News about Oracle's Solaris and Sun Hardware
System News
Jul 21st, 2014 — Jul 27th, 2014 Generate the Custom HTML Email for this Issue
System News System News for Sun Users
Volume 197, Issue 4 << Previous Issue | Next Issue >>
Sections in this issue:
click to jump to section

New Oracle Data Cloud and Data-as-a-Service Offerings Redefine Data-Driven Enterprise
Oracle's Innovative Data Services Fuels Competitive Advantage for Marketing and Social

In the digital economy, data fuels companies' ability to create new products and services. This proliferation of social channels, mobile devices, and sensor-enabled technologies, in conjunction with the unbundling of data from applications, creates new opportunities for innovative companies to gain competitive advantage through the use of data. Once limited to their internal data, enterprises can now gain valuable business insights by adding external data sources to enhance customer experience and operational efficiency. Today, Oracle announced it is combining its BlueKai Audience Data Marketplace and other Oracle data services to create Oracle Data Cloud, a platform that provides customers access to world-class data-as-a-service (DaaS) offerings, including Oracle Data as a Service for Marketing (Oracle DaaS for Marketing) and Oracle Data as a Service for Social (Oracle DaaS for Social).

Mark Hurd lays out Oracle's cloud progress and its plan to be No. 1
Hurd presented Oracle's cloud strategy and progress to analysts this week
Chris Kanaracus writes in Computerworld, "Being second isn't good enough for Oracle when it comes to cloud revenue, co-president Mark Hurd told investment analysts this week following the company's fourth-quarter and year-end earnings report.

As part of its earnings announcement, Oracle trumpeted that at an annual cloud subscription revenue run rate of nearly $2 billion, it is now the industry's second-largest cloud vendor behind

But meeting with analysts to lay out the company's cloud software strategy, progress in the market and expectations for its fiscal 2015, Hurd made it clear that Oracle isn't quite satisfied, telling them, 'Make no mistake, we're laser-focused on being No. 1 in the cloud.'"

Oracle Expands Footprint in Seattle with New Cloud Engineering Center
Craig Kelly and Don Johnson, will lead
Oracle unveiled its new cloud engineering center in downtown Seattle, Washington, where developers will focus on building new cloud computing services as part of Oracle's comprehensive cloud offerings.

Oracle expanded its presence in Seattle to take advantage of the deep expertise in cloud computing available in Seattle's rapidly growing technical community. The company plans to hire more than 100 top-tier engineers in this new location.

The state-of-the-art facility was designed to support a startup-focused, entrepreneurial culture and offers an exciting working environment with numerous amenities.

Local cloud engineering veterans, including Oracle's Craig Kelly and Don Johnson, will lead the Oracle cloud engineering center.

A HackerX open house and recruitment event will take place at Oracle's new Seattle facility on Tuesday, July 29, from 6 p.m. to 9 p.m.

Migrating Oracle Databases
23-Page Oracle White Paper
"This technical introduction document addresses managers and executives of IT organizations considering a database migration. Business requirements, benefits, and risks will be discussed. An overview of the most-common methodologies and tools will give an understanding of a variety of options for the migration of Oracle databases. This document outlines in detail Oracle Migration Service, its features, benefits, and delivery architecture. An example customer scenario will further describe the capabilities of this service..."
Database In-Memory is Generally Available
100x Faster Queries

Oracle Database 12c's newest patch release is generally available today. In addition to a number of new enhancements for efficiency, performance, availability, and simpler application development, the most exciting aspect of this new release is the general availability of Oracle Database In-Memory.

If you missed Larry Ellison's introduction to Oracle Database In-Memory, you can watch a short summary of his keynote here. Oracle Database In-Memory delivers breakthrough analytical performance without any compromises to your OLTP environment and without requiring any application changes. And when I say breakthrough performance, we're talking about queries that once took hours now happening in less than a second!

IT - Storage
Have You Heard about 40Gb FC?
Storage Newsletter, July 22nd, 2014
"FC continues to be the gold standard for storage networking, regardless of the uderlying transport medium. Now, more tan ever before, storage administrators have the most fl exibility to deploy reliable, deterministic storage networks with unprecedented choice and agility. With up to 10,000MB/s bidirectional bandwidth to play with, storage networks can use 40G FCoE to take all of their FC applications beyond what was conceivable only a few years ago.

It may sound strange to think of the Fibre Channel Industry Association (FCIA) discussing Ethernet technologies. After all, when people think of FC something more than just the protocol comes to mind - the entire ecosystem, management, and design philosophies are part and parcel of what storage administrators think of when we discuss FC networks..."

Using Flash For The Real-Time Archive
Network Computing, July 16th, 2014
"A new type of archive that requires instantly available data access presents a storage challenge, but TLC NAND provides a solution.

When it comes to archiving, IT professionals think of dusty old bits of data that are no longer accessed but still must be stored "just in case" they are needed again in the future. This type of archive can be safely stored on high-capacity disk or even tape, since response time is not an issue. However, there is a new form of archive emerging where response time to that "just in case" event is critical and can be fulfilled only by a flash array..."

IT - Technology
11 Offbeat Battery Chargers: Portable Power with a Twist
ComputerWorld, July 18th, 2014
"If you carry a smartphone or a tablet around with you (and if you're reading this, you probably do), you know that there's a good chance you're going to run out of power before it's time for bed. There are, of course, a whole slew of chargers to choose from that can get you through the day. (See our slideshow 12 portable battery chargers add life to your devices.) But some situations call for a more creative approach to charging your device on the go..."
    FBI: Driverless Cars could Become 'Lethal Weapons'
    CNET, July 16th, 2014
    "Driverless cars may one day be able to save lives by cutting down on accidents. But the technology also has the potential to be used to create deadly weapons.

