News about Oracle's Solaris and Sun Hardware
System News
Aug 18th, 2014 — Aug 24th, 2014 Generate the Custom HTML Email for this Issue
System News System News for Sun Users
Volume 198, Issue 4 << Previous Issue | Next Issue >>
Sections in this issue:
click to jump to section

Why Mobile Apps?
By Martin Jarvis, Senior Director, Fusion Middleware Market Development
One significant difference that you'll find in mobile architectures is the preference for REST and JSON over SOAP and XML for mobile web services.We don't have time today to go into an in-depth comparison of SOAP and REST but lets take a brief look at why REST/JSON is considered best practice in Mobile...

This diagram shows a simplified but typical mobile architecture. We have a number of backend applications and data sources connected through a service bus. In typical SOA environments these will use standards based SOAP and XML as the data exchange mechanism. This has proven to be a robust and reliable solution behind the corporate firewall and on the high speed corporate LAN..."

Oracle Solaris 11.2's Virtual components
By Lingeswaran Rangasamy
Lingeswaran writes, "What are the virtual components available in Oracle Solaris 11.2? Since Oracle Solaris 11.2 supports openstack (for cloud deployment), what are the core components have been virtualized?

In this article, we will see the virtual components and how it will be useful in real life. For an example, if you want to provision 10 local zones with exclusive IP, you need 11 network interface cards on the system. (1 NIC for global zone). But normally, you won't get that many NIC on the physical server and also the cost matters. In this case, if you virtualize the network, you will get N-number of virtual NICS and you can create N-number of zones with exclusive IP setup..."

Virtual Box to VMware workstation
Migrating a VM
Lingeswaran writes, "This articles demonstrates that how we can migrate the virtual machine from Virtualbox to VMware workstation. Virtualbox can able to export the VM in OVA file format (Open Virtualization Archive) which can be easily imported in VMware workstation.

I have forced to install Oracle Solaris 11.2 on Virtual box and now I just want migrate the Solaris 11.2 VM to VMware workstation since Virtualbox is not supporting the Solaris kernel zones. There may be a chance that VM guest may not recognize the new virtual hardware after the migration and you need to perform the reconfiguration reboot for the VM..."

IT - Storage
What's Next for Flash?
Network Computing, August 18th, 2014
"Today's 2D flash is near its limit. The industry is evolving to 3D flash and developing storage technologies that promise to be faster and denser. Flash is just seven years old this year, and applications are just beginning to really take advantage of it, so a discussion of its demise and the arrival of alternatives may seem premature. The reality is that flash opened Pandora's Box on the storage front and upset a long period of stagnation. Innovation is happening fast now in the storage industry.

In addition to efforts to evolve from 2D flash to 3D flash, the industry is developing at least seven storage technologies touted as faster and denser successors to today's flash..."

IT - Technology
DARPA Contemplates Vast Ocean Network
Network World, August 13th, 2014
"Probably one of the last and perhaps unforgiving areas of the world not truly 'wired' is above and below the ocean.

Researchers at the Defense Advanced Research Projects Agency (DARPA) want to explore the possibility of seriously changing that notion and develop what it calls 'a system-of-systems architecture and critical components to support networked maritime operations, to include undersea, surface, and above surface domains.'

At this point it is only issuing a Request For Information to understand what would be involved in building such a system..."

    Data Driven: Vehicle-to-Vehicle Communications Coming Soon
    Insurance & Technology, August 20th, 2014
    "Will the connected car become a major component of the Internet of Things? It's starting to appear so. A new research report from the US Department of Transportation's (DOT) National Highway Traffic Safety Administration (NHTSA) assesses the readiness of vehicle-to-vehicle (V2V) communications, which are designed to transmit safety information between autos and warn drivers of imminent crashes.

    V2V research isn't new. DOT and NHTSA have been exploring the technology for more than a decade, and earlier this year announced plans to develop rules for V2V crash-avoidance systems..."

      Swarm of 1,000 Kilobots Cooperates Like an Ant Colony
      CNET, August 14th, 2014
      "Each individual Kilobot doesn't look like much: just a few centimetres in diameter, on three almost comical matchstick-like legs. Powered only by a pair of coin batteries, they move by vibrating, shuffling forward on those funny sticks.

      The impressive part is what they can do together..."

        IT - Bitcoin
        Chain, a Bitcoin Start-Up, Raises $9.5 Million Led by Khosla Ventures
        New York Times, August 20th, 2014
        "Another virtual currency start-up has attracted real dollars from prominent investors.

        Chain, which aims to make it easier for developers to build Bitcoin applications, announced on Wednesday that it had closed a $9.5 million investment round led by Khosla Ventures, bringing its total funding to $13.7 million. RRE Ventures, Thrive Capital, SV Angel, Pantera Capital and the Bitcoin investor Barry Silbert were also among the backers.

        Keith Rabois, an investment partner at Khosla and a former chief operating officer of Square, has joined the company's board..."

        Crypto 2.0 Roundup: Bitcoin's Revolution Moves Beyond Currency
        CoindDesk, August 23rd, 2014
        "Just when people were getting used to the idea that bitcoin might not be a boom-and-bust fad destined for failure, entirely new applications of the technology have joined digital currency on stage.

        Crypto 2.0 - also know as cryptography 2.0, decentralized applications, or, popularly, as bitcoin 2.0 - is the application of block chain or distributed ledger technology to things other than digital currency. The block chain offers the ability to facilitate decentralized ownership and store, transfer and process information in a decentralized, programmable way. Many consider that innovation to be the true value of this technology..."

        Transport and Velocity: Could Bitcoin be a Replacement for Gold?
        CoindDesk, August 23rd, 2014
        "Gold has been used as a store of value for eons, thanks to its beauty and almost magical ability to never tarnish. Furthermore, despite radical shifts in human values over the past 100 years, its worth still has not diminished - even soaring to over $1,000 an ounce in recent times.

        Now, though, there is a new, digital challenger on the scene that, when its price chart is compared with that of gold, bears some striking similarities

        It's no wonder, then, that companies like Netagio now allow people to trade bitcoin for precious metals like gold - it is a sign that investors want the ability to trade BTC seamlessly with other investment vehicles..."

        6 Things Bitcoin Has Made Possible for the First Time
        CoindDesk, August 23rd, 2014
        "It may be cliché, but perhaps no single word sums up bitcoin quite as well as 'disruptive'.

        Computer scientists have been trying to create secure and sustainable digital cash since the earliest days of the Internet, and until Satoshi Nakamoto's white paper introducing bitcoin was published in 2008, their efforts were in vain.

