News about Oracle's Solaris and Sun Hardware
System News
Aug 4th, 2014 — Aug 10th, 2014 Generate the Custom HTML Email for this Issue
System News System News for Sun Users
Volume 198, Issue 2 << Previous Issue | Next Issue >>
Sections in this issue:
click to jump to section


Exadata
x
Oracle Boosts Exadata Database Clusters With Custom Xeon E7s
by Timothy Prickett Morgan
TPM writes, "For some workloads, a big eight-socket server node with a hefty memory footprint is going to support a database workload better than four two-socket nodes in a database cluster, which is why Oracle offers two different flavors of its Exadata database machine. The Exadata clusters were updated with Intel's Xeon E5 v3 processors last November and now they are getting the option of having larger nodes based on Intel's Xeon E7 chips.

The new machine is called the Exadata X4-8, and by moving to the Xeon E7 v3 processors, the database nodes in the Exadata machine have a lot more cores and main memory that can be deployed to support a single database instance..."

IT - Storage
x
3 signs you are overspending on data storage
Information Week, July 29th, 2014
"If you worry increasingly about escalating data storage costs, you're not alone. As data grows exponentially, organizations are eager to find more cost-effective and efficient ways to store this avalanche of information. It's enough to keep storage managers awake at night. They must locate places to store mountains of data, ensure users can gain access to it, and make sure it's secure, even in the case of unusual events. Consider the sheer explosion of information happening today. IDC estimates that the volume of digital bits created, replicated, and consumed across the United States will hit 6.6 zettabytes -- the equivalent of 25 billion 4 TB drives -- by 2020. This represents a doubling of volume about every three years. As for cost, in InformationWeek's 2014 State of Enterprise Storage survey 25% of companies said they lacked the cash needed to even meet current demand for storage, much less future growth..."
Network-Attached Storage Devices more Vulnerable than Routers, Researcher Finds
ComputerWorld, August 6th, 2014
"A security review of network-attached storage (NAS) devices from multiple manufacturers revealed that they typically have more vulnerabilities than home routers, a class of devices known for poor security and vulnerable code.

Jacob Holcomb, a security analyst at Baltimore-based Independent Security Evaluators, is in the process of analyzing NAS devices from 10 manufacturers and has so far found vulnerabilities that could lead to a complete compromise in all of them..."

Server SANs: The Dark Side
Network Computing, August 1st, 2014
"The new technology promises compelling benefits, but mixing and matching storage hardware and software can backfire, as one IT pro found out when his VMware VSAN failed.

Like many new technologies, server SANs bring a mix of promise and risk. Replacing the arcane protocols of traditional SANs -- and the associated high priesthood of storage administrators -- with software-and-server contained SSDs and disks is pretty compelling, but also has a dark side. If you can mix and match storage hardware and software to create a Server SAN, you may discover they don't play together as well as you might like..."

SSD Controllers may Run Your Applications Someday
InfoWorld, August 7th, 2014
"It's time for enterprise applications and storage to work more closely together, even to the point where SSDs become a pool of computing power, according to Samsung Semiconductor.

The company wants industry standards for greater coordination between those elements, seeking to make data centers more efficient. The benefits could include CPUs communicating more with SSDs (solid-state drives) in the shorter term and later SSD controllers sharing application processing. The company gave no target dates for what would necessarily be a long-term effort, but it's calling on several industry groups to cooperate to make it a reality..."

Java Technology
x
JCP News (July)
By David Delabassee
David Delabassee writes, "July has been a busy month!

We now have the first Java EE 8 component JSR: JSR 365 (Contexts and Dependency Injection for Java 2.0). The CDI 2.0 JSR has passed the review ballot so the EG can now be formed and start the technical work. Check here to see what the CDI 2.0 plans are.

In addition, several JSR draft proposals have been published to gather feedback before they are submitted to the JCP: JMS 2.1, Servlet 4.0, JSF 2.3 and JSONB.

Those 5 JSRs (CDI 2.0, JMS 2.1, Servlet 4.0, JSF 2.3 and JSONB) are targeted for inclusion in Java EE 8. We are still in the early days but we can now start to see a path towards Java EE 8!..."

IT - Technology
x
New 3D Bioprinter to Reproduce Human Organs, Change the Face of Healthcare
TechRepublic, August 4th, 2014
"Researchers are only steps away from bioprinting tissues and organs to solve a myriad of injuries and illnesses. TechRepublic has the inside story of the new product accelerating the process...

If you want to understand how close the medical community is to a quantum leap forward in 3D bioprinting, then you need to look at the work that one intern is doing this summer at the University of Louisville..."

Can New Math Speed Up the Internet?
Network Computing, August 6th, 2014
"Scientists from Denmark, in collaboration with MIT and Caltech researchers, have developed a new way to transmit information over the Internet using mathematical equations instead of sending packets.

In 1977, Abraham Lempel and Jacob Ziv of the Israel Institute of Technology came up with the algorithms for LZ1 and LZ2 lossless data compression. At that time, the Internet was not even a dream. Packet switching was in diapers, and TCP/IP did not become standard until five years later. However, their research is the foundation of most data compression systems used today to transmit large quantities of data..."