    At least, those are some of the findings in an FBI report obtained by The Guardian via a public-records request. The report, created by the Strategic Issues Group within the FBI's Directorate of Intelligence, says the technology "will also open up greater possibilities for dual-use applications and ways for a car to be more of a potential lethal weapon than it is today."

    Further, the report says "bad actors will be able to conduct tasks that require use of both hands or taking one's eyes off the road which would be impossible today."

      The Weirdest, Wackiest and Coolest Sci/Tech Stories of 2014 (So Far!)
      TechWorld, July 23rd, 2014
      "There's never any shortage of cool, strange or weird news in the high-tech world. The trick is whittling the sheer volume of those stories into a manageable presentation. This year we have everything from crop circles and advanced toilet tech to flying saucers and wild software development. Take a look!..."
        MIT Invention to Speed Up Data Centers Should Cheer Developers
        PCWorld, July 18th, 2014
        "A breakthrough by researchers at the Massachusetts Institute of Technology could change the way Web and mobile apps are written and help companies like Facebook keep the cat videos coming.

        Their main innovation is a new way to decide when each packet can scurry across a data center to its destination. The software that the MIT team developed, called Fastpass, uses parallel computing to make those decisions almost as soon as the packets arrive at each switch. They think Fastpass may show up in production data centers in about two years..."

        The Uncanniest Valley: What Happens When Robots Know Us Better Than We Know Ourselves?
        Forbes, July 20th, 2014
        "The 'uncanny valley' is a term coined by Japanese roboticist Mashahiro Mori in 1970 to describe the strange fact that, as robots become more human-like, we relate to them better - but only to a point. The 'uncanny valley' is this point.

        The issue is that, as robots start to approach true human mimicry, when they look and move almost, but not exactly, like a real human, real humans react with a deep and violent sense of revulsion.

        This is evolution at work. Biologically, revulsion is a subset of disgust, one of our most fundamental emotions and the by-product of evolution's early need to prevent an organism from eating foods that could harm that organism..."

          IT - Bitcoin
          The Real Reason Banks Don't Like Bitcoin
          CoinDesk, July 22nd, 2014
          "Banks are reluctant to work with bitcoin, that fact has been well known in the community for some time. Until now, though, few concrete reasons have been given as to why.

          New statements from a senior banking practitioner in Australia working in anti-money laundering (AML) and counter-terrorism financing (CTF), compliance could go some way to providing an explanation..."

          New York's Financial Regulator, Benjamin Lawsky, Maintains Lead On Bitcoin Regulation
          Forbes, July 25th, 2014
          "Last week, New York's Department of Financial Services became the first state to propose comprehensive regulations governing virtual currencies. The move reaffirmed the position held by the agency's head, Benjamin Lawsky, as the leading government voice on a technology that has befuddled regulators and terrified law enforcement personnel.

          'First and foremost,' said Marco Santori, a lawyer at Nesenoff & Miltenberg who represents dozens of clients working with Bitcoin, the world's leading virtual currency, 'the DFS gave us an opportunity that other regulators aren't giving us' by allowing industry participants to comment on the proposed regulations..."

          NY Seeks Bitcoin Exchange Regulations
          Information Week, July 22nd, 2014
          "New York is moving to bring some order to the largely unregulated world of digital currencies by proposing state licensing requirements for dealers that would include strict anti-money-laundering safeguards and consumer protections.

          The state's Department of Financial Services proposed the regulations under existing law. Although the proposed regulations do not mention Bitcoin, the department refers to the proposal as 'BitLicense.' It is a response to the growing popularity of electronic money and its potential for misuse in burgeoning underground online economies..."

          Ecuador Bans Bitcoin In Favor Of Own National Cryptocurrency
          CryptoCoinsNews, July 27th, 2014
          "On the 23rd of July, the government of Ecuador effectively banned bitcoin, along with all other cryptocurrencies, reports the PanAm Post. The legislation forms part of a reform of the country's monetary and financial laws. The bill was approved by 91 members of parliament, with 22 votes against and 3 abstentions. President Rafael Correa, who introduced the reform bill, will sign it into law..."
          ZipZap Expands Bitcoin Buying Service to 34 European Countries
          CoinDesk, July 23rd, 2014
          "Transaction network ZipZap has announced that consumers across 34 European countries will soon have access to its cash-to-bitcoin services.

          The company says consumers will be able to use its platform to purchase digital currency, pay bills for their relatives in other countries, alongside a host of other services. ZipZap offers free sign up, free wallet and free deposit services.

          The expansion comes just months after the company announced plans to enter the Latin American market..."

          Bitcoin and Marx's Theory of History
          Bitcoin Magazine, July 25th, 2014
          "You probably don't think about Marxism when you think about Bitcoin. To most people, Marx is known as the guy who didn't like private property and capitalism in general. Bitcoin, a cryptocurrency with the ability to encourage markets by breaking down the worldwide barriers created by multiple national currencies, doesn't seem like it has much to do with him. You would probably think that Marx wouldn't like Bitcoin.

          But I don't think so. I believe if Marx were around today he would see Bitcoin as an excellent example of his Theory of History in action; a global system, with roots in the crisis' of capitalism, that will bring the world closer to his utopian ideals..."