        While the public may still be polarized by the digital currency, most people who take the time to learn about bitcoin and the block chain come to realize the significance of a decentralized, trustless network and the impacts it could potentially have in many areas of everyday life..."

        The Bitcoin Price is Crumbling - Why?
        CryptoCoinsNews, August 13th, 2014
        "The Bitcoin price continues the downward trend with hitting an all time low since mid June 2014 with 550 USD per Bitcoin. Two days ago our author Venzen Khaosan posted a Bitcoin price analysis that could help explain why the price is falling the way it does now. Beyond the below factors which are always driving down the price, one large event that may be triggering this price drop is the sale of Ethereum's bitcoins..."
        Bitcoin Wallet Security Best Practice
        CryptoCoinsNews, August 13th, 2014
        "Knowing how to secure your bitcoins is no longer optional. Bitcoin wallets are fast becoming online criminals' favourite obesession, whether online, at exchanges, on your PC or your mobile. Dell SecureWorks researchers estimate that over 140 malware applications exist that specifically target bitcoin wallets. Protecting your wallet against these threats requires only a handful of cautionary steps. The following guide outlines the security vulnerabilities and provides the essential know-how and preventative actions every Bitcoin wallet owner should routinely practice..."
        Cloud Computing
        Running OpenStack Icehouse with ZFS Storage Appliance
        By Ronen Kofman
        Ronen writes, "Couple of months ago Oracle announced the support for OpenStack Cinder plugin with ZFS Storage Appliance (aka ZFSSA). With our recent release of the Icehouse tech preview I thought it is a good opportunity to demonstrate the ZFSSA plugin working with Icehouse.

        One thing that helps a lot to get started with ZFSSA is that it has a VirtualBox simulator. This simulator allows users to try out the appliance's features before getting to a real box. Users can test the functionality and design an environment even before they have a real appliance which makes the deployment process much more efficient. With OpenStack this is especially nice because having a simulator on the other end allows us to test the complete set of the Cinder plugin and check the entire integration on a single server or even a laptop. Let's see how this works..."

        Oracle Managed Cloud Services Wins Another Prestigious Industry Award
        By Dori DiMassimo
        Dori writes that "Over the last 90 days, Oracle Managed Cloud Services has been the proud recipient of TWO prestigious industry awards for service excellence and customer value leadership.

        The most recent award is last month's 2014 Frost & Sullivan Best Practice Award - North America Managed Cloud Customer Value Leadership Award, which rated Oracle Managed Cloud Services as the clear leader versus other providers; Managed Cloud received an "exceptional" rating in 9 of 10 evaluation categories. The research report is an excellent look at our industry and what is valued by cloud customers looking for a managed solution..."

        Building an OpenStack Cloud for Solaris Engineering, Part 1
        By Dave Miner
        Dave writes, "One of the signature features of the recently-released Solaris 11.2 is the OpenStack cloud computing platform. Over on the Solaris OpenStack blog the development team is publishing lots of details about our version of OpenStack Havana as well as some tips on specific features, and I highly recommend reading those to get a feel for how we've leveraged Solaris's features to build a top-notch cloud platform.

        In this and some subsequent posts I'm going to look at it from a different perspective, which is that of the enterprise administrator deploying an OpenStack cloud. But this won't be just a theoretical perspective: I've spent the past several months putting together a deployment of OpenStack for use by the Solaris engineering organization, and now that it's in production we'll share how we built it and what we've learned so far..."

        The CIO as Chief Innovation Officer: How Cloud is Changing the CIO Role
        12-Page While Paper and Webcast Replay
        The simple fact is this: the emergence of cloud has fundamentally changed the role of the CIO; making job descriptions obsolete, altering organizational structures and changing the benchmarks of success.

        In this webcast Tom Fisher discussed how CIOs can effectively make the transition from "keepers of the technology" to "chief innovators" and how a managed cloud solution can help them regain control of this new, multi-sourced environment and all the business insight it brings.

        Watch the webcast and read Tom's white paper The CIO as Chief Innovation Officer: How Cloud is Changing the CIO Role.

        Oracle Linux Newsletter
        August issue Available
        Chris Kawalek reports that "The August 2014 edition of the Oracle Linux Newsletter is now available! Chock full of fantastic information, it's your one-stop-shop for catching up on all things Oracle Linux. In this edition:

        • Oracle Linux 7 Now Available
        • Oracle Linux and Oracle Virtualization at Oracle OpenWorld 2014
        • Technology Preview of OpenStack Icehouse with Oracle Linux and Oracle VM Now Available
        • Using Ksplice as a Diagnostic Tool with Oracle Support
        • Hands-on Lab: How to Migrate from VMware and Red Hat to Oracle Linux and Oracle VM
        • Emirates Nuclear Energy Corporation Boosts Performance - Is Set to Cut Technology Ownership Costs by US$500,000 in Five Years

        And much more!

        You can read the latest edition online.

        IT - Cloud
        The Enterprise Cloud
        O'Reilly, August 18th, 2014
        "Whether you're planning or just starting to think about your long-term cloud strategy, this practical book will help you evaluate existing public and private cloud technologies and service providers. Author James Bond, Chief Technologist for Hewlett Packard Enterprise Services, shows business and IT executives how to adopt cloud services and transform from traditional managed data center services to a service-oriented cloud environment. You'll learn real-world lessons in operations, security, billing/financials, application transformation, and deployment.

        • Gain real-world guidance for planning, deploying, and managing IT in a cloud-computing environment
        • Use best practice checklists based on lessons learned in cloud adoption
        • Learn about cloud from the perspective of a consumer and as an owner/operator of your own private or hybrid cloud
        • Get updated definitions and trends in cloud computing, deployment models, and how to build or buy cloud services
        • Understand hybrid cloud computing and the future of data center modernization

        This is an Early Release ebooks.

        Choosing a Cloud Provider? Follow the Happy Employees
        InfoWorld, August 15th, 2014
        "Back in March, Louis Columbus reported on some numbers from showing employees' rankings of their cloud technology companies. They are not perfect indicators of company culture, but are certainly worth your consideration if you're looking to work for a cloud provider -- or trying to figure out which ones to use as a provider.

        Reports like these give an insider's view into some of the top cloud technology companies. I can get an idea of what the culture is really like, which is an indicator of how well they are building and deploying their cloud tech..."

          Cloud BI: Going Where the Data Lives
          ComputerWorld, August 20th, 2014
          "Even though cloud-based business intelligence has been around for nearly a decade, a recent trend is driving renewed interest: Companies are generating and storing more data in the cloud.

