News about Oracle's Solaris and Sun Hardware
System News
Sep 29th, 2014 — Oct 5th, 2014 Generate the Custom HTML Email for this Issue
System News System News for Sun Users
Volume 200, Issue 1 << Previous Issue | Next Issue >>
Sections in this issue:
click to jump to section

Friday Spotlight: Highlights from Oracle OpenWorld 2014
By Honglin Su

Honglin writes, "At Oracle OpenWorld 2014, Renée J. James, President of Intel Corporation, shared her keynote on, "The Future of the Data Center in a Software-Defined World". She talked about Intel's Next Generation Firewall (NGFW) for Oracle VM...

During the keynote, Steve Grobman, Intel Fellow and CTO of Intel Security Platforms showed the NGFW demo with Oracle VM Manager:..

Steve articulated the key values of the joint solution from Intel and Oracle:

  • Scalable and fast deployment of the virtual firewall instances powered by Oracle VM Templates
  • Fast and secure VM migration orchestrated by Oracle VM Manager
  • And better datacenter protection.

You can watch the keynote replay here.

Oracle Software in Silicon Cloud
Early access to revolutionary Software in Silicon technology to dramatically improve reliability and security, and accelerate application performance
Oracle Software in Silicon Cloud provides developers a ready-to-run virtual machine environment to install, test, and improve their code in a robust and secure cloud platform powered by the revolutionary Software in Silicon technology in Oracle's forthcoming SPARC M7 processor running Oracle Solaris. This hardware-enabled functionality can be used to detect and prevent data corruptions and security violations. Test workloads have demonstrated average results of 40x faster than software-only tools, with some tests showing it's more than 80x faster. This performance advantage illustrates the capability to eventually be always-on in production and not limited to test environments.

Oracle Software in Silicon Cloud users will have access to the latest Oracle Solaris Studio release that includes tools to detect numerous types of memory corruption errors and provide detailed diagnostic information to aid developers in quickly improving code reliability.

Code examples, demonstrations, and documentation will help users more quickly exploit the unique advantage of running applications with Software in Silicon technology.

Software in Silicon features implemented in Oracle's forthcoming SPARC M7 processor include:...

Java Technology
Java Magazine: What Will You Build Today?
Sept/Oct 2014
"When was the last time you built something, just for the fun of it? Maybe it was yesterday, and that's great. But if it's been a while, we hope the latest issue of Java Magazine will inspire you. It celebrates the spirit of making and the people who are creating new and innovative technologies and services.

In our interview with Dale Dougherty, Make: magazine founder and Maker Faire co-creator, we explore what's behind the growing Maker Movement and how it relates to software development..."

Read the [url " "latest issue"] of Java Magazine today.

Oracle Shares Key Updates on Java Platform, Enterprise Edition
Also introduces GlassFish Server Open Source Edition 4.1 at JavaOne 2014

Ubiquitous across the technology landscape, Java is the world's most popular programming language and serves as the backbone of countless innovative technologies. As the global standard in community-driven enterprise software, Java Platform, Enterprise Edition (Java EE) is a vital platform for the development and delivery of enterprise-grade applications and services. To that end, Oracle and the Java community are constantly innovating to drive Java EE forward and deliver value to end-users. At JavaOne 2014, Oracle highlighted key updates to the Java EE platform, including upcoming groundbreaking features in Java EE 8, and also introduced the latest version of GlassFish Server Open Source Edition 4.1.

Oracle Introduces the Latest Release of Oracle Java ME Embedded
Oracle Java ME Embedded 8.1 Opens New Opportunities in the Embedded and Internet of Things Market
As the Internet of Things (IoT) movement continues to drive technology innovation and transform how we work and live, organizations are seeking open and cross-industry platforms that can decrease time to market, lower costs and deliver new capabilities for embedded devices. To help customers address these needs, Java Platform, Micro Edition (Java ME) provides comprehensive support for market-leading embedded chip architectures and new binaries for ARM architecture-based developer boards. At JavaOne 2014, Oracle introduced Oracle Java ME Embedded 8.1, which expands the availability of Oracle Java ME Embedded to new platforms and opens new opportunities in the embedded and IoT market.
Oracle Highlights Continued Java SE Momentum and Innovation at JavaOne 2014
Java community continues to embrace Java SE 8, rallies for Java SE 9

Whether you're making a bank transaction, transmitting a picture from a smart phone, or driving a car, there is almost no technology in the world that Java does not touch. Oracle continues to work closely with key partners in the Java ecosystem to deliver new innovation to Java Platform, Standard Edition (Java SE) that will support the fast pace of life and business today and well into the future. At JavaOne 2014, Oracle will highlight these advancements and the rapid adoption of the latest release of Java SE 8. Oracle will also show how it's working in the OpenJDK Community to lay the groundwork for Java SE 9.

Using JVM Diagnostics (JVMD) to help tune production JVMs
By Shiraz Kanga
Shiraz Kanga, writes, "Tuning a production JVM involves more than merely adding more RAM to it via the -Xmx parameter. It depends upon an understanding of how your application truly behaves in a production environment. Most JVM tuning is done by developers with a simulated load in their Development or QA environment. This is unlikely to be truly representative of the production load running on production hardware with regards to proper JVM tuning.

One of the tools that actually contains real-world production data is JVM Diagnostics (JVMD). Hence it is a good idea to use data collected by JVMD for tuning your production JVMs. Note that JVMD is a component of Oracle Enterprise Manager, licensed as part of both Weblogic Management Pack and the Non-oracle Middleware Management Pack..."

