News about Oracle's Solaris and Sun Hardware
System News
May 5th, 2014 — May 11th, 2014 Generate the Custom HTML Email for this Issue
System News System News for Sun Users
Volume 195, Issue 1 << Previous Issue | Next Issue >>
Sections in this issue:
click to jump to section


Features
x
Beyond Brute Force: Three User-Friendly Strategies for BYOD Security
By Amit Jasuja, Senior Vice President, Java & Identity Management, Oracle
Writing in Forbes, Amit writes, "The phenomenon of 'bring your own device' (BYOD) to work gives employees a kind of comfort Morse never knew, but it makes CIOs and CSOs uneasy, sparking concerns about protecting corporate data and preventing unauthorized access to internal systems. These fears are not unfounded: recent statistics show that cell phone theft has created a $US30 billion black-market economy. In San Francisco alone, 50 percent of all robberies are cell phone thefts. It is not a matter of if but when a personal device with your corporate data will fall into the wrong hands.

So how can CIOs and CSOs help close the gap between employee convenience and mobile security?..."

Beyond Brute Force: Three User-Friendly Strategies for BYOD Security
By Amit Jasuja, Senior Vice President, Java & Identity Management, Oracle
Writing in Forbes, Amit writes, "The phenomenon of 'bring your own device' (BYOD) to work gives employees a kind of comfort Morse never knew, but it makes CIOs and CSOs uneasy, sparking concerns about protecting corporate data and preventing unauthorized access to internal systems. These fears are not unfounded: recent statistics show that cell phone theft has created a $US30 billion black-market economy. In San Francisco alone, 50 percent of all robberies are cell phone thefts. It is not a matter of if but when a personal device with your corporate data will fall into the wrong hands.

So how can CIOs and CSOs help close the gap between employee convenience and mobile security?..."

Beyond Brute Force: Three User-Friendly Strategies for BYOD Security
By Amit Jasuja, Senior Vice President, Java & Identity Management, Oracle
Writing in Forbes, Amit writes, "The phenomenon of 'bring your own device' (BYOD) to work gives employees a kind of comfort Morse never knew, but it makes CIOs and CSOs uneasy, sparking concerns about protecting corporate data and preventing unauthorized access to internal systems. These fears are not unfounded: recent statistics show that cell phone theft has created a $US30 billion black-market economy. In San Francisco alone, 50 percent of all robberies are cell phone thefts. It is not a matter of if but when a personal device with your corporate data will fall into the wrong hands.

So how can CIOs and CSOs help close the gap between employee convenience and mobile security?..."

Virtualization
x
Oracle VM 3
Overview of Disaster Recovery Solutions
Honglin Su writes, "Oracle offers a complete product portfolio that includes servers, storage, applications, middleware and database products that will allow you to piece together a custom disaster recovery (DR) solution for your business systems. Oracle VM 3 is simply one piece of a very complex puzzle that must be integrated along with other disaster recovery software and applications into an overall business continuity solution for your enterprise.

There are several different approaches to integrating Oracle VM into a disaster recovery environment all of which work with SAN or NAS. Greg King, Principle Best Practices Consultant from Oracle VM Product Management wrote the white paper to discuss different high level deployment architectures and strategies. Use this white paper to choose a DR solution that best fits your needs.

Oracle VM 3: Overview of Disaster Recovery Solutions (PDF)

Once you know which direction you want to take using this paper, you will then follow other more technically detailed white papers describing exact steps for the DR solution path you choose..."

Oracle VM 3
Overview of Disaster Recovery Solutions
Honglin Su writes, "Oracle offers a complete product portfolio that includes servers, storage, applications, middleware and database products that will allow you to piece together a custom disaster recovery (DR) solution for your business systems. Oracle VM 3 is simply one piece of a very complex puzzle that must be integrated along with other disaster recovery software and applications into an overall business continuity solution for your enterprise.

There are several different approaches to integrating Oracle VM into a disaster recovery environment all of which work with SAN or NAS. Greg King, Principle Best Practices Consultant from Oracle VM Product Management wrote the white paper to discuss different high level deployment architectures and strategies. Use this white paper to choose a DR solution that best fits your needs.

Oracle VM 3: Overview of Disaster Recovery Solutions (PDF)

Once you know which direction you want to take using this paper, you will then follow other more technically detailed white papers describing exact steps for the DR solution path you choose..."

Oracle VM 3
Overview of Disaster Recovery Solutions
Honglin Su writes, "Oracle offers a complete product portfolio that includes servers, storage, applications, middleware and database products that will allow you to piece together a custom disaster recovery (DR) solution for your business systems. Oracle VM 3 is simply one piece of a very complex puzzle that must be integrated along with other disaster recovery software and applications into an overall business continuity solution for your enterprise.

There are several different approaches to integrating Oracle VM into a disaster recovery environment all of which work with SAN or NAS. Greg King, Principle Best Practices Consultant from Oracle VM Product Management wrote the white paper to discuss different high level deployment architectures and strategies. Use this white paper to choose a DR solution that best fits your needs.

Oracle VM 3: Overview of Disaster Recovery Solutions (PDF)

Once you know which direction you want to take using this paper, you will then follow other more technically detailed white papers describing exact steps for the DR solution path you choose..."

Oracle VM's Growing Ecosystem
Oracle VM supports a broad range of the guest operating systems
Honglin Su writes, "In the x86 server virtualization market, Oracle VM continues growing its ecosystem.

Oracle VM supports a broad range of the guest operating systems such as Oracle Solaris, Oracle Linux, Red Hat Enterprise Linux, CentOS, SUSE Linux Enterprise Server, and Microsoft Windows.

For Windows guests, we have paravirtual (PV) drivers that provide improved network and disk throughput to run fully virtualized Windows guests on Oracle VM. Oracle VM Windows PV Drivers are signed by Microsoft. Oracle is a participant of Microsoft Windows Server Virtualization Validation Program (SVVP)..."

Oracle VM's Growing Ecosystem
Oracle VM supports a broad range of the guest operating systems
Honglin Su writes, "In the x86 server virtualization market, Oracle VM continues growing its ecosystem.

Oracle VM supports a broad range of the guest operating systems such as Oracle Solaris, Oracle Linux, Red Hat Enterprise Linux, CentOS, SUSE Linux Enterprise Server, and Microsoft Windows.

For Windows guests, we have paravirtual (PV) drivers that provide improved network and disk throughput to run fully virtualized Windows guests on Oracle VM. Oracle VM Windows PV Drivers are signed by Microsoft. Oracle is a participant of Microsoft Windows Server Virtualization Validation Program (SVVP)..."

Oracle VM's Growing Ecosystem
Oracle VM supports a broad range of the guest operating systems
Honglin Su writes, "In the x86 server virtualization market, Oracle VM continues growing its ecosystem.

Oracle VM supports a broad range of the guest operating systems such as Oracle Solaris, Oracle Linux, Red Hat Enterprise Linux, CentOS, SUSE Linux Enterprise Server, and Microsoft Windows.

For Windows guests, we have paravirtual (PV) drivers that provide improved network and disk throughput to run fully virtualized Windows guests on Oracle VM. Oracle VM Windows PV Drivers are signed by Microsoft. Oracle is a participant of Microsoft Windows Server Virtualization Validation Program (SVVP)..."

IT - Storage
x
37% of CIOs Storing Between 500TB and 1PB
Storage Newsletter, May 9th, 2014
"Big data relies on one main component: accessible data. But new research released highlights a major challenge to that main element - the growing cost to keep and have access to that data.

An independent survey of 100 CIOs, commissioned by Storiant (formerly SageCloud), has put a price tag on storing the data explosion and shows just how crippling it can and will be to store large amounts of data indefinitely..."

37% of CIOs Storing Between 500TB and 1PB
Storage Newsletter, May 9th, 2014
"Big data relies on one main component: accessible data. But new research released highlights a major challenge to that main element - the growing cost to keep and have access to that data.

An independent survey of 100 CIOs, commissioned by Storiant (formerly SageCloud), has put a price tag on storing the data explosion and shows just how crippling it can and will be to store large amounts of data indefinitely..."

37% of CIOs Storing Between 500TB and 1PB
Storage Newsletter, May 9th, 2014
"Big data relies on one main component: accessible data. But new research released highlights a major challenge to that main element - the growing cost to keep and have access to that data.

An independent survey of 100 CIOs, commissioned by Storiant (formerly SageCloud), has put a price tag on storing the data explosion and shows just how crippling it can and will be to store large amounts of data indefinitely..."

Java Technology
x
New book: Java Performance - The Definitive Guide
By Scott Oaks
Coding and testing are often considered separate areas of expertise. In this comprehensive guide, author and Java expert Scott Oaks takes the approach that anyone who works with Java should be equally adept at understanding how code behaves in the JVM, as well as the tunings likely to help its performance.

You'll gain in-depth knowledge of Java application performance, using the Java Virtual Machine (JVM) and the Java platform, including the language and API. Developers and performance engineers alike will learn a variety of features, tools, and processes for improving the way Java 7 and 8 applications perform.

  • Apply four principles for obtaining the best results from performance testing
  • Use JDK tools to collect data on how a Java application is performing
  • Understand the advantages and disadvantages of using a JIT compiler
  • Tune JVM garbage collectors to affect programs as little as possible
  • Use techniques to manage heap memory and JVM native memory
  • Maximize Java threading and synchronization performance features
  • Tackle performance issues in Java EE and Java SE APIs
  • Improve Java-driven database application performance

Read on.

New book: Java Performance - The Definitive Guide
By Scott Oaks
Coding and testing are often considered separate areas of expertise. In this comprehensive guide, author and Java expert Scott Oaks takes the approach that anyone who works with Java should be equally adept at understanding how code behaves in the JVM, as well as the tunings likely to help its performance.

You'll gain in-depth knowledge of Java application performance, using the Java Virtual Machine (JVM) and the Java platform, including the language and API. Developers and performance engineers alike will learn a variety of features, tools, and processes for improving the way Java 7 and 8 applications perform.

  • Apply four principles for obtaining the best results from performance testing
  • Use JDK tools to collect data on how a Java application is performing
  • Understand the advantages and disadvantages of using a JIT compiler
  • Tune JVM garbage collectors to affect programs as little as possible
  • Use techniques to manage heap memory and JVM native memory
  • Maximize Java threading and synchronization performance features
  • Tackle performance issues in Java EE and Java SE APIs
  • Improve Java-driven database application performance

Read on.

New book: Java Performance - The Definitive Guide
By Scott Oaks
Coding and testing are often considered separate areas of expertise. In this comprehensive guide, author and Java expert Scott Oaks takes the approach that anyone who works with Java should be equally adept at understanding how code behaves in the JVM, as well as the tunings likely to help its performance.

You'll gain in-depth knowledge of Java application performance, using the Java Virtual Machine (JVM) and the Java platform, including the language and API. Developers and performance engineers alike will learn a variety of features, tools, and processes for improving the way Java 7 and 8 applications perform.

  • Apply four principles for obtaining the best results from performance testing
  • Use JDK tools to collect data on how a Java application is performing
  • Understand the advantages and disadvantages of using a JIT compiler
  • Tune JVM garbage collectors to affect programs as little as possible
  • Use techniques to manage heap memory and JVM native memory
  • Maximize Java threading and synchronization performance features
  • Tackle performance issues in Java EE and Java SE APIs
  • Improve Java-driven database application performance

Read on.

IT - Technology
x
Clueless CIOs Aside, Open Source is 'Frightening and Fantastic'
ComputerWorld, May 7th, 2014
"Some companies are using open source to bring their legacy apps up to code, but all too many CIOs are still clueless about how often open source is being used in their own organizations.

One sign of how mainstream open source has become was noticeable in the music mix at this week's Open Business Conference in San Francisco's Palace Hotel. Ten years ago, Rage Against the Machine provided the background music. On Monday, mainstream pop artist Pharrell Williams' "Happy" was the morning anthem..."

Clueless CIOs Aside, Open Source is 'Frightening and Fantastic'
ComputerWorld, May 7th, 2014
"Some companies are using open source to bring their legacy apps up to code, but all too many CIOs are still clueless about how often open source is being used in their own organizations.

One sign of how mainstream open source has become was noticeable in the music mix at this week's Open Business Conference in San Francisco's Palace Hotel. Ten years ago, Rage Against the Machine provided the background music. On Monday, mainstream pop artist Pharrell Williams' "Happy" was the morning anthem..."

Clueless CIOs Aside, Open Source is 'Frightening and Fantastic'
ComputerWorld, May 7th, 2014
"Some companies are using open source to bring their legacy apps up to code, but all too many CIOs are still clueless about how often open source is being used in their own organizations.

One sign of how mainstream open source has become was noticeable in the music mix at this week's Open Business Conference in San Francisco's Palace Hotel. Ten years ago, Rage Against the Machine provided the background music. On Monday, mainstream pop artist Pharrell Williams' "Happy" was the morning anthem..."

Embedded Systems are a 'Life Form'
ComputerWorld, May 7th, 2014
"Among the number of provocative points that Dan Geer, the CISO of In-Q-Tel, makes about embedded systems and supply chain risk, one stands out: The systems are immortal.

They are immortal in the sense that they can continue to function for years at an assigned task. "The longer lived these devices," said Geer, "the surer it will be that they will be hijacked within their lifetime."

"Their manufacturers may die before they do -- a kind of unwanted legacy much akin to superfund sites and space junk," said Geer. So something has to be done..."

Embedded Systems are a 'Life Form'
ComputerWorld, May 7th, 2014
"Among the number of provocative points that Dan Geer, the CISO of In-Q-Tel, makes about embedded systems and supply chain risk, one stands out: The systems are immortal.

They are immortal in the sense that they can continue to function for years at an assigned task. "The longer lived these devices," said Geer, "the surer it will be that they will be hijacked within their lifetime."

"Their manufacturers may die before they do -- a kind of unwanted legacy much akin to superfund sites and space junk," said Geer. So something has to be done..."

Embedded Systems are a 'Life Form'
ComputerWorld, May 7th, 2014
"Among the number of provocative points that Dan Geer, the CISO of In-Q-Tel, makes about embedded systems and supply chain risk, one stands out: The systems are immortal.

They are immortal in the sense that they can continue to function for years at an assigned task. "The longer lived these devices," said Geer, "the surer it will be that they will be hijacked within their lifetime."

"Their manufacturers may die before they do -- a kind of unwanted legacy much akin to superfund sites and space junk," said Geer. So something has to be done..."

Internet of Things May Make Owning Less Appealing
ComputerWorld, May 7th, 2014
"At an Internet of Things (IoT) conference here, people are well beyond thinking about sensors and analytics. They are considering what happens once these tools are a part of every product sold. The implications are, potentially, huge.

A business is no longer selling a stand-alone product. There is a very good chance that the device leaving a factory will be remotely controlled, monitored, updated and maintained using remote management tools, sensors and predictive analytics that continually collect device data that can identify problems before they happen..."

Internet of Things May Make Owning Less Appealing
ComputerWorld, May 7th, 2014
"At an Internet of Things (IoT) conference here, people are well beyond thinking about sensors and analytics. They are considering what happens once these tools are a part of every product sold. The implications are, potentially, huge.

A business is no longer selling a stand-alone product. There is a very good chance that the device leaving a factory will be remotely controlled, monitored, updated and maintained using remote management tools, sensors and predictive analytics that continually collect device data that can identify problems before they happen..."

Internet of Things May Make Owning Less Appealing
ComputerWorld, May 7th, 2014
"At an Internet of Things (IoT) conference here, people are well beyond thinking about sensors and analytics. They are considering what happens once these tools are a part of every product sold. The implications are, potentially, huge.

A business is no longer selling a stand-alone product. There is a very good chance that the device leaving a factory will be remotely controlled, monitored, updated and maintained using remote management tools, sensors and predictive analytics that continually collect device data that can identify problems before they happen..."

The ABCs of the Internet of Things
ComputerWorld, May 6th, 2014
"You've heard the term and probably read stories about smart homes where the toaster talks to the smoke detector. But what makes it all connect? When will it become mainstream, and will it work? These frequently asked questions help explain it all..."
    The ABCs of the Internet of Things
    ComputerWorld, May 6th, 2014
    "You've heard the term and probably read stories about smart homes where the toaster talks to the smoke detector. But what makes it all connect? When will it become mainstream, and will it work? These frequently asked questions help explain it all..."
      The ABCs of the Internet of Things
      ComputerWorld, May 6th, 2014
      "You've heard the term and probably read stories about smart homes where the toaster talks to the smoke detector. But what makes it all connect? When will it become mainstream, and will it work? These frequently asked questions help explain it all..."
        IT - Bitcoin
        x
        You Say Bitcoin Has No Intrinsic Value? Twenty-two Reasons to Think Again
        Bitcoin Magazine, May 7th, 2014
        "What are some properties contained in the bitcoin itself? What are the properties that make it valuable? Some pundits like Warren Buffett seem to remain stuck in the belief that only things you can touch, feel, and see can be intrinsically valuable. One might wonder how these pundits would explain unseen forces of DNA, radio spectrum, viruses, bacteria, or even recent technological advances such as software or internet bandwidth..."
        You Say Bitcoin Has No Intrinsic Value? Twenty-two Reasons to Think Again
        Bitcoin Magazine, May 7th, 2014
        "What are some properties contained in the bitcoin itself? What are the properties that make it valuable? Some pundits like Warren Buffett seem to remain stuck in the belief that only things you can touch, feel, and see can be intrinsically valuable. One might wonder how these pundits would explain unseen forces of DNA, radio spectrum, viruses, bacteria, or even recent technological advances such as software or internet bandwidth..."
        You Say Bitcoin Has No Intrinsic Value? Twenty-two Reasons to Think Again
        Bitcoin Magazine, May 7th, 2014
        "What are some properties contained in the bitcoin itself? What are the properties that make it valuable? Some pundits like Warren Buffett seem to remain stuck in the belief that only things you can touch, feel, and see can be intrinsically valuable. One might wonder how these pundits would explain unseen forces of DNA, radio spectrum, viruses, bacteria, or even recent technological advances such as software or internet bandwidth..."
        How Bitcoin is Thriving in Argentina's Black Market Economy
        CoindDesk, May 6th, 2014
        "The US dollar black market doesn't just thrive in Buenos Aires, it's published in the paper every morning.

