News about Oracle's Solaris and Sun Hardware
System News
May 26th, 2014 — May 1st, 2014 Generate the Custom HTML Email for this Issue
System News System News for Sun Users
Volume 195, Issue 4 << Previous Issue | Next Issue >>
Sections in this issue:
click to jump to section

Oracle Database In-Memory Launch - Featuring Larry Ellison
June 10 - Joint the live webcast!
Javier writes, "For more than three-and-a-half decades, Oracle has defined database innovation. With our market-leading technologies, customers have been able to out-think and out-perform their competition. Soon they will be able to do that even faster. At a live launch event and simultaneous webcast, Larry Ellison will reveal the future of the database. Promote this strategic event to customers.

  • Watch Larry Ellison on Tuesday, June 10, 2014
  • 19:00 - 20:30 a.m. CET
  • 6:00 pm - 7:30 pm UK


Oracle Mobility Emerges Prepared for the Future
By Kevin Benedict
Kevin writes, "My friend Suhas Uliyar is now the VP of Mobile Strategy Product Management at Oracle, and he is eager to get the word out that Oracle mobility is real and here today. While SAP jumped big time into enterprise mobility in 2010 with the $5.8 billion acquisition of Sybase, Oracle has been quietly watching the market and practicing patience. They seemed for a long time to be content with standing on the side lines and treating mobility as just another channel or interface for their backend servers, solutions and databases..."
Oracle Data Warehouse and Big Data Magazine MAY Edition for Customers + Partners
By Keith Laker
"The latest edition of our monthly data warehouse and big data magazine for Oracle customers and partners is now available. The content for this magazine is taken from the various data warehouse and big data Oracle product management blogs, Oracle press releases, videos posted on Oracle Media Network and Oracle Facebook pages..."
The Internet of Things Is Really the Internet of People
By Mark Hurd - Originally Posted on LinkedIn
Mark writes, "As I speak with CEOs around the world, our conversations invariably come down to this central question: Can we change our corporate cultures and the ways we train and reward our people as rapidly as new technology is changing the work we do, the products we make and how we engage with customers?

It's a critical consideration given today's pace of disruption, which already is straining traditional management models and HR strategies. Winning companies will bring innovation and vision to their employees and partners by attracting people who will thrive in this emerging world of relentless data, predictive analytics and unlimited what-if scenarios..."

IT - Storage
Hybrid Cloud Now - Practical Strategies For Integrating Primary Storage with Cloud Storage
Storage Switzerland, May 29th, 2014
"In the traditional data center, leveraging the cloud for anything more than backup seems like a futuristic pipe dream. While some data centers may be using a cloud service for backups and potentially disaster recovery, the thought of using the cloud for primary storage seems like a risky proposition. The reality is that the technology exists today to allow the cloud to be safely utilized so that costs can be driven down and performance actually improved..."
Buckle Up -- SSDs Are About to Get Three Times Faster
InfoWorld, May 27th, 2014
"A team of Japanese researchers claims to have developed technology that improves write speeds on solid-state drives by 300 percent using nothing more sophisticated than a firmware patch, according to a TechOn report.

In a thesis entitled 'NAND Flash Aware Data Management System for High-Speed SSDs by Garbage Collection Overhead Suppression,' Ken Takeuchi, a professor at Chuo University in Tokyo, laid out his team's ideas for dealing with a common performance bottleneck in SSDs -- namely, garbage collection..."

'Storage is an Anachronism in the Modern Data Center' and Other Shrewd Observations
The Data Management Institute, May 26th, 2014
"Twitter is such a rich fount of provocation for opinion pieces and blogs. Someone tweeted this AM the observation quoted in the headline for this post - that storage has become an anachronism in the modern data center. Since reading it, I haven't been able to get it out of my mind.

Truth is, I certainly find myself defending storage a lot these days..."

    The Real ROI of SMB Cloud vs. SMB NAS
    Storage Switzerland, May 28th, 2014
    "Small businesses can range in size from a few employees to a few hundred and the IT needs of these organizations are similarly varied. As they climb their way up from 'small' and into 'medium' those IT needs evolve, one of which is the ability to collaborate among their growing number of employees. To solve this problem SMB IT managers must make the often confusing choice between using cloud storage and buying a network attached storage (NAS) system..."
    Top Expected Driver of Data Center Capacity in Europe: Storage
    Storage Switzerland, May 28th, 2014
    "Storage growth, business growth, and the virtualization of critical applications are seen to be the greatest drivers for data centre capacity growth for European companies participating in a commissioned survey conducted by Forrester Consulting, Inc. on behalf of Digital Realty Trust, Inc., provider of data centre and colocation solutions.

    2014 survey of data centre trends across Europe canvassed data centre decision makers in the UK, Germany, France, the Netherlands, and Ireland..."

      IT - Technology
      SpaceX Unveils Its New Dragon Spacecraft
      Forbes, May 29th, 2014
      "Elon Musk and the management team at SpaceX unveiled their new spacecraft - the Dragon version 2. Based around the same Dragon design that has already made four trips to the I.S.S., this version of the spacecraft is capable of holding seven crewmembers and features a number of new features.

      The event, which only lasted a few minutes, featured SpaceX CEO Elon Musk on a bright stage in front of a crowd of reporters and other parties. The first Dragon spaceship ever sent to orbit was actually hanging over the heads of the crowd, and you could see the scorch marks from its re-entry into the atmosphere..."

