News about Oracle's Solaris and Sun Hardware
System News
May 19th, 2014 — May 25th, 2014 Generate the Custom HTML Email for this Issue
System News System News for Sun Users
Volume 195, Issue 3 << Previous Issue | Next Issue >>
Sections in this issue:
click to jump to section

7 Facts About The Industry's Newest Cloud Platform
By Scott Genereux, Senior Vice President for Oracle's Hardware Systems Business Group
Scott writes, "Infrastructure software has evolved from the days when computers could take hours to crunch numbers, spit out answers, and otherwise provide 'decision support.' Today, the software needed to manage IT services is more than just an operating system (OS). It's some of the most sophisticated technology in the data center.

Consider the latest advances to Oracle Solaris 11.2, which was launched April 29 at an event in New York City. Solaris was the result of AT&T and Sun's collaboration to make UNIX a true enterprise-class OS. Today, Oracle Solaris has evolved into much more than a computer OS - it's now a complete, enterprise-class cloud platform..."

Bob Evans on the consumerisation of corporate communications
About meaningful content, native advertising and why Larry Ellison is a worldclass storyteller
"Oracle's chief communications officer talks to the Media Network about meaningful content, native advertising and why Larry Ellison is a worldclass storyteller", writes Robin Hough in The Gardian.

"You've been in your role for just over a year now. How are you finding it?

Constant change and constant opportunities. We've only just begun to tap the potential of what can be done and the impact that we can have on our customers and on the company itself.

There's a growing trend towards the world's biggest companies having comms and marketing people as members of the board, and in some cases running those companies. Why do you think this is?..."

Why ISVs Run Applications on Oracle SuperCluster
Video with Michael Palmeter, Senior Director Product Development of Oracle Engineered Systems
Michael Palmeter, Senior Director Product Development of Oracle Engineered Systems, discusses how ISVs can easily run up to 20x faster, gain 28:1 storage compression, and grow presence in the market all without any changes to code., Senior Director Product Development of Oracle Engineered Systems, discusses how ISVs can easily run up to 20x faster, gain 28:1 storage compression, and grow presence in the market all without any changes to code.


Symphony EYC Runs Best with Oracle Exadata

Scott Staupe, VP Alliances and Channels at Symphony EYC, discusses how Oracle Exadata allows customers to dramatically grow their business and access their data faster than on any other platform.


Oracle VM 3: Overview of Disaster Recovery Solutions
detailed white papers describing exact steps for DR
Oracle offers a complete product portfolio that includes servers, storage, applications, middleware and database products that will allow you to piece together a custom disaster recovery (DR) solution for your business systems. Oracle VM 3 is simply one piece of a very complex puzzle that must be integrated along with other disaster recovery software and applications into an overall business continuity solution for your enterprise.

There are several different approaches to integrating Oracle VM into a disaster recovery environment all of which work with SAN or NAS. This paper discusses different high level deployment architectures and strategies. Use this white paper to choose a DR solution that best fits your needs. Once you know which direction you want to take using this paper, you will then follow other more technically detailed white papers describing exact steps for the DR solution path you choose.

Improved vDisk Performance for LDoms
By Stefan Hinker
Stefan write, "In all the LDoms workshops I've been doing in the past years, I've always been cautioning customers to keep their expectations within reasonable limits when it comes to virtual IO. And I'll not stop doing that today. Virtual IO will always come at a certain cost, because of the additional work necessary to translate physical IOs to the virtual world. Until we invent time travel, this will always need some additional time to be done. But there's some good news about this, too:.."
Oracle VM VirtualBox 4.3.12
maintenance release
Oracle VM VirtualBox 4.3.12 has just been released. This maintenance release improves stability and includes some new experimental features.

For more details see the ChangeLog, or just simply download it now at the community or Oracle download sites.

[url " "Download"]

How to create a virtual machine on oracle VM
by Lingeswaran R
"Oracle VM supports three type of virtual machines. The first one is hardware Virtualizaton (HVM, Fully virtualized). To create HVM guests, your hardware must support hardware virtualization and should be enabled in BIOS where you have installed the oracle VM server. The second one is Hardware virtualized with para-virtualized drivers (PVHVM). This is all most similar to HVM but uses the para-virtualized drivers. The third one is paravirualized which is known as PVM. In an order to install any type of the guest operating systems, you need to allocate the key resources.

  • Storage
  • ISO image
  • Memory
  • CPU
  • Network (Optional)

Here we will see how to create a virtual machine on oracle VM and how to allocate the system resources to it..."

IT - Storage
Is it Time to Stop Worrying about Flash Wear Out?
Storage Switzerland, May 19th, 2014
"Flash has made its way into enterprise data centers, replacing or augmenting hard disk drives (HDDs) in more and more servers. But many users seem to fixate on one characteristic of NAND flash solid state drives (SSDs), the fact that they wear out. There's a common assumption that SSD wear leads to failure and potential data loss and the fact that flash has a finite lifespan means it will somehow deliver less total value. This article will compare wear, risk and value in SSDs and HDDs to see if it's time to stop worrying about flash wear out..."
Converging Your Storage Network without Fear
Business 2 Community, May 19th, 2014
"The days of completely separate storage network technologies are quickly fading. It feels like it's only a few years ago that Fiber Channel was the way to create large scale storage networks. Big honking storage devices on a separate network, connected to Fiber Channel switches, connected with Fiber Channel adapters into servers. With 10GbE becoming cost effective and matching or outperforming 2, 4 or even 8Gbit Fiber Channel, Fiber Channel over Ethernet was invented, mostly as a mechanism to allow Ethernet based attachments to existing Fiber Channel installations. It's a bit clumsy, but it works..."
IT - Technology
'Do Not Track'? Oh What the Heck, Go Ahead
InfoWorld, May 22nd, 2014
"Chalk up another victory for corporate surveillance: Five years after advocates came up with an easy way to let you browse the Web with just a little privacy, the Do Not Track system is in tatters and that pair of boots you looked at online last month is still stalking you from website to website.

In 2009, a few Internet privacy advocates developed an idea that was supposed to give people a way to tell websites they don't want to be monitored as they move from website to website. The mechanism, which would eventually be built into all the major browsers, was called Do Not Track..."