        Swinging by one of the city's newsstands, you'll find the official peso to dollar rates published next to the 'dolar blue' rates at the top of the morning edition of La Nación, and if you walk downtown to Calle Florida, the arbolitos (street traders of black market currency, literally 'little trees') that stand planted on the busy commercial street greet any foreigner they see with barks of 'Cambio! Cambio! Cambio!'

          How Bitcoin is Thriving in Argentina's Black Market Economy
          CoindDesk, May 6th, 2014
          "The US dollar black market doesn't just thrive in Buenos Aires, it's published in the paper every morning.

          Swinging by one of the city's newsstands, you'll find the official peso to dollar rates published next to the 'dolar blue' rates at the top of the morning edition of La Nación, and if you walk downtown to Calle Florida, the arbolitos (street traders of black market currency, literally 'little trees') that stand planted on the busy commercial street greet any foreigner they see with barks of 'Cambio! Cambio! Cambio!'

            How Bitcoin is Thriving in Argentina's Black Market Economy
            CoindDesk, May 6th, 2014
            "The US dollar black market doesn't just thrive in Buenos Aires, it's published in the paper every morning.

            Swinging by one of the city's newsstands, you'll find the official peso to dollar rates published next to the 'dolar blue' rates at the top of the morning edition of La Nación, and if you walk downtown to Calle Florida, the arbolitos (street traders of black market currency, literally 'little trees') that stand planted on the busy commercial street greet any foreigner they see with barks of 'Cambio! Cambio! Cambio!'

              Bitcoin Bill Payment Services Taking Off Around the World
              CoindDesk, May 7th, 2014
              "Let's face it, we all hate paying bills, but the ability to pay them with digital currency might help put a smile on your face.

              Earlier this year, CoinDesk reported on the launch of Bylls, a Canada-based service that allows users to pay bills in bitcoin at more than 6,000 organizations, including the government. It was one of the world's first. Now, new services are popping up around the globe that allow you to pay for everything from basic utilities to taxes in bitcoin..."

              Bitcoin Bill Payment Services Taking Off Around the World
              CoindDesk, May 7th, 2014
              "Let's face it, we all hate paying bills, but the ability to pay them with digital currency might help put a smile on your face.

              Earlier this year, CoinDesk reported on the launch of Bylls, a Canada-based service that allows users to pay bills in bitcoin at more than 6,000 organizations, including the government. It was one of the world's first. Now, new services are popping up around the globe that allow you to pay for everything from basic utilities to taxes in bitcoin..."

              Bitcoin Bill Payment Services Taking Off Around the World
              CoindDesk, May 7th, 2014
              "Let's face it, we all hate paying bills, but the ability to pay them with digital currency might help put a smile on your face.

              Earlier this year, CoinDesk reported on the launch of Bylls, a Canada-based service that allows users to pay bills in bitcoin at more than 6,000 organizations, including the government. It was one of the world's first. Now, new services are popping up around the globe that allow you to pay for everything from basic utilities to taxes in bitcoin..."

              Living On Bitcoin A Year Later
              Forbes, May 9th, 2014
              "The Bitcoin community is a techno-tribe, especially its core: those who adopted the cryptocurrency in the period from 2008 to 2011, before its value surged into three figures and then four, and lots of people rushed in, their eyes lit by money signs. The early adopters were a small group of people who loved a very weird thing; oftentimes under those circumstances, everybody knows everybody else. That is especially true for Bitcoin lovers who live in the same city. So it should have been no surprise to me that when I set out to find members of the early Bitcoin tribe in San Francisco at a cryptocurrency trading Meet-up, they would tell me that Ross Ulbricht - offering to sell lots of Bitcoin at a cheap discount..."
              Living On Bitcoin A Year Later
              Forbes, May 9th, 2014
              "The Bitcoin community is a techno-tribe, especially its core: those who adopted the cryptocurrency in the period from 2008 to 2011, before its value surged into three figures and then four, and lots of people rushed in, their eyes lit by money signs. The early adopters were a small group of people who loved a very weird thing; oftentimes under those circumstances, everybody knows everybody else. That is especially true for Bitcoin lovers who live in the same city. So it should have been no surprise to me that when I set out to find members of the early Bitcoin tribe in San Francisco at a cryptocurrency trading Meet-up, they would tell me that Ross Ulbricht - offering to sell lots of Bitcoin at a cheap discount..."
              Living On Bitcoin A Year Later
              Forbes, May 9th, 2014
              "The Bitcoin community is a techno-tribe, especially its core: those who adopted the cryptocurrency in the period from 2008 to 2011, before its value surged into three figures and then four, and lots of people rushed in, their eyes lit by money signs. The early adopters were a small group of people who loved a very weird thing; oftentimes under those circumstances, everybody knows everybody else. That is especially true for Bitcoin lovers who live in the same city. So it should have been no surprise to me that when I set out to find members of the early Bitcoin tribe in San Francisco at a cryptocurrency trading Meet-up, they would tell me that Ross Ulbricht - offering to sell lots of Bitcoin at a cheap discount..."
              Bitcoin Is Not the Enemy of the Financial Incumbents (Part 1)
              Wired, May 8th, 2014
              "Over the past few years I have spoken to thousands of people about bitcoin. Lately, I have seen an uptick in interest from the financial incumbents, such as Visa, American Express and various banking institutions. Invariably, they see bitcoin as a threat to their business in one way or another, and that's just not the case.

              I'm sure some will disagree, but the fact is, bitcoin is not the enemy of today's financial institutions..."

              Bitcoin Is Not the Enemy of the Financial Incumbents (Part 1)
              Wired, May 8th, 2014
              "Over the past few years I have spoken to thousands of people about bitcoin. Lately, I have seen an uptick in interest from the financial incumbents, such as Visa, American Express and various banking institutions. Invariably, they see bitcoin as a threat to their business in one way or another, and that's just not the case.

              I'm sure some will disagree, but the fact is, bitcoin is not the enemy of today's financial institutions..."

              Bitcoin Is Not the Enemy of the Financial Incumbents (Part 1)
              Wired, May 8th, 2014
              "Over the past few years I have spoken to thousands of people about bitcoin. Lately, I have seen an uptick in interest from the financial incumbents, such as Visa, American Express and various banking institutions. Invariably, they see bitcoin as a threat to their business in one way or another, and that's just not the case.

              I'm sure some will disagree, but the fact is, bitcoin is not the enemy of today's financial institutions..."

              FEC Rules PACs Can Accept Bitcoin Donations
              The Wire, May 8th, 2014
              "The Federal Election Commission voted today 6 to 0 to allow political committees to accept limited Bitcoin donations. "Limited" means $100 worth of BTC or less. Still, this is a nice win for the Bitcoin community. Avid Bitcoiners like to support Bitcoin-friendly politicians with Bitcoins..."
              FEC Rules PACs Can Accept Bitcoin Donations
              The Wire, May 8th, 2014
              "The Federal Election Commission voted today 6 to 0 to allow political committees to accept limited Bitcoin donations. "Limited" means $100 worth of BTC or less. Still, this is a nice win for the Bitcoin community. Avid Bitcoiners like to support Bitcoin-friendly politicians with Bitcoins..."
              FEC Rules PACs Can Accept Bitcoin Donations
              The Wire, May 8th, 2014
              "The Federal Election Commission voted today 6 to 0 to allow political committees to accept limited Bitcoin donations. "Limited" means $100 worth of BTC or less. Still, this is a nice win for the Bitcoin community. Avid Bitcoiners like to support Bitcoin-friendly politicians with Bitcoins..."
              What Is Bitcoin Mining?
              Forbes, May 8th, 2014
              "If you've ever wondered where Bitcoin comes from and how it goes into circulation, the answer is that it gets 'mined' into existence. Bitcoin mining serves to both add transactions to the block chain and to release new Bitcoin. The mining process involves compiling recent transactions into blocks and trying to solve a computationally difficult puzzle.

              The first participant who solves the puzzle gets to place the next block on the block chain and claim the rewards. The rewards incentivize mining and include both the transaction fees (paid to the miner in the form of Bitcoin) as well as the newly released Bitcoin..."

              What Is Bitcoin Mining?
              Forbes, May 8th, 2014
              "If you've ever wondered where Bitcoin comes from and how it goes into circulation, the answer is that it gets 'mined' into existence. Bitcoin mining serves to both add transactions to the block chain and to release new Bitcoin. The mining process involves compiling recent transactions into blocks and trying to solve a computationally difficult puzzle.

              The first participant who solves the puzzle gets to place the next block on the block chain and claim the rewards. The rewards incentivize mining and include both the transaction fees (paid to the miner in the form of Bitcoin) as well as the newly released Bitcoin..."

              What Is Bitcoin Mining?
              Forbes, May 8th, 2014
              "If you've ever wondered where Bitcoin comes from and how it goes into circulation, the answer is that it gets 'mined' into existence. Bitcoin mining serves to both add transactions to the block chain and to release new Bitcoin. The mining process involves compiling recent transactions into blocks and trying to solve a computationally difficult puzzle.

              The first participant who solves the puzzle gets to place the next block on the block chain and claim the rewards. The rewards incentivize mining and include both the transaction fees (paid to the miner in the form of Bitcoin) as well as the newly released Bitcoin..."

              Solaris
              x
              New in SMF Documentation for Oracle Solaris 11.2
              svcio

              The Service Management Facility guide is all new for the Oracle Solaris 11.2 release, with much more information including an example of creating a pair of services that start and stop an Oracle Database instance and an examination of the Puppet stencil service.

              For more information about stencil services, see Solaris SMF Weblog, and see the svcio.1 and smf_stencil.4 man pages below.

              New in SMF Documentation for Oracle Solaris 11.2
              svcio

              The Service Management Facility guide is all new for the Oracle Solaris 11.2 release, with much more information including an example of creating a pair of services that start and stop an Oracle Database instance and an examination of the Puppet stencil service.

              For more information about stencil services, see Solaris SMF Weblog, and see the svcio.1 and smf_stencil.4 man pages below.

              New in SMF Documentation for Oracle Solaris 11.2
              svcio

              The Service Management Facility guide is all new for the Oracle Solaris 11.2 release, with much more information including an example of creating a pair of services that start and stop an Oracle Database instance and an examination of the Puppet stencil service.

              For more information about stencil services, see Solaris SMF Weblog, and see the svcio.1 and smf_stencil.4 man pages below.

              Oracle Solaris 11.2: All the Posts
              Larry Wake Shares 50+ Links
              Larry writes, "As I hope you've heard already, we launched Oracle Solaris 11.2 last week, and things have been busy ever since. Specifically, our engineers and others have gone nuts, kicking out an incredible number of blog posts.

              Glynn Foster has been sending me a continuous stream of links, promising me each time that it's going to die down any old time now ("...typical, the moment I send something out, 2 more blogs appear..."). And I found another one just as I was wrapping this up!

              The tally for now stands at almost 50, so settle in, as we proudly present:..."

              Oracle Solaris 11.2: All the Posts
              Larry Wake Shares 50+ Links
              Larry writes, "As I hope you've heard already, we launched Oracle Solaris 11.2 last week, and things have been busy ever since. Specifically, our engineers and others have gone nuts, kicking out an incredible number of blog posts.

              Glynn Foster has been sending me a continuous stream of links, promising me each time that it's going to die down any old time now ("...typical, the moment I send something out, 2 more blogs appear..."). And I found another one just as I was wrapping this up!

              The tally for now stands at almost 50, so settle in, as we proudly present:..."

              Oracle Solaris 11.2: All the Posts
              Larry Wake Shares 50+ Links
              Larry writes, "As I hope you've heard already, we launched Oracle Solaris 11.2 last week, and things have been busy ever since. Specifically, our engineers and others have gone nuts, kicking out an incredible number of blog posts.

              Glynn Foster has been sending me a continuous stream of links, promising me each time that it's going to die down any old time now ("...typical, the moment I send something out, 2 more blogs appear..."). And I found another one just as I was wrapping this up!

              The tally for now stands at almost 50, so settle in, as we proudly present:..."

              MySQL
              x
              MySQL Cookbook, 3rd Edition
              By Paul DuBois
              With Early Release ebooks, you get books in their earliest form - the author's raw and unedited content as he or she writes - so you can take advantage of these technologies long before the official release of these titles. You'll also receive updates when significant changes are made, new chapters as they're written, and the final ebook bundle.

              MySQL's popularity has brought a flood of questions about how to solve specific problems, and that's where this Cookbook is essential. Designed as a handy resource when you need quick solutions or techniques, the book offers dozens of short, focused pieces of code and hundreds of worked-out examples for programmers of all levels who don't have the time (or expertise) to solve MySQL problems from scratch.

              This third edition has been updated to cover new APIs in Python and PHP, as well as powerful new features in MySQL 5.6 and older versions still in common use. Recipes use the mysql client program as well as Java, Perl, PHP, Python, and Ruby APIs...

              MySQL Cookbook, 3rd Edition
              By Paul DuBois
              With Early Release ebooks, you get books in their earliest form - the author's raw and unedited content as he or she writes - so you can take advantage of these technologies long before the official release of these titles. You'll also receive updates when significant changes are made, new chapters as they're written, and the final ebook bundle.

              MySQL's popularity has brought a flood of questions about how to solve specific problems, and that's where this Cookbook is essential. Designed as a handy resource when you need quick solutions or techniques, the book offers dozens of short, focused pieces of code and hundreds of worked-out examples for programmers of all levels who don't have the time (or expertise) to solve MySQL problems from scratch.

              This third edition has been updated to cover new APIs in Python and PHP, as well as powerful new features in MySQL 5.6 and older versions still in common use. Recipes use the mysql client program as well as Java, Perl, PHP, Python, and Ruby APIs...

              MySQL Cookbook, 3rd Edition
              By Paul DuBois
              With Early Release ebooks, you get books in their earliest form - the author's raw and unedited content as he or she writes - so you can take advantage of these technologies long before the official release of these titles. You'll also receive updates when significant changes are made, new chapters as they're written, and the final ebook bundle.

              MySQL's popularity has brought a flood of questions about how to solve specific problems, and that's where this Cookbook is essential. Designed as a handy resource when you need quick solutions or techniques, the book offers dozens of short, focused pieces of code and hundreds of worked-out examples for programmers of all levels who don't have the time (or expertise) to solve MySQL problems from scratch.

              This third edition has been updated to cover new APIs in Python and PHP, as well as powerful new features in MySQL 5.6 and older versions still in common use. Recipes use the mysql client program as well as Java, Perl, PHP, Python, and Ruby APIs...

              Cloud Computing
              x
              Deploy and operate your Business Applications quickly and securely
              By Eric Bezille
              Eric writes, "we announced the upcoming release of Solaris 11.2. Even if this is a minor release, it contains major features that enable strong benefits for IT operations toward Business requirements that I am hearing everyday: "time-to-market", pay for what you use, security, simplified operations. Yes, OS are not a commodity and are a corner piece bringing either a lot's of value or a lot's of pain (depending on which one you rely on). At Oracle we are putting a large part of our R&D effort to hide the complexity and bring strong value through Solaris toward your infrastructure and applications management: Solaris acting as the glue between your hardware execution layer and your applications..."
              Deploy and operate your Business Applications quickly and securely
              By Eric Bezille
              Eric writes, "we announced the upcoming release of Solaris 11.2. Even if this is a minor release, it contains major features that enable strong benefits for IT operations toward Business requirements that I am hearing everyday: "time-to-market", pay for what you use, security, simplified operations. Yes, OS are not a commodity and are a corner piece bringing either a lot's of value or a lot's of pain (depending on which one you rely on). At Oracle we are putting a large part of our R&D effort to hide the complexity and bring strong value through Solaris toward your infrastructure and applications management: Solaris acting as the glue between your hardware execution layer and your applications..."
              Deploy and operate your Business Applications quickly and securely
              By Eric Bezille
              Eric writes, "we announced the upcoming release of Solaris 11.2. Even if this is a minor release, it contains major features that enable strong benefits for IT operations toward Business requirements that I am hearing everyday: "time-to-market", pay for what you use, security, simplified operations. Yes, OS are not a commodity and are a corner piece bringing either a lot's of value or a lot's of pain (depending on which one you rely on). At Oracle we are putting a large part of our R&D effort to hide the complexity and bring strong value through Solaris toward your infrastructure and applications management: Solaris acting as the glue between your hardware execution layer and your applications..."
              How to get started with OpenStack on Solaris
              By Jernej Kaše
              Jernej writes, "The new Solaris 11.2 is a game changer - the world's first Cloud Operating System now comes with out-of-the-box OpenStack tools.

              Here's how to get started exploring it. You'll need:

              • VirtualBox with VirtualBox Extension Pack
              • 8GB (or more) USB thumb drive
              • Oracle Solaris 11.2 Beta VM Template for Oracle VM VirtualBox
              • Oracle Solaris 11.2 Beta OpenStack Unified Archive

              Read on for details ...

              How to get started with OpenStack on Solaris
              By Jernej Kaše
              Jernej writes, "The new Solaris 11.2 is a game changer - the world's first Cloud Operating System now comes with out-of-the-box OpenStack tools.

              Here's how to get started exploring it. You'll need:

              • VirtualBox with VirtualBox Extension Pack
              • 8GB (or more) USB thumb drive
              • Oracle Solaris 11.2 Beta VM Template for Oracle VM VirtualBox
              • Oracle Solaris 11.2 Beta OpenStack Unified Archive

              Read on for details ...

              How to get started with OpenStack on Solaris
              By Jernej Kaše
              Jernej writes, "The new Solaris 11.2 is a game changer - the world's first Cloud Operating System now comes with out-of-the-box OpenStack tools.

              Here's how to get started exploring it. You'll need:

              • VirtualBox with VirtualBox Extension Pack
              • 8GB (or more) USB thumb drive
              • Oracle Solaris 11.2 Beta VM Template for Oracle VM VirtualBox
              • Oracle Solaris 11.2 Beta OpenStack Unified Archive

              Read on for details ...

              Linux
              x
              Make Your Database Run Faster on Oracle Linux
              By Rick Ramsey
              Rick writes, "If you can get your hands on a Sun Flash Accelerator F40 PCIe Card, and you're running Oracle Database 11g Release 2 or later on Oracle Linux, you can use the Oracle Database Smart Flash Cache to improve performance and response times. That was a mouthful, so let me say it again.

