News about Oracle's Solaris and Sun Hardware
System News
May 12th, 2014 — May 18th, 2014 Generate the Custom HTML Email for this Issue
System News System News for Sun Users
Volume 195, Issue 2 << Previous Issue | Next Issue >>
Sections in this issue:
click to jump to section


Oracle
x
Oracle Database Insider Newsletter
May Edition
SPECIAL ANNOUNCEMENT

  • Gartner: Oracle #1 in DBMS for 2013

NEWS

  • New Release: Empower Developers with Oracle NoSQL Database 3.0
  • Real-World Performance Tour Now Available on Your Desktop
  • Protecting the Electric Grid in a Dangerous World

  • VIDEO-
  • Kscope Flashback Featuring Tom Kyte and Chet Justice

WEBCASTS

  • Oracle Applications in a Box on Oracle Database Appliance

Read on for the full issue

The Future of the Database Begins Soon
Watch Larry Ellison on June 11
For more than three-and-a-half decades, Oracle has defined database innovation. With our leading technologies, Oracle customers have been able to out-think and out-perform their competition. Soon organizations will be able to do that even faster.

With the introduction of the Oracle Database In-Memory Option it will be possible to perform TRUE real-time, ad-hoc, analytic queries on your organization's business data as it exists at that moment and receive the results immediately. Imagine your sales team being able to know the total sales they have made as of right now -- not last week, or even last night, but right now.

Watch Larry Ellison to find out what this and the other new features of Oracle Database 12c will do for you.

Register Now for the Live Webcast

Exadata
x
Lusitania Seguros Accesses Business Intelligence 70% Faster
Improves Decision-Making and Boosts Competitiveness
Founded in 1986, with a portfolio of more than a half-million clients, Lusitania Seguros is one of the largest insurers in Portugal. As part of the Montepio Geral banking group, it offers a diverse portfolio of insurance products, including policies for motor0-vehicle, health, accident, property, life, and maritime insurance. It has approximately 600 employees and more than 4,000 agents.

After carrying out a comparative study of five BI solutions from various manufacturers, including MicroStrategy, Lusitania chose Oracle Business Intelligence. The company had an established Oracle footprint. "It made perfect sense to trust Oracle for our BI initiative," said Alexandre Ramos, director of information technology and organization, Lusitania Seguros.

Agilis International Achieves Oracle Exadata Ready and Oracle Exalogic Ready Status
Integrated Datawarehouse and Customer and Operational Analytics Platform
Agilis International, an innovative provider of financial risk and opportunity analytics business solutions for the Communication Service Provider (CSP) marketplace, announced that its DataMind Platform version 2.0 has achieved Oracle Exadata and Oracle Exalogic Ready status through Oracle PartnerNetwork (OPN).

Agilis delivers a complete Big Data solution, integrating advanced business analytics with an enterprise-level data infrastructure. Agilis solutions utilize software-based hybrid architecture for data storage and retrieval, providing CSPs with a system sized to not only meet current requirements, but also one that can easily scale in multiple dimensions as requirements grow. Agilis offers its DataMind Analytics platform with Customer and Operational Analytics in multiple business models...

e-Project Management, Version 1.0 Achieves Oracle Exa* Ready Status
Innovation of IT Products & Services, IT Consulting & IT Reselling through Quality and Performance using Oracle Technologies
Innovate Software Consulting Inc Ltd., founded in 2013 and registered in U.K, provides the consulting and outsourcing services that envision and pioneer the adoption of the flexible global business practices that today enable companies to operate more efficiently and produce more value. Innovate Software Consulting Inc Ltd., works with its clients globally as partners to conceptualize and realize technology driven business transformation initiatives. Committed to enable swift, practical and meaningful transformation of critical business and IT functions, ensuring organization success by delivering measurable and lasting improvements in performance, productivity, quality, and cost.
Virtualization
x
Oracle VM for x86 vs VMware vSphere
Side by side comparison
Lingeswaran writes, "Nowadays Linux based hypervisors are ruling the datacenters around the world. VMware vSphere and Oracle VM for x86 are two major players in this hypervisor market today. So I would like to compare these products to make the system architect clear about how each prodcut can compete each other. This article is based my experience and not to create fake impression on any of these products..."
How to install Oracle VM server (x86)?
Step By Step Guide
Lingeswaran writes, "Oracle VM for X86 is a native hypervisor which is directly runs on the host's hardware. This hypervisor is based on xen technology and it requires very small footprint on the hard drive to install it. Oracle VM server is directly installed on the baremetal computer and it contains the oracle VM agent to manage the communication with oracle VM manager. By default, this hypervisor system is called dom0 (Domain zero) which also be called privileged domain since it has direct access with hardware. Virtual machines will be called as domU which is unprivileged domain and doesn't have direct control on the hardware..."
IT - Storage
x
ChalkTalk Video: Server-side Flash Types and Use Cases
Storage Switzerland, May 13th, 2014
"Putting flash in the application server is becoming the performance solution of choice, but how do you choose which type of flash to use? Let's start by taking a look at the different types of SSDs available for use in the server..."
Big Data Strategies Live or Die by Their Data Center Infrastructure
SearchDataCenter, May 12th, 2014
"Big data challenges IT professionals with new choices on hardware, storage and other aspects of data center infrastructure.

Big data is unstructured information of unprecedented size and form. It consists of videos and graphics, as well as semi-structured data like email and texts, often on the Web. As the increasingly sensor-driven Web monitors mobile device output, available data will continue to grow exponentially.

Pressure to implement a big data strategy often comes down from upper management, based on the concern that businesses that use data effectively will outperform those that don't. Big data strategies require five major data center infrastructure changes..."

Hard Disk: Not Dead Yet
Network Computing, May 9th, 2014
"Even with the arrival of flash storage, don't count out the venerable hard disk. Disk still offers a lot of advantages. Without a doubt, flash is the most important innovation in modern storage. Flash delivers significantly higher performance for randomly accessing data -- the greatest requirement in today's virtualized datacenters.

But does that mean only flash is viable for modern storage architectures? ..."

Keeping Your Drives Cool Won't Make them Last Longer
InfoWorld, May 14th, 2014
"Do hard drives live longer if you keep them cooler than their recommended operating temperature? The short answer, according to a new study, is no.

Backblaze, the online backup provider that previously produced a report analyzing which brands of hard drives failed most often, has delved once again into the wealth of statistics generated by its pools of hard drives to determine how much of an effect lower operating temperature has on drive longevity..."

    Fibre Channel or iSCSI: Does It Matter?
    Enterprise Systems, May 12th, 2014
    "Fibre Channel storage has long been considered the gold standard when it comes to common technologies to deploy to support an organization's computing environment. This environment consists of storage arrays that are outfitted with Fibre Channel connectivity. These arrays are then connected to a dedicated storage networking environment that is comprised of, surprisingly enough, Fibre Channel switches. At the other end of the connection lie the individual servers, each of which is equipped with a Fibre Channel host bus adapter (HBA), which connects the host systems to the same Fibre Channel switches, handily completing the communications loop..."
    IT - Technology
    x
    10 Crucial Issues around Controlling Orbital Debris, Directing Space Traffic
    Network World, May 12th, 2014
    space around Earth?