IT - Technology
Tech in Far-Flung Settings
Information Week, September 29th, 2014
"Forget the selfie by the hotel pool. Here's a gorgeous collection of images featuring computers in exotic, hard-to-reach, or simply startling settings.

These pictures underscore an overlooked truth: Information technology permeates our world. Thanks largely to advances in mobile technology, people in remarkably remote places are carrying smartphones or other kinds of connected devices, allowing them to share pictures and videos with each other and the world. By one estimate, more than 758 million photographs are shared on &#8234;social media every day..."

    The FBI's Big, Bad Identification System
    Network World, September 25th, 2014
    "This month the FBI pronounced its powerful new crime fighting weapon -- the Next Generation Identification -- is at full operational capability. NGI replaced the Integrated Automated Fingerprint Identification System (IAFIS), the Bureau's longstanding repository for fingerprints. But that's not all it does. NGI uses a variety of high-tech tools and algorithms to combat all manner of offenses. Here we take a look at some of the tools the FBI will be using..."
      Welcome to the Age of Pervasive Supercomputing
      ComputerWorld, September 30th, 2014
      "Human beings tend to take incremental change in stride. For example, the loaf of bread that was 50 cents a few decades ago that now costs $3 isn't a big deal to us because the price rose gradually and steadily year by year. What we aren't adapted for is exponential change. Which explains why we tend to be taken by surprise by developments that involve digital technologies, where order-of-magnitude improvements, driven by Moore's Law, occur continuously..."
        New nanomaterial introduced into electrical machines, October 2nd, 2014
        "Lappeenranta University of Technology in Finland has constructed the world's first prototype electrical motor using carbon nanotube yarn in the motor windings. The new technology may significantly enhance the performance.

        Engineers of LUT have constructed the world's first electrical motor applying a textile material; carbon nanotube yarn. The presently most electrically conductive carbon nanotube yarn replaces usual copper wires in the windings. The motor prototype is built by the LUT Electrical Engineering group as a start towards lightweight, efficient electric drives..."

        Free and Open Source S/W
        New And Updated FOSS Components In Oracle Solaris 11.2
        Many FOSS components are delivered as part of Solaris

        There is number of new and modified Free and Open Source Components (FOSS) in Oracle Solaris 11.2. The following information covers FOSS components delivered as part of Solaris Userland.

        This blog lists the new and updated components.

        IT - Bitcoin
        A Magna Carta for Bitcoin
        Bitcoin Magazine, October 1st, 2014
        "The Constitution is a living document. The Bible is a living document. The manifesto for the Pepsi logo is a living document and the Bitcoin white paper is breath, a breath of fresh air. Yes, this document is a representation of pure mathematical truth; however, I believe we are at fault if we are to assume 'truth' is ubiquitously understood by the masses, or, that the white paper is a system of values and virtues the masses can empathize with..."
        The Rise of Remittance
        Bitcoin Magazine, October 2nd, 2014
        "Bitcoin advocates often emphasise that the cryptocurrency's greatest impact will be on the 'other 6.5 billion' people who have otherwise been excluded from modern financial tools and services. But far from being the magic bullet that Bitcoin appears to be on paper, bringing it to the mainstream in the developing world involves a multidisciplinary initiative capable of surmounting some significant challenges..."
        United Way Reveals Why It Became Bitcoin.s Biggest Charity
        CoinDesk, September 30th, 2014
        "United Way Worldwide began accepting bitcoin donations to support its Innovation Fund earlier this month, a move that was widely discussed, given that United Way is one of the largest privately held nonprofits in the world, raising more than $5bn annually.

        Nearly 20% of the contributions the Innovation Fund receives are from people employed by corporate partners, including Bank of America, Exxon Mobile, General Electric, ING Group, JPMorgan Chase & Co and the National Football League (NFL). However, according to United Way executive VP and chief strategy officer Evan Hochberg, bitcoin is a way to bolster individual contributions to the Innovation Fund..."

        Georgia Tech Integrates Bitcoin into Student Payment Cards
        CoinDesk, October 1st, 2014
        "The Georgia Institute of Technology has become the first university to integrate bitcoin into its students' dining and shopping experience.

        Campus payment cards, known as BuzzCards, can now be topped up with the digital currency at the university's BuzzCard Centre, located inside its bookstore..."

        Bitcoin Could Transform Internet of Things into Vast Data Marketplace
        CoinDesk, October 3rd, 2014
        "As sportswear giant Nike expands its wearable technology applications, it will need more data to feed its gadgets and software.

        To do that will be a simple matter in the future. A Nike executive will simply pull up a list of sensors operated by a private weather station, selecting the ones from which she would like to buy data.

        With a click, the executive will pay individual sensors - perhaps thermostats mounted in a Central Park pathway particularly favoured by joggers - for their data, using bitcoin..."

        Bitcoin And The March Toward A Decentralized Future
        CryptoCoinsNews, September 29th, 2014
        "In a brilliant essay on Bitcoin and the promise it holds for a decentralized future (published on the Pirate Party founder Rick Falkvinge's website), Nozomi Hayase explains the disruptive potential of Bitcoin.

        Bitcoin could change the remittance industry as we know it, revolutionize banking and redistribute economic power to the under-privileged. It could also transform the current global political hierarchy.

        The author begins her essay by addressing the concerns of skeptics who claim that Bitcoin is in the hands of a tiny elite..."

