News about Oracle's Solaris and Sun Hardware
System News
Jun 9th, 2014 — Jun 15th, 2014 Generate the Custom HTML Email for this Issue
System News System News for Sun Users
Volume 196, Issue 2 << Previous Issue | Next Issue >>
Sections in this issue:
click to jump to section


Oracle
x
Oracle Database Insider
June Edition

Now available. The June edition of the Oracle Database Insider includes:

Content:

  • News, Video, Webcasts,E-Book,Podcasts,Customer Buzz, Blogosphere, Find an Oracle Partner, Oracle Magazine, Featured Training, Events

New Study Confirms Capital Expenditure Savings with Oracle Multitenant

A new study finds that Oracle Multitenant, an option of Oracle Database 12c, drives significant savings in capital expenditures by enabling the consolidation of a large number of databases on the same number or fewer hardware resources. Read More

Five Lessons Learned from an Advanced Persistent Threat

Advanced persistent threats (APT) are a type of sophisticated cyber attack from well-coordinated and funded cybercriminals that penetrate an organization slowly and methodically. Find out from Oracle experts what key lessons your organization can take away from the analysis of an APT attack. Read More

Oracle Enterprise Manager Extensibility News
June 2014

"On the heals of Enterprise Manager 12c Release 4 this week comes version 2.0 of the Extensibility Exchange. A new theme allows optimal viewing on a number of different computing devices from large monitor displays to tablets to smartphones.

One of the first things you'll notice is a scrollable banner with the latest news related to Enterprise Manager and extensibility. Along with the 'slider' and the latest entries from Oracle and the Partner community, new features like a tag cloud and an auto-complete search box provide a better way to find the plug-in, connector or other Enterprise Manager entity you are looking for..."

Oracle Database In-Memory Powers the Real-Time Enterprise
Larry Ellison Unveils Breakthrough Technology, Which Turns the Promise of Real-Time into a Reality

Oracle Database In-Memory enables customers to accelerate database performance by orders of magnitude for analytics, data warehousing, and reporting while also speeding up online transaction processing (OLTP).

An innovative, dual-format in-memory architecture combines the best of row format and column format to simultaneously deliver fast analytics and efficient OLTP.

Oracle Database In-Memory allows any existing Oracle Database-compatible application to automatically and transparently take advantage of columnar in-memory processing, without additional programming or application changes.

Oracle Database In-Memory demonstrated from 100x to more than 1000x speedup for enterprise application modules in performance tests, including Oracle E-Business Suite, Oracle's JD Edwards, Oracle's PeopleSoft, Oracle's Siebel, and Oracle Fusion Applications.

In-Memory Boosts Oracle OLTP By 2X, Analytics By 1000X
By Timothy Prickett Morgan
Timothy Prickett Morgan writes, "With the lion's share of the relational database market underpinning the systems of record humming along in datacenters, Oracle cannot afford to let its rivals get too far ahead of it when it comes to in-memory processing. After years of development and three and a half months of beta testing, Oracle is nearly ready to ship the in-memory features of its new 12c database.

Oracle co-founder and CEO Larry Ellison hosted a coming out party for the In-Memory Database option for Oracle 12c and as usual, he likes to put on a show. This one featured a bunch of demonstrations of query processing on single node Exalytics and multimode Exadata clusters as well as on the SPARC M6-32 NUMA machine, all aimed at showing how much faster Oracle 12c is with the in-memory option and also explaining how Oracle's approach is different from SAP with its HANA in-memory database. Ellison also showed the speedup customers are seeing running various Oracle applications..."

SPARC
x
Oracle SPARC M6-32 E-Book
20-Pages
Organizations require more from their data centers - greater compute capacity, greater availability, and greater efficiency.

Get your free e-book to discover how the SPARC M6-32 can help you:

  • Transform your data center with world record performance
  • Protect your organization with unmatched availability and enhanced security
  • Lower costs with powerful consolidation tools
  • Speed deployment of enterprise applications
  • Respond to rapid change with huge expansion capability

"The SPARC M6-32 server and SuperCluster M6-32 fundamentally change data center economics by combining high end computing perform

The Ideal Platform for Oracle Database 12c In-Memory and in-memory Applications
By Michael Palmeter (Engineered Systems Product Management)
Michael writes, "Oracle SuperCluster, Oracle's SPARC M6 and T5 servers, Oracle Solaris, Oracle VM Server for SPARC, and Oracle Enterprise Manager have been co-engineered with Oracle Database and Oracle applications to provide maximum In-Memory performance, scalability, efficiency and reliability for the most critical and demanding enterprise deployments. The In-Memory option for the Oracle Database 12c, which has just been released, has been specifically optimized for SPARC servers running Oracle Solaris..."
Virtualization
x
How to upload the ISO files to OVM repository
By Lingeswaran R
Lingeswaran writes, "To install guest operating systems on OVM's virtual machines, you need to have ISO images on storage repositories. In UnixArena, we have already seen about creating the storage repositories. Once the storage repositories are presented to oracle VM server, you can import the ISOs to oracle VM server's repositories. But you can't simply browse the ISO and import it. You need to provide the http, https or FTP link to download it. Here we will see the multiple ways to import the ISO's to repository..."
Oracle VM: Design Considerations for Enterprise-Scale Deployment
Webcast Replay Available
Join us for this live, one-hour, informative webcast:

  • Learn how Oracle VM is being used to power Oracle's Managed Cloud Service business

  • Gain insight into the key architectural considerations and best practices for deployment of a large scale cloud operation

  • Leverage proven expertise for rapidly scaling and automating cloud management Understand why Oracle VM application-driven virtualization design is uniquely suited for large scale cloud operations

"We are a diverse business with a multitude of internet and media properties growing at varying rates, as well as frequent acquisitions and divestures with a global reach. Oracle Managed Cloud Services provides us with the scalability and flexibility to successfully manage an expansive and complex organization that supports several finance and accounting management teams."