    A Congressional hearing last week tried to add a popular movie-related theme to the issues with a session called: "Space Traffic Management: How to Prevent a Real Life 'Gravity.'"

    The End of Apple-Google No-Poaching Pacts Could Bring Even More Talent to Silicon Valley
    Bloomberg, May 8th, 2014
    "For those living outside Silicon Valley, the most shocking thing about the no-poaching agreements among some of the world's largest tech companies is that engineering salaries could be even higher than they are now.

    Thanks to court records from the recently settled antitrust case over hiring in the Valley, we now know that the late Steve Jobs, Google Executive Chairman Eric Schmidt and others from Intel and Adobe Systems made a secret pact not to recruit from one another..."

    Ban Killer Robocops Before It's too Late, Rights Groups Say
    Network World, May 12th, 2014
    "Serve the public trust, protect the innocent, uphold the law.

    Those were RoboCop's directives in the 1987 film about a cyborg police officer who would shoot bad guys while quipping 'Your move, creep.'

    But as science fiction inches closer to fact in the 21st century, rights groups are warning that armed police robots will threaten human rights instead of protect them..."

      Inside Google's Driverless Car: The Unused Kill Button
      Bloomberg, May 13th, 2014
      "One of the first things I noticed during my ride today in one of Google's driverless cars was the big red kill button between the two front seats.

      During my 20-minute demo, we never needed the button. In fact, the ride was so smooth that I soon forgot it was there..."

      NASA's Spinoff Technologies are Outta this World
      ComputerWorld, May 9th, 2014
      "A handheld medical diagnostic device. A cloud-based way to connect emergency responders. Brain monitoring sensors. A bottle that filters water for you.

      These are just a few of the commercial products that were created using technology developed by NASA.

      "NASA develops technologies to push the boundaries of what's possible in space, but those same technologies also make life better here on Earth," said Daniel Lockney, NASA's Technology Transfer program executive..."

      Oracle's Surprise Win in Java API Case Could Make it Harder for Developers
      InfoWorld, May 14th, 2014
      "With Oracle's surprise win in federal court today over its Java intellectual property being used without permission in Google's Android mobile platform, a whole new can of worms has been opened when it comes to use of APIs in software development. Android uses Java APIs in its own Dalvik virtual machine, and Google had argued that the use of those APIs didn't require Oracle's permission because it wasn't using the actual Java Virtual Machine..."
      'Star Wars' Prosthetic Arm gets FDA Approval
      Defense Systems, May 12th, 2014
      "The Food and Drug Administration has approved the first prosthetic arm that responds to muscle contractions and gives users a new level of dexterity. Developed under a Defense Advanced Research Projects Agency program, the DEKA Arm System - nicknamed after Luke Skywalker - is about the same size and weight as an adult human arm and is capable of 10 different movements..."
        What's Hot with 3D Printers?
        Network World, May 13th, 2014
        "3D printing is rapidly changing a number of technologies and the way we think about making things like candy or cars even. As feared 3D printing can have a dark side as last week Yoshimoto Imura became the first man to be arrested in Japan for illegal possession of two guns he created himself using 3D printing technology. Here's a look at some other hot 3D news..."
        IT - Bitcoin
        x
        The Secret To Bitcoin's Success Might Be Not Telling People They're Using Bitcoin
        Forbes, May 16th, 2014
        "Circle and Bitreserve, two much-heralded Bitcoin start-ups launching wallet and money transmission products in beta form this week, have something in common: Both companies don't want new users to dwell on the fact that they'll be using Bitcoin. Both companies will use the Bitcoin protocol to store value and move it around the world quickly and with low-transaction fees, but their users will barely be aware of that, as value will be displayed in U.S. dollars or the user's local currency of choice..."
        UK shop cuts out cash for Bitcoin for next three days
        CNET, May 13th, 2014
        "A Scottish shop has traded in cash for Bitcoin. A branch of second-hand shop CeX has done away with British pounds entirely for the next three days in an experiment with the online currency.

        CeX buys your unwanted movies, games and gadgets, for cash or a voucher to spend in store. For the next few days, one branch is just offering Bitcoin..."

        Angling to Be the MasterCard of Bitcoin
        Wall Street Journal, May 16th, 2014
        "As I drive into San Francisco to meet tech entrepreneur Brian Armstrong, reminders of the California Gold Rush pop up everywhere, from Levi Strauss to the San Francisco 49ers. Various modern gold rushes have periodically swept the area for the past few decades, and the 31-year-old Mr. Armstrong is at the forefront of the latest frenzied scramble: virtual currency.

        Bitcoin is the dominant player in the field, and Mr. Armstrong, as the CEO of Coinbase, thinks he has found a rich vein to mine. He wants to be the Visa V +0.13% and MasterCard MA +0.23% of Bitcoin payment processing, taking those behemoths out of the picture as merchants and customers move to virtual transactions..."

        Ripple Explained: Medieval Banking with a Digital Twist
        CoinDesk, May 11th, 2014
        "What is Ripple? Well, it is both a digital currency and a payments protocol, and it is the latter that has got people excited.

        Ripple has been hitting the news recently, with banks saying it has promise, and even for the first time starting to use it for services. But many people don't understand it, so how does it work, exactly?

        A good parallel is the hawala network - a traditional, non-digital way of sending money from city to city. Hawala has its roots in medieval Arabia, and is still in use today in places where banks won't or can't operate..."

          Skyhook Releases Portable, Open-Source Bitcoin ATM for Just $999
          CoinDesk, May 18th, 2014
          "Skyhook is new to the bitcoin ATM-scape but is already interesting many with its first project - the first ever portable, open-source bitcoin ATM machine, with prices starting at $999.

          The Portland-based manufacturer launched the machine on 12th May and demoed it at the Bitcoin2014 conference this weekend..."

          Overstock CEO Delivers Keynote to 1,000+ Attendees at Bitcoin2014
          CoinDesk, May 15th, 2014
          "The Bitcoin2014 conference kicked off today in the Netherlands with a keynote address from Overstock CEO and bitcoin enthusiast Patrick Byrne.

          Byrne delivered his keynote speech to a large portion of the 1,100 registered participants at the conference gathered in the Passenger Terminal in Amsterdam..."

          Bitcoin's Rally Cry on China.s War on Bitcoin. We are coming.
          Bitcoin Magazine, May 12th, 2014
          "To our Chinese Friends, Countryman, and Government - lend me your ears. The Chinese government has now ordered their press to censor news of bitcoin and our Global Bitcoin Summit. It's already too late. We are bitcoin and we're already there.

