News about Oracle's Solaris and Sun Hardware
System News
Oct 20th, 2014 — Oct 26th, 2014 Generate the Custom HTML Email for this Issue
System News System News for Sun Users
Volume 200, Issue 4 << Previous Issue | Next Issue >>
Sections in this issue:
click to jump to section

Game Changing Innovation with Power8?
By Kevin McGee
Kevin writes, "On Monday, October 12, IBM announced their first Power8-based enterprise class systems and yet still did not deliver the full realization of its 12-core Power8 processor, previewed by IBM in August 2013. Potential customers should also really consider IBM's lack of deep-level optimization, as compared to Oracle and SPARC.

By opening Power to partner co-development, IBM has lost much of its ability to retain control of deep-level optimizations. Consider that IBM agreed to pay Globalfoundries Inc. $1.5 billion to take an unprofitable chip-manufacturing unit off its hands. It now makes much more sense as to why IBM is investing in partner add-on capabilities through CAPI (Coherent Accelerator Processor Interface), such as chips from NVIDIA, instead of investing in its own software in silicon enhancements like Oracle. And while Oracle was busy acquiring Sun, Pillar, Xsigo and more, IBM was divesting its networking, hard disk, x86 server business and most recently their chip manufacturing unit..."

Oracle Expands Data Integration Portfolio with Oracle Enterprise Metadata Management 12c
New product helps customers with big data governance needs

Oracle has expanded its Oracle Data Integration portfolio with the addition of Oracle Enterprise Metadata Management 12c, a comprehensive platform that helps reduce compliance risks and ensure the success of governance programs within organizations by providing much-needed business and data transparency.

A key component of Oracle's big data governance solution, Oracle Enterprise Metadata Management 12c together with Oracle Enterprise Data Quality, Oracle Big Data SQL, and Oracle Database security solutions enables organizations to manage and control all aspects of data stewardship, lifecycle management, data protection, auditing, security, and compliance.

Oracle Enterprise Metadata Management 12c helps organizations govern all of their enterprise data, including structured and unstructured data, across Oracle and third-party data integration, database, and business analytics platforms.

It also includes a powerful business glossary - a critical component for linking business-friendly terminology to the operational metadata that drives data flows across enterprise systems such as Apache Hadoop, ERP applications, data warehouses, and semistructured data used for big data discovery.

Updated Case Study: Oracle's Own E-Business Suite 12 Environment
Larry Klein, Vice President of Oracle's Enterprise IT group
Steven Chan writes, "Oracle's own use of the E-Business Suite has always been an excellent case study. Our internal EBS environment has grown and evolved over the years. We were running EBS 11i in 2006 with a 6 Terabyte database, after consolidating over 70 EBS instances into a Global Single Instance. It grew to a 14 Terabyte EBS 12 database by 2008.

Larry Klein, Vice President of Oracle's Enterprise IT group, gave a snapshot of the latest statistics and architecture in a fascinating session at OpenWorld 2014..."

10 ways Oracle uses its own technology for business success
Using It's Own Technology to Improve the Business
Steve Walker writes, "Oracle has a very broad portfolio of products to help simplify IT, encourage innovation and business success. So it's encouraging to see the extent to which the company is able to point to its own business as validation of the recommendations we make to our customers. Here are no fewer than 10 areas where use of its own portfolio has significantly helped Oracle's business in key areas such as maximising efficiency, business transformation and agility into new markets: ..."
Power of SPARC T5 scalability unleashed
Python Benchmark
Malcolm Kavalsky writes, "I was working with a leading asset management vendor in the financial server sector who is using Python for a considerable amount of their software, a typical three-tier architecture, Database, Business Logic and User interface using Python as the main back-end language. Performance was critical for both latency (fast individual query response) and total throughput (being able to service a large amount of queries in parallel).

This was an opportunity to validate the quality of the scalability advantage of SPARC processors, with their large amount of cores and threads within a single chip..."

Oracle VM VirtualBox 4.3.18 Released
maintenance release
VirtualBox is a general-purpose full virtualizer for x86 hardware, targeted at server, desktop and embedded use.

For a thorough introduction to virtualization and VirtualBox, please refer to the online version of the VirtualBox User Manual's first chapter.

Oracle VM VirtualBox 4.3.18 has just been released. This maintenance release of VirtualBox 4.3 improves stability and fixes regressions.

Enterprise-class Virtualization for SPARC servers
Oracle White Paper
Mike Mulkey writes, "Oracle VM Server for SPARC (previously called Sun Logical Domains) is a virtualization technology which enables the creation of multiple virtual systems on a single physical system to reduce costs and improve operational agility and efficiency. A new white paper has been published (Oracle VM Server for SPARC Best Practices) which reviews best practices on how to configure Oracle VM Server for SPARC to achieve enterprise-class performance and availability, while helping customers gain more value from new SPARC systems..."
IT - Storage
Reducing Storage TCO with Private Cloud Storage
Storage Switzerland, October 23rd, 2014
"With the burgeoning growth of data, many legacy storage systems simply struggle to keep the total cost of ownership (TCO) in check. This article will look at the ways that Private Cloud Storage can address the TCO shortcomings of legacy storage.

One of the simplest ways to reduce the TCO of a storage system is to make its entry point less expensive. Legacy storage systems are designed with custom hardware, custom silicon and very sophisticated, proprietary software. Even the drives that go into these systems are sometimes customized specifically for the vendor. This can result in a much higher starting price..."

    Researcher Creates Proof-of-Concept Worm for Network-Attached Storage Devices
    Network World, October 20th, 2014
    "Network-attached storage (NAS) devices are riddled with vulnerabilities that can put the security of sensitive data and networks at risk, a researcher has found. To prove his point, he has created a proof-of-concept worm that can infect devices from three different manufacturers.