        Top 10 Things Bitcoin Can Offer The World
        CryptoCoinsNews, October 1st, 2014
        "People who are new to Bitcoin are led to believe that Bitcoin is just a currency or a store of value. This couldn't be further from the truth. Bitcoin, as a currency, is just the beginning. It is only Bitcoin's first 'app,' like email was how the Internet was first introduced to the masses. The Internet is so much more than just email; similarly, we haven't even scratched the surface to what Bitcoin is..."
        Moving Oracle Solaris to LP64 bit by bit
        By Allan Coopersmith
        Allan writes, "A few people have noticed a trend in the Oracle Solaris 11 update releases of delivering more and more Solaris commands as 64-bit binaries, so I figured it was time to write a detailed explanation to answer some of the questions and help prepare users & developers for further change, as it now becomes more critical to deliver shared objects in both 32-bit (ILP32) and 64-bit (LP64) versions.

        I'd like to thank Ali, Gary, Margot, Rod, and Jeff for their feedback on this post, and most especially to Sharon for helping rework it to get to the most important bits first.

        For the developers and administrators who are familiar with Solaris history, I'll start with info about what you should be doing to make sure you're ready for increased use of 64-bit software in Solaris..."

        MySQL Enterprise Monitor 3.0.15
        New features and bugs fixe
        Andy Bang writes, "We are pleased to announce that MySQL Enterprise Monitor 3.0.15 is now available for download on the My Oracle Support (MOS) web site. It will also be available via the Oracle Software Delivery Cloud in a few weeks. This is a maintenance release that includes a few new features and fixes a number of bugs. You can find more information on the contents of this release in the change log.

        You will find binaries for the new release on My Oracle Support. Choose the 'Patches & Updates' tab, and then choose the 'Product or Family (Advanced Search)' side tab in the 'Patch Search' portlet..."

        Cloud Computing
        Oracle Delivers Big Data Analytics in the Cloud
        Oracle Business Intelligence Cloud Service lowers barriers for BI adoption for organizations of all sizes
        While organizations accumulate data at unprecedented rates, pervasive business intelligence for every employee remains largely a pipe dream. Business analysts and IT have access to a wealth of data, yet everyday employees still struggle to obtain and analyze timely and relevant information. To enable all users to tap into the most pertinent data, whenever and wherever they need it, Oracle has introduced Oracle Business Intelligence Cloud Service (Oracle BI Cloud Service), a part of Oracle Analytics Cloud, which offers the most comprehensive analytics cloud suite on the planet. With built-in mobile capabilities, Oracle BI Cloud Service helps speed and improve decision-making across the organization by lowering the barrier to entry for users providing secure, comprehensive information access with the simplicity and cost-effectiveness of the cloud.
        Oracle Supports Government Customers with Expanded Government Cloud Solutions Portfolio
        Oracle adds human resources, enterprise resource planning, and sales offerings to Oracle Government Cloud platform

        The US federal government's Cloud First policy requires government agencies to leverage cloud computing benefits to improve IT flexibility and responsiveness, while also reducing costs. State and local agencies are likewise compelled to evaluate and pursue the benefits of cloud options. To help government organizations achieve these benefits, Oracle announced that Oracle Human Capital Management Cloud, Oracle Enterprise Resource Planning Cloud, and Oracle Sales Cloud solutions are now available through Oracle Government Cloud, expanding the capabilities offered through this highly secure platform. This is Oracle's second major addition of software-as-a-service (SaaS) solutions to Oracle Government Cloud, following the inclusion of Oracle Service Cloud last year. Oracle Government Cloud is a comprehensive, flexible, and cost-effective portfolio of cloud applications and solutions that extends and enhances Oracle's cloud presence with a secure offering built specifically for government.

        Oracle Unveils Latest Cloud Applications at Oracle OpenWorld
        Personalized, connected, and secure portfolio of cloud applications helps customers succeed in a digital world
        At Oracle OpenWorld, Oracle introduced Oracle Applications Cloud Release 9, including significant additions and updates to its full portfolio of software-as-a-service (SaaS) offerings. Oracle offers a modern cloud that is personalized, connected, and secure to deliver complete, best-of-breed functionality in the cloud that helps its customers succeed in a digital world. Oracle provides modern business practices for every function in the enterprise and a practical path to the cloud to help customers to achieve business goals.
        IT - Cloud
        21 Ways to Improve Cloud Purchasing
        Government Technology, September 25th, 2014
        "Not everyone is ready to curl up with nearly 80 pages of purchasing policy - no matter how important it is. One the other hand, everyone loves a board game, right?

        That's the premise behind our new 21 Steps to the Cloud infographic, which offers a relatively painless way to ease into the new Guide to Cloud Procurements from e.Republic's Center for Digital Government. The guide is an extensive collection of model contract language, guiding principles and recommendations designed to help government agencies get better at buying cloud-based services..."

          Architecting IT for Cloud Integration Platforms
          SearchCloudApplications, September 29th, 2014
          "It is important for enterprise architects to drive cloud integration choices forward or risk problems caused by separate lines of business taking the lead instead. "Sometimes you will use different integration solutions, and you can create a mess if you are not careful," said Benoit J. Lheureux, research VP responsible for the application infrastructure and middleware practice at Gartner. "You want to be thinking about whether or not there is a role as you scale up for central IT to help facilitate consumption of a consistent approach to doing integration with the cloud..."
          Cloud Computing Providers' Survival Chances are Hampering Adoption
, September 26th, 2014
          "Questions about the security, reliability and scalability of cloud computing technology have hampered widespread adoption for years.

          For example, one of the biggest questions on the tip of many firms' tongues when considering cloud revolves around their data security.

          These concerns stem from recent revelations regarding intelligence agencies, such as the NSA and GCHQ's mass surveillance practices, following the PRISM scandal..."