          IT - FOSS
          This is the golden age of open source
          InfoWorld, July 23rd, 2014
          "Matt Asay is dead wrong to call the current era of the software industry 'post open source,' as he did in InfoWorld last week. We are currently in the open source age, enjoying all the practical flexibility that open sources licenses bring. What may be confusing him is that people are no longer obsessed with arguing about software freedom -- they take it as given.

          Asay claims "'open source' doesn't really matter anymore." His own words and affiliations prove he's mistaken..."

          Open Source vs. Open Enough
          Network Computing, July 18th, 2014
          "There's a big drive in networking towards open source with OpenDaylight and other initiatives. But enterprises aiming for open networking must make a decision: Either settle for "open enough" options from vendors that may not be truly open source but offer the interoperability and support they need, or commit to the ideals and development of true open source technology.

          While IT buyers may design strategies based on open source technologies, many typically end up opening their checkbooks to a vendor that provides a solution that's 'open enough.' What 'open' really means is open APIs (hopefully an open standard API, and not a vendor-specific open API) and some level of interoperability in order to create solutions. The openness should allow an organization to integrate a technology into an environment and then easily add new capabilities to that environment..."

          MySQL for Visual Studio 1.2.2 RC has been released
          Not suitable for production environments

          MySQL for Visual Studio is a product including all of the Visual Studio integration functionality. The 1.2.2 version is a release candidate version of this product which is feature complete but still can contain minor bugs and is not suitable for production environments. This version is appropriate for use with MySQL server versions 5.5-5.6.

          Cloud Computing
          Oracle Managed Cloud Services Earns Elite Status for Federal Deployments
          By Dori DiMassimo
          "Oracle Corp. has been approved to deliver a sophisticated new type of highly secure managed cloud services to federal customers that will help them rapidly and confidently comply with "Federal Cloud First" initiatives.

          Three federal agencies - the Department of Defense, Department of Homeland Security, and General Services Administration - plus an outside company, participated in the rigorous review of solutions from technology vendors. Having met those stringent requirements, Oracle's Managed Cloud Services was granted provisional authority to operate under the federal Risk and Authorization Management Program, or FedRAMP.

          This new status makes Oracle Managed Cloud Services the first private-cloud services provider to be given authority to offer federal customers a Platform as a Service (PaaS) offering using a hybrid-cloud environment encompassing both private cloud and community cloud..."

          Oracle Linux 7 Now Available
          New Release Continues the Tradition of Delivering an Operating Platform to Support Business-Critical Applications Across the Data Center and into the Cloud
          Oracle introduced Oracle Linux 7, an open source operating platform that gives customers and partners the capabilities, tools, and features they need to innovate, collaborate, and create solutions across traditional, cloud-based, and virtual environments.

          As with previous releases, Oracle Linux 7 is easy to download, free to distribute, and the only major enterprise Linux distribution that publishes all bug fixes and security errata publicly, providing more flexibility and choice than other commercial Linux distributions.

          With extensive testing for demanding workloads such as Oracle Database, a flexible free-to-use and paid support model, and strong uptake, Oracle Linux is the best general-purpose open source operating platform for the modern data center.

          IT - Cloud
          Attain Magical Five Nines Availability for Cloud Applications
          SearchCloudComputing, July 23rd, 2014
          "Every company seeks the magical five nines -- or 99.999% availability. If major providers can't promise it, how can you get it?

          If a tree falls in a forest and no one is around to hear it, does it make a sound? Let's apply that to IT. If part or all of your cloud data center fails and no applications experience outages, is it still a disaster?

          Arguably, someone needs to restore the cloud to proper operations, but disaster can be in the eye of the beholder. To cloud users, it is possible to construct applications in such a way that minor or even major outages are not disasters..."

            Data Security Considerations with the Cloud
            Business 2 Community, July 24th, 2014
            "Businesses of all sizes are increasingly looking towards to the cloud for their business management and ERP systems, in order to help create leaner, more efficient and effective organisations. With rapid growth in the use of Internet connected devices, expanding coverage of the latest in4G mobile broadband and the fast emerging Internet of Things, the cloud is becoming the basis of a new era in IT.

            Besides opening up a world of Big Data and Always-On connectivity, the explosive increase in the number of devices with an IP address creates increasing opportunities for those seeking to exploit security weaknesses in any type of connected devices, networks or servers..."

            IT - CxO
            3 Reasons We don't Need Federal CIOs
            Information Week, July 22nd, 2014
            "There's no shortage of advice on how to improve the lot of CIOs in the federal government. We centralize, reorganize, and agonize over memos, orders, legislation, and other well-meaning corrective actions. But with all these efforts -- and the marginal success that follows -- perhaps we should consider whether or not the federal government even needs CIOs. Here are three points to consider:..."
              9 C-Level Titles Unique to Healthcare
              IT World, July 22nd, 2014
              "An industry as large and complex as healthcare lends itself to job titles that you won't find in any other industry. That's why healthcare organizations increasingly find value in creating executive roles to oversee a bevy of challenges, from analyzing terabytes of electronic health records (EHR) to helping patients make healthier decisions to adapting to new business models.

              Here are nine executive titles that are unique to, or inspired by, the healthcare industry..."

              CIOs: 12 Reasons to Align More Closely with Marketing
              Insurance Networking News, July 23rd, 2014
              "Although marketing and IT functions still remain far apart on how much weight each puts on the need for collaboration and interaction, the gap is closing fast, according to a report from Accenture.

