News about Oracle's Solaris and Sun Hardware
System News
Aug 11th, 2014 — Aug 17th, 2014 Generate the Custom HTML Email for this Issue
System News System News for Sun Users
Volume 198, Issue 3 << Previous Issue | Next Issue >>
Sections in this issue:
click to jump to section

Oracle Cranks Up The Cores To 32 With SPARC M7 Chip
By Timothy Prickett Morgan
TPM wrote in EnterpriseTech, "Say what you will about Oracle co-founder and CEO Larry Ellison, but when the software giant bought Sun Microsystems more than four years ago, for $7.4 billion, he said that he had seen the light and wanted Oracle to control its own hardware and created specialized machinery tuned up to run Oracle's software stack. Despite falling sales in the early years, which have now stabilized and are now growing, Oracle has continued to invest in hardware.

This week at the Hot Chips conference, its chip designers are showing off the forthcoming SPARC M7, the biggest and baddest SPARC processor that either Sun Microsystems or Oracle has ever created. Stephen Phillips, senior director of SPARC architecture, gave the presentation at Hot Chips on the SPARC M7, and John Fowler, executive vice president of systems, spoke to EnterpriseTech about the feeds and speeds at a system level and what it will mean for customers when it ships sometime next year..."

Oracle is a Leader in the Gartner 2014 Magic Quadrant for Data Integration Tools
By Madhu Nair
Madhu writes, "Oracle maintains its position as a leader in the 2014 'Magic Quadrant for Data Integration Tools' report. This year's report expands into the key trends of Big Data and Cloud in addition to classic data integration capabilities and visions available in the market.

On the importance of Data Integration, Gartner states, 'Data integration is central to enterprises' information infrastructure. Enterprises pursuing the frictionless sharing of data are increasingly favoring technology tools that are flexible in regard to time-to-value demands, integration patterns, optimization for cost and delivery models, and synergies with information and application infrastructures..."

Oracle E-Business Suite 12.2.4 Helps Organizations Further Optimize Business Processes, Reduce Costs, and Respond to Changing Market Conditions
Release includes customer-driven enhancements across virtually all functional areas and new cloud integrations
Today's global business environment is complex and constantly changing. To help organizations navigate this continuously shifting landscape and stay competitive, Oracle has released Oracle E-Business Suite 12.2.4. This latest release provides an updated user experience, significant customer-driven enhancements across the applications suite, and more integrations to Oracle Cloud Solutions. With the powerful new capabilities, organizations can manage that complexity while focusing on more strategic business issues and processes. To help organizations manage the complexities of global business environments and gain a competitive edge, Oracle today announced the general availability of Oracle E-Business Suite 12.2.4.

With modern user experience updates, significant customer-driven enhancements, and more integrations to Oracle Cloud Solutions, Oracle E-Business Suite 12.2.4 enables organizations to further optimize business processes, reduce costs, and respond quickly to changing market conditions. Organizations already on Oracle E-Business Suite 12.2 can use online patching to easily gain the latest functionality...

The CIO's Guide to Oracle Products and Solutions
By Jessica Keyes
Jessica Keyes is the president of New Art Technologies, an instructor at Liverpool University, and the the author of 24 books and more than 200 articles. Her latest book is 'The CIO's Guide to Oracle Products and Solutions', from CRC Press. In this interview Jessica talks about her book and about why input from users and developers is essential to CIOs who want to avoid being escorted out of the building by security guards..."
SPARC M7 Chip - 32 cores
Mind Blowing performance
Angelo Rajadurai writes that, "Oracle just announced its Next Generation Processor at the HotChips HC26 conference.

As the Tech Lead in our Systems Division's Partner group, I had a front row seat to the extraordinary price performance advantage of Oracle current T5 and M6 based systems. Partner after partner tested these systems and were impressed with it performance. Just read some of the quotes to see what our partner has been saying about our hardware.

We just announced our next generation processor, the M7. This has 32 cores (up from 16-cores in T5 and 12-cores in M6). With 20 nm technology this is our most advanced processor. The processor has more cores than anything else in the industry today. After the Sun acquisition Oracle has released 5 processors in 4 years and this is the 6th...."

U.S. Army Achieves Huge Performance Boost and Cost Savings with Oracle SuperCluster
By Michael Palmeter
Michael Palmeter writes, "The U.S. Army AL&T Magazine has published an excellent article called "PBUSE PLUS, CECOM Web-based logistics server solution creates property book system efficiency". This article discusses the U.S. Army's deployment of Oracle SuperCluster and includes a number of key success metrics that we think are excellent examples of the results that Oracle SuperCluster customers regularly experience.

  • The decision to acquire the Oracle SuperCluster to replace the PBUSE server architecture was a response to severe server problems in accommodating an increasing PBUSE mission workload.
  • To date, the system supports 40,478 active Army, Reserve and National Guard users, averaging 34,750 transactions daily for on-hand assets valued at $212 billion. -User requests travel within the cloud operating system as much as 32 times faster than with the legacy PBUSE system it replaced.
  • The PBUSE SPARC SuperCluster takes up one third of the space of the previous six racks, uses a fraction of the power and vastly improves speed and efficiency.

To read more, visit the U.S. Army AL&T Magazine article directly.

IT - Technology
The Rise of Machines that Learn
InfoWorld, August 11th, 2014
"When quantity reaches a certain level, it makes a qualitative difference. "Remember artificial neural networks?" Christopher Nguyen asked me. "When you have enough memory and compute, a funny thing happens. It comes alive."

Nguyen, former engineering director for Google Apps, was referring to a slice of the technology behind his startup, Adatao, which just received $13 million in funding from Andreessen Horowitz..."

10 Things About (the Internet of) Things
ComputerWorld, August 11th, 2014
"We've all heard about the promise of the Internet of Things, where your alarm clock will start your coffee maker and your refrigerator will tell you when it is time to buy new milk. That future is coming -- many think it will even be here by 2025.

But if you can't wait that long for IoT, here are 10 things that are bringing the hyperconnected future to you today..."

Gartner: Internet of Things has Reached Hype Peak
TechWorld, August 14th, 2014
"The Internet of Things has reached the height of its hype, according to Gartner.

Each year the research firm puts out a Hype Cycle of emerging technologies, a sort of report card for various trends and buzzwords. This year, IoT tops the list.

Gartner believes that most emerging technologies go through a natural process in which they are triggered by some innovation, then they rise to a peak of inflated expectations. As the technologies mature, markets generally become disillusioned by them, before they start to become mainstream and just part of everyday technology..."

The 3 Ways the Internet of Things Will Unfold
InfoWorld, August 12th, 2014
"The Internet of things is hot. Practically every tech vendor is using the label for some of its products. Cisco Systems and PwC both predict that the market will be worth trillions of dollars. The Internet of things is also the tech industry's latest overhyped technology -- most of what is called IoT is not IoT, and the IoT market will never be worth trillions of dollars unless you declare that IoT includes anything that uses power, a chip, and some communications capability, which is a pointless definition..."
3D printing makes its move into production
ComputerWorld, August 13th, 2014
"When NASA's Juno satellite blasted off for Jupiter, the 3D printed parts in its final assembly represented just one small step toward manufacturer Lockheed Martin's goal to eventually build an entire spacecraft using additive manufacturing technology. The launch also signified one giant leap toward the use of 3D printing in the aerospace firm's manufacturing processes here on earth.