          People are using our currency quietlyw - carefully today. Does your government think their citizens don't know what the press is forbidden to report? Do they not hear your whispers behind closed doors? Your kingdom may be crumbling from corruption from the inside, yet the lies among their ranks has become circular and corruption is the fruit of their betrayal. They ignore the lessons of history and are confused by the reasons of why no one speaks...'

          First Bitcoin Exchange to Accept Gold
          Bitcoin Magazine, May 14th, 2014
          "Plenty of gold dealers accept Bitcoin, but early this month, QuadrigaCX became the first Bitcoin exchange to add gold to its roster. Alongside CAD, USD and XBT, clients in Canada can now buy and sell XAU (gold). Users can now both deposit and withdraw funds into their accounts via gold bullion, shipped or in person.

          Founders Mike Patryn and Gerald Cotten wanted to provide a means for people to enter the crypto market without going through banks or fiat..."

          The Right Kind of Privacy
          Bitcoin Magazine, May 15th, 2014
          "Bitcoin is unique in its approach to privacy. Uneducated observers lament its advantages for illicit activities, but the blockchain keeps track of every transaction and who has how much coin. The revolutionary part of this system is the fact that one must divulge his or her Bitcoin address to lose anonymity, which leaves us with a new kind of privacy - conditional privacy, known in Bitcoin as 'pseudoanonymity'..."
          BitPay, Toshiba Partnership Brings Bitcoin to 6,000 New Merchants
          CoinDesk, May 15th, 2014
          "Bitcoin merchant payment processor BitPay has announced a new partnership with electronics manufacturer Toshiba that will integrate bitcoin payments into Toshiba's touch-screen point-of-sale platform, VisualTouch.

          BitPay will provide technical assistance for the purpose of integrating bitcoin payments into the existing VisualTouch system. VisualTouch is used by more than 6,000 client-companies in the hospitality, restaurant, grocery and retail sectors worldwide..."

          Solaris
          x
          On-Demand Webcast: Oracle Solaris 11.2 Launch
          Now Available!
          Roxana Babiciu writes, "Last week's launch of Oracle Solaris 11.2 offered the first glimpse of the world's premiere cloud operating system that also has the benefit of advanced virtualization, software-defined networking, and OpenStack capabilities.

          Ready for a double take? The on-demand webcast is now available!"

          MySQL
          x
          MySQL Workbench 6.1.6 GA
          A maintenance release and contains over 30 fixes
          MySQL Workbench 6.1.6 is a maintenance release and contains over 30 fixes and minor enhancements made since the original GA release.

          Introducing over 30 new features, this version has many significant enhancements focusing on real-time performance assessment and analysis from the SQL statement level to server internals and file IO. You can see this from additions to the SQL Editor as well as new dashboard visualization and reporting that take advantage of MySQL Server 5.6 and 5.7 Performance Schema, and enhancements to the MySQL Explain Plans.

          MySQL May Newsletter
          Latest MySQL Product Releases and More
          Here comes the MySQL May Newsletter! As always it's packed with latest product news, technical articles, and not-to-be missed webinars and events where you'll get first-hand information directly from the MySQL experts at Oracle.

          The highlights in this edition include:

          • Join Us at MySQL Central @ OpenWorld 2014
          • Dr. Dobb's: NoSQL with MySQL
          • Live Webinar: Upgrading to MySQL 5.6 - Best Practices
          • Featured Video: MySQL for Excel Introduction
          • Blog: Why VividCortex Uses MySQL
          • Blog: Importing Raster-Based Spatial Data into MySQL 5.7

          You can read it online or subscribe to it to receive the latest copy in your inbox every month. Just sign-in to your oracle.com account and find the MySQL newsletter under "Technology" in the subscription center in your profile.

          Cloud Computing
          x
          Cloud Computing and SOA - Part of the Industrial SOA article series
          Cloud consumers find themselves at the mercy of the cloud provider
          Juergen Kress writes, "Why is everyone talking about cloud computing? Drawn-out, expensive IT projects that are planned and implemented without any benefits for the business stakeholders are commonplace. In contrast, cloud computing offers business users the chance to immediately implement services with usage-based billing that are tailored to their requirements, often without the need to consult with the IT department.

          However, aspects like security, architecture, availability, and standards are often not evaluated..."

          Mastering the Hybrid Cloud
          Notes from Richard Garsthagen, Oracle EMEA Director of Business Development

          Steve Walker writes, "We recently had the chance to give Information Age magazine in the UK our perspective on their questions about Hybrid Cloud. Here are the answers that Richard Garsthagen, Oracle EMEA Director of Business Development, provided:..."

          Linux
          x
          OpenStack Support for Oracle Linux and Oracle VM
          Provides Customers with Greater Choice and Interoperability with Oracle Linux and Oracle VM

          Oracle introduced a technology preview of an OpenStack distribution that allows Oracle Linux and Oracle VM users to work with the open source cloud software. This provides customers with additional choices and interoperability while taking advantage of the efficiency, performance, scalability, and security of Oracle Linux and Oracle VM. The distribution is delivered as part of the Oracle Linux and Oracle VM Premier Support offerings, at no additional cost. Oracle plans to work with the OpenStack community to develop and enhance its enterprise-class capabilities to meet customer demands.

          A good use-case for Oracle Ksplice
          no need for a reboot to install patches
          Wim Coekaerts writes, "One of the advantages of Oracle Ksplice is that you can stick to a given version of a kernel for a very long time. We provide you with the security updates through our Ksplice technology for all the various kernels released so that there's no need for a reboot and also no need to install a newer kernel version that typically also contains new drivers or even new features. Zero downtime yet you are current. Ksplice updates are always based on critical bugfixes or security fixes, things you really want to apply. We do not use Ksplice to provide new driver updates or new features, it's purely focused on those patches that you really want to apply on your environment without downtime and risk of change..."
          IT - Cloud
          x
          To Secure the Cloud, Keep All Your Keys in One Place
          InfoWorld, May 14th, 2014
          "Cloud services may be more secure than the average data center, but managing access -- including handling encryption keys -- raises new risks. Larry Warnock of Gazzang offers one answer..."
          Forget Fad. The Cloud is Real, It's Here and It's Growing
          GCN, May 13th, 2014
          "The cloud is not a fad, and the government's commitment to cloud computing is not a fleeting thing. In fact, as the bedrock technology for the new era of IT, 'it's definitely here to stay, and it's only going to get bigger,' said OMB's Scott Renda.

          Government is at the very beginning of the third major shift in computing paradigms with the cloud, following the ages of mainframe and client-server computing, said Renda..."