Paul Scribano, Vice President, Finance, Mindspark Interactive Inc., part of IAC Search and Media Inc., IAC

IT - Storage
x
How to design Storage for the Next Generation Data Center
Storage Switzerland, June 9th, 2014
"Being a cloud provider is a challenging proposition. Like a utility, a cloud provider (public or private) has to support almost any level of user consumption and maintain that support as demand changes, with little or no advanced notice.

These requirements are tough to meet, especially with legacy disk-based storage systems. In a similar way, the internal demands of IT-as-a-service have impacted the way enterprises must consider their own storage infrastructures. Moving forward these organizations will need a new storage technology and the 'next generation' data center to stay abreast of demand..."

    Is It the End of Big Data? Quarta Horribilis for High-End Storage
    Channel Register, June 6th, 2014
    "IDC has just revealed one of the worst storage quarters for a couple of years as buyers went on a high-end storage strike.

    There's been a quite spectacular slump in the storage business in the first 2014 quarter, according to the beancounters' Storage Tracker. Notwithstanding the digital-universe-drowning-us-in-Big-Data narrative, the actual storage market shrank this quarter..."

    The SAN is Dead! Long Live the Storage Fabric!
    Network World, June 9th, 2014
    "Prior to my days as an analyst I spent many years toiling away in corporate IT. The area within IT that I had the most interest and passion in was the network. It's a little like when Spock said to Captain Kirk that 'commanding a starship was his first, best destiny.' Sure, Kirk might go and try being a diplomat, but at the end of the day he finds his way back to the bridge..."
      Java Technology
      x
      Building Java EE Apps That Scale
      Webcast On-Demand
      "With some awesome work by one of our architects, Randy Stafford, we recently completed a webcast on scaling Java EE apps efficiently. Did you miss it? No problem. We have a replay available on-demand for you..."

      Topics include:

      • Domain object caching
      • Service response caching
      • Session state caching
      • JSR-107
      • HotCache and more!

      replay.

      Java EE 7 turns one today!
      3 Java EE 7 compatible Application Servers Available Today
      Today marks the first year anniversary of Java EE 7. The JSR 342 specification was finalised on May 28, 2013 with the official launch taking place on June 12, 2013 (original press release).

      As of today, there are already 3 Java EE 7 compatible Application Servers, coming from different 'vendors' (Oracle, TmaxSoft and Red Hat). Two of those Java EE 7 Application Servers are free and open source. We expect the list of Java EE 7 compatible Application Servers to grow over the coming months...

      IT - Technology
      x
      3D Printing Inventor 'Amazed' at Healthcare Applications
      Information Week, June 10th, 2014
      "When Charles 'Chuck' Hull created the first 3D printer in 1983, he never envisioned a time when these devices would generate hearts, ears, or blood.

      'I had a faint inkling that it had more power than I initially thought,' Hull told InformationWeek. 'It's expanded beyond what I could possibly have predicted.'..."

        Geekend: Sarcasm Detector Wanted
        Information Week, June 11th, 2014
        "Welcome to my first Geekend on InformationWeek.com. I wrote this weekly column for three and a half years on EnterpriseEfficiency.com, and now that I'm bringing it to InformationWeek, I'll repeat what I wrote in my very first Geekend:

        Every Friday I'm going to talk about stuff I love -- gadgets, games, movies, and the people who make them -- and I'm not going to worry about the enterprise. Just once a week. One post, for a little bit of fun so we can enter the weekend on a high note..."

          NASA Challenge Tests Autonomous Robots
          ComputerWeekly, June 9th, 2014
          "This week robots with no human handler will be making their way through a field, searching for hockey pucks, blue rocks, wooden cubes and the like.

          The robots won't even know what some of the objects are.

          The search effort is part of the NASA's Sample Return Robot Challenge at Worcester Polytechnic Institute (WPI) in Worcester, Mass. today through Friday, where the agency hopes to find interesting technology from 18 robotics research teams..."

            IT - Bitcoin
            x
            U.S. Marshals Are Selling 29,656.51306529 Bitcoin
            The Atlantic, June 13th, 2014
            "The United States government finds itself in possession of an odd asset that it must now auction: Bitcoin, the digital currency. And we're not talking about a couple of spare bitcoin, but rather 29,657 bitcoin - which converts to more than $17 million based on today's exchange rate.

            Marshals get their hands on (and subsequently auction off) all kinds of seized assets - luxuries like Lamborghinis, fur coats, and mansions - but this auction represents a new kind of wealth.

            Under federal law, the government is required to auction the assets seized by Justice Department agencies like the Bureau of Alcohol, Tobacco and Firearms and the Drug Enforcement Agency..."

            Prices Fall As Bitcoin Confronts Doomsday Scenario
            Business Insider, June 14th, 2014
            "Bitcoin prices were down more than 5% to $563 Saturday morning as the cryptocurrency faced its worst crisis of confidence since the fall of Mt. Gox.

            There is only one way to hack the entire Bitcoin network, which has continued to hum along in the face of numerous Bitcoin business failures. It involves a group of Bitcoin miners taking control of 51% of the Bitcoin's processing power, thus giving them the power to manipulate the blockchain, Bitcoin's master transaction ledger. Miners are simply computers that unscramble the encrypted series of numbers attached to every Bitcoin transaction..."