    5 Breakthrough DARPA Technologies beyond GPS
    Information Week, August 7th, 2014
    "When it comes to military operations, GPS is not always a reliable technology for positioning, navigation, and timing (PNT). Yet PNT capabilities are essential to targeting missles; navigation for land, sea, and air forces; and precision in military operations overall. That's why the Defense Advanced Research Projects Agency (DARPA) has created several programs to develop other approaches that offer more dependable and accurate PNT capabilities when GPS isn't working properly..."
      10 Robots You'll Find in Unexpected Places
      TechRepublic, August 5th, 2014
      "Bees are dying at an unprecedented rate through the mysterious colony collapse disorder (CCD), usually attributed to pesticides, disease, and parasites. Harvard University came up with RoboBees to help solve the problem. The tiny, bee-size robots, which weigh less than a tenth of a gram, can lift off the ground and hover if they are tethered to a power supply. The researchers are working to get the robots to "talk" to one another as honeybees do and to transmit pollen. They think it could be functional within 10 to 15 years..."
        Hyper-Convergence or Just Hype
        ComputerWorld, August 4th, 2014
        "It sure is hard to keep up in this fast changing technology world. Hyper-convergence is the latest new buzz word in data center circles. Third platform, Internet of things, object based storage, erasure coded disk, software-defined data center - all these trends are ushering in a new age in IT, and organizations everywhere are struggling to keep up to become the most efficient at IT and beat their competition. But which are the right technologies to adopt in order to find success? Are all these things actual trends that help and will stick, or are these just buzz words and marketing spin from technology vendors?.."
          NASA Tests Crazytech Flying Saucer Thruster, Could Reach Mars in Days
          The Register, August 4th, 2014
          "This has sparked immediate skepticism of the technology.

          The system is designed to use microwave energy reflected along a specially designed chamber to produce thrust. The idea first appeared as the Emdrive by British inventor Roger Shawyer in 2001, who designed a motor that he showed could produce power in this way. But critics scoffed, saying it would violate the laws of momentum..."

            IT - Bitcoin
            x
            Visa Exec: Our Network Could Support Bitcoin Payments
            CoinDesk, August 4th, 2014
            "Global payments giant Visa earned the ire of the bitcoin community earlier this year when CEO Charlie Scharf stated that he didn't see bitcoin and its technology as posing a significant threat to its operations.

            Now, however, new comments from the CEO suggest that the company may be re-evaluating bitcoin.

            In a new interview with The Australian Financial Review (AFR), Scharf confirmed that while the company is not currently responding to developments in the bitcoin space, it could be well positioned to do so in the future, should circumstances require..."

            Top 10 Awesome facts about Bitcoin
            CryptoCoinsNews, August 3rd, 2014
            "Here are ten awesome Bitcoin facts, success or disasters that you may not be aware of, enjoy! ...

            You suddenly wish you could go back to university, but you only have bitcoins left because of your forward-thinking state of mind? Do not panic: you are now able to pay your tuition fees with Bitcoins for the famous New-Yorker university of The King's College!..."

            George Osborne Unveils UK Plans to Explore Bitcoin
            CoinDesk, August 6th, 2014
            "Chancellor George Osborne has announced a new initiative that will explore the potential role of cryptocurrencies in Britain's economy.

            Osborne has commissioned the Treasury to produce a programme of work on cryptocurrencies, examining their potential risks and benefits. The results, due to be published in the Autumn, could pave the way toward a new regulatory framework for cryptocurrencies in Britain..."

              Bitcoin Growing Rapidly in Emerging Markets
              CryptoCoinsNews, August 9th, 2014
              "Min-Si Wang is reporting on the growth of momentum in Bitcoin use within emergent markets. While the level of Bitcoin adoption has slowed somewhat within the developed world, it has gained significant momentum within developing countries. While the currency can be somewhat volatile in nature, particularly as an investment asset, it is seen as having considerable value as a means of payment and money transfer. This Bitcoin momentum trend is all the more pronounced in countries where traditional payment methods remain somewhat underdeveloped..."
              The Arrogance of Dollars
              Bitcoin Magazine, August 4th, 2014
              "One sentence perfectly summarizes the problems with modern finance, and you can find it in your pocket. Open up your wallet and take out a US bill of any denomination. On its front, you'll find these words:

              'THIS NOTE IS LEGAL TENDER FOR ALL DEBTS, PUBLIC AND PRIVATE'

              This simple sentence encapsulates Old-World finance, where central bankers make intimidating commandments, and governments try to manage commerce from a central point. Contrast this with bitcoin, which represents New-World finance. Several points:.."

              Wikipedia Raises $140,000 in First Week of Bitcoin Donations
              CoinDesk, August 7th, 2014
              "The Wikimedia Foundation, the non-profit that owns and curates noted online encyclopedia Wikipedia, has received more than $140,000 in bitcoin donations since it began accepting contributions in the digital currency last week.

              The news follows the announcement of the organization's partnership with California-based payments processor Coinbase to accept bitcoin on 30th July, a development that was widely seen as a validation of bitcoin's potential to impact non-profit fundraising..."

              Global Payments Signs Agreement with BitPay for Bitcoin Payments
              CryptoCoinsNews, August 8th, 2014
              "Global Payments Inc. one of the largest worldwide providers of payment solutions, announced that it has signed a referral agreement with BitPay, the world leader in business solutions for the Bitcoin digital currency. This agreement allows Global Payments to accept cryptocurrency into their product suite and offer Bitcoin payment acceptances to their merchants..."
              Solaris
              x
              Meet Solaris 11.2, where SDN means 'Software-Defined Net profit'
              By Gavin Clarke
              Gavin writes, "Ellison's Oracle bowled out Solaris 11.2 last week - and what does this member of the Unix family give us? Cloud computing, yes, but also a stab at a datacenter-in-a-(large)-box.

              It's not too far off the database-as-a-box idea Larry's been banging on about since 1998.

              Oracle's Solaris 11.2 announcement is larded with the usual boilerplate about enterprise scale, efficiency, security and compliance. What's new is a degree of software-defined networking (SDN) support..."

              MySQL
              x
              Collation options for new MySQL schemas and tables created in MySQL for Excel
              By Javier Trevino
              Javier writes, "In this blog post we are going to talk about one of the features included since MySQL for Excel 1.3.0, you can install the latest GA or maintenance version using the MySQL Installer or optionally you can download directly any GA or non-GA version from the MySQL Developer Zone.