              The firm surveyed more than 1,100 senior marketing and IT executives from key countries and industries, including insurance, across the global economy.

              This year 83 percent of IT executives say they need to align and interact with Marketing. While just 69 percent of their marketing counterparts feel the same way, this 14-point difference is significantly smaller than 2012&#146;s 21-point gap (when agreement was 77 percent and 56 percent, respectively).

              But, do they agree on the reasons for more alignment and interaction? Read on to find out..."

                How to Judge a Job Candidate's Personality (and Why You Should)
                CIO, July 21th, 2014
                "An emphasis on evaluating personality traits is helping firms find, attract and retain talent by using targeted interview questions that gauge more than technical aptitude.

                As an increasing number of companies are focusing on personality traits and potential cultural fit when hiring. These new interviewing tactics are designed to help recruiters and hiring managers uncover who candidates are -- rather than just what they can do..."

                  vBeers South Florida - August Schedule
                  3 Separate Monthly Events - @ Boca; @ Miami; @ Broward
                  Join us for one of the three South Florida vBeers events. The South Florida vBeers events happen three times a month, once per county:

                  Wednesday August 13th

                  Wednesday August 20th

                  -Wednesday August 27th -

                  Details @

                  IT - DR
                  Our Cloud Disaster Recovery Story
                  Information Week, July 21th, 2014
                  "As a student and practitioner of enterprise cloud computing, I've written a lot over the past five years about what I've learned. So I'm very pleased that my organization has won a prestigious award for one of our cloud computing efforts, competing against organizations four times our size. Here's our story and a bit of analysis behind this 'five-year overnight success'..."
                  What to include in a post-DR-test after-action review
                  SearchCIO, July 24th, 2014
                  "What should go into your organization's after-action review following a disaster recovery test? #CIOChat participants suggest what to include in the report and why...

                  After completing a disaster recovery test, organizations must closely examine their DR processes from start to finish -- the good, the bad and even the ugly. And in order to do so, proper documentation must be recorded throughout, and after, the DR testing process..."

                  IT - Networks
                  The Internet of (Passive) Things
                  Information Week, July 24th, 2014
                  "IoT is not only about sensors, actuators, and connected thermostats. Manufacturers need to incorporate all bar-coded products into their plans.

                  As someone who suffers from celiac disease, I rely on all sorts of tricks to ensure I don't accidently become "glutenized" (as my six-year-old calls it). One of those tools is an app on my iPhone that reads a barcode and then consults a database to determine whether or not the product in question is safe -- meaning it does not contain gluten..."

                  Do We Need 25 GbE & 50 GbE?
                  Network Computing, July 18th, 2014
                  "For arcane reasons, the official releases of Ethernet have followed a pattern of 10x the data rate of the previous version: 10 MbE begat 100 MbE begat 1 GbE begat 10 GbE. So you'd expect the next generation ought to be 100 GbE in a single link, but the vendors aren't sticking to the rules anymore!

                  Now, we have companies like Microsoft and Google pushing for 25 GbE, and they've joined with Broadcom, Mellanox, Arista, and Brocade to create a special interest group called the 25 Gigabit Ethernet Consortium. The group's specification recommends a single-lane 25 GbE and dual-lane 50 GbE link protocol..."

                  What is 25 Gigabit Ethernet and Why Would You Want It?
                  Business 2 Community, July 24th, 2014
                  "In the past few weeks you may have seen several press releases and articles talking about 25 Gbit Ethernet. Just when you got used to ethernet speeds being a nice decimal based system where we simply add zeros every few years, someone threw in 40GbE a few years ago. And that's ok, powers of two we can deal with, but 25? That just does not fit in our mental model of Ethernet..."
                  IT - Operations
                  Step Away from the Button! 6 Touchy Tech Disasters
                  InfoWorld, July 23rd, 2014
                  "We can't keep our hands off tech and gizmos. We give in to the urge to see what happens if a button is pushed or naively believe it couldn't hurt anything. Then chaos breaks loose and IT spends hours repairing the damage.

                  The InfoWorld Off the Record blog is where IT pros share real-life tales from the job. In this collection, rookies and veterans alike are caught up when a flip of the switch brings the harmonious hum of work to a sudden halt..."

                  IT - Security
                  5 Big Security Mistakes Coders Make
                  InfoWorld, July 18th, 2014
                  "Hacks make headlines. But usually, the focus is on who did it -- notorious cyber criminals, hacktivists, or state-sponsored actors. Readers want to know who they are, where they're from, what they did, and why they did it. How they did it gets glossed over.

                  In fact, the "how" is the most important part -- and application vulnerabilities are common culprits. Subtle programming errors allow hackers to subvert security controls, steal user credentials, or run malicious instructions on a remote system. Programmers, like everyone else, screw up sometimes.

                  Screw up how, you ask? Here's a list of some of the most common (and egregious) security mistakes that coders make..."

                  7 Black Hat Sessions Sure to Cause a Stir
                  Dark Reading, July 22nd, 2014
                  "The parties, the meet-and-greets with industry friends, and electricity of like minds converging in Vegas summertime heat may provide the glitz and allure of the annual Black Hat security convention, but it is the research that fuels this conference's staying power.

                  The intellectual heart and soul of Black Hat, the briefing sessions always stir up fresh controversy and food for thought within the security research community and beyond. Whether it's been hacked ATMs spewing money from the podium, demonstrations of enterprise financial systems completely compromised, or any number of exposed vulnerabilities that have left vendors in a tizzy, Black Hat has always offered a venue for controversial research to take center stage..."