Other businesses are adopting 3D printing in production, too..."

7 far-out technologies that are closer than you think
InfoWorld, August 14th, 2014
"If it's cliché to say that yesterday's science fiction is today's off-the-shelf tech, it's only because it's come true time and again.

That process of transforming the crackpot into the practical hasn't come to a standstill: There's a fresh crop of tech on the way that makes use of everything from quantum mechanics to carbon nanotubes.

Here are seven technologies, once either at the bleeding edge or entirely off the map, but now emerging as realities or soon-to-be realities on the desktop and in the data center..."

    15 Technologies Changing how Developers Work
    InfoWorld, August 11th, 2014
    "A long time ago, developers wrote assembly code that ran fast and light. On good days, they had enough money in their budget to hire someone to toggle all those switches on the front of the machine to input their code. On bad days, they flipped the switches themselves. Life was simple: The software loaded data from memory, did some arithmetic, and sent it back. That was all.

    Today, developers must work with teams spread across multiple continents..."

      Scientists create self-assembling, working robots
      ComputerWorld, August 8th, 2014
      "It would be strange enough to see a robot fold itself into arbitrary shapes and then just walk away.

      Then add to the mix that it's a laser-cut origami robot and you have the new robotic technology created by a team of engineers from Harvard, the Wyss Institute and MIT...

      "The exciting thing here is that you create this device that has computation embedded in the flat, printed version," Daniela Rus, the Andrew and Erna Viterbi Professor of Electrical Engineering and Computer Science at MIT, said in a statement. "And when these devices lift up from the ground into the third dimension, they do it in a thoughtful way."

        Top Techs the CIA Thinks are Hot
        Network World, August 8th, 2014
        "Through its investment firm called In-Q-Tel, the CIA funds companies, mostly start-ups, to push forward technologies deemed useful to government intelligence agencies. Here are the latest picks to get undisclosed amounts of IQT money; and for last year's summary of IQT picks.."
          Will You Soon be Training your Robot Replacement?
          Government Technology, August 13th, 2014
          "Information is the most valuable thing there is. It's why companies hire consultants just to share what they know, it's how stock brokers and financial advisers are able to make a living without actually creating anything, and it's why the big data and predictive analytics industry is projected to reach $50 billion by 2017. Most important of all, it's how Biff Tannen was able to amass a fortune through gambling in Back to the Future Part II after borrowing the time machine and giving a younger version of himself a sports almanac from the future..."
          World's fastest camera captures 4.4 trillion frames a second to watch chemical reactions
          The Independent, August 17th, 2014
          "Researchers in Japan have developed a camera that can record 4.4 trillion frames in a single second, allowing scientists to capture new images of some of nature's most fascinating and blink-and-you-miss-'em processes, from intense chemical reactions to plasma dynamics.

          The team behind the Sequentially Timed All-optical Mapping Photography (STAMP) camera say it has already managed to record images of heat conduction, a process that can happen at one sixth the speed of light..."

            Thoughtful Machine Learning
            O'Reilly, August 13th, 2014
            Apply a fully test-driven approach to machine-learning algorithms, and save yourself the pain of missing mistakes in your analyses. Most data scientists have run an analysis and simply accepted any answer that wasn't an error message. But just because it runs doesn't mean it's correct. Missed mistakes can ruin research and harm reputations.

            All of that can be avoided by writing tests and building checks into your work. This book shows you how to write tests and build checks into their work. Using the Ruby programming language, software developers, business analysts, and CTOs will learn how to test machine-learning code, and understand what's happening "behind the scenes"...

              IT - Bitcoin
              Globalization and Cryptocurrencies
              Bitcoin Magazine, August 11th, 2014
              "The development of cryptocurrencies has been fascinating to watch. In only five years, thousands of currencies emerged from the Internet following the release of the original Bitcoin protocol. Clearly, we are witnessing paradigm shifts in regards to commercial and legal frameworks, economic theory on money, and new avenues for self-expression.

              One of the more interesting social consequences of cryptocurrency has been the drive to regionalize. Independent ethnicities, kingdoms, and linguistic traditions can develop a sense of identity by using specific currency..."

              Europe Inches Towards A Decision on Bitcoin VAT
              CoindDesk, August 16th, 2014
              "A recent legal referral in the EU may be inching the region a little closer to more unity on one small element of bitcoin taxation, but it won't do much to help global confusion on the matter.

              In June, Sweden asked Europe's highest court, the European Court of Justice (ECJ), whether cryptocurrency exchanges are liable for value-added tax on the fees that they charge for their services. The result could have far-reaching implications for tax in the region.

              In Europe, there is a directive on VAT that explains how it should be levied. EU directives are powerful documents, designed as high-level guides that member states can interpret when making their own laws..."

              TV Giant DISH Launches Bitcoin Payments Program
              CoindDesk, August 16th, 2014
              "DISH customers can now use bitcoin to pay their monthly TV bills.

              The Colorado-based company went live with its bitcoin payments program today as part of its previously announced third-quarter rollout.

              The first customers to pay for DISH services using bitcoin are Austin and Beccy Craig. The American couple have famously chronicled their attempts to live using only digital currency on their Life on Bitcoin blog..."

              How To Save and Protect Your Bitcoins
              CryptoCoinsNews, August 11th, 2014
              "Cryptocurrency in its current state is largely a movement against the traditional banking system. However, this doesn't mean you can't use the platform to store value long-term, and recently, even to earn interest on your savings mimicking the nature of fiat bank accounts. For security and practicality reasons, it is recommendable when storing considerable forms of cryptocurrency to keep them in separate and more secure locations from the ones you would use for more regular transactions (this is commonly referred to as a 'hot wallet'). There are a handful of options available for saving with cryptocurrency..."
              Support for Kernel Zones with the Oracle Solaris Cluster 4.2 Data Service for Oracle Solaris Zones
              By T.F.

              T.F. writes, "The Oracle Solaris Cluster Data Service for Oracle Solaris Zones is enhanced to support Oracle Solaris Kernel Zones (also called solaris-kz branded zones) with Oracle Solaris 11.2.

              This data service provides high availability for Oracle Solaris Zones through three components in a failover or multi-master configuration:

              • sczbt: The orderly booting, shutdown and fault monitoring of an Oracle Solaris zone.
              • sczsh: The orderly startup, shutdown and fault monitoring of an application within the Oracle Solaris zone (managed by sczbt), using scripts or commands.
              • sczsmf: The orderly startup, shutdown and fault monitoring of an Oracle Solaris Service Management Facility (SMF) service within the Oracle Solaris zone managed by sczbt.

              With Oralce Solaris Cluster 4.0 and 4.1 the sczbt component does support cold migration (boot and shutdown) of solaris and solaris10 branded zones..."