    Can We Delegate Moral Decisions to Robots?
    GCN, May 19th, 2014
    "An Army robot is tasked with transporting needed medicine to a field hospital. Along the way, it encounters a wounded soldier. Should the robot drop its cargo and carry the wounded soldier instead?

    That's one of the scenarios posed by Matthias Scheutz, principal investigator of a project funded by the Defense Department's Office of Naval Research aimed at developing robots that can make moral decisions..."

      Google's Self Driving Car
      Network World, May 16th, 2014
      "Google's self-driving car technology likely will not be available for several more years - think 2017 or beyond. Recently the company took a number of reporters on little rides to show off what the car's technology can do now. Here's a look at the picture profile Reuters shot at the event..."
      US Navy Wants Smart Robots with Morals, Ethics
      Network World, May 16th, 2014
      "The US Office of Naval Research this week offered a $7.5m grant to university researchers to develop robots with autonomous moral reasoning ability.

      While the idea of robots making their own ethical decisions smacks of SkyNet - the science-fiction artificial intelligence system featured prominently in the Terminator films - the Navy says that it envisions such systems having extensive use in first-response, search-and-rescue missions, or medical applications..."

        IT - Bitcoin
        Bitcoin Shows Off
        Bitcoin Magazine, May 19th, 2014
        "Movements succeed with numbers. Many people must partake to create the change we want to see.

        Bitcoin has come a long way since its introduction in 2009, and we are currently in mainstream media almost daily. Both the American and Canadian Senates are investigating our beloved virtual currency. However, we still have a long way to go to dispel the myth that many people hold that Bitcoin is an underground currency used to buy and sell drugs, or is not financially viable..."

        Bitcoin set to overtake PayPal in 2014
        CryptoCoinsNews, May 25th, 2014
        "The Laureate Trust has announced, via a press release to The Digital Journal, that they expect Bitcoin to pass PayPal in USD transaction volume later this year. The Trust has pointed out that Bitcoin is fast establishing itself as the currency of choice for international internet purchases and payments. Bitcoin has now reached a transaction volume of $300 Million, per day.

        The Laureate Trust sees the current Bitcoin price, now circa US$530-560, as a tremendous opportunity to buy into Bitcoin, they advise that the currency could increase by up to 50 percent in price in the near-term as it prepares, for the first time, to overtake PayPal in actual transaction volume..."

        The Boring Bitcoin Report: May 12-19
        Forbes, May 20th, 2014
        "The regulations that come out of Washington are likely to be repeated across the rest of the globe.

        This past week we saw several governments give broad and loose mentions of bitcoin, but no firm or direct regulation or guidelines have been issued, with the exception of China. Everyone seems to be waiting for the United States to take the lead on this issue. However, the United States is moving slow. We still don't have any guidance from the Security and Exchange Commission regarding securities offerings..."

        Federal Reserve.s Bitcoin Policy Begins to Take Shape
        Bitcoin Magazine, May 19th, 2014
        "On Friday, May 9th, 2014, the Federal Advisory Council and Board of Governors of the Federal Reserve met for their quarterly meeting in Washington D.C. This meeting was historically held in secrecy until Bloomberg News 'won' a Freedom of Information Act request under the Freedom of Information Law requiring the Fed to make the meetings minutes available to the public..."
          Bitcoin Society CEO: Why Digital Currency is a Tool for Global Good
          CoindDesk, May 24th, 2014
          "The weekend before last week's Bitcoin2014 conference in Amsterdam, 22-year-old Matthew Kenahan had a choice to make - one that he said was 'probably one of the most difficult decisions I've ever had to make'

          Here was his dilemma: attend graduation after slogging for four hard years to get his degree in International Business and Marketing, or skip it to attend the Bitcoin2014 conference, where he and the organization he heads, the Bitcoin Society, were nominated for a Blockchain Award or 'Blockie'

          Report Suggests MtGox Fraud Led to $1200 Bitcoin Price
          CryptoCoinsNews, May 25th, 2014
          "It turns out that the extreme rise in the bitcoin price near the end of the 2013 may not have had much to do with China, Silk Road, or government hearings in the United States. Although those three factors are often cited as the reason the price skyrocketed to over $1000 near the end of the year, a new report suggests that there was some price manipulation going on behind the scenes at MtGox. Although the report falls short of placing guilt upon Mark Karpeles or anyone else at MtGox, fraud is definitely an accusation..."
          Julian Assange: Bitcoin is a Major .Intellectually Interesting Development.
          CoindDesk, May 21st, 2014
          "Wikileaks founder Julian Assange has issued a glowing endorsement of bitcoin, labelling it 'the most intellectually interesting development in the last two years'

          The 42-year-old Australian national was speaking via video link this morning at the Net Prophet technology and trends conference, taking place in Cape Town, South Africa..."

          Bitcoin 2014 Roundup (Amsterdam)
          Bitcoin Magazine, May 22th, 2014
          "Well I attended Bitcoin 2014 in Amsterdam and it was a blast. I met lots of people who I've been emailing/skyping with over the last six months so that's always fun. The conference had a few keynote talks for all and all the rest was broken out into four parallel tracks, which is always annoying as one wants to attend more than physically possible.

          There was a robust collection of exhibitors (approximately 40ish) on the show floor and that was fairly impressive for such a young conference..."

          On the Origins of Money: Darwin and the Evolution of Cryptocurrency
          CoindDesk, May 25th, 2014
          "Charles Darwin first published his theory of natural selection in his book On the Origin of Species in 1859. The result of over 30 years of research, Darwin delivered to the world a new understanding of how modern species came to be, evolving over generations.

          The son of a wealthy English family, Darwin was not a man in need of money. Nonetheless, for On the Origin of Species and his other publications, Darwin received royalties that were most likely paid in British Sterling.

          Still in existence, the British Pound has origins dating back as far as 750 A.D. making it the world's longest-surviving active currency...."