    Earlier this year, Jacob Holcomb, a security analyst at Baltimore-based firm Independent Security Evaluators, started researching the security of NAS devices. He selected popular devices from 10 manufacturers and found that they were all were susceptible to root compromise. In addition, he found that exploiting half of them did not require authentication..."

    IT - Technology
    World's First 3D Full-Body Scanning Booth to Create Custom You Figurines
    ComputerWorld, October 21st, 2014
    "3D scanner manufactuer Artec Group announced the U.S. debut of its Shapify Booth, which can scan your entire body in 12 seconds and use the resulting file to print a life-like figurine.

    The figurine, which Shapify is calling a "Shapie," is created on a 3D printer in full color.

    Artec hopes the scanning booths will catch on in U.S. retail stores, such as Walmart, as well as theme parks and other major tourist sites, shopping malls and airports. Artec has already rolled out the booths in two ASDA supermarkets in the UK. ASDA is owned by Walmart..."

      From Her to Watson, and What's Next?
      Information Management, October 20th, 2014
      "Her is a 2013 American science fiction romantic comedy-drama film written, directed, and produced by Spike Jonze. The film follows Theodore Twombly (Joaquin Phoenix), a man who develops a relationship with Samantha (Scarlett Johansson), an intelligent computer operating system personified through a female voice. Jonze conceived the idea in the early 2000s after reading an article about Cleverbot, a web application that uses an artificial intelligence algorithm to have conversations with humans..."
        IT - Bitcoin
        Is Bitcoin the Red Pill? Unplugging the Matrix.
        Bitcoin Magazine, October 24th, 2014
        "The premier decentralized digital currency Bitcoin has gained widespread mainstream attention over the last year. While many are embracing this new peer-to-peer payment system, others have voiced strong suspicion and offer stinging criticism. The divergence of opinion surrounding Bitcoin is a predictable pattern that happens with any major innovation.

        Silicon Valley tech entrepreneur and author Andreas Antonopoulos said, 'Bitcoin and crypto-currencies in general don't fit any of the traditional modes: not currency, stock or commodity, but [are] a new asset class' He continued, 'trying to figure out Bitcoin by fitting it into an existing paradigm misses the point. Cryptocurrencies broke the paradigm. It's a new world.'

        Bitcoin... We Are All The Blockchain
        Bitcoin Magazine, October 20th, 2014
        "Since the first great jump in Bitcoin's exchange rate in early April 2013, speculative trade has stolen the limelight as the main Bitcoin story. Tweets of 'To the moon!' echo like a rallying cry, selling what amounts to a collective vision statement. But what's the vision? A respected VC assures us it's 'still headed to 10k' as if Bitcoin was a prize thoroughbred being written down by the Bookies, but still had a few Derbies left in her - Is that all this is about?

        Whatever one feels about the 'profiteer mentality' so evident across the Bitcoin movement, it is clear that without this driver, this long overdue financial systems innovation may not have taken hold. So we may as well accept that the 'greed factor' is serving a greater purpose. However, whenever the Bitcoin price slides, editorials claiming the demise of Bitcoin demonstrate that both the detractors and the devotees are focusing on an artifact of the system rather than the system's innate value..."

        Why Wall Streeters Are Turning to Bitcoin for a Living
        CoindDesk, October 26th, 2014
        "When banking giant Citi announced it would lay off 11,000 employees last May in a bid to save a billion dollars in expenses, Arthur Hayes was one of the staffers given a pink slip.

        Hayes had been a 'Delta One' proprietary trader for Citi in Hong Kong, acting as a market-maker for the bank's Asian exchange-traded fund products. He had spent his career in financial institutions, starting out at Deutsche Bank.

        While polishing his resume to rejoin the job market, Hayes came across bitcoin. He couldn't resist trading the cryptocurrency. To his delight, the markets turned out to be a gold mine for him:..."

        Sidechains White Paper Imagines New Future for Digital Currency Development
        CoindDesk, October 23rd, 2014
        "A group of bitcoin core developers and cryptographic technology experts have released a new proposal that could reshape the digital currency ecosystem if implemented.

        The sidechains concept has long been argued as a solution to what many see as a volatile and self-damaging sector of the cryptocurrency ecosystem. Described by some as the 'altcoin killer', sidechains allow for the creation of multi-block chain ecosystems in which assets can be exchanged and transferred..."

        Why 20 Bitcoin Companies Are Backing a New Deal for Digital Identity
        CoindDesk, October 21st, 2014
        "To members of more than 20 digital currency companies, the broad increase in financial access the industry hopes to achieve is currently being impeded by issues that go beyond finance and technology to defining transparency and identity in the digital age.

        Expanding access to financial services through not just digital currency, but new systems that allow businesses to establish trust and lower the cost of financial services, lies at the heart of the Windhover Principles. The new framework was introduced by the Institute for Data Driven Design (ID3), a non-profit founded out of MIT Media Lab this Monday, and was written collaboratively by digital currency industry stakeholders..."

          UK Government To Continue Supporting Bitcoin
          CryptoCoinsNews, October 25th, 2014
          Following previous 'favourable' announcements about the Digital Currency from the Chancellor, the UK's minister for the digital economy Ed Vaizey demonstrated once again the government's strong ambition for Bitcoin, by asserting that it will continue to support the digital currencies:

          'We're doing a major program of work looking at opportunities in digital currencies. We want to make these e-payments faster, quicker, we want to make it as safe as possible. And we want to look at the kind of technologies that the digital currencies use to allow end systems to operate in a de-centralized way, with no intermediaries. We want to look at how the new technologies can benefits consumers and the wider economy. So that's something the Treasury is very interested in.'

