be available via the Oracle Software Delivery Cloud in about 1 week. This is a maintenance release that includes a few new features and fixes a number of bugs. You can find more information on the contents of this release in the change log..."
              DBA and Developer Guide to MySQL
              By Diana Gray, Principal Curriculum Product Manager, Oracle University
              MySQL is the most trusted and depended-on open source database platform in use today. 9 out of the 10 most popular and highly-trafficked websites in the world rely on MySQL, primarily due to its ubiquity across heterogeneous platform and application stacks.

              MySQL is well-known for its performance, reliability and ease of use. MySQL 5.6 builds on the momentum by delivering across the board improvements that enable innovative DBA and developers to create and deploy the next generation of web, embedded and Cloud/SaaS/DaaS applications on the latest generation of development frameworks and hardware platforms...

              Cloud Computing
              x
              Oracle Simplifies Migration to Cloud Applications
              New 'Customer 2 Cloud' Program Helps Organizations Quickly and Easily Convert On-Premise Applications to Oracle Cloud

              Over 29 million people around the world already use Oracle Cloud applications for access to the latest innovations with increased flexibility and lower costs. To help even more customers adopt its cloud applications, Oracle today is announcing the Oracle Customer 2 Cloud program.

              The program addresses common financial and technical challenges organizations face in transitioning from on-premise software environments to the newer software-as-a-service model. Oracle Customer 2 Cloud offers flexible financial models, rapid startup services and packaged cloud integrations to help remove barriers to taking advantage of modern innovations with Oracle HCM Cloud and Oracle CX Cloud. The Customer 2 Cloud program allows Oracle HCM and CRM customers to convert existing on-premise support spend to Oracle Cloud Applications...

              Oracle President Mark Hurd Announces Strategy for Oracle Marketing Cloud
              Simple-to-Use, Enterprise-Ready Cloud Platform Lets Organizations Become Modern Marketers
              "Marketers are trying to engage with customers in a more personalized way to inform, educate, and build lasting and profitable relationships. However, they still struggle with complex, siloed, and ineffective marketing systems and data. To deliver on the full promise of customer-centricity while simplifying the marketer's job, Oracle outlined its vision for the Oracle Marketing Cloud, a cloud service platform that combines Oracle's acquired BlueKai, Compendium, Eloqua and Responsys marketing technologies with Oracle Social Cloud. The industry's most advanced cloud-based marketing solution, the Oracle Marketing Cloud delivers the enterprise-capabilities marketers need to quickly and easily unify customer data, engage the right audiences, and deliver the high-performing marketing programs..."
              IT - Cloud
              x
              63% of Enterprises Prefer Private Over Public Cloud Storage Solutions
              StorageNewsletter.com, May 2nd, 2014
              "63% of enterprises prefer private cloud storage solutions over public offerings like Dropbox, according to new research announced by CTERA Networks Ltd.

              The research findings are included in CTERA's 2014 Enterprise Cloud Storage Report, a research study of 200 IT professionals conducted in early 2014 by independent panel research firm Research Now.

              The report examines the state of the cloud storage usage in the enterprise, and the measures being taken by IT departments to improve the security of cloud storage offerings in their organizations..."

              Cloud is Just as Secure (Or Insecure) as Traditional On-Premises Systems
              Forbes, April 22nd, 2014
              "First the bad news: attacks against cloud systems are on the rise. Now, the not-quite-as-bad news: cloud incursions are are no worse than attacks taking place against on-premises systems.

              Okay, this isn't exactly the most reassuring news in the world, but it does illustrate the point that cloud applications and data may be no more vulnerable than traditional systems..."

                Datacentre Security Key to Cloud Security, Says Google
                ComputerWeekly, April 30th, 2014
                "The security challenges of the cloud are fundamentally the same as those of any in-house datacentre, says Peter Dickman, engineering manager at Google.

                This means securing data in both can be tackled in the same way, he told attendees of Infosecurity Europe 2014 in London.

                'It is a question of adding as many layers of controls as possible without impairing usability,' said Dickman, which is the approach Google uses to continually evolve and improve security..."