            MySQL Enterprise Backup Improved Compression Algorithm for 3.10
            By Sandeep Sethia
            Sandeep writes, "Prior to version 3.10, MySQL Enterprise Backup (MEB) used zlib compression for in-memory compression of datafiles. The compression worked by splitting the innodb datafiles into fixed size blocks and compressing each block independently.After searching on the web we found there are many compression algorithms available which can be used for compression. This triggered the idea of testing the performance of available compression algorithms. If the benchmark shows improved performance we can make backup and/or restore faster by adding the new compression algorithm to MEB..."
            MySQL Enterprise Monitor 2.3.17
            By Andy Bang

            MySQL Enterprise Monitor 2.3.17 is now available for download on the My Oracle Support (MOS) web site. This is a maintenance release that updates various third party components. You can find more information on the contents of this release in the change log.

            You will find binaries for the new release on My Oracle Support. Choose the "Patches & Updates" tab, and then choose the "Product or Family (Advanced Search)" side tab in the "Patch Search" portlet.

            Cloud Computing
            Oracle Managed Cloud Services Earns Elite Status for Federal Deployments
            Under the Federal Risk and Authorization Management Program (FedRAMP)
            Oracle Corp. has been approved to deliver a sophisticated new type of highly secure managed cloud services to federal customers that will help them rapidly and confidently comply with 'Federal Cloud First' initiatives.

            Three federal agencies - the Department of Defense, Department of Homeland Security, and General Services Administration - plus an outside company participated in the rigorous review of solutions from technology vendors. Having met those stringent requirements, Oracle's Managed Cloud Services was granted a provisional authority to operate under the Federal Risk and Authorization Management Program, or FedRAMP.

            This new status makes Oracle Managed Cloud Services the first private-cloud services provider to be given authority to offer federal customers a Platform as a Service (PaaS) offering using a hybrid-cloud environment encompassing both private cloud and community cloud.

            Unbreakable Enterprise Kernel Release 3 Quarterly Update 2
            By Michele Casey
            Michele says that Oracle has announced "the availability of Unbreakable Enterprise Kernel Release 3 Quarterly Update 2 (UEK R3U2) for Oracle Linux 6. This is the second quarterly update release for UEK R3 (Version 3.8.13-35) and includes driver updates as well as a consolidation of fixes for bugs and security issues.

            Some notable highlights include:

            • Support for HP Generation 9 servers, including HP SSD Smart Path for improved performance when using HP Smart Array controllers
            • Support for the Intel XL710 family of Ethernet Controllers
            • Updates to paravirtualization drivers to support Oracle Linux guests running on Microsoft Hyper-V
            • Updates to the DTrace profile provider to include profile-n probes, which can fire at fixed intervals at high-interrupt level on all active CPUs. This is - similar to the tick-n probe, which fires at fixed intervals at high interrupt level on one CPU per interval
            • Device driver updates (e.g. storage devices, network cards) from key partners, such as: Broadcom, Brocade, Cisco, Emulex, HP, Intel Qlogic

            For more details, please review the release notes.

            IT - Cloud
            How Cloudy Are Your Cloud Service Provider Partners?
            Forrester, May 19th
            "There's no shortage of companies these days calling themselves cloud service providers (CSPs) but are they really? And if not, what value do they bring to your portfolio and the cloud landscape?

            Following up on our recent cloud services market forecast, our latest report helps CIOs understand the CSP market landscape. It breaks down the CSP market into its three tiers..."

              Mixing colocation and public cloud providers without getting a hangover
              Gigaom, May 23rd, 2014
              "A colocation data center (or colo) is a type of data center where equipment space and bandwidth are available for rental to retail customers. They rose up quickly in the last 10 years as businesses looked for more economical ways to host their expanding number of servers. Moreover, many businesses wanted to get out of the business of maintaining their own data center, which was a constant burden and expense.

              Colos provide space, power, cooling, and physical security for the server, storage, and networking equipment. This includes high-speed Internet connectivity, or maintaining a dedicated circuit back to the enterprise..."

              IT - CxO
              13 Critical Steps for Making High-Quality "Boomerang" Hires
              TLNT, May 22th, 2014
              Yesterday, I told you about why 'boomerang rehires' - former top-performing employees who you rehire after an absence of a few years - are such an important sources of quality hires (See Want a Great Source of Quality Hires? You Need a 'Boomerang' Program.)

              But, if you want to take advantage of a boomerang program, there are some important action steps you need to consider: ..."

                Why IT Needs to Drive the Risk Conversation
                ComputerWorld, May 19th, 2014
                "It's a familiar complaint: Executives from a business department learn about a new, often cloud-based product and they want to try it. Only they can't, because IT has decreed that this wonderful new product creates too much risk. The frustrated business execs gripe that IT is standing in the way of progress. As one business executive said, IT is 'where dreams go to die'..."
                  Is Improving The Customer Experience A Moral Imperative?
                  Forrester, May 20th
                  "When I ask government employees why improving customer experience (CX) is so important, I often hear a version of the same answer: 'It's the right thing to do.' But I'm not about to take an easy answer like that at face value, so I dig deeper.

                  I try getting them to admit that they're really motivated by the CX mandates in Executive Order 13571, the digital government strategy, and agency mission statements..."

                    Chinese Hacking Charges a Wakeup Call for Both China & US Businesses
                    Dark Reading, May 20th, 2014
                    "Indictments open the door for more aggressive US litigation of intellectual property theft by China -- but with possible costs to US businesses. Call it a calculated risk: The US Department of Justice conducted an unprecedented naming and shaming yesterday of five members of an infamous Chinese military unit known for spying on US companies for intellectual property and other valuable commercial intelligence..."
                      Healthcare IT Priorities: No Breathing Room
                      Information Week, May 19th, 2014
                      "Healthcare has always been a highly regulated industry, but in the last few years requirements for implementing and documenting digital healthcare systems have been piling up so fast that IT organizations have little time for anything else -- including making sure the systems they already have in place are being used effectively..."
                      Top Initiatives to Improve IT
                      Information Management, May 19th, 2014
                      "Management consultancy McKinsey & Co. surveyed business executives from across functions to find out their attitudes about IT. One question asked what initiatives would be most important to improving IT performance. More than 738 executives responded, and the results were published in late March. McKinsey's takeaway: 'Surprisingly, more IT executives than business leaders see changing IT leadership as a priority to improve IT performance.'

