News about Oracle's Solaris and Sun Hardware
System News
Jun 2nd, 2014 — Jun 8th, 2014 Generate the Custom HTML Email for this Issue
System News System News for Sun Users
Volume 196, Issue 1 << Previous Issue | Next Issue >>
Sections in this issue:
click to jump to section

Oracle regains the #1 UNIX Shipments Marketshare
Eric Reid
Eric writes, "Oracle has regained the #1 UNIX Server Shipments spot! According to IDC, Oracle's share was 33.6%, up from 32.7% in the year ago period, and 32.2% in C4Q13

While the UNIX server space is currently undergoing some contraction (on a pure numbers basis), this can be traced in part to an overall consolidation trend, due to the greatly-increased price-performance of our systems. Consider this: one SPARC T5-4 system has 1/16th the number of sockets and 1/192nd the number of cores of the previous high-end M9000-64 system -- all at 5X the price-performance..."

After the Sun (Microsystems) Sets, the Real Stories Come Out
Stories from Reunion Event
Tekla Perry writes in IEEE Spectrum, "Sun Microsystems - born in 1982, gone public in 1986, struggling in the 2000s, and absorbed by Oracle in 2010 - left its mark on Silicon Valley and the world. In Sun's wake are 235.000 people who can count themselves as former employees.

Its technical splashes continue to ripple through the world today (Sun's slogan, 'the network is the computer', seems particularly prescient in today's world of cloud computing). And its legendary pranks have yet to be topped (like 'parking' software guru Bill Joy's Ferrari in a pond and stabbing a giant tree trunk through former CEO Scott McNealy's office).

On Saturday night some 700 former Sun employees gathered in a Mountain View, Calif., parking lot outside Sun's first corporate headquarters to reminisce, network ..."

Oracle Multitenant on SuperCluster T5-8: Scalability Study
White paper (28 Pages)

"Consolidation in the data center is the driving factor in reducing capital and operational expense in IT today. This is particularly relevant as customers invest more in cloud infrastructure and associated service delivery. Database consolidation is a strategic component in this effort. In order to minimize capital and operational cost, an efficient and elastic sharing of resources is essential to increase the density (the number of supported databases) in such a consolidated environment.


Say This About Oracle: Its Still Not Dead
Bloomberg BuinessWeek, June 3rd, 2014
Ashlee Vance writes, "It's the middle of 2014, and Oracle is still around. That wasn't really meant to happen.

Oracle's decline into irrelevance was supposed to have started about 20 years ago with the arrival of the MySQL database in 1995. This open-source software had two major advantages over Oracle's expensive database software: It was free, and it was to become the favored database of the Internet whiz kids. Just as the open-source Linux operating system undermined the proprietary operating systems (and cash cows) of such companies as Sun Microsystems, IBM, and Hewlett-Packard, MySQL would undermine Oracle. Chief Executive Officer Larry Ellison would have to downgrade from yacht to dinghy. Or so went the conventional thinking..."

SPARC T5-4 Engineering Simulation Solution
By Mike Mulkey
Mike writes, "A recent Oracle internal performance evaluation for computer-based product design demonstrated that Oracle's SPARC T5-4 server running MSC's SimManager simulation software with Oracle Database 12c consolidates the work of multiple x86 servers while delivering better overall performance. Engineering simulation solutions have taken the center stage in helping companies design and develop innovative products while reducing physical prototyping costs, and exploring a larger design space, resulting in more design possibilities..."
New Exadata e-book
By Javier Puerta
Javier Puerta blogs, "Use this new e-book with your customers to learn why Oracle Exadata is the right choice for all database applications and deployments, including private cloud. Oracle Exadata is an engineered system ideal for consolidating databases and accelerating data warehousing performance. This new e-book provides access to a variety of materials including articles, white papers, workbooks, webcasts, and videos to help you achieve your goals..."
IT - Storage
New Interface for HDDs: SATA Express at PCIe Speed
Storage Newsletter, June 2nd, 2014
"WD was demonstrating the first PCIe HDDs at Computex Taipei, June 3-4, 2014.

Enabled with key technology partners, WD's prototype introduces the new SATA Express interface, a form of PCIe technology, which is offered on recently launched Intel series-9 chipset motherboard platforms. The SATA Express interface provides a roadmap for faster speeds, lower power consumption and increased flexibility for future OEM designs..."

IT - Technology
15 Weird Things in the Internet of Things
Network World, June 5th, 2014
"Last year, we dug up some of the weirdest objects that had been connected to the internet, from a college dorm bathroom to the human heart. Since then, the Internet of Things has only gotten bigger, drawing more items you wouldn't expect under its umbrella..."
    Teleporting Information Sets Stage for 'Cyber Secure' Communications
    DefenseSystems, May 30th, 2014
    "As the military continues to reconsider the security of the electromagnetic spectrum for battlefield data sharing, researchers at Army Research Laboratory have been experimenting with a new way to communicate information: teleportation. ARL investigators recently demonstrated information teleportation through the use of entangled photons at their facilities in Adelphi, Md., according to an ARL press release..."
    10 Technologies that Could Revolutionize Retail
    Network World, June 2nd, 2014
    "Retailers have an arsenal of technology at their disposal that could both improve their customers' shopping experience and save them money by increasing efficiency. Although some of these technologies are still years away from practical use, each is expected to have some impact on the retail world in the coming years..."
      15 Inventions that Changed Our Lives
      Information Week, June 2nd, 2014
      "While there have been numerous inventions over the last 100 years that have made our lives better in some way, some more than others have significantly changed the way we do things in our everyday lives, and had the ability to change industries and markets. We present 15 of them (in no particular order). Let us know, in the comments section below, if you agree with us, or if we missed something big..."
        Inside Ford's 3D Printing Lab, Where Thousands of Parts are Made
        ComputerWorld, June 4th, 2014
        "Ten years ago, Ford 3D printed perhaps 4,000 prototype parts for its vehicles. Today, just one of its five 3D prototyping centers churns out more than 20,000 parts annually.