      10 Things M.I.T. Computer Scientists have Given the World
      IT World, May 27th, 2014
      "This week M.I.T. officially marks 50 years of computer science at the institute with two days of celebrations. While computer research was going on at M.I.T. as early as the 1930s, this week's celebration marks the beginning of Project MAC (Mathematics and Computation) in July 1963. Project MAC eventually led to the founding of the Laboratory for Computer Science and the Artificial Intelligence lab..."
        15 Sci-Fi Technologies That are (Almost) Here
        InfoWorld, May 27th, 2014
        "Classic science fiction examines social or scientific issues by projecting them forward to a kind of notional event horizon. As society and technology advance, the line between science and fiction grows thinner every year. We take a look at 15 classic sci-fi tech ideas and the scientific and technological efforts to make them a reality -- some of which have already succeeded..."
          Google's Self-Driving Cars have No Steering Wheel
          Information Week, May 28th, 2014
          "Google hopes to get its self-driving cars ready for public deployment by 2018. And though reality and politics might push the date back, the company is pressing ahead with a new round of prototypes. Google calls its latest experimental vehicles 'self-driving cars' but they don't look much like cars on the inside because they're missing many of the controls we expect in a car..."
          How 3-D Printing Makes Product Prototyping Faster and Cheaper
          CIO, May 21st, 2014
          "Entrepreneur Henry Thorne has been developing products for decades. However, his job got a lot easier a few years ago when his small manufacturing company bought its first 3-D printer.

          Thorne is the co-founder and CTO of 4moms, which makes baby products..."

          Putting Humans into Suspended Animation No Longer Sci-Fi
          IT World, May 27th, 2014
          "Today's post is way out of my comfort zone but since a lot of us in the US were on holiday yesterday when the source article hit, I wanted to bring this amazing news to your attention: doctors are about to start trials on suspended animation of human beings.

          Crazy right? When I first read the post I thought it was some kind of spoof or parody. But nope, it's real..."

            U.S. Military Plans to Beef Up Soldiers with Iron Man-Like Suit
            ComputerWorld, May 22th, 2014
            "The U.S. military is just weeks away from getting a prototype for an Iron Man-like suit that would make soldiers stronger, give them real-time battlefield information, monitor their vital signs and even stop their bleeding.

            Dubbed the Tactical Assault Light Operator Suit, or TALOS, the suit is expected to keep soldiers safer and give them an advantage on the battlefield..."

              Free and Open Source S/W
              Top 4 open source LDAP implementations
              Emidio Stani

              Emidio writes, "When you want to set up an application, most likely you will need to create an administrative account and add users with different privileges. This scenario happens frequently with content management, wiki, file sharing, and mailing lists as well as code versioning and continuous integration tools. When thinking about user and group centralization, you will need to select an application that fits your needs.

              If the application can connect to a Single Sign On server, users happy will be happy to remember only one password.

              In the proprietary landscape of directory servers, Active Directory is the dominant tool, but there are directory servers that can also satisfy your needs..."

              The true value of open source is people
              By David Hurley
              David writes, "Open source is valuable. Very few people would argue that point. There is most definitely a sense of intrinsic worth. But where does this value exist? Is it in the code produced or in something else?

              By the very nature of open source (read more about the standard four freedoms here), the ability to view and access the source code is a powerful, driving factor. Because the code is so freely accessible and a prominent focus of open source it can easily be considered to be the value of open source..."

              IT - Bitcoin
              Bitcoin in the Twenty-First Century: What Piketty can Learn From the Blockchain
              Bitcoin Magazine, May 29th, 2014
              "So far in 2014, the biggest news in popular economics has been Thomas Piketty and his book Capital in the Twenty-First Century. It has struck a nerve with a worldwide populous that is still reeling in the wake of the 2008 financial crisis, with some estimates putting sales of the book at over 200,000 in just a few months.

              This is remarkable for a 600+ page tome on economics, a subject which the general public usually regards with disdain. Harvard University Press, Capital's publisher and a company that considers a book with 60,000 sales in a year a blockbuster, has been flooded with orders. In a world searching for answers to economic turmoil, Piketty's insightful publication has been welcomed with open arms..."

                The Five Biggest Threats Facing Bitcoin
                CoinDesk, May 26th, 2014
                "Any new, disruptive technology will have its fair share of detractors doing their best to limit its potential.

                The idea that people would need their own personal computer for work seemed ludicrous 50 years ago. Why would anyone need a device for making automated calculations? Today, though, it is almost impossible to function in modern life without using a PC..."

                  Why Crypto-investing is Better Than Normal Investing
                  Bitcoin Magazine, May 28th, 2014
                  "So far, the crypto-space has had some major home runs, some fizzles, and fair number of outright scams. For folks who've been in any successful project for any considerable amount of time, the overall returns have been massive.

                  This is because, once a few issues are ironed out, the crypto-world offers possibilities that are far better than any other fundraising mechanism. That may seem a bold claim, but there are two simple reasons why I believe crypto-fundraising will grow until it dominates the investment landscape over the next decades:..."

                    DISH, Overstock, and Bootstrapping a New Currency
                    CoinDesk, May 31st, 2014
                    "On the heels of the recent Dish Network announcement to begin accepting bitcoin payments, we saw the same clueless chorus of naysayers and payment newbies come out claiming that Dish doesn't really accept bitcoin because they actually end up with US dollars.

                    It would be just as ridiculous to say that a hotel in Barbados doesn't accept US dollars because, after the VISA credit card transaction, the hotel ends up with Barbados dollars..."

                    Financial Times - Kenneth Rogoff (Harvard): "Time to Phase Out Paper Money"
                    CryptoCoinsNews, May 29th, 2014
                    "Kenneth Rogoff, the professor of Economics at Harvard, writing in Financial Times, poses the question 'Is it time to consider the phasing out of paper money?' Kenneth Rogoff is the Thomas D. Cabot Professor of Public Policy and Professor of Economics at Harvard. Any opinion expressed by Rogoff has to be taken extremely seriously as from 2001-2003, he served as Chief Economist and Director of Research at the International Monetary Fund..."
                      Two Charts Show How Different Bitcoin and Fiat Payments Really Are
                      CoinDesk, May 29th, 2014
                      "Today, we live an exciting era when financial technology could upend a long-standing regime that has had total control of consumer money.

                      Digital currencies such as bitcoin and the burgeoning number of altcoins allow tech-savvy people the ability to better bank themselves. At the same time, the industry's consumer services and nascent startups are beginning to bring social elements into the ecosystem in effort to appeal to mainstream consumers..."