            Expedia Now Accepts Bitcoin For Your Crypto-Vacations
            TechCrunch, June 11th, 2014
            "Another day, another company accepting bitcoin in an attempt to cash in on the craze. This time it's Expedia the travel booking site that's accepting the virtual currency for hotel bookings. They're working directly with Coinbase to accept and then convert the BTC into dollars as soon as they hit the travel agent's coffers..."
            How To Invest In Bitcoin Without Losing Everything
            CoinTelegraph, June 13th, 2014
            "Bitcoin has broken down many of the barriers regular people face financially. One of the more significant ways it has done this, is by opening up a speculative asset market that is easily accessible and has the potential to be extremely profitable. I am, of course, talking about Bitcoin itself as a speculative asset..."
            Mr Bitcoin Goes to the World Cup
            CryptoCoinsNews, June 6th, 2014
            "The hundreds of thousands of supporters that have descended on Brasil to watch their national team on the world stage play the beautiful game are joined by Mr Bitcoin, a yellow and purple mascot promoting Bitcoin Donation Cup, a global community donation program sponsored by ten Bitcoin companies to provide a seamless way for fans around the world to donate bitcoin to a participating charity of their choice..."
            Bitcoin Pay-Per-Character Publishing Platform Gathers Momentum
            Bitcoin Magazine, June 10th, 2014
            "Bitcoin Megaphone, the world's first Bitcoin-powered pay-per-character publishing platform, is poised to enter its third consecutive month with increased traffic and high user engagement.

            Bitcoin Megaphone was created as a side project by Mike Solomon in March of 2014. Mike Solomon lives in New York where he works as Digital Director for Glamour Magazine at Condé Nast Publications. Condé Nast Publications is in no way affiliated with Bitcoin Megaphone..."

            Bitcoin Goes Mainstream With Inclusion on Yahoo! Finance
            CoindDesk, June 11th, 2014
            "Access to bitcoin price data in the world of mainstream finance has taken another big step in the last 24 hours.

            Following Bloomberg's recent addition of bitcoin to its trading terminals in late April, and its inclusion on computational knowledge engine WolframAlpha, Yahoo! Finance has followed suit and now displays the BTC/USD price along with its many other listed fiat currencies.

            A Yahoo spokesperson told CoinDesk that move was driven by the site's users, many of whom had requested the addition of the feature:..."

            Malaysian Retail Giant i-Pmart Will Hold 100% of its Bitcoin Payments
            CoindDesk, June 9th, 2014
            "Another e-commerce giant has joined the bitcoin world, with major Malaysian online mobile phone and electronic parts retailer i-Pmart adding it to the list of accepted payment methods last week.

            CEO and founder Mart Tang also said the company will hold onto the bitcoins it earns and watch the price rise, rather than convert them into local fiat currency..."

            Solaris
            x
            Playing with Swap Monitoring and Increasing Swap Space Using ZFS Volumes
            By Alexandre Borges
            "Part 2 of a series that describes the key features of ZFS in Oracle Solaris 11.1 and provides step-by-step procedures explaining how to use them. This article describes how to monitor swap space and how to increase or decrease the swap space using ZFS volumes..."
            MySQL
            x
            FairWarning Privacy Monitoring Solutions Rely on MySQL to Secure Patient Data
            FairWarning used MySQL since in 2005
            Rebecca Hansen writes, "FairWarning solutions have audited well over 120 billion events, each of which was processed and stored in a MySQL database. FairWarning is the world's leading supplier of privacy monitoring solutions for electronic health records, relied on by over 1,200 Hospitals and 5,000 Clinics to keep their patients' data safe. In January 2014, FairWarning was awarded the highest commendation in healthcare IT as the first ever Category Leader for Patient Privacy Monitoring in the '2013 Best in KLAS: Software & Services' report.

            FairWarning has used MySQL as their solutions' database from their start in 2005 to worldwide expansion and market leadership..."

            Cloud Computing
            x
            Cloud, Analytics, Mobile, And Social: Convergence Will Bring Even More Disruption
            By Ravi Puri, SVP, North America, Oracle Consulting Services
            Ravi writes, "Everywhere you look, there is an article, blog post or tweet about one of the mega trends in technology - cloud, big data, mobility or social. As just one data point, a Google search on 'cloud computing' yielded more than 300 million results.

            These trends are already having a profound impact on our business and personal lives, and they will continue to impact how we do our jobs, how we communicate, and how we gather, manage and use data to learn and make better decisions.

            In my experience in IT consulting, I have found that many people have different - sometimes very different - views on what these trends are and how they are beneficial. Here is how my team defines them:..."

            IT - Cloud
            x
            Docker Will Disrupt Virtualization And Drive Cloud Adoption
            Forrester, June 10th, 2014
            "On June 9, Docker.com announced that it will release version 1.0 of Docker, an open source platform that could automate the deployment of various types of applications as lightweight, portable, self-sufficient containers and run them virtually on any infrastructure. This announcement indicates that the platform is ready for commercial use, including lightweight, portable runtime support and packaging via Docker Engine and cloud services for application sharing and process automation via Docker Hub ..."
            5 Hybrid Cloud Gotchas
            Information Week, June 10th, 2014
            "Hybrid clouds are the future of enterprise computing. Forty-seven percent of the nearly 400 respondents to InformationWeek's new Hybrid Cloud Survey have implemented or are actively piloting or developing private clouds, with an additional 33% considering. The majority of that 47% have or are developing hybrid systems, in which workloads can shuttle to public cloud services like Amazon Web Services, Google Cloud Platform, IBM SoftLayer, or Microsoft Azure..."
            Has Cloud Computing Been a Failed Revolution?
            CIO, June 4th, 2014
            "Speaking at a recent conference, Salesforce.com's Peter Coffee put up a provocative slide: The number of Google searches for the term "cloud computing." It proves, he says, that people no longer find cloud computing compelling.

            You might be tempted to think that people aren't interested in cloud computing because they've got it all figured out and have moved on to new challenges..."