                  Internet of Things: Security For A World Of Ubiquitous Computing
                  Dark Reading, July 21th, 2014
                  "Endpoint security is hardly dead, and claiming that it is oversimplifies the challenges corporations face now and in the not-very-distant future.

                  I got an email from my car the other day, informing me about its need for service. As a security professional, I found it unsettling, not surprising, but unsettling. What's my car doing on the Internet, anyway? What are the possible implications of that?..."

                  The Worst Security Snafus this Year (So Far!)
                  Network World, July 25th, 2014
                  "Security SNAFUs? How bad is it so far this year? Well, let's start with Snapchat's 4.6 million user database SNAFU, followed by a parade of retail stores including Neiman Marcus and Sally Beauty Holdings, telling their customers how their payment card information had been hacked. The hacker group Syrian Electronic Army was also busy tormenting Microsoft, among many others. And there's plenty of other mischief, such as denial-of-service attacks and cyber-espionage to round out what's only the first half of the year..."
                  Why '123456' is a Great Password
                  Network World, July 17th, 2014
                  "Researchers say the simplest passwords are useful within a strategy that saves the hardest-to-remember credentials for the most critical sites and services

                  New research shows that "123456" is a good password after all.

                  In fact, such useless credentials from a security standpoint have an important role in an overall password management strategy, researchers at Microsoft and Carleton University, Ottawa, Canada, have found..."

                  IT - Careers
                  IT Leadership Salaries Remain Flat
                  CIO Insight, July 24th, 2014
                  "Average annual salaries for CIOs and other top IT leadership positions have remained flat overall since 2008, according to new research from Janco Associates and The accompanying report, the 'Mid-Year 2014 IT Salary Survey,' reveals that the number of IT jobs has increased within this period. And rank-and-file tech workers are seeing slight gains in compensation levels. However, top executives aren't getting much of any bump in salary, and a number of positions - particularly for those overseeing systems security, administration and consulting services - have declined in terms of earning power..."
                  3 Ways to Spot a Bad Boss Before You Take the Job
                  CIO, July 15, 2014
                  "Everyone suffers under a bad manager - morale sinks, productivity tanks, absences increase. Even those above a bad manager in the corporate hierarchy feel the impact; executives must dedicate time to resolving conflicts, and often end up assuming the role and responsibility for those who aren't adequately doing their job, says says Patty Azzarello, CEO of Azzarello Group, and a business advisor, author and executive.

                  But there are warning signs, red flags to look out for when searching for a job and while interviewing that can identify a bad boss or an untenable work environment before you accept a job..."

                  For 74 Percent, STEM Degrees Lead to Non-STEM Jobs
                  InfoWorld, July 24th, 2014
                  "Census data provides detail about computer-related employment, and raises questions about whether there is a U.S. shortage of STEM workers

                  The truth, when it comes to computer employment data, is almost always ugly.

                  For instance, among those with college degrees in computer-related occupations, men are paid more than women ($90,354 vs. $78,859 on average), and African American workers are more likely to be unemployed than a white or Asian worker..."

                    Gender Judo: Salary Negotiation Tactics for Women
                    Information Week, July 24th, 2014
                    "Are good girls ambitious? Flip gender expectations on their head with these salary negotiation moves.

                    It's not your imagination. Women face greater risk of backlash when they ask for more during salary negotiations. The same negotiation tactics may be labeled "aggressive" for men, but "pushy" for women. What can women do to turn traditional gender norms to their advantage during salary and job negotiations? I just learned a powerful new phrase that I hope will help you: Gender Judo..."

                      Never Stop Learning, CIOs Advise new IT Grads
                      Network World, July 24th, 2014
                      "While the job market is healthy for IT pros, certain talents are more valuable than others, and it's wise to keep adding to your skills arsenal.

                      That's the advice of IT veterans to newcomers in the field.

                      Among 2,400 U.S. CIOs surveyed by Robert Half Technology, 50% said their best career advice for new grads entering the tech industry is to keep learning new skills and stay current in their field. Another 17% of respondents said they'd tell first-time job seekers to take any opportunity that will help them get a foot in the door with an employer..."

                        IT - Social Media
                        Stealthy Web Tracking tools Pose Increasing Privacy Risks To Users
                        InfoWorld, July 22nd, 2014
                        "The use of such tracking tools may be unknown to most users, according to a research paper

                        Three stealthy tracking mechanisms designed to avoid weaknesses in browser cookies pose potential privacy risks to Internet users, a new research paper has concluded.

                        The methods -- known as canvas fingerprinting, evercookies and cookie syncing -- are in use across a range of popular websites. The findings, first reported by Pro Publica, show how such tracking is important for targeted advertising but that the privacy risks may be unknown to all but the most sophisticated web users..."

                          What You Need to Know about Using Bluetooth Beacons
                          InfoWorld, July 22nd, 2014
                          "2015 will be the year of the beacon, as companies of all sorts begin deploying these Bluetooth nodes that (at a minimum) tell a smartphone precisely where it is so that an app can act on the specific location. Apple's iBeacons protocol, quietly released last year as part of iOS 7, has created a cottage industry of beacon makers and test deployments in retail stores, stadiums, and more as companies explore how they might increase customer engagement, sales, and service through these devices..."
                            IT - Backup
                            Why Backup is Failing and How to Save It
                            Storage Switzerland, July 18th, 2014
                            "The traditional backup process doesn't work well any more. It's being overwhelmed by a new kind of file-based data that's created, seldom modified, and saved - sometimes forever. Driven by industry trends such as big data analytics, image-based digital content and a 'save everything' mindset, companies are finding they need something different to store and protect data.

