News about Oracle's Solaris and Sun Hardware
System News
Sep 15th, 2014 — Sep 21st, 2014 Generate the Custom HTML Email for this Issue
System News System News for Sun Users
Volume 199, Issue 3 << Previous Issue | Next Issue >>
Sections in this issue:
click to jump to section


IT - CxO
x
6 Critical Workforce issues Companies Face
TLNT, September 12th, 2014
"Better get ready for all that 'seat at the table' talk again.

Global enterprise software developer recently SAP partnered with Oxford Economics on a global study focused on the future of work, but it's the six critical workforce issues facing HR professionals that they listed that got my attention - and should get yours..."

BYoA: 4 Steps for CIO Success
Information Week, September 17th, 2014
"Great leaders look for new ways to motivate their workforce and technology provides a path accomplish that goal. Faced with a generation of employees inclined to embrace the latest tools, CIOs should encourage individuals in their organizations to build their own applications.

Supporting a build-your-own-application (BYOA) policy allows business users to meet their own needs. It's empowering in a way that's similar to bring-your-own-device (BYOD) policies..."

Christy Wyatt: Good Technology CEO. Team builder. Hockey fanatic
TechRepublic, September 17th, 2014
"Christy Wyatt comes from a family of builders. Early on, she discovered a love for the process of building, creating, and problem-solving. It took her some time, but she eventually discovered a passion for computer science and programming because it allowed her to do exactly that -- build something new..."
    How Much do Data Breaches Cost? Two Studies Attempt a Tally
    Information Management, September 12th, 2014
    "To obtain approval and funding for security improvements, bank technologists often have to make their case by pointing to losses from recent security breaches. But calculating those losses can be tricky.

    The effects can be far reaching, from the hit to companies' and individuals' reputations and careers..."

    Security Tops CIO Worries; IT Budgets, Turnover on the Rise
    Network World, September 11th, 2014
    "CIOs are spending more on IT, worrying most about security and privacy, and staying on the job a little longer, according to the latest data from the Society for Information Management (SIM).

    The 2015 SIM IT Trends Study isn't available in its entirety, but researchers released preliminary findings in advance of the full release in early November..."

    Oracle
    x
    Oracle Database Appliance: Reducing Cost and Complexity for ISVs
    Wikibon Project.s Deep Dive into the Value Oracle Database Appliance Delivers to Three Oracle Partners
    Wikibon is a professional community solving technology and business problems through an open source sharing of free advisory knowledge.

    Wikibon recently took a deep dive look into Oracle Database Appliance and how it is being used by three Oracle partners. What they found was universal cost and time to value savings. In the research paper, they noted, 'Wikibon believes the strategic business case for Oracle Database Appliance and other single SME converged appliances is overwhelming for ISV's, integrators, and their customers and will be an essential method for ISVs and integrators to deliver solutions on-site with a cost structure competitive to application-as-a-service cloud providers.' Here are the stories of the partners they interviewed:...

    SPARC
    x
    Update to Oracle VM Server for SPARC
    Maintenance update 3.1.1.1

    The changes for this maintenance update are as follows:

    • Provides support for private virtual LANs. Using Private VLANs, in Oracle VM Server for SPARC 3.1 Administration Guide.

    • Increases the number of LDC endpoints per guest domain on SPARC T4, SPARC T5, SPARC M5, and SPARC M6 systems. See Using Logical Domain Channels, in Oracle VM Server for SPARC 3.1 Administration Guide.

    • Adds support for dynamically assigning PCIe endpoint devices to Fujitsu M10 systems. See the Fujitsu M10 Systems Product Notes.

    For details, please review the documentation for the software/hardware requirements.

    Exadata
    x
    Making Sure Your Exadata Is Running Right
    By Rick Ramsey
    Rick writes, "Oracle makes some pretty big claims about its engineered systems, too. For instance, you've probably heard something along these lines for the Oracle Exadata Database Machine:

    'An engineered system with preconfigured, pretuned, and pretested hardware and software components that is designed to be the highest performing and most available platform for running Oracle Database.

    How can you know whether these claims are true? Because you have Brian Bream on your side, that's why. Brian is the Chief Technology Officer at Collier IT, and Instructor of the Year for both Oracle University and Sun Microsystems University. He knows his stuff. And he just wrote an article that will interest anyone who manages an Exadata Database Machine..."

    IT - Storage
    x
    Flash Data Storage: Knocking TAPE off the Archiving Top Spot
    The Register, September 10th, 2014
    "It was a bombshell when Facebook's Jason Taylor said he would like to use flash solid-state storage as an archive medium, but his reasons made perfect sense.

    Facebook users had lots of photos stored in their albums and rarely accessed them. But when they did want to look at them they wanted them to come up straight away, whether the photos were recent or five years old.

    Only a particular form of flash storage could, in theory, combine the attributes Taylor wanted: low-cost, long-term, reliable storage and fast access..."