            How the Cloud Can Be Used and Misused
            Help Net Security, June 10th, 2014
            "Peter Jopling, CTO and Software Security Executive, IBM UK & Ireland, talks about threats to cloud infrastructure providers, the importance of real-time data analytics, illustrates the way cloud enables cybercriminals to expand the scope and size of their attacks, and more..."
            Understand the Governance Impacts of Moving to the Cloud
            Business 2 Community, June 10th, 2014
            "The cloud offers a number of benefits for companies, from reduced capital budgets and headcount expenses to web platform elasticity that allows you to quickly spin up and scale out cloud platforms and solutions to meet rapidly changing customers needs. However, many organizations are jumping directly into the cloud without fully understanding the impacts..."
              Users Fear Cloud Breaches are More Expensive
              InfoWorld, June 9th, 2014
              "Is a data breach worse if it happens in the cloud? Given that a recent Ponemon Institute report is entitled 'Data Breach: The Cloud Multiplier Effect,' it sounds like the answer is yes. But the report hints at another conclusion that's at least as significant as any dollars-and-cents cost of a security breach: the generally low opinion held by IT folks about cloud security..."
              IT - CxO
              x
              What are the Legal Obligations to Encrypt Personal Data?
              Help Net Security, June 6th, 2014
              "A new report by UK-based law firm FieldFisher details legal obligations for encryption of personal data resulting from both industry compliance regimes, such as PCI DSS, national laws and local regulations.

              Driven by relentless news about cyber threats, security breaches and data loss, lawmakers and regulators the world over are increasingly defining new obligations for data security..."

              CIOs Adjust to Enterprise Tech as a Fashion Statement
              ComputerWorld, June 9th, 2014
              "CIOs reeling from their recent loss of technology purchasing power -- as it shifts to the front business lines in marketing, finance, human resources and other departments -- will find a hero in Ralph Loura, vice president and CIO at The Clorox Company.

              In truth, today's CIOs take their marching orders from line-of-business managers while dealing with rogue enterprise apps and cloud services on a massive scale. In fact, 40 of all IT spending is now outside of the traditional IT budget, according to a recent report from CEB. But at an event in San Francisco last week, Loura reminded his peers, 'User-led is not the same as user-centric'

              In other words, not everyone gets a vote..."

              In Praise of Shadow IT
              Information Week, June 9th, 2014
              "80% of those employed by enterprises larger than 1,000 people circumvent IT to use cloud-based tools, new research says. I say let them.

              When it comes to technology, I don't like to play by the rules. In fact, I'd be happy to pay for my own gear and my own software if it means I have total freedom to choose how I get my job done on a day-to-day basis. While I understand and respect the rules of the IT department for protecting the company and its assets, I often find myself suffocated by the lack of options and flexibility..."

                NYC's New Tech Czar Says City is Poised for Innovation
                Government Technology, June 10th, 2014
                "New York City's approach to technology may soon change. In 2014, Mayor Bill de Blasio entered the scene, and in early May, he named Anne Roest as commissioner of the New York City Department of Information Technology and Telecommunications (DoITT). Roest, who started her position on May 27, explained that the Big Apple is planning some new projects and expanding others, like turning the city's payphone booths into Wi-Fi hot spots.

                But to Roest, it's not the technology that counts, but how it's used..."

                The True Cost of Bad Managers - and Why You Need Really Great Ones
                TLNT, June 12th, 2014
                "The research in this HBR blog post by Randall Beck and James Harter, Why Good Managers so Rare, shows that the quality of the managers impacts the success of the business more than anything else.

                Here are some highlights:.."

                  Surprise! Customer Service Doesn't Need To Be Delightful - Just Effective
                  Forrester, June 12th, 2014
                  "Forrester data shows that valuing a customer's time is the most important factor in good customer service. Customers simply want an accurate, relevant, and complete answer to their question upon first contact, so they can get back to what they were doing before the issue arose. Here are the numbers:..."
                    vBeers-SF
                    x
                    vBeers@ Boca: Wed June 18th @ Biergarten Boca
                    vBeers @ Miami: Wed June 25th @Democratic Republic Of Beer
                    vBeers @ Boca

                    Join us for vBeers @ Boca. We meet on the 3rd Wednesday of each month in Boca Raton, FL. The June meeting will be at Biergarten Boca, which is located in on US 1, just South of Palmetto Park and East of I-95.

                    This event will be a non-sponsored event so bring your wallet, your sense of humor and get ready for some great IT and virtualization conversations with some of the best people in South Florida's IT community (including YOU!).

                    Please share this invitation with your IT colleagues and encourage them to attend!

                    Please RSVP via EventBrite

                    vBeers @ Miami

                    Register for Miami Event which will be on Wed June 25th at the Democratic Republic Of Beer.

                    IT - DR
                    x
                    Study: VMs Transforming Disaster Recovery
                    SearchNetworking, June 3rd, 2014
                    "As any IT pro knows, any amount of downtime is it too much, and transforming disaster recovery is a top priority.

                    According to a recent study by Enterprise Strategy Group (ESG), outages cost companies anywhere from $5,000 to more than $1 million each hour their systems are down, said Terri McClure, ESG's senior analyst. And with more data being stored in the cloud, companies are more vulnerable than ever to outages.

                    At the same time, the amount of downtime companies can manage has decreased significantly -- from four hours in 2004 to only a few minutes in 2010, the survey found..."

                    IT - PM
                    x
                    Think big, but have small, short, and focused meetings
                    GIGAOM, June 9th, 2014
                    "Noah Brier of Percolate recently posted the company's meeting rules online:

                    • Do you really need a meeting?
                    • Meetings should be 15 min by default
                    • No spectators
                    • Have a purpose, state it up frint
                    • Make tasks, assign people to tasks
                    • Don't bring computers or phones

                    After a torrent of commentary on Twitter, he decided to post a little more qualification of some of the rules. For example, it's ok to use a laptop in a meeting it you're explicitly taking meeting notes, or actually assigning tasks to people..."

                      3 Ways to Defuse Dr. No.
                      Information Week, June 11th, 2014
                      "You know that guy in the back of the room, just waiting to list all the reasons your project won't fly? Don't fight him -- convert him.

                      When dealing with difficult people I'm often reminded of a snippet of dialog in the BBC series Yes Minister.