              • Configure Sun Flash Accelerator F40 PCIe Card as a file system.
              • Configure Oracle Automatic Storage Management, a feature of Oracle Database, to use multiple Sun Flash Accelerator F40 PCIe Cards.
              • Configure the Database Smart Flash Cache capability of Oracle Database."

              Read on: Tech Article: How to Improve Database Performance Using Database Smart Flash Cache on Oracle Linux by by Rick Stenho.

              Make Your Database Run Faster on Oracle Linux
              By Rick Ramsey
              Rick writes, "If you can get your hands on a Sun Flash Accelerator F40 PCIe Card, and you're running Oracle Database 11g Release 2 or later on Oracle Linux, you can use the Oracle Database Smart Flash Cache to improve performance and response times. That was a mouthful, so let me say it again.

              • Configure Sun Flash Accelerator F40 PCIe Card as a file system.
              • Configure Oracle Automatic Storage Management, a feature of Oracle Database, to use multiple Sun Flash Accelerator F40 PCIe Cards.
              • Configure the Database Smart Flash Cache capability of Oracle Database."

              Read on: Tech Article: How to Improve Database Performance Using Database Smart Flash Cache on Oracle Linux by by Rick Stenho.

              Make Your Database Run Faster on Oracle Linux
              By Rick Ramsey
              Rick writes, "If you can get your hands on a Sun Flash Accelerator F40 PCIe Card, and you're running Oracle Database 11g Release 2 or later on Oracle Linux, you can use the Oracle Database Smart Flash Cache to improve performance and response times. That was a mouthful, so let me say it again.

              • Configure Sun Flash Accelerator F40 PCIe Card as a file system.
              • Configure Oracle Automatic Storage Management, a feature of Oracle Database, to use multiple Sun Flash Accelerator F40 PCIe Cards.
              • Configure the Database Smart Flash Cache capability of Oracle Database."

              Read on: Tech Article: How to Improve Database Performance Using Database Smart Flash Cache on Oracle Linux by by Rick Stenho.

              IT - Cloud
              x
              The 2nd Generation Cloud
              Enterprise Efficiency, May 6th, 2014
              "Not all clouds are equal. That's a pretty obvious statement that we can all agree on. Cloud service providers offer differing levels of services, redundancy, and customer service -- all at widely varying prices.

              But now that the industry is beginning to mature, we're starting to see distinct differences between cloud architectures that were designed and built during the initial boom, and those that are rolling out this year. The clouds are so different in fact, that one could even label them with the distinction of "second-generation." Let's take a look at a few of the unique characteristics that second-generation clouds exhibit..."

                The 2nd Generation Cloud
                Enterprise Efficiency, May 6th, 2014
                "Not all clouds are equal. That's a pretty obvious statement that we can all agree on. Cloud service providers offer differing levels of services, redundancy, and customer service -- all at widely varying prices.

                But now that the industry is beginning to mature, we're starting to see distinct differences between cloud architectures that were designed and built during the initial boom, and those that are rolling out this year. The clouds are so different in fact, that one could even label them with the distinction of "second-generation." Let's take a look at a few of the unique characteristics that second-generation clouds exhibit..."

                  The 2nd Generation Cloud
                  Enterprise Efficiency, May 6th, 2014
                  "Not all clouds are equal. That's a pretty obvious statement that we can all agree on. Cloud service providers offer differing levels of services, redundancy, and customer service -- all at widely varying prices.

                  But now that the industry is beginning to mature, we're starting to see distinct differences between cloud architectures that were designed and built during the initial boom, and those that are rolling out this year. The clouds are so different in fact, that one could even label them with the distinction of "second-generation." Let's take a look at a few of the unique characteristics that second-generation clouds exhibit..."

                    Take Control of the Cloud
                    O'Reilly, May 5th, 2014
                    "Cut through the hype, understand cloud services, and enhance your privacy and security!

                    What, exactly, is the Cloud? What are cloud services, and how can you make smart decisions about which ones to use and how to set them up? Join award-winning author Joe Kissell as he pins down nebulous cloud concepts, helps you evaluate claims about cloud services, and points out how to enhance your privacy and security in the Cloud..."

                    Take Control of the Cloud
                    O'Reilly, May 5th, 2014
                    "Cut through the hype, understand cloud services, and enhance your privacy and security!

                    What, exactly, is the Cloud? What are cloud services, and how can you make smart decisions about which ones to use and how to set them up? Join award-winning author Joe Kissell as he pins down nebulous cloud concepts, helps you evaluate claims about cloud services, and points out how to enhance your privacy and security in the Cloud..."

                    Take Control of the Cloud
                    O'Reilly, May 5th, 2014
                    "Cut through the hype, understand cloud services, and enhance your privacy and security!

                    What, exactly, is the Cloud? What are cloud services, and how can you make smart decisions about which ones to use and how to set them up? Join award-winning author Joe Kissell as he pins down nebulous cloud concepts, helps you evaluate claims about cloud services, and points out how to enhance your privacy and security in the Cloud..."

                    8 Data Centers for Cloud's Toughest Jobs
                    Information Week, May 8th, 2014
                    "Companies like Google, Apple, and Facebook don't just innovate with products: Just look at their data centers. The designs and operations playbooks of these new centers aim to lower costs, increase reliability and maintainability, and improve agility, while reducing energy use and carbon footprint.

                    As big data and cloud computing push the limits of traditional data centers, new trends in data center innovation have followed..."

                    8 Data Centers for Cloud's Toughest Jobs
                    Information Week, May 8th, 2014
                    "Companies like Google, Apple, and Facebook don't just innovate with products: Just look at their data centers. The designs and operations playbooks of these new centers aim to lower costs, increase reliability and maintainability, and improve agility, while reducing energy use and carbon footprint.

                    As big data and cloud computing push the limits of traditional data centers, new trends in data center innovation have followed..."

                    8 Data Centers for Cloud's Toughest Jobs
                    Information Week, May 8th, 2014
                    "Companies like Google, Apple, and Facebook don't just innovate with products: Just look at their data centers. The designs and operations playbooks of these new centers aim to lower costs, increase reliability and maintainability, and improve agility, while reducing energy use and carbon footprint.

                    As big data and cloud computing push the limits of traditional data centers, new trends in data center innovation have followed..."

                    Afraid of the Cloud? How to Handle Your Fears
                    ComputerWorld, May 1st, 2014
                    "A study released this week shows that 73% of IT executives believe cloud providers are hiding performance problems.

                    Industry analysts say IT professionals are smart to be cautious, but added that they need to do their homework and ask the right questions before selecting a vendor.

                    "I don't know if it's a matter of distrust," said Jagdish Rebello, an analyst with IHS. "They are wary of the hype. The enterprise IT folks are being very, very cautious about their migration to the cloud. They see the cost benefits but when they look at reliability and security, there is essentially a fear of going wholeheartedly to the cloud."

                    Afraid of the Cloud? How to Handle Your Fears
                    ComputerWorld, May 1st, 2014
                    "A study released this week shows that 73% of IT executives believe cloud providers are hiding performance problems.

                    Industry analysts say IT professionals are smart to be cautious, but added that they need to do their homework and ask the right questions before selecting a vendor.

                    "I don't know if it's a matter of distrust," said Jagdish Rebello, an analyst with IHS. "They are wary of the hype. The enterprise IT folks are being very, very cautious about their migration to the cloud. They see the cost benefits but when they look at reliability and security, there is essentially a fear of going wholeheartedly to the cloud."

                    Afraid of the Cloud? How to Handle Your Fears
                    ComputerWorld, May 1st, 2014
                    "A study released this week shows that 73% of IT executives believe cloud providers are hiding performance problems.

                    Industry analysts say IT professionals are smart to be cautious, but added that they need to do their homework and ask the right questions before selecting a vendor.

                    "I don't know if it's a matter of distrust," said Jagdish Rebello, an analyst with IHS. "They are wary of the hype. The enterprise IT folks are being very, very cautious about their migration to the cloud. They see the cost benefits but when they look at reliability and security, there is essentially a fear of going wholeheartedly to the cloud."

                    Calling the Cloud: Challenges of Managing Information
                    Help Net Security, May 8th, 2014
                    "The cloud continues to be much discussed and the many benefits it offers organizations of all sizes. Rarely is it mentioned, though, that there are a number of complications that come with managing data there, especially in regard to end user accounts and access of applications.

                    Using cloud applications surely can impact the security, compliance and IT-related cost savings of an organization. In relation to identity and access management, when several cloud applications are implemented, provisioning, password management and the monitoring of access begins to become quite a challenge. Because of this, organizational leaders should seriously consider implementing an automated cloud identity management solution if they're using or making a move..."

                    Calling the Cloud: Challenges of Managing Information
                    Help Net Security, May 8th, 2014
                    "The cloud continues to be much discussed and the many benefits it offers organizations of all sizes. Rarely is it mentioned, though, that there are a number of complications that come with managing data there, especially in regard to end user accounts and access of applications.

                    Using cloud applications surely can impact the security, compliance and IT-related cost savings of an organization. In relation to identity and access management, when several cloud applications are implemented, provisioning, password management and the monitoring of access begins to become quite a challenge. Because of this, organizational leaders should seriously consider implementing an automated cloud identity management solution if they're using or making a move..."

                    Calling the Cloud: Challenges of Managing Information
                    Help Net Security, May 8th, 2014
                    "The cloud continues to be much discussed and the many benefits it offers organizations of all sizes. Rarely is it mentioned, though, that there are a number of complications that come with managing data there, especially in regard to end user accounts and access of applications.

                    Using cloud applications surely can impact the security, compliance and IT-related cost savings of an organization. In relation to identity and access management, when several cloud applications are implemented, provisioning, password management and the monitoring of access begins to become quite a challenge. Because of this, organizational leaders should seriously consider implementing an automated cloud identity management solution if they're using or making a move..."

                    Five Myths that Cloud Hybrid-Era Network Management, Monitoring
                    SearchNetworking, May 5th, 2014
                    "Since the advent of cloud computing, system administrators have had to adjust to working in an often-confusing technological world, one populated with a bewildering mix of both internal and external components. Not only does cloud complicate network admin matters in general, but there are also varieties of cloud environments with which sysadmins must deal. In this podcast, Nemertes Research expert John Burke focuses on the affect of the hybrid cloud on network management and monitoring..."
                    Five Myths that Cloud Hybrid-Era Network Management, Monitoring
                    SearchNetworking, May 5th, 2014
                    "Since the advent of cloud computing, system administrators have had to adjust to working in an often-confusing technological world, one populated with a bewildering mix of both internal and external components. Not only does cloud complicate network admin matters in general, but there are also varieties of cloud environments with which sysadmins must deal. In this podcast, Nemertes Research expert John Burke focuses on the affect of the hybrid cloud on network management and monitoring..."
                    Five Myths that Cloud Hybrid-Era Network Management, Monitoring
                    SearchNetworking, May 5th, 2014
                    "Since the advent of cloud computing, system administrators have had to adjust to working in an often-confusing technological world, one populated with a bewildering mix of both internal and external components. Not only does cloud complicate network admin matters in general, but there are also varieties of cloud environments with which sysadmins must deal. In this podcast, Nemertes Research expert John Burke focuses on the affect of the hybrid cloud on network management and monitoring..."
                    This Is Why Companies are Still Afraid of the Cloud
                    InfoWorld, May 2nd, 2014
                    "On April 25, a systems administrator was sentenced to 33 months in prison for intentionally causing damage to a protected computer. Jonathan Hartwell Wolberg of Tucson, Ariz., will end his prison term with 36 months of supervised release for sabotaging his former employer's cloud computing server..."
                    This Is Why Companies are Still Afraid of the Cloud
                    InfoWorld, May 2nd, 2014
                    "On April 25, a systems administrator was sentenced to 33 months in prison for intentionally causing damage to a protected computer. Jonathan Hartwell Wolberg of Tucson, Ariz., will end his prison term with 36 months of supervised release for sabotaging his former employer's cloud computing server..."
                    This Is Why Companies are Still Afraid of the Cloud
                    InfoWorld, May 2nd, 2014
                    "On April 25, a systems administrator was sentenced to 33 months in prison for intentionally causing damage to a protected computer. Jonathan Hartwell Wolberg of Tucson, Ariz., will end his prison term with 36 months of supervised release for sabotaging his former employer's cloud computing server..."
                    IT - CxO
                    x
                    3 Non-Technical Skills IT Managers Should Hire for
                    Information Week, May 5th, 2014
                    "April's unemployment numbers tell the story of a scorching hot tech job sector with unemployment at less than 3 percent. As hiring managers, this makes the battle for top talent even tougher, but no organization can make the mistake of taking just any skilled person who's willing to fill a seat. In fact, it's even more important that hiring managers take a little longer to hire employees, because one wrong choice could trickle down and hurt your entire team. That being said, here are three key non-technical skills for which all IT managers should be hiring:..."
                      3 Non-Technical Skills IT Managers Should Hire for
                      Information Week, May 5th, 2014
                      "April's unemployment numbers tell the story of a scorching hot tech job sector with unemployment at less than 3 percent. As hiring managers, this makes the battle for top talent even tougher, but no organization can make the mistake of taking just any skilled person who's willing to fill a seat. In fact, it's even more important that hiring managers take a little longer to hire employees, because one wrong choice could trickle down and hurt your entire team. That being said, here are three key non-technical skills for which all IT managers should be hiring:..."
                        3 Non-Technical Skills IT Managers Should Hire for
                        Information Week, May 5th, 2014
                        "April's unemployment numbers tell the story of a scorching hot tech job sector with unemployment at less than 3 percent. As hiring managers, this makes the battle for top talent even tougher, but no organization can make the mistake of taking just any skilled person who's willing to fill a seat. In fact, it's even more important that hiring managers take a little longer to hire employees, because one wrong choice could trickle down and hurt your entire team. That being said, here are three key non-technical skills for which all IT managers should be hiring:..."
                          8 CIO Moms Share Tales and Tips from the IT Trenches
                          ComputerWorld, May 8th, 2014
                          "Multitasking, conflict resolution, crisis management. They're skills used every day by CIOs in the office -- and equally by parents on the homefront.

                          To celebrate Mother's Day, Computerworld sought out eight mothers who hold the title of CIO. We asked them how being a mother has influenced their management style, how they juggle parenthood with tech leadership and what advice they'd give other parents and would-be parents rising through the ranks of IT..."

                          8 CIO Moms Share Tales and Tips from the IT Trenches
                          ComputerWorld, May 8th, 2014
                          "Multitasking, conflict resolution, crisis management. They're skills used every day by CIOs in the office -- and equally by parents on the homefront.

                          To celebrate Mother's Day, Computerworld sought out eight mothers who hold the title of CIO. We asked them how being a mother has influenced their management style, how they juggle parenthood with tech leadership and what advice they'd give other parents and would-be parents rising through the ranks of IT..."

                          8 CIO Moms Share Tales and Tips from the IT Trenches
                          ComputerWorld, May 8th, 2014
                          "Multitasking, conflict resolution, crisis management. They're skills used every day by CIOs in the office -- and equally by parents on the homefront.

                          To celebrate Mother's Day, Computerworld sought out eight mothers who hold the title of CIO. We asked them how being a mother has influenced their management style, how they juggle parenthood with tech leadership and what advice they'd give other parents and would-be parents rising through the ranks of IT..."

                          10 Tips To Attract Women To InfoSec Jobs
                          CSO Online, May 5th, 2014
                          "Women make up just 11 percent of information security professionals. Just increasing that number to 22 percent would solve the industry's staffing shortage problem.

                          Unfortunately, at most companies, the recruitment process is designed to attract the kind of people who already work there. Changing that requires conscious effort. Here are some tips that might help..."

                          10 Tips To Attract Women To InfoSec Jobs
                          CSO Online, May 5th, 2014
                          "Women make up just 11 percent of information security professionals. Just increasing that number to 22 percent would solve the industry's staffing shortage problem.

                          Unfortunately, at most companies, the recruitment process is designed to attract the kind of people who already work there. Changing that requires conscious effort. Here are some tips that might help..."

                          10 Tips To Attract Women To InfoSec Jobs
                          CSO Online, May 5th, 2014
                          "Women make up just 11 percent of information security professionals. Just increasing that number to 22 percent would solve the industry's staffing shortage problem.

                          Unfortunately, at most companies, the recruitment process is designed to attract the kind of people who already work there. Changing that requires conscious effort. Here are some tips that might help..."

                          Cloud Apps Soar, CIOs Take on New Role
                          CIO, May 1th, 2014
                          "The explosion of cloud apps in the enterprise, largely happening outside the CIO's purview, threatens to rattle companies in many ways. Highly regulated companies can find themselves suddenly out of compliance. Business-critical cloud apps can fail to deliver adequate service. Then there's the ever-looming security risk. cloud services broker

                          A swath of market research studies is highlighting this problem:..."

                          Cloud Apps Soar, CIOs Take on New Role
                          CIO, May 1th, 2014
                          "The explosion of cloud apps in the enterprise, largely happening outside the CIO's purview, threatens to rattle companies in many ways. Highly regulated companies can find themselves suddenly out of compliance. Business-critical cloud apps can fail to deliver adequate service. Then there's the ever-looming security risk. cloud services broker

                          A swath of market research studies is highlighting this problem:..."

                          Cloud Apps Soar, CIOs Take on New Role
                          CIO, May 1th, 2014
                          "The explosion of cloud apps in the enterprise, largely happening outside the CIO's purview, threatens to rattle companies in many ways. Highly regulated companies can find themselves suddenly out of compliance. Business-critical cloud apps can fail to deliver adequate service. Then there's the ever-looming security risk. cloud services broker

                          A swath of market research studies is highlighting this problem:..."

                          vBeers-SF
                          x
                          vBeers @ Broward (Wednesday, May 14th, 2014)
                          First time @ Funky Buddha Brewery, Oakland Park
                          Join us for the next vBeers @ Broward. We meet on the 2nd Wednesday of each month in Broward County. The May meeting will be at the Funky Buddha Brewery, which is located in Oakland Park, just a few minutes from I-95.

                          This will be a non-sponsored event so bring your wallet, your sense of humor and get ready for some great IT and virtualization conversations with some of the best people in South Florida's IT community (including YOU!).