    Java Technology
    x
    Choosing 64 and/or 32 bit Java
    By Erik Costlow

    The Java Platform was designed to allow applications to run on different hardware stacks and operating systems without changes. Java is available on Microsoft Windows in 64 and 32 bit versions, allowing users to get the appropriate version for their system. Users can even run both side-by-side for 64 bit operating systems.

    End-users should visit Java.com and click the Free Java Download link. The site will auto-detect the web browser and serve the appropriate download.

    For an explanation of how the website makes that determination, please see 'Which Java download should I choose for my 64-bit Windows operating system.'

    IT - Technology
    x
    Researchers 'Grow' Lasers in Chip Breakthrough
    DefenseSystems, September 11th, 2014
    "Researchers from the University of California, Santa Barbara have reported a breakthrough in chip design that integrates electronic and photonic components and could lead to smaller, lighter, more power-efficient and less expensive microsystems of the kind used in radar, communications, imaging and sensing devices..."
      8 Truths and Myths of Driverless Cars
      TechRepublic, September 15th, 2014
      "For decades, humans have dreamed of driverless vehicles. From the Jetsons to Minority Report, we've gotten a certain idea of how those cars should function and how the world could be if they existed.

      Driverless cars, however, aren't science fiction..."

        10 Business Devices that are Actually Useful
        InfoWorld, September 12th, 2014
        "We're bombarded with a constant stream of new gadgets and gizmos. However, devices that are actually useful, and don't just serve as eye candy, are much harder to find. On that front, these 10 products could serve to increase overall productivity and work efficiency in your small business or home office. Our list includes chargers, scanners, routers, and storage devices..."
          10 Key Technology Items for Your 2015 Budget
          TechRepublic, September 16th, 2014
          "It's that time of year again -- time for IT to lay out plans for next year and prepare for budget discussions. Here are 10 items that are likely to top enterprise IT shopping lists for 2015..."

          • WAN optimization
          • Big data
          • Cloud
          • DevOps
          • Mobility
          • Virtualization
          • Digital assets
          • Data center facilities
          • Audits
          • Data center automation

          Read on for details.

          Artificial Intelligence Meets the C-suite
          Information Management, September 15th, 2014
          "The exact moment when computers got better than people at human tasks arrived in 2011, according to data scientist Jeremy Howard, at an otherwise inconsequential machine-learning competition in Germany. Contest participants were asked to design an algorithm that could recognize street signs, many of which were a bit blurry or dark. Humans correctly identified them 98.5 percent of the time. At 99.4 percent, the winning algorithm did even better..."
            Harvard Team Develops Soft Robot That Stands Up and Walks on Its Own
            ComputerWorld, September 12th, 2014
            "Harvard University scientists have built a soft robot they say can function without a communications and power tether. The four-legged robot can literally stand up and walk away from the people who built it.

            The development team called the machine, which is about a foot-and-a-half long and can carry more than 7 pounds, a huge step forward for robotics..."

              Wearable Robot Will Put a Spring in Soldiers' Steps
              DefenseSystems, September 12th, 2014
              "Soldiers are used to being weighed down by what they wear, especially when it can add up to 100 pounds or so. But researchers are working on wearable gear that could actually do the opposite, reducing fatigue and the risk of injury when carrying heavy loads.

              The Defense Advanced Research Projects Agency just awarded a $2.9 million grant to Harvard University's Wyss Institute for Biologically Inspired Engineering to continue its work on the Soft Exosuit, which is pretty much what it sounds like..."

                IT - Bitcoin
                x
                United Way Becomes Largest Nonprofit to Accept Bitcoin
                CoindDesk, September 15th, 2014
                "Nonprofit United Way Worldwide announced today that it now accepts donations in bitcoin, becoming the latest charitable institution to adopt the digital currency into its operations.

                The US-based organisation claims to be the largest privately held nonprofit in the world, raising more than $5bn annually with more than 2.8 million volunteers, 9.7 million donors and community initiatives, and partnerships with such companies and organisations as the National Football League (NFL), Exxon Mobile, and General Electric..."

                Stop Thinking Bitcoin is Just a New Kind of Currency
                Bitcoin Magazine, September 15th, 2014
                "It's no secret that Bitcoin and other cryptocurrencies are showing us brand new opportunities in the digital industry and the way things can evolve there, and not only that. If you attended the annual Bitcoin conference in 2014, you may have noticed plenty of enthusiastic and curious faces from all kind of industries that are looking for the answer to what Bitcoin and blockchain technology can do for them. With Bitcoin we're going back to 1990s: huge opportunities are seen on the horizon and in my opinion it is very encouraging..."
                Jack Dorsey: Square Register Will Integrate Bitcoin
                CoindDesk, September 20th, 2014
                "Square CEO Jack Dorsey has issued new statements suggesting that the mobile payments giant may seek to add bitcoin to its Register product.