          Hybrid Cloud: Who's in Control When Public and Private Clouds Collide?
          SearchNetworking, May 12th, 2014
          "The exponential growth of hybrid cloud leaves IT shops grappling with crucial questions, including: What is the role of the enterprise network in this shared scenario? Is software-defined networking (SDN) suddenly necessary? And perhaps the trickiest of all -- when enterprise IT teams and service providers share environments, who's responsible for what?..."
          To Secure the Cloud, Keep All Your Keys in One Place
          InfoWorld, May 15th, 2014
          'In this week's New Tech Forum, Larry Warnock, CEO of cloud security firm Gazzang, details how we can deal with the data security issues presented by cloud computing through the use of universal key management. -- Paul Venezia

          Cloud computing, big data, and the hybridization of IT environments represent real, seismic shifts in the way organizations leverage technology to provide better customer service, more effectively solve problems, and gain a competitive advantage. But as adoption of these technologies grows, so too does the amount of sensitive data and variety of information objects that require tight management and security..."

          IT - CxO
          x
          Baby Boomers Embrace Technology as Much as Younger Users
          Network World, May 8th, 2014
          "Baby boomers adopt tablets, wearable devices and other technologies just as energetically as younger users, according to participants at the Booming Tech forum, which focused on technology use of that generation.

          Those born between 1946 and 1964, 'are not a generation new to technology,' said Joseph Coughlin, director of the AgeLab at the Massachusetts Institute of Technology..."

            The Rise of Vagueness as a Service
            ComputerWorld, May 10th, 2014
            "An unexpected new trend is emerging in technology. Information presented to the user is growing vague.

            In each new product where vagueness is introduced, exact information is available to the companies providing that information. But increasingly, they're providing the service of converting precise information into vague information.

            I'm going tell you why they're doing this. But first, let me give you a few examples..."

              What the FCC's Net Neutrality Proposal Really Means
              InfoWorld, May 15th, 2014
              "First, the facts. The Federal Communications Commission voted today, 3-2, to move forward on the Net neutrality proposal floated by FCC Chairman Tom Wheeler -- one that, in theory, could be used by ISPs and service providers to charge users extra for faster access to premium content.

              Wheeler's current set of rules forbid a network provider from blocking content outright so long as it is legally available. But the proposal is also worded in such a way that it wouldn't expressly forbid a network provider from charging third parties to allow higher-priority access to certain kinds of content..."

              11 Spring Cleaning Tips for CIOs
              CIO, May 13th, 2014
              "The arrival of spring is often taken as a sign that it's time to clean your house from top to bottom. The same idea holds true for CIOs and their IT environment. You probably have lots of good housekeeping tasks filed away in your 'someday' folder, like rationalizing your applications or getting your power costs under control. Now is as good a time as any to get a jump on your spring cleaning. Here are 11 tips from CIOs for tasks you should undertake to clean up your IT department and organization..."
                Hiring Wisdom: The No. 1 Reason the Wrong People Get Hired
                TLNT, May 12th, 2014
                "The No. 1 reason the wrong people get hired is because we hire them for the wrong reason.

                No matter how logical we may try to be, most hiring decisions still come down to: 'Of those qualified, who do I like best?'

                This means our No. 1 hiring criteria is personality. Unfortunately, personality has nothing at all to do with success on the job..."

                  Take a Stand and Regain Control with a Chargeback Policy
                  SearchServerVirtualization, May 12th, 2014
                  "All too often administrators see requests for VMs with excessive resources. Application owners worried about performance ask for more than they need. However, virtual machines often don't use all of the resources they're given. Worse, throwing too many resources at a machine can cause it to run less efficiently (for example, there is overhead associated with managing multiple CPUs when only one is actively used). To combat this trend, or at least contain it, there are two useful weapons in the system managers' arsenal: showback and chargeback..."
                  vBeers-SF
                  x
                  vBeers @ Boca (Wednesday, May 21th, 2014, 5:30pm to 9pm)
                  Brewzzi Boca Raton, Glades road, just West of I-95
                  Join us for the first vBeers @ Boca. We meet on the 3rd Wednesday of each month in Boca Raton, FL. The May meeting will be at Brewzzi Boca Raton, which is located in on Glades road, just West of I-95.

                  This first event will be a non-sponsored event so bring your wallet, your sense of humor and get ready for some great IT and virtualization conversations with some of the best people in South Florida's IT community (including YOU!).

                  Please RSVP via EventBrite.

                  IT - PM
                  x
                  When IT Pros Don't Cut the Mustard
                  Information Week, May 13th, 2014
                  "How do IT managers handle project team members who are either non-productive or not performing to their expectations?

                  If the individual reports directly, or even indirectly, to you in your function or department, you have the authority to deal directly with the underperformer. Your ultimate leverage is your ability to transfer, demote, or fire the person. You also have the annual employee evaluation or less formal day-to-day assessment as your stick. But as a project manager, especially if you're an external consultant, you often don't have that time or leverage..."

                    IT - Networks
                    x
                    SDN Prompts More Questions than Answers
                    Network World, May 15th, 2014
                    "If there was one takeaway from Network World's Open Network Exchange (ONX) conference this week, it is this: software-defined networking is producing more questions than answers.

                    A recent Network World study of 298 network professionals, highlighted at the conference, found that only 9% of respondents have SDNs in production with 6% piloting. Almost half of the respondents, 43%, said SDNs were not even on their radar screens..."

                      What HEVC Means for You (4K resolution)
                      Business 2 Community, May 12th, 2014
                      "DVDs, Blu-ray discs, and online videos all share the same beneficial technology: a codec. Codecs compress videos into smaller packages, making it easier to send and receive the video on physical or digital mediums; they're why you're able to binge on Netflix or watch the latest and greatest cat videos. For the last six years, MPEG-4, or H.264 has been the world's go-to video codec format. But now, its successor, HEVC or H.265, is taking the stage and bringing a few fun tricks along..."
                      An Internet of Things Prediction for 2025 -- with Caveats
                      ComputerWorld, May 12th, 2014
                      "A massive survey by the Pew Research Center about the Internet of Things in 2025 is very optimistic about the future of the technology. But even though the report seemingly tramples on IoT skeptics, its responses are filled with questions, doubts and caveats.

                      Some 1,600 people in the technology industry, academia, consulting, law and others with expertise on this issue were surveyed..."

                      With the Internet of Things, Smart Buildings Pose Big Risk
                      ComputerWorld, May 13th, 2014
                      "In an Internet of Things world, smart buildings with Web-enabled technologies for managing heat, lighting, ventilation, elevators and other systems pose a more immediate security risk for enterprises than consumer technologies.

                      The increasing focus on making buildings more energy efficient, secure and responsive to changing conditions is resulting in a plethora of Web-enabled technologies. Building management systems are not only more tightly integrated with each other, they are also integrated with systems outside the building, like the smart grid..."

                      IT - Operations
                      x
                      IT Malpractice: Doc Operates on Server, Costs Hospitals $4.8M
                      ComputerWorld, May 8th, 2014
                      "An inadvertent data leak that stemmed from a physician's attempt to reconfigure a server cost New York Presbyterian (NYP) Hospital and Columbia University (CU) Medical Center $4.8 million to settle with the U.S. Department of Health and Human Services (HHS).