          Embracing the Hybrid Cloud
          Bank Systems and Technology, September 26th, 2014
          "While motives for banks moving to the cloud differ, the pressure to cut costs and get to market faster are major factors driving cloud adoption in the financial sector. In fact, Gartner believes that by 2016, budgets will drive over 60 percent of banks worldwide to process many of their transactions in the cloud..."
          Inside the NSA's Private Cloud
          Network World, September 29th, 2014
          "The National Security Agency (NSA) had a problem familiar to any enterprise IT manager executive: it was running out of space for hundreds of disparate relational databases that contain everything from back-office information to intelligence on foreign interests. And it needed to consolidate those databases to make it easier for NSA analysts to do their job..."
          Top Three Emerging Cloud Standards
          SearchCloudApplications, September 29th, 2014
          "Information Technology's great advances -- mainframes, minicomputers, personal computers and even virtualization -- all developed without significant support of standards. Yet standard APIs, operating systems and middleware seem essential today. Networking followed a similar path, with ad hoc TCP/IP defeating formal international standards like OSI, only to be challenged by software-defined and standards-based networking. The cloud..."
            When to Say No to the Cloud
            Network World, September 26th, 2014
            "With cloud adoption on the rise, should you jump on the bandwagon? Depending on your business needs, it may make more sense to wait.

            Cloud adoption rates are increasing as more organizations turn to a truly distributed infrastructure model and use more WAN-based tools. As underlying hardware components become better and more bandwidth becomes available, cloud computing has become a legitimate consideration for a wide array of industry verticals. Everyone should be either adopting it or at least considering it, right? Not so fast..."

            IT - CxO
            4 People Strategies that Together can Double Company Growth
            TLNT, October 1st, 2014
            "Technologies and processes continue to evolve, but how companies manage and develop employees hasn't improved over the past decade. As a result, companies miss out on unprecedented opportunities for growth.

            Gallup has discovered four (4) human capital strategies that combine in a powerful way to add up to 59 percent more growth in revenue per employee, and using them together leads to gains that more than double the effect of using any single strategy on its own.

            They call this the 'additive effect'..."

              5 New Truths to Teach Your CIO About Identity
              Dark Reading, October 1st, 2014
              "When CIOs talk security they often use words like "firewall" and "antivirus." Here's why today's technology landscape needs a different vocabulary...

              Modern businesses are more open than ever before, but that doesn't mean they are more secure. On the business side, companies are taking advantage of cloud computing by focusing on their internal competencies and outsourcing what they can to third-party vendors. On the consumer side, employees armed with devices are increasingly demanding flexible and frictionless access to data from anywhere..."

              CFOs . Vanguards or Villains?
              Information Management, October 2nd, 2014
              "I continue to get mixed signals regarding how advanced CFOs are with their journey to become a strategic adviser. Numerous articles describing the vision of CFOs and their staff after completing a successful financial transformation of their processes have been published in finance and accounting magazines and consulting firms' center of excellence websites. I, too, have written inspirational blogs and articles about accountants transitioning from bean counters to bean growers -- but I am unsure how much the evidence supports the vision..."
                Do You Think Like a State CIO?
                Government Technology, September 30th, 2014
                "A new survey from the National Association of State Chief Information Officers (NASCIO), released Sept. 30, shows that among IT leaders in state government, there's a degree of unity when it comes to planning and overseeing critical projects and what type of sourcing models organizations use -- two of three main focus areas of Charting the Course: Leading Collaboration During Uncertain Times. When it came to the third focus area -- using data as a strategic asset -- IT leaders weren't necessarily on the same page..."
                  The New CIO: C Stands for Change
                  Information Week, October 2nd, 2014
                  "What does the CIO role look like now, and what will it look like in the future? Experts at Interop New York share the key skills and traits that will soon separate the winners from the losers.

                  IT execs love to recount an old-school joke: CIO stands for 'career is over.' That joke dates back to a different time, when CIOs mostly dreaded making a bad vendor choice or botching an ERP project. Today's business climate depends on speed and agility more than statesmanship -- and CIOs dread falling behind the current pace and being deemed irrelevant..."

                  4 Outsourcing Lessons IT Can Learn from Automakers
                  Information Week, September 25th, 2014
                  "Automakers get 80% of a vehicle's components from suppliers. Why are they better at outsourcing than IT?

                  As many companies have discovered, much to their dismay, IT outsourcing doesn't always go as planned. In case after case, the lower costs, better service quality, and greater agility everyone was expecting turn out to be elusive. Looking for lessons in failed engagements has become a virtual pastime for the IT sector, yet the disappointments continue. Perhaps it is time to draw insights on outsourcing from another sector -- specifically from one that does a better job of it, the automotive industry..."

                  What Technology Execs can Still Learn from Steve Jobs ... and Aristotle
                  InfoWorld, September 29th, 2014
                  "Two years and 51 weeks after his death, Steve Jobs is still teaching the technology industry how to lead.

                  The latest lesson comes via a fascinating bit of research that explores the Apple co-founder's use of speech, including the classic rhetorical devices taught by Aristotle more than 2,300 years ago, and it links his success as a leader to them..."