              Mirroring IPS repositories
              By Glynn Foster
              Glenn writes, "Out of the many changes introduced in packaging with the Oracle Solaris 11.2 release, one of really good ones was the introduction of a repository mirroring service. This provides administrators with an easy, automated way of mirroring repository contents. For example, let's say you had a package repository set up locally that was serving the clients in your data center. While we provide a few different ways to sync up the contents of this repository with the Oracle Solaris 11 support repository hosted by Oracle through the pkgrecv utility or incremental ISO images, it's a pretty manual process. Now it's a case of simply configuring and starting an SMF service, svc:/application/pkg/mirror:default.

              I've written a short article on this new IPS feature - How to Set Up a Repository Mirroring Service with the Oracle Solaris 11 Image Packaging Service..."

              Cloud Computing
              TomTom Achieves a Near 50% First-Contact Resolution Rate for 2 Million Contacts Each Year, Provides 26 Million Self-Service Answers
              using Oracle RightNow Web Self Service Cloud Service

              From its start in 1991, TomTom focused on making technology accessible for everyone, beginning with software development for business-to-business mobile applications and personal digital assistants (PDAs) for consumers. In just two years TomTom became the market leader in PDA software. This paved the way for the launch of the first TomTom GO in March 2004 which revolutionized the way millions of drivers got from point A to point B. The first portable navigation device (PND) became the fastest-selling consumer technology device, reaching 1 million sales faster than the introduction of the mobile phone...

              Handled over 2 million contacts each year, achieved nearly a 50% first-contact resolution rate, and provided 26 million self-service answers each year using Oracle RightNow Service Cloud

              Cut number of RMAs by using Oracle RightNow Web Self Service Cloud Service to help customers determine whether their PND is defective or whether they have not programmed it correctly

              Improving the Performance of Transparent Huge Pages in Linux
              By Khalid Aziz
              The following is a write-up by Oracle mainline Linux kernel engineer, Khalid Aziz, detailing his and others' work on improving the performance of Transparent Huge Pages in the Linux kernel.

              "The Linux kernel uses small page size (4K on x86) to allow for efficient sharing of physical memory among processes. Even though this can maximize utilization of physical memory, it results in large numbers of pages associated with each process and each page requires an entry in the Translation Look-aside Buffer (TLB) to be able to associate a virtual address with the physical memory page it represents. The TLB is a finite resource and large number of entries required for each process forces kernel to constantly swap out entries in TLB. There is a performance impact any time the TLB entry for a virtual address is missing. This impact is especially large for data intensive applications like large databases..."

              IT - Cloud
              Top 5 Examples of Cloud Computing
              Business 2 Community, August 12th, 2014
              "Cloud computing is one of the easiest ways for business owners to take advantage of some of the latest technologies without spending a fortune on expensive computer parts, software and IT specialists.

              To be able to easily understand the true benefits of cloud computing, it's always best to see some examples of it.

              The emails are among the most popular ways used by people to communicate today and the service is constantly evolving to become faster and more reliable. Email clients are popular way to check your emails, but they often use your physical memory to store communication data..."

              Will the Internet of Things Push the Industry into Cloud?
              Insurance Networking News, August 11th, 2014
              "The so-called 'Internet of Things' (IoT) is nothing new to the insurance industry. Telematics - the placement of sensors within policyholders' vehicles - has been around for a few years now. Now, property/casualty companies also are investigating the employment of sensors in conjunction with geolocation systems to build risk profiles across various properties.

              That's why the Internet of Things means a great deal, and is poised to change the way we look at data. As Mike Kavis explains in a recent Forbes article, the challenge is that most data centers aren't ready to handle the impending explosion of data that IoT will bring..."

              4 Cloud Horror Stories -- and How to Survive Them
              CIO, August 6th, 2014
              "Horror stories don't just happen at the movie theater. In a few cases, companies make a big play to use the wrong cloud application or experience widespread outages in their connection to cloud storage.

              While vendors claim that cloud services are secure and reliable, that's not always the case. A better way than relying or vendor promises? Make sure your migration plans, budgets, existing infrastructure, security and any ancillary services all match up before making the jump to the cloud..."

              Patterns of failure for enterprise cloud computing projects, and how to avoid them
              GIGAOM, August 15th, 2014
              "A recent Gigaom survey showed that most enterprises are on their 2nd or 3rd cloud computing projects. These projects range from new application development, to application migration, to infrastructure migration. Almost all follow a common 'learning experience' pattern for enterprise IT.

              It should be noted that these first generation cloud computing projects may not be led by enterprise IT, but instead by line-of-business organizations, often called 'Shadow IT'

              The challenges that enterprises (or line-of-business organizations) face as they roll out first generation cloud-based solutions seem to focus around a few key areas. These include the ability to:..."

              Caution: Cloud Brokers May Not Deliver what You Expect
              InfoWorld, August 12th, 2014
              "I hear about these types of solutions each and every day. Cloud brokers or cloud exchanges, typically from existing colocation or MSPs (managed services providers), make a few promises:

              • They'll provide access to several public clouds, typically Amazon Web Services, Microsoft, and a few others. (I don't see Google much in cloud brokering, but I figure the brokers will fit Google in as well.)
              • They'll allow you to provision the public cloud services using their user interface or APIs, so you can provision services across public cloud providers as needed.
              • They can manage these public clouds as a single set of resources using a single set of interfaces. As they put it, mixing and matching the public cloud services to meet the exact needs of your application.

              Read on...

              Data Security: Encryption in the Cloud
              Data Center Knowledge, August 14th, 2014
              "The third annual Cisco Global Cloud Index (2012-2017) states that 2014 is the first year the majority of workloads will be in the cloud, with 51 percent processed in the cloud versus 49 percent in traditional IT space. Cisco anticipates that 'global data center traffic will grow threefold and reach a total of 7.7 zettabytes annually by 2017.'

              Cloud services have taken the business world by storm, and all the data handled by the cloud must be secured. Encryption plays an important role in creating trust in the cloud..."

              SDN Networks Set Cloud Apart from the Old Data Center
              SearchDataCenter, August 12th, 2014
              "SDN networks are dynamic, automated and segmented by software rather than physical routing. And they solve several common data center networking problems...

              SDN networks arose from a demand for connectivity that current switches, routers, network protocols and segmentation tools could not satisfy.

              Cloud-ready data centers enable an always-on and available-anywhere world of information and productivity. The cloud computing model delivers efficiency and value with economies of scale by pooling compute, storage and networking resources, distributing them where they are most needed, maximizing their use across multiple groups and abstracting away the underlying physical infrastructure..."

              Why Your Business Will be Left Behind If You Don't Move to the Cloud
              Business 2 Community, August 12th, 2014
              "The term 'cloud' has been thrown around quite a bit in the tech world over the last couple of years. Beginning with companies and services like DropBox and iCloud, the market has grown from a few dismal companies to a $50Billion a year business. One of the fastest growing cloud services is Software-as-a-Service or SaaS. It allows businesses to access and store information that they normally would in paper files or on their desktop computer, except through the cloud..."
              Is Your Company Ready for the Cloud: A 12-point Checklist
              Business 2 Community, August 14th, 2014
              "As cloud computing crosses the chasm from 'pi in the sky' to mass adoption, companies are beginning to approach technology purchases with a 'cloud first' or 'why not cloud' strategy. But is your company ready for the cloud? Here are some practical considerations:..."
              IT - CxO
              5 Priorities for Chief Data Officers
              Information Week, August 8th, 2014
              "IBM says 25% of Fortune 500 firms now employ CDOs, yet many don't know how to structure the role. Research reveals five imperatives.