                            Traditional backup was designed to provide protection for files and database applications that changed on a regular basis over a period of days or weeks. Regular backups were taken and multiple copies of multiple versions of this data were created and saved. These backups were used for immediate restore of critical assets, such as a database that needed to be rolled back to a previous point in time or an entire production system that was destroyed. Backups also provided file and folder-level recovery from user error or a system crash..."

                            IT - Big Data
                            The 10 Worst Big Data Practices
                            InfoWorld, July 21th, 2014
                            "It's a new world full of shiny toys, but some have sharp edges. Don't hurt yourself or others. Learn to play nice with them

                            Yes, you can haz big data. However, you can haz it the right way or the wrong way. Here are the top 10 worst practices to avoid..."

                            Behind The Rise of the Chief Data Officer
                            Insurance Networking News, July 24th, 2014
                            "Capital One, the Federal Reserve, Google, New York City and the U.S. Army all have at least one thing in common: they each employ a chief data officer to oversee their big data programs.

                            The emergence of the Chief Data Officer closely mirrors a trend we saw in the 1980s when companies began to adopt personal computers, servers and digital technology en masse. At the time, some organizations realized that such a massive initiative required a combination of expertise and executive-level leadership. As a result, the chief information officer was born, and, by the 1990s, the CIO was ubiquitous on executive teams..."

                            Big Data Security Analytics 'Plumbing'
                            Network World, July 18th, 2014
                            "According to ESG research, 44% of enterprise organizations (i.e. those with more than 1,000 employees) consider their security data collection and analysis a 'big data' application, while another 44% believe that their security data collection and analysis will become a 'big data' application within the next 2 years (note: I am an ESG employee). Furthermore, 86% of enterprises collect 'substantially more' or 'somewhat more' security data than they did 2 years ago..."
                            Internet of Sports: How Seattle Sounders Track Performance
                            Information Week, July 21th, 2014
                            "The US soccer powerhouse uses wearable devices and data visualization to analyze the fitness levels of stars like Clint Dempsey. Watching the 2014 World Cup this summer, weren't you a little in awe of how these guys ran non-stop for 90 minutes or more?

                            Of course they train hard for it, but more and more these days that training is a data-driven process steeped in technology. The coach who knows his team's fitness data may just have an edge.

                            Major league soccer frontrunner the Seattle Sounders FC have, like other pro teams in the NBA, NFL, and NHL, turned to using wearable devices and data visualization software to monitor player fitness and reduce injury risk..."

                              Location Analytics + Maps: 10 Eureka Moments
                              Information Week, July 23rd, 2014
                              "Maps tell stories beyond location. When combined with data from a growing array of sources, and added to visualizations in a variety of formats, geographic information systems (GIS) can yield insights about who is doing what where, and what is happening when, why, and how.

                              A digital map can be like a thick deli sandwich: the bottom slice of bread represents the geographic coordinates of an area, and each layer added to it is another data set spread over those coordinates. Weather. Sales trends. Highway layouts and transportation networks. Building configurations. Office locations. Natural resources identified and targeted for exploration..."

                                Securing big data off to slow start
                                CSO Online, July 15th, 2014
                                "While so-called 'big data' initiatives are not new to a number of industries - such as large financial services firms, pharmaceuticals, and large cloud companies - it is new to most organizations. And the low cost and ease of access of the software and hardware needed to build these systems, coupled with an eagerness to unleash any hidden value held within all of those enterprise data, are two trends that have sent large, next-generation database adoption soaring..."
                                Perspective and Preparation: Data Modeling Concepts Still Vital in Business
                                SearchDataManagement, July 24th, 2014
                                "In this book excerpt, data modeling instructor Steve Hoberman discusses the importance of using modeling for business success and the variety of implementations for data models.

                                Is data modeling outdated? This excerpt from the book Data Modeling for MongoDB: Building Well-Designed and Supportable MongoDB Databases by Steve Hoberman argues that data modeling concepts are still vital to business success and introduces useful terminology and tips for simplifying a complex information landscape with MongoDB applications..."

                                  The Truth about Big Data: It's More than Technology
                                  InfoWorld, July 24th, 2014
                                  "Hey, it must be hard to be the only person on the planet who doesn't understand big data.

                                  Actually, that's far from true: You're in good company. While Gartner finds that 64 percent of enterprises are investing in big data, a similar chunk (60 percent) don't have a clue as to what to do with their data.

                                  The real problem isn't one of technology, but of process. The key to succeeding with big data, as in all serious IT investments, is iteration. It's not about Hadoop, NoSQL, Splunk, or any particular vendor or technology. It's about iteration..."

                                  IT - Mobile
                                  How Organizations Deal with BYOD And Mobile Security
                                  Help Net Security, July 24th, 2014
                                  "A new study found that nearly half of respondents agreed that users bringing downloaded apps or content with embedded security exploits into their organization, as well as malware infections, are top BYOD security concerns. In addition, 60 percent of respondents said that malware protection is a requirement for mobile security.

                                  The study was independently conducted by the Information Security Community on LinkedIn. This second edition study collected responses from more than 1,100 IT security practitioners to gain a deeper understanding into the practices, usage and security concerns around BYOD..."