        The reason for the explosion in 3D printed (or additive manufacturing) of vehicle parts is two-fold: As consumer 3D printers have grown in popularity, printer makers have been infused with fresh revenue, which has been used to improve industrial machines and processes. And secondly, manufacturers have become proficient at creating prototype parts, so much so that the work can be done in hours instead of the four to six weeks needed with traditional machine tooling processes.

        And time is money..."

          Nature-Inspired Designs For Drones of the Future
          Homeland Security News Wire, May 30th, 2014
          "Based on the mechanisms adopted by birds, bats, insects, and snakes, fourteen research teams have developed solutions to some of the common problems that drones could be faced with when navigating through an urban environment and performing novel tasks for the benefit of society. Whether this is avoiding obstacles, picking up and delivering items, or improving the take-off and landing on tricky surfaces, it is hoped the solutions can lead to the deployment of drones in complex urban environments in a number of different ways, from military surveillance and search and rescue efforts to flying camera phones and reliable courier services..."
            Scientists are Getting Closer to 3D-Printed, Self-Assembling Robots
            ComputerWorld, May 30th, 2014
            "Want a robot that you can print and then watch it assemble itself? If so, a group of scientists from MIT may have something for you.

            Daniela Rus, a professor of electrical engineering and computer science and director of the Computer Science and Artificial Intelligence Laboratory (CSAIL) at MIT, says her research team has made progress in the promise of 3D printed robots..."

              Tiny Robots Could Deliver Drugs
              IT World, June 3rd, 2014
              "Minuscule robots of the future that swim around in your body delivering drugs have come a step closer to reality.

              Meet MagnetoSperm. They're infinitesimal robots that squirm around just like sperm and reach parts of the body that are difficult to access.

              Developed by researchers in the Netherlands and Egypt, MagnetoSperm robots navigate using weak oscillating magnetic fields..."

                10 free online tools for converting your PDF files
                IT World, June 3rd, 2014
                "Just because you have a document file in PDF doesn't necessarily stop you from editing it, or otherwise changing it into another kind of file. Here are 10 websites that let you convert your PDF files into other formats (and the other way around) at no cost. All you need to do is upload your PDF file, set the conversion, and download the result..."
                  Free and Open Source S/W
                  Learning PHP, MySQL, JavaScript, CSS & HTML5, 3rd Edition
                  By Robin Nixon
                  Build interactive, data-driven websites with the potent combination of open-source technologies and web standards, even if you only have basic HTML knowledge. With this popular hands-on guide, you'll tackle dynamic web programming with the help of today's core technologies: PHP, MySQL, JavaScript, CSS, and HTML5.

                  Explore each technology separately and learn how to use them together - and pick up valuable web programming practices along the way. At the end of the book, you'll put everything together to build a fully functional social networking site...

                  Nine Advantages of Open Source Software
                  Dennis McCafferty, CIO Insight, June 6th, 2014
                  While it initially seemed revolutionary, open source software is actually rooted in traditional IT processes. Technology, after all, has always been about collaboration and continuous improvement. (In the early days of the ARPANET, for example, researchers established a "request for comments" procedure to improve the project.) Of course, there have been trepidations raised about open source. But the always-active open source communities are more than happy to address any concerns. As a result, more than one-half of the software acquired over the next several years will be open source, according to industry research. And industry titan Michael Dell has describes it as a primary driver in terms of pursuing tech advancements "further and faster." That said, if you're still undecided about the concept - or need to convince your company's influencers about its merits - consider this list of top nine advantages of open source...
                  IT - Bitcoin
                  Central Bankers Argue Digital Currency Requires Institutional Control
                  CoindDesk, June 6th, 2014
                  "A recent paper by two senior central bankers in Europe suggests that the technology underlying bitcoin could serve as the catalyst for change in the global money and payments infrastructure.

                  Entitled 'The Evolution of Central Banks: A Practitioner's Perspective'

                  • and co-written by Bank of England chief economist Andrew G. Haldane and Jan F. Qvigstad, executive director of Norges Bank, Norway's central bank, the paper covers the evolution of central banking and the challenges that have arisen in the era of digitized monies..."
                  The #1 Problem Bitcoin Will Solve by 2015
                  Bitcoin Magazine, June 6th, 2014
                  "Cryptocon is a cryptocurrency summit and barcamp being held in Sydney and Singapore this July. The event will play host to entrepreneurs, investors, enthusiasts and thought leaders in the digital currency space. The emphasis will be on regional leaders of this emerging technology.

                  As an introduction to the event, and to promote awareness, Cryptocon recently asked some of its speakers a single pointed and direct question: 'What is the number one problem that I hope Bitcoin will solve by the end of 2015?'

                  The answers are as revealing as any presentation or speech. See how some of the Cryptocon speakers answered:.."

                  Remittance Relief
                  Bitcoin Magazine, June 3rd, 2014
                  "There is a lot of talk recently of the power Bitcoin has in changing the remittance market. A remittance is a transfer of wealth from one person to another, mostly amongst the world's poor. Zach Ramsay of Canadian-based CoinCulture calls remittances 'peer2peer for the poor2poor.' It's an astute observation.

                  It should be stated that this wealth transfer - remittance market - is cited as vital, critical, and an economic lifeline for those receiving the money. The demand does not just exist, it is desperately needed. Currently, remittances account for the second largest amount of wealth transfer from the 'West' to the underdeveloped world, second to International Aid..."

                  Tax and Bitcoin in Australia
                  Bitcoin Magazine, June 2nd, 2014
                  "Bitcoin adoption is increasing globally. Global jurisdictions are working through the tax implications for business and consumers. In Australia the local Bitcoin Association (BAA) is currently working with the relevant authorities, exploring the tax outcomes which are most appropriate.

                  The following represents a summary of the full position paper prepared by the BAA for presentation to the relevant authorities..."

                  How Bitcoin Helps Afghan Girls Achieve Financial Freedom
                  CoindDesk, June 7th, 2014
                  "Afghan women are rocking the boat for their social and financial freedoms, and their opponents wouldn't even know it, thanks to an organisation that pays them to exercise those rights - in bitcoin.

                  Women's Annex Foundation (WAF) encourages girls to think independently and discerningly through blog writing, software development, video production and social media. It gives them a platform to send their ideas into the world that both pays for them in bitcoin and provides free Web access in a safe place..."