          "What I think will happen is people will move the analytics app closer to the data," says Joao Tapadinhas, a Gartner analyst. "As more data sources move to the cloud, it makes more sense to also adopt cloud BI solutions because that's where the data is. It's easier to connect to cloud data using a cloud solution."

          Hidden Cloud Costs: AWS, Azure Management Costs Compared
          Information Week, August 14th, 2014
          "What's so hard about assessing cloud ROI?

          When it comes to determining cloud cost, one of the murkiest areas to assess is the implicit management expense of cloud workloads. Is there a difference between the management expenses of different services? You bet there is. To illustrate this, here's a quick look at the differences in operation between Amazon Web Services and Microsoft Azure.

          If you can get the workload to run in either location, which one runs more efficiently, compute-wise? That might be possible to determine through some kind of improvised benchmark. Which one runs more efficiently, management-wise? That might be harder to determine, but recent research from Gartner will help us make some comparisons..."

          Logicalis CEO On Who's Winning, Who's Losing In The Cloud Wars
          CRN, August 14th, 2014
          "Vince DeLuca took over the CEO role at New York-based Logicalis, No. 26 on CRN's 2014 SP500 list, in 2012 with a mission to help evolve the big-time solution provider into a more services-oriented company. As the company continued to evolve and adopt a cloud strategy, DeLuca said he started to see what he called "cloud wars" emerging, as vendors fight for prominence and solution providers work hard to evolve their business models.

          "Our world is certainly changing; that's for sure," DeLuca said.

          "In an interview with CRN, DeLuca dug deep into the evolving cloud world, which vendors are pulling ahead and how partners will be affected. Take a look at what he said..."

          IT - CxO
          5 Things CIOs and VCs Can Learn from Each Other
          CIO, August 18th, 2014
          "CIOs and venture capitalists (VCs) sit at different ends of the technology implementation spectrum: VCs are the initial investors and vendor catalysts. CIOs are the buyers when a technology or concept becomes productized. The two groups often come together, however, to discuss possible deals, explore technology trends and seek each other's expertise..."
            A CIO's Short Slide Deck Captures the Best Traits of IT Leaders
            IT World Canada, August 21st, 2014
            "The IT leader at a liberal arts college suggests you can boil down the key qualities to five 'Ps'

            He may work for a post-secondary school in the U.S., but David Hinson's ideas on IT leadership should find a welcome audience on this side of the border.

            Hinson is the CIO of Hendrix College, a private liberal arts institution based in Conway, Ark. He uploaded the following presentation to SlideShare last week, and while there aren't a lot of notes or context provided, his 'five Ps' - professional, proactive, prescient, passionate, persistent - make for a compelling way to remember some of the characteristics that lead to success in technology and business strategy..."

            Beware the Lure of Strategy in a Box Approaches
            Information Management, August 18th, 2014
            "Strategy is one of those difficult topics that dog most management teams and most firms.

            The real work of strategy is challenging, time consuming and filled with hard-to-answer questions. It requires a simultaneous out-of-corporate body experience to objectively understand market, industry and competitive forces, along with an invasive and sometimes painful self-examination around internal capabilities..."

            Shootout at the TCO Corral
            CIO, August 18th, 2014
            "A few weeks ago VMware released a blast at Amazon's recently released total cost of ownership (TCO) bake-off model that compared AWS cloud services with the on-premise vSphere suite of virtualization products. VMware called the AWS online tool 'biased and inaccurate.'

            Oh my! That's sort of like Manet criticizing Seurat because his dots are too small.

            The truth is, as a rule vendor-based TCO, ROI, and Value models are biased and inaccurate. Every major and many minor IT providers have focused on TCO as a key function in their marketing and sales strategies. They often become the basis for ROI projections and business case justifications. And virtually all of their models are biased and inaccurate 'out of the box'..."

            What's the CIO's Role as Marketing Builds its Digital Empire?
            ComputerWorld, August 14th, 2014
            "The corporate landscape captured in marketing guru Larry Weber's new book, The Digital Marketer: Ten New Skills You Must Learn to Stay Relevant and Customer-Centric, is one where the CMO might be seen as increasingly moving onto the CIO's traditional turf. Weber sat down with IDG News Service recently to talk about how that relationship can work in the successful digital enterprise..."
            A Proactive Approach to Travel Risk Management
            Risk Management Monitor, August 20th, 2014
            "An improving economy and updated business practices have contributed to companies sending more employees than ever on international business trips and expatriate assignments. Rising travel risks, however, require employers to take proactive measures to ensure the health and safety of their traveling employees. Many organizations, however, fail to implement a company-wide travel risk management plan until it is too late - causing serious consequences that could easily have been avoided..."
            vBeers @ Miami - Biscayne Tavern - Wed Aug 27th
            6pm - 9pm
            Come out and connect with other professionals in your industry! vBeers is a great event meant to promote growth of the IT industry here in South Florida. Register today so you can be a part of this great monthly event! Feel free to invite all of your friends and co workers who work in the IT industry!

            This will be a Sponsored event so beers are on us. Join us for an evening of creating connections and building your network in a relaxed and fun environment.

            There is absolutely NO SALES PITCH, just FREE ice cold beers and tech talk!

            • Biscayne Tavern (Inside of the B2 Hotel)
            • 146 Biscayne Blvd
            • Miami, FL 33132

            Please Register.

            IT - DR
            DR-as-a-Service May Be the Cloud's Killer App
            Storage Switzerland, August 20th, 2014
            "Disaster Recovery could be the best implementation of the 'as-a-Service' business model yet because it fits the cloud delivery system so well and features an entirely different value proposition than other cloud services. DR-as-a-Service (DRaaS) offers more than the added convenience of monthly payments or a less expensive way to achieve what a company is currently doing in-house. It's an enabler, a way to get real DR functionality that most companies could otherwise never afford..."
            IT - PM
            5 good reasons to cancel your project
            TechOnline India, August 20th, 2014
            "Now that I have your attention, I can add the caveats. Canceled development projects are not good things. They represent lost investment in terms of money and people. They generally lead to poor morale as people who have put considerable effort into a program find that their efforts have been wasted. But the optimal number of canceled projects is not zero, particularly in the high-tech sector. There are too many unknowns when a project is launched to say emphatically that every program should go through to completion. Here are five situations when canceling a project is a good thing..."
              Missing Deadlines: What You Can Do to Get the Team Back on Track
              TLNT, August 15th, 2014
              "The reason why so many organizations have so much trouble doing what they intend to do, on time, is because when they fail to meet a deadline, nothing happens.