                Dorsey's comments came in an interview with the CBC, in which he was asked for his response to the introduction of Apple Pay to the mobile payments market.

                Noting that Square offers a terminal product that can accept a variety of payment methods, including Apple Pay, Dorsey told the media outlet:..:"

                Boston Fed: Bitcoin Could Be Reducing Online Shopping Costs
                CoindDesk, September 16th, 2014
                "The Federal Reserve Bank of Boston has released a new report that suggests the technology underlying digital currency could reshape global payments.

                Authors Stephanie Lo and J. Christina Wang note in their September policy perspective, 'Bitcoin as Money', that while it's not certain that bitcoin will supplant traditional currencies or payment systems, bitcoin's 'lasting legacy' will be the innovations it brings to payments technology..."

                Top 5 Reasons Why Bitcoins Beat Dollars
                CryptoCoinsNews, September 19th, 2014
                "Here I will reveal the top 5 reasons why bitcoins beat dollars, both now, and in the future. For the sake of brevity, I limited this list to the top 5, but may not be limited to these five alone. The dollar certainly has it's own inherent advantages, but it will prove fleeting in nature in the coming years, whereas bitcoin's advantages are built in to the technology, to stand the test of time..."
                Solaris
                x
                Solaris Cluster 4.2 is available with Solaris Cluster Manager GUI
                By Juergen

                Juergen notes that, "Since 31.August 2014 Solaris Cluster 4.2 is available for Solaris 11.2 and Solaris 11.1. Check out the SC4.2 Release Notes - What's New in the Software section.

                And the Solaris Cluster Manager Graphical User Interface is back with Solaris Cluster 4.2. See 'Using the Oracle Solaris Cluster GUI' in Oracle Solaris Cluster System Administration Guide..."

                Reliable, Scalable, Secure: Oracle Solaris 11.2
                (E-Book)
                Roxana Babiciu asks, "When is the right time to upgrade? Is Solaris 11.2 engineered for the cloud? How can I optimize performance of Oracle SPARC and X86 systems? You will now find answers in this e-book and in turn help your customers! See it here!

                Learn why Oracle Solaris 11 is the ideal foundation for a secure, next-generation IT environment. Discover how to:

                • Optimize performance with the industry's best OS for UNIX enterprise applications
                • Reduce costs with increased eco-efficiency and simpler management
                • Transform security and compliance with the latest, advanced features, built on 20 years of development

                Don't miss this chance to learn how Oracle Solaris 11.2 prepares your data center for the future - while transforming performance today.

                How to Install and Configure a Two-Node Cluster for Oracle Solaris Cluster 4.1 Using SR-IOV/IB Interfaces
                by Venkat Chennuru
                Venkat writes, "This article is intended to help a new or experienced Oracle Solaris user to quickly and easily install and configure Oracle Solaris Cluster software for two nodes, including the creation of Single Root I/O Virtualization/InfiniBand (SR-IOV/IB) devices. It provides a step-by-step procedure to simplify the process...

                This articles uses the interactive scinstall utility to configure all the nodes of a cluster quickly and easily. The interactive scinstall utility is menu driven. The menus help reduce the chance of mistakes and promote best practices by using default values and prompting you for information specific to your cluster. The utility also helps prevent mistakes by identifying invalid entries. Finally, the scinstall utility eliminates the need to manually set up a quorum device by automating the configuration of a quorum device for your new cluster..."

                MySQL
                x
                Join the Global MySQL Community at MySQL Central @ OpenWorld
                Learn the latest best practices from Oracle.s MySQL engineers, customers, partners, and community members during Oracle OpenWorld in San Francisco
                Organizations around the world rely on MySQL to power business-critical web, cloud, and embedded applications, and many are heading to MySQL Central @ OpenWorld to brainstorm tomorrow's innovations. Taking place September 29 through October 2, 2014, MySQL Central is the smart spot to network and build strategies for next-generation applications. You'll hear directly from Oracle's MySQL engineers about the latest features, enhancements, and plans, and connect with MySQL customers, partners, and community members to share best practices and success stories.
                MySQL Cluster - What You Need To Know
                By Diana Gray, Principal Curriculum Product Manager, Oracle University
                Diana writes, "Did You Know?

                MySQL Cluster automatically shards data across data nodes on separate hosts which means that your database performance scales naturally as you add more nodes.

                Data nodes belong to node groups that replicate data internally so that if one data node fails, another data node carries on working with a copy of the failed node's data. This ensures high availability as well as scalability..."

                IT - Cloud
                x
                3 Elements for Success for the FISMA High Cloud
                GCN, September 17th, 2014
                "As federal agencies continue to consider public or commercial cloud services as a way to cut costs and improve IT service delivery, security concerns remain a major deterrent, especially when it comes to migrating mission-critical workloads.