              Chief data officer (CDO) is on its way to becoming the next hot job, but according to IBM, many companies aren't quite sure what this new role is all about.

              "About two-and-a-half years ago we saw the emergence of the chief data officer, but organizations are struggling to understand what CDOs do, where they put that role within the organization, and what these executives are responsible for," said Glenn Finch, global leader for technology and data, IBM Global Business Services (GBS)..."

              5 Strategies to Change the Game
              Insurance Networking News, August 14th, 2014
              "Unmanned automobiles, drone delivery, smart contact lenses - the pace of discovery has accelerated to the point where concepts that until recently seemed like science fiction are quickly becoming reality. While conventional innovation takes place regularly all around us, truly disruptive innovation is scarce, and it has the potential to have a much greater impact on companies, industries and the world. Disruptive innovation has the power to wipe out long-established businesses and place multi-billion dollar valuations on nimble entrants to the category … so disruptive innovation needs to be embraced..."
                5 Veteran CIOs Take Stock of the Changing Tech Sector
                ComputerWorld, August 11th, 2014
                "In addition to picking the brains of long-tenured IT leaders in our feature article 3 secrets to CIO longevity, we took an extra moment to ask some of those executives to reflect on what's changed since they first took office - from enterprise projects and desktop hardware to the emergence of cloud, mobile and social.

                Even more than other CIOs, these veterans realize that change is the only constant in IT. Or, as Citrix Systems CIO Paul Martine puts it, "Don't get married to technology, because you'll have to divorce it someday."..."

                Chief Digital Officer vs. Chief Data Officer: Who Will Win the Day?
                SearchCIO, August 13th, 2014
                "Will the chief digital officer outlive the chief data officer? Where should data experts draw the line in the sand on data quality? The Data Mill reports...

                Two emerging titles are gaining momentum -- and contributing to IT acronym confusion. Though the roles are different, both the chief digital officer and the chief data officer are the CDOs of the executive site -- but for how long? According to Jill Dyché, vice president of best practices at SAS Institute Inc., one CDO may be poised for greater success than the other..."

                Active Risk Management: Defending Against the Cyber Storm
                Continuity Central, August 8th, 2014
                "2014 started badly - by severely testing the UK's flood defences. Information security professionals have a similarly precarious feel, as they work to continuously hold back a flood of ever more sophisticated attacks and protect their information assets. Cybercrime, like the weather, is often unpredictable, but organizations can gain a competitive advantage by making risk-based decisions and investments to focus resources and get the best return on investment to prevent costly breaches to their defences..."
                Five CISO Skills Critical to Your Success in the Next Five Years
                CSO Online, August 13th, 2014
                "There's certainly no shortage of claims regarding the current shortfall of cybersecurity professionals. These findings show up repeatedly in our surveys, most recently the 2014 Global Information Security Survey and the 2013 State of the CSO, which both revealed that the demand for skilled IT security professionals continues to strain organizations' ability to fill security positions. Finding skilled information security workers was identified as one of the greatest challenges for 31 percent of large companies.

                Interestingly, the Rand Corp. recently released a report in which the think tank said that it believes that the combined steps being taken currently by the government, private sector, and university training will help close the cybersecurity skills gap soon..."

                To Poach or Not to Poach Talent? It's Just Un-American If You Don't
                TLNT, August 14th, 2014
                "Before we get right in and answer this question, let's all get on the same page.

                What is 'Poaching?' Wikipedia defines it this way:

                'Poaching has traditionally been defined as the illegal hunting, killing or capturing of wild animals, usually associated with land use rights.'

                It can also be a cooking term, like 'Poached Eggs' or 'Poached Salmon,' but that's not what we're talking about..."

                  The Quiet Before the Next IT Revolution
                  InfoWorld, August 11th, 2014
                  "One of the best and worst parts of IT is that it's always changing. Day to day, week to week, the only constants are help desk calls from clueless users and, well, change. As time wears on, though, we might even see a shift in the clueless user department -- we are well into the time where "I'm not a computer person" holds no water. However glacial this progress may seem, users are getting savvier. But I digress.

                  If you look at the struggles IT has gone through in the past few decades, you can see several clearly defined eras, each shorter than the last. Coming through to today, eras seem to be measured in mere months, not years..."

                    vBeers @ Boca - Biergarten Boca - Wed Aug 20th
                    6pm - 9pm
                    Join us for vBeers @ Boca. We meet on the 3rd Wednesday of each month in Boca Raton, FL. The next meeting will be at Biergarten Boca, which is located in on US 1, just South of Palmetto Park and East of I-95.

                    This event will be a non-sponsored event so bring your wallet, your sense of humor and get ready for some great IT and virtualization conversations with some of the best people in South Florida's IT community (including YOU!).

                    • Biergarten Boca Raton
                    • 309 Via De Palmas
                    • Boca Raton, FL 33432

                    $5 burgers and happy hour deals on draught beers!

                    Please Register.

                    Details @

                    Unified Communications Suite Documentation
                    A New Direction

                    "With the availability now of Unified Communications Suite 7.0.6 (shipped on August 13), you'll notice that we are also transitioning to publishing product documentation on the Oracle Documentation Site (also referred to as Oracle Technology Network, or OTN )...

                    For the Unified Communications Suite 7.0.6 release, documentation for the following component products is published to OTN:

                    • Connector for Outlook
                    • Contacts Server 8.0
                    • Instant Messaging Server

                    This documentation is only on OTN, and not on the Communications Suite wiki...

                    IT - PM
                    5 ways to more accurately forecast with project management software
          , August 11th, 2014
                    "Regardless of the type of project you're beginning, one of the most important aspects of a good start is accurately forecasting when it will be completed.

                    How do you predict when a project will be completed? Do you have a formula? Or are you simply guessing?

                    Project management (PM) software can help you in the forecasting process. Whether you're using a platform that works with a traditional/waterfall style of management or an agile/lean style, by leveraging built-in tools, you'll have the ability to better predict when a project will be completed.

                    Here are several ways you can use PM tools in your forecasting..."

                    IT - Networks
                    Programming: An Essential Skill for Network Engineers
                    Network Computing, August 11th, 2014
                    In 2011, Marc Andreessen wrote an article called "Why Software is Eating the World" (subscription required). In it, he predicted:

                    "Companies in every industry need to assume that a software revolution is coming. This includes even industries that are software-based today. Great incumbent software companies like Oracle and Microsoft are increasingly threatened with irrelevance by new software offerings..."