                Key Security Technologies can Help Cloud Adoption
                Help Net Security, April 29th, 2014
                "The majority of companies are delaying deployment of cloud applications due to security and compliance concerns. Among the companies that have started to adopt cloud apps strategically, Bitglass found that Google is outpacing Microsoft in cloud-based email adoption..."
                Physicians Find Security in the Cloud
                Information Week, April 24th, 2014
                "A growing number of healthcare practices are finding that cloud services, once feared by security-conscious providers, are now proving to be a safer option than on-premises alternatives.

                While only 4% of healthcare providers adopted the cloud in 2011, use of the vertical cloud is now growing by 20% annually, according to MarketandMarkets. By 2017, the researchers predict, healthcare organizations will spend $5.4 billion on cloud services..."

                Public Cloud Market Ready for 'Hyergrowth' Period
                ComputerWorld, April 24th, 2014
                "The public cloud market is set for what one analyst firm calls 'hypergrowth.'

                The global public cloud market is expected to hit $191 billion by 2020, according to a report released today by Forrester Research. That's a 20% jump from Forrester's last forecast, which was released in April, 2011, that predicted the market would be $160 billion by 2020.

                It's also a big jump from where the market is today -- Forrester says the market stood at $58 billion at the end of 2013..."

                US Judge Rules Cloud Firms Including Microsoft and Google Must Hand Over Data Stored Overseas
                v3.co.uk, April 28th, 2014
                "A New York judge has ruled that US cloud providers must turn over data they have, regardless of where in the world it is stored, in a decision that could have huge implications for the use of cloud services.

                The judgment from magistrate judge James Francis in New York on Friday came in response to a challenge from Microsoft that it should not have to hand data over regarding an Irish customer, as the information is stored overseas..."

                IT - PM
                x
                7 Ways to Advance Your Project Management Career
                CIO, April 23rd, 2014
                "Everyone wants to get ahead. (Well, almost everyone.) Project managers are no different. Hence the number of certification exams project managers take. But just having PMP (for Project Management Professional) after your name is no longer enough in today's high-tech mobile world.

                So what skills do project managers need to get ahead? Dozens of project management experts, executives and recruiters share their top seven project management career tips..."

                Why Workplace Teams Struggle - And What to do About It
                Information Management, April 30th, 2014
                "Many workplace teams I observe are not much better than the typical nightmarish college class group project that most of us have lived through at one time or another. The goals are vague, roles are poorly defined, leadership is absent or misdirected and there are varying degrees of enthusiasm for participating, ranging from the loner's cry of, 'Get me out of here!' to the naive whine of, 'Why can't we all get along?' Oh, and don't forget that there's always a few simply along for the ride while others practically kill themselves in an effort to prop up the rest of the team.

                Too many of our workplace teams stumble along in search of performance and quality output, while we as managers look on with a mix of horror and disappointment at the slow-motion pile-ups occurring in front of us..."

                IT - Networks
                x
                SDN: Waiting for the Trickle-Down Effect
                Network Computing, April 22nd, 2014
                "Like server virtualization and 10 Gigabit Ethernet, SDN will eventually become a technology that small and midsized enterprises can use. But it's going to require some new packaging.

                The networking industry has been awash with talk of new hyper-scale and cloud-enablement technologies, such as software-defined networking (SDN). But what will move these technologies from niche solutions and cloud-scale networks to small and midsized businesses that are not necessarily focused on technology innovation? When will the small and medium enterprise (SME) market see value from SDN?..."

                Neutral Net May Be a Lost Cause
                Government Technology, April 25th, 2014
                "Consumers could end up the losers in a high-stakes battle among regulators, broadband providers and online entertainment giants over access to the Internet's fastest speeds.

                A new proposal from the head of the Federal Communications Commission would allow network owners such as AT&T Inc. to levy extra charges on Netflix Inc. and other online video purveyors for speedier delivery of content..."

                IT - Operations
                x
                10 Users IT Hates to Support
                Infoworld, April 28th, 2014
                "Deal with enough technology users, and you come to a realization: Beneath all the nuanced, specific complaints, they're all kind of the same.

                OK -- maybe that's a slight exaggeration. But whether you're working at an IT help desk or unofficially appointed as head of your family's tech support department (headcount: one), you quickly realize that certain types of tech users are unavoidable. And some of them are downright insufferable.