                      Here are McKinsey's top nine initiatives to improve IT performance based on the results..."

                      Who's Got Your Back? 4 Keys to Building Trusting Work Relationships
                      TLNT, May 22th, 2014
                      "If you've ever had a boss, colleague, or group of people in your life who've offered exceptional advice or shepherded you in the right direction, you inherently understand the enormous power and potential of those relationships.

                      Unfortunately, many of us think serendipity, chemistry, or just plain luck is responsible for bringing deep, trusting business relationships into our lives. In fact, these relationships are best built by design.

                      Behind every great leader, at the base of every great tale of success, you'll find an indispensable circle of trusted advisors, mentors, and colleagues..."

                        Healthcare CIO Edward Marx: IT ROI is Measured in Lives Saved
                        ComputerWorld, May 19th, 2014
                        "Edward W. Marx focuses on technology's power to transform the healthcare industry. As senior vice president and CIO at Texas Health Resources in Arlington, Marx has led numerous IT-enabled transformative initiatives aimed at improving patient health. Those projects include using social media to connect with the local community and implementing BI tools to deliver advanced clinical care..."
                        If You Want Innovation and Change, You'll Need Wave Makers
                        TLNT, May 22th, 2014
                        "As human beings, we are born with an interest in using our imagination and making the world better.

                        Think back to kindergarten, when you were full of ideas, suggestions, and questions. Many of you remember your own questions, or have a child who regularly asks, 'Why?'

                        Why can't trains fly? What if we had birthday cakes for dogs? Why not? That creative mind-set gradually fades as we grow up, learn what's realistic, and apply the world's logic. And parental exhaustion has to be a factor, too..."

                          vBeers @ Miami (Wednesday, May 28th, 2014, 6pm to 8pm)
                          Biscayne Tavern
                          This will be a Sponsored event so drinks and are on us! Please join us for this vBeers @ Miami and encourage your enterprise IT colleagues to attend as well.

                          Join us for an evening of creating connections and building your network in a relaxed and fun environment.

                          Networking is an essential aspect of your professional growth and development. Connect with an array of professionals while enjoying a drink or two. Who knows, you just may meet your next client, business partner, employer or employee...!


                          • Biscayne Tavern
                          • 146 Biscayne Blvd, Miami, FL 33132


                          • Biscayne Tavern, SherlockTech Staffing, Vault Networks, Nexenta Systems and PCS

                          Join the vBeers LinkedIn group. Network with fellow vBeers participants on-line.

                          Please RSVP via EventBrite

                          Oracle Tuxedo 12c
                          Enhanced management and monitoring features
                          Enterprises today run hundreds of critical applications, written in multiple languages and distributed across a wide range of platforms. These highly distributed and complex computing environments can create unforeseen application development and deployment issues that slow time to market for new applications and hinder the performance, availability and scalability of existing ones. Oracle Tuxedo, the #1 application server for C, C++, COBOL and Java deployments in private cloud or traditional data center environments, provides customers with a highly reliable and scalable platform to develop and deploy mission-critical applications. Regardless of their programming language, Oracle Tuxedo allows applications running on the same platform to communicate seamlessly.

                          With enhanced management and monitoring features and tighter integration with Oracle technologies, the latest release of Oracle Tuxedo 12c enables organizations to dramatically increase application throughput, while reducing total cost of ownership and time to market for new application development and deployment.

                          Oracle Tuxedo ART 12c
                          Accelerate the rehosting of IBM mainframe applications

                          To reduce costs and become as agile as possible, organizations today are increasingly seeking to move business-critical mainframe applications to open systems and cloud environments. However, to do so can often imply complex, costly and resource-heavy application migration projects, which deter companies from undertaking such migrations. As a result, organizations need a scalable, reliable and high-performance application migration solution that can help them transition to open systems and the cloud faster and with minimal impact on the mainframe-skilled IT personnel. Today Oracle has introduced the latest release of its mainframe application rehosting platform, Oracle Tuxedo ART 12c, to help organizations speed up migration projects and accelerate the adoption of the new environment by current IT staff.

                          SOA/BPM 11g Virtual Machine appliance
                          By Juergen Kress
                          Juergen Kress writes, "I am pleased to announce the availability of Oracle's SOA/BPM/OSB 11g Virtual Machine appliance. This VirtualBox virtual machine is meant for testing and evaluation purposes only. It is not certified, nor licensed for any production use. It is our most comprehensive virtual machine to date, with the following Oracle products installed, configured and functionally integrated within the appliance:

                          • Oracle Linux 6 Update 4 (64-bit)
                          • Oracle Database Express Edition 11g Release 2
                          • Oracle SOA Suite (includes Service Bus)
                          • Oracle Event Processing
                          • Oracle BPM Suite
                          • Oracle Webcenter Content (Enterprise Content Management)
                          • Oracle Webcenter Suite
                          • Oracle Webcenter Portal
                          • Oracle JDeveloper
                          • Oracle JRockit
                          • Java SE Development Kit

                          Refer to the README document for full details on the appliance features, installation guide, memory configurations, URLs, credentials and other recommended software..."

                          IT - PM
                          Bart Perkins: A Project Staffing Worst Practice
                          ComputerWorld, May 19th, 2014
                          "Gathering best practices? Here's a worst practice: using the Defense Department's Lowest Price Technically Acceptable (LPTA) procurement approach to evaluate RFPs for systems integration, IT strategy, ERP installation other high-skill efforts.

                          LPTA was originally designed to purchase items with precisely defined technical requirements, such as office supplies and raw materials..."

                            There's More to Oracle OpenWorld Than Just IT
                            By Tom Caldecott
                            Tom writes, "You think IT. You dream IT. You speak…well, you know. So what are you going to do at Oracle OpenWorld? Of course, you can explore IT through a wide variety of sessions, keynotes, and networking events. But Oracle OpenWorld is so much more.