              MySQL for Excel has always let you create new schemas and tables in a MySQL database, in versions lower than 1.3.0 these were created with the default character set and collation defined in the MySQL server. Starting with version 1.3.0 we introduced several features regarding collations..."

              MySQL for Visual Studio 1.2.3 GA has been released
              By Gab Martinez

              Gab Martinez writes, "MySQL for Visual Studio is a product that includes all of the Visual Studio integration functionality to create and manage MySQL databases when developing .NET applications. The 1.2.3 version is a General Availability release of this product which is feature complete and is suitable for production environments.

              This version is appropriate for using with MySQL server versions 5.5-5.6. The 5.7 server version is also compatible but is not fully supported, thus it should be used at your own discretion..."

              Linux
              x
              Friday Spotlight: Getting Started with Oracle VM, Oracle Linux, and OpenStack
              By Chris Kawalek
              Chris Kawalek writes, "You might have seen Ronen Kofman's announcement earlier in the week regarding the technology preview of OpenStack Icehouse with Oracle Linux and Oracle VM. There are some great things going on with OpenStack, and if you want to give it a try yourself, this white paper (updated for the Icehouse technology preview) can help you get started:..":

              Getting Started with Oracle VM, Oracle Linux and OpenStack

              IT - Cloud
              x
              'Provider Sprawl' Complicates Government Move to Cloud
              CIO, August 4th, 2014
              "In spite of a nearly four-year-old mandate to prioritize cloud computing technologies within the federal government, that transition has been slow to take shape, with officials continuing to express concerns about how to manage cloud deployments and uncertainty about navigating the maze of commercial providers.

              Gerald Chelak, director of the technical service division at the GSA's Office of Citizen Services and Innovative Technologies, says his agency is '100 percent committed to cloud' but admits that federal CIOs struggle to keep up with what he describes as 'cloud service provider sprawl'..."

              Cloud ROI: Why It's Still Hard to Measure
              Information Week, August 4th, 2014
              "Why does calculating cloud ROI remain so tough? Examine the tactics used by two cloud innovators, GE and Airbnb -- plus our exclusive survey...

              When it comes to judging the true cost of cloud computing, many companies try to break down the cost of running their own on-premises data center and compare that with the cost of using Amazon's or Microsoft's cloud. At Airbnb, Dave Augustine doesn't really have time for all that..."

              Cloud Security Priorities and Synergies with Enterprise Security
              Enterprise Strategy Group, August 4th, 2014
              "According to ESG research, 63% of mid-market (i.e., 250 to 999 employees) and enterprise (i.e., more than 1,000 employees) are currently using software-as-a service (SaaS), 33% use infrastructure-as-a-service (IaaS), and 27% employ platform-as-a-service (PaaS) today. Additionally, 72% of all firms are increasing their spending on cloud computing initiatives this year. (Source: ESG Research Report, 2014 IT Spending Intentions Survey, February 2014.)

              Wasn't IT risk supposed to put the brakes on cloud computing deployment? Security professionals are still quite concerned. In an ESG research survey, infosec pros identified numerous cloud security risk areas as follows..."

              Architectural Firm Puts Giant Data Files in the Cloud
              CIO, July 30th, 2014
              "A global architectural firm sees big advantages in putting building design data in a cloud-based storage service. The results: lower costs and easier collaboration...

              Perkins and Will, like many other global architectural firms, is struggling to manage ever-growing volumes of information. Data-intensive applications such as building information modeling (BIM) produce enormous files on a regular basis..."

                How the Cloud is Changing Everything for Government IT
                Government Technology, August 6th, 2014
                "If you want to understand the evolution of cloud computing adoption in state and local government, one place to start might be in the Alachua County Property Appraiser's Office in Gainesville, Fla.

                The appraiser's office occasionally struggled to maintain the onsite GIS it operates for itself and other local jurisdictions. 'We've had experiences where our software license management server has been up and down,' said Bob Bates, executive director of GIS, Technology and Support Services..."

                The Role Of The Cloud In The Modern SECURITY ARCHITECTURE
                Help Net Security, July 31st, 2014
                "In this interview, Stephen Pao, General Manager, Security Business at Barracuda Networks, offers advice to CISOs concerned about moving the secure storage of their documents into the cloud and discusses how the cloud shaping the modern security architecture.

                How is the cloud shaping the modern security architecture? Have we reached the point where it's unpractical not to use it?..."

                IT - CxO
                x
                Are You Immune From this Very Real Risk to Your Tenure as CSO?
                CSO Online, July 31st, 2014
                "As we work to adjust our bias for breach prevention, the real concern is how the response is handled. Some steps to help ensure you get it right...

                'These days a CSO probably won't get fired for being breached. But screw up the response - especially if it comes out that you haven't been routinely practicing - then you are in trouble' explained Ted Julian of Co3 Systems..."

                  The CIO and CMO Perspective on Big Data
                  CIO, August 5th, 2014
                  "CMOs now command more of the tech budget than any other executive outside of the CIO. With big data being one of the main drivers of technology spending, a strong relationship between IT and marketing is critical to business success...

                  The lines between IT and marketing are blurring in the age of digital marketing. For that reason, it's more important than ever that CIOs and CMO communicate consistently and effectively. To examine this evolving relationship as it pertains to big data in particular, CIO.com partnered with CMO.com (owned by Adobe) to produce this report..."

                  CIOs Cede Digital Transformation Ground to CMOs
                  Information Week, August 6th, 2014
                  "With a majority of businesses undergoing a digital transformation this year, CIOs need to take a more active role to emerge successful, according to a new report from technology advisory firm Altimeter Group.