                Not convinced? Read on and see if these irksome personalities sound familiar..."

                  33 Tech Pros Share their Favorite IT Products
                  IT World, April 24th, 2014
                  "It takes many tools to keep IT systems running smoothly, and tech pros have their personal favorites. What made the cut? Everything from security products and mobile device management tools to data analytics and cloud services. If your favorite tech product didn't make the list, tell us about it..."
                  Five Software-Defined Data Center (SDDC) Tips to Consider Before Investing
                  SearchSDN, April 28th, 2014
                  "SDN has become central to the bigger vision of the 'software-defined data center' (SDDC), which is built on three key pillars -- programmable, software-defined servers, networks and storage.

                  Server virtualization has created software-defined environments for virtual machines (VMs), and the edge or last hop of the network now lives inside the server stack, providing connections between VMs and outside servers. Meanwhile, new programmable storage solutions can run over converged data center networks and must be correctly configured, provisioned and managed. Overall, the network infrastructure has become more programmable and it is quickly evolving..."

                  The Data Center of 2025 Revealed
                  ComputerWorld, April 29th, 2014
                  "A survey that challenged IT managers to imagine the data center of 2025 offers up some optimistic, even surprising, findings.

                  About 800 IT data center managers globally responded to the Emerson Network Power survey and three of its major findings foretell major changes ahead:

                  First, by 2025, data center managers expect nearly 25% of their power will come from solar energy, which today accounts for about 1% of a data center's energy supply..."

                    Unplugging the Data Center
                    Network World, May 1st, 2014
                    "Nathan McBride joined AMAG Pharmaceuticals in 2008 with an ambitious goal: to rebuild IT using as little internal infrastructure as possible. He succeeded. In the ensuing years McBride, vice president of IT and chief cloud architect, successfully shut down AMAG's data center, moved everything to the cloud, went wireless everywhere, made BYOD standard practice, and did away with desktop phones. The migration slashed in half the $2.8 million 2008 budget he inherited, but, more importantly, made IT faster and more responsive to the needs of the business..."
                    Managed Services Pricing Models: Per-Device vs. SLA-Based Approach
                    SearchITChannel, April 28th, 2014
                    "Pricing strategies is a hot topic among managed service providers (MSPs), and for good reason. But it's not all about the bottom line. The pricing model an MSP adopts can impact much more than revenues and margins. It can also have an effect on the potential for business risk and commoditization in the marketplace. Unfortunately, the strategy offering the most protection is also the most difficult to implement..."
                      IT - Security
                      x
                      4 Strategies to Help CIOs Prepare for Cyberattacks
                      ComputerWorld, April 28th, 2014
                      "Cyberattacks threaten all of us. White House officials confirmed in March 2014 that federal agents told more than 3,000 U.S. companies that their IT deployments had been hacked, according to The Washington Post. Meanwhile, Bloomberg reports that the Securities and Exchange Commission (SEC) is looking into the constant threats of cyberattacks against stock exchanges, brokerages and other Wall Street firms.

                      These attacks are going to happen, no matter what you do. Here, then, are four strategies to help you deal with cyberattacks and the threats they pose..."

                        5 Things You Need to Know About Cybersecurity Insurance
                        CIO, April 25th, 2014
                        "Cybersecurity insurance does mitigate some financial damage should you suffer an attack, but it's not a complete solution. Here are five things CIOs need to know..."

                        • It's a risk-management strategy.
                        • American and European markets differ.
                        • Clear wording is essential.
                        • Coverage is inadequate in some areas.
                        • There's room for improvement.

                        Read on for details.

                        Examining the Heartbleed-Based FUD that's Pitched to the Public
                        CSO Online, April 25th, 2014
                        "The Heartbleed vulnerability has created a massive news cycle, and generated technical risk-based discussions that might actually do some good. But some of these discussions boggle the mind, spreading misinformation in order to generate clicks or sales.

                        When security issues hit the mass media, such as Heartbleed, there is a good deal of Fear, Uncertainty, and Doubt - better known as FUD - that gets promoted on the airwaves and in print..."