          Japan Wants To Be The Most Bitcoin Friendly Country
          CryptoCoinsNews, October 23rd, 2014
          "All year we have chronicled the various ways nation-states have chosen to mis-categorize and malign Bitcoin. The influence of fear, corporate interests, confusion, or the illusion of financial terrorism has caused many a short circuit when it comes to Bitcoin, and official government responses have run the gamut.

          Russia and Bangladesh have agreed to ban it outright. Canada is taking a more deliberate and thoughtful look at Bitcoin under the tutelage of legendary Bitcoin wizard Andreas Antonopoulos. Ecuador is trying to head off Bitcoin through a digital version of their fiat currency. And China can't decide if it hates Bitcoin because the citizens want it, or because they can't control the market by force. Now Japan has weighed in on the matter, and their response to Bitcoin may surprise everyone..."

          Why Should Your Oracle Database Run on Oracle Solaris 11?
          New white paper explains why
          Mike Mulkey writes, "because it runs faster, is more secure, is more scalable & highly available, and because it simplifies management.

          If you would like to know more, a new white paper (Oracle Solaris 11 is a state-of-the-art platform for deploying Oracle Database) has been published which details how Oracle Solaris 11 brings distinctive benefits to Oracle Database deployments, including deployments of the latest release, Oracle Database 12c. It describes Oracle Solaris 11.2 enhancements, which help to improve database scalability, availability, security, and manageability, and describe in detail how Oracle Solaris 11 and Oracle Database optimizations bring specific benefits for database deployments on SPARC servers..."

          General Availability of Oracle Linux 6.6
          Oracle Linux can be downloaded, used and distributed free of charge
          Michele Casey writes, "We're happy to announce the general availability of Oracle Linux 6 Update 6, the sixth update release for Oracle Linux 6. You can find the individual RPM packages in our public yum repository now; ISO installation images will be freely available for download from the Oracle Software Delivery Cloud soon...

          Oracle Linux can be downloaded, used and distributed free of charge and all updates and errata are freely available."

          IT - Cloud
          Cloud ROI: 6 Takeaways to Consider
          Information Week, October 20th, 2014
          "From cloud brokering to talent management, these conclusions will keep cloud decisions focused on business needs...

          I spoke on a webinar recently exploring cloud ROI, and below are six key conclusions I took away from the discussion. I had a different view from one other webinar participant on the last one, about talent strategy related to cloud computing.

          Here are my six takeaways:..."

          ISO publishes cloud standards
          GCN, October 23rd, 2014
          "In an effort to clear away some of the haziness surrounding cloud computing, the International Standards Organization and the International Electrotechnical Commission, together with the International Telecommunication Union, released two International Standards for cloud computing.

          Based on the views of government and industry experts from over 30 countries, the new standards lay down the basic terminology and architectural framework of the expanding cloud industry..."

          7 Questions to Ask When Delivering Cloud Apps
          Information Week, October 21st, 2014
          "What's your goal when you make the decision to deliver your applications over the Internet?

          Recent survey findings show nearly half of enterprise decision-makers expect to run the majority of their applications over the Internet in the next year. They're turning to the Internet to capitalize on the trends of consumerization of IT and globalization of the enterprise, and, as a result, budgets are shifting toward cloud-based application delivery.

          Transitioning an enterprise's application portfolio to be delivered over the Internet can be overwhelming, but if properly managed, it can drastically improve user experiences, security, and the global availability of certain data and applications..."

          Snead: NSA Revelations Have Chilling Effect on Cloud Growth in U.S.
          Data Center Knowledge, October 23rd, 2014
          "Data center customers are beginning to avoid the U.S. and place their infrastructure elsewhere because of data sovereignty concerns caused by revelations about NSA surveillance, according to David Snead, founder of the Internet Infrastructure Coalition (I2C).

          'Our members are seeing a very real shift in putting data outside the U.S. rather than inside the U.S.,' said Snead, whose group includes more than 100 companies in the hosting and data center business. 'The NSA disclosures have undermined worldwide confidence in U.S. infrastructure.'

          Cloud Security: Think You're Blocking Staff Access to Certain Sites? Think Again
          ZDNet, October 21st, 2014
          "Some companies routinely block employees from using certain websites. The trouble is that what they think they're blocking just doesn't match up with staff access figures for those services.

          That disparity between perception and reality can be pronounced, even for websites that pose no particular security threat.

          For example, four out of 10 firms say they block employee access to Netflix. But in reality only four percent are doing so successfully, according to research from cloud security firm Skyhigh Networks and non-profit body the Cloud Security Alliance..."

          Building Cloud Computing Skills
          Network Computing, October 20th, 2014
          "To succeed in the cloud computing era, IT pros need a wide array of skills. Cloud certifications are one way to acquire these skills, but you also must learn to think like a cloud architect.

          The growth of cloud computing and truly distributed IT environments has created a demand for a new type of IT professional. Today's IT pro must be well-versed in new and emerging technologies, but also have skills in a range of core areas such as storage.

          So what do you need to do to acquire cloud computing skills and advance your cloud career? Here are some tips..."

          IT - CxO
          5 Reasons It's Incredibly Difficult To Rely Upon Leaders
          Forbes, October 21st, 2014
          "The marketplace continues to change fast, and as it does leaders are still trying to figure out how to best change with it. They are learning the hard way that they must touch the business just as much as they lead it. Leaders need to start rolling up their sleeves, getting their hands dirty, and accepting the fact that to lead during times of tremendous change and uncertainty, you must be courageous enough to face the issues head-on.