                            After all, Oracle OpenWorld is the world's largest business and technology conference. You can learn about the business challenges you're facing and the solutions successfully used by your peers; for example, how to better align marketing and sales and drive peer-to-peer communication. Check out the focus areas available at Oracle OpenWorld 2014:

                            • Big Data Central @ OpenWorld
                            • CX Central @ OpenWorld
                            • Engineered Systems Central @ OpenWorld
                            • ERP Central @ OpenWorld
                            • HCM Central @ OpenWorld
                            • MySQL Central @ OpenWorld
                            • OPN Central @ OpenWorld
                            • SCM Central @ OpenWorld

                            You can also attend a wide range of sessions with an industry-specific focus ..."

                            IT - Networks
                            Who's Against Net Neutrality? Follow the Money
                            InfoWorld, May 19th, 2014
                            "The cable industry has not been shy about handing out campaign donations to Congress. So guess who's sending letters to the FCC arguing against Net neutrality?...

                            Forget big data -- in the case of Net neutrality, just a little bit of data tells a compelling story. Last week, the nonpartisan research organization MapLight, which focuses on campaign financing, sent me a handful of numbers that indicate just how heavily the cable industry has backed members of Congress who oppose FCC reclassification of the Internet as a public utility under Title II of the Communications Act..."

                            Why the FCC's Net Neutrality Proposal is Fundamentally Dishonest
                            Network World, May 20th, 2014
                            "I'm hardly a networking engineer, but it doesn't take a rocket scientist to figure out the FCC's new plan for net neutrality is fundamentally flawed.

                            'Commercially reasonable' is a license to do whatever you want

                            The Federal Communications Commission says that it wants to allow 'commercially reasonable' traffic management, including allowing some companies to pay for a guaranteed level of better service. This so-called Internet fast lane is OK, the proposal reasons, as long as there's no 'blocking' or 'slowing' of other services, which would retain a baseline level of acceptable service..."

                            A Software-Defined Networking Reality Check for Potential Adopters
                            SearchDataCenter, May 19th, 2014
                            "Software-defined environment chatter is flooding the network market, making it hard to find the real technologies and value.

                            Software-defined networking (SDN) is one of those technology buzzwords that just won't go away. SDN continues to grab the lion's share of networking headlines, and vendors are adopting it as some sort of fashion statement, affixing the moniker to any part of their product line that could be somehow connected to software, automation, programmability or SDN's trendy neighbor, DevOps..."

                            Chicken or Egg: Abstraction and Automation
                            Business 2 Community, May 19th, 2014
                            "For many SDN and DevOps enthusiasts, the natural outcome of this wave of technological change is a highly-automated network that is well-orchestrated with surrounding systems and applications. One of the prevailing thoughts is that this level of automation is a well-formed abstraction layer. With the abstractions in place, the army of network engineers will be unencumbered by device configuration, and automation will ensure.

                            Or will it?..."

                            Ex-Cisco CEO Reflects, Looks Ahead on 25 Years of Networkers
                            Network World, May 19th, 2014
                            "John Morgridge was Cisco's first CEO. He took the company public and presided over its growth until John Chambers took over as CEO in 1995. On the 25th anniversary of the Networker's user conference this week, Morgridge, 80, reflects on the past and looks ahead to the future as Cisco's Chairman Emeritus..."
                            IT - Operations
                            How Outdated Practices harm Data Center Grounding Systems
                            SearchDataCenter, May 19th, 2014
                            "Isolated grounds (IG) are a solution that no longer has a problem. It is a waste of money to call for them unless some very special and sensitive computing system requires them. There is simply no need for isolated ground designs any longer.

                            Every time I start a project and tell the electrical engineers that we will not be using isolated ground circuits, they practically want to hug me because they are so grateful to be working with someone who understands..."

                              Warning: Failure to Comply with Data Center Maintenance Is Reckless
                              SearchDataCenter, May 19th, 2014
                              "Too often, operational and safety practices are ignored or unrecognized in data centers.

                              Complying with modern data center best practices for design and operations is challenging enough, but facilities must be properly maintained to keep up a reliable level of service. A good program for operational practices and data center maintenance brings out the full value of investments, especially if the data center is certified by organizations such as the Uptime Institute or TIA..."

                                What are the Best Practices for Data Center Cleaning?
                                SearchDataCenter, May 19th, 2014
                                "What's the best way to prevent contamination on the data center floor? Using shoe covers? Wearing pairs of shoes only on the data center and anti-contamination mats? Which option is the best? Are there alternatives?

                                Special shoes and shoe covers are necessary only for true clean rooms. Since we should not be generating any significant contamination within our data center, extreme measures should not be necessary...."

                                  What Data Center Tier Levels Can and Cannot Tell You About Uptime
                                  SearchDataCenter, May 19th, 2014
                                  "Your enterprise's old data center has reached the end of the road, and the whole kit and caboodle is moving to a colocation provider. What should you be looking for in the data center, and just how much uptime comes from within?

                                  A lot of the work measuring data center reliability has been done for you. The Uptime Institute's simple data center Tier levels describe what should be provided in terms of overall availability by the particular technical design of a facility.

                                  There are four Uptime Tiers..."

                                    What Is a PDU in An Intelligent, Energy-Aware Data Center?
                                    SearchDataCenter, May 19th, 2014
                                    "Next-generation PDUs provide granular energy and environmental monitoring and management across the existing data center LAN.

                                    At its simplest form, a power distribution unit (PDU) organizes electrical wiring and controls power to individual servers -- like a power strip in your home. But over time, the question "what is a PDU" has evolved. Today's PDUs provide a wealth of data about power use, efficiency and environmental conditions in the data center, all networked across the LAN and managed through a Web browser or command-line interface (CLI)..."

                                    IT - Security
                                    Half of Security Pros Fail to Secure Data
                                    Help Net Security, May 20th, 2014
                                    "Research conducted at Infosecurity Europe 2014 has revealed that 50% of security professionals do not secure data on portable storage devices such as USBs and external hard drives.

                                    This finding comes despite 91% of respondents to the same survey expressing concerns about the potential damage that data loss could bring to their organizations. These statistics have been revealed following a survey of over 500 security professionals conducted by iStorage..."