                          Location: Funky Buddha Brewery

                          • Address:1201 NE 38th St, Oakland Park, FL
                          • Date: Wednesday, May 14th
                          • Time: 6pm to Late - arrive and depart any time

                          Please join the vBeers LinkedIn group; Network with fellow vBeers participants on-line.

                          Upcoming vBeers @ South Florida Events:

                          • vBeers @ Broward 2nd Wednesday of Month May 14th
                          • vBeers @ Boca 3rd Wednesday of Month May 21st
                          • vBeers @ Miami 4th Wednesday of Month May 28th

                          Please RSVP at Meetup.com.

                          vBeers @ Broward (Wednesday, May 14th, 2014)
                          First time @ Funky Buddha Brewery, Oakland Park
                          Join us for the next vBeers @ Broward. We meet on the 2nd Wednesday of each month in Broward County. The May meeting will be at the Funky Buddha Brewery, which is located in Oakland Park, just a few minutes from I-95.

                          This will be a non-sponsored event so bring your wallet, your sense of humor and get ready for some great IT and virtualization conversations with some of the best people in South Florida's IT community (including YOU!).

                          Location: Funky Buddha Brewery

                          • Address:1201 NE 38th St, Oakland Park, FL
                          • Date: Wednesday, May 14th
                          • Time: 6pm to Late - arrive and depart any time

                          Please join the vBeers LinkedIn group; Network with fellow vBeers participants on-line.

                          Upcoming vBeers @ South Florida Events:

                          • vBeers @ Broward 2nd Wednesday of Month May 14th
                          • vBeers @ Boca 3rd Wednesday of Month May 21st
                          • vBeers @ Miami 4th Wednesday of Month May 28th

                          Please RSVP at Meetup.com.

                          vBeers @ Broward (Wednesday, May 14th, 2014)
                          First time @ Funky Buddha Brewery, Oakland Park
                          Join us for the next vBeers @ Broward. We meet on the 2nd Wednesday of each month in Broward County. The May meeting will be at the Funky Buddha Brewery, which is located in Oakland Park, just a few minutes from I-95.

                          This will be a non-sponsored event so bring your wallet, your sense of humor and get ready for some great IT and virtualization conversations with some of the best people in South Florida's IT community (including YOU!).

                          Location: Funky Buddha Brewery

                          • Address:1201 NE 38th St, Oakland Park, FL
                          • Date: Wednesday, May 14th
                          • Time: 6pm to Late - arrive and depart any time

                          Please join the vBeers LinkedIn group; Network with fellow vBeers participants on-line.

                          Upcoming vBeers @ South Florida Events:

                          • vBeers @ Broward 2nd Wednesday of Month May 14th
                          • vBeers @ Boca 3rd Wednesday of Month May 21st
                          • vBeers @ Miami 4th Wednesday of Month May 28th

                          Please RSVP at Meetup.com.

                          IT - Networks
                          x
                          Are Your Pipes too Big?
                          Network World, May 6th, 2014
                          "A few years ago, I was involved in a consulting project with a large company in the healthcare industry that was in the middle of a data center migration. After the networks and servers were stood up at the new location they needed to migrate massive amounts of data in bulk so the company secured a pair of OC192 circuits, providing nearly 10Gbps of throughput in each direction on each circuit.

                          Everything seemed to be in order, so they began transferring data. To their surprise, they were only seeing throughput in the tens of megabits per second..."

                          Are Your Pipes too Big?
                          Network World, May 6th, 2014
                          "A few years ago, I was involved in a consulting project with a large company in the healthcare industry that was in the middle of a data center migration. After the networks and servers were stood up at the new location they needed to migrate massive amounts of data in bulk so the company secured a pair of OC192 circuits, providing nearly 10Gbps of throughput in each direction on each circuit.

                          Everything seemed to be in order, so they began transferring data. To their surprise, they were only seeing throughput in the tens of megabits per second..."

                          Are Your Pipes too Big?
                          Network World, May 6th, 2014
                          "A few years ago, I was involved in a consulting project with a large company in the healthcare industry that was in the middle of a data center migration. After the networks and servers were stood up at the new location they needed to migrate massive amounts of data in bulk so the company secured a pair of OC192 circuits, providing nearly 10Gbps of throughput in each direction on each circuit.

                          Everything seemed to be in order, so they began transferring data. To their surprise, they were only seeing throughput in the tens of megabits per second..."

                          Will Cat 8 Cabling Force A Topology Change In The Data Center?
                          Data Center Knowledge, May 6th, 2014
                          "Work is advancing fast on Category 8 copper cabling which will find its applications primarily in data centers. Like its predecessors, this 'BASE-T' will be later to market than its co-ax and fiber-based competitors, but when it arrives, it will rapidly displace them because of its far lower cost.

                          Cat 8 will become the mainstream technology for rack-level interconnect in the data center. However, unlike earlier gigabit and 10-gigabit technologies it will not have a 328 feet (100 meters) range and so it will not support centralized switching with passive patch-panels at row level, except in smaller server rooms. This column explains how data center network topologies will need to change to take advantage of this new low cost 40Gb/s connectivity..."

                          Will Cat 8 Cabling Force A Topology Change In The Data Center?
                          Data Center Knowledge, May 6th, 2014
                          "Work is advancing fast on Category 8 copper cabling which will find its applications primarily in data centers. Like its predecessors, this 'BASE-T' will be later to market than its co-ax and fiber-based competitors, but when it arrives, it will rapidly displace them because of its far lower cost.

                          Cat 8 will become the mainstream technology for rack-level interconnect in the data center. However, unlike earlier gigabit and 10-gigabit technologies it will not have a 328 feet (100 meters) range and so it will not support centralized switching with passive patch-panels at row level, except in smaller server rooms. This column explains how data center network topologies will need to change to take advantage of this new low cost 40Gb/s connectivity..."

                          Will Cat 8 Cabling Force A Topology Change In The Data Center?
                          Data Center Knowledge, May 6th, 2014
                          "Work is advancing fast on Category 8 copper cabling which will find its applications primarily in data centers. Like its predecessors, this 'BASE-T' will be later to market than its co-ax and fiber-based competitors, but when it arrives, it will rapidly displace them because of its far lower cost.

                          Cat 8 will become the mainstream technology for rack-level interconnect in the data center. However, unlike earlier gigabit and 10-gigabit technologies it will not have a 328 feet (100 meters) range and so it will not support centralized switching with passive patch-panels at row level, except in smaller server rooms. This column explains how data center network topologies will need to change to take advantage of this new low cost 40Gb/s connectivity..."

                          Buy or Build Your Own SDN?
                          Network Computing, May 1st, 2014
                          "An ESG survey shows a broad range of approaches among enterprises when it comes to deploying software-defined networking. A couple of years ago, when software-defined networking was still in its infancy, I polled a half dozen or so network managers at enterprise locations to gauge their preference for consuming SDN technologies. Did they want to buy a complete SDN solution from a vendor or build their own?..."
                          Buy or Build Your Own SDN?
                          Network Computing, May 1st, 2014
                          "An ESG survey shows a broad range of approaches among enterprises when it comes to deploying software-defined networking. A couple of years ago, when software-defined networking was still in its infancy, I polled a half dozen or so network managers at enterprise locations to gauge their preference for consuming SDN technologies. Did they want to buy a complete SDN solution from a vendor or build their own?..."
                          Buy or Build Your Own SDN?
                          Network Computing, May 1st, 2014
                          "An ESG survey shows a broad range of approaches among enterprises when it comes to deploying software-defined networking. A couple of years ago, when software-defined networking was still in its infancy, I polled a half dozen or so network managers at enterprise locations to gauge their preference for consuming SDN technologies. Did they want to buy a complete SDN solution from a vendor or build their own?..."
                          SDN secrets of Amazon and Google
                          InfoWorld, May 7th, 2014
                          "Those seriously considering SDN (software-defined networking) must continually adjust to the new definitions, technologies, and possibilities presented by this fundamental shift in networking technology. Everyone would like a clearer view of where SDN is heading -- so why not examine what the early adopters are doing, many of them with the largest infrastructures around?

                          In this week's New Tech Forum, Chloe Ma, director at Juniper Networks, takes us on a tour of how massive-scale service providers are using SDN, all the way from Amazon Web Services to Google's software-defined WAN technologies..."

                          SDN secrets of Amazon and Google
                          InfoWorld, May 7th, 2014
                          "Those seriously considering SDN (software-defined networking) must continually adjust to the new definitions, technologies, and possibilities presented by this fundamental shift in networking technology. Everyone would like a clearer view of where SDN is heading -- so why not examine what the early adopters are doing, many of them with the largest infrastructures around?

                          In this week's New Tech Forum, Chloe Ma, director at Juniper Networks, takes us on a tour of how massive-scale service providers are using SDN, all the way from Amazon Web Services to Google's software-defined WAN technologies..."

                          SDN secrets of Amazon and Google
                          InfoWorld, May 7th, 2014
                          "Those seriously considering SDN (software-defined networking) must continually adjust to the new definitions, technologies, and possibilities presented by this fundamental shift in networking technology. Everyone would like a clearer view of where SDN is heading -- so why not examine what the early adopters are doing, many of them with the largest infrastructures around?

                          In this week's New Tech Forum, Chloe Ma, director at Juniper Networks, takes us on a tour of how massive-scale service providers are using SDN, all the way from Amazon Web Services to Google's software-defined WAN technologies..."

                          The Software Defined Enterprise WAN Is Now A Business Imperative
                          Network World, April 30th, 2014
                          "It seems that we in the networking industry have been talking about evolving the WAN for well over 20 years now. The traditional 'hub and spoke' WAN that we've all grown accustomed to was ideally suited for client/server computing, where users were in branches and applications were located in the data center.

                          Over the years there have been small, incremental changes to the WAN that have improved the performance and security of the network. MPLS is now the de facto standard instead of frame-relay and WAN optimization has become a core service for many organizations. These changes did indeed improve the WAN marginally, but it's time to overhaul and re-architect the WAN..."

                          The Software Defined Enterprise WAN Is Now A Business Imperative
                          Network World, April 30th, 2014
                          "It seems that we in the networking industry have been talking about evolving the WAN for well over 20 years now. The traditional 'hub and spoke' WAN that we've all grown accustomed to was ideally suited for client/server computing, where users were in branches and applications were located in the data center.

                          Over the years there have been small, incremental changes to the WAN that have improved the performance and security of the network. MPLS is now the de facto standard instead of frame-relay and WAN optimization has become a core service for many organizations. These changes did indeed improve the WAN marginally, but it's time to overhaul and re-architect the WAN..."

                          The Software Defined Enterprise WAN Is Now A Business Imperative
                          Network World, April 30th, 2014
                          "It seems that we in the networking industry have been talking about evolving the WAN for well over 20 years now. The traditional 'hub and spoke' WAN that we've all grown accustomed to was ideally suited for client/server computing, where users were in branches and applications were located in the data center.

                          Over the years there have been small, incremental changes to the WAN that have improved the performance and security of the network. MPLS is now the de facto standard instead of frame-relay and WAN optimization has become a core service for many organizations. These changes did indeed improve the WAN marginally, but it's time to overhaul and re-architect the WAN..."

                          6 Free Network Vulnerability Scanners
                          Network World, April 29th, 2014
                          "Though you may know and follow basic security measures on your own when installing and managing your network and websites, you'll never be able to keep up with and catch all the vulnerabilities by yourself.

                          Vulnerability scanners can help you automate security auditing and can play a crucial part in your IT security. They can scan your network and websites for up to thousands of different security risks, producing a prioritized list of those you should patch, describe the vulnerabilities, and give steps on how to remediate them. Some can even automate the patching process..."

                          6 Free Network Vulnerability Scanners
                          Network World, April 29th, 2014
                          "Though you may know and follow basic security measures on your own when installing and managing your network and websites, you'll never be able to keep up with and catch all the vulnerabilities by yourself.

                          Vulnerability scanners can help you automate security auditing and can play a crucial part in your IT security. They can scan your network and websites for up to thousands of different security risks, producing a prioritized list of those you should patch, describe the vulnerabilities, and give steps on how to remediate them. Some can even automate the patching process..."

                          6 Free Network Vulnerability Scanners
                          Network World, April 29th, 2014
                          "Though you may know and follow basic security measures on your own when installing and managing your network and websites, you'll never be able to keep up with and catch all the vulnerabilities by yourself.

                          Vulnerability scanners can help you automate security auditing and can play a crucial part in your IT security. They can scan your network and websites for up to thousands of different security risks, producing a prioritized list of those you should patch, describe the vulnerabilities, and give steps on how to remediate them. Some can even automate the patching process..."

                          IT - Operations
                          x
                          10 Reasons Why Legacy Apps are Doomed
                          TechRepublic, May 1th, 2014
                          "Escalating support costs, lengthy rollouts, vendor lock-in, and problems adapting to today's mobile world... is it time to retire your aging enterprise software?

                          Thanks to factors like cloud computing, increasing costs, and changing end-user demands, many IT shops are reconsidering their legacy applications. Here are 10 reasons why their days are numbered..."

                          10 Reasons Why Legacy Apps are Doomed
                          TechRepublic, May 1th, 2014
                          "Escalating support costs, lengthy rollouts, vendor lock-in, and problems adapting to today's mobile world... is it time to retire your aging enterprise software?

                          Thanks to factors like cloud computing, increasing costs, and changing end-user demands, many IT shops are reconsidering their legacy applications. Here are 10 reasons why their days are numbered..."

                          10 Reasons Why Legacy Apps are Doomed
                          TechRepublic, May 1th, 2014
                          "Escalating support costs, lengthy rollouts, vendor lock-in, and problems adapting to today's mobile world... is it time to retire your aging enterprise software?

                          Thanks to factors like cloud computing, increasing costs, and changing end-user demands, many IT shops are reconsidering their legacy applications. Here are 10 reasons why their days are numbered..."

                          Forget Hackers, A Virtual Administrator is More Dangerous
                          SearchServerVirtualization, May 5th, 2014
                          "A virtual administrator may pose the greatest risk to your company, and we have to look to the IT managers and executives to find out why they allowed and enabled this potential security risk to develop.

                          As companies continue to virtualize, the traditional data center roles are merging..."

                          Forget Hackers, A Virtual Administrator is More Dangerous
                          SearchServerVirtualization, May 5th, 2014
                          "A virtual administrator may pose the greatest risk to your company, and we have to look to the IT managers and executives to find out why they allowed and enabled this potential security risk to develop.

                          As companies continue to virtualize, the traditional data center roles are merging..."

                          Forget Hackers, A Virtual Administrator is More Dangerous
                          SearchServerVirtualization, May 5th, 2014
                          "A virtual administrator may pose the greatest risk to your company, and we have to look to the IT managers and executives to find out why they allowed and enabled this potential security risk to develop.

                          As companies continue to virtualize, the traditional data center roles are merging..."

                          In A World Of Complexity, Focus On The Basics
                          CSO Online, May 1st, 2014
                          "Tony Sager has not only witnessed the revolutionary change in cybersecurity over the past several decades - he has lived it, through several decades with the National Security Agency (NSA).

                          The most significant, he says, is the transformation of cybersecurity from a government monopoly to a vast marketplace of threats, enemies, defensive tools and solutions that are far too complex for any one organization or institution to manage. The only hope, he said, is simplification and collaboration..."

                          In A World Of Complexity, Focus On The Basics
                          CSO Online, May 1st, 2014
                          "Tony Sager has not only witnessed the revolutionary change in cybersecurity over the past several decades - he has lived it, through several decades with the National Security Agency (NSA).

                          The most significant, he says, is the transformation of cybersecurity from a government monopoly to a vast marketplace of threats, enemies, defensive tools and solutions that are far too complex for any one organization or institution to manage. The only hope, he said, is simplification and collaboration..."

                          In A World Of Complexity, Focus On The Basics
                          CSO Online, May 1st, 2014
                          "Tony Sager has not only witnessed the revolutionary change in cybersecurity over the past several decades - he has lived it, through several decades with the National Security Agency (NSA).

                          The most significant, he says, is the transformation of cybersecurity from a government monopoly to a vast marketplace of threats, enemies, defensive tools and solutions that are far too complex for any one organization or institution to manage. The only hope, he said, is simplification and collaboration..."

                          Inside United Airlines' Nerve Center
                          Network World, May 7th, 2014
                          "When Tracy Lee talks about the weather he's not just making idle conversation.

                          The talk probably has to do with one of the 1,800 daily flights United Airlines operates, all overseen from the 27th floor of the Willis (formerly Sears) Tower in downtown Chicago, which houses United's network operations center (NOC.) Lee, vice president of network operations at United, calls the NOC 'mission control'..."

                            Inside United Airlines' Nerve Center
                            Network World, May 7th, 2014
                            "When Tracy Lee talks about the weather he's not just making idle conversation.

                            The talk probably has to do with one of the 1,800 daily flights United Airlines operates, all overseen from the 27th floor of the Willis (formerly Sears) Tower in downtown Chicago, which houses United's network operations center (NOC.) Lee, vice president of network operations at United, calls the NOC 'mission control'..."

                              Inside United Airlines' Nerve Center
                              Network World, May 7th, 2014
                              "When Tracy Lee talks about the weather he's not just making idle conversation.

                              The talk probably has to do with one of the 1,800 daily flights United Airlines operates, all overseen from the 27th floor of the Willis (formerly Sears) Tower in downtown Chicago, which houses United's network operations center (NOC.) Lee, vice president of network operations at United, calls the NOC 'mission control'..."

                                The Devastating Effect of Core Systems Downtime on Business
                                Help Net Security, May 1st, 2014
                                "A survey of 283 IT professionals and business end users found that nearly 90 percent of organizations unexpectedly lose access to critical systems, including mail servers, back-end processors, and file servers, and almost a third deal with downtime issues at least once a month, Globalscape has revealed at Infosecurity Europe 2014..."
                                  The Devastating Effect of Core Systems Downtime on Business
                                  Help Net Security, May 1st, 2014
                                  "A survey of 283 IT professionals and business end users found that nearly 90 percent of organizations unexpectedly lose access to critical systems, including mail servers, back-end processors, and file servers, and almost a third deal with downtime issues at least once a month, Globalscape has revealed at Infosecurity Europe 2014..."
                                    The Devastating Effect of Core Systems Downtime on Business
                                    Help Net Security, May 1st, 2014
                                    "A survey of 283 IT professionals and business end users found that nearly 90 percent of organizations unexpectedly lose access to critical systems, including mail servers, back-end processors, and file servers, and almost a third deal with downtime issues at least once a month, Globalscape has revealed at Infosecurity Europe 2014..."
                                      Research Reveals Huge Appetite for IT Outsourcing
                                      ComputerWeekly, May 7th, 2014
                                      "More than three quarters of Europe's big businesses will either outsource more IT spending this year or continue with current amount, while just 10% plan to reduce IT outsourcing, according to research.