                    Next Big Internet of Things
                    Information Management, August 4th, 2014
                    "The Internet of things is poised to redefine the customer experience, and could offer insurers the opportunity to redefine and reimagine insurance product creation, distribution, services, pricing, data and analytics and business metrics, according to 'The Internet of Things: Creating a Connected World - Disrupting and Transforming Business and Revenue Models,' a white paper from Strategy Meets Action, an insurance technology consultancy..."
                    Graph Theory and Calculating Network Topologies
                    Business 2 Community, August 14th, 2014
                    "Over the past few weeks I have had several conversations related to calculating network topologies and how packet forwarding is done based on those topologies. I wrote this post about a year ago explaining some of these details, but after a conversation with a customer earlier this week, I wanted to explain in a little more detail and relate it not only to Shortest Path First methods, but also to more traditional L1 traffic engineering and path creation..."
                      Hybrid SDN is the Gateway Drug to the New Network
                      SearchSDN, August 11th, 2014
                      "When Japanese broadcast network TV Asahi expanded from one building to four last year, its IT crew faced a lineup of all-time greatest networking challenges.

                      The expansion included the addition of two massive office towers and an events arena, which had to be connected to the original Tokyo headquarters and data center, all as part of one campus LAN.

                      Yet the TV Asahi team couldn't just ditch the existing 200-switch Brocade network at its headquarters and in the data center, which was costly but high performing. Whatever technology came into the new buildings would have to be less expensive, more flexible and also integrate with the legacy architecture..."

                      Inside White-Box Switches
                      Network Computing, August 13th, 2014
                      "In my last article, I discussed the advantages of running white-box switches and operating systems from companies like Big Switch Networks and Cumulus Networks. One of the advantages of these OSs is that they reduce the amount of processes running in a monolithic kernel, which allows the CPU of the switch to use more power to forward packets.

                      As many readers pointed out, modern switching architecture uses application-specific integrated circuits (ASICs) for packet forwarding. They were entirely correct. However, there are a lot of reasons why some vendors are moving away from this architecture in favor of a general-purpose CPU. Let's take a closer look at this trend..."

                        Network Engineers Say Wireless Network Privacy is Misunderstood
                        SearchNetworking, August 11th, 2014
                        "With high-profile security breaches and NSA snooping in the news, wireless network privacy has never been more misunderstood. Should users be concerned about Wi-Fi location-based services, and should the government get involved?..

                        Wireless network privacy is a touchy subject. With high-profile security breaches and government snooping continuing to make the news, it's no wonder users are wondering what information their mobile devices are revealing about them and how that information is used..."

                        IT - Operations
                        20 Data Center and Cloud Trends You Don't Want to Miss
                        CRN, August 5th, 2014
                        "The idea behind an active/active datacenter is for clients with multiple data centers on a single campus or across the globe to optimize the potential of those data centers, instead of having one sitting as a backup in case of a disastrous event. The solution provider had theorized about engagements such as this in the past, but had never put it into practice, Ward said. With today's falling costs, he said, it is a possibility for a lot more companies. So he expects, and already sees, more clients taking steps to get the efficiency of all of its data centers..."
                          A Flexible Data Center Layout Made for the New Standard
                          SearchDataCenter, August 12th, 2014
                          "Data centers aren't the center of the IT universe anymore. With plenty of resources for hosting dynamic workloads -- cloud, colocation, as a service, or data center -- the on-premises facility layout must become equally flexible...

                          The future of data centers isn't bigger; it's smaller and adaptable, with workloads consolidated, dynamic and distributed elsewhere. Here's how a data center layout should look for that paradigm..."

                            Data Center Innovation: New Ways to Save Energy
                            Federal Computer Week, August 11th, 2014
                            "When one reads 'data center' and 'energy efficiency' in the same sentence, it is often in reference to companies such as Facebook or Google and their investments in green computing.

                            The typical data center, however, has yet to absorb the conservation practices of the top-tier energy savers. The ongoing task of powering up and cooling down a data center continues to consume plenty of kilowatt-hours, so there's ample room for improvement in most computer rooms..."

                            Data Centers Move from Metro
                            Network Computing, August 8th, 2014
                            "Today's data centers are moving out of the metro and into the suburbs in order to cut costs, go green, and ensure geographic diversity. But as data centers begin to move from urban metro locations to facilities that are further away from enterprise end users, the old model of building siloed metro and regional networks begins to break down, giving rise to new challenges.

                            For example, the shift drives an increase in inter-metro bandwidth requirements, fueling the need for 10 GbE and 100 GbE services..."

                            Is Direct Liquid Cooling Making a Comeback?
                            Data Center Knowledge, August 14th, 2014
                            "First developed by IBM in the 1960s to cool mainframes, the use of direct liquid cooling in data centers was going strong until the 80s, when complementary metal oxide semiconductors (CMOS) were invented. These chips could crunch through a lot more numbers per watt, and liquid cooling took a back seat to lower-cost cooling systems that used air for heat transfer.

                            Today, however, the idea of bringing liquid coolant directly to the heat source in the data center is enjoying somewhat of a renaissance, according to a recent report by 451 Research, titled Liquid-Cooled IT: A Flood or Disruption for the Data Center? While far from mainstream, direct liquid cooling has become a business-case foundation for several new companies, and the amount of data centers with cooling requirements close to those of high performance computing is growing..."

                            Multi-Vendor Approach Leads to Multiple Benefits
                            Insurance Networking News, August 12th, 2014
                            "Below is the 11th of 11 Novarica Research Council Impact Award nominee case studies, which INN is presenting in no particular order. The awards will be presented at the research and advisory firm's August 13th event in New York and honor best practices in insurance industry IT initiatives and strategy...

                            Foresters, a fraternal life insurance and investments provider with more than a million members, recently completed a massive transformation project involving its infrastructure, new business systems and policy administration..."

                            IT - Security
                            6 Biometric Factors That Are Working Today
                            Dark Reading, August 12th, 2014
                            "From fingerprints to wearable ECG monitors, there are real options in the market that may relegate the despised password to the dustbin of history...

                            Google "I hate passwords" and you'll get 3.25 million results. If that isn't unshakeable evidence that the world is desperate for a better solution, then I will tear up all those sticky notes pasted on my laptop.

                            What's the alternative? I'm putting my money on biometrics..."

                            Be Prepared: Breach and Data Theft 'Inevitable'
                            Information Management, August 13th, 2014
                            "Cyber security attacks directed against enterprises have increased both in numbers and sophistication over the past decade, to a point where breach and data theft have become inevitable, says research firm ABI. This has led to the demand for solutions and services aimed at enterprise-wide data loss, protection and prevention, the firm says.

                            In its report, 'Cybersecurity Technologies Market Research,' the firm estimates that the market for data loss prevention products will reach $1.7 billion by the end of 2014. An effective data protection strategy requires systems that protect data across databases, applications, networks and endpoint devices, and DLP products are designed to do that..."

                            Cybersecurity Should be Professionalized
                            CSO Online, August 6th, 2014
                            "It By Jaikumar Vijayan The time is ripe for industry and government stakeholders to consider professionalizing cybersecurity, according to a report from Salve Regina University's Pell Center for International Relations and Public Policy...

                            Demand for cybersecurity skills is increasing exponentially, but the educational, training and certification processes to prep people for careers in the field continue to be highly decentralized, ad hoc and non-standard..."