                    Why Don't Buyers Want To Meet With Your Salespeople?
                    Forrester, September 29th, 2014
                    "Recently, I spoke with the CEO of a company who grumbled about the dozens of calls he receives from salespeople each week that land in his voicemail. He told me, 'They clearly don't even understand what business we're in' and 'They should know that their subject was for a person three layers below me.' When conducting a workshop on aligning their sales force with executive buyers later the same day, it was interesting to discover that this company's own inside sales team has a performance metric of making a minimum of 100 outbound calls to targeted executive buyers per rep per day..."
                    vBeers @ Broward - Funky Buddha - Wed Oct. 8th
                    6pm - 9pm
                    Join us for vBeers @ Broward. We meet on the 2nd Wednesday of each month in Broward. The meetings will be at Funky Buddha which is 5 minutes east of I95.

                    This event will be a non-sponsored event so bring your wallet, your sense of humor and get ready for some great IT and virtualization conversations with some of the best people in South Florida's IT community (including YOU!).

                    • Funky Buddha Brewery
                    • 1201 NE 38th St
                    • Oakland Park, FL 33334

                    Please Register.

                    Join us for one of the three South Florida vBeers events. The South Florida vBeers events happen three times a month, once per county:

                    IT - DR
                    Will the foundation of your Disaster Recovery plan collapse?
                    Storage Switzerland, September 25th, 2014
                    "The ability to replicate data between data centers as it changes is an essential ingredient of any enterprise class storage system. Data centers count on this capability as the foundational component in their disaster recovery (DR) plans. But this foundation is undergoing several seismic shifts that are making the very foundation of DR unstable and combined, and may cause the entire DR strategy to collapse. A DR plan failure can mean loss of revenue, regulatory fines and eventually may cause the failure of the business..."
                    IT - Networks
                    The Best Open Source Networking and Security Software
                    IT World, September 29th, 2014
                    "There's no shortage of excellent open source networking and security tools, and we've celebrated them all at one time or another. (Hint: See previous Bossies roundups or, more recently, "7 killer open source monitoring tools.") Here we were aiming for new and fresh, or at least fresh to us, and for indispensible tools that notched a big release in the past year..."
                    What is 'Open' SDN?
                    SearchSDN, October 2nd, 2014
                    "What is real 'open' SDN?

                    If you consult Merriam-Webster's dictionary for a definition of the word 'open,' you won't find a single clear and concise definition -- in fact, you will find 19 of them. So it's no surprise the landscape of SDN is also a bit confusing when it comes to the same concept of 'open,' which gets enthusiastically thrown around by vendors and standards-bearers alike. Looking at a few categories of 'open' may help to demystify the landscape..."

                    What's the Best Data Center Network Topology?
                    SearchDataCenter, October 2nd, 2014
                    "There's no one best data center network topology for every company. Once you understand the major topology options, it is easy to see which will work best for your network traffic, or get ideas to troubleshoot problems in your existing network..."
                      How IoT Affects Your Enterprise
                      Network Computing, September 25th, 2014
                      "If you're in IT, you've undoubtedly heard a great deal about the Internet of Things (IoT) and the Internet of Everything (IoE). A lot of the talk revolves around futuristic claims that are easy to ignore. But, in fact, enterprises are implementing IoT projects today. We'll cover what they're doing, and how you and your environment could be affected -- sooner than you might think..."
                      Why Deep Packet Inspection still Matters
                      TechRepublic, October 2nd, 2014
                      Deep Packet Inspection (DPI) is a technology that should offer much more weight than SPI (Stateful Packet Inspection)...

                      Security vendors like to throw around a lot of acronyms when discussing their technologies. However, many of those acronyms have much more weight than others. Take for example DPI (Deep Packet Inspection), a technology that should offer much more weight than SPI (Stateful Packet Inspection), at least when it comes to enterprise security..."

                      IT - Operations
                      Fuel Company Takes a Fresh Approach to IT Vendor Management
                      CIO, September 26th, 2014
                      "Global Partners started as a heating oil company whose technology strategy was limited to keeping the lights on. But as the company entered a period of rapid growth, the CEO became interested in what IT could deliver.

                      So when I came in, it was with the mandate to reshape IT from a utilitarian function into an agent of transformation. To accomplish this, we identified technologists who could blossom into business-oriented folks with a front-office technology mind-set. We launched an education program and overhauled the help desk, and within four years, IT became a vital part of the organization. One example is a new line of convenience stores, where we partnered with marketing to create a mobile payment and loyalty app. The key was to build that partnership from the start, as opposed to letting IT be an afterthought..."

                      How One User (Successfully) Managed the Amazon Cloud Reboot
                      Network World, September 30th, 2014
                      "Kevin Felichko didn't get as much sleep as he wanted to on Monday night.

                      Felichko is the CTO of, an online auction site of seized goods that is run entirely on Amazon Web Services' cloud' Late last week AWS announced that it would be rebooting up to 10% of the company's virtual machines, known as its Elastic Compute Cloud (EC2) instances. For a company like, which processes tens of millions of dollars worth of online auctions all through Amazon's cloud, that could have been a big problem..."

                      Procurement: What if We're Doing it Wrong?
                      Government Technology, September 23rd, 2014
                      "Ever since the botched launch of, procurement reform has become the rallying cry of the civic technology community.

                      There is now considerable effort being expended to reimagine the ways that governments obtain technology services from private sector vendors, with an emphasis being placed on new methods that make it easier for governments to engage with firms that offer new ideas and better solutions at lower prices. I've worked on some of these new approaches myself..."

                      IT - Security
                      Six Key Defenses against Shellshock Attacks
                      CSO Online, September 29th, 2014
                      "The number of attempts by hackers to compromise computers through the Shellshock vulnerability is rising, but companies have options for defending against attackers.

                      Shellshock is the name given to a set of at least six vulnerabilities in GNU Bash, the default command shell found in Linux, Unix and Mac OS X..."