                  Altimeter's "2014 State of Digital Transformation" report defined digital transformation as 'the realignment of, or new investment in, technology and business models to more effectively engage digital customers at every touch point in the customer experience lifecycle'..."

                    CISOs Still Struggle for Respect from Peers
                    CSO Online, July 31st, 2014
                    "Chief information security officers (CISOs) continue to have a hard time gaining the respect of other C-suite executives despite the heightened focus overall on information security.

                    In a survey of 203 U.S.-based CEOs, CIOs, CFOs and other top executives, 74% of the respondents said CISOs did not deserve a seat at the leadership table. More than six in 10 did not believe their CISO would succeed in a non-security related leadership position in their organization.

                    About 44% of the executives surveyed said that CISOs should be held accountable for organizational data breaches. At the same time, more than 50% said they did not believe information security executives should be responsible for cybersecurity purchases..."

                    The One Critical Skill That Most Managers Never Seem to Learn
                    TLNT, August 6th, 2014
                    "Let it go.

                    Since the beginning of time, those three words have never been repeated more frequently by more people or in more places than they have since the release of Frozen. Whatever else Elsa was singing about, however, she may as well have been delivering her primary message - let it go - to the modern manager.

                    Why is it that managers struggle to let things go?..."

                      vBeers-SF
                      x
                      vBeers @ Broward - Funky Buddha - Wed Aug 13th
                      6pm - 9pm
                      Join us for vBeers @ Broward. We meet on the 2nd Wednesday of each month in Broward. The meetings will be at Funky Buddha which is 5 minutes east of I95.

                      This event will be a non-sponsored event so bring your wallet, your sense of humor and get ready for some great IT and virtualization conversations with some of the best people in South Florida's IT community (including YOU!).

                      • Funky Buddha Brewery
                      • 1201 NE 38th St
                      • Oakland Park, FL 33334

                      Please Register.

                      Join us for one of the three South Florida vBeers events. The South Florida vBeers events happen three times a month, once per county:

                      Wednesday August 13th

                      Wednesday August 20th

                      Wednesday August 27th

                      Details @ vbeers.org

                      IT - DR
                      x
                      Cloud ROI Easy Win: Disaster Recovery
                      Information Week, August 4th, 2014
                      "As a nonprofit with $100 million in revenue, Goodwill Industries of Central Indiana -- like any business -- needs effective backup and disaster recovery. But with a small IT staff, it found it expensive to test its off-site systems. Each year, two key system administrators had to go off-site for weeks at a time as they patched and updated the recovery systems before a live test.

                      So Jeff Ton, CIO and senior VP of corporate connectivity, turned to a DR service from Bluelock, a local provider of cloud services compatible with VMware environments. Ton stored complete copies of Goodwill's primary systems as virtual machines and established a frequently updated copy of its production data..."

                      The Top Ten Business Continuity and Disaster Recovery Trends
                      Continuity Central, August 6th, 2014
                      "Dr. Steven Goldman identifies ten business continuity and disaster recovery trends that are emerging, highlighting actions that business continuity managers can take in response to each item..."

                      • There has been an overall worldwide increase in the number of natural disasters
                      • The rise in malicious cyber attacks will continue
                      • Some disruptions are becoming more predictable
                      • Disruptions should be considered the norm
                      • Cloud-to-cloud continuity will get serious with Software-as-a-Service (SaaS)
                      • The role of the business continuity and disaster recovery professional is changing for the better
                      • Communications expectations are increasing
                      • Social media will continue to drive business continuity and disaster recovery response
                      • Twitiots will continue.
                      • Be prepared for the Matrix, the Robot Uprising, or Skynet!

                      Read on for details.

                      Whoops, My Cloud's Just Gone Bye Bye. Now What?
                      Channel Register, August 6th, 2014
                      'We apologise for the disruption. We have identified the cause and are working to restore the service as quickly as possible.'

                      Attempting to log onto your cloud service and being faced with a message like that is guaranteed to strike fear into the heart of anybody that has trusted all or just part of their company's CRM, email or A.N. Other piece of the critical IT infrastructure to some hosted or software-as-a-service provider..."

                      IT - PM
                      x
                      How to Be A Winning Project Manager: Manage Up and Out
                      IT World Canada, August 5th, 2014
                      "The answers to these questions will help determine if you are a manager or an administrator

                      Are you working flat out to deliver your project while almost no one is noticing or seems to care?

                      Winning project managers avoid this situation by managing up and out. This shift in focus is feasible because they rely on the experience of their project team to ensure project deliverables are completed and are fit-for-purpose. We talked about how loser project managers behave in the last blog..."

                        Events
                        x
                        Learn, Connect and Explore at Oracle OpenWorld 2014
                        By Phil Catalano
                        There is a lot to absorb and we want to make sure that you know where, when and how to take advantage of all Oracle OpenWorld has to offer. Learn about the must-see conference sessions and networking events hosted by Oracle Services. Pre-register for these events!
                        IT - Networks
                        x
                        Sneaky Broadband Data Caps Imperil the Internet's Future
                        InfoWorld, August 1st, 2014
                        "A GAO report warns that ISPs' move to usage-based pricing could have a chilling effect on online innovation...

                        Is anyone surprised by the new government report that found most people don't want data caps on their home Internet service? What you might not have been aware of, however, is that ISPs admit usage-based pricing has little to do with managing network congestion -- so stop blaming capless users binging on "Breaking Bad" for your slow Internet speeds. Data caps, it seems, are a part of ISPs' plans to increase the cost of Internet access. Now there's a shocker..."