                                  Top 5 Wearable Tech You Have't Heard of Yet
                                  Business 2 Community, July 23rd, 2014
                                  "When you were a kid did you ever imagine that life someday would be like an episode of The Jetsons? If so, you're in luck.

                                  Forecast calls for 19 billion connected things by 2016, and the wearable technology sector is set to skyrocket from $3-5 billion in revenue to $30-50 billion over the next 2 years. The economic impact estimates as high as $14 trillion over the next decade ( The products in beta and those already created are leading in the market. Fitbit fitness devices are available in 30,000 retail stores across 27 countries worldwide (Amazon published rankings). Google Glass expanded with Google Contact Lens. And the market for jackets that navigate, dresses that change color with mood, and bras that can track your heart rate are popping up everywhere.

                                  Would you wear it? Below you'll find five of the most interesting wearable techs currently on the market. What do you think?..."

                                  Why Smartphone Screens are Getting Bigger: Specs Reveal a Surprising Story
                                  PCWorld, July 21th, 2014
                                  "Behind the Spec Sheet seeks to draw new insights based on hardware data. Produced by FindtheBest, a company that aggregates specs and features in a centralized database, this weekly guest column will share data-driven discoveries and surprises, and attempt to expose common misconceptions.

                                  Glance at any major smartphone line, and you'll find a similar pattern: Screen sizes are getting bigger, year after year, model after model.

                                  Let's start with an audit of the world's most famous Android smartphone line - just look at those Samsung phones inch upward in the first chart below. Not to be outdone, HTC has kept pace with Samsung's escalating screen sizes, and Nokia has followed industry trends for its Lumia line as well..."

                                  Question for tablet makers: What else can this thing do?
                                  GIGAOM, July 21th, 2014
                                  "Four years ago, when Apple introduced the first iPad, a lot of commentators wondered what people would do with the newfangled gizmos. The iPad was a slick new media-consumption device but it wasn't very useful for creating, sharing or remixing content, or much of anything besides passively listening, watching or reading - activities that could also be done with the smartphone, laptop or PC most people already had.

                                  Sales quickly took off anyway, however, making the iPad one of the most eagerly adopted high-tech products ever and forcing competing hardware makers and OS providers to respond with tablets and tablet-optimized software of their own..."

                                    IT - BYOD
                                    BYOD Morphs from Lockdown to True Mobility
                                    ComputerWorld, July 21th, 2014
                                    "Many companies that have had BYOD policies for a while have matured their thinking. They've grown from looking at employees' personal devices as something to lock down to allowing them in a limited fashion to fully embracing them.

                                    They have moved from allowing only company-provided phones to supporting "COPE" devices (which are corporate-owned, personally enabled tools) to sanctioning true bring-your-own device setups, says Chris Marsh, an enterprise mobility analyst at Yankee Group.

                                    To reach that point, organizations need to get used to data residing beyond their firewalls, and to not always having ownership of that data, Marsh says. As part of this change in mindset, the focus of security efforts should not be on the device alone, but on data, he adds.

                                    Here's how four organizations that have had BYOD programs in place for at least two years have evolved to cope with challenges and change..."

                                    Got a BYOD Problem? Blame the Millennials You Just Hired.
                                    Re/code, July 20th, 2014
                                    "If your company's IT department is having any troubles wrestling with the 'bring your own device,' or BYOD, trend, here is a handy new hook on which to hang the blame: The young people you just hired.

                                    A new survey released last week from the company TrackVia, which helps companies build their own custom line-of-business Web and phone apps, finds that when it comes to employees and their attitudes about using third-party Web apps at the office, there's precisely the kind of generational split you might expect..."

                                    Missing in Action: BYOD Security
                                    CIO Insight, July 27th, 2014
                                    "We all know that enterprise resources are tight and addressing the daily blitzkrieg of security problems is a daunting exercise. However, various studies and reports indicate that the issue transcends funding and resources. Many gaps, glitches and breakdowns revolve around bad policies or, in some cases, an utter lack of policies.

                                    A new study by security vendor Webroot demonstrates this point. While 98 percent of employers have a security policy in place for mobile access to corporate data, 21 percent allow employee access with no security at all. What's more, the vast majority of employee devices lack genuine security. Only 19 percent reported installing a full security app and 64 percent of employees admitted using only the basic security features that came with their devices..."

                                    Are IT Groups Really Ready for BYOD Security Challenges?
                                    Network World, July 24th, 2014
                                    "A new survey of IT security professionals shows that many businesses are barely starting to exploit mobile technology, and some of them may be a mobile security nightmare waiting to happen.

                                    In a self-evaluation question, 40% of the 2014 sample (compared to 34% in 2013) ranked their readiness for BYOD at 60% or higher. Yet responses to other questions suggest that is wildly optimistic..."

                                    Top Ten Articles for last few Issues
                                    Vol 197 Issues 1, 2 and 3; Vol 196 Issue 1, 2, 3 and 4; Vol 195 Issue 4
                                    We track how frequently each article is viewed on the web site to determine which the readers consider the most important. For last week, the top 10 articles were:

                                    • Oracle prepares to unveil next-gen SPARC 7 processor
                                    • Oracle's Improved Systems Are Great for Business
                                    • Get Your ZFS On
                                    • Infor LN on Oracle SPARC T5: 10X faster, 10X lower cost
                                    • Oracle's x86 Systems, Oracle Linux, and Oracle Database: Engineered to Work Together
                                    • New Oracle Exadata Database Machine Optimized for Large-Scale In-Memory and Database Cloud Workloads
                                    • Mirantis And Oracle Collaborate, Because My Enemy's Enemy Is My Friend
                                    • Oracle CIO Mark Sunday Gives an IT Perspective on HR Technology
                                    • Oracle Big Data SQL: One Fast Query, All Your Data
                                    • Oracle Marketing Cloud Expands the Industry's Most Comprehensive Marketing Technology Ecosystem

                                    The longer version of this article has list of top ten articles for the last 8 weeks.