                      Artificial Intelligence System can Predict Data Theft by Scanning Email
                      Network World, October 2nd, 2014
                      "Workers who may be tempted to sell confidential corporate data should think twice about what they write in an email - an AI-based monitoring system could be watching.

                      Tokyo-based data analysis company UBIC has developed an artificial intelligence system that scans messages for signs of potential plans to purloin data.

                      A risk prediction function is being added to an existing product from the company that audits email for signs of activity such as price fixing. The Lit i View Email Auditor has been used in electronic discovery procedures in U.S. lawsuits..."

                      Data Breaches Rise as Cybercriminals Continue to Outwit IT
                      CIO, September 29th, 2014
                      "Online criminals remain at least one step ahead of many IT groups, according to this year's "U.S. State of Cybercrime Survey," conducted annually by CSO magazine, the Secret Service, the Software Engineering Institute at Carnegie Mellon University, and PricewaterhouseCoopers. Deterrence and detection are both falling short of their goals: "
                        Dump Your Passwords! 8 Security and Identity Breakthroughs
                        InfoWorld, September 25th, 2014
                        "From electronic pills to digital tattoos, these eight innovations aim to secure systems and identities without us having to remember a password ever again

                        In the beginning was the password, and we lived with it as best we could. Now, the rise of cyber crime and the proliferation of systems and services requiring authentication have us coming up with yet another not-so-easy-to-remember phrase on a near daily basis. Is any of it making those systems and services truly secure?..."

                          Shellshock Bug: 6 Key Facts
                          Information Week, September 27th, 2014
                          "Shellshock, the name given to a pair of vulnerabilities in Bash, a shell program distributed on Linux, Unix, and OS X systems, has been assigned a CVSS score of 10, on a 1-to-10 scale. It's as serious as security bugs get.

                          Worse, the difficulty of exploiting Shellshock is rated "low." Almost anyone with an interest in malicious code will be able to build malware that uses the vulnerabilities. As if to demonstrate that, security companies began detecting Shellshock malware within hours after the vulnerabilities were disclosed.

                          Here's what you need to know..."

                          Survey Shows the Cost of Security Breaches Is On the Rise
                          CSO Online, September 30th, 2014
                          "The PWC/CSO Global State of Information Security Survey reveals detected breaches and associated costs are up. Budgets? Not so much...

                          The year since our previous Global Information Security Survey won't go down as one of the better years for information security. In fact, it may go down as one of the most grueling..."

                          What Corporate Security Pros Should do About Shellshock/Bash Bug
                          Network World, September 26th, 2014
                          "Shellshock/bash bug exploits can force compromised servers to act as bots and, depending on the types of privileges the servers have, attackers can make them do a lot worse. So corporate security pros should patch important affected machines as soon as possible.

                          In the meantime, you can shore up defenses around servers with the bash vulnerability to block attacks before they reach the machines, security experts say..."

                          When Layers on Layers of Security Equals LOL Security
                          Dark Reading, September 29th, 2014
                          "As the security industry struggles with the precision and persistence of targeted attacks, the recommended best-practice talisman wielded by many an expert is the idea of "layered security" or "defense-in-depth." Generally, the practice is described as setting up multiple layers of protection similar to chain mail going underneath a suit of armor. If one piece of protection misses one threat, another will block it instead..."
                          Three Steps You Need to Take to Avoid Overreacting to the Bash Bug
                          CSO Online, September 26th, 2014
                          "The steps necessary to be effective in the wake of the frenzy with an executive plan of action that explains and brings others into the response while protecting the business...

                          Despite the crush of information and demand for action over the latest bug affecting us, the sky isn't falling. This isn't the first, and it won't be the last. While the shock and magnitude of the problem requires attention, the key is to guide the appropriate response. Ultimately, our ability to detect and respond accordingly must become as much a part of our fabric as the bias for prevention we're pivoting from..."

                            IT - Careers
                            10 Tips to Ensure Your IT Career Longevity
                            CIO, October 2nd, 2014
                            "Many people say that IT is a young man's game, and if you look at the most influential tech companies you might agree. Most IT workers employed at those companies there are under 35 and male. However, these big name firms employ only a fraction of tech professionals and there are plenty of opportunities out there for everyone. IT has one of the lowest unemployment rates of any industry because in most organizations technology touches every part of the business..."
                              IT Dress Code: 10 Cardinal Sins
                              Information Week, October 1st, 2014
                              "Hey, you over there. Yes, you -- in the short-sleeve plaid button-down shirt and khakis. Straighten out that pocket protector and step into the conference room. We need to have a few words with you. We're the fashion police. If only there was, in fact, a set of statutes -- and a corresponding law enforcement agency -- to save us all from ourselves when dressing for work in the morning..."
                                IT Skills That Are in Demand, and Those that Will Be
                                ComputerWorld, September 29th, 2014
                                "IT professionals seeking certifications in the coming months may get their best return with cloud and security-related certifications. Agile-related training won't hurt, either.

                                But there are many other skills that are more likely to be valued by employers than others, according to the most recent quarterly tracking analysis by Foote Partners. This survey calculates skill rankings on what employers are willing to pay..."