                Recent industry studies show that a majority of organizations (51 percent) still consider their effectiveness in securing data and applications in the cloud to be 'low,' with only 26 percent rating their effectiveness as 'high'..."

                3 Things Your CIO Wishes You Knew About the Cloud
                Business 2 Community, September 17th, 2014
                "Depending on who you talk to, the cloud is either (A) the future of business (and personal) computing, (B) a ruse by providers to get everybody stuck paying ever-increasing rates, (C) an epidemic of security breaches waiting to happen, or (D) an overhyped development that will lead to some interesting technological advancements but won't ultimately be all that earthshattering. So what is a business leader to do when faced with the decision of whether to move to the cloud? ..."
                72% Of Businesses Don't Trust Cloud Vendors
                Help Net Security, September 17th, 2014
                "There is widespread mistrust of cloud providers across Europe with seven in 10 businesses accusing them of failing to comply with laws and regulations on data protection and privacy, according to Netskope and The Ponemon Institute.

                The study shows that 53% of respondents said the likelihood of a data breach increases due to the cloud, and the Ponemon Institute study also found that data breaches increase the expected economic impact by as much as three times when they involve the cloud..."

                  Cloud Computing under Siege
                  Federal Computer Week, September 12th, 2014
                  "The benefits of cloud computing can hardly be overstated. By pooling computing resources, cloud computing not only offers significant cost savings over traditional software and hardware products, it facilitates innovation by allowing users, businesses and governments to procure, rapidly and cheaply, a diversity of software, analytics and storage services.

                  The global market has clearly noted these advantages: In 2014, companies are expected to spend more than $100 billion on cloud services globally..."

                  Emerging Cloud Threats and How to Address Them
                  Help Net Security, September 15th, 2014
                  "As organizations deploy and harness private, community and hybrid clouds, they encounter new types of threats, along with the old ones they've been battling for years. Many of these threats come from sharing physical, virtual, and software infrastructure with other clients of varying security postures, and relying on a cloud provider to implement the right security measures. Public and community clouds can be appealing targets for hackers looking to disrupt or steal information from scores of organizations with one successful strike.

                  Here are some emerging security threats and issues cloud providers and their clients should be aware of..."

                  Feds Hesitate Moving IT Services to the Cloud
                  Information Week, September 11th, 2014
                  "Government agencies know the benefits of cloud computing and want to double its use. But when it comes to migrating applications to the cloud, the majority of feds -- 89% -- are hesitant to lose control of their IT services, according to a new MeriTalk report..."
                  This is What's Holding the Public Cloud Back
                  Network World, September 16th, 2014
                  "My colleague Brian Eastwood has a fine piece over at sister-site CIO.com this week about how Boston Children's Hospital responded to DDOS and other attacks made on the institution. My big take away from it is that this is an example of why some institutions will likely never go all-in with the public cloud..."
                  vBeers-SF
                  x
                  vBeers @ Miami - Biscayne Tavern - Wed Sept. 24th
                  6pm - 9pm
                  Come out and connect with other IT professionals! vBeers is a great event meant to promote growth of the IT industry here in South Florida. Register today so you can be a part of this great monthly event! Feel free to invite all of your friends and co workers who work in the IT industry!

                  This will be a Sponsored event so beers are on us. Join us for an evening of creating connections and building your network in a relaxed and fun environment. There is absolutely NO SALES PITCH, just FREE ice cold beers and tech talk!

                  "Meet-Ups" are an essential aspect of your professional growth and development. Connect with an array of professionals while enjoying a drink or two.

                  • Biscayne Tavern (Inside of the B2 Hotel)
                  • 146 Biscayne Blvd
                  • Miami, FL 33132

                  Please register and share this invitation with your IT colleagues and encourage them to attend!

                  IT - PM
                  x
                  You Can't Wear the Manager and Developer Hats at the Same Time
                  ComputerWorld, September 1st, 2014
                  "Here's something that never works out well: A small project comes along, one that doesn't necessarily need a full-time project manager. So it's decided that one of the developers on the project can double as the project manager. After all, who better understands what needs to be done than the developer?.."
                    IT - Networks
                    x
                    Rogue IPv6 Devices on Company IPv4 Networks are Bad for Business
                    TechRepublic, September 17th, 2014
                    "In 2009, TechRepublic, in this article, advised that most if not all computing devices are IPv6-enabled. And not paying attention to that fact could lead to lots of trouble.

                    Today, five years later, Frank Herberg in this Switch Security paper raised the warning once again. Herberg mentioned IPv6 being enabled turned on autoconfiguration functionalities."

                    More to the point, Herberg wrote, "Network operators and security people who have neither basic IPv6 experience nor measures in place to detect IPv6-related attacks run a real risk..."

                    Six Considerations for Big Data Networks
                    SearchSDN, September 15th, 2014
                    "When we think about big data, we associate it with the term big, but when it comes to building infrastructure, we should also be thinking distributed.