                      The hospitals and HHS announced the voluntary settlement, which ends an inquiry into the incident, on Wednesday. New York Presbyterian will pay $3.3 million, while Columbia will pay $1.5 million to settle the complaint..."

                      What's Limiting On-Site DC Data Center Power Supply?
                      SearchDataCenter, May 12th, 2014
                      "Is grid dependence the real limiter against on-site DC power for data centers? I know someone who has high, over fuel cell, energy-efficiency generation tech. He just doesn't know where to go to connect with data center power infrastructure decision makers..."
                      Top 9 Mistakes in Data Center Planning
                      Data Center Knowledge, May 15th, 2014
                      "Your data center is at the heart of your organization so there is constant demand and capacity challenges. How do you effectively plan out a data center deployment, upgrade or new build-out?

                      Basically, how can you avoid making major mistakes when entering the 'build and expand' world?..."

                        Unplug Ghost Servers, Save a Bundle
                        ComputerWorld, May 9th, 2014
                        "The Uptime Institute estimates that 20% of all racked IT equipment has no earthly function other than to warm the planet. But for data centers that do manage to unplug equipment, the savings are significant.

                        To draw attention to the issue of what are sometimes called 'ghost servers,' Uptime held a contest, inviting data center managers to submit their own efficiency efforts. The results are impressive..."

                          IT - Security
                          x
                          Dispelling the Myths of Cyber Security
                          Dark Reading, May 8th, 2014
                          "In the real world, it's hard to imagine any CISO worth his or her salt telling the CEO that vulnerabilities have been reduced to zero. A more effective approach might be to focus on consequence management. But to do that, we first need to dispel a few cyber security myths:..."
                          How to Optimize Your Security Budget
                          CSO Online, May 12th, 2014
                          "The good news is that security budgets are rising broadly. The bad news? So are successful attacks. Perhaps that's why security budgets averaging $4.3 million this year represent a gain of 51% over the previous year - and that figure is nearly double the $2.2 million spent in 2010 - all according to our most recent Global Information Security Survey, conducted by PricewaterhouseCoopers..."
                          Are Rogue Employees the Biggest Threat to Information Security?
                          Help Net Security, May 9th, 2014
                          "Rogue employees continue to be the biggest threat to information security, according to 37% of IT professionals polled by BSI at Infosecurity Europe 2014.

                          The poll investigated perceived threats to information security and how businesses are responding. It found that despite taking measures to combat the risks, 37% of businesses still see employees as biggest threat to information security, ranking the insider threat, higher than cyber-attacks (19%) and BYOD (15%)..."

                          Glow In The Dark -- How CISOs Can Find Their Way Through the Darkness of the Web
                          CSO Online, May 12th, 2014
                          "From a small sushi shop to a large enterprise, hackers are looking for access to a company's crown jewels: data. Web vulnerabilities are an easy route to this information. Viktor Polic explores how vulnerability scanners and ethical hackers help him to understand weaknesses in web applications..."
                            Judge: GPS Data Can be Used in Murder Trial
                            Government Technology, May 13th, 2014
                            "A trail of GPS 'electronic breadcrumbs' showing the path that a cab took from Massachusetts' South Shore to the North Shore, and then to two Connecticut casinos, can be used as evidence against three men charged with killing a popular Ipswich, Mass., restaurant owner in 2011, a judge has ruled.

                            Jun Di Lin's Boston Cab Associates taxi was equipped with a credit-card machine that periodically sent data about its location..."

                              The Dark Side of the Internet of Everything
                              GCN, May 13th, 2014
                              "We're all learning about the dangers of big data. You buy something on Amazon and suddenly all your contacts know about your purchase.

                              Now it turns out that the simple act of turning on your cell phone exposes you to being tracked across the Internet - even if you have switched off location-based services.

                              Researchers at the University of Illinois' College of Engineering have discovered that, due to imperfections in manufacturing processes, cell phone sensors have unique characteristics that can be used to identify the phone..."

                              Bot Born Every 24 Hours
                              Dark Reading, May 8th, 2014
                              "Nearly three-fourths of enterprises have at least one bot-infected endpoint living in their corporate networks, and every three minutes a bot communicates with its command and control server.

                              New data from Check Point Software Technologies highlights the botnet and malware infestation within the enterprise, with 84 percent of organizations found infected with malware, and 2.2 pieces of unknown malware hitting them once every hour. Less than 10 percent of antivirus products had detected unknown malware, and the number of organizations found with bots jumped from 63 percent in 2012 to 73 percent in 2013..."

                                Ira Winkler: My Run-In with the Syrian Electronic Army
                                ComputerWorld, May 13th, 2014
                                "Last month, the SEA, a hacker group whose stated purpose is to support the Syrian government of Bashir al-Assad, hacked the RSA Conference website. The hack was done to express its dislike for me, which stems from a presentation that I gave at the 2014 RSA Conference that detailed the SEA's tactics, named names and disclosed methods to prevent its attacks.

                                I have investigated that hack and subsequent ones on The Wall Street Journal's Twitter accounts and BuzzFeed in the U.K., both meant to denigrate and embarrass me..."

                                  Regulating Drones a Daunting Challenge
                                  Security InfoWatch, May 12th, 2014
                                  "Look up in the sky! It's a bird! It's a plane! No, it's....." For those of a certain age the only response would be Superman. Nowadays, however, it is more likely to be 'the neighbor's drone again." Drones, also called Unmanned Aerial Vehicles (UAV) or more accurately, Unmanned Aerial Systems (UAS), have been in existence since the mid-19th century when they consisted of hot air balloons filled with bombs that were launched by the Austrians in an unsuccessful attempt to conquer Venice. In modern terms, a drone is an aircraft that does not have an onboard human pilot. It may be remotely controlled by a pilot on the ground or be completely autonomous and flown by computers..."
                                    Rush to fight Heartbleed leads to errors with certificates and patches
                                    ComputerWorld, May 9th, 2014
                                    "Despite taking prompt action to defend against the Heartbleed attack, some sites are no better off than before -- and in some cases, they are much worse off.

                                    Many of the sites that patched vulnerable OpenSSL installations after the Heartbleed attack was revealed on April 7 then went on to revoke compromised SSL certificates and order new ones. But 30,000 sites are now using replacements based on the same compromised private key as the old certificate, according to a study by Internet services company Netcraft.."

                                    Security-Vendor Snake Oil: 7 Promises that Don't Deliver
                                    InfoWorld, May 12th, 2014
                                    "Consider me a career-long computer security curmudgeon. When a vendor guarantees its latest and greatest will defend the world against all computer maliciousness, I yawn. Been there; it didn't pan out.

                                    All computer security vendors want us to think that signing on the dotted line and sending them a check will mean our worries are over. Rarely do they deliver..."