                                      IT - Encryption
                                      Net Neutrality a Key Battleground in Growing Fight Over Encryption, Activists Say
                                      Network World, July 18th, 2014
                                      "Plans to favor some Internet packets over others threaten consumers' hard-won right to use encryption, a digital privacy advocate says.

                                      Activists and tech companies fended off efforts in the U.S. in the 1990s to ban Internet encryption or give the government ways around it, but an even bigger battle over cryptography is brewing now, according to Sascha Meinrath, director of X-Lab, a digital civil-rights think tank launched earlier this year. One of the most contested issues in that battle will be net neutrality, Meinrath said..."

                                      IT - Tape
                                      Tape vs Blu-ray: Which storage technology is best for your business?
                                      ITProPortal, July 15th, 2014
                                      "Using Blu-ray for corporate data storage is a relatively new idea and won't necessarily be a good storage method for all businesses. So why would Facebook choose this technology over more established ones?

                                      It has been reported that Facebook is testing an optical Blu-ray disk library in the first instance to store its compliance data. Blu-ray supports both re-writeable as well as WORM (write once, read many times) media. Data on WORM discs cannot be modified - only the disk itself can be destroyed - and WORM media types are therefore ideally suited to storing information that must be maintained in its original state, such as compliance and regulatory data..."

                                      UK makes ODF its official documents format standard
                                      Turning its back on Microsoft Office's native formats, the UK government has adopted the Open Document Format for all its sharable documents
                                      Steven J. Vaughan-Nichols writes in ZDnet, "In 2006 and 2007, there was an enormous documents standards war between Microsoft, with its OpenXML documents format, and the open-source community with its Open Document Format (ODF).

                                      In the end, Microsoft, while eventually supporting ODF, won. ODF, while still supported by such popular open-source office suites as LibreOffice and OpenOffice, became something of an after-thought.

                                      Until, the UK government announced on Tuesday, that it will now require all official office suites to support ODF.

                                      The document format world has just been turned upside down..."

                                      Identity Management in the Cloud
                                      Leverage New Whitepaper to Learn About this Important Topic
                                      IT security and access management have never been greater challenges. These new challenges can't be solved with yesterday's user access models. To mitigate risk and control costs, comprehensive Identity Management solutions, designed for today's diverse computing environments and mobile workforce, are taking center stage.

                                      With so much at risk, it's no wonder that this new, hot topic is occupying a top position on every CIO's security agenda. Gail Coury, VP Risk Management, Oracle Managed Cloud Services has written a whitepaper entitled 'A High-Level Guide to Effective Identity Management in the Cloud.'

                                      This paper helps CIOs explore the options so that they can better formulate the right Identity Management strategy for their company today and in the future.

                                      Nexenta News
                                      NexentaStor 3.1.6 Released
                                      ISO Available for download
                                      Customers with 3.x can run the nmc command "setup appliance upgrade" to upgrade to 3.1.6

                                      New Features and Enhancements

                                      The following new features and enhancements are included in the NexentaStor release 3.1.6:

                                      • Improved handling of intermittently faulty devices
                                      • Support for Microsoft Server 2012 Cluster and Cluster Shared Volumes (CSV)
                                      • Reduced HA failover times
                                      • Changed the default settings for SCSI reservations
                                      • See the release notes for a list of issues fixed in this release

                                      To ensure reliability of NexentaStor deployments, the default SCSI reservation setting for HA Cluster has been changed. In NexentaStor 3.1.6 the default setting is SCSI-2.

                                      Level3 News
                                      tw telecom Expands Network Footprint Across Metropolitan Atlanta
                                      Part of a national multi-market effort by the company to expand metro fiber footprint
                                      tw telecom announced it is extending the company's network capabilities in its Atlanta market from the city's central business district north into Marietta and Kennesaw; west into Austell; as well as areas south.

                                      The company will leverage this market expansion to further deploy its industry-leading portfolio of data and Internet services to more enterprises, including its innovative Business Ethernet and Intelligent Network capabilities.

                                      "This network expansion is a powerful incentive for encouraging existing business growth and attracting future development to our community," said Kennesaw Mayor Mark Mathews. "It's great to see companies like tw telecom recognize the market need and invest in this kind of technological infrastructure improvement."

                                      tw telecom Expands Network Reach in Kansas City
                                      Expansion Benefits Fast Growing Areas of North Kansas City, Riverside Horizons, as well as Overland Park and Cities in the State of Kansas

                                      tw telecom announced it is expanding its existing network in Kansas City. The expansion will extend the company's reach into North Kansas City, Mo. and Overland Park, Kan., providing additional network diversity for customers wishing to cross the Missouri River into downtown Kansas City. The project also includes expansion into several business communities located on both sides of the state line including Mission, Fairway, Olathe and Leawood, Kan.

                                      Trending in
                                      Vol 235, Issue 2
                                      Trending IT Articles