                          Half of Surveyed US Businesses Shun SDNs
                          Network World, July 31st, 2014
                          "Almost half of US businesses have no plans to adopt SDNs, according to a recent survey undertaken by Juniper Networks. The survey of 400 IT 'decision makers' in government, education, financial services and healthcare, conducted this month by Wakefield Research, found that 47.5% have no plans to implement the technology..."
                          IT - Operations
                          x
                          6 Sad-but-True Tales of Mind-Numbing Manual IT Tasks
                          IT World, August 5th, 2014
                          "One of the most famous tech workers in American fiction is Homer Simpson, though we don't necessarily think of him as such. Homer is the Safety Inspector at the Springfield Nuclear Power Plant, and his job involves sitting in front of an impressive-looking control panel. And yet we get hints that Homer's job could be automated. In one episode, he is replaced by a chicken who pecks at the buttons; in another, a brick dangling from one of the levers fills in for him. In "King Sized Homer," having already secured permission to work from home, Homer gets a drinking bird to replace him by hitting the "Y" button on his keyboard at regular intervals..."
                            4 IT Outsourcing Trends To Watch
                            Information Week, August 4th, 2014
                            "There's no perfect formula for which IT resources to keep and which to ship off to a third party.

                            One company may see a help desk service as good for company culture and collaboration and keep it in-house. Another may see it as a commodity service that's ideal for an Indian outsourcer. Figuring out the outsourcing/insourcing ratio that delivers the best results is a high-stakes problem for many a CIO.

                            With that in mind, here are four growing trends in cloud, offshoring, and domestic outsourcing for 2014 and beyond as defined by outsourcing consultants who spoke to InformationWeek..."

                            IT Outsourcing Customers Mad as Hell, Ready to Walk
                            CIO, August 5th, 2014
                            "IT outsourcing customers are demanding more from their providers and consider showing the door to those who can't move up the value chain of IT services, according to recent survey...

                            IT outsourcing customers may not be mad as hell yet, but they're losing patience with service providers who aren't working with them to provide value beyond the basic terms of their contracts.

                            Close to a quarter of outsourcing clients will actively seek to eject their current provider if they have not effectively helped them standardize, automate, or transform their processes within the next two year..."

                            IT - Security
                            x
                            Don't Panic: That Russian Hack Bombshell Isn't what You Think
                            InfoWorld, August 7th, 2014
                            "FUD over the current state of cyber insecurity reached a fever pitch this week as thousands gathered in Las Vegas for Defcon and Black Hat. While the hacking conferences served up their usual paranoia-inducing mix -- demos of Dropcam hacks and warnings that mobile apps are spying on us -- first prize for panic mongering this week goes to the New York Times story on Russian hackers who allegedly amassed 1.2 billion stolen Web credentials and half a billion email addresses..."
                              A Ransomware Flop, Thanks to Security Awareness
                              ComputerWorld, July 31st, 2014
                              "Only one person clicks on a bad link, and she had all her files properly backed up. Maybe employees aren't a security manager's nightmare after all...

                              People like to ask the security manager, 'What keeps you up at night?' My usual answer: 'Employees.' And there's good reason. About 95% of the security incidents my department responds to are a result of an employee doing the wrong thing, whether it's clicking on an evil link within an email, installing a malicious program or sending a sensitive document outside the company..."

                              Cloud Security Priorities and Synergies with Enterprise Security
                              Network World, August 4th, 2014
                              "CISOs must prioritize identity, data security, and security monitoring, and strive for a 'single-pane-of-glass' across enterprise IT, SaaS, PaaS, and IaaS...

                              According to ESG research, 63% of mid-market (i.e. 250 to 999 employees) and enterprise (i.e. more than 1,000 employees) are currently using Software-as-a Service (SaaS), 33% use Infrastructure-as-a-Service (IaaS), and 27% employ Platform-as-a-Service (PaaS) today (note: I am an ESG employee). Additionally, 72% of all firms are increasing their spending on cloud computing initiatives this year..."

                              Failure is an Option
                              Help Net Security, July 31st, 2014
                              "Information is the lifeblood of today's business world. With timely and accurate information business decisions can be made quickly and confidently. Thanks to modern technology, today's business environment is no longer constrained by physical premises or office walls. We can work on laptops, smartphones or tablets and, with nearly ubiquitous internet connectivity, we can work from any location..."
                                Five Smart Cybersecurity Moves from Top Security CEOs
                                Forbes, August 4th, 2014
                                "There is much that is written about cybersecurity threats to companies. Prominent examples of security breaches like the one that Target announced on December 19, 2013 have led myriad companies to re-evaluate their security posture, and investments in new security processes and technologies have increased in many companies as a result.

                                The complexity of security threats to individuals has also increased, but no individual cybersecurity issue will receive the headlines that a corporate breach would, so one can be lulled into a false sense of security..."

                                Next-Gen Cybersecurity means Anticipating Threats
                                GCN, August 1st, 2014
                                "The recent announcement of a forward-looking cyberthreat tool from the Georgia Tech Research Institute (GTRI) is an example of a developing trend in security of using broad-based data that bad guys themselves put out to try and get ahead of threats. It's also a tacit admission that security solely based on reacting to threats is not, and will not, work.

                                The GTRI tool, called BlackForest, collects information from the public Internet such as hacker forums and other places those said bad guys gather to swap information and details about the malware they write and sell. It then relates that information to past activities, and uses all of that collated intelligence to warn organizations of potential threats against them - and once attacks have happened, how to make their security better..."

                                Researchers Name the Most Hackable Cars at Black Hat
                                ComputerWorld, August 5th, 2014
                                "A report to be presented this week at the Black Hat USA conference in Las Vegas will detail which vehicles are most vulnerable to hacker attacks via a car's Bluetooth, telematics or on-board phone applications.

                                Researchers Charlie Miller and Chris Valasek, who in the past have issued reports on the most vulnerable vehicles, intend to release an update showing the most and least hackable cars..."