              The dates come and go and no one talks about it.

              And then there is no new focused deadline established because no one is talking about it at all..."

                IT - Networks
                DevOps or SDN? You'll Need Them Both to Work Together
                SearchSDN, August 18th, 2014
                "There's no point in choosing between DevOps and SDN. SDN is actually the perfect toolset for DevOps, with its unified vision and control over the entire network. Meanwhile, DevOps lends itself to the kind of hybridized IT model necessary for SDN.

                In the last few years, there has been a surge in chatter when it comes to choosing between DevOps or SDN.

                DevOps fosters communication and collaboration between developers, operations teams and infrastructure professionals for unified and automated IT development, implementation and management. Meanwhile, SDN allows engineers to apply software control to network elements, centralizing management and provisioning of vast virtual and physical infrastructures..."

                Enterprise Communications: Next Big Thing is Embedded
                Information Week, August 14th, 2014
                Think carefully. Do each one of the communications activities in your enterprise serve the objectives of some specific process or function? Most likely your answer is yes. In the prior article in this series, "Secrets to Communications And Collaboration Success," we showed that communications within almost every usage profile are connected to processes and functions in the enterprise value chain.

                Now think again: Have most of those processes or functions been packaged as software applications, both on-premises and in the cloud?

                  Ipv6: An Answer to Network Vulnerabilities?
                  Federal Computer Week, August 15th, 2014
                  "On Aug. 15, 2012, in one of the most devastating cyberattacks ever recorded, politically motivated hackers wiped the memory of more than 30,000 computers operated by the Saudi Aramco oil company in an attempt to stop the flow of oil and gas to local and international markets.

                  The United States took notice of the attack, with then-Defense Secretary Leon Panetta later remarking that a similar attack on critical U.S. infrastructure, including water and electrical facilities, would cause unparalleled destruction and upheaval..."

                  MPTCP Offers Performance and Resiliency but Security is Nonexistent
                  SearchNetworking, August 14th, 2014
                  "An emerging network protocol that brings resiliency and performance boosts to mobility and the Internet of Things is invisible to most network security infrastructure.

                  MultiPath TCP (MPTCP) allows applications to use multiple IP addresses and network interfaces to send data over multiple paths. For instance, a smartphone could send application traffic over Wi-Fi, 4G and Bluetooth simultaneously. The subflows would be reassembled into the full application stream only at the destination server. Yet when traffic flows are fragmented in this way, network security can break..."

                  Rethinking Communications Regulation
                  ComputerWorld, August 19th, 2014
                  "No technology has had as great an impact on society over the last several decades as the Internet. It has changed how we get information and how we use it, how we behave as consumers and citizens, how we learn, and how we connect to and communicate with other people. The rise of the Internet has disrupted many sectors of the economy, a story that is still unfolding.

                  One of the most powerful effects of the Internet has been its role in precipitating the convergence of previously separate media:..."

                    IT - Operations
                    The Ten Most Common Cooling Mistakes Data Center Operators Make
                    Data Center Knowledge, August 20th, 2014
                    "While data center operators are generally a lot better at cooling management than they were ten years ago, many facilities still face issues that prevent them from either using their full capacity or wasting energy.

                    Lars Strong, senior engineer at Upsite Technologies, a data center cooling specialist, says the ultimate goal in airflow management is to have better control of cooling temperature set points for IT air intake, while minimizing the volume of air you're delivering to the data hall.

                    We asked Strong and Wally Phelps, director of engineering at AdaptivCool, another company that specializes in thermal management in data centers, to list some of the most common issues they see in data centers they visit. Here is what they said:..."

                    6 Things to Know About Choosing a New IT Vendor
                    CIO, August 15th, 2014
                    "No one should sign a contract with an IT vendor without fully evaluating who they are and what they do. Asking vendors these six questions might throw them for a bit of a loop, but their (honest) answers will help you determine if they are the right fit for your company..."
                      IT Outages Are an Ongoing Problem for the U.S Government
                      ComputerWorld, August 20th, 2014
                      "When was launched last October, it gave millions of Americans direct experience with a government IT failure on a massive scale. But the overall reliability of federal IT operations is being called into question by a survey that finds outages aren't uncommon in government.

                      Specifically, the survey found that 70% of federal agencies have experienced downtime of 30 minutes or more in a recent one-month period. Of that number, 42% of the outages were blamed on network or server problems and 29% on Internet connectivity loss..."

                      Moore's Law: The Future is Energy Efficiency
                      Information Week, August 20th, 2014
                      "As the industry continues to shrink chips, energy efficiency is one way to expand Moore's Law beyond its current form. Let's explore how. In the first 20 years of microprocessor development, it was all about running as fast as possible. However, for the last 10 years, the industry has focused on doing nothing as efficiently as possible.

                      That sounds funny until you realize that there is more power to be saved when the machine is idle than when it is running..."

                        Rethinking Data Center Design
                        Insurance & Technology, August 20th, 2014
                        "By the end of the decade, the number of connected devices is expected to reach 50 billion. These billions of devices are generating a massive amount of data: It's estimated that, as early as 2017, 7.7 zettabytes of data will cross the network. This influx of data processing requirements represents a massive challenge for the data center ecosystem as operators abandon client-server and LAN architectures in favor of a design that emphasizes the use of virtualization in servers, storage, and networking...."
                          What Data Center Tier Levels Can and Cannot Tell You About Uptime
                          SearchDataCenter, August 20th, 2014
                          "Your enterprise's old data center has reached the end of the road, and the whole kit and caboodle is moving to a colocation provider. What should you be looking for in the data center, and just how much uptime comes from within?

                          A lot of the work measuring data center reliability has been done for you. The Uptime Institute's simple data center Tier levels describe what should be provided in terms of overall availability by the particular technical design of a facility..."

                            Warning: Failure to Comply with Data Center Maintenance Is Reckless
                            SearchDataCenter, August 20th, 2014
                            "Too often, operational and safety practices are ignored or unrecognized in data centers.

                            Complying with modern data center best practices for design and operations is challenging enough, but facilities must be properly maintained to keep up a reliable level of service. A good program for operational practices and data center maintenance brings out the full value of investments, especially if the data center is certified by organizations such as the Uptime Institute or TIA..."