                    Big data applications do, in fact, deal with large volumes of information that are made even bigger as data is replicated across racks for resiliency. Yet the most meaningful attribute of big data is not its size, but its ability to break larger jobs into lots of smaller ones, distributing resources to work in parallel on a single task..."

                    IT - Operations
                    x
                    Build It or Buy It: Questions to Ask About Your Metro Data Center Network Infrastructure
                    Network World, September 11th, 2014
                    "The advantages of moving data centers to remote locations are clear: space is lower-cost, power is cheaper and geographic diversity is built in. Google, Amazon and others, for example, have located large data centers in rural Washington State close to hydroelectric dams that deliver low-cost green power. But these locations are up to 300km away from the closest regional points of presence in Seattle or Portland, which challenges the old model of building siloed metro and regional networks..."
                    New Data Center Protects Against Solar Storms and Nuclear EMPs
                    ComputerWorld, September 15th, 2014
                    "In Boyers, Pa., a recently opened 2,000-sq.-ft. data center has been purpose-built to protect against an electromagnetic pulse (EMP), either generated by a solar storm or a nuclear event.

                    The company that built the facility isn't disclosing exactly how the data center was constructed or what materials were used. But broadly, it did say that the structure has an inner skin and an outer skin that use a combination of thicknesses and metals to provide EMP protection..."

                      Optimizing Data Center PUE
                      Network Computing, September 12th, 2014
                      "Data center managers are under pressure to improve utilization and efficiency while maintaining high availability. Here are three ways to achieve that balance.

                      In today's environment, IT and infrastructure real-time operating decisions often are made within different areas of an organization without regard for the potential impacts on each other as various control levers are pulled. These actions may even be in direct conflict with the service level agreement (SLA), efficiency efforts, and power usage effectiveness (PUE) requirements, as meaningful data and overall system visibility are difficult to obtain..."

                      World's Hot Alternative Energy Projects
                      Network World, September 15th, 2014
                      "Solar energy projects may get the most hype but there are many other alternative energy projects being developed across the globe. Here we take a look at some of the more interesting ventures..."
                        IT - Security
                        x
                        5 Myths: Why We are All Data Security Risks
                        Dark Reading, September 15th, 2014
                        "I am absolutely sure that I could be tricked by a well-crafted spear phishing attack, and I am equally sure I could do the same to you. With new breaches announced almost daily, it's pretty clear that we are making little progress against attacks. And, the reason for this is twofold. First, hackers are growing in sophistication, which leads to far more complex and creative approaches. Second, there is far too much misinformation leading to a false sense of security. The myths below serve as prime examples..."
                        Adopting a Multi-Pronged Approach to Cyber Risk
                        Information Management, September 15th, 2014
                        "Insurance companies are facing new and growing cyber risks and need to develop a comprehensive, multi-pronged approach to address them, according to panel of Deloitte & Touche executives who spoke on the topic earlier this week..."
                          7 Reasons to Love Passwords
                          Dark Reading, September 17th, 2014
                          "Passwords get a lot of abuse. With every data breach come outcries for ever-stronger passwords or, better yet, no passwords at all. "Trash those combinations of letters, numbers, and special characters," they say, "and get yourself some biometrics and a hardware token."

                          Certainly the humans who use weak passwords deserve a modicum of ridicule or censure, but that doesn't mean that all passwords themselves are bad..."

                            Data Privacy Etiquette: It's Not Just for Kids
                            Dark Reading, September 17th, 2014
                            "Children are the innocent victims of the worst effects of social media. That's why it's vital for adults to establish privacy values that are safe for them -- and the rest of us.

                            I'm sure we've all had that awkward moment: A friend or family member posts an update and tags you or includes you in a photo, and suddenly you're wishing you could turn back time to stop the post before it ever happened..."

                              How to Talk Infosec with Kids
                              Help Net Security, September 17th, 2014
                              "As cybersecurity professionals, we know first-hand how the cyber world is filled with battles between good and evil. But do your kids know that? If you're a parent, like me, chances are you're concerned about your kids using the Internet.

                              As they live digital lives, we need to become digital parents. You'd think that would come easily, given that we work in cybsersecurity, but I'm continually surprised to hear how many of my tech colleagues don't talk about the dangers they see on their screens at work back at home with their kids..."