          Confronting the realities of the business - and the people associated with it - is the only way to know the strategic decisions that need to be made, and the financial requirements to support new workplace and marketplace demands. Too many leaders become unreliable because they wait too long to act during uncertain times..."

            The enterprise CIO needs a comprehensive strategic plan and quick
            GIGAOM, October 20th, 2014
            "There are many who profess to know what goes on within the mind of the CIO and across the IT organization as a whole. The challenge is: If you have not been responsible for the role, it is increasingly difficult to truly understand the complicated world that encompasses enterprise IT organizations. Could they be simplified?

            In a word, yes. But that is easier said than done. One needs an appreciation for the demands coming from not just technology, but also from other organizations within the company and the IT organization itself. But even that statement does not provide the full depth of the complexity facing today's CIO..."

            Chief Data Officers Battle Complexity, Complacency: Wells' Thomas
            Information Management, October 20th, 2014
            "Even with a newly created position, a $100 million budget and a team of 600, Wells Fargo's chief data officer, Charles Thomas, says he's fighting the forces of corporate inertia.

            "It's hard to get a successful company to change until something hurts," Thomas said Thursday.

            "Many of the large banks have breaches, privacy issues and other big challenges," he said at SourceMedia's second annual Banking Analytics Symposium in New Orleans. "Wells Fargo hasn't been hit with any of those challenges, so it's hard to get the company to start thinking differently about its data until something hurts."

            Why CIOs Should Be More Involved in Acquisitions
            Information Week, October 20th, 2014
            "Whether it's Facebook and WhatsApp or Burger King and Tim Horton's, we're living in a business culture that hinges on the next merger or acquisition, with hundreds of millions to billions of dollars at stake. All too often, however, CIOs and IT leaders are not part of the planning for mergers or acquisitions.

            In the fast-paced excitement of executing the deal, IT priorities like application rationalization and operations integration can be viewed as an afterthought. Waiting to include input from the CIO until late in the due diligence process - or even after the deal is made - is usually a recipe for disaster, only adding to the high percentage of acquisitions that fail to meet target objectives. Simply put, CIOs need a seat at the table during merger or acquisition planning.

            Here's why..."

            Chief Data Officers: Organization Strategy & Cultural Change
            Wall Street and Technology, October 21st, 2014
            "Chief data officers are new to the financial services C-suite, but they are facing a number of challenges, including the need for new data governance and execution strategies, staffing, and new organizational structures to enable cultural change.

            Chief data officers (CDOs) are a new breed of C-suite executive in banking, with many only appointed to their roles in the past year. CDOs are charged with setting the strategic direction for data. Creating the right organizational model for data governance will determine their ability to thrive. Here we look at some of the challenges they face in doing so and some of the methods and strategies that are being adopted..."

              5 Tips for Transforming Enterprise IT Towers Into Cloud Services
              CIO, October 24th, 2014
              "As companies adopt more cloud IT services and work with an increasing number of service providers, the tried-and-true IT towers of the past no longer serve their needs. "The old model lacks the clarity of ownership required to drive decisions on as-a-service offerings that span the traditional tower structure," says Steve Keegan, principal with outsourcing consultancy Pace Harmon. "Determining who makes the call isn't straightforward -- the server team, the app team or the database team?"..."
              10 Things IT Probably Doesn't Know about Cyber Insurance
              Dark Reading, October 23rd, 2014
              "Understand the benefits and the pitfalls you might miss when evaluating cyber policies.

              As more organizations start considering cyber insurance as one component of a fully fleshed-out IT security operations and risk management strategy, increasing numbers of IT executives and security leaders will be called upon to evaluate these policies. While the cyber insurance market has matured considerably over the last few years, this process can be daunting for the uninitiated..."

              Peering Into the Future Of IT
              IT World Canada, October 20th, 2014
              "Worldwide IT spending is projected to surpass US$2.9 trillion in 2015 - a 3.9 per cent increase from 2014. Where will these new investments be made? What will be the impact on business? Here are Gartner's top 10 predictions, as presented by head of research Peter Sondergaard at the company's recent annual Symposium and IT Expo.:..."
              3 Common & Costly CIO Mistakes
              Information Week, October 17th, 2014
              "CIOs are often undone by sticking with old systems too long and failing to market themselves. Here's how to right the ship. CIOs continue to be under massive pressure to innovate and deliver new technologies that boost the bottom line. Simultaneously, they must improve legacy systems and infrastructure and make sure they have a talented and motivated IT staff.

              No wonder CIOs feel as if they are juggling chain saws while walking a tight rope. They're so focused on critical projects or keeping basic services running that they often make crucial mistakes, many of which can be career-enders..."

              Ten Differences Between an Insecure Leader and a Secure Leader
              Project Management Advisor, October 21st, 2014
              "Some time back I was talking with a fellow project manager about a difficult issue he was having with his new boss. The thumbnail summary of the discussion was that the project manager was feeling overly scrutinized and micro-managed.

              Now I knew the project manager to be a capable professional who could confidently handle the work assigned to him. Yet his boss insisted on managing every detailed aspect of his work. More so, his boss was very critical of the work being done even though it was performed to professionally acceptable standard. The situation became unbearable for the project manager; he ultimately left the organization..."

                Business Travel Risks
                Risk Management Monitor, October 22nd, 2014
                "There are a number of reasons organizations need to be paying attention to their employees' travel risks, including health scares, natural disasters and political unrest. Since unpredictable events like these are now a global reality, many businesses are taking a hard look at business travel risks and ways they can protect their employees abroad.

                In fact, 80% of travelers believe their companies have a legal obligation to protect them abroad, according to On Call International LLC's report, 'Travel Risk Management.' This means employees may blame their organization if their health or safety is compromised during a business trip. Because so much is at stake for companies that send staff members across the globe, it is important for employers to understand business travel risks and implement a travel risk management strategy to protect their workforce - and their company..."