                        Four of the Newest (and Lowest) Social Engineering Scams
                        CSO Online, April 21st, 2014
                        "Your computer files are being held for ransom. Pay up, or lose them. Your bank account is being emptied, so click here to stop it. Your friend has died, click on this funeral home site for more information. Social engineering thugs have reached new lows.

                        Social engineers, those criminals who take advantage of human behavior to gain access to data or infiltrate businesses, were once content to trick people with free offers or funny videos before unleashing their scams. Today, social engineering gangs have taken a darker turn toward strong-arm tactics, threats, emotional cruelty and dire ultimatums..."

                          How to Learn Information Security
                          Help Net Security, April 29th, 2014
                          "Learning is a skill. A skill that can be, well, learned. I am often approached by young people who ask me what does it take to move into the information security field, what certifications are required, what training should be done, and so forth. In my opinion, the most important skill in infosec, and many other areas too, is the ability to learn.

                          Twenty years ago, security was a very different, and much narrower field than it is today..."

                          Infosec 2014: Act Now, but No New EU Data Protection Law before 2017, Says ICO
                          ComputerWeekly, May 1st, 2014
                          "Expect new European Union (EU) data protection law to be enacted in 2017 at the earliest, said David Smith, deputy commissioner at the Information Commissioner's Office.

                          'But, get your house in order now under the current law, to ensure you are ready for the coming changes, because the principles are not very different,' Smith told attendees of Infosecurity Europe 2014 in London..."

                            Looking beyond Heartbleed
                            ComputerWorld, April 25th, 2014
                            "I have a good idea what you spent the last week and a half doing: putting out Heartbleed fires. But don't stop now! Keep that momentum going for just a bit longer. Let me explain why.

                            The simple explanation is that Heartbleed was a nasty one. The vulnerability was in OpenSSL, a system library that nearly every piece of networked software relied on. Not only that, but it was used on nearly every network server we might connect to. And not only that, but it had a remote exploit that could render real business-sensitive data to attackers..."

                            Six Infosec Tips I Learned from Game of Thrones
                            Help Net Security, April 28th, 2014
                            "In Westeros - the land of dark knights, backstabbing royals, dragons, wildings, wargs, red witches, and White Walkers - even the youngest ones have to learn basic self-defense if they're to have any hope of surviving the cruel fictional world imagined by A Game of Thrones (GOT) author, George R. R. Martin. And so too, must every CISO and security pro learn the latest information security best practices if they're to survive today's Internet threat landscape.

                            If you're a GOT fan, you're probably excited about the recent launch of season four. Accordingly, the second article of my pop-culture/cyber-security series explores the information security tips you might extract from the morbidly dark, yet inescapably intriguing fantasy series. Here are six security tips I learned from Game of Thrones:..."

                            What Happens When the 'Internet of Things' Comes to ATM Skimmers
                            Bloomberg, April 22nd, 2014
                            "When Cisco Systems CEO John Chambers extols the virtues of the so-called Internet of Things, this clearly isn't what he has in mind.

                            Criminals engaged in skimming -- stealing people's payment card information by tampering with ATM PIN pads and gas station credit-card readers -- are now exploiting wireless technology to pull off their schemes more easily, according to a report from Verizon that examined data breaches from 95 countries..."

                            What Not To Do In a Cyberattack
                            Dark Reading, April 29th, 2014
                            "Detecting an attack can be difficult enough, but the chances of a quick cleanup and lockdown in the aftermath of an incident dramatically diminish if there's no official incident response plan and no incident response (IR) point person or team in place.

                            'The last thing you want are admins or other people logging in and trying to triage it themselves. Then they start ruining all the data and evidence,' says a security and incident response team member at a large US manufacturer.

                            Sponsor video, mouseover for sound You need a designated incident response team..."

                            IT - Careers
                            x
                            The 9 Most Difficult-To-Fill IT Roles
                            CIO, April 28th, 2014
                            "If you look at data from across the Web, most companies are looking for IT pros with specific experience -- the more the better, but with everyone chasing the same talent, some areas of IT are downright difficult to fill.

                            Recently, TEKsystems conducted a survey of 244 CIOs, CTOs and other senior IT professionals. These IT decision-makers spanned industries that include technology, financial services, healthcare, manufacturing, government and professional services representing business large and small.