                      MIT's Bitcoin Expo and the Students Behind It
                      Bitcoin Magazine, May 29th, 2014
                      "MIT's students have made the news again. Dan Elitzer, president and founder of MIT's Bitcoin Club, and Jeremy Rubin, a sophomore in Electrical Engineering and Computer Science, have organized the MIT Bitcoin Expo which will be held this Saturday, May 3rd at MIT's Compton Laboratories Building 26-100. The talks start at 12:00pm and will feature Gavin Andresen, a core developer of the bitcoin protocol; James D'Angelo, founder and host of the World Bitcoin Network; and Alan Reiner, founder and CEO of Armory Technologies, among others..."
                      Oracle Introduces MySQL Fabric, Simplifying High Availability and Scalability with MySQL
                      Automatic Failover and Data Sharding Now Available for Web and Cloud Applications
                      Meeting the demands of today's web and cloud applications, Oracle announces the general availability of MySQL Fabric. MySQL Fabric provides an integrated system that makes it simpler to manage groups of MySQL databases. It delivers both high availability - via failure detection and failover - and scalability through automated data sharding.

                      Continuing to drive MySQL innovation, Oracle announced the general availability of MySQL Fabric, an open source framework to manage farms of MySQL servers.

                      Available for download this integrated and extensible system makes it easier to scale out or add high availability to MySQL applications.

                      For more details, join the Webcast on Thursday, June 19, 2014 at 9:00 am PT.

                      MySQL for Excel new features (1.2.0)
                      By Javier Rivera
                      Javier writes, "we are going to talk about another new feature included in the latest MySQL for Excel release to date (1.2.0) which can be Installed directly from our MySQL Installer downloads page.

                      Since the first release you were allowed to open a session to directly edit data from a MySQL table at Excel on a worksheet and see those changes reflected immediately on the database. You were also capable of opening multiple sessions to work with different tables at the same time (when they belong to the same schema). The problem was that if for any reason you were forced to close Excel or the Workbook you were working on, you had no way to save the state of those open sessions and to continue where you left off you needed to reopen them one by one..."

                      Cloud Computing
                      Oracle VM-Design Considerations For Enterprise Scale Deployment
                      Live Webcast Oracle - June 10
                      The Oracle Managed Cloud Services team serves up thousands of Oracle applications to end users on a daily basis. With nearly 20,000 Oracle VM instances powering this operation, it's imperative to maintain a highly available environment. Curious as to how this is done? Join the Oracle Managed Cloud Services expert in this live webcast to gain valuable insights into architectural design and management best practices to build and run this highly successful hosted cloud operation.


                      Elastic PaaS with WebLogic and OpenStack, part I
                      By Jernej Kaše
                      Jernej writes, "In my previous blog I described the steps to get OpenStack on Solaris up and running. Now we'll explore how WebLogic and OpenStack can work together to deliver truly elastic Middleware Platform as a Service.

                      First, let's define what PaaS should be : PaaS offerings facilitate the deployment of applications without the complexity of managing the underlying hardware and software and provisioning hosting capabilities.

                      To break it down:..."

                      Diving into OpenStack Network Architecture - Part 1
                      By Ronen Kofman
                      Ronen writes, "OpenStack networking has very powerful capabilities but at the same time it is quite complicated. In this blog series we will review an existing OpenStack setup using the Oracle OpenStack Tech Preview and explain the different network components through use cases and examples. The goal is to show how the different pieces come together and provide a bigger picture view of the network architecture in OpenStack. This can be very helpful to users making their first steps in OpenStack or anyone wishes to understand how networking works in this environment. We will go through the basics first and build the examples as we go..."
                      There are Cloud Heroes Among Us: download the ebook
                      By Javier Puerta
                      Javier writes, "Given the importance of information systems in today's business world, database administrators (DBAs) and other technology professionals often perform heroic deeds for their organizations. While many of these IT pros are too humble to acknowledge their worth, we profiled five real-world IT heroes to demonstrate their value to their organizations-and the industry at large.

                      Many of our heroes are bloggers who share new ideas and developments with their colleagues. Our heroes are creative individuals who can accurately assess a situation and rally their colleagues to address pressing issues.

                      These heroes are authors and known Oracle technology user group leaders..."

                      The Value of Oracle Linux
                      By Chris Kawalek
                      Chris writes, "Our spotlight this week is on a brand new white paper, chock full of fantastic information about Oracle Linux. From the intro to Oracle Linux - Maximize Value, Minimize Cost:

                      'This paper describes the savings and efficiencies that an IT department can realize by choosing Oracle Linux as their enterprise standard. It highlights sample deployments and explains how deploying Oracle Linux can reduce operational costs and result in less downtime, improved productivity, and greater opportunities for revenue generation.&#8233;'

                      The paper explains exactly how Oracle Linux can reduce costs, and goes into some of the features of Oracle Linux that can make it more valuable for your organization. Read the paper now.

                      MySQL Enterprise Monitor 3.0.11 has been released
                      By Andy Bang

                      Andy writes, "We are pleased to announce that MySQL Enterprise Monitor 3.0.11 is now available for download on the My Oracle Support (MOS) web site. It will also be available via the Oracle Software Delivery Cloud in about 1 week. This is a maintenance release that includes a few new features and fixes a number of bugs. You can find more information on the contents of this release in the change log.

                      You will find binaries for the new release on My Oracle Support. Choose the 'Patches & Updates' tab, and then choose the 'Product or Family (Advanced Search)' side tab in the "Patch Search" portlet..."

                      IT - Cloud
                      Security In a Cloud World: Go Multifactor
                      InfoWorld, May 28th, 2014
                      "Cloud computing is typically described with terms like 'software as a service' (SaaS), 'infrastructure as a service' (IaaS), and 'platform as a service' (PaaS), but we've seen an explosion of the use of 'aaS' to describe just about anything and everything as a service: communication, training, data, storage, and so on..."
                      Trust In the U.S. Cloud On the Decline
                      Help Net Security, May 23rd, 2014
                      "Perspecsys surveyed 117 IT professionals to determine that more than half (62%) of organizations believe using a European-based cloud is easier from a regulatory and compliance perspective. More than half (51%) of respondents even claimed that they do not fully trust U.S.-based clouds. The data points to the obvious misconceptions around deploying cloud computing in the states and overseas..."
                      Is being cloud agnostic even possible?
                      GIGAOM, May 30th, 2014
                      "In a few weeks, I'll be on stage at Structure 2014 with Scott Yara, the President and Head of Products, Pivotal. The topic: 'Is being cloud agnostic even possible?' While it's certainly an interesting topic for a conference panel, the issues run pretty deep.