                              From Compliance - to Risk-Based Security
                              Insurance Networking News, August 14th, 2014
                              "Information technology, cyber threats and security postures constantly are evolving in a high-stakes race. As CNA, a multi-line business and personal insurance agency, began shifting to more managed services in 2010, the company's security posture also had to change to ensure the company was doing the utmost to protect systems and data.

                              Robert Allen, CNA's chief information security officer, arrived just as the insurer began the shift. And, in early 2013, he added infrastructure services to his list of responsibilities. Allen describes the change in philosophy as becoming more pragmatic and less compliance oriented..."

                              Passwords Aren't the Problem -- We Are
                              InfoWorld, August 12th, 2014
                              "The world is abuzz with news that a Russian hacker conglomerate may have stolen more than 1.2 billion email addresses and passwords. Whether or not the report turns out to be true, with all the ways the bad guys can get your credentials, you're fooling yourself if you think you don't have to worry about ever being compromised.

                              But I'm not here to tell you use stronger passwords (for the most part, that doesn't work), to only use two-factor authentication (not available on most websites), or to change all your passwords (though you probably should)..."

                                Seven Ways DARPA is Trying to Kill the Password
                                IT World, August 8th, 2014
                                "A seemingly constant stream of data breaches and this week's news that Russian hackers have amassed a database of 1.2 billion Internet credentials has many people asking: Isn't it time we dumped the user name and password?

                                A lot of the best technology of today exploits biometric factors such as retina patterns, fingerprints and voice analysis, but beyond that a number of researchers are looking to tap into the way we think, walk and breathe to differentiate between us and an intruder..."

                                  Survey: Most Hackers Do it for The Lulz
                                  PCWorld, August 14th, 2014
                                  "What motivates hackers to wreak havoc on security systems and steal sensitive data? According to a new survey, most hackers do it for kicks, and few think they'll get caught.

                                  Security firm Thycotic surveyed 127 self-identified hackers at the Black Hat conference last week. When asked about their motivations, 51 percent said they hacked mainly for the thrill of it.

                                  By comparison, 29 percent said they were motivated by some social or moral issue - presumably related to the target and 19 percent said they were mainly seeking financial gain. Only 1 percent said they were primarily looking for notoriety..."

                                  The 10 Most Terrifying Security Nightmares Revealed at the Black Hat and Def Con Hacker Conferences
                                  PCWorld, August 8th, 2014
                                  "It's that time of year again: The wonderful, terrifying week when hackers and security gurus descend upon Las Vegas to show off their skills and unleash presentation after presentation full of scary-sounding exploits. This year is no different. Over the previous week, we've heard tales of planes brought down by rogue code, snoops spying on your security cameras, and secretive, undetectable code that can turn any USB drive into an unstoppable malware vessel.

                                  If the past is any indication, most of these exploits are scarier in theory than in fact - but they still offer a startling glimpse into the dangers inherent in an increasingly connected world. Here are the creepiest security stories coming out of Black Hat and Def Con in 2014..."

                                  To Stop Security Breaches, Kill the Username and Password
                                  CNET, August 7th, 2014
                                  "For decades we've been taught that, when it comes to important stuff, putting all of it in one place is a bad idea. Spread your investments around, keep copies of important documents in as many places as possible, and always, always have a backup -- multiple, if possible.

                                  That becomes a problem when we talk about spreading our personal information all over the Internet. That, as it turns out, is a very bad idea. As I write this, we're gradually learning more about what may be the largest data breach in history..."

                                    Yes, Medical Device Security is Lousy - So What?
                                    CSO Online, August 13th, 2014
                                    "There is no debate among security experts that the security of Internet-enabled medical devices is woefully inadequate.

                                    But there is considerable disagreement about how risky that is for patients. Some say the benefits of connected devices far outweigh what they consider minute risks of a catastrophic attack; while others say even a relatively low likelihood of an attack is too much. Life and health are, after all, much more significant than a credit card number being stolen..."

                                    You're Not the Only One With a Lame Password
                                    Bloomberg, August 11th, 2014
                                    "The height of our digital laziness can be found in our passwords. As was revealed a few years ago, one of the most popular user passwords was "123456," a show of lethargy that was only outdone by those who couldn't muster an extra keystroke -- "12345." ("1234" would have been popular if not for a minimum number of characters requirement.)

                                    Well, it turns out many of the folks who are managing much higher-value online targets than a Facebook account aren't much better at devising hard-to-crack passwords..."

                                    IT - Careers
                                    Want a fulfilling IT career? Learn Linux
                          , August 12nd, 2014
                                    "How can understanding Linux enhance a career? This question is interesting because there are two drastically different answers. The first is the obvious answer that you can find through websites and studies everywhere, but the second is a little more subtle. And a lot more awesome.

                                    You might be reading this post because you read articles like this one from The Linux Foundation regarding hiring demands for Linux experts. Or perhaps you read the 2013 report and realized there's a trend for hiring Linux professionals. Basically, if you want a job in technology, being a Linux expert is like finding a golden ticket in your Wonka bar..."

                                    2014's Hottest IT Certifications
                                    IT World, August 13th, 2014
                                    "With more than half of 2014 behind us, it's that time of the year where we look at IT certifications standings in real world IT. The right certifications can help earn tech workers premium pay or land the job they've been aspiring to. That's why knowing what is "hot" with employers is important when considering your professional development.

                                    Every quarter Foote Partners compiles their data in the IT Skills Demand and Pay Trends Report, and they speak with over 2600 employers to bridge the disconnect between job titles, job content and compensation. Read on to find out where the heat is in regards to IT certifications, salaries and employer needs..."

                                      Know When to Walk Away: Top 6 Job 'Deal Breakers'
                                      CIO, August 11th, 2014
                                      "You've heard all the workplace gripes: coworkers that don't pull their weight, long hours, projects that go sideways, compensation woes and the list goes on. But at what point do workplace annoyances become 'deal breakers?' That is, what makes someone decide it's time to pack it in?

                                      A recent survey from BambooHR polled 1,034 U.S.-based employees and asked them to rate the reasons they left previous jobs to find out exactly why and when enough is enough..."

                                        IT - Virtualization
                                        Malware no Longer Avoids Virtual Machines
                                        ComputerWorld, August 13th, 2014
                                        "Many malicious software programs used to make a quick exit on virtual machines, a tactic designed to avoid a security check. But that isn't the case anymore, according Symantec research.

                                        As companies increasingly use VMs in operational environments, malware writers are largely trying other methods to avoid detection. It means that simply running VMs won't be enough to scare away malware.

                                        Symantec studied 200,000 malware samples submitted by its customers since 2012. It ran the samples on a VM and a non-VM machine to see which ones would stop working when a VM was detected..."

                                        IT - Email
                                        US Court Rules in Favor Of Providing Officials Access to Entire Email Account
                                        IT World, August 11th, 2014
                                        "A judge in Washington, D.C., ruled that providing law enforcement with access to an entire email account in an investigation did not violate the Fourth Amendment to the U.S. Constitution that prohibits unreasonable searches and seizures of property.