                                Internet of Things Devices Are Doomed
                                Dark Reading, September 15th, 2014
                                "Security researchers hack Canon printer firmware to run the classic 90s video game Doom as well as to wreak havoc with other manipulations. Security researchers are telling a story of Internet of Things (IoT) Doom, but it might not be exactly the doom you expect: Last week at 44Con in London, a researcher showed off a hack of a vulnerability in a Canon Pixma printer that made it possible to remotely modify the printer's firmware so that its LED indicator screen could run the classic first-person-shooter game, Doom..."
                                The Security Skills Shortage No One Talks About
                                Information Week, September 17th, 2014
                                "Seventy-five percent of chief information security officers (CISOs) say that someone on their team is asked to speak in front of the board of directors or CEO at least once a year, a CEB survey finds. Sixty-seven percent of information security professionals across all roles say they interact with a business partner outside security at least daily, a similar survey finds..."
                                Worm Illuminates Potential NAS Nightmare
                                Dark Reading, September 15th, 2014
                                "A researcher who so far has discovered 30 zero-day vulnerabilities in a dozen major network-attached storage (NAS) vendor products is creating a computer worm to demonstrate just how easy it would be for cyber criminals and other hackers to exploit flaws he found in these devices.

                                Jacob Holcomb, a security analyst at Independent Security Evaluators, has rolled multiple exploits for vulnerabilities he's already reported to NAS vendors into a proof-of-concept, self-replicating worm. The worm scans for vulnerable services running on NAS systems -- mostly web servers -- and identifies the type of NAS device and whether it harbors the bugs. If so, the worm launches the corresponding exploit to take control of the device. Then, like any good worm, it spreads to other NAS systems..."

                                Your Configuration Files are Showing
                                CSO Online, September 11th, 2014
                                "One of my favorite activities is using search engines to hunt for things that, realistically, I should not be able to find. Recently, I was able to find thousands of sites with their databases exposed. This time I was able to unearth a treasure trove of configuration files on a wide range of devices. These configuration files showed routes, rules and even passwords.

                                The part that I find particularly odd is, why would this ever be made accessible in the first place? In some cases this is just poor set up on the part of the administrators. In other cases it is just poor design of the products. In one case I found a series of FTP servers that were exposing their configurations including passwords..."

                                  Four Ways to be a Dum-Dum About Your Online Passwords
                                  Business 2 Community, September 12th, 2014
                                  "Okay, so maybe you're not an attractive celebrity who has to worry about your cloud storage account being targeted and compromised, and about those naughty selfies you took being exposed to a voyeuristic public. Apple has since informed us that based on their investigations, these particular accounts were compromised by 'a very targeted attack on user names, passwords and security questions, a practice that has become all too common.' Setting aside all opinions about whether capturing those kinds of images in the first place is a good idea, and whether perpetual privacy of anything we store or post in the cloud is a reasonable expectation, let's use this high-profile case as yet another reminder that we need to be smarter about our online passwords..."
                                  No Short-Cuts to IT Security, Canadian Retailers Warned
                                  IT World Canada, September 12th, 2014
                                  "Security is more than putting up another firewall, expert says

                                  Retailers around the world are reeling from an avalanche of data thefts this year, leaving many paralyzed about what to do. But a Canadian security expert warned retailers here not to take short-cuts to stem the flow.

                                  'The solution is to treat cybersecurity as a whole business issue, and not just look at operations and technology,' Kevvie Fowler of KPMG Canada told the Retail Council of Canada's theft prevention conference in Toronto on Thursday..."

                                  Privacy, Security & the Geography of Data Protection
                                  Dark Reading, September 11th, 2014
                                  "Data generation is global, so why do different parts of the world react differently to the same threat of security breaches and backdoors?

                                  When Edward Snowden took center stage last summer exposing the NSA's intelligence-gathering practices, he caused a wave that's still rippling through the security industry. Snowden put his finger on the industry soft spot: Why do we protect data? From whom are we trying to prevent intrusion?..."

                                  IT - Careers
                                  x
                                  9 Signs Your Boss Hates You
                                  Information Week, September 17th, 2014
                                  "More than a quarter of managers have an employee they'd love to see leave the firm, according to a 2013 CareerBuilder survey. That's bad news for IT pros, when a long line of job seekers stand ready to take the place of anyone who can't get along with bosses or play nicely with co-workers. But how can you tell if you're on the boss's hit list? These signs spell cause for concern. Consider your options before you address them..."
                                    The Curious Histories Of 10 Common Computer Messages
                                    IT World, September 15th, 2014
                                    "Recently we learned that former Microsoft CEO Steve Ballmer was the author of one of Windows' more notorious blue screen messages. It.s one of a number of messages that our computers communicate to us so often that they earn permanent spots in our collective consciousness. These include error messages as well as informational notes and are often in words but can also be communicated in other ways, such as through graphics or sounds..."
                                    The Top 5 Things You Should Never Do at Work
                                    Forbes, September 2nd, 2014
                                    "I had an 18-year corporate career in publishing and marketing that was highly successful on the outside, but on the inside, it was not. I rose to the level of Vice President and managed multimillion-dollar budgets and global initiatives, but throughout my career, I faced a number of excruciating experiences of gender discrimination, sexual harassment, work-life balance failures, chronic illness and exhaustion, being sabotaged and betrayed by colleagues, and the continual nagging feeling that I was meant for different work (but simply couldn't figure out what it was)..."
                                      IT - Email
                                      x
                                      Net Neutrality: 5 Things to Know
                                      Information Week, September 17th, 2014
                                      "Over three million comments have been filed with the Federal Communications Commission over its "open Internet proposal," which critics contend will allow undesirable data discrimination, in violation of "Net neutrality" principles.