                                  IT - Careers
                                  x
                                  5 Ways to Adjust Your Attitude and Improve Performance
                                  Information Management, August 6th, 2014
                                  "While Woody Allen offered, '80 percent of success is just showing up,' I might politely suggest the phrase is missing a key ingredient: attitude.

                                  There's a profound difference between showing up and showing up with the right attitude.

                                  Our attitude is visible on our faces, discernible in our words and palpable in our body language. If you're having a bad attitude day, month or lifetime, you can be certain that everybody you come in contact with knows it and feels it. When you walk into a room with a lousy attitude, it's like a storm front approaching. Everyone sees it and wonders how bad it's going to get..."

                                    2 Steps Closer to Mars
                                    Information Week, August 1st, 2014
                                    "Long-time readers of this Geekend column know I'm psyched about the idea of putting a person on Mars. I think it should be one of humanity's top goals, not only because of the stunning achievement, but also because the attempt would yield technology we could use to improve life here on Earth. (Here's a list of what NASA has already done for us.) We took two steps closer to that goal this week with the end of a live experiment on what we'd need to put people on Mars for 120 days, and with a new invention that promises to provide astronauts with precious oxygen..."
                                      10 Ways Your IT Vendors can Help You
                                      TechRepublic, August 6th, 2014
                                      "IT solicits services and products from vendors -- but there are other ways your vendors can help you, giving you added benefits from the relationship. What are these areas, and how do they help you with IT strategies, operations, and costs? Here are a few ideas to consider..."
                                        When Astronauts Breathe On Mars, They'll Thank this MIT Professor
                                        ComputerWorld, August 7th, 2014
                                        "Someday, when astronauts are living and working on Mars, they'll be able to thank MIT's Michael Hecht for their ability to breathe on the Red Planet. They'll also have to give a nod to him for the oxygen needed to launch the rocket to bring them back to Earth..."

                                        "There's zero way a human could breathe on Mars," Hecht, a researcher at MIT, told Computerworld. "But the oxygen also is for the return rocket. That's the hungry beast we have to feed.... To bring that much oxygen along, it's certainly not impossible but it makes the mission substantially more expensive and complicated. What's the point where the mission gets so expensive that it just won't happen?..."

                                        Should You Always Obey Orders from Your Executives?
                                        Information Management, August 7th, 2014
                                        "I have sometimes been a bit rebellious and disobeyed instructions and directions from my supervisors. This column is intended to inspire those of you who are like-minded with me and prefer to do what you believe is correct rather than what is demanded of you. Behaving this way is obviously risky and can be career-limiting. After more than 40 years working in large hierarchical companies I 'quasi-retired' in late 2012, so I am no longer being managed and can write what I wish about being defiant..."
                                          IT - Database
                                          x
                                          The Right Cloud for the Job: Multicloud Database Processing is Here
                                          InfoWorld, August 5th, 2014
                                          "The idea is pretty simple and actually pretty old: Use a distributed architecture on large databases to quickly return the data requested. This approach runs the database query across many servers at the same time, then combines the results as they return from hundreds, perhaps thousands of servers in the cluster.

                                          This idea has gotten new attention because it is the core idea behind MapReduce, the parallel processing model used by Hadoop in big data analytics. These types of distributed workloads have been used for years, typically with a homogeneous server cluster, meaning it works across lots of the same servers. That homogeneity restricts you to one server cluster or one cloud -- thus, one resource type and cost. But not any more..."

                                          IT - Backup
                                          x
                                          Enterprise Backup or VM Specific Backup Software?
                                          Storage Switzerland, August 5th, 2014
                                          "Most vendors seem to think that selecting which backup solution to use in the data center should be a choice of either an enterprise backup or virtual machine-specific backup solution. Enterprise backup provides legacy, multi-platform protection, but often only spotty protection of the virtual environment and at a premium price. VM-specific solutions provide complete protection of the virtual environment and delivers new capabilities, but often lack key legacy features like support for physical ('bare metal') systems and tape..."
                                          IT - Mobile
                                          x
                                          7 Cool Uses of Beacons You May Not Expect
                                          InfoWorld, August 7th, 2014
                                          "Beacons are a useful new twist on location awareness, tying a unique ID to a small device that apps can use to discover not just location but other relevant context about the beacon's location or what it is attached to.

                                          Most beacon trials involve spamlike use by retailers, such as shoppers getting pitches for specific brands of cereal while walking down the cereal aisle, but better uses of beacons are being piloted. These examples come from Onyx Beacons and StickNFind, two beacon vendors that work with a wide range of industries, reflecting actual pilot projects..."

                                            IT - Big Data
                                            x
                                            Confusion Surfaces About the Data Lake
                                            Information Management, August 5th, 2014
                                            "The growing hype around data lakes is causing lots of confusion in the information management space, according to Gartner Inc.

                                            Several vendors are marketing data lakes - storage repositories that hold huge amounts of raw data until it's needed - as essential components to realizing big data opportunities, the firm says, but there's little alignment among vendors about what comprises a data lake or how to get value from it..."

                                            Ditch Instinct: Why Data Drives Business
                                            ComputerWorld, August 4th, 2014
                                            "Is your business running on top executives' opinions or cold hard data? Be prepared for vast cultural changes if you choose to start making decisions based on analytics, not instinct...

                                            Business and technology leaders aiming to foster more of a data-driven company culture are up against a complicated case of nature vs. nurture.

                                            Digital natives and immigrants alike, it seems, just aren't wired to run on hard data. This is especially true for seasoned business veterans with lots of experience..."