                      The idea is rather simple, and rather old. If you're going to build and deploy applications do so in such a way that those applications can run on any number of platforms (or clouds), typically without modification..."

                        Business Users Bypass IT and Go Rogue to the Cloud
                        ComputerWorld, May 27th, 2014
                        "IT departments need to watch out for business units or even individual workers going rogue and bypassing IT to go straight to the cloud..."

                        "There's a tug-of-war tension in the enterprise right now," said Gartner analyst Lydia Leong. "IT administrators very rarely voluntarily want to go with the public cloud. I call this the 'turkeys don't vote for thanksgiving' theory. The people who are pushing for these services are not IT operations people but business people..."

                        Don't be Scared; It's Just the Cloud
                        InfoWorld, May 27th, 2014
                        "There is no question that the use of cloud-based resources affects IT organizations. But how much should your IT organization change to best leverage cloud computing?

                        I hear that question a lot, and it's often grounded not so much in process concerns but fear of job loss or devaluation of individuals' current skills or roles. Such fears are most acute among those who have resisted the cloud for years; they see the writing on the wall, and panic sets in..."

                        Small Businesses and the Cloud: How to Mitigate the Risks
                        Help Net Security, May 26th, 2014
                        "Security concerns are still preventing many small businesses from using new technology methods to accelerate growth. The cloud is one major example of a 'hot topic' that has perpetuated the news cycle as something that could help small businesses, but new and unsolved old risks are blocking a mass uptake in cloud-based services..."
                        IT - CxO
                        Don't Blame Target's Audit Committee For The Sins Of Technology Management
                        Forrester, May 29th, 2014
                        "Institutional Shareholder Services (ISS), a third-party advisor to Target Corp. investors, recommended ousting Target's Audit Committee because they failed to do appropriate risk management, resulting in a breach of customer data. According to Twin Cities Business Magazine, ISS stated that 'in light of the company's significant exposure to customer credit card information and online retailing, these committees should have been aware of, and more closely monitoring, the possibility of theft of sensitive information, especially since it involves shoppers and the communities in which the company operates, as well as the overall impact on brand reputation and brand value' ..."
                        6 Things Exceptional Leaders do Better
                        Inc., May 26th, 2014
                        "What makes an exceptional leader exceptional?

                        This was the topic I had the fortunate opportunity to discuss recently with a class of graduating university seniors. Many of the students believed that future business leaders needed a new set of leadership skills that recognized the new global economy that continues to be molded and shaped by rapidly changing technology and globalization.

                        They aren't wrong..."

                          7 Ways CIOs Should Prepare for the Digital Enterprise
                          CIO, May 27th, 2014
                          "The debate about technology in the enterprise used to focus on hope vs. fear. Now it's fear vs. fear - specifically, the fear of becoming the next Target vs. the fear that technology will eat your lunch, says Narinder Singh, president of [topcoder] and chief strategy officer at Appirio.

                          Just as we recognized that MIT Sloan CIO Symposium also suggest that digitization drives innovation. As one example, Peter Weill, chairman of the MIT Center for Information Systems Research, points to Orange Money, which lets Orange mobile phone customers in rural, developing nations access previously off-limits financial services..."

                          9 steps to better vendor management
                          Information Management, May 28th, 2014
                          "To successfully address vendor management-related challenges, vendor managers need to collaborate with key stakeholders to build processes and a shared vision. Here are nine steps that vendor managers should use to develop and execute a collaboration strategy..."
                          CIOs Forge Stronger Ties with Decision-Makers, Build Better Business Cases
                          Government Technology, May 20th, 2014
                          "Over the last several years David Behen would often brag that he had the best CIO job in the world as the IT leader of Michigan. Why? 'Because I had such strong executive sponsorship: a governor who knew IT better than anybody and a budget director who understood it and had reasons to fund it,' he said. Over three and a half years, he and former budget director John Nixon communicated almost every day either in person or via email, text or phone..."
                          Does the CFO Need to Become a Technologist?
                          CIO, May 23rd, 2014
                          "Technology today, particularly big data and analytics, is disrupting roles throughout the enterprise, whether it's the CIO that needs to seek new ways to be a strategic partner to the business or the CMO constantly faced with decisions about technology that can make the marketing function more data-driven and efficient. Even the CFO role is not immune..."
                          How CIOs can Lead Their Company.s Information Business
                          Information Management, May 27th, 2014
                          "Companies across industries are placing major bets on big data, expecting it could dramatically improve business processes and overall performance. As they move ahead, one issue that looms large is finding senior-leadership capacity to manage the huge program of organizational change that data analytics demands. Top-team members, fully engaged with their existing responsibilities, often find themselves straining to plan and implement big data strategies..."
                          Managers: Your Job is to Clear the Path
                          Information Management, May 28th, 2014
                          "A promising early-career manager was struggling with his new team and I was invited to help him find opportunities to improve. After observing him at different times and in different settings, and after talking with his team members, it was apparent that he did not understand his priorities. Instead of focusing on removing obstacles in front of his team members, he was throwing out new obstacles at an alarming pace..."
                            Risk Management Issues, Challenges and Tips
                            Help Net Security, May 28th, 2014
                            "Gary Alterson, is the Senior Director, Risk and Advisory Services at Neohapsis. In this interview he discusses the most significant issues in risk management today, offers tips on how to develop a risk management plan, and more.

                            What are the biggest issues in risk management today? How do you expect them to evolve in the future?

                            There are a couple of issues in terms of risk management we see most often..."

                            vBeers South Florida
                            3 Separate Monthly Events - @ Boca; @ Miamia; @ Broward
                            Networking is an essential aspect of your professional growth and development. Connect with an array of professionals while enjoying a drink or two. Who knows, you just may meet your next client, business partner, employer or employee...!