                                      The study of 1,300 businesses in Europe from Whitelane Research revealed that 42% of organisations will outsource more IT in 2014 compared to 2013 and 36% will outsource the same amount. Only 10% said they will outsource less IT and 12% said they currently don't outsource IT..."

                                      Research Reveals Huge Appetite for IT Outsourcing
                                      ComputerWeekly, May 7th, 2014
                                      "More than three quarters of Europe's big businesses will either outsource more IT spending this year or continue with current amount, while just 10% plan to reduce IT outsourcing, according to research.

                                      The study of 1,300 businesses in Europe from Whitelane Research revealed that 42% of organisations will outsource more IT in 2014 compared to 2013 and 36% will outsource the same amount. Only 10% said they will outsource less IT and 12% said they currently don't outsource IT..."

                                      Research Reveals Huge Appetite for IT Outsourcing
                                      ComputerWeekly, May 7th, 2014
                                      "More than three quarters of Europe's big businesses will either outsource more IT spending this year or continue with current amount, while just 10% plan to reduce IT outsourcing, according to research.

                                      The study of 1,300 businesses in Europe from Whitelane Research revealed that 42% of organisations will outsource more IT in 2014 compared to 2013 and 36% will outsource the same amount. Only 10% said they will outsource less IT and 12% said they currently don't outsource IT..."

                                      IT - Security
                                      x
                                      FTC Told To Disclose the Data Security Standards It Uses for Breach Enforcement
                                      ComputerWorld, May 2nd, 2014
                                      "The Federal Trade Commission (FTC) can be compelled to disclose details of the data security standards it uses to pursue enforcement action against companies that suffer data breaches, the agency's chief administrative law judge ruled Thursday.

                                      The decision came in response to a motion filed by LabMD, a now-defunct medical laboratory that has been charged by the FTC with unfair trade practices for exposing sensitive information belonging to 10,000 patients in 2010..."

                                      FTC Told To Disclose the Data Security Standards It Uses for Breach Enforcement
                                      ComputerWorld, May 2nd, 2014
                                      "The Federal Trade Commission (FTC) can be compelled to disclose details of the data security standards it uses to pursue enforcement action against companies that suffer data breaches, the agency's chief administrative law judge ruled Thursday.

                                      The decision came in response to a motion filed by LabMD, a now-defunct medical laboratory that has been charged by the FTC with unfair trade practices for exposing sensitive information belonging to 10,000 patients in 2010..."

                                      FTC Told To Disclose the Data Security Standards It Uses for Breach Enforcement
                                      ComputerWorld, May 2nd, 2014
                                      "The Federal Trade Commission (FTC) can be compelled to disclose details of the data security standards it uses to pursue enforcement action against companies that suffer data breaches, the agency's chief administrative law judge ruled Thursday.

                                      The decision came in response to a motion filed by LabMD, a now-defunct medical laboratory that has been charged by the FTC with unfair trade practices for exposing sensitive information belonging to 10,000 patients in 2010..."

                                      IoT Security Requirements Will Reshape Over Half of Global Enterprise IT Security Programs by 2020: Gartner
                                      Information Week, May 5th, 2014
                                      "The power of objects in the Internet of Things (IoT) to change the state of environments - in addition to generating information - will cause chief information security officers (CISOs) to redefine the scope of their security efforts beyond present responsibilities, according to Gartner.

                                      Gartner predicts that IoT security requirements will reshape and expand over half of all global enterprise IT security programs by 2020 due to changes in supported platform and service scale, diversity and function..."

                                      IoT Security Requirements Will Reshape Over Half of Global Enterprise IT Security Programs by 2020: Gartner
                                      Information Week, May 5th, 2014
                                      "The power of objects in the Internet of Things (IoT) to change the state of environments - in addition to generating information - will cause chief information security officers (CISOs) to redefine the scope of their security efforts beyond present responsibilities, according to Gartner.

                                      Gartner predicts that IoT security requirements will reshape and expand over half of all global enterprise IT security programs by 2020 due to changes in supported platform and service scale, diversity and function..."

                                      IoT Security Requirements Will Reshape Over Half of Global Enterprise IT Security Programs by 2020: Gartner
                                      Information Week, May 5th, 2014
                                      "The power of objects in the Internet of Things (IoT) to change the state of environments - in addition to generating information - will cause chief information security officers (CISOs) to redefine the scope of their security efforts beyond present responsibilities, according to Gartner.

                                      Gartner predicts that IoT security requirements will reshape and expand over half of all global enterprise IT security programs by 2020 due to changes in supported platform and service scale, diversity and function..."

                                      How to Avoid Sloppy Authentication
                                      Dark Reading, May 5th, 2014
                                      "Viewing authentication as a process, not simply as an encryption or algorithm, is the key to defending corporate resources from attacks.

                                      It's always obvious in hindsight review of the impact of a major bug like Heartbleed that something was missed. Hackers like it when the authentication deployment and security experts build sloppy authentication. The sloppiness generates vulnerabilities and thus the vector(s) for attack..."

                                      How to Avoid Sloppy Authentication
                                      Dark Reading, May 5th, 2014
                                      "Viewing authentication as a process, not simply as an encryption or algorithm, is the key to defending corporate resources from attacks.

                                      It's always obvious in hindsight review of the impact of a major bug like Heartbleed that something was missed. Hackers like it when the authentication deployment and security experts build sloppy authentication. The sloppiness generates vulnerabilities and thus the vector(s) for attack..."

                                      How to Avoid Sloppy Authentication
                                      Dark Reading, May 5th, 2014
                                      "Viewing authentication as a process, not simply as an encryption or algorithm, is the key to defending corporate resources from attacks.

                                      It's always obvious in hindsight review of the impact of a major bug like Heartbleed that something was missed. Hackers like it when the authentication deployment and security experts build sloppy authentication. The sloppiness generates vulnerabilities and thus the vector(s) for attack..."

                                      Data Breaches 9% More Costly in 2013 Than Year Before
                                      Network World, May 5th, 2014
                                      "It cost U.S. companies hit by data breaches last year an average of $5.4 million to cope with the after-effects - up 9% from the year before, according to the ninth annual Ponemon Institute study published Monday.

                                      On average, it cost $201 per record lost, up from the $188 the year before..."

                                        Data Breaches 9% More Costly in 2013 Than Year Before
                                        Network World, May 5th, 2014
                                        "It cost U.S. companies hit by data breaches last year an average of $5.4 million to cope with the after-effects - up 9% from the year before, according to the ninth annual Ponemon Institute study published Monday.

                                        On average, it cost $201 per record lost, up from the $188 the year before..."

                                          Data Breaches 9% More Costly in 2013 Than Year Before
                                          Network World, May 5th, 2014
                                          "It cost U.S. companies hit by data breaches last year an average of $5.4 million to cope with the after-effects - up 9% from the year before, according to the ninth annual Ponemon Institute study published Monday.

                                          On average, it cost $201 per record lost, up from the $188 the year before..."

                                            Federating Identity will Slow Personal Information Leaks
                                            GCN, May 2nd, 2014
                                            "The heartbleed vulnerability, which can leak sensitive data from supposedly secure Web connections, exposes the limits of using one-off credentials that must be authenticated separately for each transaction. Attack surfaces are greatly expanded when personally identifiable information (PII) is maintained by every agency and Web site offering online services..."
                                              Federating Identity will Slow Personal Information Leaks
                                              GCN, May 2nd, 2014
                                              "The heartbleed vulnerability, which can leak sensitive data from supposedly secure Web connections, exposes the limits of using one-off credentials that must be authenticated separately for each transaction. Attack surfaces are greatly expanded when personally identifiable information (PII) is maintained by every agency and Web site offering online services..."
                                                Federating Identity will Slow Personal Information Leaks
                                                GCN, May 2nd, 2014
                                                "The heartbleed vulnerability, which can leak sensitive data from supposedly secure Web connections, exposes the limits of using one-off credentials that must be authenticated separately for each transaction. Attack surfaces are greatly expanded when personally identifiable information (PII) is maintained by every agency and Web site offering online services..."
                                                  Security Admins and Executives: We Hardly Talk Anymore
                                                  Network World, May 2nd, 2014
                                                  "At this past year's RSA Conference, I was the moderator on a panel about "Security Metrics: What matters?" One of the participants was my friend Jody Brazil, President of Firemon. Jody referenced a new survey that Firemon had partnered with the Ponemon Institutue about security metrics and the interaction between security teams and executives..."
                                                  Security Admins and Executives: We Hardly Talk Anymore
                                                  Network World, May 2nd, 2014
                                                  "At this past year's RSA Conference, I was the moderator on a panel about "Security Metrics: What matters?" One of the participants was my friend Jody Brazil, President of Firemon. Jody referenced a new survey that Firemon had partnered with the Ponemon Institutue about security metrics and the interaction between security teams and executives..."
                                                  Security Admins and Executives: We Hardly Talk Anymore
                                                  Network World, May 2nd, 2014
                                                  "At this past year's RSA Conference, I was the moderator on a panel about "Security Metrics: What matters?" One of the participants was my friend Jody Brazil, President of Firemon. Jody referenced a new survey that Firemon had partnered with the Ponemon Institutue about security metrics and the interaction between security teams and executives..."
                                                  Silicon Valley Defies Subpoena Secrecy Requests, but National Security Gag Orders Remain
                                                  ZDNet, May 2nd, 2014
                                                  "Silicon Valley tech giants have reportedly begun notifying users of data requests by government authorities under subpoena, despite requests by the government to retain a level of secrecy.

                                                  Reported by The Washington Post on Thursday, Apple, Facebook, Google, Microsoft and Yahoo have updated their policies to notify users of a data request unless a judge or other competent authority issues a gag order..."

                                                  Silicon Valley Defies Subpoena Secrecy Requests, but National Security Gag Orders Remain
                                                  ZDNet, May 2nd, 2014
                                                  "Silicon Valley tech giants have reportedly begun notifying users of data requests by government authorities under subpoena, despite requests by the government to retain a level of secrecy.

                                                  Reported by The Washington Post on Thursday, Apple, Facebook, Google, Microsoft and Yahoo have updated their policies to notify users of a data request unless a judge or other competent authority issues a gag order..."

                                                  Silicon Valley Defies Subpoena Secrecy Requests, but National Security Gag Orders Remain
                                                  ZDNet, May 2nd, 2014
                                                  "Silicon Valley tech giants have reportedly begun notifying users of data requests by government authorities under subpoena, despite requests by the government to retain a level of secrecy.

                                                  Reported by The Washington Post on Thursday, Apple, Facebook, Google, Microsoft and Yahoo have updated their policies to notify users of a data request unless a judge or other competent authority issues a gag order..."

                                                  The Internet of Things Likely to Drive an Upheaval for Security
                                                  ComputerWorld, May 2nd, 2014
                                                  "Analyst firm Gartner expects the Internet of Things (IoT) to drive a convergence of IT, physical and industrial control security practices over the next several years.

                                                  Much of the convergence will result from the sheer heterogeneity and number of devices that will become Internet-enabled by 2020. Current estimates range from Gartner's 26 billion devices to IDC's mind-boggling projection of 212 billion installed devices..."

                                                  The Internet of Things Likely to Drive an Upheaval for Security
                                                  ComputerWorld, May 2nd, 2014
                                                  "Analyst firm Gartner expects the Internet of Things (IoT) to drive a convergence of IT, physical and industrial control security practices over the next several years.

                                                  Much of the convergence will result from the sheer heterogeneity and number of devices that will become Internet-enabled by 2020. Current estimates range from Gartner's 26 billion devices to IDC's mind-boggling projection of 212 billion installed devices..."

                                                  The Internet of Things Likely to Drive an Upheaval for Security
                                                  ComputerWorld, May 2nd, 2014
                                                  "Analyst firm Gartner expects the Internet of Things (IoT) to drive a convergence of IT, physical and industrial control security practices over the next several years.

                                                  Much of the convergence will result from the sheer heterogeneity and number of devices that will become Internet-enabled by 2020. Current estimates range from Gartner's 26 billion devices to IDC's mind-boggling projection of 212 billion installed devices..."

                                                  Why You Need to Pay Attention to How People Use Your Systems
                                                  CSO Online, May 2nd, 2014
                                                  "As attackers continue their quest for credentials, you need to know what normal usage looks like in order to realize when something isn't right

                                                  Behavioral analysis was the hot concept back in the late 90s. Except that the approach never really worked well enough to adopt; even folks slave to routine managed to disrupt the baseline pattern wide enough to drive a truck through it..."

                                                  Why You Need to Pay Attention to How People Use Your Systems
                                                  CSO Online, May 2nd, 2014
                                                  "As attackers continue their quest for credentials, you need to know what normal usage looks like in order to realize when something isn't right

                                                  Behavioral analysis was the hot concept back in the late 90s. Except that the approach never really worked well enough to adopt; even folks slave to routine managed to disrupt the baseline pattern wide enough to drive a truck through it..."

                                                  Why You Need to Pay Attention to How People Use Your Systems
                                                  CSO Online, May 2nd, 2014
                                                  "As attackers continue their quest for credentials, you need to know what normal usage looks like in order to realize when something isn't right

                                                  Behavioral analysis was the hot concept back in the late 90s. Except that the approach never really worked well enough to adopt; even folks slave to routine managed to disrupt the baseline pattern wide enough to drive a truck through it..."

                                                  With Heartbleed, Suddenly the World is Paying Attention to Security
                                                  ComputerWorld, May 7th, 2014
                                                  "Heartbleed. Internet Explorer vulnerability in Flash player. Security is in the news.

                                                  Suddenly I'm getting swamped with requests for information from people at work who never used to care about what I do. They are hearing about these vulnerabilities on the mainstream news, getting scared, and coming to me for advice. Is this good or bad?..."

                                                  With Heartbleed, Suddenly the World is Paying Attention to Security
                                                  ComputerWorld, May 7th, 2014
                                                  "Heartbleed. Internet Explorer vulnerability in Flash player. Security is in the news.

                                                  Suddenly I'm getting swamped with requests for information from people at work who never used to care about what I do. They are hearing about these vulnerabilities on the mainstream news, getting scared, and coming to me for advice. Is this good or bad?..."

                                                  With Heartbleed, Suddenly the World is Paying Attention to Security
                                                  ComputerWorld, May 7th, 2014
                                                  "Heartbleed. Internet Explorer vulnerability in Flash player. Security is in the news.

                                                  Suddenly I'm getting swamped with requests for information from people at work who never used to care about what I do. They are hearing about these vulnerabilities on the mainstream news, getting scared, and coming to me for advice. Is this good or bad?..."

                                                  IT - Careers
                                                  x
                                                  The IT Jobs Employers can't Fill -- And You Should Go After
                                                  InfoWorld, May 8th, 2014
                                                  "If you look at data from across the Web, most companies are looking for IT pros with specific experience -- the more the better, but with everyone chasing the same talent, some areas of IT are downright difficult to fill.

                                                  Recently, TEKsystems conducted a survey of 244 CIOs, CTOs, and other senior IT professionals. These IT decision-makers spanned industries that include technology, financial services, healthcare, manufacturing, government, and professional services representing business large and small..."

                                                  The IT Jobs Employers can't Fill -- And You Should Go After
                                                  InfoWorld, May 8th, 2014
                                                  "If you look at data from across the Web, most companies are looking for IT pros with specific experience -- the more the better, but with everyone chasing the same talent, some areas of IT are downright difficult to fill.

                                                  Recently, TEKsystems conducted a survey of 244 CIOs, CTOs, and other senior IT professionals. These IT decision-makers spanned industries that include technology, financial services, healthcare, manufacturing, government, and professional services representing business large and small..."

                                                  The IT Jobs Employers can't Fill -- And You Should Go After
                                                  InfoWorld, May 8th, 2014
                                                  "If you look at data from across the Web, most companies are looking for IT pros with specific experience -- the more the better, but with everyone chasing the same talent, some areas of IT are downright difficult to fill.

                                                  Recently, TEKsystems conducted a survey of 244 CIOs, CTOs, and other senior IT professionals. These IT decision-makers spanned industries that include technology, financial services, healthcare, manufacturing, government, and professional services representing business large and small..."

                                                  4 'impossible' IT hiring scenarios (and how to beat them)
                                                  CIO, May 6th, 2014
                                                  "A recruiter would never think to approach a CIO and advise him or her on cloud storage technology. They don't have the technical knowledge, experience or skills to act as a trusted advisor in that role.

                                                  However, all too often, CIOs, hiring managers and executives do just that -- approach recruiters and human resources professionals with specifications, demands and requirements for filling open positions that may have no basis in reality..."

                                                  4 'impossible' IT hiring scenarios (and how to beat them)
                                                  CIO, May 6th, 2014
                                                  "A recruiter would never think to approach a CIO and advise him or her on cloud storage technology. They don't have the technical knowledge, experience or skills to act as a trusted advisor in that role.

                                                  However, all too often, CIOs, hiring managers and executives do just that -- approach recruiters and human resources professionals with specifications, demands and requirements for filling open positions that may have no basis in reality..."

                                                  4 'impossible' IT hiring scenarios (and how to beat them)
                                                  CIO, May 6th, 2014
                                                  "A recruiter would never think to approach a CIO and advise him or her on cloud storage technology. They don't have the technical knowledge, experience or skills to act as a trusted advisor in that role.

                                                  However, all too often, CIOs, hiring managers and executives do just that -- approach recruiters and human resources professionals with specifications, demands and requirements for filling open positions that may have no basis in reality..."