                      Sir Humphrey: "There are four words you have to work into a proposal if you want a Minister to accept it."

                      Sir Frank: "Quick, simple, popular, cheap. And equally there are four words to be included in a proposal if you want it thrown out."

                      Sir Humphrey: "Complicated, lengthy, expensive, controversial. And if you want to be really sure that the Minister doesn't accept it, you must say the decision is courageous."

                      Sound familiar?

                        10 Days or 10 Months? Pondering the Ideal Turnaround for IT Projects
                        Insurance Networking News, June 9th, 2014
                        "There's been plenty of discussion across the industry lately about the advantages of short, rapid-fire IT projects as the path to fast and furious innovation - versus the long-term, months and years-long mega-projects that have characterized enterprise IT. Anyone involved in the deployment of policy administration systems can understand the depth of planning and months of work needed to upgrade or move to new platforms..."
                          Events
                          x
                          Launch Webcast: Announcing the Next-Generation of Virtual Compute Appliance
                          June 24, 2014 6pm GMT/7pm CET
                          Please join Oracle Executives Mark Hurd, Wim Coekaerts, and Scott Genereux as they announce the latest Virtual Compute Appliance. Discover how the Virtual Compute Appliance delivers virtualized application infrastructure and how it differentiates from other converged infrastructure solutions.

                          Register here.

                          Virtual Technology Summit Series
                          Americas - Wednesday July 9th - 9am to 1pm PT / 12pm to 4pm ET / 1 to 5 pm BRT
                          "The Oracle Technology Network (OTN) is excited to invite you to our first Virtual Technology Summit Series. Learn first hand from Oracle ACEs, Java Champions, and Oracle product experts, as they share their insight and expertise on using Oracle technologies to meet today's IT challenges.

                          We are offering three chances to watch and interact with Oracle and community experts. Register Now by clicking one of the links below..."

                          IT - Networks
                          x
                          Internet of Things: Are You Underestimating Video?
                          Information Week, June 9th, 2014
                          "Whether you want an easier way to collect data or connect to customers, video is ready to play a bigger role. The hype around the huge market opportunity known as the Internet of Things is giving short shrift to one basic source of data input: video.

                          Sure, there's a lot of anxiety about widespread video surveillance, but I'm talking here about the everyday, run-your-business kinds of video use, the kinds where privacy concerns aren't a factor. It's using video to look at machines your company owns, for example, or to interact with customers to provide better service..."

                            IT is Bracing -- But not Preparing -- For the Internet of Things
                            InfoWorld, June 6th, 2014
                            "Although 71 percent of IT professionals believe the so-called Internet of things will affect both users and the workplace, 59 percent said they weren't taking specific actions to prepare for it. As usual for new technology, security is a huge concern, at 86 percent. In fact, 43 percent plan to isolate new Internet-enabled things to a separate network, and only 23 percent plan to allow them onto the corporate network..."
                            NASA to Beam Video from Space Station with a Laser Beam
                            IT World, June 5th, 2014
                            "In an effort to fundamentally change the way it will communicate with future deep space missions, NASA will use a laser beam to send a video from the International Space Station to Earth on Thursday.

                            NASA announced late Wednesday that it will beam enhanced-definition video via laser from the space station to the Table Mountain Observatory in Wrightwood, Calif. From there, the video will be transmitted to the mission team at NASA's Jet Propulsion Laboratory.

                            This is the first planned official transmission of this mission, which has been dubbed Optical Payload for Lasercomm Science or OPALS..."

                              The State of Network Infrastructure
                              The Register, June 6th, 2014
                              "Networks are the glue that allow users to function effectively in their daily tasks, yet a recent report by Freeform Dynamics based on a survey of readers of the Register shows many of you are using old equipment that is hard to manage. This begs the question, 'does senior management really care about the state of enterprise networks, or are they happy to take it for granted until something breaks'? ..."
                              When Good WANs go Bad: WAN Failure Effects Widespread
                              SearchSecurity, June 9th, 2014
                              "Pulling into the drive-through line I was shocked by how fast it was moving, and rounding the corner to the order window I could see that about half the cars were pausing for just a moment -- then launching away like F-18 fighter jets off the USS Nimitz. Then came the disembodied voice when it was my turn, "Welcome to McDonald's. We're only taking cash today; our credit card machine is broken. May I help you?"

                              What followed was a great real-world reminder of the criticality of our WANs and the real bottom-line effects of WAN failure..."

                                IT - Operations
                                x
                                The Depressing Truth About e-Waste: 10 Things to Know
                                TechRepublic, June 11th, 2014
                                "In 2012, the United Nations reported that in five years, the world's electronic waste would grow by 33% from 49.7 million tons to 65.4 million tons. That's the weight of 200 Empire State Buildings or 11 Great Pyramids of Giza.

                                Considering the lifespan of a cell phone is now only 18 months and a laptop's life span is only around two years, that rapid growth rate isn't surprising. What is surprising, however, is how little the public knows about e-waste and how to properly dispose of electronics. Here are 10 things to know about the e-waste life cycle..."

                                  IT - Security
                                  x
                                  Are You Prepared to Manage a Security Incident?
                                  Help Net Security, June 12th, 2014
                                  "It's the year of the breach. Adobe, Target and eBay fell victim to cyber-attacks and 2014 has already seen the Heartbleed bug impact the majority of organizations across the globe. With attacks getting more advanced and hackers getting smarter, businesses across all sectors are potential targets. It's a case of when, not if, your company will be hit..."
                                    Big Data Security Analytics Can Become the Nexus of Information Security Integration
                                    Network World, June 9th, 2014
                                    "In a recent ESG research survey (note: I am an employee of ESG), security professionals working at enterprise organizations (i.e. more than 1,000 employees) were asked the following question: How do you believe that your organization will change its security technology strategy decisions in any of the following ways over the next 24 months in order to improve its security management?..."
                                    How Researchers Helped Cripple CryptoLocker
                                    Dark Reading, June 5th, 2014
                                    "The big news this week that a global team of law enforcement agencies and security researchers has disrupted a sophisticated and infamous ransomware operation came as no surprise to Lance James.