                  Bitcoin Closer to Attaining Lawful Money Status in California
                  CoindDesk, June 6th, 2014
                  "The California state legislature's effort to effectively legalize bitcoin - along side a host of other alternative stores of value - as forms of money cleared an important procedural stage on Wednesday as it moved closer to becoming law..."
                  5 Reasons Volatility on Bitcoin Charts Will Decline
                  CryptoCoinsNews, June 6th, 2014
                  "Price volatility is still the Achilles heel of Bitcoin right now, but the bitcoin charts have been showing a movement towards stability over the past few years. While anyone could move the market with a few hundred dollars in the early days of the cryptocurrency, it now takes a hefty chunk of cash to move the digital asset in one direction or the other.

                  Merchants and mainstream users are still frightened by the idea of entering a young, volatile currency market, which can't really be called anything but practical. It's no secret that the bitcoin price needs to become more stable if this new experiment in digital cash is going to takeover the world, but there are a few good reasons to believe that stability will eventually come the bitcoin's way..."

                  Apple Reverses Anti-Bitcoin App Policy and Allows Mobile Wallets Back in the App Store
                  CryptoCoinsNews, June 3rd, 2014
                  "One of the most attractive features of cryptocurrencies is their ability to reside on a variety of electronic devices, including smartphones. The Google Play store for Android has long allowed app developers to create mobile wallets that allow the transmission of Bitcoins or altcoins. However, Apple blocked cryptocurrency apps from the Apple store, meaning that iPhone users were out of luck if they wanted to take Bitcoin with them on the go.

                  The Bitcoin community repeatedly voiced their frustration at Apple's dismissal of cryptocurrency, but it seemed like their protests were falling on deaf ears - until now. In a striking turn of events, Apple reversed their anti-Bitcoin policy and will now allow mobile wallets that facilitate the transmission of cryptocurrencies, as long as the apps are legally compliant..."

                  It's Clear That The Future Of Bitcoin Is Not In The US
                  Business Insider, June 6th, 2014
                  "If you're reading this story in the U.S., you're probably someone who's heard a lot about Bitcoin, but doesn't know anyone who actually owns any.

                  If you're a European reading this story outside the Eurozone, or perhaps a resident of Hong Kong or Russia, the reverse may be true: A majority of your compatriots may not have heard of Bitcoin, but anyone sophisticated enough to have read up on it now likely owns some..."

                  The Boring Bitcoin Report
                  Forbes, June 2nd, 2014
                  "The price of bitcoin has been on a tear the past two weeks. In the week following the annual Bitcoin conference in Amsterdam, bitcoin values jumped as much as 30%. This week we have continued to watch prices rise an additional 12.5%, from $575 to $647. The price increases are likely due to new money moving in this space, mostly institutional investors and previous investors increasing their positions in bitcoin. This price hike began just two days after the conclusion of the Amsterdam Bitcoin conference, where many positive predictions about the future of the industry were made.

                  Let's take a close look at some of the market moves over the past week..."

                  Getting Started with Puppet on Oracle Solaris 11
                  By Glynn Foster
                  Glynn writes, "One of the exciting enhancements with Oracle Solaris 11.2 has been the introduction of Puppet. While upstream Puppet did have some rudimentary support for Oracle Solaris 11, Drew Fisher and Ginnie Wray worked tirelessly to add enhance the Oracle Solaris Puppet offering. We've talked to customers over the past few years and asked them what their problems were and what technologies they were using, particularly for configuration management. Puppet came up time and time again, and it made a huge amount of sense bringing it as a 1st class citizen in the Oracle Solaris platform.

                  So what is Puppet, and why is it useful?..."

                  Oracle weaves Fabric for MySQL clustering
                  PCWorld, May 27th, 2014
                  Joab Jackson writes in PCWorld, "Oracle has released a framework that allows multiple copies of the MySQL database to work in tandem, making it easier for organizations to easily run live backup databases and scale MySQL across multiple servers.

                  'The Fabric manages a farm of MySQL servers,' said Tomas Ulin, Oracle vice president of MySQL engineering.

                  The open-source MySQL Fabric is part of the MySQL Utilities 1.4.3 package, released Tuesday..."

                  Network Troubleshooting with Oracle Linux
                  by Robert Chase

                  Robert writes, "When applications that use network connectivity for communication are not working, the cause is often a mystery. Despite advances in modern operating systems, many users believe there is no way to directly "see" what's going over the wire, and that often leads to confusion and difficulties when something goes wrong.

                  The reality is that you can actually see what's going over the wire, and there are a number of tools built into Oracle Linux for troubleshooting network issues. This article will help solve some of the mystery and make network connectivity a bit more user friendly..."

                  IT - Cloud
                  Understanding Cloud Costs Gets Easier: Amazon Web Services Rolls Out New TCO Calculator
                  Forrester, June 3rd, 2014
                  "Two years ago, I published one of my most popular reports, Understand The True Cost Of Cloud Services. In it I laid out a model to help compare current infrastructure costs against the costs of running equivalent workloads at a traditional hosting provider and in the AWS public cloud. This type of comparison is often the first step in a company's journey to cloud. Before you start moving workloads to any cloud provider, are you sure the cost savings are really there? The answer isn't always obvious, and depends on measuring a set of critical metrics, including:..."
                  Study: Using Cloud Could Be Dangerous and Expensive
                  Enterprise Systems, June 2nd, 2014
                  "A new survey of IT and security pros shows they have little knowledge of the scope of cloud services in use at their companies and are unsure of who is responsible for securing these services.

                  Furthermore, IT pros believe using cloud services increases the risk of data breaches that can easily cost victimized companies millions of dollars, considering that prior research put a price tag of about $201 for each customer data record lost or stolen..."