                                                  5 Things Super Lucky People Do
                                                  Inc., May 5th, 2014
                                                  "I have witnessed people excuse their own inadequacies by crediting the success of others to luck. Salespeople I know disparage their more successful competitors as lucky. If those salespeople would make as many calls or work as many hours as their competitors, they would realize that their probability of closing is fairly equal. The competitors are simply swinging the bat more often.

                                                  The truth is that seemingly lucky people are opportunists..."

                                                    5 Things Super Lucky People Do
                                                    Inc., May 5th, 2014
                                                    "I have witnessed people excuse their own inadequacies by crediting the success of others to luck. Salespeople I know disparage their more successful competitors as lucky. If those salespeople would make as many calls or work as many hours as their competitors, they would realize that their probability of closing is fairly equal. The competitors are simply swinging the bat more often.

                                                    The truth is that seemingly lucky people are opportunists..."

                                                      5 Things Super Lucky People Do
                                                      Inc., May 5th, 2014
                                                      "I have witnessed people excuse their own inadequacies by crediting the success of others to luck. Salespeople I know disparage their more successful competitors as lucky. If those salespeople would make as many calls or work as many hours as their competitors, they would realize that their probability of closing is fairly equal. The competitors are simply swinging the bat more often.

                                                      The truth is that seemingly lucky people are opportunists..."

                                                        No Reasonable Expectation of Privacy When Third Parties Cross the Creepy Line?
                                                        Network World, May 5th, 2014
                                                        "There's a 'creepy line' when tech conveniences and capabilities seem to push too far into privacy rights; yet not everyone can be trusted to decide whether or not new technology used by the government crosses the 'creepy line' and if Fourth Amendment protections should kick in. That includes SCOTUS, according to a former DHS official, who reduced the Supreme Court Justices to 'nine Baby Boomers' who wouldn't know the 'creepy line' if it bit them on the butt..."
                                                          No Reasonable Expectation of Privacy When Third Parties Cross the Creepy Line?
                                                          Network World, May 5th, 2014
                                                          "There's a 'creepy line' when tech conveniences and capabilities seem to push too far into privacy rights; yet not everyone can be trusted to decide whether or not new technology used by the government crosses the 'creepy line' and if Fourth Amendment protections should kick in. That includes SCOTUS, according to a former DHS official, who reduced the Supreme Court Justices to 'nine Baby Boomers' who wouldn't know the 'creepy line' if it bit them on the butt..."
                                                            No Reasonable Expectation of Privacy When Third Parties Cross the Creepy Line?
                                                            Network World, May 5th, 2014
                                                            "There's a 'creepy line' when tech conveniences and capabilities seem to push too far into privacy rights; yet not everyone can be trusted to decide whether or not new technology used by the government crosses the 'creepy line' and if Fourth Amendment protections should kick in. That includes SCOTUS, according to a former DHS official, who reduced the Supreme Court Justices to 'nine Baby Boomers' who wouldn't know the 'creepy line' if it bit them on the butt..."
                                                              Prosper by Making Time Every Day to Just Think
                                                              Information Management, May 8th, 2014
                                                              "If your typical day resembles the one that most of us experience in the corporate environment, it's a series of meetings interspersed with a series of transactional exchanges that might be better described as interruptions.

                                                              There's little of that elusive and precious asset called 'quality time' on our calendars or in our days. The steady drumbeat of deadlines is constantly playing in our minds and at times, it feels like there's a fire to fight around every corner. When we're given the opportunity to be creative, it's often in forced marches through meetings with the labels of 'planning' or 'brainstorming'..."

                                                                Prosper by Making Time Every Day to Just Think
                                                                Information Management, May 8th, 2014
                                                                "If your typical day resembles the one that most of us experience in the corporate environment, it's a series of meetings interspersed with a series of transactional exchanges that might be better described as interruptions.

                                                                There's little of that elusive and precious asset called 'quality time' on our calendars or in our days. The steady drumbeat of deadlines is constantly playing in our minds and at times, it feels like there's a fire to fight around every corner. When we're given the opportunity to be creative, it's often in forced marches through meetings with the labels of 'planning' or 'brainstorming'..."

                                                                  Prosper by Making Time Every Day to Just Think
                                                                  Information Management, May 8th, 2014
                                                                  "If your typical day resembles the one that most of us experience in the corporate environment, it's a series of meetings interspersed with a series of transactional exchanges that might be better described as interruptions.

                                                                  There's little of that elusive and precious asset called 'quality time' on our calendars or in our days. The steady drumbeat of deadlines is constantly playing in our minds and at times, it feels like there's a fire to fight around every corner. When we're given the opportunity to be creative, it's often in forced marches through meetings with the labels of 'planning' or 'brainstorming'..."

                                                                    Top 12 Tech Hoaxes of All Time
                                                                    InfoWorld, May 8th, 2014
                                                                    "The art of the hoax is woefully underappreciated. Properly executed hoaxes can be creative, cautionary, and (ideally) funny. The Digital Age has muddied the waters, though. Online scams, viral marketing, and even late-night TV gags have blurred the distinctions between hoaxes, pranks, stunts, and outright criminal fraud - so blurred them, in fact, that one might need an expert to distinguish them from one another. Luckily, one such expert exists: Alex Boese, author and curator of The Museum of Hoaxes.According to Boese, a hoax is "a deliberately deceptive act that has succeeded in capturing the attention (and, ideally, the imagination) of the public."

                                                                    We take a look at 12 all-time great hoaxes in tech history..."

                                                                      Top 12 Tech Hoaxes of All Time
                                                                      InfoWorld, May 8th, 2014
                                                                      "The art of the hoax is woefully underappreciated. Properly executed hoaxes can be creative, cautionary, and (ideally) funny. The Digital Age has muddied the waters, though. Online scams, viral marketing, and even late-night TV gags have blurred the distinctions between hoaxes, pranks, stunts, and outright criminal fraud - so blurred them, in fact, that one might need an expert to distinguish them from one another. Luckily, one such expert exists: Alex Boese, author and curator of The Museum of Hoaxes.According to Boese, a hoax is "a deliberately deceptive act that has succeeded in capturing the attention (and, ideally, the imagination) of the public."

                                                                      We take a look at 12 all-time great hoaxes in tech history..."

                                                                        Top 12 Tech Hoaxes of All Time
                                                                        InfoWorld, May 8th, 2014
                                                                        "The art of the hoax is woefully underappreciated. Properly executed hoaxes can be creative, cautionary, and (ideally) funny. The Digital Age has muddied the waters, though. Online scams, viral marketing, and even late-night TV gags have blurred the distinctions between hoaxes, pranks, stunts, and outright criminal fraud - so blurred them, in fact, that one might need an expert to distinguish them from one another. Luckily, one such expert exists: Alex Boese, author and curator of The Museum of Hoaxes.According to Boese, a hoax is "a deliberately deceptive act that has succeeded in capturing the attention (and, ideally, the imagination) of the public."

                                                                        We take a look at 12 all-time great hoaxes in tech history..."

                                                                          Michael Dell's Rules for Winning Startups
                                                                          Inc., May 5th, 2014
                                                                          "People ask me all the time, "How can I become a successful entrepreneur?" And I have to be honest: It's one of my least favorite questions, because if you're waiting for someone else's advice to become an entrepreneur, chances are you're not one.

                                                                          If I'd listened to everyone who told me what I could and couldn't do and why, I'd be writing this column on an IBM PC. For the record, IBM doesn't make PCs any more. I'm using a Dell XPS 15.

                                                                          But there are a few things that distinguish real entrepreneurs, and if you have them, you're starting in the right place..."

                                                                          Michael Dell's Rules for Winning Startups
                                                                          Inc., May 5th, 2014
                                                                          "People ask me all the time, "How can I become a successful entrepreneur?" And I have to be honest: It's one of my least favorite questions, because if you're waiting for someone else's advice to become an entrepreneur, chances are you're not one.

                                                                          If I'd listened to everyone who told me what I could and couldn't do and why, I'd be writing this column on an IBM PC. For the record, IBM doesn't make PCs any more. I'm using a Dell XPS 15.

                                                                          But there are a few things that distinguish real entrepreneurs, and if you have them, you're starting in the right place..."

                                                                          Michael Dell's Rules for Winning Startups
                                                                          Inc., May 5th, 2014
                                                                          "People ask me all the time, "How can I become a successful entrepreneur?" And I have to be honest: It's one of my least favorite questions, because if you're waiting for someone else's advice to become an entrepreneur, chances are you're not one.

                                                                          If I'd listened to everyone who told me what I could and couldn't do and why, I'd be writing this column on an IBM PC. For the record, IBM doesn't make PCs any more. I'm using a Dell XPS 15.

                                                                          But there are a few things that distinguish real entrepreneurs, and if you have them, you're starting in the right place..."

                                                                          IT - Database
                                                                          x
                                                                          Database Performance Tuning: Five Ways for IT to Save the Day
                                                                          SearchDataCenter, May 5th, 2014
                                                                          "When database performance takes a turn for the worse, IT can play the hero.

                                                                          Production database performance can slow dramatically as both data and the business grow. Whenever a key database slows down, widespread business damage can result.

                                                                          Technically, performance can be tackled at many different levels -- applications can be optimized, databases tuned or new architectures built. However, in production, the problem often falls on IT operations to implement something fast and in a minimally disruptive manner.

                                                                          There are some new ways for IT pros to tackle slowdown problems. However, one question must be addressed first: Why is it up to IT?..."

                                                                          Database Performance Tuning: Five Ways for IT to Save the Day
                                                                          SearchDataCenter, May 5th, 2014
                                                                          "When database performance takes a turn for the worse, IT can play the hero.

                                                                          Production database performance can slow dramatically as both data and the business grow. Whenever a key database slows down, widespread business damage can result.

                                                                          Technically, performance can be tackled at many different levels -- applications can be optimized, databases tuned or new architectures built. However, in production, the problem often falls on IT operations to implement something fast and in a minimally disruptive manner.

                                                                          There are some new ways for IT pros to tackle slowdown problems. However, one question must be addressed first: Why is it up to IT?..."

                                                                          Database Performance Tuning: Five Ways for IT to Save the Day
                                                                          SearchDataCenter, May 5th, 2014
                                                                          "When database performance takes a turn for the worse, IT can play the hero.

                                                                          Production database performance can slow dramatically as both data and the business grow. Whenever a key database slows down, widespread business damage can result.

                                                                          Technically, performance can be tackled at many different levels -- applications can be optimized, databases tuned or new architectures built. However, in production, the problem often falls on IT operations to implement something fast and in a minimally disruptive manner.

                                                                          There are some new ways for IT pros to tackle slowdown problems. However, one question must be addressed first: Why is it up to IT?..."

                                                                          MySQL Cookbook, 3rd Edition
                                                                          O'Reilly, May 5th, 2014
                                                                          "With Early Release ebooks, you get books in their earliest form - the author's raw and unedited content as he or she writes - so you can take advantage of these technologies long before the official release of these titles. You'll also receive updates when significant changes are made, new chapters as they're written, and the final ebook bundle.

                                                                          MySQL's popularity has brought a flood of questions about how to solve specific problems, and that's where this Cookbook is essential..."

                                                                          MySQL Cookbook, 3rd Edition
                                                                          O'Reilly, May 5th, 2014
                                                                          "With Early Release ebooks, you get books in their earliest form - the author's raw and unedited content as he or she writes - so you can take advantage of these technologies long before the official release of these titles. You'll also receive updates when significant changes are made, new chapters as they're written, and the final ebook bundle.

                                                                          MySQL's popularity has brought a flood of questions about how to solve specific problems, and that's where this Cookbook is essential..."

                                                                          MySQL Cookbook, 3rd Edition
                                                                          O'Reilly, May 5th, 2014
                                                                          "With Early Release ebooks, you get books in their earliest form - the author's raw and unedited content as he or she writes - so you can take advantage of these technologies long before the official release of these titles. You'll also receive updates when significant changes are made, new chapters as they're written, and the final ebook bundle.

                                                                          MySQL's popularity has brought a flood of questions about how to solve specific problems, and that's where this Cookbook is essential..."

                                                                          IT - Mobile
                                                                          x
                                                                          8 Tips to Improve Mobile Collaboration
                                                                          CIO, April 30th, 2014
                                                                          "According to research firm IDC, the number of mobile workers worldwide is expected to reach 1.3 billion (37.2 percent of the global workforce) by 2015, with more than 153 million of those mobile workers in the United States and Canada.

                                                                          While many organizations now allow employees to use their own mobile devices (smartphones, tablets) at or for work (BYOD), getting workers to regularly communicate and collaborate, with each other as well as the office, via their smartphones or tablets still poses a challenge..."

                                                                          8 Tips to Improve Mobile Collaboration
                                                                          CIO, April 30th, 2014
                                                                          "According to research firm IDC, the number of mobile workers worldwide is expected to reach 1.3 billion (37.2 percent of the global workforce) by 2015, with more than 153 million of those mobile workers in the United States and Canada.

                                                                          While many organizations now allow employees to use their own mobile devices (smartphones, tablets) at or for work (BYOD), getting workers to regularly communicate and collaborate, with each other as well as the office, via their smartphones or tablets still poses a challenge..."

                                                                          8 Tips to Improve Mobile Collaboration
                                                                          CIO, April 30th, 2014
                                                                          "According to research firm IDC, the number of mobile workers worldwide is expected to reach 1.3 billion (37.2 percent of the global workforce) by 2015, with more than 153 million of those mobile workers in the United States and Canada.

                                                                          While many organizations now allow employees to use their own mobile devices (smartphones, tablets) at or for work (BYOD), getting workers to regularly communicate and collaborate, with each other as well as the office, via their smartphones or tablets still poses a challenge..."

                                                                          Got a Mobile Strategy?
                                                                          Business 2 Community, May 1st, 2014
                                                                          "As the mobile revolution picks up speed, everyone from large enterprises to small businesses is feeling the pressure to 'go mobile'.

                                                                          Many already have initiatives underway but if you're just starting out, there's good news. Regardless of your company's size, there is a simple approach to follow for engaging in mobile..."

                                                                            Got a Mobile Strategy?
                                                                            Business 2 Community, May 1st, 2014
                                                                            "As the mobile revolution picks up speed, everyone from large enterprises to small businesses is feeling the pressure to 'go mobile'.

                                                                            Many already have initiatives underway but if you're just starting out, there's good news. Regardless of your company's size, there is a simple approach to follow for engaging in mobile..."

                                                                              Got a Mobile Strategy?
                                                                              Business 2 Community, May 1st, 2014
                                                                              "As the mobile revolution picks up speed, everyone from large enterprises to small businesses is feeling the pressure to 'go mobile'.

                                                                              Many already have initiatives underway but if you're just starting out, there's good news. Regardless of your company's size, there is a simple approach to follow for engaging in mobile..."

                                                                                Should CIOs Use a Carrot or a Stick to Rein In BYOD Workers?
                                                                                CIO, May 6th, 2014
                                                                                "Like the sword of Damocles, the CIO's hand on the mobile kill switch hangs over employees and their BYOD smartphones and tablets. If employees do not adhere to the company's security policy, then their personally bought phones may suffer a terrible fate. To comply or not to comply, that is the BYOD question.

                                                                                Conversely, CIOs can lead BYOD employees to greener security pastures by dangling a stipend in front of them -- that is, the promise of a monthly payment that offsets the cost of the phone bill in return for following the company's mobile device policy..."

                                                                                Should CIOs Use a Carrot or a Stick to Rein In BYOD Workers?
                                                                                CIO, May 6th, 2014
                                                                                "Like the sword of Damocles, the CIO's hand on the mobile kill switch hangs over employees and their BYOD smartphones and tablets. If employees do not adhere to the company's security policy, then their personally bought phones may suffer a terrible fate. To comply or not to comply, that is the BYOD question.

                                                                                Conversely, CIOs can lead BYOD employees to greener security pastures by dangling a stipend in front of them -- that is, the promise of a monthly payment that offsets the cost of the phone bill in return for following the company's mobile device policy..."

                                                                                Should CIOs Use a Carrot or a Stick to Rein In BYOD Workers?
                                                                                CIO, May 6th, 2014
                                                                                "Like the sword of Damocles, the CIO's hand on the mobile kill switch hangs over employees and their BYOD smartphones and tablets. If employees do not adhere to the company's security policy, then their personally bought phones may suffer a terrible fate. To comply or not to comply, that is the BYOD question.

                                                                                Conversely, CIOs can lead BYOD employees to greener security pastures by dangling a stipend in front of them -- that is, the promise of a monthly payment that offsets the cost of the phone bill in return for following the company's mobile device policy..."

                                                                                Wearable Devices with Health IT Functions Poised to Disrupt Medicine
                                                                                ComputerWorld, May 1st, 2014
                                                                                "The next innovation in health care may come from Silicon Valley.

                                                                                With Google, Apple and Samsung exploring how to incorporate health IT features into wearable devices, patients may soon provide information to doctors through devices such as smartwatches that can measure and transmit biometric data..."

                                                                                Wearable Devices with Health IT Functions Poised to Disrupt Medicine
                                                                                ComputerWorld, May 1st, 2014
                                                                                "The next innovation in health care may come from Silicon Valley.

                                                                                With Google, Apple and Samsung exploring how to incorporate health IT features into wearable devices, patients may soon provide information to doctors through devices such as smartwatches that can measure and transmit biometric data..."

                                                                                Wearable Devices with Health IT Functions Poised to Disrupt Medicine
                                                                                ComputerWorld, May 1st, 2014
                                                                                "The next innovation in health care may come from Silicon Valley.

                                                                                With Google, Apple and Samsung exploring how to incorporate health IT features into wearable devices, patients may soon provide information to doctors through devices such as smartwatches that can measure and transmit biometric data..."

                                                                                When It's Time to Hire Virtual Workers, Will You Know How?
                                                                                TLNT, May 7th, 2014
                                                                                "The virtual workforce revolution is here, but is virtual hiring an adventure you're ready to embark on?

                                                                                By 2016, projections put the virtual workforce - those employees who work exclusively or even occasionally from home - at about 63 million.

                                                                                Virtual employees fill different needs for different organizations. So how do you know if embracing telecommuters is right for your company?.."

                                                                                  When It's Time to Hire Virtual Workers, Will You Know How?
                                                                                  TLNT, May 7th, 2014
                                                                                  "The virtual workforce revolution is here, but is virtual hiring an adventure you're ready to embark on?