                                        The order Friday by Chief Judge Richard W. Roberts of the U.S. District Court for the District of Colombia reversed an earlier decision by Magistrate Judge John M. Facciola who refused to allow a two-step procedure whereby law enforcement is provided all emails relating to a target account, and is then allowed to examine the emails at a separate location to identify evidence..."

                                          IT - Backup
                                          Understanding the Oracle Data Protection Gap
                                          Storage Switzerland, August 5th, 2014
                                          "For many, snapshots are the go to data protection method for protecting Oracle databases. They can provide efficient, rapid protection from database corruption with high data integrity. But snapshot data protection has its limitations. First, snapshot copies can become corrupted if there is an application corruption issue. Secondly, snapshots will be lost if the storage system fails. And then of course there are retention limitations with maintaining snapshot data on primary storage as most systems only support around 250 snapshot copies. Therefore data has to be copied to another device that is independent of the primary storage device..."
                                          IT - Big Data
                                          Planning Your Big Data Strategy: Five Keys To Success
                                          Forrester, August 15th, 2014
                                          "To compete in the age of the customer, it's essential to make the most of the data you have access to, whether it's from internal or external sources. For most organizations, this implies a need to review and challenge existing approaches to how they capture, process, and use data to support decision-making. But it's important first of all to move beyond a technology-centric view of big data. This is why at Forrester, we define big data as

                                          The practices and technologies that close the gap between the data available and the ability to turn that data into business insight..."

                                          Data Artist in Residence: Why Your Data Needs an Artist's Touch
                                          IT World, August 6th, 2014
                                          "As more companies hire data scientists, there is a corresponding trend to hire a new kind of employee that some refer to as 'data artists,' whose job it is to tell the stories behind the data in the most accessible and revealing ways. And these folks are taking major roles on product management teams.

                                          Some of the bigger tech companies such as Microsoft and Google are bringing in the data artists from museums and galleries and putting them to work with developing new visualizations that can help explain their message, promote company awareness, and help out with the marketing efforts..."

                                          Ontologies vs. Data Models
                                          Information Management, August 12th, 2014
                                          "Data models have been with us since Ted Codd described normalization in 1970 and Peter Chen published his paper on entity relationship diagrams in 1976. Ontology as a discipline in philosophy can trace its roots to ancient Greece. As applied to data management, it is much more recent than data modeling and has only appeared in the past few years. But just what is the difference between ontologies and data models? If they are both about data, do they not boil down to the same thing?

                                          I think they are different and have different practical applications..."

                                          IT - Mobile
                                          7 Mobile Marketing Myths and Misconceptions
                                          Business 2 Community, August 13th, 2014
                                          "If your business hasn't yet jumped into the mobile marketing arena, here are some statistics to consider:

                                          • 1.4 billion smartphones were in use in 2013 (one in seven people worldwide).
                                          • Americans typically spend up to two hours a day on their mobile devices.
                                          • One out of every four online searches is conducted on a mobile device.
                                          • 57 percent of users won't recommend companies with poor mobile sites.

                                          This should be enough to convince any business to get involved in mobile marketing..."

                                            Energy Harvested from Body, Environment Could Power Wearables, IoT Devices
                                            IT World, August 10th, 2014
                                            "Low-power wearables may soon bid adieu to batteries and start drawing energy generated by body heat and movement, and ambient energy from the environment.

                                            Consumer electronics devices are getting smaller but conventional batteries are not, and it's important to start implementing new energy harvesting techniques to keep devices powered for long periods of time, researchers said at the Hot Chips conference in Cupertino, California, on Sunday..."

                                              Wearable Devices Are Unlikely to be Big Sellers
                                              Government Technology, August 13th, 2014
                                              "Is wearable tech already wearing thin?

                                              Despite the hype for upcoming products from Apple Inc., Google Inc. and Samsung Electronics Co., a number of analysts say Internet-connected personal devices such as smartwatches and fitness bands - so-called wearables - will be hard-pressed to reach the same sales heights as smartphones and tablets.

                                              That's because nearly every selling point for wearable tech - a smartphone alternative, a better system for fitness tracking and a link to other Internet-connected devices - may not have broad appeal, some analysts say..."

                                              Top Ten Articles for last few Issues
                                              Vol 198 Issues 1 and 2; Vol 197 Issues 1, 2, 3 and 4; Vol 196 Issue 3 and 4
                                              We track how frequently each article is viewed on the web site to determine which the readers consider the most important. For last week, the top 10 articles were:

                                              • The 10 Coolest Servers Of 2014 (So Far)
                                              • Meet Solaris 11.2, where SDN means 'Software-Defined Net profit'
                                              • Oracle Tape Storage - The Future is Bright!!
                                              • LibreOffice 4.2.6
                                              • Friday Spotlight: Getting Started with Oracle VM, Oracle Linux, and OpenStack
                                              • Oracle VM: Rethink Virtualization
                                              • HA-LDOM live migration in Oracle Solaris Cluster 4.2
                                              • Oracle Boosts Exadata Database Clusters With Custom Xeon E7s
                                              • Using Oracle Solaris Unified Archives to Replicate an Oracle Solaris Cluster 4.2 Cluster
                                              • MySQL for Visual Studio 1.2.3 GA has been released

                                              The longer version of this article has list of top ten articles for the last 8 weeks.

                                                IT - Encryption
                                                7 Futuristic Authentication Systems DARPA is Funding
                                                IT World, August 12th, 2014
                                                "A lot of the best technology of today exploits biometric factors such as retina patterns, fingerprints and voice analysis, but beyond that a number of researchers are looking to tap into the way we think, walk and breathe to differentiate between us and an intruder.

                                                Helping to lead the research is DARPA, the U.S. military's Defense Advanced Research Projects Agency. Its active authentication project is funding research at a number of institutions working on desktop and mobile technologies that work not just for the initial login but continuously while the user is accessing a device..."

                                                  Data Security: Encryption in the Cloud
                                                  Data Center Knowledge, August 14th, 2014
                                                  "The third annual Cisco Global Cloud Index (2012-2017) states that 2014 is the first year the majority of workloads will be in the cloud, with 51 percent processed in the cloud versus 49 percent in traditional IT space. Cisco anticipates that 'global data center traffic will grow threefold and reach a total of 7.7 zettabytes annually by 2017.'

                                                  Cloud services have taken the business world by storm, and all the data handled by the cloud must be secured. Encryption plays an important role in creating trust in the cloud..."

                                                  Is Your Encryption Getting Out of Control?
                                                  Help Net Security, August 14th, 2014
                                                  "2014 marks the 25th anniversary of the creation of the World Wide Web. From its earliest beginnings, users have demanded security for their sensitive information and web sites have universally responded by supporting encryption protocols such as SSL/TLS to encrypt data as it moved across the wires.

                                                  Since those early days, encryption has come a long way. Its use is no longer limited to the company's web site. With data privacy legislation, data breach disclosure laws, organized crime and more recently, concerns over state sponsored cyber-attacks and government surveillance, the use of encryption has become pervasive, a last line of defence - if the data is encrypted, who cares if it gets stolen..."