                            Fancy meeting up every month with other IT/virtualization enthusiasts to socialise and chat over a cold beer, wine or soft-drink? If so, then vBeers is for you!

                            Look out for event annoucements on the LinkedIn SF vBeers group and at

                            South Florida vBeers Monthly Schedule

                            • vBeers @ Broward: 2nd Wednesday of Month
                            • vBeers @ Boca: 3rd Wednesday of Month
                            • vBeers @ Miami: 4th Wednesday of Month


                            IT - PM
                            Gartner Identifies Five Categories for IT Programs
                            Information Management, May 28th, 2014
                            "The ability to categorize IT programs and assign them appropriate tactics, skills and resources is vital to generating positive outcomes, according to research firm Gartner inc. Programs that aren't properly categorized are much more likely to be over budget, fall short of one or more intended goals, or even fail completely.

                            Gartner has identified five types of programs to help managers categorize their programs and plan accordingly:..."

                            What Is the Key to IT Program Management?
                            Help Net Security, May 23rd, 2014
                            "The ability to categorize IT programs and assign them appropriate tactics, skills and resources is critical to the generation of positive outcomes, according to Gartner, inc. Programs that are not properly categorized are significantly more likely to run over budget, to fall short of one or more of the intended objectives, or to fail completely..."
                            IT - Networks
                            The Internet of Things (IoT)
                            Business 2 Community, May 24th, 2014
                            "There is a new buzz word that has been making its way around the online world, expected to soon replace 'Cloud' as the latest hot topic. You may already have heard it mentioned in the media, the latest buzz is a thing called the Internet of Things (IoT).

                            So, what is IoT? In the broader sense it is all Internet connected devices, originally named by Kevin Ashton in 1999, the Internet of Things had been in development for decades before..."

                            The Philosophy of IoT: Will it Help or Hurt?
                            ComputerWorld, May 26th, 2014
                            "Some ask the big questions about the Internet of Things. Will it free up human potential? Will everyone share in its benefits, or just those who capitalize on it?

                            These are the types of issues that may be raised at the Philosophy of the Internet of Things conference in July at York St. John University in the U.K. Beginning July 3, this may be the first such conference organized around this topic. One of its organizers, Justin McKeown, head of the program for Fine Art and Computer Science at York St. John, explained some of the issues in an interview conducted via email..."

                              IPv6 Address Planning
                              O'Reilly, May 29th, 2014
                              "With the recent exhaustion of IPv4 in North America, Asia, and Europe (and Latin America later this year), it's official: IPv4 is on life-support and is rapidly on its way to becoming a legacy protocol. Meanwhile, IPv6 adoption is surging. More than half of the traffic on the nation's largest mobile network is over IPv6 while a social networking giant plans to no longer use IPv4 internally within 18 months. No matter where you work, as a networking professional, IPv6 adoption is in your future..."
                              Teach Your Router New Tricks with DD-WRT or OpenWrt
                              InfoWorld, May 28th, 2014
                              "With each passing year, hardware devices grow less dependent on proprietary components and more reliant on open source technologies. Network routers are among the main beneficiaries of this trend, especially those that can support a variety of third-party open source firmware projects. Two of these firmware projects stand apart from the rest: DD-WRT and OpenWrt..."
                              The Porous Firewall . and What You Can do About It
                              IT World Canada, May 28th, 2014
                              "The latest edition of Trustwave Holding's annual global security report shows a shattered block on the cover representing a broken firewall. And rightly so - the volume of data breach investigations the company handled last year was up 54 per cent over 2012. Here are the highlights of what the company found and recommendations on how to brace up that wall..."
                              IT - Operations
                              Fat-Fingered Admin downs Entire Joyent Data Center
                              The Register, May 28th, 2014
                              "loud operator Joyent went through a major failure on Tuesday when a fat-fingered admin brought down an entire data center's compute assets.

                              The cloud provider began reporting "transient availability issues" for its US-East-1 data center at around six-thirty in the evening, East Coast time.

                              "Due to an operator error, all compute nodes in us-east-1 were simultaneously rebooted," Joyent wrote..."

                              Outage Caused by Single Admin Mortifies Cloud Provider Joyent
                              InfoWorld, May 28th, 2014
                              "Cloud provider Joyent suffered an outage on Tuesday after an administrator was able to simultaneously reboot all virtual servers hosted in the company's US-East-1 data center.

                              'It should go without saying that we're mortified by this. While the immediate cause was operator error, there are broader systemic issues that allowed a fat finger to take down a datacenter,' said Bryan Cantrill, CTO at Joyent, in a post on Hacker News..."

                              IT - Security
                              Congress Divorces NIST and NSA
                              The Register, May 26th, 2014
                              "The US Congress has passed a bill that removes the NSA's direct input into encryption standards.

                              According to a report at ProPublica, an amendment to the National Institute of Standards and Technology act removes the requirement that NIST consult with the NSA in setting new encryption standards.

                              Following the Snowden revelations, NIST had denied that it deliberately weakened encryption standards at the behest of the NSA..."

                              Penetration Testing
                              O'Reilly, May 28th, 2014
                              "Penetration testers simulate cyber attacks to find security weaknesses in networks, operating systems, and applications. Information security experts worldwide use penetration techniques to evaluate enterprise defenses.

                              In Penetration Testing, security expert, researcher, and trainer Georgia Weidman introduces you to the core skills and techniques that every pentester needs..."

                              5 Ways Computer Security has Truly Advanced
                              InfoWorld, May 27th, 2014
                              "As you may know, I like to rant about the poor state of computer security. I have reason to, because each year it appears we're losing the battle as more and more systems get exploited. We can't seem to take care of the simple stuff, like requiring better passwords or fixing DNS (who among you has enabled DNSSec?), much less the hard work it will take to make substantial improvements in the state of security..."
                              10 Tips to Make Security Education Stick
                              InfoWorld, May 21st, 2014
                              "For decades, companies have attempted to educate employees on security awareness. However, these efforts have largely failed. Instead of merely seeking to give workers knowledge, you need to embed behaviors that reduce information security risk..."
                              Keeping Your Data Secure While On the Move
                              Help Net Security, May 30th, 2014
                              "John Michael is the CEO at iStorage, a provider of secure portable data storage. In this interview he discusses the often overlooked repercussions of data loss, offers tips for organizations to make sure their data is secure even when on the move, and more..."
                              New Security Problems Keep eBay on Edge
                              TechWorld, May 28th, 2014
                              "Following an attack disclosed last week that exposed sensitive information of up to 145 million people, the auction giant is scrambling to repair several other problems reported in its vast network by security enthusiasts.