                            Respondents marked big data, security, mobility and cloud computing as the trends having the largest impacts on their organization. The technology/roles outlined here, according to the survey, are the toughest areas in which to find tech talent..."

                            History's 15 most Popular Computer Scientists
                            Network World, April 28th, 2014
                            "Researcher's at MIT's Media Lab have launched a new project called Pantheon, in which they attempt to quantify the cultural impact of people throughout time. Using data from Wikipedia, they've developed a Historical Popularity Index (HPI) to rank more than 11,000 famous names from the past and present. HPI is based on a number of things, including the number of languages in which one's Wikipedia bio exists and the number and distribution of page views to those bio pages. While famous techies still generally score much lower HPIs than actors, athletes and artists, 34 computer scientists did make the list. Here are the 15 most well-known computer scientists in history, based on their HPI scores..."
                              IT - Social Media
                              x
                              6 Social Media Mistakes that Will Kill Your Career
                              CIO, April 15th, 2014
                              "You might not recognize the name Kelly Blazek, but her story is one that's probably familiar.

                              Blazek, the founder of the Cleveland Job Bank for marketing communications professionals, sent a scathing reply to recent graduate and job-seeker Diana Mekota, who contacted Blazek via LinkedIn to ask for advice on searching for a job and to connect via the professional networking site..."

                                Judge Finds Social Media Disclaimers for Employees are Unlawful
                                TLNT, April 24th, 2014
                                How many of you have social media policies, which contain a provision that reads something like this:

                                "If you identify yourself as an associate of the Company and publish any work-related information online, you must use this disclaimer: 'The postings on this site are my own and don't necessarily represent the positions, strategies or opinions of the Company.'"

                                "Yeah, I write these disclaimers all the time for clients. Apparently, they're unlawful..."

                                  Why the Social Networks are Falling Apart
                                  ComputerWorld, April 26th, 2014
                                  "Once upon a time, there was a hoodie-wearing college dropout who moved to Silicon Valley to grow a social network.

                                  At first, Mark Zuckerberg and his staff didn't know what their business model would be, but they had a strong suspicion that gathering hundreds of millions of eyeballs on a single site might be worth something someday.

                                  Eventually and inevitably, Facebook introduced advertising to its site. The strategy was clear: Get everybody to gather at a single location (Facebook.com), harvest social signals at that location, and sell ads that would be displayed at that location. Everyone and everything in one place..."

                                  IT - Email
                                  x
                                  4 No-Bull Facts You Need to Know About the FCC's Net Neutrality Proposal
                                  InfoWorld, April 25th, 2014
                                  Cybersecurity insurance does mitigate some financial damage should you suffer an attack, but it's not a complete solution. Here are five things CIOs need to know.

                                  • It's a risk-management strategy.
                                  • American and European markets differ.
                                  • Clear wording is essential.
                                  • Coverage is inadequate in some areas.
                                  • There's room for improvement.

                                  Read on for details.

                                  Storage
                                  x
                                  Oracle Spotlights ZFS Storage Appliance Adoption for Oracle Engineered Systems Backup
                                  Unveils ZS3 Series for Backup
                                  Customers across a broad range of geographies and industries are adopting Oracle ZFS Storage Appliances for Oracle Engineered Systems backup and recovery. With the new ZS3 Series for backup, Oracle ZFS Storage ZS3-BA, customers have a pre-configured, pre-racked solution co-engineered with Oracle Database to provide extreme backup and restore performance with superior efficiency to help meet SLAs. In addition to high performance, ZS3-BA offers 5x lower three-year TCO over EMC Data Domain 990 for Oracle Engineered Systems data protection.
                                  IT - Database
                                  x
                                  The Network is the Database -- And that Complicates Data Integration
                                  SearchBusinessAnalytics, April 28th, 2014
                                  "Thirty years ago, John Cage of Sun Microsystems coined the phrase 'The network is the computer.' He was right then, and he's even more right today. Nowadays, application processing is highly distributed over countless machines connected by a network. The boundaries between computers have completely blurred. We run applications that seamlessly invoke application logic on other machines.

                                  But it's not only application processing that is scattered across many computers; the same can be said for data..."