                November South Florida vBeers
                Save the Dates! 3 Events in South Floirda
                Join us for one of the three South Florida vBeers events. The South Florida vBeers events happen three times a month, once per county:

                Wednesday November 12th

                Wednesday November 19th

                Wednesday November 26th

                Details @ and the vBeers South Florida LinkedIn group.

                IT - DR
                Cloud-Based Disaster Recovery: Choose Wisely
                Network Computing, October 16th, 2014
                "Most CIOs and IT managers know they need to protect critical workloads, but they often live daily with the fear that 'the big one' -- an unexpected major outage or failure -- will take out their data center. Why? Because the typical approaches to disaster recovery (DR) and business continuity (BC) have been too expensive for most companies to set up and maintain.

                When cloud-based data protection technology emerged, the perfect solution seemed to be on the horizon: unlimited capacity with a low-cost, pay-as-you-go model. Basically, the public cloud could become the DR and BC insurance you pay for only when it's needed, but you must choose carefully..."

                Five Myths About Cloud HA And DR
                Continuity Central, October 10th, 2014
                "Enterprises are moving more and more applications to the cloud. The use of cloud computing is growing, and by 2016 this growth will increase to become the bulk of new IT spend, according to Gartner, Inc (1). 2016 will be a defining year for cloud as private cloud begins to give way to hybrid cloud, and nearly half of large enterprises will have hybrid cloud deployments by the end of 2017..."
                IT - PM
                Why BI Projects Fail -- And How to Succeed Instead
                InfoWorld, October 23rd, 2014
                "Business intelligence projects tend to suffer from a fundamental lack of strategy. Many companies think of BI as a tool choice, meaning they treat it like an operating system or virtualization technology decision. Hey, it's a software package, right?

                In reality, a BI project may involve several different tools: a real 'BI' tool, a tool for simple dashboards (which may not be the same thing), an exploration tool for querying the data, and a 'quick hits' tool like Tableau. However, the tool choice is the icing, not the cake -- and this is expensive icing to eat without first figuring out the ingredients..."

                  Boost Your IT Security for the Holiday Season - BeyondTrust and Oracle Webinar
                  Nov 6, 9am PT, 12pm EST
                  The holidays are generally a time for family, friends and cheer, but with all of this cheer comes something lurking in the dark; security breaches. As we prepare for the upcoming holiday season, it is imperative for organizations to understand the importance of implementing a security and compliance strategy. The most important components to address are least privilege, auditing, password management, and compliance.

                  Join this engaging webinar, hosted by Oracle and BeyondTrust, to learn how you can best protect your organization during the upcoming holiday season.

                  [url " "Register"]

                  IT - Networks
                  What Does the FCC's Authority on Net Neutrality Really Mean?
                  Government Technology, October 21st, 2014
                  "As the FCC debates how to regulate Internet traffic, two areas of legal doctrine have surfaced as the commission's potential authority to create and enforce open Internet rules - Title II of the Communications Act of 1934 and Section 706 of the Telecommunications Act of 1996.

                  But while millions have advocated for the approach they think best applies, the nuances of Title II and Section 706 often can be difficult to understand. Government Technology has summarized the impact of both options to cut through the clutter and clarify how they may affect Internet use in the future..."

                  Envious of Fiber Broadband? Help Is On the Way for Copper Users
                  Network World, October 17th, 2014
                  "A technology that delivers broadband speeds over copper lines at a speed comparable to fiber is gaining momentum.

                  Telekom Austria said this week it had connected the first subscriber in the world to its domestic network with, which offers data rates of up to several 100 Mbit/s via existing copper lines. That will meet the needs of even the most demanding households over the next 10 to 20 years, according to the operator.

         increases the bandwidth by using more spectrum. That places extra demands on equipment to be very good at handling interference, a far from trivial requirement..."

                    Is your Ethernet fast enough? Four new speeds are in the works
                    InfoWorld, October 20th, 2014
                    "Ethernet's future is now about much more than the next top speed: The engineers charting a path for the ubiquitous networking protocol are looking at several new versions to serve a variety of applications.

                    At a meeting last Thursday of the Ethernet Alliance, an industry group that promotes IEEE Ethernet standards, three major new projects were up for discussion.

                    To meet immediate demands in cloud data centers, there's a standard in the works for 25Gbps. For the kinds of traffic expected in those clouds a few years from now, experts are already discussing a 50Gbps specification. And for enterprises with new, fast Wi-Fi access points, there may soon be 2.5Gbps Ethernet. That's in addition to the next top speed for carrier backbones and moves to adapt the technology for use in cars..."

                    Internet of Things Will Turn Networks Inside-Out
                    Information Week, October 20th, 2014
                    "If IoT is ever going to work, networks will have to grant access to devices that we'd refuse outright today. You and your cruddy endpoints are dangerous, unwashed, and unwelcome on most enterprise networks.

                    Nothing personal. It's the model by which all networks, public and private, protect themselves and other trusted users. Your endpoint is a wretched hive of scum and villainy unless proven otherwise, and the current security model puts the onus (and some cost) on the connecting party to demonstrate trustworthiness.

                    While that approach has worked with varying degrees of success, there's a problem: It won't work for the Internet of Things..."

                    IPv6 Picks up Steam
                    ZDNet, October 21st, 2014
                    "Believe it or not, Akamai found in its recent The State of the Internet for the 2nd quarter of 2014 report that the global number of unique IPv4 addresses in use actually declined by about seven million quarter-over-quarter. Don't think, however, that we're not still running out of IPv4 addresses. We are.