                                      The FCC has proposed new rules governing broadband providers because a court rejected regulations put into place in 2010..."

                                      Top IT Vendors Reveal their IoT Strategies
                                      Network World, September 15th, 2014
                                      "The Internet of Things (IoT) continues to grab headlines - as well as the attention of IT vendors looking to tap into the growing market for IoT-related products and services.

                                      Not surprisingly, vendors are taking varied approaches to IoT, based on their own strengths. 'The big vendors generally understand the importance of building interoperable platforms and they are helping lead this development,' says Daniel Castro, senior analyst at the Information Technology & Innovation Foundation, a research and educational institute..."

                                      Why Email is Worth Saving
                                      Dark Reading, September 12th, 2014
                                      "Imagine a world where companies, governments, and individuals could send an email to anyone, and both the sender and receiver had a reasonable expectation that the communication therein was authentic. How would such lunacy change the dynamics of online messaging, end-user protection, and anti-fraud?..."
                                        IT - Database
                                        x
                                        10 More Do's and Don'ts for Faster SQL Queries
                                        InfoWorld, September 17th, 2014
                                        "Everyone wants faster database queries, and both SQL developers and DBAs can turn to many time-tested methods to achieve that goal. Unfortunately, no single method is foolproof or ironclad. But even if there is no right answer to tuning every query, there are plenty of proven do's and don'ts to help light the way. While some are RDBMS-specific, most of these tips apply to any relational database..."
                                        IT - Backup
                                        x
                                        Overcoming Challenges when Integrating Disk Backup Appliances with Veeam
                                        Storage Switzerland, September 18th, 2014
                                        "There is a new breed of backup applications that is gaining acceptance in data centers of all sizes, including the enterprise: VM Specific Backup Applications. These solutions were designed from the ground up, with virtualization in mind and they do their best to fully exploit the virtual environment. According to Storage Switzerland's research, this new category of products, led by Veeam, represent the fastest growing segment of the data protection market. The challenge facing IT designers is making sure the rest of the environment can take full advantage of the capabilities of these new software solutions..."
                                          IT - Mobile
                                          x
                                          75% of Mobile Apps Will Fail Basic Security Tests
                                          Help Net Security, September 15th, 2014
                                          "Through 2015, more than 75 percent of mobile applications will fail basic security tests, according to Gartner. Enterprise employees download from app stores and use mobile applications that can access enterprise assets or perform business functions, and these applications have little or no security assurances. These applications are exposed to attacks and violations of enterprise security policies..."
                                          Is a Remote-Wipe Policy a Crude Approach to BYOD Security?
                                          Network World, September 16th, 2014
                                          "It's a good bet the Bring Your Own Device (BYOD) policy your employees mindlessly signed gives the right to remotely wipe their lost or stolen phone or tablet. It's an even better bet that they're not OK with it.

                                          Email data protection company ZixCorp commissioned a survey of more than 1,000 employed individuals and found that seven out of 10 would avoid using a personal device for work if they knew an employer could remotely wipe it. Yet two-thirds say they are allowed to use their device to access company information..."

                                          Want Lithium-Ion Batteries to Last? Slow Charging May Not Be the Answer
                                          IT World, September 14th, 2014
                                          "New research by a California-based team could change the way lithium-ion batteries are charged in consumer electronics products and electric cars, leading to longer lifetimes and more useful batteries.

                                          The work, published on Sunday in the Nature Materials journal, challenges the commonly held notion that slowly charging a battery helps prolong its life and that it's damaging to a battery if a large amount of energy is withdrawn in a short time..."

                                            IT - Big Data
                                            x
                                            Big Data is Paying Off
                                            Insurance Networking News, September 17th, 2014
                                            "A recent Accenture study of 1,000 executives finds 82 percent say that big data 'provides a significant source of value for their companies.'

                                            What kind of value might that be? Benefits cited include finding new sources of revenue (56 percent), new product and service development (50 percent), winning and keeping customers (47 percent), and enhancing the customer experience (51 percent)..."

                                            Data Acceleration: A Technology Architecture for High Speed Insights
                                            Information Management, September 12th, 2014
                                            "Does your organization still think in terms of 'windows of opportunity'? Given the rapid pace of change driven by customers and technology, opportunity today tends to appear in cracks rather than windows. This is why accelerating insights from data is the most critical function of your data supply chain.