                                    Want 'Perfect' Security? Then Threat Data Must be Shared
                                    InfoWorld, May 13th, 2014
                                    "Here's a surprise for you: We actually have a fairly good understanding of who is attacking us on the Internet and why. Various entities know not only which groups are doing the attacking, but also the names of the people in those groups. They know where they live, who their family members are, where they went to school, and when they go on vacation.

                                    A great example of this is the Russian Business Network crimeware group. With a little searching, you can find a decade of evidence trails, pictures of the leader, and even business relationships..."

                                      NIST's Cryptographic Material under Review
                                      Help Net Security, May 15th, 2014
                                      "The National Institute of Standards and Technology (NIST) announced that its primary advisory committee, the Visiting Committee on Advanced Technology (VCAT), has begun its review of the institute's cryptographic standards and guidelines program.

                                      To support its review, the committee has formed a panel of experts to assess NIST's existing cryptographic standards and guidelines and the process by which they have been developed..."

                                        IT - Careers
                                        x
                                        8 Emerging Tech Titles -- Grab 'Em Before they're Hot
                                        ComputerWorld, May 14th, 2014
                                        "IT pros face a constant balancing act between jobs that are core to IT's mission, like tech support specialist or QA technician, and those that ride the wave of change overtaking the industry, like dataviz expert, UX guru or chief digital officer.

                                        With an eye toward your future, Computerworld polled tech industry watchers and analysts to get their take on the up-and-coming jobs that should be on your radar. Who knows? The job with the most potential might be one you haven't heard of yet..."

                                        IT - Social Media
                                        x
                                        A Sobering Lesson about Alcohol, Bad Judgment and Social Media
                                        TLNT, May 9th, 2014
                                        "Rakesh Agrawal, a top executive at PayPal, is no longer working at PayPal following some questionable tweets that were recorded for posterity on the Internet last week.

                                        Apparently Mr. Agrawal was having such a good time at the New Orleans Jazz Fest he decided to disparage his co-workers with a stream of crude dismissals.

                                        He disowned the tweets the next morning, claiming he was merely testing out his new phone while intoxicated (as we all have done at some point)..."

                                          IT - Virtualization
                                          x
                                          It's Time to Generate a Virtual Server Battery Backup Plan
                                          SearchServerVirtualization, May 12th, 2014
                                          "There is a lot of emphasis on virtual machine resiliency and fault tolerance, but what happens when the power goes out? The largest enterprises may be able to keep VMs running using generators or quickly fail over to a remote data center, but what about companies that depend on server battery backup? Let's consider strategies that you can use to reduce power consumption and improve the odds that your most critical VMs will remain online throughout the outage..."
                                            IT - Mobile
                                            x
                                            Mobile First and Last: End to End Computing and The Age of Context
                                            RedMonk, May 16th, 2014
                                            "A few weeks ago I flew out to Las Vegas for IBM's Impact 2014 conference. I am working on a write up of Impact now, but in the meantime I wanted to flag this presentation I gave during the show, alongside Michael Perera Vice President, CICS, TPF & WebSphere System z. Some of you might wonder what the mainframe has to do with mobile apps, but in the end to end context transactions matter, and a lot of transactions still run on the mainframe.*

                                            The theme of my talk is that Mobile First is a real phenomenon, and drives a number of changes that both IT and the business need to accommodate..."

                                            The organizational challenge of mobile app development
                                            GIGAOM, May 13th, 2014
                                            "With mobile application development a persistent priority within the enterprise, most IT organizations find several common challenges among their efforts:

                                            • The creation of an effective, consumer-level, customer experience is not easy for many traditional developers.
                                            • Existing enterprise IT infrastructure does not lend itself to mobile applications support.
                                            • Mobile application development is not a one-time event, but rather a continuing process of ongoing innovation.

                                            Customer experience presents one of the primary opportunities for a business to differentiate itself..."

                                            The Data Digest: Do Mobile Phones Make Us More Productive?
                                            Forrester, May 16th, 2014
                                            "In the early 1900s, author Kin Hubbard said, 'A bee is never as busy as it seems; it's just that it can't buzz any slower.' A century later, things haven't changed much - except that today, those bees are us and that buzzing comes from our mobile phones.

                                            Survey data tells us that consumers regard their mobile phones as catalysts for productivity. Considering the amount of time consumers spend using the device and how essential they characterize the technology to be, it's easy to take their word for it. But not so fast: Mobile tracking metrics show that consumers rarely ever conduct productivity-related tasks on their devices. In fact, the official US productivity rate has dropped to its lowest point in the past two decades..."

                                              Inside the World of Designer Antennas for Wearables
                                              ComputerWorld, May 12th, 2014
                                              "Sixty years after bulky 'rabbit ears' TV antennas, engineers are designing tiny custom ones that can fit inside of wearable devices.

                                              Some of the wearables will be implanted inside the human body for medical purposes, posing challenges for antennas that carry a Bluetooth wireless signal through skin, muscle and bone to reach out to a smartphone or other device. Other antennas will run in smartwatches or even through entire sets of clothing, allowing the them to stretch over a greater distance..."

                                                Welcome to the Year of Wearables. Maybe.
                                                Business 2 Community, May 12th, 2014
                                                "For at least the past five years (if not more), industry prognosticators have been heralding each successive year as finally being 'The Year of Mobile.' Hyping mobile became such a cliche within certain tech and marketing circles that when mass consumer adoption of the platform started to gain real traction, particularly in the U.S., some folks on the bleeding edge of technology had already moved onto the Next Big Thing..."
                                                  IT - Big Data
                                                  x
                                                  Searching for Big Insights at Big Data Week
                                                  MWD Advisors, May 15th, 2014
                                                  "I was at Big Data Week's London Conference to hear about how bigger and faster data can make our cities smarter, our selves more quantified, and our 'things' more interconnected. In fact, the subject of all those billions of instrumented 'things', and the deluge of sensor data they threaten to drown us all in, pretty much anchored most of the day's talks. 2014 is certainly shaping up to be the year of Velocity. Blink and you'll miss it.

                                                  But let's not mistake data for information (let alone insight)..."