                    Akamai explained that while this may be the first time in the Internet's history that the global unique Internet Protocol (IP) address count declined, it's still only a decrease of less than one percent. Akamai's analysts suggest that this reduction "may be indicative of more providers implementing carrier-grade network address translation (CGN) solutions in an effort to conserve limited IPv4 address space, or more likely, increased support for and availability of IPv6 connectivity among leading network service providers."

                    NFV can Avoid Buying Network Bulk
                    Network Computing, October 21st, 2014
                    "Network functions virtualization allows service providers to deliver specialized capabilities that enterprise customers only pay for when needed.

                    Most Americans, at some point in their lives, will pay a visit to Costco, Sam's Club, or a similar warehouse store that has a business model predicated on selling products at low prices and at high volume. These products are usually packaged in bulk and marketed to businesses and families, people who tend to "stock up" as opposed to people who tend to "pay as you go" for single servings. Costco's number one selling product is consistently toilet paper. Decidedly not sexy, but extremely necessary..."

                    IT - Operations
                    You Break It, You Build It -- Better than Before
                    InfoWorld, October 20th, 2014
                    "To borrow from the old Chinese proverb, a crisis can be an opportunity in disguise, even in the data center

                    Under normal circumstances, IT's mantra is clear: Nothing should ever break. We make every effort to achieve 99.999 percent uptime. We go through amazing pains to successfully and seamlessly transition from old infrastructure to new. We collectively write billions of lines of code to adapt data structures from one technology to another, testing every conceivable element until we can pull the trigger and hope that, well, nobody notices. However, gains can be had when that last 0.0001 percent appears and we have to deal with the consequences..."

                    Why Data Centers can be Massive, But Not Gigantic
                    ComputerWorld, October 17th, 2014
                    "The IT industry has long abused words, and will label almost any new product as innovative and disruptive. Data center developers, especially those who write the headlines about data centers, are particularly bad.

                    The very big data centers built by cloud providers or the NSA will be called humongous, gigantic, super-sized, colossal, mammoth and immense, among other monikers.

                    There's no agreement on what constitutes a gigantic versus a very large data center, but a data center user group, Afcom, published a paper this week that tries to do just that..."

                    IT - Security
                    Security Pros Forgetting the Basics, Complains Expert
                    IT World Canada, October 23rd, 2014
                    "All IT security conferences have one thing in common: Speakers have dozens of ghastly, yet funny, stories of blunders. Kellman Meghu, Check Point Software's Toronto-based head of security engineering, told a couple at a keynote during the annual SecTor conference in the city on Wednesday.

                    Like the vendor who installed a cash dispensing machine in an undisclosed mall with its IP address clearly visible on a label on the front of the device. Nearby were two Ethernet ports. A colleague of Meghu's was able to connect to the machine at night and download a list credit card numbers used that day - in fact, he could command the device's printer to print them out..."

                    How Criminals Are Using ATM Skimming to Get Your PIN & Under Your Skin
                    Bank Systems and Technology, October 23rd, 2014
                    "Undoubtedly, online criminals continue to become more creative (and elusive) with the tactics they are employing to steal banking, credit, and personal financial information. What's more, one of the favored approaches by these criminals -- ATM skimming -- is causing financial institutions worldwide to lose more than $2 billion annually, according to the ATM Industry Association.

                    How easy is skimming? Inserting an ATM card scanner that reads banking information exactly as an ATM does, criminals can extract sensitive credit card information by reading the information from the magnetic stripe on the back of the card and recording, often with small cameras, the PIN information. The ATM Industry Association notes that these attacks have jumped by 12 percent since 2013, making it the No. 1 ATM crime globally..."

                      How to Become a CISO
                      Dark Reading, October 20th, 2014
                      "Think you're ready for the top job? Here's part 1 of a series to help you land that prime chief information security officer position. So you want to be a CISO, huh? Think you're ready to lead a small band of white knights into battle against a countless, hidden enemy? Ready to play both savior and scapegoat, depending on what the day brings? Ready to beg, borrow, and steal for the resources you need to protect your company?

                      Yes? OK, then, you're ready to do the job... but can you get the job? For the next several weeks, we're dedicating Mondays to helping you find the path to the big job, which won't be easy to define..."

                      MasterCard Demos a Prototype Contactless Card with a Fingerprint Sensor
                      Network World, October 17th, 2014
                      "MasterCard is testing a contactless payment card with a built-in fingerprint reader that can authorize high-value payments without requiring the user to enter a PIN.

                      It showed a prototype of the card in London on Friday along with Zwipe, the Norwegian company that developed the fingerprint recognition technology.

                      The contactless payment card has an integrated fingerprint sensor and a secure data store for the cardholder's biometric data, which is held only on the card and not in an external database, the companies said..."

                        Think Before You Share that File
                        Help Net Security, October 21st, 2014
                        "It's hard to read through the news nowadays without stumbling upon some type of data breach or leak. Recently, Apple's iCloud service has been in the limelight, following the theft and distribution of celebrities' private photos.

                        Apple is not alone. Other file-sync-and-share providers, such as Box and Dropbox, have made headlines for their inadvertent data leaks. These events shine a light on some of these file-sync-and-share services' shortcomings and beg the question of whether enterprises should be allowing such services in their business operations at all..."

                        Cloud Security: Think You're Blocking Staff Access to Certain Sites? Think Again
                        ZDNet, October 21st, 2014
                        "Some companies routinely block employees from using certain websites. The trouble is that what they think they're blocking just doesn't match up with staff access figures for those services.

                        That disparity between perception and reality can be pronounced, even for websites that pose no particular security threat.

                        For example, four out of 10 firms say they block employee access to Netflix. But in reality only four percent are doing so successfully, according to research from cloud security firm Skyhigh Networks and non-profit body the Cloud Security Alliance.