                  Data Protection In The Cloud Age
                  Storage Switzerland, June 2nd, 2014
                  "What does the record turntable and a mainframe computer have in common? Plenty, according to Guy Churchward, President of EMC's Data Protection and Availability Division. During EMC World 2014, Guy made an interesting comparison about how both the music industry and Information Technology have both undergone 'waves of change' that have ushered in major technological innovations for how we consume music and for how businesses consume information. Interestingly, despite these major changes, some of the older, legacy technologies have continued to endure, even thrive, right alongside the newer platforms that were intended to replace them..."
                  Cloud Safely! Tip 5: Test, Test, and Retest
                  Business 2 Community, June 2nd, 2014
                  "In part 1 we considered the importance of knowing the details of your company's network. In part 2 we discussed the need for keeping data backup onsite in case of an emergency, along with the acronym D2D2C and the 3-2-1 rule for maximum protection. Then in part 3 we considered the importance of addressing end user issues as they arise and keeping accurate documentation of most common issues. In part 4 we examined the need for controlling cloud traffic or load balancing..."
                    Estimating the Cost of a Cloud Data Breach
                    Help Net Security, June 5th, 2014
                    "IT and security professionals expect cloud services to multiply the likelihood and economic impact of data breaches as they pervade the enterprise. They also reveal that the scope of usage and responsibility for securing cloud services remains largely unknown among IT, according to Netskope..."
                    Survey Spotlights IT Need to Address Cloud Security
                    CIO, May 28th, 2014
                    "data security company Sophos released the results of a survey it conducted on enterprise use of popular cloud-storage services such as Dropbox, Box, Google Drive and OneDrive. Sophos collected responses from more than 725 members of online IT forum between April 29 and May 16, 2014. The company found that even though only 38 percent of respondents "feel secure sharing or collaborating on corporate content between the cloud and mobile devices," 84 percent still "allow some level of access from company-issued devices to cloud share services," and 65 percent "do not encrypt data between the cloud and mobile devices."
                    Why The Private Cloud has Stalled
                    InfoWorld, June 2nd, 2014
                    "The appeal of making your own data center cloudlike is easy to understand: Who wouldn't want an entirely flexible commodity infrastructure, where you can pour on compute, storage, and network resources as needed?

                    From the early days of the cloud, CIOs saw promise in the cloud's magic combination of reduced cost and vastly greater agility and wanted to capitalize on cloud architecture in their own organizations. But those closer to the ground in enterprise IT have always had a tendency to roll their eyes. They see the advantage of scale-out, self-service architectures for some applications -- such as dev and test -- but the return on investment in other areas is not always so obvious..."

                    Open Data Saves New York City Drivers from Parking Tickets
                    IT Web, June 2nd, 2014
                    "I'm a fan of making government data open, as I think most people probably are. Transparency in government, particularly through ensuring that the data it collects and generates are easily accessible to the public in machine readable formats can only be a good thing. However, even if you're in favor of the concept, you may not see how it could directly impact your life, if you don't actively use such information, right?..."
                      IT - CxO
                      77% of lawyers can't be trusted ... with your confidential data
                      Network World, June 2nd, 2014
                      "Whoever said you can't trust a lawyer? Well whoever it was probably had a point. Recent survey data suggests that most lawyers take virtually no action to encrypt and protect online communications with clients other than including a confidentiality statement somewhere in the message body, which in effect does nothing to protect the data. A measly 22% used a form of encryption for sending emails to clients and email encryption is something you'd think would be the bare minimum for security when sending legally sensitive documents over the internet..."
                      The Bad Hiring Decision Is Worse Than None At All
                      Wall Street and Technology, June 6th, 2014
                      "Managers need to make sure they make good hiring decisions, or they risk long-term damage to their entire group.

                      How important is it to make good hiring decisions? Particularly when it is a strategically significant hire, hardly anything is more important. The risk or downside of bad hires, however, tends to be consistently underestimated, or discounted completely. Typically firms are more focused around the risk of not hiring and of lacking the resources to enable them to meet their goals. That however can be a better situation than bringing onboard the wrong person..."

                        Five Questions Your CFOs Are Asking About Security and Risk Management
                        SearchCIO, June 4th, 2014
                        "CIOs have added a new word to their professional dictionaries. "The verb 'Targeted' has now entered the CIO lexicon," Peter Burris, analyst at Forrester Research, said at the recent MIT Sloan CIO Symposium in Cambridge, Massachusetts. The reference to the 2013 Target Corp. breach represents a subtle change in how IT is talking about security and risk management these days. But there's another CIO locution he has picked up on that suggests a bigger change in how CIOs view the state of enterprise security, namely: We've already been breached; we just don't know it yet...
                        Pizza & Leadership: 4 lessons
                        Information Week, June 1st, 2014
                        "If you're reading this during lunch, you might find it useful for two reasons: You might get free pizza out of it, and you could learn to improve your leadership skills. A Stanford research team recently examined social media sites, particularly the Reddit community Random Acts of Pizza, to determine successful strategies for inspiring altruistic behavior in online communities. What does this research have to do with leadership? Leaders in every line of work need to inspire altruistic behavior at times in order to inspire their teams..."
                          Security Manager's Journal: We Manage Our Threats, but What About Our Vendors?
                          ComputerWorld, June 4th, 2014
                          "Ever since we learned that last autumn's massive Target data breach was accomplished with the use of access credentials stolen from a third-party vendor, I've been concerned about similar threats at my company. We use lots of vendors, many of which have access to our network. I've spent a lot of money, time and energy fortifying my network and its perimeter. But what if one of the vendors gets compromised? Could hackers sneak into my network through the side door, posing as a legitimate service employee?..."
                            The Leader Who Didn't Play Well with Others
                            ComputerWorld, June 2nd, 2014
                            "Once upon a time, for that is how these stories always begin, there was a brilliant engineer. He could come up with all sorts of creative ideas in a flash. Because of this, he decided to start a company. His company did reasonably well, although it did have some problems. One of the big problems was that this brilliant engineer, now a brilliant CEO, was not always all that skilled at playing well with others. He always had the best answers to all the technical challenges the company was facing..."
                            What Keeps Tech Execs Up at Night?
                            TechWorld, May 30th, 2014
                            "Technology stocks are up for the year, and while high company valuations may boost compensation for some executives, it doesn't necessarily help them sleep easier at night. In fact, those high share prices can be a cause for concern.

                            The pace of change in tech with the subsequent need to innovate rapidly is a major worry for leaders at tech companies, fueling mergers and acquisition activity. In turn, the high valuations involved with tech M&A these days put a tremendous amount of pressure on company executives to make them work, according to Aftab Jamil, leader of the technology and life sciences practice at BDO, the network of public accountancy firms..."