                                                                                  By 2016, projections put the virtual workforce - those employees who work exclusively or even occasionally from home - at about 63 million.

                                                                                  Virtual employees fill different needs for different organizations. So how do you know if embracing telecommuters is right for your company?.."

                                                                                    When It's Time to Hire Virtual Workers, Will You Know How?
                                                                                    TLNT, May 7th, 2014
                                                                                    "The virtual workforce revolution is here, but is virtual hiring an adventure you're ready to embark on?

                                                                                    By 2016, projections put the virtual workforce - those employees who work exclusively or even occasionally from home - at about 63 million.

                                                                                    Virtual employees fill different needs for different organizations. So how do you know if embracing telecommuters is right for your company?.."

                                                                                      IT - Big Data
                                                                                      x
                                                                                      5 Big Data Use Cases to Watch
                                                                                      Information Week, May 7th, 2014
                                                                                      "We hear a lot about big data's ability to deliver usable insights -- but what does this mean exactly?

                                                                                      It's often unclear how enterprises are using big-data technologies beyond proof-of-concept projects. Some of this might be a byproduct of corporate secrecy. Many big-data pioneers don't want to reveal how they're implementing Hadoop and related technologies for fear that doing so might eliminate a competitive advantage...'

                                                                                      5 Big Data Use Cases to Watch
                                                                                      Information Week, May 7th, 2014
                                                                                      "We hear a lot about big data's ability to deliver usable insights -- but what does this mean exactly?

                                                                                      It's often unclear how enterprises are using big-data technologies beyond proof-of-concept projects. Some of this might be a byproduct of corporate secrecy. Many big-data pioneers don't want to reveal how they're implementing Hadoop and related technologies for fear that doing so might eliminate a competitive advantage...'

                                                                                      5 Big Data Use Cases to Watch
                                                                                      Information Week, May 7th, 2014
                                                                                      "We hear a lot about big data's ability to deliver usable insights -- but what does this mean exactly?

                                                                                      It's often unclear how enterprises are using big-data technologies beyond proof-of-concept projects. Some of this might be a byproduct of corporate secrecy. Many big-data pioneers don't want to reveal how they're implementing Hadoop and related technologies for fear that doing so might eliminate a competitive advantage...'

                                                                                      7 Business Dashboards that Offer Striking Data Visualizations
                                                                                      CIO, May 6th, 2014
                                                                                      "When data gets complex, there's no better way to understand it than a business dashboard. You can cull data from your website analytics engine, an Oracle database, social media campaigns and more, all to see how they interrelate.

                                                                                      Unfortunately, some dashboards are overly cluttered and actually make data more complicated to understand. The seven tools featured here use more color, graphs, clear delineations and white space to make data more understandable..."

                                                                                      7 Business Dashboards that Offer Striking Data Visualizations
                                                                                      CIO, May 6th, 2014
                                                                                      "When data gets complex, there's no better way to understand it than a business dashboard. You can cull data from your website analytics engine, an Oracle database, social media campaigns and more, all to see how they interrelate.

                                                                                      Unfortunately, some dashboards are overly cluttered and actually make data more complicated to understand. The seven tools featured here use more color, graphs, clear delineations and white space to make data more understandable..."

                                                                                      7 Business Dashboards that Offer Striking Data Visualizations
                                                                                      CIO, May 6th, 2014
                                                                                      "When data gets complex, there's no better way to understand it than a business dashboard. You can cull data from your website analytics engine, an Oracle database, social media campaigns and more, all to see how they interrelate.

                                                                                      Unfortunately, some dashboards are overly cluttered and actually make data more complicated to understand. The seven tools featured here use more color, graphs, clear delineations and white space to make data more understandable..."

                                                                                      CIOs Fear Compliance and Regulation Over IT Failure to Tackle Big Data
                                                                                      ComputerWeekly, May 7th, 2014
                                                                                      "Almost half (46%) of UK organisations are struggling to extract value from information due to current approaches to IT. As many as 87% of CIOs fear that failing to address their untapped intelligence will lead to issues with compliance and regulation, according to a research..."
                                                                                        CIOs Fear Compliance and Regulation Over IT Failure to Tackle Big Data
                                                                                        ComputerWeekly, May 7th, 2014
                                                                                        "Almost half (46%) of UK organisations are struggling to extract value from information due to current approaches to IT. As many as 87% of CIOs fear that failing to address their untapped intelligence will lead to issues with compliance and regulation, according to a research..."
                                                                                          CIOs Fear Compliance and Regulation Over IT Failure to Tackle Big Data
                                                                                          ComputerWeekly, May 7th, 2014
                                                                                          "Almost half (46%) of UK organisations are struggling to extract value from information due to current approaches to IT. As many as 87% of CIOs fear that failing to address their untapped intelligence will lead to issues with compliance and regulation, according to a research..."
                                                                                            Do You Speak Hadoop? What You Need to Know to Get Started.
                                                                                            GCN, May 1st, 2014
                                                                                            "It's a funny word. You have only a vague notion of what it is. You've heard that it takes a lot of work but is potentially beneficial. Maybe if you learned more about it you too could enjoy its benefits. But even if you wanted to try it, you wouldn't even know where to start.

                                                                                            If it isn't obvious, I'm talking about Hadoop. Not Zumba..."

                                                                                              Do You Speak Hadoop? What You Need to Know to Get Started.
                                                                                              GCN, May 1st, 2014
                                                                                              "It's a funny word. You have only a vague notion of what it is. You've heard that it takes a lot of work but is potentially beneficial. Maybe if you learned more about it you too could enjoy its benefits. But even if you wanted to try it, you wouldn't even know where to start.

                                                                                              If it isn't obvious, I'm talking about Hadoop. Not Zumba..."

                                                                                                Do You Speak Hadoop? What You Need to Know to Get Started.
                                                                                                GCN, May 1st, 2014
                                                                                                "It's a funny word. You have only a vague notion of what it is. You've heard that it takes a lot of work but is potentially beneficial. Maybe if you learned more about it you too could enjoy its benefits. But even if you wanted to try it, you wouldn't even know where to start.

                                                                                                If it isn't obvious, I'm talking about Hadoop. Not Zumba..."

                                                                                                  Hadoop, Python, and NoSQL Lead the Pack for Big Data Jobs
                                                                                                  InfoWorld, May 5th, 2014
                                                                                                  "The demand for job skills related to data processing -- NoSQL, Apache Hadoop, Python, and a smattering of other such skills -- has hit all-time highs, according to statistics collected by tech job site Dice.com. The biggest gains, though, are for all things NoSQL.

                                                                                                  Dice claims the number of job postings for "NoSQL experts" -- those with experience in unstructured data systems like MongoDB -- has risen 54 percent since last year. Other, related skills, such as Apache Hadoop and Python, have also posted significant year-over-year gains (43 percent and 16 percent, respectively). Python has become one of the big go-to languages for data processing, thanks to its simplicity and its wide selection of data-processing libraries..."

                                                                                                  Hadoop, Python, and NoSQL Lead the Pack for Big Data Jobs
                                                                                                  InfoWorld, May 5th, 2014
                                                                                                  "The demand for job skills related to data processing -- NoSQL, Apache Hadoop, Python, and a smattering of other such skills -- has hit all-time highs, according to statistics collected by tech job site Dice.com. The biggest gains, though, are for all things NoSQL.

                                                                                                  Dice claims the number of job postings for "NoSQL experts" -- those with experience in unstructured data systems like MongoDB -- has risen 54 percent since last year. Other, related skills, such as Apache Hadoop and Python, have also posted significant year-over-year gains (43 percent and 16 percent, respectively). Python has become one of the big go-to languages for data processing, thanks to its simplicity and its wide selection of data-processing libraries..."

                                                                                                  Hadoop, Python, and NoSQL Lead the Pack for Big Data Jobs
                                                                                                  InfoWorld, May 5th, 2014
                                                                                                  "The demand for job skills related to data processing -- NoSQL, Apache Hadoop, Python, and a smattering of other such skills -- has hit all-time highs, according to statistics collected by tech job site Dice.com. The biggest gains, though, are for all things NoSQL.

                                                                                                  Dice claims the number of job postings for "NoSQL experts" -- those with experience in unstructured data systems like MongoDB -- has risen 54 percent since last year. Other, related skills, such as Apache Hadoop and Python, have also posted significant year-over-year gains (43 percent and 16 percent, respectively). Python has become one of the big go-to languages for data processing, thanks to its simplicity and its wide selection of data-processing libraries..."

                                                                                                  Top10
                                                                                                  x
                                                                                                  Top Ten Articles for last few Issues
                                                                                                  Vol 194 Issues 2, 3, 4 and 5; Vol 193 Issues 1, 2, 3 and 4
                                                                                                  We track how frequently each article is viewed on the web site to determine which the readers consider the most important. For last week, the top 10 articles were:

                                                                                                  • Oracle Introduces Oracle Solaris 11.2
                                                                                                  • Introducing SMF Stencils
                                                                                                  • Apache OpenOffice 4.1
                                                                                                  • SPARC and Solaris Leadership in the Cloud
                                                                                                  • Solaris 11.2 Networking Overview: Application-Driven SDN and Beyond
                                                                                                  • Java ME 8: Getting Started with Samples and Demo Code
                                                                                                  • Oracle Virtual Developer Day: Java 2014 - May 14th, 2014
                                                                                                  • MySQL Enterprise Monitor 3.0.10
                                                                                                  • Java Micro Edition (ME) 8
                                                                                                  • Oracle Simplifies Migration to Cloud Applications

                                                                                                  The longer version of this article has list of top ten articles for the last 8 weeks.

                                                                                                    Top Ten Articles for last few Issues
                                                                                                    Vol 194 Issues 2, 3, 4 and 5; Vol 193 Issues 1, 2, 3 and 4
                                                                                                    We track how frequently each article is viewed on the web site to determine which the readers consider the most important. For last week, the top 10 articles were:

                                                                                                    • Oracle Introduces Oracle Solaris 11.2
                                                                                                    • Introducing SMF Stencils
                                                                                                    • Apache OpenOffice 4.1
                                                                                                    • SPARC and Solaris Leadership in the Cloud
                                                                                                    • Solaris 11.2 Networking Overview: Application-Driven SDN and Beyond
                                                                                                    • Java ME 8: Getting Started with Samples and Demo Code
                                                                                                    • Oracle Virtual Developer Day: Java 2014 - May 14th, 2014
                                                                                                    • MySQL Enterprise Monitor 3.0.10
                                                                                                    • Java Micro Edition (ME) 8
                                                                                                    • Oracle Simplifies Migration to Cloud Applications

                                                                                                    The longer version of this article has list of top ten articles for the last 8 weeks.

                                                                                                      Top Ten Articles for last few Issues
                                                                                                      Vol 194 Issues 2, 3, 4 and 5; Vol 193 Issues 1, 2, 3 and 4
                                                                                                      We track how frequently each article is viewed on the web site to determine which the readers consider the most important. For last week, the top 10 articles were:

                                                                                                      • Oracle Introduces Oracle Solaris 11.2
                                                                                                      • Introducing SMF Stencils
                                                                                                      • Apache OpenOffice 4.1
                                                                                                      • SPARC and Solaris Leadership in the Cloud
                                                                                                      • Solaris 11.2 Networking Overview: Application-Driven SDN and Beyond
                                                                                                      • Java ME 8: Getting Started with Samples and Demo Code
                                                                                                      • Oracle Virtual Developer Day: Java 2014 - May 14th, 2014
                                                                                                      • MySQL Enterprise Monitor 3.0.10
                                                                                                      • Java Micro Edition (ME) 8
                                                                                                      • Oracle Simplifies Migration to Cloud Applications

                                                                                                      The longer version of this article has list of top ten articles for the last 8 weeks.

                                                                                                        IT - Encryption
                                                                                                        x
                                                                                                        11 Reasons Encryption is (Almost) Dead
                                                                                                        InfoWorld, May 5th, 2014
                                                                                                        "Everyone who has studied mathematics at the movie theater knows that encryption is pretty boss. Practically every spy in every spy movie looks at an encrypted file with fear and dread. Armies of ninjas can be fought. Bombs can be defused. Missiles can be diverted. But an encrypted file can only be cracked open with the proper key -- and that key is always in the hands of a dangerously attractive agent hidden in a sumptuous hideout on the other side of the world. (Never in Newark or New Haven -- who wants to film there?)..."
                                                                                                        11 Reasons Encryption is (Almost) Dead
                                                                                                        InfoWorld, May 5th, 2014
                                                                                                        "Everyone who has studied mathematics at the movie theater knows that encryption is pretty boss. Practically every spy in every spy movie looks at an encrypted file with fear and dread. Armies of ninjas can be fought. Bombs can be defused. Missiles can be diverted. But an encrypted file can only be cracked open with the proper key -- and that key is always in the hands of a dangerously attractive agent hidden in a sumptuous hideout on the other side of the world. (Never in Newark or New Haven -- who wants to film there?)..."
                                                                                                        11 Reasons Encryption is (Almost) Dead
                                                                                                        InfoWorld, May 5th, 2014
                                                                                                        "Everyone who has studied mathematics at the movie theater knows that encryption is pretty boss. Practically every spy in every spy movie looks at an encrypted file with fear and dread. Armies of ninjas can be fought. Bombs can be defused. Missiles can be diverted. But an encrypted file can only be cracked open with the proper key -- and that key is always in the hands of a dangerously attractive agent hidden in a sumptuous hideout on the other side of the world. (Never in Newark or New Haven -- who wants to film there?)..."
                                                                                                        IT - Tape
                                                                                                        x
                                                                                                        Sony Tape Technology Able to Store 185TB in LTO Cartridge
                                                                                                        StorageNewsletter.com, May 8th, 2014
                                                                                                        "Sony Corporation announced that by independently developing a soft magnetic underlayer with a smooth interface using sputter deposition, it has succeeded in creating a nano-grained*4 magnetic layer with fine magnetic particles and uniform crystalline orientation.

                                                                                                        This enabled Sony to develop magnetic tape technology that achieves the world's highest areal recording density for tape storage media of 148Gb/in^2. It is equivalent to approximately 74 times the capacity of current mainstream coated magnetic tape storage media, and makes it possible to record more than 185TB of data per data cartridge..."

                                                                                                        Sony Tape Technology Able to Store 185TB in LTO Cartridge
                                                                                                        StorageNewsletter.com, May 8th, 2014
                                                                                                        "Sony Corporation announced that by independently developing a soft magnetic underlayer with a smooth interface using sputter deposition, it has succeeded in creating a nano-grained*4 magnetic layer with fine magnetic particles and uniform crystalline orientation.

                                                                                                        This enabled Sony to develop magnetic tape technology that achieves the world's highest areal recording density for tape storage media of 148Gb/in^2. It is equivalent to approximately 74 times the capacity of current mainstream coated magnetic tape storage media, and makes it possible to record more than 185TB of data per data cartridge..."

                                                                                                        Sony Tape Technology Able to Store 185TB in LTO Cartridge
                                                                                                        StorageNewsletter.com, May 8th, 2014
                                                                                                        "Sony Corporation announced that by independently developing a soft magnetic underlayer with a smooth interface using sputter deposition, it has succeeded in creating a nano-grained*4 magnetic layer with fine magnetic particles and uniform crystalline orientation.

                                                                                                        This enabled Sony to develop magnetic tape technology that achieves the world's highest areal recording density for tape storage media of 148Gb/in^2. It is equivalent to approximately 74 times the capacity of current mainstream coated magnetic tape storage media, and makes it possible to record more than 185TB of data per data cartridge..."

                                                                                                        Sysadmin
                                                                                                        x
                                                                                                        Puppet Configuration in Solaris
                                                                                                        By Drew Fisher
                                                                                                        Drew writes, "Puppet is IT automation software that helps system administrators manage IT infrastructure. It automates tasks such as provisioning, configuration, patch management and compliance. Repetitive tasks are easily automated, deployment of critical applications occurs rapidly, and required system changes are proactively managed. Puppet scales to meet the needs of the environment, whether it is a simple deployment or a complex infrastructure, and works on-premise or in the cloud.

                                                                                                        Puppet is now available as part of Oracle Solaris 11.2!..."

                                                                                                        Puppet Configuration in Solaris
                                                                                                        By Drew Fisher
                                                                                                        Drew writes, "Puppet is IT automation software that helps system administrators manage IT infrastructure. It automates tasks such as provisioning, configuration, patch management and compliance. Repetitive tasks are easily automated, deployment of critical applications occurs rapidly, and required system changes are proactively managed. Puppet scales to meet the needs of the environment, whether it is a simple deployment or a complex infrastructure, and works on-premise or in the cloud.

                                                                                                        Puppet is now available as part of Oracle Solaris 11.2!..."

                                                                                                        Puppet Configuration in Solaris
                                                                                                        By Drew Fisher
                                                                                                        Drew writes, "Puppet is IT automation software that helps system administrators manage IT infrastructure. It automates tasks such as provisioning, configuration, patch management and compliance. Repetitive tasks are easily automated, deployment of critical applications occurs rapidly, and required system changes are proactively managed. Puppet scales to meet the needs of the environment, whether it is a simple deployment or a complex infrastructure, and works on-premise or in the cloud.

                                                                                                        Puppet is now available as part of Oracle Solaris 11.2!..."

                                                                                                        Solaris-specific Providers for Puppet
                                                                                                        By Drew Fisher
                                                                                                        Drew writes, "As I mentioned in my previous post about Puppet, there are some new Solaris-specific Resource Types for Puppet 3.4.1 in Oracle Solaris 11.2. All of these new Resource Types and Providers have been available on java.net since integration into the FOSS projects gate. I am actively working with Puppet Labs to get this code pushed back upstream so that it's available for anybody to work with.

                                                                                                        Here's a small description of a few (of 23) of the new Resource Types:..."

                                                                                                        Solaris-specific Providers for Puppet
                                                                                                        By Drew Fisher
                                                                                                        Drew writes, "As I mentioned in my previous post about Puppet, there are some new Solaris-specific Resource Types for Puppet 3.4.1 in Oracle Solaris 11.2. All of these new Resource Types and Providers have been available on java.net since integration into the FOSS projects gate. I am actively working with Puppet Labs to get this code pushed back upstream so that it's available for anybody to work with.