                              What to do When UPS Sizing Goes Wrong
                              SearchDataCenter, August 20th, 2014
                              "UPS sizing is hard, with confusing terminology and an ever-shifting IT load. If you get the calculations wrong, don't worry about a Michael Bay movie scene in the data center. Here's what to do when UPS is too wimpy or too beefy for the task..."
                                IT - Security
                                Building an Information Security Awareness Program
                                O'Reilly, August 18th, 2014
                                The best defense against the increasing threat of social engineering attacks is Security Awareness Training to warn your organization's staff of the risk and educate them on how to protect your organization's data. Social engineering is not a new tactic, but "Building an Security Awareness Program" is the first book that shows you how to build a successful security awareness training program from the ground up.

                                "Building an Security Awareness Program" provides you with a sound technical basis for developing a new training program. The book also tells you the best ways to garner management support for implementing the program. Author Bill Gardner is one of the founding members of the Security Awareness Training Framework. Here, he walks you through the process of developing an engaging and successful training program for your organization that will help you and your staff defend your systems, networks, mobile devices, and data.

                                5 Cool new Security Research Breakthroughs
                                Network World, August 19th, 2014
                                "University and vendor researchers are congregating in San Diego this week at USENIX Security '14 to share the latest findings in security and privacy, and here are 5 that jumped out to me as being particularly interesting...

                                Georgia Tech researchers acknowledge that large-scale iOS device infections have been few and far between, but they claim weaknesses in the iTunes syncing process, device provisioning process and file storage could leave iPhones, iPads and other Apple products vulnerable to attack via botnets..."

                                6 Reasons Secure Coding Can Still Lead to a Shipwreck
                                Bank Systems and Technology, August 20th, 2014
                                "Why application security means more than just ensuring that developers are writing secure code...

                                Despite our best efforts to write secure code, computer security breaches at major banks, retailers, and government agencies are making front page headlines on a regular basis. Here are six reasons writing better code may only address a fraction of a bank's total application security risk..."

                                Can We make Hack-Proof Computers?
                                ZDNet, August 18th, 2014
                                "The recent Synology Diskstation ransomware attack is just the latest in a long line of criminal and state security hacks of computer systems. Or it was a couple of weeks ago.

                                According to Microsoft some 80+ percent of security problems in the wild are memory-based. Buffer overflows, initialization errors, DMA bugs, firmware updates and more manipulate memory to get malware loaded.

                                This has been understood for decades. The Burroughs B5000 architecture, designed in 1961, contained a flag bit that tagged control words to stop programs from corrupting OS commands..."

                                Fear the Golden Ticket Attack!
                                InfoWorld, August 19th, 2014
                                "The Windows security world is abuzz about Kerberos "golden ticket" attacks in the wake of a seminal presentation at Black Hat USA 2014, the best overview I've seen on the subject.

                                In a nutshell, if you have domain admin/local admin access on an Active Directory forest/domain, you can manipulate Kerberos tickets to get unauthorized access. A golden ticket attack is one in which you create a Kerberos-generating ticket that is good for 10 years or however long you choose..."

                                Insurers' Top 5 IT Security Threats (and What to Do About Them)
                                Insurance Networking News, August 19th, 2014
                                "Companies that endure data-security breaches pay a huge price, and that price is rising. As insurers such as Chubb, Ameritas Life, OneBeacon and Allianz Global Assistance conduct more business online, the tactics and strategies they employ to protect systems, data and users are evolving as well..."
                                Kicking the Stool Out from Under the Cybercrime Economy
                                ComputerWorld, August 19th, 2014
                                "Put simply, cybercrime, especially financial malware, has the potential to be quite the lucrative affair. That's only because the bad guys have the tools to make their work quick and easy, though. Cripple the automated processes presented by certain malware platforms, and suddenly the threats -- and the losses --aren't quite so serious.

                                CSO Online had the opportunity to chat with Shape Security's senior threat researcher, Wade Williamson, at this year's Black Hat conference, and he offered a brief background of these types of popular malware platforms before putting the threat landscape into perspective..."

                                New Hacking Scenario Emerges: Wi-Fi Signal-Sniffing Drones
                                DefenseSystems, August 15th, 2014
                                "The next major network security threat could come from the sky, in the form of drones equipped with video cameras and the ability to sniff out mobile devices and their unique identifiers, perhaps even establishing rogue network access points in the sky that could be used to hack sensitive government or corporate networks.

                                That's the potential threat, according to security specialists and at least one network security company offering detection equipment to address the new threat from the sky posed by network-hacking drones..."

                                Password1 Tops Lists of Top 10 Corporate Environment Passwords
                                Network World, August 19th, 2014
                                "While weak or default password use is not exactly breaking news, learning that over half of 626,718 hashed passwords could be cracked in a few minutes is food for thought. The passwords were collected during Trustwave pen tests of corporate environments in 2013 and part of 2014. Most of those came from 'Active Directory environments and included Windows LAN Manager (LM)- and NT LAN Manager (NTLM)-based passwords.'
                                Research Unveils Improved Method to Let Computers Know You are Human
                                Help Net Security, August 18th, 2014
                                "CAPTCHA services that require users to recognize and type in static distorted characters may be a method of the past, according to studies published by researchers at the University of Alabama at Birmingham.

                                CAPTCHAs represent a security mechanism that is often seen as a necessary hassle by Web services providers - necessary because they seek to prevent Web resource abuse, yet a hassle because the representation of a CAPTCHA may not be easy to solve. Moreover, successful attacks have been developed against many existing CAPTCHA schemes..."

                                Why it is Time to Intensify Employee Education on Phishing
                                CSO Online, August 19th, 2014
                                "Companies should consider intensifying employee training to combat the increasing craftiness of phishers who are working harder to obtain personal details on targets in order to trap them in scams.

                                Among the latest examples of phisher creativity is a hustle in which the scammers contacted people who were planning vacations and had booked hotel rooms through"

                                  Why You Need to Do Less if You Want Better Security
                                  CSO Online, August 13th, 2014
                                  "The role of security is to protect what matters most to the business. Instead of getting overwhelmed, the key to providing better security is to do less. Here's how to make it happen..."
                                  IT - Careers
                                  How to Identify Soft Skills in IT Job Candidates
                                  CIO, August 20th, 2014
                                  "As IT departments are called upon to play larger, more public roles in today's businesses, the skill set of the ideal IT employee has changed. How can companies identify whether a job candidate has the 'soft skills' to bridge the gap between IT and the rest of the business?

                                  IT is out of the backroom and in the front office - so it's time to hire candidates who match that new reality.

                                  This presents a vexing problem for both recruiters and employers alike. In a recent survey, the National Association of Colleges and Employers found that employers look for candidates who are decisive, can solve problems, are good communicators and are analytical..."