                              Innovation Is Hard
                              Wall Street and Technology, June 2nd, 2014
                              "Although everyone talks about innovation, actually doing it requires commitment, funding, and a long-term outlook.

                              Innovation isn't easy. If it were, there would be 200 companies like Apple and Google.

                              In financial services, once a hotbed for new thinking and leveraging cutting-edge technology, innovation has taken a back seat because of business rationales, both real and fabricated. Innovation barely exists at many organizations because it has been pushed so far to the back -- like the last row on a 737. Against the bulkhead. In the middle seat..."

                              vBeers@ Broward : Wed June 11th @ Funky Buddha
                              3 Separate Monthly Events - @ Boca; @ Miamia; @ Broward
                              Join us for the next vBeers @ Broward. We meet on the 2nd Wednesday of each month in Broward County. The May meeting will be at the Funky Buddha Brewery, which is located in Oakland Park, just a few minutes from I-95.

                              This will be a non-sponsored event so bring your wallet, your sense of humor and get ready for some great IT and virtualization conversations with some of the best people in South Florida's IT community (including YOU!).

                              • Funky Buddha Brewery
                              • 1201 NE 38th St, Oakland Park, FL
                              • Wednesday, May 14th
                              • 6pm to Late - arrive and depart any time

                              Please register at Eventbrite.

                              Look out for event announcements on the LinkedIn SF vBeers group and at

                              South Florida vBeers Monthly Schedule

                              • vBeers @ Broward - 2nd Wednesday of Month June 11th
                              • vBeers @ Boca - 3rd Wednesday of Month June 18th
                              • vBeers @ Miami - 4th Wednesday of Month June 25th


                              IT - PM
                              The AMA Handbook of Project Management, 4th Edition
                              O'Reilly, June 3rd, 2014
                              "Projects are the life blood of any organization. Revised to reflect the latest changes to A Guide to the Project Management Body of Knowledge (PMBOK) and the Project Management Professional Exam, the fourth edition of The AMA Handbook of Project Management provides readers with a clear overview of a complex discipline. Covering everything from individual projects to programs and strategic alignment..."
                              Digital Failure? Try this Diagnostic Checklist
                              Bank Systems and Technology, June 3rd, 2014
                              "When a bank's digital project fails, the tendency is to look at its delivery. The most obvious symptoms of failure - such as low adoption rates or lagging revenues - can lead to a false diagnosis that often points the finger at an external fault. But as we discussed in part one of this series, the causes of digital failure often run deeper: organizational misalignment, rigid strategies, and a lack of customer-centered design. So when an initiative fails, stakeholders can benefit from taking a step back to dig more deeply into the root causes of failure..."
                                IT - Networks
                                SDN & Breaking the VLAN Contract
                                Network Computing, June 4th, 2014
                                "Software-defined networking disrupts the VLAN approach to network security. We need to embrace change and seize the opportunities SDN offers to improve enterprise security.

                                There is a big change coming in how we think about enterprise networks. Yes, it's SDN, but more importantly, it's a side effect of moving to SDN overlay technology within clouds. Such a move breaks down an implicit contract that has been at work in the enterprise for almost 20 years, what I call 'the VLAN contract. ..."

                                Big Data Needs a Data-Centric Security Focus: Gartner
                                Information Week, June 4th, 2014
                                "Chief Information Security Officers (CISOs) should not treat Big Data security in isolation, but require policies that encompass all data silos if they are to avoid security chaos, according to Gartner, Inc. Gartner predicts that, through 2016, more than 80 percent of organizations will fail to develop a consolidated data security policy across silos, leading to potential noncompliance, security breaches and financial liabilities..."
                                Huawei Demonstrates Wi-Fi Speeds 10x Faster than Today's
                                TechWorld, May 30th, 2014
                                "Chinese networking goliath Huawei claimed yesterday that it has broken wireless internet speed records, paving the way for the next generation of commercially available Wi-Fi.

                                The firm, which has come under scrutiny from western governments over security, said it achieved a record transmission data rate of 10.53Gbps on 5GHz frequency bands at its research campus in Shenzhen, China.

                                Huawei first began looking into next generation Wi-Fi in 2010 and today it said the new speeds could be commercially available by 2018..."

                                8 Common Network Utilities Explained
                                How-To Geek, June 3rd, 2014
                                "Tools like ping, traceroute, lookup, whois, finger, netstat, ipconfig, and port scanners are available on nearly every operating system you can get your hands on. They're used for everything from troubleshooting a connection to looking up information.

                                Whether you're using Windows, Linux, or Mac OS X, these tools are always close at hand. You'll also find web-based versions of many of these utilities. Some are even available in Chrome OS's hidden Crosh shell..."

                                5 NFV Benefits & the Trends Driving Them
                                Network Computing, May 30th, 2014
                                "These days, millions of consumers and businesses are connected to a network in one form or another. As a result, the systems and datacenters used to transport and house content are getting bigger, more pervasive, and increasingly complex. Add to this the explosive amount of data crossing the network, and it quickly becomes apparent that companies and service providers face a daunting challenge..."
                                  Predictions For The Future Of The Networked Economy
                                  Business 2 Community, June 1st, 2014
                                  "The networked economy is developing - we are already connected to just about anyone with Internet access using a simple keystroke. We have devices, social networks and business networks, and we leverage the idea of sharing to collaborate and use more, but make less. Our use of networks and their integration in our lives is changing how we communicate, shop, give and receive medical treatments, and find resources.

                                  Welcome to the future of the networked economy..."

                                    SDN Seen Slowing Spending on Routers, Switches
                                    Network World, June 3rd, 2014
                                    "SDN and related industry trends may be behind declines in Ethernet switching, service provider routing and reduced carrier spending.

                                    First quarter 2014 data from market research and analysis firms indicate that software-defined networking and commodity white box switching are prompting a pause in sales for leading name vendors, and perhaps prompting carrier AT&T to dampen overall spending while preparing an ambitious SDN-related project..."