                                                                                                        Here's a small description of a few (of 23) of the new Resource Types:..."

                                                                                                        Solaris-specific Providers for Puppet
                                                                                                        By Drew Fisher
                                                                                                        Drew writes, "As I mentioned in my previous post about Puppet, there are some new Solaris-specific Resource Types for Puppet 3.4.1 in Oracle Solaris 11.2. All of these new Resource Types and Providers have been available on java.net since integration into the FOSS projects gate. I am actively working with Puppet Labs to get this code pushed back upstream so that it's available for anybody to work with.

                                                                                                        Here's a small description of a few (of 23) of the new Resource Types:..."

                                                                                                        NetBeans
                                                                                                        x
                                                                                                        TomEE+, Apache CXF, and Maven in NetBeans 8
                                                                                                        Geertjan Endorsed Video
                                                                                                        Geertjan Wielenga writes, "The most interesting thing about the awesomeness shown in the (silent) YouTube clip below is that everything you see in it is 100% free and supported out of the box, without needing to install plugins of any kind, in NetBeans 8:

                                                                                                        YouTube Video

                                                                                                        It is also very easy to see above that everything, from registering TomEE+ to creating a Maven application to deploying the app and making changes and seeing those changes live takes about 4 minutes in total..."

                                                                                                        TomEE+, Apache CXF, and Maven in NetBeans 8
                                                                                                        Geertjan Endorsed Video
                                                                                                        Geertjan Wielenga writes, "The most interesting thing about the awesomeness shown in the (silent) YouTube clip below is that everything you see in it is 100% free and supported out of the box, without needing to install plugins of any kind, in NetBeans 8:

                                                                                                        YouTube Video

                                                                                                        It is also very easy to see above that everything, from registering TomEE+ to creating a Maven application to deploying the app and making changes and seeing those changes live takes about 4 minutes in total..."

                                                                                                        TomEE+, Apache CXF, and Maven in NetBeans 8
                                                                                                        Geertjan Endorsed Video
                                                                                                        Geertjan Wielenga writes, "The most interesting thing about the awesomeness shown in the (silent) YouTube clip below is that everything you see in it is 100% free and supported out of the box, without needing to install plugins of any kind, in NetBeans 8:

                                                                                                        YouTube Video

                                                                                                        It is also very easy to see above that everything, from registering TomEE+ to creating a Maven application to deploying the app and making changes and seeing those changes live takes about 4 minutes in total..."

                                                                                                        Security
                                                                                                        x
                                                                                                        Solaris 11.2: Immutable Global Zone
                                                                                                        Read-Only Root Non-Global Zones is marketed as Immutable Zones

                                                                                                        Casper Dik writes, "This is blog is a bit more substantial; it requires some knowledge about Solaris Zones, Immutable Zones and Solaris administration in general. It is high-level; in future I'm hoping to get down to the nuts and bolts.

                                                                                                        In Solaris 11 we added the Read-Only Root Non-Global Zones, marketed as Immutable Zones; this is a feature that makes a zone tamper-proof.

                                                                                                        In an Immutable Zone is configured simply by setting the "file-mac-profile" to one of "strict" (not much writeable), "fixed-configuration" and "flexible-configuration" (configuration is writeable but binaries and such or not). This is all implemented in the kernel based on pathnames and depending on the context; the super-user in the global zone can still update the zone or even modify protected files as long as that is not done from within the zone..."

                                                                                                        Solaris 11.2: Immutable Global Zone
                                                                                                        Read-Only Root Non-Global Zones is marketed as Immutable Zones

                                                                                                        Casper Dik writes, "This is blog is a bit more substantial; it requires some knowledge about Solaris Zones, Immutable Zones and Solaris administration in general. It is high-level; in future I'm hoping to get down to the nuts and bolts.

                                                                                                        In Solaris 11 we added the Read-Only Root Non-Global Zones, marketed as Immutable Zones; this is a feature that makes a zone tamper-proof.

                                                                                                        In an Immutable Zone is configured simply by setting the "file-mac-profile" to one of "strict" (not much writeable), "fixed-configuration" and "flexible-configuration" (configuration is writeable but binaries and such or not). This is all implemented in the kernel based on pathnames and depending on the context; the super-user in the global zone can still update the zone or even modify protected files as long as that is not done from within the zone..."

                                                                                                        Solaris 11.2: Immutable Global Zone
                                                                                                        Read-Only Root Non-Global Zones is marketed as Immutable Zones

                                                                                                        Casper Dik writes, "This is blog is a bit more substantial; it requires some knowledge about Solaris Zones, Immutable Zones and Solaris administration in general. It is high-level; in future I'm hoping to get down to the nuts and bolts.

                                                                                                        In Solaris 11 we added the Read-Only Root Non-Global Zones, marketed as Immutable Zones; this is a feature that makes a zone tamper-proof.

                                                                                                        In an Immutable Zone is configured simply by setting the "file-mac-profile" to one of "strict" (not much writeable), "fixed-configuration" and "flexible-configuration" (configuration is writeable but binaries and such or not). This is all implemented in the kernel based on pathnames and depending on the context; the super-user in the global zone can still update the zone or even modify protected files as long as that is not done from within the zone..."

                                                                                                        OpenSSL on Oracle Solaris 11.2
                                                                                                        which version of OpenSSL is delivered with Oracle Solaris 11.2?
                                                                                                        Misaki Miyashit writes, "The answer is the latest and greatest OpenSSL 1.0.1g!

                                                                                                        Now that I answered 80% of the questions you may have with regard to OpenSSL, I would like to announce three major features added to the Oracle Solaris 11.2:"

                                                                                                        -Inlined T4/T4+ instructions support and Engines

                                                                                                        • OpenSSL FIPS-140 version support
                                                                                                        • OpenSSL Thread and Fork Safety

                                                                                                        Read on for details.

                                                                                                        OpenSSL on Oracle Solaris 11.2
                                                                                                        which version of OpenSSL is delivered with Oracle Solaris 11.2?
                                                                                                        Misaki Miyashit writes, "The answer is the latest and greatest OpenSSL 1.0.1g!

                                                                                                        Now that I answered 80% of the questions you may have with regard to OpenSSL, I would like to announce three major features added to the Oracle Solaris 11.2:"

                                                                                                        -Inlined T4/T4+ instructions support and Engines

                                                                                                        • OpenSSL FIPS-140 version support
                                                                                                        • OpenSSL Thread and Fork Safety

                                                                                                        Read on for details.

                                                                                                        OpenSSL on Oracle Solaris 11.2
                                                                                                        which version of OpenSSL is delivered with Oracle Solaris 11.2?
                                                                                                        Misaki Miyashit writes, "The answer is the latest and greatest OpenSSL 1.0.1g!

                                                                                                        Now that I answered 80% of the questions you may have with regard to OpenSSL, I would like to announce three major features added to the Oracle Solaris 11.2:"

                                                                                                        -Inlined T4/T4+ instructions support and Engines

                                                                                                        • OpenSSL FIPS-140 version support
                                                                                                        • OpenSSL Thread and Fork Safety

                                                                                                        Read on for details.

                                                                                                        Nexenta News
                                                                                                        x
                                                                                                        NexentaConnect for Citrix XenDesktop
                                                                                                        Nexenta Introduces Most Advanced #SoftwareDefinedStorage Platform for @Citrix
                                                                                                        The edition for XenDesktop of the award-winning NexentaConnect virtual storage accelerator gives virtual desktop administrators the ability to accelerate the performance of their organization's desktops on new or existing storage arrays, while providing greater density at a much lower price point. The NexentaConnect solution reduces the amount of storage required for a XenDesktop deployment, provides real-time visibility and management of individual desktop users using storage resources, and drives down the cost per desktop.
                                                                                                        NexentaConnect for Citrix XenDesktop
                                                                                                        Nexenta Introduces Most Advanced #SoftwareDefinedStorage Platform for @Citrix
                                                                                                        The edition for XenDesktop of the award-winning NexentaConnect virtual storage accelerator gives virtual desktop administrators the ability to accelerate the performance of their organization's desktops on new or existing storage arrays, while providing greater density at a much lower price point. The NexentaConnect solution reduces the amount of storage required for a XenDesktop deployment, provides real-time visibility and management of individual desktop users using storage resources, and drives down the cost per desktop.
                                                                                                        NexentaConnect for Citrix XenDesktop
                                                                                                        Nexenta Introduces Most Advanced #SoftwareDefinedStorage Platform for @Citrix
                                                                                                        The edition for XenDesktop of the award-winning NexentaConnect virtual storage accelerator gives virtual desktop administrators the ability to accelerate the performance of their organization's desktops on new or existing storage arrays, while providing greater density at a much lower price point. The NexentaConnect solution reduces the amount of storage required for a XenDesktop deployment, provides real-time visibility and management of individual desktop users using storage resources, and drives down the cost per desktop.
                                                                                                        Wipro and Nexenta Collaborate to Deliver Cloud Computing Solutions to Enterprises Worldwide
                                                                                                        via Software-Defined Storage-enabled Virtual Desktops
                                                                                                        Wipro has selected Nexenta to create a user data storage infrastructure for tens of thousands of virtual desktop users. Wipro is deploying Nexenta's Software-Defined Storage solution in four of its data centers in India on x86 hardware and expects a significantly growing demand for this type of storage in the coming years. Nexenta will provide advanced SAN and NAS capabilities, hardware independence, cost effectiveness per terabyte of storage and open APIs.

                                                                                                        The desktop virtualization infrastructure is powered by Wipro's VirtuaDesk - a fully integrated hardware, software and managed services solution.

                                                                                                        Wipro and Nexenta Collaborate to Deliver Cloud Computing Solutions to Enterprises Worldwide
                                                                                                        via Software-Defined Storage-enabled Virtual Desktops
                                                                                                        Wipro has selected Nexenta to create a user data storage infrastructure for tens of thousands of virtual desktop users. Wipro is deploying Nexenta's Software-Defined Storage solution in four of its data centers in India on x86 hardware and expects a significantly growing demand for this type of storage in the coming years. Nexenta will provide advanced SAN and NAS capabilities, hardware independence, cost effectiveness per terabyte of storage and open APIs.

                                                                                                        The desktop virtualization infrastructure is powered by Wipro's VirtuaDesk - a fully integrated hardware, software and managed services solution.

                                                                                                        Wipro and Nexenta Collaborate to Deliver Cloud Computing Solutions to Enterprises Worldwide
                                                                                                        via Software-Defined Storage-enabled Virtual Desktops
                                                                                                        Wipro has selected Nexenta to create a user data storage infrastructure for tens of thousands of virtual desktop users. Wipro is deploying Nexenta's Software-Defined Storage solution in four of its data centers in India on x86 hardware and expects a significantly growing demand for this type of storage in the coming years. Nexenta will provide advanced SAN and NAS capabilities, hardware independence, cost effectiveness per terabyte of storage and open APIs.

                                                                                                        The desktop virtualization infrastructure is powered by Wipro's VirtuaDesk - a fully integrated hardware, software and managed services solution.

                                                                                                        Please Vote for Nexenta for 2014 Storage Awards by June 2nd
                                                                                                        Nexenta Nominated in 6 Categories
                                                                                                        The Storage Awards shortlist/ voting options have been announced on the Storage Awards website and you'll be pleased to know that Nexenta is shortlisted in the following categories:

                                                                                                        • One to watch product
                                                                                                        • Value for money product
                                                                                                        • Storage Magazine Service to Industry Award (Tarkan Maner)
                                                                                                        • Storage Product of the year
                                                                                                        • Storage Virtualisation Product of the Year
                                                                                                        • Storage Company of the Year

                                                                                                        The winners will be announced at a ceremony on the 12th June at the The Grand Connaught Rooms, London.

                                                                                                        Ceremony date: June 12th 2014 Voting closes: June 2nd

                                                                                                        One vote per domain name is allowed. Please click on the VOTE NOW link located on the left corner button.

                                                                                                        Please Vote for Nexenta for 2014 Storage Awards by June 2nd
                                                                                                        Nexenta Nominated in 6 Categories
                                                                                                        The Storage Awards shortlist/ voting options have been announced on the Storage Awards website and you'll be pleased to know that Nexenta is shortlisted in the following categories:

                                                                                                        • One to watch product
                                                                                                        • Value for money product
                                                                                                        • Storage Magazine Service to Industry Award (Tarkan Maner)
                                                                                                        • Storage Product of the year
                                                                                                        • Storage Virtualisation Product of the Year
                                                                                                        • Storage Company of the Year

                                                                                                        The winners will be announced at a ceremony on the 12th June at the The Grand Connaught Rooms, London.

                                                                                                        Ceremony date: June 12th 2014 Voting closes: June 2nd

                                                                                                        One vote per domain name is allowed. Please click on the VOTE NOW link located on the left corner button.

                                                                                                        Please Vote for Nexenta for 2014 Storage Awards by June 2nd
                                                                                                        Nexenta Nominated in 6 Categories
                                                                                                        The Storage Awards shortlist/ voting options have been announced on the Storage Awards website and you'll be pleased to know that Nexenta is shortlisted in the following categories:

                                                                                                        • One to watch product
                                                                                                        • Value for money product
                                                                                                        • Storage Magazine Service to Industry Award (Tarkan Maner)
                                                                                                        • Storage Product of the year
                                                                                                        • Storage Virtualisation Product of the Year
                                                                                                        • Storage Company of the Year

                                                                                                        The winners will be announced at a ceremony on the 12th June at the The Grand Connaught Rooms, London.

                                                                                                        Ceremony date: June 12th 2014 Voting closes: June 2nd

                                                                                                        One vote per domain name is allowed. Please click on the VOTE NOW link located on the left corner button.

                                                                                                        Level3 News
                                                                                                        x
                                                                                                        tw telecom Adds Its Intelligent Network Dynamic Capacity to Internet, IP VPN and Managed Services
                                                                                                        Delivers Dynamic Capacity across its entire data and Internet portfolio; an industry first

                                                                                                        tw telecom announced it is extending its industry-first Intelligent Network Dynamic Capacity capability that has been available with Business Ethernet services to its entire data and Internet portfolio to include Internet, IP VPN and Managed Services.

                                                                                                        Dynamic Capacity for Internet gives customers the ability to double or triple the bandwidth on demand in real-time, through pre-scheduled planning or automatically without human intervention with Alerts-Driven Dynamic Capacity. Customers can now establish network thresholds and receive alerts to dynamically manage their Internet traffic. They can also pre-schedule increased bandwidth for a specific event and they can correlate costs and bandwidth usage with specific activities. None of these capabilities can be done with traditional burstable Internet.

                                                                                                        tw telecom Adds Its Intelligent Network Dynamic Capacity to Internet, IP VPN and Managed Services
                                                                                                        Delivers Dynamic Capacity across its entire data and Internet portfolio; an industry first

                                                                                                        tw telecom announced it is extending its industry-first Intelligent Network Dynamic Capacity capability that has been available with Business Ethernet services to its entire data and Internet portfolio to include Internet, IP VPN and Managed Services.

                                                                                                        Dynamic Capacity for Internet gives customers the ability to double or triple the bandwidth on demand in real-time, through pre-scheduled planning or automatically without human intervention with Alerts-Driven Dynamic Capacity. Customers can now establish network thresholds and receive alerts to dynamically manage their Internet traffic. They can also pre-schedule increased bandwidth for a specific event and they can correlate costs and bandwidth usage with specific activities. None of these capabilities can be done with traditional burstable Internet.

                                                                                                        tw telecom Adds Its Intelligent Network Dynamic Capacity to Internet, IP VPN and Managed Services
                                                                                                        Delivers Dynamic Capacity across its entire data and Internet portfolio; an industry first

                                                                                                        tw telecom announced it is extending its industry-first Intelligent Network Dynamic Capacity capability that has been available with Business Ethernet services to its entire data and Internet portfolio to include Internet, IP VPN and Managed Services.

                                                                                                        Dynamic Capacity for Internet gives customers the ability to double or triple the bandwidth on demand in real-time, through pre-scheduled planning or automatically without human intervention with Alerts-Driven Dynamic Capacity. Customers can now establish network thresholds and receive alerts to dynamically manage their Internet traffic. They can also pre-schedule increased bandwidth for a specific event and they can correlate costs and bandwidth usage with specific activities. None of these capabilities can be done with traditional burstable Internet.

                                                                                                        tw telecom Reports First Quarter 2014 Results
                                                                                                        Delivers Strong Revenue Growth Rate of 7.1% Year Over Year and 2.1% Sequentially

                                                                                                        tw telecom announced its first quarter 2014 financial results, including $408.3 million of revenue, $9.8 million of net income, $136.8 million of Modified EBITDA1 ("M-EBITDA"), $115.2 million of net cash provided by operating activities and $10.8 million of levered free cash flow3.

                                                                                                        "We delivered strong revenue results for the quarter as we returned value to shareholders and advanced our growth initiatives," said Larissa Herda, tw telecom's Chairman and CEO.

                                                                                                        tw telecom Reports First Quarter 2014 Results
                                                                                                        Delivers Strong Revenue Growth Rate of 7.1% Year Over Year and 2.1% Sequentially

                                                                                                        tw telecom announced its first quarter 2014 financial results, including $408.3 million of revenue, $9.8 million of net income, $136.8 million of Modified EBITDA1 ("M-EBITDA"), $115.2 million of net cash provided by operating activities and $10.8 million of levered free cash flow3.

                                                                                                        "We delivered strong revenue results for the quarter as we returned value to shareholders and advanced our growth initiatives," said Larissa Herda, tw telecom's Chairman and CEO.

                                                                                                        tw telecom Reports First Quarter 2014 Results
                                                                                                        Delivers Strong Revenue Growth Rate of 7.1% Year Over Year and 2.1% Sequentially

                                                                                                        tw telecom announced its first quarter 2014 financial results, including $408.3 million of revenue, $9.8 million of net income, $136.8 million of Modified EBITDA1 ("M-EBITDA"), $115.2 million of net cash provided by operating activities and $10.8 million of levered free cash flow3.

                                                                                                        "We delivered strong revenue results for the quarter as we returned value to shareholders and advanced our growth initiatives," said Larissa Herda, tw telecom's Chairman and CEO.

                                                                                                        Trending in
                                                                                                        Vol 233, Issue 3
                                                                                                        Trending IT Articles