                                    James, head of cyber intelligence at Deloitte & Touche, had worked with the FBI on the case, providing intelligence from a sinkhole he and his team had built to capture CryptoLocker traffic. CryptoLocker has been on the radar screen of the law enforcement and security communities for some time, and the alliance of agencies and security researchers did some serious damage to the operation..."

                                    How to Use A Cyber War Exercise to Improve Your Security Program
                                    CSO Online, June 6th, 2014
                                    "You may have missed it, but a few weeks ago a small cyber war played out in just 72 hours. Just after 6pm (PDT) on Sunday, May 18th, the first moves were made. The whole event was over by Wednesday evening.

                                    While not an actual war, the cyber war strategic exercise (CWSX) pitted graduate students (our colleagues) from City University of Seattle and Bellevue University against each other in a real-world scenario. The ultimate test of 4-6 weeks of planning, the lessons learned proved an immediate benefit to the students..."

                                      Nowhere to Hide: The Reign of Cyber Criminals is Coming to an End
                                      InfoWorld, June 10th, 2014
                                      "During the 1920s and 1930s, a part of the U.S. public rooted for gun-toting, mythologized bank robbers like Bonnie and Clyde, John Dillinger, and Pretty Boy Floyd. But the fantasies were often tempered by reports of guards, police, and innocent bystanders injured and killed in the frequent shoot-outs.

                                      It took a while, but eventually law enforcement caught up with the criminals, either taking them into custody or killing them..."

                                        The 10 biggest Snowden leaks
                                        ComputerWorld, June 5th, 2014
                                        "No one knows exactly how many documents Edward Snowden illegally accessed and downloaded while working as a contract employee for a National Security Agency (NSA) signals intelligence facility in Hawaii; some estimate as many as 1.3 million. As a contracted NSA systems administrator with top-secret Sensitive Compartmented Information (SCI) clearance, Snowden certainly had access to millions of classified documents.

                                        NSA officials claim the majority of the documents Snowden stole had little or nothing to do with domestic surveillance. But it is precisely the documents describing the NSA's purported domestic spying -- and those related to its surveillance of foreign leaders -- that have garnered the most attention. Here are 10 of them..."

                                        The Next Heartbleed: 5 Security Vulnerabilities to Watch
                                        CIO, June 9th, 2014
                                        "IT executives know one thing about security: Be prepared. Over the past few months, many large companies had to deal with the Heartbleed virus, which is capable of stealing logins and passwords on Internet servers.

                                        But what comes next? CIO.com asked security companies, consultants and IT experts to discuss other potential flaws that are ripe for exploit. These five should catch your attention..."

                                        World Cup Brazil 2014: How Cybercriminals are Looking to Score
                                        Help Net Security, June 10th, 2014
                                        "Starting this week, 32 national teams and thousands of football fans will descend on Brazil for the 2014 FIFA World Cup. Right now the teams are fine-tuning their strategies in order to outwit their opponents - and so are the cybercriminals.

                                        Cybercriminals are already using various attack techniques to exploit the World Cup theme, including fraudulent domains selling fake tickets, fake giveaways, and several phishing and malware campaigns. They are also using methods like credit card cloning and ATM scams to attack those attending the games in Brazil. These cyber attacks have only intensified as the tournament approaches and they all have the same end-goal: to steal your money..."

                                          Your Own Data Could Dupe You
                                          PCWorld, June 5th, 2014
                                          "When a eBay suffered a massive data breach a few weeks ago, most of the attention revolved around the compromise of passwords and the vulnerabilities in the site's security. While those are legitimate concerns, they obscure the most glaringly weak link in the security chain: people.

                                          Indeed, it was not a sophisticated exploit that facilitated the eBay breach, but an old-fashioned con..."

                                          IT - Careers
                                          x
                                          Why do Americans work so much?
                                          GIGAOM, June 14th, 2014
                                          "134 countries have rules mandating the maximum work week: here in the US we do not, and perhaps it is no surprise then that 85.8% of men and 66.5% of women work more than 40 hours a week. In fact, the International Labor Organization states,

                                          'Americans work 137 more hours per year than Japanese workers, 260 more hours per year than British workers, and 499 more hours per year than French workers.'

                                          The US is the only industrialized nation to lack a guaranteed parental leave option..."

                                            IT Jargon: 10 Phrases We Love to Hate
                                            TechWorld, June 5th, 2014
                                            "A good buzzword is hard to resist. These, however, have outstayed their welcome.

                                            Every now and then we all fall into the trap of using jargon. It's kind of hard not to. A fresh buzzword is appealing. Sadly, the freshness never lasts.

                                            Here are our top 10 worst IT jargon..."

                                              The Most Important Career Question You've Never Even Considered
                                              ComputerWorld, June 9th, 2014
                                              "As a reflective practitioner of the technical arts, you've likely pondered a lot of questions about the career you want to pursue, including these: What technical discipline should I focus on? Which degrees or certifications should I get? Should I stay technical or become a manager?

                                              But here's one question so fundamental that it rarely gets asked: Do I want to be an asset or a liability?..."

                                                Tech Giants Finally Grow a Spine and Resist NSA Spying
                                                InfoWorld, June 12th, 2014
                                                "Microsoft, privacy advocate -- who'd have thunk it? The new regime in Redmond is taking up the cudgels, challenging the right of federal prosecutors to make it hand over a customer's email that's stored abroad. What's more, Verizon -- never known as a customer-friendly outfit -- is on the same side, filing a brief in support of Microsoft's legal claim, and other telcos are following suit..."
                                                Servers
                                                x
                                                Oracle's New Memory-Optimized x86 Servers
                                                Getting the Most Out of Oracle Database In-Memory
                                                Josh Rosen, x86 Product Manager-Oracle on Jun 11, writes, "With the launch of Oracle Database In-Memory, it is now possible to perform real-time analytics operations on your business data as it exists at that moment - in the DRAM of the server - and immediately return completely current and consistent data. The Oracle Database In-Memory option dramatically accelerates the performance of analytics queries by storing data in a highly optimized columnar in-memory format. This is a truly exciting advance in database technology.