                                    The Network Complexity Conundrum
                                    Network Computing, June 2th, 2014
                                    "When someone says, 'It won't scale' or 'It's not elegant,' we assume they're talking about design -- network design, protocol design, or anything else. But they aren't really. Rather, these are statements about complexity. Okay, so you're asking, 'What?' and probably thinking, 'Russ has gone off the deep end!' It's always fair game to question the state of my sanity (my kids always do), but let's look at this issue a little more carefully..."
                                      What Networking Can Learn from CPUs
                                      Business 2 Community, June 3rd, 2014
                                      "The rapid growth in compute demand is well understood. To keep up with accelerating requirements, CPUs have gone through a massive transformation over the years. Starting with relatively low-capacity CPUs, the expansion of capability to what is available today has certainly been remarkable - enough to satisfy even Gordon Moore. But keeping up with demand was not a matter of simply making bigger and faster chips. To get more capacity, we actually went smaller. As it turns out, there are practical limitations to just scaling things larger. To get more capacity out of individual CPUs, we went from large single cores to multi-core processors. This obviously required a change in applications to take advantage of multiple cores..."
                                        World IPv6 Launch: Who's Making Progress?
                                        Network Computing, June 4th, 2014
                                        "Two years ago Friday, scores of ISPs and website operators, including Internet heavyweights Google and Facebook, participated in World IPv6 Launch by permanently enabling IPv6. Organized by the Internet Society, the program was launched a year after World IPv6 Day, a 24-hour test of the new Internet protocol on websites, and was designed to encourage permanent IPv6 adoption.

                                        Since then, IPv6 has become what the Internet Society calls 'the new normal.' The group released an infographic to illustrate IPv6 progress over the past two years (see below)..."

                                        IT - Operations
                                        6 Models of the Modern Data Center
                                        Information Week, June 2nd, 2014
                                        "The cloud hasn't killed the company-owned data center.

                                        Companies from General Motors to Fidelity are taking the best infrastructure ideas from Web giants such as Facebook and Google and adapting them to their very different business needs in order to build a new generation of data centers.

                                        To highlight the different approaches and strategies these companies are taking, we looked at six companies beyond the Web giants that have made or are planning major data center investments..."

                                        Human Error, Downtime and Design
                                        Data Center Knowledge, June 5th, 2014
                                        "If one of the leading causes of data center outages is human error, why do we spend so much time focused on the tier classification or rating of a data center? I would agree that the design plays an important part in reliability, but it's a small part relative to people, process, operations, maintenance, lifecycle and risk mitigation strategies.

                                        Human error puts any data center design at risk for downtime, so why do we continue to over build and wait for the inevitable? Have we arrived at the point in this relatively young industry, where we believe human error is unavoidable and that focusing on trying to fix the root causes of 'human error' is just too hard?..."

                                          5 Benchmarking Alternatives that Will Improve Outsourcing Relationships
                                          CIO, May 30th, 2014
                                          "For better or worse, invoking the benchmarking clause in an outsourcing contract can spell trouble. IT suppliers contend that benchmarking has been used by some customers as an unfair negotiation tool to drive down costs. And industry experts point out that creating true apples-for- apples comparisons can be difficult as outsourcing relationships are about more than cost..."
                                          IT - Security
                                          Internet of Things Market to Exceed $7 Trillion by 2020
                                          Help Net Security, June 6th, 2014
                                          "While the interest and buzz around the Internet of Things (IoT) has grown steadily in recent years, the seemingly endless market promise continues to become reality.

                                          According to new IDC research, a transformation is underway that will see the worldwide market for IoT solutions grow from $1.9 trillion in 2013 to $7.1 trillion in 2020..."

                                          The Mystery of the TrueCrypt Encryption Software Shutdown
                                          Dark Reading, May 30th, 2014
                                          "Not long after news spread that TrueCrypt was shutting down, enough theories were circulating about what happened to fill an episode of the TV show 24.

                                          To recap: The developers of the TrueCrypt open-source, on-the-fly encryption software announced Wednesday that they were ending development of the software. In a post online, the developers state the software 'is not secure as it may contain unfixed security issues.' In addition, they note that the development was ended after Microsoft ended its support of Windows XP, and that later versions of the operating system 'offer integrated support for encrypted disks and virtual disk images'..."

                                          5 Lessons from Companies that Get Computer Security Right
                                          InfoWorld, June 3rd, 2014
                                          "Most organizations are very bad at computer security.

                                          They don't patch well, and they have short, simple passwords that don't expire. They have dozens to hundreds of people in elevated groups. They don't have a clue who has which permissions in their environment. Their networks are flat and often wide open to hundreds of contractors, business partners, and vendors. Defenses aren't appropriately prioritized, and they try and fail to accomplish dozens of projects at the same time. My average security audit findings report is well over 100 pages long and often contains dozens and dozens of critical findings..."

                                          CISOs Look to Hire White Hat Hackers to Head Off Security Breaches
                                          CIO, June 2nd, 2014
                                          "Many companies continue to struggle to secure their data and identify and address system vulnerabilities. But chief information security officers (CISOs) are finding the best way to defend against hackers might be to hire a hacker of their own.

                                          However, that expertise and security assurance comes at a hefty price, according to Matt Comyns, global co-head of search firm Russell Reynolds Associates' cybersecurity practice..."

                                          Companies Should Already Know How to Protect Data, FTC Argues
                                          ComputerWorld, May 30th, 2014
                                          "The Federal Trade Commission (FTC) has published enough information publicly for companies to know exactly what the agency considers reasonable security practices for protecting sensitive data, an FTC representative said in deposition entered this week in a closely watched case challenging its authority to enforce data security standards..."
                                          Information Overload: Finding Signals In the Noise
                                          CSO Online, May 29th, 2014
                                          "Signal-to-noise ratios are hard to manage. As a security professional, you want the threat data, you want the attack notifications and alerts, and you need intelligence. But, when there's too much coming in, those alerts and notifications fall to the wayside. They're easily dismissed and ignored.

                                          After all, if a device is generating 60 alerts a day - and for the first few weeks none of them amount to anything - as new alerts from that device arrive, they're eventually going to be dismissed..."