                                    Should You Ask for a "DoD" Data Wipe?
                                    Business 2 Community, May 21st, 2014
                                    "We wrote about this a couple of years ago, yet it's still a popular discussion. Many organizations still request a 'DoD wipe' ('Department of Defense wipe' or a 'pass' to wipe data from their hard drives. Do you know what that means, and where it comes from? The DoD 5220.22-M standard was developed in the 1990's and published in 1999 for the US Dept of Defense to handle the destruction of sensitive (but not top secret) data. Since then, it has been referenced as the standard for data sanitization. However, technology has changed a lot since the 1990's..."
                                      6 Things Security Pros Keep Getting Wrong
                                      InfoWorld, May 20th, 2014
                                      "I'm a security professional, and it pains me to admit that in my line of work, mistakes are made. Multiple times. In almost every organization. With alarming frequency.

                                      Here are the six most persistent screw-ups I've seen during my many years of consulting. If none sound familiar, I hate to tell you, but ... you may be in denial..."

                                      10 Components of a Comprehensive IT Security Foundation
                                      Bank Systems and Technology, May 21th, 2014
                                      The business of financial services has undergone a tremendous amount of change in the last decade with the advancement of networking technology, online services and the growing demand from customers to provide 24/7 access to their financial lives. Running a financial institution is not simply a matter of managing money and providing loans. It's about managing data and networks, too.

                                      Because of this technological shift in the industry, network administrators and information technology officers now play a crucial part in ensuring the financial institution's network and data are protected from viruses, malware and electronic attacks from would-be digital robbers. It's not an easy job.

                                        Bleeding Hearts - Don't blame OpenSSL
                                        Information Week, May 21st, 2014
                                        "Charles Perrow, celebrated author and academician, had recorded the argument that as the complexity in modern technological systems increases, so does the risk of unforeseen interactions of minor issues resulting in larger catastrophic accidents. To make his point, Perrow describes the accident at the Two Mile Island nuclear reactor, where a chain of minor incidents and failures, such as a faulty return valve, a tag obstructing the view of a monitoring instrument, a faulty gauge among other things led to the disaster. In "normal accidents", he concludes, each minor failure by itself doesn't necessarily have a large impact.

                                        However, put together, they can lead to catastrophe..."

                                        Passwords Remain a Problem for Everyone
                                        Help Net Security, May 19th, 2014
                                        "Passwords remain a problem even for tech-conscious consumers. In an F-Secure poll, 43% of respondents report using the same password for more than one important account - a big no-no for proper password hygiene.

                                        58% of poll respondents have over 20 password-protected online accounts or simply too many too keep track of. 27% have between 11 and 20 password-protected accounts and 15% have under 10. But even with so many accounts, just 40% use a password manager to keep track of them..."

                                          Thinking About Security Beyond Winning and Losing
                                          CSO Online, May 16th, 2014
                                          "As Security professionals we constantly face high-pressure demands and a series of seemingly impossible challenges. As the various research reports and surveys get published, the picture they paint is often bleak.

                                          Talks about burnout are more frequent at conferences. Headlines focus on how and why people just don't understand..."

                                          Using ITOA to Secure Endpoints
                                          Help Net Security, May 20th, 2014
                                          "Businesses today invest heavily in security technology in an effort to protect the most vulnerable aspects of their IT infrastructure - the endpoints and end-user devices - in order to ensure compliance enforcement of corporate security policies and standards.

                                          According to a survey we carried out recently with IT security professionals, more than half (58%) of enterprise security is currently focused around ways of preventing threats, comprising solutions such as enterprise firewalls, intrusion prevention systems and endpoint anti-malware systems..."

                                          Why Security & Profitability Go Hand-in-Hand
                                          Dark Reading, May 19th, 2014
                                          "It's never been more critical to put security on the front line to protect your company's bottom line.

                                          The threat landscape has evolved tremendously during the past several years, yet many businesses' priority lists have stayed the same. Business leaders in executive offices are determined to get revenue-generating projects on the market first, and then, usually a year later, they worry about security..."

                                          IT - Careers
                                          How to Negotiate Your Starting Salary
                                          CIO, May 19th, 2014
                                          "Knowledge is power. It's also one of the most important tools you have when negotiating your compensation plan after you receive a job offer. While there are many factors that come into play in the negotiation process -- benefits, perks and work-life balance -- salary is one of the trickiest things to get right, says Rick Gillis, job search expert, career strategist, consultant and author..."
                                            Navigating the Modern IT Landscape
                                            Virtual-Strategy Magazine, May 14th, 2014
                                            "Since the dawn of the PC era, IT has been evolving at a fevered pace, and keeping up requires the modern IT professional to constantly learn new skills, languages (programming), hardware, software, standards, certifications and workflows.

                                            This is in sharp contrast to days of yore; back when IT had limited uses and impact on society. In fact, mainframes did accounting and inventory and if you weren't in those departments, IT (called MIS back then) was absolutely insignificant. However, as technology has grown in scale and power over the past 30 years, influencing the way we work, play and communicate, IT has become a major consideration across all aspects of business, and technology impacts many life decisions. As a result, a new IT environment has emerged and the role of IT professional has become incredibly significant..."

                                              IT - Social Media
                                              Look Beyond The Obvious When Considering Social Login
                                              Forrester, May 20th, 2014
                                              "Chances are, you have recently registered on a brand's website or community page and were prompted to use your social network credentials. Perhaps you (reluctantly) used your Facebook login because it's easy to remember - or it made the registration process a little less painful.

                                              Personally, I am finding that I am using my Facebook or LinkedIn social credentials more frequently..."

                                              You Have the Right to Remain Moronic
                                              InfoWorld, May 20th, 2014
                                              "Lawyers are like children: solo, they're great, but as a group, they can shatter a strong man's will. I've got friends who are attorneys, and they're fine, but as a faceless lawmaking body, they make me want to drink rubbing alcohol. It is absolutely amazing to me that these guys can be so out of touch with technology at any level.

                                              Journalists make a pitiful pittance -- just ask Pammy. Yet I, all by my lonesome, am infinitely more in touch with technology developments than 90 percent of lawyers out there..."