                                    IT - Mobile
                                    x
                                    CIOs Face BYOD Hard Reality: Employees don't Care
                                    CIO, April 25th, 2014
                                    "CIOs fret about corporate data security on "Bring Your Own Devices," or BYOD, but do employees care? A good number of them -- 15 percent -- believe they have no to minimal responsibility to protect data stored on their personal devices, according to a recent survey from Centrify, an identity management software provider.

                                    "It is clear organizations need to continue to educate employees on the dangers and risks of mobile security but also look to solutions that safeguard the devices and applications which these employees have access to," says Michael Osterman, principal analyst with Osterman Research..."

                                    Wearable Technology Privacy and Security Issues
                                    Help Net Security, April 28th, 2014
                                    "In this interview, Dominic Storey, EMEA Technical Director at Cisco, talks about the security attacks wearable devices are susceptible to at the moment, how security should be implemented for such devices, and much more.

                                    Where are we going with wearable technology and what security and privacy issues can we expect along the way?

                                    Wearable technology is a trend that is really set to take off in 2014, particularly after the launch of Google Glass, a wearable computer with an optical head-mounted display..."

                                    Why Japanese Watchmakers Have No Time for Smartwatches
                                    IT World, April 25th, 2014
                                    "If the Rufus Cuff smartwatch is anything to go by, some people want a lot of hardware on their wrists.

                                    The crowdfunded watch is truly massive: 8 centimeters wide, with a 3-inch touchscreen, Wi-Fi, GPS and other features that make it seem like a smartphone strapped to your arm. The US$279 behemoth might look unwieldy to some, but backers love it. They've pledged over $230,000 to Rufus Cuff's Indiegogo fundraising campaign, more than meeting its goal of $200,000..."

                                    IT - Big Data
                                    x
                                    Big Data is the Killer App for the Public Cloud
                                    InfoWorld, April 28th, 2014
                                    "Big data analytics are driving rapid growth of public cloud computing. Why? It solves real problems, delivers real value, and is pretty easy to implement on public clouds.

                                    Don't take my word for it. Revenues for the top 50 public cloud providers shot up 47 percent in the fourth quarter of 2013, to $6.2 billion, according to Technology Business Research..."

                                    Career Alert: A Master of Analytics Degree is the Ticket -- If You Can Get Into Class
                                    ComputerWorld, April 24th, 2014
                                    The toughest part about earning a Master of Science in Analytics at North Carolina State University (NCSU) may be deciding which job to accept.

                                    The 75 students in the class of 2014, which is nearing graduation, received, in total, 246 job offers from 55 employers.

                                    Added together, the starting salaries and bonuses offered to grads of the university's Institute of Advanced Analytics reached $22.5 million, which is 24% higher than last year's combined offers. (This is an analytics program, after all; they keep track of these things.)

                                    Google's Real Plan Behind the Purchase of the Nest Thermostat
                                    IT World, April 25th, 2014
                                    "Google purchased Nest back in January this year for $3.2B and people everywhere are still wondering why. The Nest is a handsome device to be sure, but at around $250 a pop, it's not exactly a household name. To recover its purchase price, Google would have to sell a lot of Nests...except they won't have to.

                                    The number of Nests sold is already in the millions. Many people I know have one, and I have one as well. In fact they've recently been adapted and are for sale in the UK as well as directly through the Google Play Store. But it's not like I'm going to go and buy another one anytime soon, which seems like it would be a problem for Google. Before Nest was acquired by Google, it had already solved this conundrum however. A seldom reported business model the Nest has been slowly building is around annual subscriptions to energy providers rather than consumers..."

                                    Hadoop Jobs: How One Exec Vets Talent
                                    Information Week, April 29th, 2014
                                    "Ask Think Big Analytics CEO Ron Bodkin what he looks for when vetting job candidates, and you might notice his first few answers appear to have little to do with Hadoop and other big data technologies. Rather, they focus on people.

                                    "It's more art than science," Bodkin said of evaluating big data talent. In an interview, we asked Bodkin, among other things, what he looks and listens for when evaluating candidates for big data-related roles. Here's what he had to say..."