                                    Tech Industry Job Boom Fuels IT Recruiter Shortage
                                    CIO, August 22th, 2014
                                    "It's a good - no, make that great - time to become an IT recruiter. With an escalating tech talent war, businesses are scrambling to find recruiters to fill vacant positions, says Sara Ferraioli, partner and general manager at WinterWyman, a Boston-based recruitment and contract staffing firm...."
                                      How to Ask for (and Get) Everything You Want
                                      Success, August 19th, 2014
                                      6 strategies to overcome the obstacles of requests

                                      "The best way of getting what you want is thinking about your request before you actually make it. The big reason many people fail to get what they want is that they are too afraid to ask or they view their requests as all-or-nothing gambits - instead of a series of negotiations and compromises.

                                      But there is a middle ground. Here are strategies to help you begin the 'asking' process and avoid becoming upset if things don't go exactly as planned..."

                                        29 Unix And Linux Certifications You Can Consider!
                              , August 15th, 2014
                                        "The UNIX and Linux certifications are highly sought after by the employers today. So wondering which certification to choose? The leaders of the Linux and Unix world like the Red Hat and LPI, Oracle, Solaris, IBM, BSD have their own certifications for Linux professionals. Here's a list of 29 most popular certifications from 6 super popular giants of the industry!..."
                                        10 hot programming languages that are on the rise
                                        Computerworld, August 15th, 2014
                                        "The sheer number and diversity of programming languages in use today is immense. For better or worse, however, most organizations settle on a small subset, the usual suspects, to tackle whatever programming problem comes their way. Java, C++, JavaScript, PHP, Ruby -- time and again, developers shoehorn code to do the best they can with the tried and true.

                                        Some problems require new approaches and new tools. Here are 10 programming languages gaining significant traction for newfound, newly created, or reimagined utility. They run the gamut from general purpose to highly specific, and have roots that range from Lisp to Java, but each could have meaningful impact on modern programming as it evolves..."

                                        Hot Desking In Paradise: 11 Exotic Coworking Locations
                                        IT World, August 21st, 2014
                                        "Remote working is increasingly becoming an option for workers, particularly those in the tech industry. However, with the ability to work remotely comes the ability to choose where to get your work done. Coworking spaces are an attractive alternative to working from home for many, offering the amenities of an office and the social benefits of working among other people. These spaces are popping up in countries around the world, giving remote workers the chance to ply their trades for a few hours, days, weeks or even longer from almost anywhere. If you're aching to see more of the world, while still getting work done, here are 11 coworking spaces in some of the more exotic locations around the globe..."
                                          What I Wish I'd Known Starting Out as a Programmer
                                          InfoWorld, August 21st, 2014
                                          "As the old Faces song "Ooh La La" goes, I wish that I knew what I know now when I was younger. Back then, I simply loved to code and could have cared less about my "career" or about playing well with others. I could have saved myself a ton of trouble if I'd just followed a few simple practices.."
                                            IT - Social Media
                                            Death Notice: In Delaware Your Social Media Accounts Now Go to Your Heirs
                                            Network World, August 19th, 2014
                                            "In what has become a literal battle of wills, Delaware recently become one of the first states in the union to grant families' access rights to the digital assets of their deceased and incapacitated loved ones.

                                            Under House Bill 345, Delaware residents digital legacies will be treated the same as the physical assets, documents and records left for their heirs and executors to handle after their deaths. The new law represents the first comprehensive state statute dealing with the disposition of a decedent's digital assets in the nation, according to Delaware Governor Jack Markell's website. Eighteen or so states have enacted or are looking to enact at least some digital death provisions but Delaware's is believed to be one of the more comprehensive so far, according to experts..."

                                              IT - Virtualization
                                              Flash is Overkill For VDI
                                              Network Computing, August 19th, 2014
                                              "All flash makes fast storage, but at a high cost. Listen to your users, and provide a hybrid array combined with software for a better VDI experience.

                                              A month ago, I received a phone call from my mother-in-law. This means one of two things: a family birthday is approaching, or she is having technical problems. It's generally the latter, and this call was no exception. Last Christmas, we purchased a new laptop for her. It had a decent processor, with 4 GB of memory and a 320 GB hard drive. Being a storage guy, I should have looked at the hard drive specs closer, but she is a pretty light user. In just a few months, her statement of the problem was simple and direct: "My laptop is so slow I can't use it."...

                                              Review: VMware VSAN turns storage inside-out
                                              InfoWorld, August 20th, 2014
                                              "Convergence of compute and storage is all the rage in the virtualization market these days. You see it in Microsoft's Windows Server 2012 R2 with Hyper-V and Storage Spaces. You see it in third-party platforms such as Nutanix. And you see it in VMware's vSphere flagship with the addition of Virtual SAN, a new capability built into the ESXi hypervisor that turns the direct-attached storage in vSphere cluster nodes into highly available, high-performance shared storage..."
                                              IT - Email
                                              IoT: Out of the Cloud and Into the Fog
                                              TechOnline India, August 20th, 2014
                                              "By now, most IT organizations have embraced the concept of cloud computing and are using it in some capacity. But if grand predictionsregarding the Internet of Things (IoT) turn out to be true, even the most advanced, distributed cloud architectures aren't going to be able to handle the IoT's data and communications needs.

                                              That's where the idea of "fog computing" comes into play. It's a term coined by Cisco, but most major IT vendors are developing architectures that describe how the IoT will work by bringing the cloud closer to the end user -- similar to how fog is nothing more than a cloud that surrounds us on the ground..."

                                              Why your Netapp is so slow...
                                              By Darius Zanganeh
                                              Darius writes, "Have you ever wondered why your Netapp FAS box is slow and doesn't perform well at large block workloads? In this blog entry I will give you a little bit of information that will probably help you understand why it's so slow, why you shouldn't use it for applications that read and write in large blocks like 64k, 128k, 256k ++ etc.. Of course since I work for Oracle at this time, I will show you why the ZS3 storage boxes are excellent choices for these types of workloads..."
                                              IT - Big Data
                                              Data Governance: The Silent Hero to Achieving MDM Triumph
                                              Information Management, August 20th, 2014
                                              "Companies today have deployed multiple systems that continually aggregate, consolidate, store and maintain a tremendous amount of operational information. Yet in most organizations there are few clear-cut roles, business processes and responsibilities for protecting or enhancing that information as it moves across the enterprise from design to engineering, to procurement, to distribution, to marketing, to eCommerce, and eventually to service and support. As a result, information often becomes replicated and fragmented, which leads to duplicate, conflicting, incomplete and erroneous information that hinders business responsiveness and decision-making..."
                                                Virtual Hard Drives: The IT Pro Trick that Lets You Back Up Your Data for Free
                                                Network World, August 21st, 2014
                                                "Once you finally start backing up your data (like you've been told to over, and over again), consider using a virtual hard drive (VHD). VHDs have been used by IT professionals for years in virtual machines and server applications, but you can also use them as a free, easy-to-use backup format - especially since the tools required to use it come with Windows

                                                A VHD is a large container file that simulates the file structure of a hard drive. Think of it as a fancy ZIP file, but without the compression. Because VHDs are single files, they make handling and replicating your backups a cinch. They also allow for easy restores (more on that in a bit), and cross-application/platform compatibility..."