                                                As Larry Ellison mentioned in his recent webcast about Oracle Database In-Memory, queries run 100 times faster simply by throwing a switch. But in order to get the most from the Oracle Database In-Memory option, the underlying server must also be memory-optimized..."

                                                IT - Virtualization
                                                x
                                                Compromising Virtualization
                                                Network Computing, June 10th, 2014
                                                "Features such as instance storage are taking the virtual out of virtualization. The performance gains are tremendous, but the techniques open cloud security risks.

                                                Virtualization in its pure form has totally stateless servers, with user data stored on networked drives. This is a great computer science concept, with a good deal of appeal, but it has run into the realities of shared storage farms for a while, forcing compromises in implementation that reduce the level of virtualization considerably and which add some risk to cloud usage..."

                                                The ROI of Dense Virtual Machines
                                                StorageNewsletter.com, June 9th, 2014
                                                "Organizations that have fully embraced virtualization are buying host-class servers to put their VMs on. This equipment is 'richer' in its configuration, with more processing power, more memory and higher quality components than the typical server designed for a single application. This gives these host-class servers the potential to replace dozens of legacy servers, along with a higher price tag. The return on investing in a highly dense VM architecture is a reduction of these more capable but costly servers..."
                                                  Five Reasons Why China is Attacking U.S. Tech
                                                  IT World, June 9th, 2014
                                                  "China's blistering attacks on U.S. tech firms is more than quid pro quo over cyberspying charges. It's a signal of China's growing confidence in its own technology capabilities.

                                                  China makes its own computer chips, has the world's fastest supercomputer, and is on target to surpass the U.S. in R&D spending. It has built its own social media empire for its 600 million Internet users, keeping Facebook and Twitter on the fringes..."

                                                  Virtual Machine Sizing: 3 Mistakes to Avoid
                                                  Network Computing, June 9th, 2014
                                                  "Don't waste resources due to improper vCPU allocation, memory allocation, and incorrect template use.

                                                  One of the great promises of virtualization is the ability to reclaim vast amounts of resources that stood forever idle on physical servers. This is an achievable goal, but unfortunately, a large number of sysadmins are not seeing the results they expect. This is because they are going about provisioning the wrong way. Virtualization -- specifically hardware virtualization using a hypervisor -- requires a change in how one thinks about resource allocation..."

                                                    IT - Mobile
                                                    x
                                                    Why Mobile Strategies are Stalling at Many Enterprises
                                                    CIO, June 10th, 2014
                                                    "If your business hasn't heard about the mobile revolution by now, well, you might want to crawl out of your cave and enjoy the sunlight with everyone else. Mobility is what the business consultants call 'transformative' technology that affects nearly every company in every industry.

                                                    To be fair, the problem isn't that enterprises aren't aware of the impact of mobile technology. The problem is that many companies aren't doing mobility right. Only two out of five companies have made good progress in their mobility efforts, according to a recent Accenture survey of nearly 1,500 C-level executives. The rest, not so much..."

                                                      MDM: Highly Recommended, Still Misunderstood
                                                      Information Management, June 6th, 2014
                                                      "Master data management is a hot topic. And, this is at times surprising to me because the noise of big data is deafening. Big data is certainly sexier. MDM is like mom nagging to clean up the room - necessary, but a total buzz kill..."
                                                      IT - Big Data
                                                      x
                                                      Iowa Employs Big Data to Identify Potential UI Fraud
                                                      Government Technology, June 4th, 2014
                                                      "Iowa Workforce Development (IWD) is utilizing sophisticated big data analytics in the cloud to target fraudulent unemployment compensation claims. The new initiative, which began in March, uses publicly available data sets in conjunction with IWD data to generate potential fraud leads.

                                                      Gary Bateman, chief information officer for IWD, said the agency implemented the solution after recognizing the rising potential for fraud given increasingly sophisticated computer systems..."

                                                      Government Data + Maps: 10 Great Examples
                                                      Information Week, June 11th, 2014
                                                      "Nearly every federal government agency uses geographic information system (GIS) technology to meet various mission goals. Agencies rely on GIS for asset management, citizen engagement, public policy, planning and analysis, disaster response, and much more..."
                                                      10 Powerful Facts about Big Data
                                                      Information Week, June 10th, 2014
                                                      "Big data, however you define it, has been praised and vilified. It's many things to many people: a boon to scientists and retailers, but also an enabling technology for a host of privacy and security threats.

                                                      Whether savior or scam -- or maybe even a mixture of the two -- big data remains a popular topic among pundits, prognosticators, marketers, and security buffs. Its unofficial definition is evolving as well. So what is it? ..."

                                                      Fast Data: The Next Step after Big Data
                                                      InfoWorld, June 11th, 2014
                                                      "The way that big data gets big is through a constant stream of incoming data. In high-volume environments, that data arrives at incredible rates, yet still needs to be analyzed and stored.

                                                      John Hugg, software architect at VoltDB, proposes that instead of simply storing that data to be analyzed later, perhaps we've reached the point where it can be analyzed as it's ingested while still maintaining extremely high intake rates using tools such as Apache Kafka..."