                        There are several possible reasons for that gap, which emerged from usage data generated by 11.5 million employees worldwide and a survey of IT and security professionals..."

                        Learning Lessons Through Security Struggles
                        Network Computing, October 20th, 2014
                        "Why do we hear of new security breaches so frequently? Make sure your organization follows these best-practices and considers these important questions to protect itself.

                        Three big things have been happening with great frequency of late: earthquakes, volcanoes, and data breaches, most of the latter involving point-of-sale (PoS) systems and credit card information. While I'm certainly curious about the increase in earthquakes and volcanic activity, I simply do not understand the plethora of PoS breaches..."

                        5 Non-Traditional Hiring Tips for InfoSec
                        CSO Online, October 21st, 2014
                        "There's a dramatic shortage of qualified information security professionals in the industry today.

                        Globally, we're a million people short, according to Cisco's 2014 Annual Security Report. According to Ponemon's 2014 IT Security Jobs Report, 36 percent of staff positions and 58 percent of senior staff positions in IT security went unfilled in 2013.

                        The majority of companies surveyed - 70 percent - says their IT security departments were understaffed.

                        It's no surprise that some companies are turning to some non-traditional strategies for finding their cybersecurity employees..."

                        Keep Calm and Plug the Holes
                        ComputerWorld, October 21st, 2014
                        "Oh no, another zero day is out! No one goes home until it's fixed!

                        Sadly, we've heard this cry in the information security world far too often. Most recently, the Shellshock and Poodle vulnerabilities sent ripples of fear, uncertainty and doubt throughout the security community. Sure, there were many folks who reacted calmly and fixed the problems in an efficient and businesslike way. But far too many others panicked..."

                        Why You Shouldn't Count on General Liability to Cover Cyber Risk
                        Dark Reading, October 20th, 2014
                        "As the legal troubles for P.F. Chang's restaurant chain kept piling up over the breach discovered this summer affecting 33 of its locations, its legal team made an insurance end-around play that many enterprises try after a breach. It filed a claim for coverage under its comprehensive general liability (CGL) policy. But a lawsuit filed earlier this month from its general liability insurer, Travelers Insurance, offers a good lesson to organizations on why this ploy rarely works..."
                          Need to Improve Your Network Security? Try Studying Fungus
                          IT World, October 22nd, 2014
                          "If you're an IT security professional, you probably don't spend a whole lot of time thinking about bugs, plants or fungus, at least not during your work day. However, a pair of researchers from the Warsaw Institute of Technology think that you should. Based on new research they've published, you might want to considering looking to nature as a good source of inspiration for solutions to security problems..."
                          14 of the Scariest Things Hacked
                          CSO Online, October 20th, 2014
                          "The issue of hacking is rarely out of the headlines, especially due to the recent spate of hackings targeting private photos of celebrities. The issue has become global news and sent the internet into a spin, whilst reminding us how vulnerable devices can be to hacking and that we can all become unsuspecting victims. WebHostingBuzz recently released an infographic detailing the scariest side of hacking, with surveillance, theft and crashes some of the most chilling scenarios..."
                            IT - Careers
                            How to Motivate Your Team Without Carrots or Sticks
                            Forbes, October 26th, 2014
                            "One of two things is going to happen when a newcomer joins your team. They're going to see right away how to plug into their own power source on the job and feel great about coming to work, or they're not.

                            When you make it easy for a person to learn, to succeed and to grow a little bit every day on the job, you never have to worry about motivation.

                            Employee motivation is a multi-billion-dollar industry based on lies and vanity. Any consulting firm that tells you 'We can motivate your employees' is lying. You know that in your gut, because motivation isn't something that comes from outside. Rewards won't motivate people, although most of us don't mind getting perks and prizes. We have an old, defective model for motivation that comes from the junk science school of business most of us grew up in.

                            We've deluded ourselves that we can motivate our teams through punishments and rewards..."

                              11 Ways to Re-Energize Your IT Career
                              ComputerWorld, October 21st, 2014
                              "Eric Reed knows a thing or two about mid-career pitfalls. He's seen some mid-level IT managers get too enamored with technology for its own sake, rather than viewing it as a way to advance business goals. Other would-be leaders didn't know how to communicate or collaborate with non-IT colleagues and were sidelined as techies rather than ID'd as future business leaders.

                              Reed is grateful he was able to overcome those challenges in his own career and sustain his momentum -- he's now CTO at GE Capital. With that goal in mind, Computerworld asked Reed and other seasoned IT pros for advice on how to keep your tech career from getting bogged down. Read on for their tips..."

                              IT Is Slow? Not Our Fault
                              Information Week, October 17th, 2014
                              "Business unit slowness. Let me count the ways.

                              Procurement is where dreams go to die. Some of the times "IT is slow," the trail leads back to procurement. Rules, rules, rules. We can buy anything we want as long as it's from one of the big existing players. But in the tech world, new things come from new vendors. New vendors don't like our sign-up process. One quips to me, how about instead of paperwork, we just walk through hot coals? It would be quicker..."

                                IT Certifications: Discover Where the Value Lies
                                CIO, October 23rd, 2014
                                "As organizations fight for IT talent with proven skills, the business value of technical certifications is higher than ever. But choosing the right one is never an easy task...

                                Knowing which certification will help elevate your career or land a job is not only difficult, it's different among different facets of IT.

                                Also, the best-known certifications aren't necessarily the ones that will help you succeed. In fact, analysts warn that some certification vendors can throw enough money into promotion of their certifications to move the engagement needle, making the choice of which certification to choose even more difficult..."