                              'As a company, we take all vulnerabilities reported to us very seriously, evaluating any reported issue within the context of our entire security infrastructure,' wrote Ryan Moore, lead manager of eBay's business communications, in an email to IDG News Service..."

                              Robot Warfare Raises Ethical Question
                              Homeland Security News Wire, May 28th, 2014
                              "Remote-controlled drones could one day give way to automated robot forces. With the increasing use of drones in military operations, it is perhaps only a matter of time before robots replace soldiers. Whether or not fully automated war is on the immediate horizon, researchers say it is not too early to start examining the ethical issues that robot armies raise..."
                                The Only 2 Things Every Developer Needs to Know About Injection
                                Dark Reading, May 22th, 2014
                                "Security is pretty easy, right? If there's a threat, we put in a defense. Sometimes we can centralize these defenses. For example, you might use an authentication gateway to restrict access to your web applications and web services. Unfortunately, the defenses for 'injection' attacks don't centralize so well, which has made them one of the most popular attack vectors..."
                                The Sorry State of Cybercrime
                                CSO Online, May 23rd, 2014
                                "What can I say? Attempts to defeat cybercrime are failingÂ…miserably. We recently completed the 2014 U.S. State of Cybercrime survey with our survey partners at the U.S. Secret Service, the Software Engineering Institute at Carnegie Mellon University, and PwC. Each year I hope that the results will come back and show that things are getting better, and each year I am left disappointed. Hope truly is for children

                                Let me share with you some of the highlights:..."

                                  Top 6 Vulnerabilities Found Via Penetration Tests
                                  GCN, May 22nd, 2014
                                  "The basement-dwelling teenager poring over lines of scrolling code as he rips through the security of a government or corporate server is a popular trope in Hollywood movies. Although this widespread image of the hacker isn't accurate, the threat of cyberattacks against government networks is very much a real world concern.

                                  In order to be more prepared for cybersecurity breaches, agencies should consider a comprehensive penetration test - ethical hacking with the goal of attacking or bypassing the established security mechanisms of an agency's systems, and using the same tactics as a malicious intruder..."

                                  IT - Careers
                                  14 Ways Lazy People Get Raises
                                  Forbes, May 28th, 2014
                                  "After years of writing about doing well by doing good, I have received many notes from readers that describe how lazy co-workers fool management into giving them big raises.

                                  I can't endorse any of these tactics, but if you lack a decent work ethic or any principles, you might give them a try ..."

                                  50 College Diplomas With The Highest Pay
                                  Forbes, May 30th, 2014
                                  "Students who recently graduated from Carnegie Mellon University's School of Computer Science are making a handsome average salary of $89,800. New grads from the California Institute of Technology, known as Caltech, are earning an impressive $83,800 on average, while new School of Engineering alumni from Stanford are bringing home $74,500.

                                  These numbers come from a survey just released by NerdScholar, the higher education unit of NerdWallet, a five-year-old personal finance website based in San Francisco. NerdWallet offers price comparisons for everything from credit cards to airport parking..."

                                  Disengagement is not a flaw: It.s built into the system
                                  GIGAOM, May 30th, 2014
                                  "We've seen research in recent years showing high levels of disengagement at work and all manner of reasons why it is so. However, Schwartz and Porath do not recommend a radical rethinking of work of the sort I - and others - have been advocating: an adoption of a broader and deeper culture of work that is centered on personal re-engagement with our calling, the transition from authoritarian controls toward autonomy, and relying on the strength of weak ties in networks instead of the brutal stability of hierarchy..."
                                    15 Tech Gifts for Dads and Grads
                                    Bloomberg, May 21st, 2014
                                    "It's a time-honored tradition - giving gifts to our grads and dads for all of their hard work. But when picking a present, skip the traditional standbys like a wallet or leather desk set. Even a new iPod seems too run-of-the-mill.

                                    To help you think outside of the gift box, here are 15 tech gifts, ranging from high-end speaker systems to gutter-cleaning robots, to get your shopping juices flowing. And don't wait until the last minute. Graduation is fast approaching (if it hasn't happened already), and Father's Day is June 15..."

                                      Alexander the Great's 3 Deathbed Wishes Still Resonate Today
                                      Business Journal, May 11th, 2014
                                      "Time is our most precious treasure because it is limited. We can produce more wealth, but we cannot produce more time. The ultimate mystery: None of us knows how much time we really have.

                                      When we give someone our time, we actually give a portion of our life that we will never get back. Our time is our life!

                                      Time is money, or so the saying goes. In your work life, how you spend your time often determines your success.

                                      Make the most of every minute with these useful ideas:..."

                                        How To Lay People Off (And Stay Human)
                                        Forbes, May 29th, 2014
                                        "It's the worst thing you can be asked to do as a manager - it's horrible. You won't sleep for nights beforehand if you have to tell one or more of your team members that their services wont be needed any longer.

                                        I don't mind firing people - it isn't fun, but if you work for an organization that only terminates people who desperately need to go work somewhere else, then it's not so bad. There is a degree to which you're doing a person a favor when you tell him he's in the worst possible job for his abilities..."

                                          IT - Virtualization
                                          Overprovisioning VMs May Be Safe, But It Isn't Sound
                                          SearchServerVirtualization, May 29th, 2014
                                          "Appropriately sizing virtual machines can be a difficult process with many unknowns. Allocating too few resources can starve a VM and lead to poor performance. Administrators wary of this potential problem may take the safer approach and allocate more resources than a VM needs. However, this overprovisioning wastes resources that other VMs could use.

                                          Capacity planning tools can help organizations identify consolidation opportunities, allowing them to scale back overprovisioned VMs and save money..."