                                                      The Cloud and Big Data Are No Threat to Data Warehouses
                                                      InfoWorld, June 6th, 2014
                                                      "I'm often told that the use of big data systems will kill the now very old world of data warehousing. Why? It's hugely expensive to build data warehouses. Consider the cost of the technology, including very pricey hardware and software. The minimum buy-in is well over $1 million -- and I'm being kind with that number..."
                                                      University CIO Helps Boost Graduation Rates with Analytics
                                                      ComputerWorld, June 9th, 2014
                                                      "As interim CIO at Valdosta State University in Georgia, Brian A. Haugabrook must ensure that the school's IT systems meet the needs of faculty, staff and 12,000-plus students. But he says an effective IT operation must do more than keep computers and networks running. It must also help the university fulfill its mission by giving officials a way to reach out to students at risk of failing. To do that, Haugabrook deployed analytics tools that allow faculty and staff members to determine which students need extra help and then coordinate that support. Less than two years into the project, the tools are yielding results. Here, Haugabrook talks about how VSU's IT department is helping to improve graduation rates..."
                                                      World Cup Management: Data or Intuition?
                                                      Information Week, June 10th, 2014
                                                      "Data-driven management is all the rage in World Cup soccer, baseball, and business. But where does that leave intuition and experience?

                                                      The World Cup starts this week, and beyond the drama of the games themselves, another drama will be playing out on the sidelines: data-driven decision making versus management by experience..."

                                                      4 Data Insights from Health Datapalooza
                                                      Government Technology, June 5th, 2014
                                                      "Doctor Atul Gawande wants to kill his fax machine -- not just for himself, but on behalf of physicians everywhere.

                                                      For Gawande, a Harvard professor and surgeon at Brigham and Women's Hospital in Boston, fax machines are a mechanical manifestation of all that's inherently wrong with the healthcare industry. They're antiquated, ineffectual and offer a decidedly poor return on investment..."

                                                      Top10
                                                      x
                                                      Top Ten Articles for last few Issues
                                                      Vol 196 Issue 1; Vol 195 Issues 1, 2, 3 and 4; Vol 194 Issues 3, 4 and 5;
                                                      We track how frequently each article is viewed on the web site to determine which the readers consider the most important. For last week, the top 10 articles were:

                                                      • After the Sun (Microsystems) Sets, the Real Stories Come Out
                                                      • Oracle regains the #1 UNIX Shipments Marketshare
                                                      • Sun Server X4-8
                                                      • Say This About Oracle: Its Still Not Dead
                                                      • Getting Started with Puppet on Oracle Solaris 11
                                                      • Unix: Why you should love nmap
                                                      • SPARC T5-4 Engineering Simulation Solution
                                                      • New Exadata e-book
                                                      • Java EE 8 update
                                                      • Network Troubleshooting with Oracle Linux

                                                      The longer version of this article has list of top ten articles for the last 8 weeks.

                                                        IT - Server
                                                        x
                                                        PCI Backers Push Low-Power Features with an Eye On Internet of Things
                                                        IT World, June 4th, 2014
                                                        "The PCI technology that's served PCs and servers well for decades is learning to get by on less power so it can play in mobile devices and the Internet of Things.

                                                        Even as it works to boost the speed of PCI Express in an upcoming version 4.0, the PCI Special Interest Group has a three-pronged strategy for serving markets that demand lower power consumption. That capability is already important in smartphones, tablets and thin and light laptops, and it will be critical in the billions of sensors and other embedded components expected to form the Internet of Things..."

                                                        NetBeans
                                                        x
                                                        Integrating Amazon EC2 in Java via NetBeans IDE
                                                        By Geertjan Wielenga
                                                        Geertjan writes, "Next, having looked at how to integrate from Java with Amazon Associates and Amazon S3, let's take a look at Amazon EC2, the elastic compute cloud which provides remote computing services. I started by launching an instance of Ubuntu Server 14.04 on Amazon EC2, which looks a bit like this in the on-line AWS Management Console, though I whitened out most of the details:..."
                                                        Nexenta News
                                                        x
                                                        IDC: No-Name Storage Vendors Gain on Leaders in Q1
                                                        The big winner in IDC's figuring was clearly the 'Others' category
                                                        The Var Gut reports, "All five disk storage market leaders, including EMC (EMC), Hewlett-Packard (HPQ), Dell, NetApp (NTAP) and IBM (IBM) lost considerable revenue in Q1 2014 while the also-rans, taken as a group, gained nearly 7 percent year over year, according to new worldwide figures from researcher IDC..."

                                                        And, "... The big winner in IDC's figuring was clearly the 'Others' category, which includes storage upstarts such as Nexenta..."

                                                        Hot Vendors: Nexenta - Helping to Define the Software Defined Enterprise
                                                        IDC Vendor Profile White Paper
                                                        Nexenta is well-placed to take advantage of the growing market for Software Defined Storage (SDS), as noted in a new report from IDC. The report highlights that the emergence of SDS will help to address top CIO and IT concerns around convergence, big data, hybrid architectures, cloud, and agnostic platforms, while helping companies to avoid vendor lock-in, and achieve performance and scalability, all with attractive economics.

                                                        Fill out this form to download the white paper.

                                                        Level3 News
                                                        x
                                                        tw telecom Highlights Transition to On Demand Networking at the 'Big Telecom' Event
                                                        June 17-18 in Chicago
                                                        tw telecom inc. will headline two speaking engagements at this year's Big Telecom Event. "On-demand" networking solutions that place increased control in the hands of the end-user, creating one consistent customer experience, the adoption and enablement of the cloud and security are some of the topics to be covered in each. The Big Telecom Event takes place June 17-18 in Chicago.

                                                        tw telecom Senior Vice President of Business Development Mike Rouleau will deliver a morning keynote presentation Tuesday, June 17 on an "Industry in Transition." Mr. Rouleau will discuss advances made by network service providers to migrate from fixed networks to dynamic provisioning and how enterprise end users are taking advantage of this transition. He also will explain the concept of "networks on-demand" where increasing control lies with the end-user, giving them the network capabilities they need when they need it, for as long as they need, in a "pay for what you use" model.

                                                        Trending in
                                                        Vol 233, Issue 2
                                                        Trending IT Articles