                                The Ten Worst People You Meet Working in IT
                                IT World, October 3rd, 2014
                                "Every human being is a unique and special person who doesn't quite fit into any category, of course. That said, if you've worked in IT long enough, you've probably learned to identify certain ... types. Call them Jungian archetypes, but for people you don't like. Once you've started to recognize them, you see them everywhere. We asked a host of IT pros to describe the type of IT pro they like least, and we got some colorful answers. Have you ever dealt with some of these worst people in IT? Or worse: do you recognize yourself in these descriptions? It's not too late to take another path..."
                                  Exalytics In-Memory Machine X4-4
                                  Dramatic increase in performance and capacity
                                  The ability to find answers to strategic business questions quickly offers a competitive advantage to organizations of any size in any industry. The latest refresh of Oracle Exalytics In-Memory Machine, an engineered system for business analytics, includes Intel Xeon processors customized for Oracle business analytics workloads, supporting 50 percent faster clock speed, 50 percent more processing cores and 50 percent more memory compared to the previous generation.

                                  The increased processing power and capacity enables organizations of all sizes to compete better by delivering answers to the most pressing business questions with unmatched speed, intelligence and simplicity. Oracle also announced certification of Oracle Database In-Memory with Oracle Exalytics In-Memory Machine, expanding the scope of in-memory analytics to include the full capabilities of the Oracle Database. With up to 3 TB of memory per machine, Exalytics In-Memory Machine X4-4 enables caching of analytic data marts entirely in memory, delivering speed-of-thought analytics on existing data warehouses and systems of record.

                                  Oracle Reinvents Database Protection with Zero Data Loss Recovery Appliance
                                  Offers end-to-end data protection for Oracle databases
                                  During his opening keynote at Oracle OpenWorld, Oracle Executive Chairman and Chief Technology Officer Larry Ellison announced the general availability of Oracle's Zero Data Loss Recovery Appliance, the world's first and only engineered system designed specifically for Oracle Database protection. This massively scalable appliance delivers unparalleled data protection, efficiency, and scalability.

                                  Oracle's Zero Data Loss Recovery Appliance (Recovery Appliance) is the first appliance ever to deliver zero data loss protection for critical Oracle Databases. When using today's solutions to restore a database, businesses typically lose all data generated since the last backup - often hours to days of critical data. The Recovery Appliance dramatically reduces the impact of backups on production servers and networks, virtually eliminating the need for lengthy backup windows.

                                  The cloud-scale architecture enables a single Recovery Appliance to manage the data protection requirements of thousands of databases, avoiding the cost and complexity of disparate backup systems.

                                  IT - Virtualization
                                  Prevent Server Networking Problems When Running A Hypervisor
                                  SearchServerVirtualization, October 2nd, 2014
                                  "Virtualization has evolved significantly in the last few years, but system hardware features and drivers may still present configuration and compatibility issues that IT professionals must recognize. Although many such problems have straightforward solutions, it is still important to test and verify each fix in a test environment before rolling it out to production. This prevents unforeseen complications that might disrupt production..."
                                    Virtualization, Cloud Complicate Insider Threats for Federal CIOs
                                    CIO, September 25th, 2014
                                    "Within the federal government, the shift toward virtualization and cloud computing is already well underway, but agency and industry officials warn that those migrations invite new security considerations, particularly in the form of insider threats.

                                    Eric Chiu, president of the cloud and virtualization security firm HyTrust, notes the familiar list of arguments in favor of virtualizing servers and systems - lower costs and increased agility and efficiency chief among them - but points out that there are dangers associated with that transition..."

                                    Oracle Launches the Oracle FS1 Series Flash Storage System
                                    Outperforms EMC XtremIO by up to 9x
                                    Architected for Oracle Database enterprise SAN environments, Oracle FS1 Series innovates with new QoS Plus software and one-click application storage provisioning

                                    Transcending the limitations of existing all-flash storage arrays, the new Oracle FS1 Series flash storage system scales to petabytes of all-flash capacity while delivering a multitude of innovations designed to take flash technology to new extremes. Users of Oracle Applications including Oracle E-Business Suite and Oracle's PeopleSoft, JD Edwards EnterpriseOne, and Siebel applications can now benefit from one-click application storage provisioning that simplifies deployment and automates complex manual tuning and administration.

                                    StorageTek SAM-QFS 5.4
                                    Open source filesystem and Hierarchical Storage Manager

                                    QFS is an open source filesystem. It is tightly integrated with SAM, the Storage and Archive Manager, and hence is often referred to as SAM-QFS. SAM provides the functionality of a Hierarchical Storage Manager.

                                    StorageTek Storage Archive Manager (SAM) 5.4 is the most significant update in several years. It contains numerous enhancements, including:

                                    • Horizontal scalability enables users to increase the rate at which they archive data by 10x
                                    • Automated data integrity validation enables the archive to automatically self-audit and then self-heal if necessary
                                    • Files can now be imported and exported from the archive in LTFS format


                                    IT - Backup
                                    New requirements for Enterprise Disk Backup
                                    Storage Switzerland, September 30th, 2014
                                    "For a disk backup appliance to be deemed 'enterprise' it had to be able to perform well and provide more capacity expansion than non-enterprise class appliances, while still being almost as cost effective as its mid-range brethren. But with the growth of virtualization, the explosion of unstructured data and the proliferation of big database applications, the game is changing. The future of disk backup appliances will require that they provide more than just these basic features, instead adding five new capabilities to keep pace with enterprise demand..."
                                      IT - Big Data
                                      Big Data Challenges and the Keys to Success
                                      Information Management, October 2nd, 2014
                                      "Narendra Mulani, senior managing director of Accenture Analytics, part of Accenture Digital - an arm of the consulting firm that offers digital business and technology services - has a focus on data science and big data.

                                      Accenture recently completed a survey to gain a broader, more enhanced perspective of big data successes. The firm surveyed executives from across seven industries in 19 countries to get a clear picture on whether companies are engaging with big data, what their experiences are like and what type of lessons they're learning..."