                                            How Big Data Helps the Tiniest Patients
                                            Information Management, August 6th, 2014
                                            "When research scientists at Kaiser Permanente began a decade ago to track data on patients from their neonatal intensive care units, they had a rather simple objective: that all the children in their care would come to their annual reunions alive and healthy.

                                            Over the course time, the research scientists expanded their efforts, monitoring a wide array of health issues - including cases of infant sepsis - and came up with a new treatment weapon: big data. After years of pulling together mounds of data, the healthcare consortium today draws information from across its data stores to accurately predict the potential for early-onset of the potentially deadly infection in newborns..."

                                            Big Data Projects: To Build Or To Buy?
                                            SearchCIO, August 4th, 2014
                                            "Do CIOs build or buy the technology for big data projects? It's complicated, but the bottom line is, do whatever confers a competitive advantage to the company...

                                            For Stephen Laster, the chief digital officer at McGraw-Hill Education in New York City, using data to improve business outcomes is of paramount importance. Laster heads up a team of data scientists and engineers who are charged with building out the company's e-learning and educational technology strategy. They are, in other words, responsible for all McGraw-Hill Education digital learning products..."

                                            4 Principles of Simplified Data Management
                                            GCN, August 4th, 2014
                                            "There's an infinite amount of data that can be collected, but that doesn't mean it should be.

                                            The key is to gain a deep understanding of what's important for your agency at this particular time so you're only collecting what's necessary. Ask youself, 'What are our current priorities, and what type of data do we need to collect to support those priorities?' Other types of information may not be as critical to current needs and can be set aside. This division of data eliminates a lot of white noise and makes data processing more efficient..."

                                              A Big Data Analysis Paradox
                                              Information Management, August 6th, 2014
                                              "There is a nuance about big data analysis. It's really about small data. While this may seem confusing and counter to the whole big data 'movement,' small data is the product of big data analysis. This is not a new concept, nor is it unfamiliar to people who have been doing data analysis for any length of time. The overall working space is larger, but the answers lie somewhere in the small..."
                                              IT - BYOD
                                              x
                                              BYOD or CYOD - Can You Minimize Your Risk?
                                              Business 2 Community, August 7th, 2014
                                              "Bring Your Own Device (BYOD) as a corporate policy may save money by eliminating corporate purchasing of mobile devices, but there are risks associated with it.

                                              Allowing employee-owned mobile devices in the workplace affords employees a great deal more freedom with their devices, and by extension, with critical company data and applications. When using a personal device, employees push back on the employer Mobile Device Management (MDM) systems that control access to their devices because they don't want personal information shared with their employer or deleted..."

                                              Top10
                                              x
                                              Top Ten Articles for last few Issues
                                              Vol 198 Issue 1; Vol 197 Issues 1, 2, 3 and 4; Vol 196 Issue 2, 3 and 4
                                              We track how frequently each article is viewed on the web site to determine which the readers consider the most important. For last week, the top 10 articles were:

                                              • Oracle Buys TOA Technologies
                                              • Oracle Solaris 11.2 Now Generally Available
                                              • Learning Java Programming with BlueJ
                                              • Your Oracle Solaris 11 Learning Path: for Newbies and Experts
                                              • OpenStack 101 - How to get started on Oracle Solaris 11
                                              • Solaris 11.2 released with security and other enhancements
                                              • Oracle ZFS Storage ZS3-2 Sets World Record on SPC-2/E Benchmark
                                              • Oracle Solaris Cluster 4.2 is out!
                                              • Spotlight on GlassFish 4.1
                                              • Oracle Solaris 11 - Engineered for Cloud

                                              The longer version of this article has list of top ten articles for the last 8 weeks.

                                                IT - Encryption
                                                x
                                                NIST's Future without the NSA
                                                GCN, July 18th, 2014
                                                "Will the National Institute of Standards and Technology break its close relationship with the National Security Agency in developing cryptographic and cybersecurity standards? That seems very likely following a recent report by an outside panel of experts, and it will have implications for federal agencies. The report by the Visiting Committee on Advanced Technology (VCAT), which was released July 14, came after last year's revelation as a part of the Edward Snowden leaks that the NSA had inserted a 'backdoor' into a NIST encryption standard that's used to generate random numbers..."
                                                IT - Server
                                                x
                                                Why You Need to Deploy DNSSec Now
                                                InfoWorld, August 5th, 2014
                                                "The Domain Name System -- the distributed network of servers that reconciles the domain names in URLs and email addresses to numerical IP addresses -- is behind every successful Internet transaction. Unfortunately, due to a longstanding vulnerability, it's also behind some of the Internet's most dangerous hacks -- despite the fact that a fix, DNSSec (Domain Name System Security Extensions), has been available for years.

                                                In this week's New Tech Forum, Cricket Liu, chief infrastructure officer at Infoblox, explains how DNSSec thwarts DNS spoofing or cache poisoning attacks, why adoption of DNSSec has taken so long, and why we can't afford to wait any longer..."

                                                LibreOffice
                                                x
                                                LibreOffice 4.2.6
                                                Ready for enterprise deployments and conservative users
                                                The Document Foundation announced LibreOffice 4.2.6 'Still' the seventh and last minor release of the most solid version of the software, ready for enterprise deployments and conservative users.

                                                LibreOffice 4.2.6 arrives just one week after the successful launch of LibreOffice 4.3 'Fresh' the most feature rich version of the office suite.

                                                LibreOffice 4.2.6 is available.

                                                LibreOffice users, free software advocates and community members can support The Document Foundation with a donation. Money collected will be used to grow the project both at global and local level.

                                                Developer
                                                x
                                                Oracle Solaris Studio 12.4 Beta Update
                                                By Larry Wake
                                                Larry suggests, "If you haven't had a chance to try out the beta release of Oracle Solaris Studio 12.4 -- or if you're still working with the original download -- now's the time to get the updated bits.