                                    Top10
                                    x
                                    Top Ten Articles for last few Issues
                                    Vol 194 Issues 1, 2, 3 and 4; Vol 193 Issues 1, 2, 3 and 4
                                    We track how frequently each article is viewed on the web site to determine which the readers consider the most important. For last week, the top 10 articles were:

                                    • Is IBM POWER8 a Smart(er) Choice?
                                    • What to Expect from The Top Oracle Solaris 11 Training Courses
                                    • Configure failover LDom (Oracle VM Server for SPARC) on Solaris Cluster 4.1
                                    • High Availability Best Practices for Database Consolidation
                                    • Big Data Appliance 3.0 and Big Data Connectors 3.0
                                    • Java Developer Day
                                    • Oracle Traffic Director - Part 1: Introduction
                                    • Java EE 7 with GlassFish 4 Application Server
                                    • April '14 Oracle Virtualization Newsletter
                                    • vBeers South Florida

                                    The longer version of this article has list of top ten articles for the last 8 weeks.

                                      IT - Encryption
                                      x
                                      Encryption In the Cloud Is Scarcer Than You Think
                                      InfoWorld, April 30th, 2014
                                      "The Ponemon Institute, working in conjunction with encryption solutions provider Thales e-Security, has produced its third annual report on global trends in cloud encryption. From what they found, about half the organizations out there are moving confidential data to the cloud, and confidence in cloud solutions as being securable is increasing. However the question of who protects the data, and whether it's protected at all, is still up in the air..."
                                      NIST Drops Crypto Algorithm
                                      GCN, April 24th, 2014
                                      "The National Institute of Standards and Technology has removed a cryptographic algorithm from a draft list of recommended random number generators used to develop secure keys for data encryption.

                                      The decision to remove the algorithm from its approved list followed reports from commenters that the keys developed through use of the algorithm might be vulnerable to hackers..."

                                      LibreOffice
                                      x
                                      LibreOffice 4.1.6
                                      From The Document Foundation
                                      "LibreOffice 4.1.6 is the last release of the LibreOffice 4.1 family, targeted to large deployments in enterprises and public administrations, which should always be supported by TDF certified developers", says Florian Effenberger, TDF Executive Director. "Today, we users can choose between LibreOffice 4.2.3 Fresh, targeted to early adopters and technology enthusiasts, and LibreOffice 4.1.6 Stable targeted to enterprise deployments and conservative users."
                                      Apache OpenOffice 4.1
                                      Improvements to graphics, charts, forms, text annotations and accessibility features
                                      The Apache OpenOffice project, a Top Level Project (TLP) of the Apache Software Foundation (ASF), announced today the release of Apache OpenOffice 4.1, now available for free download from http://www.openoffice.org. A highlight of this release is support for the IAccessible2 interface, an open standard for communicating with assistive technologies, enabling more effective use of OpenOffice by persons with visual impairments. Other additions to OpenOffice 4.1 include in-place editing of text fields, interactive crop on transformed graphics, text selection annotations, support for 64-bit Mac and translations for six new languages.
                                      Oracle Simplifies Migration to Cloud Applications
                                      New 'Customer 2 Cloud' Program Helps Organizations Quickly and Easily Convert On-Premise Applications to Oracle Cloud

                                      "Over 29 million people around the world already use Oracle Cloud applications for access to the latest innovations with increased flexibility and lower costs. To help even more customers adopt its cloud applications, Oracle today is announcing the Oracle Customer 2 Cloud program.

                                      The program addresses common financial and technical challenges organizations face in transitioning from on-premise software environments to the newer software-as-a-service model. Oracle Customer 2 Cloud offers flexible financial models, rapid startup services and packaged cloud integrations to help remove barriers to taking advantage of modern innovations with Oracle HCM Cloud and Oracle CX Cloud. The Customer 2 Cloud program allows Oracle HCM and CRM customers to convert existing on-premise support spend to Oracle Cloud Applications..."