                                          ZFS Storage Appliance Videos
                                          By Roxana Babiciu
                                          Check out part one of a new video series for ZFS Storage Appliance. In video #1, you'll learn about the advantages built into Oracle's ZS3 Storage Appliance that come from the unique position that Oracle holds in the market. In video #2, you'll learn how best to monitor large ZS3 installations as well as the use of Enterprise Manager as a complement to dtrace analytics at the ZFS Storage Appliance device level.
                                          IT - Big Data
                                          Know this Right Now about Hadoop
                                          InfoWorld, May 23rd, 2014
                                          "I write a lot about Hadoop, for the obvious reason that it's the biggest thing going on right now. Last year everyone was talking about it -- and this year everyone is rolling it out.

                                          Some are still in the installation and deployment phase. Some are in the early implementation phases. Some have already used it to tackle real and previously intractable business problems. But trust me, Hadoop is the hottest ticket in town..."

                                            Analytics & You...and Him...and Her
                                            Information Management, May 27th, 2014
                                            "A jazz musician, philosopher and detective walk into an insurance company ... for a job? Well, not exactly, but their skills may be something insurers should be looking for. As analytics programs become increasingly prevalent and important in insurance organizations, putting the right people with the right skills on the project is crucial..."
                                            Big Data Debate: Do Analytics Trump Intuition?
                                            Information Week, May 27th, 2014
                                            "Will the next evolution in big data remove human intuition from key business decisions and rely exclusively on data-driven analytics?

                                            Probably not, but organizations will increasingly rely on analytics to make real-time decisions based on a rising tide of big data, predicts Roei Ganzarski, CEO of BoldIQ, a Seattle-based predictive analytics company. This doesn't mean, however, that managers warmly embrace analytics over intuition. In fact, the opposite is often true..."

                                            Reset On Big Data or Miss The Big Change
                                            Information Management, May 28th, 2014
                                            "Big data is undergoing big change, but most companies are missing it or just grasping at the edges. My colleague Fatemeh Khatibloo and I have just completed an exhaustive study of the big data phenomenon. We found a familiar pattern: business confusion in the face of stern warnings about the dangers of big data and vendor-sponsored papers extolling its benefits. Here's what we found hidden beneath the buzz:

                                            As data explodes, so do old ways of doing business..."

                                            Boost Your Digital Intelligence With Big Data
                                            Forrester, May 27th, 2014
                                            "We are beyond the point of struggling over the definition of big data. That doesn't mean that we've resolved all of the confusion that surrounds the term, but companies today are instead struggling with the question of how to actually get started with big data.

                                            28% of all companies are planning a big data project in 2014.

                                            According to Forrester's recent Q2 2014 Global BI And Analytics Survey, 28% of the more than 1,600 responding companies globally are planning a big data project this year..."

                                            Data Scientists: Stop Searching, Start Grooming
                                            Information Week, May 28th, 2014
                                            "Don't put your big-data project on hold -- members of your current staff may be the best fit for your data science team.

                                            Data scientists, like fire-breathing dragons, may exist. But I submit that your organization does not need either of them to solve business challenges. Rather, data-related problems are best handled by your software developers in tandem with your business analysts..."

                                              IT - Mobile
                                              Winning In Your Customers' Mobile Moments
                                              Forrester, May 30th, 2014
                                              "Globally, consumers will own more than six billion mobile phones by the end of 2014, and about two billion of them will be smartphones. With this penetration comes the mobile mind shift - the expectation to be able to access any information or service on the mobile device, in the moment of need.

                                              What's more, consumers reach for their mobile phones 100 to 200 times a day. In these mobile moments, they expect companies to understand their context and offer relevancy as well as both curated and streamlined experiences on mobile devices..."

                                                Webinar: How Can Network Operators Succeed in a Transforming Mobility Marketplace?
                                                Yankee Group Research, May 27th, 2014
                                                "Today, I hosted a webinar that focused on the evolving mobile business and the serious new challenges for mobile network operators (MNOs). One of the most significant developments is the migration of communications services from cellular voice and SMS to IP-based applications like LINE, Viber and WhatsApp. Though not an entirely new challenge for MNOs, its important they respond to the fundamental changes in mobile customer behavior. In this Webinar I assess how mobile behavior is changing, the impact on MNOs, and the responses they should consider to ensure they remain relevant in the delivery of communications services to their customers..."
                                                  11 of Today's (and Tomorrow's) Hottest Smartwatches
                                                  IT World, May 27th, 2014
                                                  "Smartwatches are the 'it' gadgets this summer, and they'll only get hotter as notable new devices become available. Here's a look at the best smartwatches on the market, plus a few that are rumored to be on the way..."
                                                    Misconfiguration to Blame for Most Mobile Security Breaches
                                                    Help Net Security, May 29th, 2014
                                                    "Nearly 2.2 billion smartphones and tablets will be sold to end users in 2014 according to Gartner, Inc. While security incidents originating from mobile devices are rare, Gartner said that by 2017, 75 percent of mobile security breaches will be the result of mobile application misconfiguration..."
                                                    Top Ten Articles for last few Issues
                                                    Vol 195 Issues 1, 2 and 3; Vol 194 Issues 1, 2, 3, 4 and 5;
                                                    We track how frequently each article is viewed on the web site to determine which the readers consider the most important. For last week, the top 10 articles were:

                                                    • 7 Facts About The Industry's Newest Cloud Platform
                                                    • Less known Solaris features: ptime
                                                    • Improved vDisk Performance for LDoms
                                                    • Oracle VM 3: Overview of Disaster Recovery Solutions
                                                    • Overview of Solaris Zones Security Models
                                                    • Oracle announces plans for Java on MIPS
                                                    • Oracle Managed Cloud Services Earns Elite Status for Federal Deployments
                                                    • GlassFish 4.0.1 Update
                                                    • How to Set Up a Hadoop 2.2 Cluster From the Unified Archive
                                                    • MySQL Enterprise Backup Improved Compression Algorithm for 3.10

                                                    The longer version of this article has list of top ten articles for the last 8 weeks.