                                          It's Time We Hold Companies Responsible for Data Breaches
                                          InfoWorld, June 2nd, 2014
                                          "Laws have never been able to keep up with the pace of technology. Tragically, it often takes a highly publicized event of gross malfeasance to rattle the legal system into enacting measures that address the gap.

                                          The lack of stoplights and driving laws at the advent of the automobile, the dearth of workplace safety regulations in the age of the American sweatshop -- time and again, tragedy precedes legislation, even when common sense would suggest otherwise..."

                                            Logging in Securely Without Passwords
                                            Homeland Security News Wire, June 5th, 2014
                                            "Passwords are a common security measure to protect personal information, but they do not always prevent hackers from finding a way into devices. Researchers are working to perfect an easy-to-use, secure login protection that eliminates the need to use a password - known as zero-interaction authentication..."
                                            Safely Storing User Passwords: Hashing vs. Encrypting
                                            Dark Reading, June 4th, 2014
                                            "Securing user information begins with a proper understanding of security controls and the protection of user passwords using modern hashing algorithms. Here's a quick review of the fundamentals..."
                                            IT - Careers
                                            The Five Biggest Threats to Human Existence
                                            Homeland Security News Wire, June 2nd, 2014
                                            "In the daily hubbub of current 'crises' facing humanity, we forget about the many generations we hope are yet to come. Not those who will live 200 years from now, but 1,000 or 10,000 years from now. The word 'hope' is appropriate because we face risks, called existential risks, which threaten to wipe out humanity. These risks are not just for big disasters, but for the disasters that could end history. These risks remain understudied..."
                                              The sought after Linux professional
                                    , June 5th, 2014
                                              "There's no such thing as 'just a Linux sysadmin,' which is what makes Linux professionals so incredibly valuable. We've all been hearing that the demand for Linux professionals is 'at its highest ever!!!' for years. In recent years, though, it hasn't just been Linux nuts like me saying it. You may reference the 2014 Linux Jobs Report by The Linux Foundation and assume they're biased, but a quick search over at shows that the demand for Linux professionals is a real thing.

                                              Linux has been around for decades, so why the sudden interest?..."

                                              IT - Big Data
                                              Despite Gains, Hadoop Still has Big Holes to Fill
                                              InfoWorld, June 5th, 2014
                                              "While the Apache Hadoop distributed data processing platform has made great strides in enterprise businesses, it still needs ease-of-use, security, lifecycle management, and tooling to solidify its status, key industry analysts believe.

                                              Hadoop has to become "part of the IT environment," said Ovum analyst Tony Baer at the Hadoop Summit conference in San Jose, Calif., this week, but it must become easier to use and not be so programmer-centric..."

                                              IT - Mobile
                                              Top Techniques for Mobile Data Loss Prevention
                                              Search Consumerization, June 2th, 2014
                                              "Protecting the data on mobile devices is the first step to security in a consumerized enterprise environment. But even with the proper encryption and password protection in place, IT needs to face the fact that sometimes devices get lost or employees unknowingly download something malicious.

                                              So what do you do in that case? In part two of this series about mobile information management, learn how to protect devices from external threats..."

                                              As BYOD Management and Cost Realities Set In, Its Luster Fades
                                              SearchConsumerization, June 4th, 2014
                                              "In the business world of the not-too-distant future, tablets and smartphones -- chosen and paid for by employees themselves -- will replace corporate-issued computers. IT administrators, freed from the chains of PC procurement and desktop management, will be able to do more valuable work. And employee productivity will soar.

                                              This remains the promise of the bring your own device (BYOD) trend, three years after the polarizing term entered the mainstream IT lexicon. But in most businesses, dreams of abandoning all endpoint purchases will remain just that: dreams..."

                                              How Mobile Technology Saves Businesses Billions
                                              Business 2 Community, June 1st, 2014
                                              "A staggering 94% of small businesses are using smart phones and other devices to conduct their business.

                                              These businesses haven't just jumped on a trend. Switching to smart phones are saving businesses to the tune of the billions every year.

                                              According to a survey done by AT&T and the Small Business & Entrepreneurship Council, over the past year small businesses have saved $67.5 billion by using mobile apps, tablets, smart phones and other devices to conduct their every day business. Smart phones alone saved business owners $32.3 billion last year..."

                                                Invasion of the Body Snatchers: Wearable Devices Are Coming for You
                                                IT World, June 3rd, 2014
                                                "If wearables take off the way some predict they will, their market potential is huge, and the space is still wide open, with no dominant player.

                                                Vendors' rush to corner the market was perhaps best explained by Kaz Hirai, CEO of Sony, while speaking at CES.

                                                "You have only two wrists and one head; you can't wear 10 different products," he said. "Once you secure someone's wrist with a particular product, they'll usually stick with it."

                                                Here's a look at how some vendors are trying to capture your body..."

                                                Most IT Admins Fear Exposure through Mobile Devices
                                                Help Net Security, June 5th, 2014
                                                "GFI Software announced the findings of an extensive independent research project examining the 'Internet of Things' (IoT) and the impact IT administrators expect from the increased volume of internet-enabled and addressable devices on their network.

                                                Respondents overwhelmingly cited greater exposure to existing and undiscovered threats, particularly from mobile devices, as among their most pressing concerns about the onward march of the Internet of Things into their organization..."

                                                How Employees Get Around IT Policies and Restrictions
                                                Search Consumerization, June 4th, 2014
                                                "Thanks to mobile devices, cloud services, mobile apps and MiFi hotspots, end users can get around even the most stringent IT policies. But how do they do it?

                                                To understand the answer to that question, it's important to take a look at the restrictions a typical company might place on employees and contractors. That way, you can take the appropriate steps to limit the loss of control over data..."

                                                  Top Ten Articles for last few Issues
                                                  Vol 195 Issues 1, 2, 3 and 4; Vol 194 Issues 2, 3, 4 and 5;
                                                  We track how frequently each article is viewed on the web site to determine which the readers consider the most important. For last week, the top 10 articles were:

                                                  • Top 4 open source LDAP implementations
                                                  • Diving into OpenStack Network Architecture - Part 1
                                                  • Java Magazine: Developer Tools and More
                                                  • Solaris 11.2: Time based access limitations
                                                  • Oracle VM-Design Considerations For Enterprise Scale Deployment
                                                  • ZFS Storage Appliance Videos
                                                  • The Internet of Things Is Really the Internet of People
                                                  • Oracle Mobility Emerges Prepared for the Future
                                                  • Oracle Sun Solaris 11.1 Completes EAL4+ Common Criteria Evaluation
                                                  • Security Access Control With Solaris Virtualization

                                                  The longer version of this article has list of top ten articles for the last 8 weeks.