                                      Developer
                                      x
                                      Oracle Virtual Developer Day: Java 2014 - May 14th, 2014
                                      Hear from experts in Java SE 8 , Java EE 7 and Java Embedded
                                      Oracle recently launched Java 8 to the world (March 25, 2014), announcing the revolutionary release of the world's #1 development platform. It is the single largest upgrade ever to the programming model, with coordinated core code evolution of the virtual machine (JVM), core java language, and libraries. Java 8 introduces significant productivity and performance enhancements, ease of use, improved polyglot programming, security and improved performance. Java is the platform of choice for the Internet of Things, cloud, mobile, and social application development, with Java 8 providing the path for platform standardization.

                                      With Java 8, developers are uniquely positioned to extend innovation through the largest, open, standards-based, community-driven platform -- spanning from small devices to cloud-based development. For all you developers out there, a new Java Virtual Developer day is now scheduled and you are more than welcome to join for free.

                                      The Java Virtual Developer Day in EMEA is scheduled for May 14th and you may register.

                                      Networking
                                      x
                                      Solaris 11.2 Networking Overview: Application-Driven SDN and Beyond
                                      Blog by Nicolas Droux
                                      Nicolas writes, "we are excited to announce Solaris 11.2 (Solaris 11.2 Beta available here). This release introduces significant improvements to the Solaris networking stack, substantially expanding its built-in network virtualization and SLA features to provide a distributed virtual network infrastructure for your private cloud, and enabling application-driven SLAs. Together, these features are the foundation of the built-in Application-driven Software-Defined Networking (SDN) capabilities of Solaris 11.2.

                                      As the Chief Architect for Solaris Core Networking, I am pleased to introduce this significant set of exciting new features and their benefits..."

                                      Security
                                      x
                                      Solaris Verified Boot Introduction
                                      By Dan Anderson
                                      Dan writes, "Verified Boot here refers to verification of object modules before execution using digial signatures. If enabled, Solaris Verified Boot checks the factory-signed signature in a kernel module before loading and executing the module. This is to detect accidental or malicious modification of a module. The action taken is configurable and, when enabled, will either print a warning message and continue loading and executing the module or will fail and not load and execute the module..."
                                      Oracle Solaris 11.2 Authenticated Rights Profiles
                                      By Glenn Faden

                                      Glenn writes, "Roles are implemented in Oracle Solaris as shared accounts, which require authentication prior to use. When an authorized user successfully assumes a role, the actions of the role are attributed to the user in the audit trail, but the user's authorizations, rights profiles, and home directory are replaced by those of the role. Alternatively, administrative rights profiles can be assigned directly to users, so that they don't need to assume roles. Such users can enable profile-based execution by starting a profile shell, e.g pfbash, which sets the process flag PRIV_PFEXEC. While this is more convenient, it presents the risk that users may not realize they are using their rights, or that someone else could abuse those rights if they leave their terminal unlocked..."

                                      Nexenta News
                                      x
                                      Software Defined Data Centers for Dummies
                                      Download Your Own Copy
                                      "Software Defined Data Centers For Dummies, Nexenta Special Edition", shows you how recent advances in Software Defined Storage (SDS) and software defined networking (SDN) can work for you as you attempt to unify your systems into a consistent and well-formed architecture.

                                      In this book, you discover how to deploy solutions that support desktops, Big Data, web hosting, search engines, and massive amounts of storage as a cohesive system that serves your organization well.

                                      Download

                                      Level3 News
                                      x
                                      tw telecom CIO and CTO Harold Teets Honored
                                      by the Denver Business Journal
                                      tw telecom CIO and CTO Harold Teets Named Top CIO by Denver Business Journal. Harold has been recognized as a visionary behind the company's ability to position its customers to be successful and empower them to manage their business more effectively

                                      Innovative approach to IT and technology integration has enabled industry first innovation including tw telecom's Intelligent Network

                                      The achievement, part of the publication's C-Suite Awards announced recently in Denver, recognizes this year's top C-level executives as innovators, role models, standard-setters and leaders in the community.

                                      tw telecom Expands Its Fiber Network in Nashville
                                      Expansion reaches more enterprises and connects them to their remote offices, data centers, customer locations and to tw telecom's extensive fiber network across the United States
                                      tw telecom is expanding its existing fiber optic network in Nashville. The expansion adds new fiber to extend the company's network footprint from the city's central business district to the west side of the Nashville International Airport.
                                      Trending in
                                      Vol 232, Issue 3
                                      Trending IT Articles