                                                What this includes: support for C++11, an updated Performance Analyzer, support for OpenMP 4.0, and lots more. The July refresh now incorporates fixes and enhancements based on feedback from beta participants..."

                                                Sysadmin
                                                x
                                                Using Oracle Solaris Unified Archives to Replicate an Oracle Solaris Cluster 4.2 Cluster
                                                By Krishna K. Murthy

                                                Krishna writes that, "Oracle Solaris Automated Installation (AI) was first supported in Oracle Solaris Cluster 4.0 software to install and configure a new cluster from IPS repositories. With Oracle Solaris Unified Archive introduced in Oracle Solaris 11.2 software, the automated installation of Oracle Solaris Cluster 4.2 software with the Oracle ...This document shows how to replicate a new cluster from the Oracle Solaris Unified Archives..."

                                                Securing Data in the New Digital Economy Webcast
                                                By Troy Kitch

                                                Troy writes, "2014 has already witnessed some of the largest data breaches on record. As the black market for stolen data becomes increasingly organized, the supply chain for information is providing an efficient means to monetize a vast array of stolen information. A the same time, our legal economy is becoming more hyper-connected providing more digital services, and making companies are more vulnerable to attacks. In this session we will explore the security requirements for information in the new digital economy and with the vast amount of case information from breach investigations, distill a security strategy to reduce risk.

                                                Register to hear the recorded webcast.

                                                New Virtual Compute Appliance Videos
                                                By Roxana Babiciu

                                                Roxana Babiciu writes, "Watch the latest Virtual Compute Appliance videos to aid your conversations with partners and customers!":

                                                • Virtual Compute Appliance Flash demo shows your customers and partners the business benefits. VCA Product demo
                                                • Tier1 Customer Testimonial Video of using Oracle's Virtual Compute Appliance to build a private cloud virtualization platform to host its customers' Oracle Enterprise and Windows applications
                                                • Centroid Partner Testimonial Video

                                                Read on for details.

                                                The 10 Coolest Servers Of 2014 (So Far)
                                                By CRN
                                                Joseph F. Kovar writes in CRN, "Oracle in June unveiled the Oracle Virtual Compute Appliance, the latest in its series of converged infrastructure solutions, or engineered systems in Oracle-speak.

                                                The Oracle Virtual Compute Appliance, designed to help customers get Oracle and third-party applications or services up and running with minimal time spent on provisioning and configuration, streamlines application and service deployments via Oracle VM templates for over 100 Oracle software packages..."

                                                Oracle VM: Rethink Virtualization
                                                Video

                                                See how the Oracle VM application-driven virtualization architecture is designed to accelerate business value and enterprise proven to deliver the most cost effective virtualization solution for your modern data center.

                                                Video: 2:41

                                                HA-LDOM live migration in Oracle Solaris Cluster 4.2
                                                By krishna.k.murthy

                                                krishna writes, "Most Oracle Solaris Cluster resource types clearly separate their stopping and starting actions. However, the HA-LDom (HA Logical Domain / HA for Oracle VM for SPARC data service) agent has a capability of performing live migration, in which an entire switchover of the resource is performed while the cluster framework is stopping the resource. Suppose that the LDom resource starts out on node A and the administrator executes a switchover to node B. While the cluster framework is stopping the resource on node A, LDom live migration is actually migrating the LDom from node A to node B..."

                                                NetBeans
                                                x
                                                Writing and Deploying a Simple Web Application to GlassFish
                                                By Andrew Pielage
                                                Andrew writes, "This blog will detail how to create a simple Web Application (Web App) on a Windows 7 64 bit system and deploy it to a GlassFish 4.0 server. The web app will be kept simple, so as to keep the focus of the tutorial on the concepts; as such, the web app will provide a web page prompting the user to enter their name and date of birth, before loading another page that repeats their name back at them with their age. The blog will cover how to set up, code, and deploy the web app using the NetBeans IDE, as well as how to manually deploy it using the Windows command prompt. It should be noted that unless stated otherwise, any additional settings that can be changed but are not noted in the guide should be left as their default..."
                                                Security
                                                x
                                                Focus on Database Security at Oracle OpenWorld, 2014
                                                By Troy Kitch

                                                Troy writes, "Data security threats and regulatory compliance are the new "death" and "taxes" that we can all be certain of. Security is a hot topic across all organizations, whether you have 100 or 100,000 employees. Organizations are scrambling to mitigate threats and comply with regulatory requirements. Oracle OpenWorld is the place for customers to hear about the latest advances in data security, meet with security experts, and learn the next steps to help secure the sensitive data they hold.

                                                With Oracle OpenWorld, 2014 about 2 months away, we've compiled the database security sessions, hands on labs, and more, that are critical for database administrators, security experts and executives to attend. As an example of just some of the talks this year:..."

                                                Nexenta News
                                                x
                                                Leading European Energy Supplier Powers its Business with Nexenta Software-Defined Storage
                                                Stadtwerke Tuttlingen (SWT)
                                                Nexenta announced that Stadtwerke Tuttlingen (SWT), a regional German energy supplier, has chosen Nexenta's Software-Defined Storage solution to underpin its entire infrastructure.

                                                Founded in 1896, SWT is responsible for providing electricity, gas, and water utilities to over 34,200 residents across 980 square miles in the South West area of Germany. Along with its responsibility for the power grid, SWT also supplies natural gas to private and business customers while managing two-thirds of Tuttlingen's drinking water and urban drainage.

                                                SWT was running multiple high performance databases (Oracle, MSSQL) but the existing storage solution was hampered by relatively bad optimisation. The system was only four years old but also incapable of supporting a planned VDI deployment....

                                                Trending in
                                                Vol 233, Issue 2
                                                Trending IT Articles