                                                IT - Backup
                                                File Sync and Share As An Endpoint Protection Service
                                                Storage Switzerland, May 21th, 2014
                                                "According to MarketWatch, approximately every 3.5 seconds someone in America loses a cell phone. Similarly, other end-user edge devices like laptops and tablets are also prone to loss or theft - putting business data at risk and resulting in lost productivity. In fact, the sheer proliferation of end-user devices, (many users work with 4-5 devices each) puts business data at risk and is a clarion call for IT organizations to quickly adopt new models for protecting data on the edge synchronously, in real-time with minimal to no user intervention..."
                                                  IT - Big Data
                                                  Headache Number Two: Remedies for Data Migration Pain
                                                  Information Management, May 16th, 2014
                                                  "On the list of things guaranteed to give you a migraine, data migration is a close second to fingernails on a chalkboard. Even the best-laid plans always seem to have something go awry. Whether it is the unexpected data source discovered in the final hour, the laundry list of issues from user testing or the seemingly endless budget overruns and launch delays, everyone seems to have a data migration horror story to tell. While there is no magic pill or silver bullet to make data migration efforts flawless every time, there are a couple of ways to soothe the pain..."
                                                    Big Data Security Analytics Meets Identity and Access Management (IAM)
                                                    Enterprise Strategy Group, May 19th, 2014
                                                    "While most enterprise organizations have SIEM installed, they now realize that these venerable security systems cannot address today's dangerous threat landscape alone. As a result, many are adding network forensics and big data analytics systems for capturing, processing, and analyzing a whole bunch of additional security data.

                                                    In the majority of cases, big data security analytics systems are applied to data such as network packets, packet metadata, e-mails, and transaction systems to help security teams detect malware, phishing sites, and online fraud..."

                                                    Big data's big payoff arrives as customer experience insights drive new business advantages
                                                    IT Director, May 22nd, 2014
                                                    "The power of big data technology is being successfully applied to understanding such complex unknowns as consumer sentiment and even intent. And that understanding then vastly improves how retailers and myriad service providers manage their users' experiences - increasingly in real time.

                                                    Fortunately, today's consumers are quite willing to share their intents and sentiments via social media, if you can gather and process the information. Hence the rapidly developing field of social customer relationship management, or Social CRM..."

                                                    Big Data Security Analytics Meets Identity and Access Management
                                                    Network World, May 19th, 2014
                                                    "While most enterprise organizations have SIEM installed, they now realize that these venerable security systems cannot address today's dangerous threat landscape alone. As a result, many are adding network forensics and big data analytics systems for capturing, processing, and analyzing a whole bunch of additional security data.

                                                    In the majority of cases, big data security analytics systems are applied to data such as network packets, packet Meta data, emails, and transaction systems to help security teams detect malware, phishing sites, and on-line fraud. Great start, but ..."

                                                    Rethinking Data: Cultural Barriers Are an Obstae to Optimal Information Delivery
                                                    Information Management, May 19th, 2014
                                                    "All around the globe, in every industry known to man, data is the topic du jour. Big data. Customer data. Social/sentiment data. Business leaders intuitively grasp its importance. Analysts, thought leaders and management gurus think the information age has morphed into the data epoch..."
                                                    Spurious Correlations: Computer Science PhDs are Bad for Bees
                                                    IT World, May 20th, 2014
                                                    "There's been a lot of hand-wringing in recent years about the alarming rate at which bees have been disappearing. Despite the fact that Einstein probably never actually said that if the bees go man will follow soon afterwards, it's alarming anyways, partly because the reason for their rate of decline is so mysterious. Well, good news, because we might finally have an answer to the bee mystery: it seems that the rate at which honey bees have been disappearing is negatively correlated with the number of U.S. doctorates being awarded in computer science..."
                                                      The Myth of the Mythical Unicorn
                                                      Information Management, May 23rd, 2014
                                                      "Many have claimed recently that multifaceted data scientists are mythical beings, as impossible to find as unicorns. This itself is a myth, and a dangerous one at that.

                                                      Hype is cyclic. A new idea excites people, exaggerated claims are made (and often believed), and the idea takes on bigger-than-life proportions. Eventually, however, reality sets in, and a critical backlash begins. There is a strong tendency to take the criticism seriously, much more than the initial hype. However, just as the goodness of the original idea ballooned wildly during the boom, the critique gets overstated significantly during the bust. The clear-eyed observer will avoid getting taken in by either of these sides of the hype cycle and move quickly to the 'plateau of productivity,' but it is hard to see through the smoke and mirrors.

                                                      So it is in data science..."

                                                        Your Data Lives Where?! Strange and Secure Data Center Locations
                                                        SearchDataCenter, May 19th, 2014
                                                        "You'd expect to find underground lairs and oceanic hideouts in a comic strip rather than in data center pictures, but sites around the world are proving that unconventional data center locations can solve conventional problems, such as protecting sensitive data.

                                                        These unusual sites all offer data center physical security unparalleled by conventional real estate. Our tour of locations starts with a look at floating data centers, including the potential in a Google barge and the growing need for compute out on the open seas. From out on the water to down under the earth, we dig around in two former mines that have become underground data center locations..."

                                                        IT - Mobile
                                                        Company and Employee Disconnect on BYOD Security Policies
                                                        Help Net Security, May 22nd, 2014
                                                        "Many employees do not take adequate steps to protect company information, a weakness that could result in critical security breakdowns, according to Webroot...

                                                        The new survey, based on data collected by Harris Interactive, features perspective from more than 2,000 working professionals in the U.S. It concluded that while 62 percent of employees would be receptive to security software on personal devices, these requirements would need to be communicated clearly by their employer..."

                                                        File Sync and Share As An Endpoint Protection Service
                                                        Storage Switzerland, May 19th, 2014
                                                        "According to MarketWatch, approximately every 3.5 seconds someone in America loses a cell phone. Similarly, other end-user edge devices like laptops and tablets are also prone to loss or theft - putting business data at risk and resulting in lost productivity. In fact, the sheer proliferation of end-user devices, (many users work with 4-5 devices each) puts business data at risk and is a clarion call for IT organizations to quickly adopt new models for protecting data on the edge synchronously, in real-time with minimal to no user intervention..."
                                                          Why You Should Read "The Mobile Mind Shift"
                                                          Forrester, May 21st, 2014
                                                          "Worldwide, people use mobile devices pretty much continuously. Mobile access on smartphones and tablets creates a dramatic change in behavior as people use, then expect, and then demand service from every entity they deal with. This is the mobile mind shift:

                                                          The mobile mind shift is the expectation that I can get what I want in my immediate context and moments of need. Despite this complete transformation in expectations, companies typically have no idea what to do about it. "I guess we should build an app," they tell us. Instead, this transformation demands a complete rethink of the way they do business..."