                                                  10 Things You Shouldn't Expect Big Data to Do
                                                  TechRepublic, May 12th, 2014
                                                  "Every organization pursues big data with high hopes that it can answer long-standing business questions that will make the company more competitive in its markets and better in the delivery of products and services. Yet in the midst of this enthusiasm, it's easy to build false expectations for big data -- benefits that will never materialize unless you give it the right amount of 'help.' Here are 10 key things that big data in itself won't do for you unless you take the right steps to optimize its value..."
                                                  Big Data Fans: Don't Boil the Ocean
                                                  Information Week, May 12th, 2014
                                                  "Planning a big data strategy? Don't be overly ambitious and always know the problems you're trying to solve. Been reading up on big data? Maybe wondering if it's time to jump on the ol' Hadoop bandwagon, hire a data scientist or two, start stockpiling petabytes of information, and then... Then... what?..."
                                                  Don't Scare Off Data Scientists on Day One
                                                  TechRepublic, May 12th, 2014
                                                  "First days are tough. My first job was with Uncle Sam as a Cavalry Scout for the US Army, and my first duty station was in Bavaria, Germany. On my first day, I remember walking on the streets of Germany as a 17-year old American kid whose sum total of German vocabulary was the word Gesundheit (and I didn't even know what it literally meant -- I just knew that's what you said after someone sneezed). I had no clue what was going on..."
                                                  Healthcare Dives into Big Data
                                                  Information Week, May 14th, 2014
                                                  "With the mandated adoption of electronic health records (EHRs), many healthcare professionals for the first time got centralized access to patient records. Now they're figuring out how to use all this information. Although the healthcare industry has been slow to delve into big data, that might be about to change. At stake: not only money saved from more efficient use of information, but also new research and treatments -- and that's just the beginning..."
                                                  Worried About Security? Beware the Mosaic Effect
                                                  GCN, May 14th, 2014
                                                  "Most people have likely never heard of the mosaic effect. But anyone working with large streams of public data should become familiar with it because it can create security holes where none existed before.

                                                  It occurs, according to Marion Royal, program director of Data.gov, when very large data sets, even those with completely unclassified information, are combined. People can mix that data, reassembling it in unforeseen ways, like a mosaic puzzle. In a worst case scenario, security can be compromised by those with ill intent..."

                                                  IT - BYOD
                                                  x
                                                  Beware IT Pros Who Blame BYOD for Their Own Failings
                                                  InfoWorld, May 12th, 2014
                                                  "A doctor logs in to a hospital server to deactivate his personal computer's account. After his attempt, a server misconfiguration somehow makes the patient records the doctor accessed available on the Web, resulting in a four-year investigation and a $4.8 million fine for two hospitals.

                                                  Is this a failure of BYOD and the user? Or of IT's server admins and security staff?

                                                  Your answer very likely will determine your fate in IT..."

                                                  BYOD May Be SOP, but It's Still a Headache for IT
                                                  Network World, May 13th, 2014
                                                  "Just because BYOD has become standard operating procedure in most workplaces doesn't mean the practice has stopped causing challenges for IT.

                                                  Take San Francisco-based law firm Hanson Bridgett LLP, for example, whose attorneys perform legal work in the healthcare industry and must adhere to the federal HIPAA and the HiTech Act standards, among others. According to the firm's IT director Chris Fryer, that means the Apple and Android smartphones and tablets that its attorneys use need to be managed so that the corporate data on them is encrypted and can be wiped if needed..."

                                                  Consumers Have little Security Concern With BYOD
                                                  Help Net Security, May 15th, 2014
                                                  "Despite the rise in the use of personal devices for business use, U.S. consumers are showing scant concern for security when it comes to BYOD.

                                                  According to a recent survey by Gartner, a quarter of business users admitted to having had a security issue with their private device in 2013, but only 27 percent of those respondents felt obliged to report this to their employer. The survey was conducted in the fourth quarter of 2013 with 995 full or part time workers in the U.S., all of whom use a private device for work purposes..."

                                                  Top10
                                                  x
                                                  Top Ten Articles for last few Issues
                                                  Vol 195 Issue 1; Vol 194 Issues 1, 2, 3, 4 and 5; Vol 193 Issues 3 and 4
                                                  We track how frequently each article is viewed on the web site to determine which the readers consider the most important. For last week, the top 10 articles were:

                                                  • Puppet Configuration in Solaris
                                                  • Oracle Solaris 11.2: All the Posts
                                                  • Oracle VM 3
                                                  • Oracle wins appeal in copyright battle with Google
                                                  • Solaris 11.2: Immutable Global Zone
                                                  • How to get started with OpenStack on Solaris
                                                  • OpenSSL on Oracle Solaris 11.2
                                                  • Solaris-specific Providers for Puppet
                                                  • MySQL Cookbook, 3rd Edition
                                                  • OpenZFS European Conference - May 20, 2014

                                                  The longer version of this article has list of top ten articles for the last 8 weeks.

                                                    IT - Server
                                                    x
                                                    Why You Should Consider Server Caching for Virtualization
                                                    Storage Switzerland, May 15th, 2014
                                                    "Many organizations are considering flash caching as a cost-effective way to accelerate application workloads. The challenge is virtual infrastructure planners need to sift through a myriad of flash caching options available on the market. One of the most popular flash caching options is server-side caching. Accelerating performance at the server layer is a highly targeted approach for enhancing virtual machine performance and one of the major ancillary benefits is that it actually enables organizations to extend the life of their existing, shared storage assets..."
                                                    IT Pros Stressed Out, Looking To Jump Ship
                                                    Network Computing, May 12th, 2014
                                                    "A survey indicates pressure from management and lack of resources is leading to high anxiety and job dissatisfaction among IT admins.

                                                    The job of an IT professional has always been stressful, but a recent survey shows the anxiety level is increasing among IT admins, leading more of them to look for new jobs.

                                                    The third annual IT Admin Stress Survey from GFI Software shows that 77% of the 200 US IT administrators polled consider their job stressful, up 12% from last year..."

                                                    Tenets of Modern Server Uptime and Data Center Availability
                                                    SearchDataCenter, May 12th, 2014
                                                    "If server uptime is IT's holy grail, technology and people both must play a big role in the quest.

                                                    Working, constant data center availability is a core requirement of any organization. However, IT's quest for 'dial tone' availability over the years has never quite materialized.

                                                    Maybe we are getting closer to achieving this vision, thanks to newer technical architectures such as virtualization and cloud computing. But new technologies only go so far. If organizations really want to improve their data center availability, they need to focus on three core principles: automation, modularity and redundancy..."

                                                    IT - Tape
                                                    x
                                                    Tape metrics help make the technical case for tape technology.
                                                    IT-$ENSE, May 15th
                                                    "Tape is one of the oldest data storage mechanisms out there. It has advanced significantly through the years in terms of speeds and feeds, capacities, durability/reliability, and automation intelligence. This issue covers many of those advances, which are showing up in tape products today from leading vendors.

                                                    The good news is that tape vendors -- whether the media folks, the robotics folks, or the tape file systems folks, really want to talk. They are sick of the propaganda that disk array vendors are putting out there, with the help of their paid mouthpieces in the industry analyst trade.

                                                    Frankly, I'm pretty sick of the 'Tape Sucks Move On' bumper stickers you see at trade shows too..."