                                                  IT - Server
                                                  Study Finds Firmware Plagued by Poor Encryption and Backdoors
                                                  Network World, August 11th, 2014
                                                  "The first large-scale analysis of a fundamental type of software known as firmware has revealed poor security practices that could present opportunities for hackers probing the 'Internet of Things.'

                                                  Firmware is a type of software that manages interactions between higher-level software and the underlying hardware, though it can sometimes be the only software on a device. It's found on all kinds of computer hardware, though the study focused on embedded systems such as printers, routers and security cameras..."

                                                  Document Foundation Says LibreOffice Is On Its Way To Mobile Devices, Android Included
                                                  by Kristijan Lucic
                                                  Kristijan writes in Android Headlines, "LibreOffice is really popular with Linux users, part of the reason being they can't install Microsoft Office directly on their system, only through a third party program. The other part being, it's a really solid office suite. I personally use Ubuntu (Linux) and I have been an active user of LibreOffice for a while now, though I use Google Docs more frequently and do load Microsoft Office from time to time when I use Windows OS.

                                                  LibreOffice is not available on mobile platforms at the moment, however Document Foundation (the people responsible for this suite) have announced their plans to bring LibreOffice to mobile devices at the first LibreOffice Conference..."

                                                  VXLAN in Solaris 11.2
                                                  By Venugopal Iyer

                                                  Venu writes, "VXLAN, or Virtual eXtensible LAN, is essentially a tunneling mechanism used to provide isolated virtual Layer 2 (L2) segments that can span multiple physical L2 segments. Since it is a tunneling mechanism it uses IP (IPv4 or IPv6) as its underlying network which means we can have isolated virtual L2 segments over networks connected by IP. This allows Virtual Machines (VM) to be in the same L2 segment even if they are located on systems that are in different physical networks. Some of the benefits of VXLAN include:

                                                  • Better use of resources, i.e. VMs can be provisioned on systems, that span different geographies, based on system load.
                                                  • VMs can be moved across systems without having to reconfigure the underlying physical network.
                                                  • Fewer MAC address collision issues, i.e. MAC address may collide as long as they are in different VXLAN segments.

                                                  Isolated L2 segments can be supported by existing mechanisms such as VLANs, but VLANs don't scale; the number of VLANs are limited to 4094 (0 and 1 are reserved), but VXLAN can provide upto 16 million isolated L2 networks..."

                                                  Spotlight on GlassFish 4.1: #5 NetBeans support
                                                  By David Delabassee
                                                  David Delabassee writes,"Spotlight on GlassFish 4.1' is a series of posts that highlights specific enhancements of the upcoming GlassFish 4.1 release. It could be a new feature, a fix, a behaviour change, a tip, etc.

                                                  NetBeans has always had a very solid Java EE support. The next NetBeans update will introduce support for GlassFish 4.1. As usual, 2 NetBeans 8.0.1 distributions (the 'Java EE' and the 'All' bundle) will embed a pre-configured GlassFish 4.1 install to simplify things.

                                                  The exact NetBeans 8.0.1 release date is not yet known but it's certainly not too far away! In the meantime, you can always download and use the latest NB nightly build. Technically, the support for GlassFish 4.1 is working since a few days when the NetBeans Team did the '4.0.1-4.1' switch in their code base..."

                                                  Oracle Introduces Key Vault Software Appliance to Manage and Safeguard Encryption Keys
                                                  From Database Trends and Applications Magazine

                                                  "While encryption is widely recognized as the gold standard for protecting data privacy, the technology is only as strong as its key management, according to Oracle, and critical credential files such as Oracle wallet files, Java KeyStores, Secure Shell (SSH) key files, and Secure Sockets Layer (SSL) certificate files are often widely distributed across servers and server clusters that use error-prone synchronization and backup mechanisms.

                                                  Just months after the massive data breaches of the 2013 holiday season, a newly discovered data breach is again shining a spotlight on the need for better enterprise data security and the fact that not enough is being done to secure critical customer data. This time, the reported data breach involves a Russian crime ring and 1.2 billion user names and passwords as well as at least 500 million email addresses..."

                                                  Nexenta News
                                                  Join Nexenta at VMworld, San Francisco, CA
                                                  25-28 Aug 2014
                                                  Nexenta is a Platinum Sponsor of VMworld 2014!

                                                  As a VMware Premier partner, Nexenta relishes every chance to interact with the VMware community. Nexenta makes the perfect platform for both desktop and server virtualization in a VMware environment. Don't miss your chance to see cutting-edge integration between Nexenta's leading Software-Defined Storage and VMware's virtualization solutions.

                                                  Nexenta will reveal several exciting new products at VMworld! You won't want to miss seeing these in action! We encourage you to schedule a demo with one of our product experts.

                                                  To schedule a demo, please email and include your name, company, title and requested demo date/time.

                                                  Ask Tarkan Maner Anything
                                                  Monday, August 18, 2014 at 1:00 pm Pacific Time
                                                  Nexenta CEO Participates in 2nd AMA to Discuss How Open Source and Software-Defined Everything Technologies Are Changing Our World

                                                  Nexenta, the global leader in Software-Defined Storage (#softwaredefinedstorage) (SDS), announced that Chairman and CEO Tarkan Maner will participate in his 2nd Ask Me Anything (AMA). Tarkan is looking to answer questions related to Software-Defined Storage, networking and data centers and the revolutionary impact these solutions can have on businesses worldwide.

                                                  Details are as follows:

                                                  • Topic: Ask Tarkan Anything!
                                                  • Date/Time: Monday, August 18, 2014 at 1:00 pm Pacific Time
                                                  • Host: Tarkan Maner, Chairman and CEO at Nexenta, @TarkanManer
                                                  • Real-time link:
                                                  • Twitter: @nexenta, @reddit_AMA, @TarkanManer

                                                  Tarkan joins the likes of President Barack Obama, Bill Gates, Malcom Gladwell, Brian Krzanich, Blake Irving, Larry King, David Spade, Shaquille O'Neal, 50 Cent, Johnny Knoxville, and many others, as he participates in his AMA (Ask Me Anything).

                                                  To ask a question, please go to On the upper right hand side of the page, click 'login or register' and proceed appropriately. Once logged in, from the IAmA page, click on the Tarkan's feed, which will be blue, and then submit your question.

                                                  Nexenta is a Platinum Sponsor at VMworld 2014 on August 24th-28th and will be hosting OpenSDx Summit on August 28thin San Francisco, CA. Questions on both events welcomed.

                                                  Level3 News
                                                  tw telecom Extends Nationwide Network Introducing Service in Philadelphia
                                                  industry-leading network solutions now available to enterprise customers across the Philadelphia metropolitan area
                                                  tw telecom, a leading provider of Business Ethernet and networking solutions, announced it is expanding its nationwide network by introducing service in Philadelphia. The company is now able to deploy its industry-leading portfolio of data and Internet services to more enterprises, including its innovative Business Ethernet and Intelligent Network capabilities.

                                                  Philadelphia businesses now have access to tw telecom's Business Ethernet, Intelligent Network and IP networking solutions as well as its ecosystem of on-net datacenters.

                                                  Trending in
                                                  Vol 235, Issue 3
                                                  Trending IT Articles