                                            Recently, I wrote about what makes a modern data supply chain. In short, a data supply chain enables data to flow easily through an organization to unlock the real value of its data - and a competitive advantage. Acceleration is the next battleground in data. An enterprise that generates actionable insights from data faster than its rivals can outperform them..."

                                            Data Scientists want Big Data Ethics Standards
                                            Information Week, September 17th, 2014
                                            "The vast majority of statisticians and data scientists believe that consumers should worry about privacy issues related to data being collected on them, and most have qualms about the questionable ethics behind Facebook's undisclosed psychological experiment on its users in 2012..."
                                            Don't Fear Big Data Complexity
                                            SearchBusinessAnalytics, September 15th, 2014
                                            "Complexity is considered an enemy of most IT projects. The goal is typically to simplify and tame sprawling hardware and application implementations. But when it comes to big data, this general rule may not apply.

                                            No doubt about it, big data complexity is growing. Today there are separate tools for ingesting data, storing data, transforming data, moving data, analyzing data and visualizing data..."

                                            Tracking The Intersection on Big Data and Mobile Data Trends
                                            Business 2 Community, September 12th, 2014
                                            "Big data is viewed as a medium by which companies can grow their business through the process of targeting the enhancement of productivity using analytics and wide database of information. Business data provides a wealth of information that can help companies do business with better competence in addressing the changing marketing trends within their respective marketing industry. When harnessed properly it can serve a significant purpose to help companies grow their business..."
                                            What is Data Science - Again?
                                            Information Management, September 15th, 2014
                                            "One of my colleagues recently asked if I'd do him a favor and discuss opportunities with a 'data scientist' friend of his. I agreed, and the friend and I had a nice discussion about his insurance/risk modeling background. Over the years, he's done interesting work combining knowledge of the industry with SPSS predictive models, supported by the data engineering capabilities of his company's IT department. In the end, though, I confided to my colleague that I pegged the friend as a business analytics expert rather than as a data scientist..."
                                            Top10
                                            x
                                            Top Ten Articles for last few Issues
                                            Vol 199 Issues 1 and 2; Vol 198 Issues 1, 2, 3, 4 and 5; Vol 197 Issue 4
                                            We track how frequently each article is viewed on the web site to determine which the readers consider the most important. For last week, the top 10 articles were:

                                            • Build Your Own Exadata? Questions that make you go Hmmmm.
                                            • How to Optimize Your Enterprise Storage with Oracle Solaris ZFS
                                            • Oracle VM VirtualBox 4.3.16 Released
                                            • Guide to Database as a Service (DBaaS) Part 1
                                            • GlassFish Server Open Source Edition 4.1 Released
                                            • Guide to Database as a Service (DBaaS) Part 2
                                            • Big Data SQL is Generally Available
                                            • Oracle Executive Keynotes to Address Complexity, Cost, Cloud, and Transformational Technologies
                                            • Oracle WebLogic Server 12.1.3
                                            • Big Data Reservoirs: Getting from Big Data to Valuable Data

                                            The longer version of this article has list of top ten articles for the last 8 weeks.

                                              IT - Server
                                              x
                                              Unix: Scripting with Templates
                                              IT World, September 14th, 2014
                                              "Whenever you have worked out the perfect logic in the script you're preparing, do one more thing. Take a reusable snapshot of the logic you've written and tested and save it in a template for the next time you need to do something similar. You'll save yourself both development and debugging time.

                                              Work out the syntax for various things that you might do routinely in your scripts -- especially anything you do that might be fairly complicated. Set up examples in a directory and use them to get a head start on your coding. Here are some examples:.."

                                                Developer
                                                x
                                                Oracle Developer Cloud Service is Live!
                                                cloud-based software development Platform as a Service (PaaS)
                                                Greg Stachnick writes, "Oracle Developer Cloud Service is a cloud-based software development Platform as a Service (PaaS) and a hosted environment for your application development infrastructure. With the Oracle Developer Cloud Service, development teams can maximize productivity with instant access to Application Lifecycle Management (ALM) tooling as well as team collaboration and management utilities in addition to seamless deployment to the Oracle cloud platform. Oracle Developer Cloud Service provides an enterprise-grade platform to develop, collaborate, and deploy applications within the Oracle Cloud with support for on-premise deployment and GitHub integration..."
                                                Sysadmin
                                                x
                                                How-To: Creating Oracle Solaris 11 Zones
                                                With Ops Center
                                                Owen Allen writes, "If your environment uses Ops Center, you can use a profile to quickly create new zones with a specific setup. The profile specifies the OS version, zone configuration, storage, and file system for the zone. Once you've created a profile, it automatically generates a deployment plan, which you can run to create a new zone. At runtime you specify the target system, and the name, IP address, and network resources for the new zone, edit any of the info from the profile if you want, and schedule the zone creation.

                                                We've put together a how-to that walks you through the whole process, so take a look..."

                                                Trending in
                                                Vol 231, Issue 4
                                                Trending IT Articles