                                                    Even if Disk were Free You'd Still Want Tape
                                                    Storage Switzerland, May 13th, 2014
                                                    "The cost of disk capacity has come down dramatically over the last two decades and, thanks to technologies like scale-out NAS and object storage, the ability to manage petabytes of data is certainly a possibility. But the cost to power and cool this storage plus the cost of data center floor space have increased dramatically. The net impact is that even if storage vendors gave disk capacity away, the cost to maintain that capacity could bankrupt you..."
                                                    Data Protection 101: Backup and Restore Methods
                                                    Enterprise Systems, May 12th, 2014
                                                    "Do you back up your data? While it's one of the least appealing parts of the IT function, it's really one of the most important. In fact, I once worked for an organization that had, in its past, fired the entire IT department when it was discovered that the group had failed to back up the primary financial system for more than six months. This was discovered when the system failed and recovery was impossible..."
                                                      Sysadmin
                                                      x
                                                      Less known Solaris features
                                                      pwait

                                                      Joerg writes, "This is a nifty small tool that I'm using quite often in scripts that stop something and do some tasks afterwards and I don't want to hassle around with the contract file system. It's not a cool feature, but it's useful and relatively less known. An example: As I wrote long ago, you should never use kill -9 because often the normal kill is intercepted by the application and it starts to do some clean up tasks first before really stopping the process. So just because kill has returned, it doesn't imply that the process is away. How do you wait for process to disappear?..."

                                                        NetBeans
                                                        x
                                                        Build a Rich Client Platform To-Do Application in NetBeans IDE
                                                        by John N. Kostaras
                                                        Practice using NetBeans IDE features that improve code quality and increase developer productivity.

                                                        This article shows how to use NetBeans IDE 7.4 to develop a Swing-based "to-do" application, and it demonstrates the use of a rich client platform (RCP). It is an update of "A Complete App Using NetBeans 5" by Fernando Lozano, which was originally published in NetBeans Magazine.

                                                        Note: NetBeans IDE 7.4 requires JDK 7, while earlier versions up through NetBeans IDE 7.3 can run with JDK 6.

                                                        Technical Article: Build a Rich Client Platform To-Do Application in NetBeans IDE
                                                        how to use NetBeans IDE 7.4 to develop a Swing-based 'to-do' application
                                                        Tori Wieldt writes, "Check out the technical article 'Build a Rich Client Platform To-Do Application in NetBeans IDE' on OTN. This article shows how to use NetBeans IDE 7.4 to develop a Swing-based 'to-do' application, and it demonstrates the use of a rich client platform (RCP).

                                                        The example application builds a to-do list, which is commonly found as part of privileged identity management (PIM) suites. The article doesn't just demo the NetBeans IDE's RCP features; it also sticks to object-oriented best practices, showing that you can develop GUI applications quickly and interactively without compromising long-term maintenance and a sound architecture..."

                                                        Nexenta News
                                                        x
                                                        Nexenta at VMware User Groups (VMUG) Worldwide
                                                        VMUGs are from 7:45 am to 5:00 pm local time and span California to Copenhagen
                                                        Nexenta announced that Nexenta executives will be showcasing its solutions as a Silver Sponsor at a variety of upcoming VMware User Groups (VMUG) worldwide. Attendees can learn about and hear real world examples of Software-Defined Storage and its impact in bringing the Software-Defined Data Center (SDDC) to reality. The VMUGs are from 7:45 am to 5:00 pm local time and span California to Copenhagen.

                                                        • Philadelphia VMUG, Thursday, May 15th, Radisson Valley Forge
                                                        • Denver VMUG, Tuesday, May 20th, Hyatt Regency Convention Center
                                                        • New York/New Jersey VMUG, Thursday, May 22nd, Hyatt Regency Jersey City
                                                        • Carolina VMUG, Thursday, June 5th, Charlotte Convention Center
                                                        • Vancouver VMUG, Thursday, June 12th, Vancouver Convention Center
                                                        • Potomac VMUG, Thursday, June 19th, Hyatt Regency Crystal City, Arlington, VA
                                                        • Salt Lake City VMUG, Wednesday, July 9th,
                                                        • Hilton Salt Lake City Center
                                                        • Indianapolis VMUG, Thursday, July 31st, Indiana Convention Center
                                                        • Dallas-Fort Worth VMUG, Tuesday, September 16th, Irving Convention Center
                                                        • Chicago VMUG, Wednesday, September 17th, Rosemont Convention Center
                                                        • Phoenix VMUG, Thursday, September 18th, Phoenix Marriott Temps at the Buttes
                                                        • Southern California VMUG, Wednesday, September 24th, Anaheim Marriott
                                                        • Atlanta VMUG, Thursday, September 25th, Georgia World Congress Center
                                                        • Portland VMUG, Tuesday, November 4th, Oregon Convention Center
                                                        • Nordic VMUG, Thursday, November 20th, Bella Center A/S Copenhagen
                                                        • Germany VMUG, Tuesday, November 25th

                                                        Details

                                                        Nexenta Named Finalist for American Technology Award
                                                        Server and Storage Category
                                                        Nexenta (@Nexenta), the global leader in Software-Defined Storage (#softwaredefinedstorage) (SDS), has been named a finalist for an American Technology Award (ATA) in Server and Storage technology for NexentaStor, Nexenta's flagship SDS platform. The ATAs have come to represent outstanding achievement in 15 different technical categories and are considered the only 'Best of' national award in the technology industry.
                                                        Data storage software maker Nexenta looks at 2015 IPO
                                                        spending on storage management software is expected to rise to about $22 billion in 2017 from $16 billion in 2013
                                                        Reuters reports that Nexenta Systems Inc, a data storage software maker, said it plans to go public by the end of 2015 as it looks to cash in on investors' appetite for companies that help businesses cut costs.

                                                        Nexenta makes open source-based "software-defined storage", which a client uses to save data on hardware from other vendors, thereby avoiding costly 'package deals' that require buying hardware and software from the same vendor such as NetApp Inc or EMC Corp.

                                                        The demand for its expertise has helped double Nexenta's annual revenue in the last three years and the nine-year old company is expected to post a profit as early as end of this year, Chief Executive Tarkan Maner told Reuters.

                                                        Level3 News
                                                        x
                                                        tw telecom to Present at Investor Conferences
                                                        Boston, MA, Tuesday May 20th and New York, NY, Wednesday May 28th
                                                        tw telecom inc. (NASDAQ: TWTC), a leading provider of managed services, including Business Ethernet, converged and IP VPN solutions for enterprises throughout the U.S. and to their global locations, will present at the following conferences:

                                                        • 42nd Annual J.P. Morgan Global Technology, Media and Telecom Conference-
                                                        • Boston, MA, Tuesday May 20th @ 11:20 a.m. (EDT)

                                                        Cowen and Company 42nd Annual Technology, Media & Telecom Conference

                                                        • New York, NY, Wednesday May 28th @ 8:45 a.m. (EDT)

                                                        Scheduled Speakers:

                                                        • Larissa Herda, Chairman and CEO
                                                        • Mark Peters, EVP and CFO
                                                        • Michael Rouleau, SVP, Business Development and Public Policy

                                                        These presentations will be webcast. Please visit www.twtelecom.com, "Investors" to listen to the webcasts and access the conference materials.

                                                        Trending in
                                                        Vol 234, Issue 2
                                                        Trending IT Articles