                                      To Build a Data-Driven Organization, Executives Must Create a Data-Centric Culture
                                      Bank Systems and Technology, September 29th, 2014
                                      "In March 2014, the Technology Association of Georgia (TAG) FinTech Society conducted a research study with financial services and financial technology organizations on their adoption of data science as a way to drive new revenues and lower operating costs revealed an industry in transition. The transition: Evolve from early adopters to fully embracing data analytics and big-data technologies as a core way of doing business by 2020..."
                                      The Dangers of Dark Data and How to Minimize Your Exposure
                                      CIO, September 24th, 2014
                                      "Structured data, like content in a database, is relatively easy to manage. However, confidential or sensitive unstructured information -- log archives and other untagged, non-inventoried data -- presents a real challenge to CIOs. Find out why 'dark data' can be a security risk and how you can protect your organization..."
                                      Gartner Debunks Five of Biggest Data Myths
                                      Storage Newsletter, October 3rd, 2014
                                      "With so much hype about big data, it's hard for IT leaders to know how to exploit its potential. Gartner, Inc. dispels five myths to help IT leaders evolve their information infrastructure strategies in the reports 'Major Myths About Big Data's Impact on Information Infrastructure' and 'Major Myths About Big Data's Impact on Analytics..."

                                      • Myth No. 1: Everyone Is Ahead of Us in Adopting Big Data
                                      • Myth No. 2: We Have So Much Data,
                                      • Myth No. 3: Big Data Technology Will Eliminate Need for Data Integration
                                      • Myth No. 4: It's Pointless Using a Data Warehouse for Advanced Analytics
                                      • Myth No. 5: Data Lakes Will Replace the Data Warehouse

                                      Read on for details.

                                      6 Key Attributes of a Chief Analytics Officer
                                      ComputerWorld, September 29th, 2014
                                      "Organizations need leaders who can turn big data into a strategic asset, but not everyone is cut out for the job. Do you have the skills and temperament to become a CAO?...

                                      With executive teams looking to apply analytics more strategically across the business, it's getting easier to justify a C-level position for analytics. A recent EY study found that while 69% of companies considered customer experience vital, just 12% said they take full advantage of analytics to extract customer insights and deliver better customer service..."

                                      Big Data: Quality Over Quantity
                                      Insurance Networking News, September 29th, 2014
                                      "The majority of C-level executives agree that they could better leverage data, but they don't necessarily need more of it.

                                      The global volume of data is growing by the millisecond. Every minute, 98,000 tweets appear in feeds around the world and add to its vast amount of data -- 90 percent of which was created in the last two years..."

                                        Netflix sees Big Picture with Big Data
                                        Information Management, October 2nd, 2014
                                        "For Netflix, the DVD delivery and video streaming company, gaining insight into how customers consume and interact with its offerings is the lifeblood of the business. And with 50 million customers in 40 different countries - and about 10 petabytes of data in its warehouse - it has plenty to draw on to find threads of information that could lead to operational efficiencies, new products and better service.

                                        Today, the company collects and analyzes data on everything from audience viewer preferences, to the technical quality of content, to repair service effectiveness..."

                                        Top Ten Articles for last few Issues
                                        Vol 199 Issues 1, 2,3 and 4; Vol 198 Issues 2, 3, 4 and 5;
                                        We track how frequently each article is viewed on the web site to determine which the readers consider the most important. For last week, the top 10 articles were:

                                        • ZFS storage appliance Simulator
                                        • SPARC Processor Documentation
                                        • Oracle Linux 5.11 is now available
                                        • Why SQL is becoming the goto language for Big Data analysis
                                        • Creating a Server Pool for Oracle Solaris 11 Zones
                                        • 2014 Duke's Choice Award Winners
                                        • Oracle VM Server for SPARC
                                        • Oracle OpenStack for Oracle Linux
                                        • In-Memory Query Acceleration of Oracle Database
                                        • POSCO Selects Oracle Product Hub and Oracle Engineered Systems

                                        The longer version of this article has list of top ten articles for the last 8 weeks.

                                          Oracle Virtual Networking Support for OpenStack
                                          New plug-in extends Oracle Virtual Networking benefits to OpenStack-based cloud deployments

                                          The Oracle Virtual Networking OpenStack Neutron plug-in, announced today at Oracle OpenWorld, is based on the OpenStack Icehouse release and enables all of Oracle's software-defined networking (SDN) and network fabric capabilities to be created, provisioned and managed by the OpenStack framework. Oracle SDN now allows OpenStack-based cloud deployments to virtually eliminate VLAN exhaustion and bandwidth bottlenecks experienced with traditional networking, providing extreme scalability and security on the industry's fastest network fabric.

                                          Oracle Virtual Networking delivers a wire-once, software-defined fabric for a heterogeneous data center. This technology virtualizes the SAN and LAN infrastructures by defining connectivity in software, giving users the flexibility and agility needed for cloud-enabled Infrastructure as a Service and Platform as a Service deployments. By consolidating both SPARC and x86 systems on a single fabric, Oracle Virtual Networking can reduce infrastructure complexity by 70 percent and cut capital expenditures by up to 50 percent.

                                          Oracle SDN technology, part of the Oracle Virtual Networking portfolio of products, allows the dynamic deployment of thousands of completely segregated L2 networks on the fabric, allowing customers to dynamically scale their infrastructure and provide enhanced security.

                                          Trending in
                                          Vol 234, Issue 2
                                          Trending IT Articles