                                                    IT - Server
                                                    Beware the Next Circle of Hell: Unpatchable Systems
                                                    InfoWorld, June 2nd, 2014
                                                    "Microsoft's decision to end support for Windows XP in April was met with a collective gulp by the IT community. For good reason: Approximately 30 percent of all desktop systems continue to run XP despite Microsoft's decision to stop offering security updates. Furthermore, a critical security flaw in Internet Explorer 8 disclosed recently by HP's TippingPoint Division opens the door to remote attacks on XP systems that use IE8.

                                                    But Windows XP is just the tip of an ever-widening iceberg: ..."

                                                    Used Servers Live Longer with Virtualization, Updates and Support
                                                    SearchDataManagement, May 30th, 2014
                                                    "Servers don't last forever, and they shouldn't. A server refresh should add performance, reliability, efficiency and important new features that are currently missing from your data center.

                                                    Used servers become increasingly difficult to maintain and support as parts become scarce and service contracts grow prohibitively expensive. New server technologies increase efficiency, computing capacity and resilience with each model. The best time to refresh hardware, however, is different for every business. And used servers can bring surprising value..."

                                                    Oracle Joins OpenDaylight Project
                                                    Plans to Integrate OpenDaylight SDN Capabilities into Oracle Solaris
                                                    Oracle is expanding its application-driven software defined networking (SDN) capabilities in Oracle Solaris 11.2 with plans to integrate OpenDaylight SDN. The integration is intended to allow customers to improve service quality and take advantage of apps-to-disk SLAs through compatibility with a wide range of SDN devices, applications and services. It will also allow them to use a common and open SDN platform with OpenStack to manage Oracle Solaris-based clouds...
                                                    NetBeans Podcast 69
                                                    Podcast Guests: Terrence Barr, Simon Ritter, Jaroslav Tulach

                                                    NetBeans Community News with Geertjan and Tinu

                                                    • If you missed the first two Java Virtual Developer Day events in early May, there's still one more LIVE training left on May 28th.
                                                    • Video: Get started with Vaadin development using NetBeans IDE
                                                    • NetBeans IDE was at JavaCro 2014 and at Hippo Get-together 2014
                                                    • Another great lineup is in the works for NetBeans Day at JavaOne 2014. More details coming soon!
                                                    • NetBeans' Facebook page is almost at 40,000 Likes! Help us crack that milestone in the next few weeks! Other great ways to stay updated about NetBeans? Twitter and Google+.

                                                    Download mp3: 47 Minutes - 39.5mb

                                                    The Top Ten Security Top Ten Lists
                                                    By Troy Kitch
                                                    Troy writes, "As a marketer, we're always putting together the top 3, or 5 best, or an assortment of top ten lists. So instead of going that route, I've put together my top ten security top ten lists. These are not only for security practitioners, but also for the average Joe/Jane; because who isn't concerned about security these days? Now, there might not be ten for each one of these lists, but the title works best that way. Top Ten Security Top Ten Lists

                                                    Starting with my number ten (in no particular order):..."

                                                    Unix: Why you should love nmap
                                                    By Sandra Henry-Stocker
                                                    Sandra writes, "You have to love nmap. No other tool is set up to give you as quick a view of your network and at so little cost. The name stands for "network mapper" and it can tell you a lot about the network you are managing, including what systems are on it, what's running on those systems, and quite a bit of services you might need to worry about. It's a very basic tool in some ways. You hand it a few command line parameters and it runs around your network making connections and reporting on what it is able to discover. Plus, it's surprisingly efficient (unless you inadvertently ask for too much information) and is easy to install and to use..."
                                                      Nexenta News
                                                      Nexenta Nominated for Seven Storage Awards at UK Storage Awards (Storries XI)
                                                      Including: Storage Product of the Year and Storage Virtualisation Product of the Year
                                                      Nexenta has been nominated for seven awards at the UK Storage Awards (Storries XI). With five nominations for its NexentaStor SDS solution, the awards demonstrate how businesses of all sizes are relying on Nexenta to facilitate the mounting shift towards a Software-Defined Data Centre.

                                                      NexentaStor 4.0 is an award-winning SDS solution and a key building block of the Software Defined Data Centre. It offers enterprise capabilities for data integrity and workload performance, providing customers the flexibility to select their storage operating system independently from the hardware on which it runs.

                                                      The nominations for NexentaStor 4.0 are as follows:

                                                      • One to watch - Product Award
                                                      • Value for Money Award
                                                      • Storage Virtualisation Product of the Year
                                                      • Big Data Company of the Year
                                                      • Storage Product of the Year


                                                      Nexenta Launches Worldwide Channel Program
                                                      Don Lopes is the new Head of Channel at Nexenta
                                                      Nexenta (@Nexenta), the global leader in Software-Defined Storage (#softwaredefinedstorage) (SDS), announced a new worldwide channel program and a new executive for channel. Channel veteran Don Lopes is driving the company's go-to market strategy - one that is entirely channel driven. The new Nexenta Partner Program (NPP) provides Value Added Distributors, Value Added Resellers, System Integrators, and Service Providers globally with the most innovative software-defined storage solutions to enable the move to a software-defined enterprise.
                                                      Level3 News
                                                      Stein Mart Selects tw telecom to Deliver Advanced IP VPN Capabilities to Over 270 Stores Nationwide
                                                      With systems integrator partner, Presidio,

                                                      tw telecom announced that it has been selected by Stein Mart, Inc., a leading national retailer, to provide Internet Protocol Virtual Private Network (IP VPN) service nationwide. The technology will allow Stein Mart to directly connect and securely pass data to its more than 270 stores and data centers nationwide.

                                                      Trending in
                                                      Vol 235, Issue 3
                                                      Trending IT Articles