                                                10 Big Data Online Courses
                                                Information Week, August 21st, 2014
                                                "If the salesperson's mantra is Always Be Closing, modern IT pros should adopt and adapt it for their own career: Always Be Learning.

                                                If you're not learning, you're frozen in IT time. The technology world has always been one of change, but the pace and frequency of that change has never been greater. The last couple of decades have featured wave after wave of new technologies and their often disruptive effects, not just on lifestyles and business models but on job descriptions, career paths, IT organizational charts, and even IT budget and decision-making power. And there's little sympathy for the IT pros in the middle of all this Change with a capital C.

                                                How do you ensure you're not just maintaining but capitalizing on this rapid-fire change? A-B-L: Always Be Learning..."

                                                  IT - Mobile
                                                  Internet of Things: Limitless Dumb Possibilities
                                                  Information Week, August 18th, 2014
                                                  In the 2004 reboot of Battlestar Galactica, the starship for which the series is named escapes destruction because its computers were not networked.

                                                  This profoundly pessimistic view of network security qualifies as realism outside the realm of science fiction. Computers and networks are full of vulnerabilities. Beyond mission-critical, heavily-overseen projects with limited scope, the security industry doesn't even contemplate bulletproof code. Instead, it measures software defects per thousand or million source code lines. There will be bugs; the only question is how many.

                                                  Mobile Device Security: Tackling the Risks
                                                  Help Net Security, August 20th, 2014
                                                  "Mobile devices with their large data capacities, always on capabilities, and global communications access, can represent both a business applications' dream and a business risk nightmare.

                                                  For those in the security industry, the focus is mainly on deploying 'solutions' to provide protection. However, we are now at one of those key points of change which happen perhaps once in a generation, and that demand a new way of looking at things.

                                                  The convergence of communications, mobile devices and applications, high speed wireless, and cloud access at a personal level, are driving functionality demands on businesses at too fast a rate for many organisations..."

                                                  Playing to Win: Connected Objects and Sports
                                                  Business 2 Community, August 17th, 2014
                                                  "As digital trends go, wearable, connected objects and the so-called Internet of Things (IoT) appear to be reaching maximum volume 11 on the hype scale these days. The promise of a world where everything is somehow tethered to the Internet - thus controllable via any and all connected devices has a certain Utopian appeal, for sure, but the reality is somewhat more mixed. While some reports indicate a steady and rapid rise in IoT technologies over the next decade or so, that unabashed enthusiasm increasingly has been tempered by more skeptical points of view..."
                                                  Smartwatches Need a Disrupter
                                                  Information Week, August 15th, 2014
                                                  "Today's smartwatches just aren't getting the job done. The demand drivers for such devices are limited at best, argues one analyst, and only a transformative product will boost the widespread appeal of smart wearables. Few companies are in a position to deliver such a product, with the exception of a few obvious players.

                                                  Jan Dawson, founder and chief analyst at Jackdaw, compiled some sobering statistics about wearables. Most wearables provide one of two major functions: delivering push notifications and tracking fitness and activity. Dawson's research shows 80% of US and UK consumers have never worn a fitness tracker, and of the 20% who have, about half stopped wearing them. That leaves just 10% of the population of these two countries -- about 40 million people -- actually wearing the devices..."

                                                    Why John McAfee is Paranoid about Mobile
                                                    Dark Reading, August 19th, 2014
                                                    "At this year's SecureCIO event in San Francisco, in front of an audience of CISOs, CIOs, VPs, Directors collectively representing some of the largest corporations in America, John McAfee, the enigmatic founder and namesake of McAfee, proclaimed a veritable state of emergency in enterprise security.

                                                    'Our paradigms for protecting corporate assets [online] no longer work,' said MacAfee, who, after a brief hiatus (one in which he went toe to toe with the Belize Government), is back on the security scene serving as a consultant as well as founding his own startup...."

                                                    IT - BYOD
                                                    BYOD Twists and Turns Keep CIOs Off-Balance
                                                    CIO, August 18th, 2014
                                                    "Is BYOD coming to a crossroads? Workers don't want to be tied to a cubicle and demand the freedom that comes with mobility. However, BYOD has come under fire due to privacy concerns, security measures that ruin the user experience, hidden costs and other unforeseen issues..."
                                                    Court Ruling could Bring Down BYOD
                                                    CIO, August 18th, 2014
                                                    "In what could be a decisive blow to the Bring Your Own Device (BYOD) mega trend, the California Court of Appeal ruled late last week that companies must reimburse employees for work-related use of personal cellphones, as described in the National Law Review...

                                                    "We hold that when employees must use their personal cellphones for work-related calls, Labor Code section 2802 requires the employer to reimburse them. Whether the employees have cellphone plans with unlimited minutes or limited minutes, the reimbursement owed is a reasonable percentage of their cellphone bills."

                                                    Top Ten Articles for last few Issues
                                                    Vol 198 Issues 1, 2 and 3; Vol 197 Issues 1, 2, 3 and 4; Vol 196 Issue 4
                                                    We track how frequently each article is viewed on the web site to determine which the readers consider the most important. For last week, the top 10 articles were:

                                                    • Oracle Cranks Up The Cores To 32 With SPARC M7 Chip
                                                    • VXLAN in Solaris 11.2
                                                    • SPARC M7 Chip - 32 cores
                                                    • Oracle is a Leader in the Gartner 2014 Magic Quadrant for Data Integration Tools
                                                    • How to configure and install kernel zone on Solaris 11.2
                                                    • Document Foundation Says LibreOffice Is On Its Way To Mobile Devices, Android Included
                                                    • Mirroring IPS repositories
                                                    • The CIO's Guide to Oracle Products and Solutions
                                                    • Improving the Performance of Transparent Huge Pages in Linux
                                                    • Support for Kernel Zones with the Oracle Solaris Cluster 4.2 Data Service for Oracle Solaris Zones

                                                    The longer version of this article has list of top ten articles for the last 8 weeks.