                                                      IT - Server
                                                      Memory Management Techniques You should Remember
                                                      SearchServerVirtualization, May 29th, 2014
                                                      "Anytime there are performance issues, no one is happy. But when there are memory issues, it can be extra aggravating. If you want to take full advantage of the memory that your servers contain, there are important memory management techniques that you should know.

                                                      If you want to consolidate duplicate files or, on the contrary, if you want to copy files just in case of an error, these techniques can handle that. If you need more memory than your physical server has, or if your physical server needs to retract memory from virtual machines, these techniques give you that option..."

                                                      What's the Highest Server Temperature You Can Handle?
                                                      SearchDataCenter, May 29th, 2014
                                                      "A data center isn't a meat locker, though many are cooled so much you'd expect to see Rocky in there punching a side of beef.

                                                      The concept of elevated operating temperatures is simple: The computer room air conditioner system doesn't need to run as long or work as hard; cooling uses less energy and therefore costs the company less money.

                                                      You don't need to run the data center at a warmer temperature, but you do need to ask, 'How warm is cool enough?'..."

                                                        IT - Tape
                                                        IBM and Fujifilm Show Super Dense Storage Tape for Big Data Work
                                                        Network World, May 20th, 2014
                                                        "Far from being rendered obsolete by hard drives and solid state storage, tape as a storage technology may have a bright future ahead. Tape is still cheaper and more energy-efficient than other modes of storage, making it a natural medium for keeping big data for the long term, IBM argues. It's predicted that by 2020, we will have collectively produced as much as 40 zettabytes, or 40 trillion gigabytes, of data. Back-up files, video and audio archives, extra copies of data for disaster recovery and regulatory purposes all must be kept even if it is rarely used..."
                                                        YouTube: 14 NetBeans Web Development Tips in 7 Minutes
                                                        Geertjan Wielenga
                                                        Geertjan writes, "Are you sure you're getting everything out of NetBeans IDE? Here, especially for HTML5 developers, i.e., you're using some kind of combination of HTML, JavaScript, and CSS, is a slightly-HTML focused series of tips for NetBeans usage. Several secrets included, i.e., features that don't have much UI and that are a question of needing to know that they're there, otherwise you'll never know about them..."
                                                        Security Access Control With Solaris Virtualization
                                                        By Thierry Manfe

                                                        Numerous Solaris customers consolidate multiple applications or servers on a single platform. The resulting configuration consists of many environments hosted on a single infrastructure and security constraints sometimes exist between these environments. Recently, a customer consolidated many virtual machines belonging to both their Intranet and Extranet on a pair of SPARC Solaris servers interconnected through Infiniband. Virtual Machines were mapped to Solaris Zones and one security constraint was to prevent SSH connections between the Intranet and the Extranet. This case study gives us the opportunity to understand how the Oracle Solaris Network Virtualization Technology - a.k.a. Project Crossbow - can be used to control outbound traffic from Solaris Zones.

                                                        Oracle Sun Solaris 11.1 Completes EAL4+ Common Criteria Evaluation
                                                        By Joshua Brickman
                                                        "Oracle is pleased to announce that the Oracle Solaris 11.1 operating system has achieved a Common Criteria certification at Evaluation Assurance Level (EAL) 4 augmented by Flaw Remediation under the Canadian Communications Security Establishment's (CSEC) Canadian Common Criteria Scheme (CCCS). EAL4 is the highest level achievable for commercial software, and is the highest level mutually recognized by 26 countries under the current Common Criteria Recognition Arrangement (CCRA).

                                                        Oracle Solaris 11.1 is conformant to the BSI Operating System Protection Profile v2.0 with the following four extended packages. (1) Advanced Management, (2) Extended Identification and Authentication, (3) Labeled Security, and (4) Virtualization..."

                                                        Nexenta News
                                                        Software. Defined. Everything. The Next Big Thing.
                                                        By Tarkan Maner, CEO Nexenta Systems
                                                        Tarkan has posted a new blog article that starts, "Every day at Nexenta we start the day energized and pumped up because we are part of a true revolution -- The Next Big Thing -- the Software Defined Everything revolution. ItÂ’s going to fundamentally change enterprise computing, as we know it today -- and tomorrow.

                                                        Our team has been blessed working with some of the most innovative companies in the past 25 years; from E-commerce to E-business, On-Demand computing to Enterprise Infrastructure Management and Thin Computing to Cloud Computing. We have been blessed working with some of the most innovative people around, including leading innovators, entrepreneurs and business and technology leaders with truly innovative ideas. So many ideas and technologies have come to pass but only a few have truly been disruptive: E-commerce, social media, virtualization, and cloud computing to count a few. Having watched and experienced the success and failure of countless companies and technologies, we can say with 100% confidence that the Software Defined Everything trend is real. It's disruptive. It's now. It's changing everything..."

                                                        VM Disk Timeouts
                                                        By Andrew Galloway
                                                        Andrew writes, "A pretty common issue to run into when using some SAN back-ends for virtual machines is that the VM's end up crashing, BSOD'ing, or (most commonly) remounting their 'disks' read-only when there's a hiccup or failover in the storage system, often resulting in a need to reboot to restore functionality.

                                                        The most common fix is typically to increase the default timeout settings in the guest VM, and sometimes also in the host machine as well, as the root cause is usually that the SAN took longer than the default timeout to respond. This is usually because the SAN was involved in a failover, which can take > 60, or even > 120 seconds in some cases..."

                                                        Level3 News
                                                        Tech Challenges Facing IT Experts? BYOD Makes The List
                                                        By Sosh Samuel, VP, IT Infrastructure and Operations
                                                        Sosh Samuel writes in a tw telecom blog, "Look around a meeting in corporate America, and you will likely notice a proliferation of personal devices. The concept of 'bring your own device' (BYOD) is not new, but as more devices enter the market each day (and more enter the company's network), corporate IT departments must constantly assess which personal devices to accommodate and how to incorporate into the current IT infrastructure.

                                                        In a recent survey by tw telecom and Harris Poll, 15% of IT Decision Makers (ITDMs) predicted a movement toward BYOD..."

                                                        Trending in
                                                        Vol 235, Issue 3
                                                        Trending IT Articles