                                                            Top Ten Articles for last few Issues
                                                            Vol 195 Issues 1 and 2; Vol 194 Issues 1, 2, 3, 4 and 5; Vol 193 Issue 4
                                                            We track how frequently each article is viewed on the web site to determine which the readers consider the most important. For last week, the top 10 articles were:

                                                            • Oracle Solaris 11.2: All the Posts
                                                            • Puppet Configuration in Solaris
                                                            • Oracle VM 3
                                                            • Oracle wins appeal in copyright battle with Google
                                                            • Solaris 11.2: Immutable Global Zone
                                                            • How to get started with OpenStack on Solaris
                                                            • OpenSSL on Oracle Solaris 11.2
                                                            • olaris-specific Providers for Puppet
                                                            • OpenZFS European Conference - May 20, 2014
                                                            • MySQL Cookbook, 3rd Edition

                                                            The longer version of this article has list of top ten articles for the last 8 weeks.

                                                              IT - Tape
                                                              IBM and Fujifilm Show Super Dense Storage Tape for Big Data Work
                                                              InfoWorld, May 20th, 2014
                                                              "Anticipating a storage crunch spurred by big data, IBM and Fujifilm are advancing the state of art in magnetic tape with a prototype capable of storing 85.9 billion bits of data per square inch.

                                                              In an industry standard LTO size cartridge, tape like that could store up to 154 terabytes of uncompressed data. Today's LTO version 6 cartridge holds 2.5 terabytes..."

                                                              Whomp! There It Is: IBM Demos 154tb Tape
                                                              The Register, May 19th, 2014
                                                              "IBM and Fujifilm have demoed a 154TB LTO-size tape cartridge which could come to market in 10 years' time.

                                                              While it falls short of the Sony 185TB development, it should, with IBM's tape partnerships, see Sony exit the field.

                                                              The Sony development involved a 148Gbit/in^2 tape density and its own tape design to achieve a 185TB uncompressed capacity. IBM has been working with Fujifilm to extend today's Barium Ferrite (BaFe) tape particle technology to achieve 85.9Gbit/in^2..."

                                                              Overview of Solaris Zones Security Models
                                                              By Darren Moffat
                                                              Darren writes, "Over the years of explaining the security model of Solaris Zones and LDOMs to customers "security people" I've encountered two basic "schools of thought". The first is "shared kernel bad" the second is "shared kernel good".

                                                              Which camp is right ? Well both are, because there are advantages to both models.

                                                              If you have a shared kernel there the policy engine has more information about what is going on and can make more informed access and data flow decisions, however if an exploit should happen at the kernel level it has the potential to impact multiple (or all) guests.

                                                              If you have separate kernels then a kernel level exploit should only impact that single guest, except if it then results in a VM breakout..."

                                                              Nexenta News
                                                              Nexenta and Software Defined Storage Solutions Continue Global Expansion in Germany With New Distributor
                                                              ADN is one of Central Europe's leading value-added distributors
                                                              Nexenta announced that ADN, one of Central Europe's leading value added distributors, will be offering value added solutions and products throughout its partner network, based on Nexenta's award winning SDS solutions.

                                                              ADN distributes IT solutions that focus on the virtualisation & cloud, storage & server, networking, security and unified communications market. The company is widely regarded as a market leader in the sector...

                                                              Nexenta to Showcase Leading Software-Defined Storage Solutions at Industry Events Worldwide
                                                              Events and Awards

                                                              Nexenta announced its latest awards nominations and the upcoming schedule of events featuring company executives, new product announcements and global expansion plans.

                                                              Nexenta executives will be presenting, exhibiting and answering questions about Software-Defined Storage at a wide variety of industry events over the coming weeks.


                                                              • OpenStack Summit -- Monday, May 12th - Friday, May 16th
                                                              • William Blair Conference -- Thursday, May 15th
                                                              • Cisco Live 2014 --Sunday, May 18th - Thursday, May 22nd
                                                              • Storage Solutions Day -- Thursday, May 22nd
                                                              • Ask Me Anything (AMA): Join Nexenta CEO Tarkan Maner Friday, May 29th at 1:00 pm PDT to ask him ANYTHING.
                                                              • Computex Taipei 2014 -- Tuesday, June 3rd & Wednesday, June 4th
                                                              • Enterprise 451 Storage Executive Summit -- Wednesday, June 11th


                                                              • The Storage Awards 2014 - Vote for Nexenta! Voting closes Monday, June 2nd: Run by Storage Magazine
                                                              • Network Product Guide's 2014 Hot Companies and Best Products Awards: Category: Hot Technologies in the US - NexentaStor 4

                                                              Read on for details.

                                                              NexentaConnect 2.3 Now Available
                                                              Update from Murat Karslioglu

                                                              NexentaConnect is a complete suite of software solutions to optimize Virtual Desktop Infrastructure deployments, at any scale, persistent or stateless desktops, on legacy shared storage or converged infrastructure.

                                                              What is new in NexentaConnect View Edition 2.3?

                                                              Added LZ4 compression support to allow greater density. The ability to deploy on a GlobalVSA minimizes the workload on the server for the VSA components. Enhanced replication for desktop pools has also been added. Enhanced logger for monitoring tasks and progress. Additionally, the View parameters are met to match with the View console.

                                                              What is a typical deployment scenario for NexentaConnect?

                                                              Two use cases: - one to breath new life into shared storage that is running out of steam, allowing existing storage HW infrastructure to scale and support more virtual desktops. NexentaConnect implements advanced caching and IO reduction algorithms (dedup & compression) to maximize end-user response times - one for shared nothing configurations for stateless desktops

                                                              NexentaConnect 2 Product Page.

                                                              Trending in
                                                              Vol 235, Issue 3
                                                              Trending IT Articles