                                                      IT - Server
                                                      High-speed memory: 6 technologies to watch
                                                      TechOnline India, August 20th, 2014
                                                      "When it comes to developments in high-speed memory, a lot of the focus is turning to DDR4 as it moves into high-level production this year. However, there are several other trends to watch as well. Do you know how fast the latest DDR4 memories are, or how many transistors make up a high speed SRAM cell?..."
                                                      Apache OpenOffice 4.1.1
                                                      Micro update with many useful and critical bugfixes including 2 security relevant fixes
                                                      The Apache OpenOffice project is pleased to announce the immediate availability of OpenOffice 4.1.1. You can download it from the website.

                                                      Apache OpenOffice 4.1.1 is a micro update with many useful and critical bugfixes including 2 security relevant fixes (details will come separately).

                                                      Bugfixes include:

                                                      • better compatibility with Microsoft Office files,
                                                      • better support for Mac OS X gestures and scrolling,
                                                      • enhanced compatibility with Linux desktop environments.

                                                      A full list of the issues fixed in this release can be found at

                                                      Oracle Solaris Preflight Applications Checker 11.2 now available
                                                      Tools helps identify potential issues for applications
                                                      The Oracle Solaris Preflight Applications Checker tool is a collection of scripts which identify potential issues for applications which may not be ready to be fully executed on Oracle Solaris 11.

                                                      ISV Engineering announced the release of the latest version of Solaris Preflight Checker tool supporting Solaris 11.2. which is now available for download.

                                                      The Solaris Preflight Checker enables a developer to determine the Oracle Solaris 11.2 readiness of an application by analyzing a working application on Oracle Solaris 10. A successful check with this tool will be a strong indicator that an application will run unmodified on the latest Oracle Solaris 11.

                                                      Securing a Cloud-Based Data Center
                                                      How to protect and secure your cloud infrastructure using Oracle Solaris technologies such as Oracle Solaris Zones, ZFS, and network virtualization
                                                      by Orgad Kimchi, Ron Larson, and Richard Friedman

                                                      Table of Contents

                                                      • Security in the Cloud
                                                      • Oracle Solaris 11 Security Features
                                                      • How Oracle Solaris Remote Lab Achieves Its Security Goals with Oracle Solaris 11
                                                      • Conclusion
                                                      • See Also
                                                      • About the Authors

                                                      No doubt, with all the media reports about stolen databases and private information, a major concern when committing to a public or private cloud must be preventing unauthorized access of data and applications. In this article, we discuss the security features of Oracle Solaris 11 that provide a bullet-proof cloud environment. As an example, we show how the Oracle Solaris Remote Lab implementation utilizes these features to provide a high level of security for its users.

                                                      Nexenta News
                                                      Nexenta Delivers Most Advanced Software-Defined Storage Solutions for All-Flash Arrays, VMware Horizon 6.0, and VMware Virtual SAN
                                                      At VMworld 2014
                                                      Nexenta announced new updates to its NexentaConnect and NexentaStor solutions. The latest addition to the NexentaConnect family, NexentaConnect for VMware Virtual SAN, adds full-featured SMB and NFS file services to VMware's Virtual SAN offering. NexentaConnect for VMware Horizon is also updated and improves upon the automation and acceleration for VMware Horizon® Virtual Desktop Infrastructures (VDI).

                                                      NexentaStor release 4.1 now supports a performance optimized 'all flash mode' for low latency all flash reference architectures, VAAI integration and VMware vCenter Management Plug-in. These solutions were revealed and demonstrated for the first time at VMworld 2014 US, August 24-28 in San Francisco....

                                                      NexentaEdge 1.0: Revolutionary Software-Defined Scale Out Object Storage Solution for OpenStack and Big Data Infrastructures
                                                      Delivers High-Performance Block, Swift and S3 Object Services with Industry First Global Inline Deduplication on Petabyte Scale Cluster
                                                      Nexenta announced the launch of NexentaEdge 1.0 - the industry's first software-only scale out block and object storage solution designed to deliver high performance global inline deduplication on petabyte scale clusters.

                                                      NexentaEdge is ideally suited for next-generation open source cloud infrastructures and Big Data repositories requiring performance, scale and low total cost of ownership. The solution is being demonstrated for the first time at VMworld US 2014, August 24-28 in San Francisco.

                                                      Object storage is increasingly taking center stage as a required storage option to support emerging cloud-based and Big Data applications. Breaking with the constraints of legacy enterprise storage, modern object stores are specifically designed to run on extremely low cost shared nothing clusters and present all capacity as one single pool. Key characteristics include scaling to virtually unlimited sizes while remaining easy to manage and highly resilient to device and node failures.

                                                      NexentaConnect for VMware Virtual SAN
                                                      In this document we present use cases and benefits of NexentaConnect for VMware Virtual SAN, Nexenta's latest addition to the NexentaConnect family of leading software-defined- storage solutions optimizing VDI and Cloud deployments based on VMware, Citrix, and Microsoft technologies...

                                                      The value of NexentaConnect for VMware Virtual SAN for customers comes primarily from the following factors: Support of File services for VMware Virtual SAN; Improved performance and reduced latency; Lowest cost per TB without sacrificing performance; Reduced hardware required due to higher utilization and compression rates; Software only product eliminates costly proprietary systems and a Single management interface for all storage

                                                      Level3 News
                                                      tw telecom Expands Network Reach in Fort Lauderdale
                                                      with Service Extending into Cypress Creek
                                                      tw telecom announced it is expanding its existing footprint in Fort Lauderdale with service to businesses located in the fast growing Cypress Creek corridor. The expansion will encompass several miles to the south, west and east of the Fort Lauderdale Executive Airport and further extend the availability of tw telecom's industry-leading portfolio of data and Internet services, including its innovative Business Ethernet and Intelligent Network capabilities.
                                                      tw telecom Listed as Top-Ranked Competitive Provider in US Ethernet Market
                                                      Company also recognized by Vertical Systems Group as one of the top three providers overall of Business Ethernet in the U.S.
                                                      tw telecom has once again been recognized as the top ranked competitive provider in the US Ethernet market. Vertical Systems Group, a leading industry analyst firm, recognized tw telecom's leadership performance in its mid-year 2014 U.S. Business Ethernet Services Leaderboard as first among all competitive providers in delivering Business Ethernet services and one of the top three leading overall providers of Ethernet in the industry.
                                                      Trending in
                                                      Vol 235, Issue 3
                                                      Trending IT Articles