                                  Six Scary IT Certification Exams
                                  Global Knowledge, October 21st, 2014
                                  "With October and Halloween come thoughts of scary things, like scary movies, scary costumes, and for me, scary IT certifications. The certifications aren't scary like a movie of course. They're scary because of the difficulty of obtaining them. Never fear. Global Knowledge has the training, experts, and resources to help you get there.

                                  Certifications are the most common way in IT to prove you have the skills to solve various technical and business challenges. In this article, I'll address a range of skill sets. For each certification listed, I've included what the certification measures, the requirements to obtain it, and how many people have it. Certifications are listed according to the number of people who hold them, from most to fewest worldwide as of October 2014..."

                                    IT - Social Media
                                    10 Tools That Will Make You a Social Media Guru
                                    CIO, October 22nd, 2014
                                    "Do you aspire to be a social media guru but find yourself befuddled by the large number of social media tools available? Here we help you narrow the options for managing your social media accounts by identifying 10 of the best online tools. All are either free or available for a reasonable subscription fee that any individual or a small business can afford..."
                                      Company Reputations at Risk as Social Media Revolutionizes Breaking News
                                      Continuity Central, October 17th, 2014
                                      "With the increased use of social media and 'citizen journalism' people are creating and sharing more information than ever before. It is now far easier (and quicker) for disgruntled employees, unhappy customers and campaigners to voice their opinions online - providing a wealth of content for journalists in a crisis.

                                      A perfect example of this affected Apple just last month. Two days after the iPhone 6 went on sale on 19th September, images surfaced on social media showing phones which appeared to have bent in people's pockets as a result of accidental pressure. Within hours, the pictures had spread like wildfire on Twitter with thousands of people posting comments using the hashtags Bentgate and Bendgate: an unwanted headache for Apple and further proof of the speed at which social media can propel an issue into the spotlight..."

                                      A perfect example of this affected Apple just last month. Two days after the iPhone 6 went on sale on 19th September, images surfaced on social media showing phones which appeared to have bent in people's pockets as a result of accidental pressure. Within hours, the pictures had spread like wildfire on Twitter with thousands of people posting comments using the hashtags Bentgate and Bendgate: an unwanted headache for Apple and further proof of the speed at which social media can propel an issue into the spotlight..."

                                        Virtual Compute Appliance and ZFS Storage Appliance
                                        Friday Spotlight
                                        Honglin Su writes, "In today's splotlight, we want to share some great assets about Oracle's Virtual Compute Appliance and Oracle ZFS Storage Appliance.

                                        Virtual Compute Appliance is a converged infrastructure solution that combines preconfigured networking, servers, and storage into a convenient package that system administrators can easily deploy into an existing data center. Combined with the virtualization power of Oracle VM, the Virtual Compute Appliance provides the perfect general-purpose solution for rapidly and easily bringing online a new rack into a cloud environment. Customers can expand storage of the Virtual Compute Appliance by connecting to Oracle ZFS Storage Appliance externally. We published a new white paper that describes how to increase the storage capacity of the Virtual Compute Appliance by adding a new rack containing a larger Oracle ZFS Storage Appliance cluster..."

                                        IT - Backup
                                        We Didn't Nuke Your Files; We, er, Mislaid Them
                                        InfoWorld, October 22nd, 2014
                                        "Autopilot may work when you're flying a plane, but not so much when you're minding the network. When your mind is elsewhere, it's so easy to make a simple mistake with big repercussions . Here's one such slip I made that involved a high-end client and -- thankfully -- an understanding manager.

                                        It was my first IT job. I was a support technician/trainer for a software company that developed a DOS-based scheduling software for high-end resorts. Needless to say, the software was complicated and used several dozen dBase databases. I was getting pretty good at troubleshooting and fixing the various issues that cropped up, and I grew less dependent on my manager every day..."

                                          There's a Lot More to Backup Than You Thought
                                          The Register, October 23rd, 2014
                                          "If backup is too often an afterthought, have you considered its even poorer relation, archive. You haven't? What a surprise.

                                          The fact is, businesses and their infrastructure depend upon common services for general efficiency, management focus and cost control. All organisations do, and it would be a nightmare if they didn't.

                                          Typically, there are many departments and line-of-business units in an enterprise which share common services, including:..."

                                          Crafting a Secure Data Backup Strategy on a Private Cloud
                                          SearchCloudSecurity, October 22nd, 2014
                                          "Planning a data backup strategy on a private cloud requires certain factors to assure security. Expert Dejan Lukan gives some advice on what to take into consideration...

                                          In this day and age it is vital for companies to have a proper, secure backup product or service in place to ensure data restoration in the case of hard drive failure, power outage, lightning strike or any other unforeseen circumstances. Backing up data is not something to be taken lightly, and a repercussion of data loss could be significant financial loss. Frequently, companies are unaware that they don't have a backup strategy in place, or that their backup product is not working properly..."

                                          IT - Big Data
                                          Analytics for the Rest Of Us
                                          ComputerWorld, October 22nd, 2014
                                          "Analytics is something new for most of us, and therefore scary. But as it moves from the realm of the data geeks and into the general enterprise where most of us live, it's helpful to recognize that there is nothing new in the way this situation is unfolding.

                                          We have all seen this movie before. A new technology cluster comes into view that promises to expand the production possibility frontier (that's economic speak for 'It is going to help us do more stuff'). Organizations that want to do more stuff (all of them, basically) and that also want to be perceived as being in front of the curve undertake a series of explorations in the form of task forces and pilot projects to tease out a risk-adjusted path forward..."

                                          Balance Required between Big Data Volume, Analytics Needs
                                          SearchBusinessAnalytics, October 23rd, 2014
                                          "Many businesses implementing big data analytics applications focus on the size of their data sets, when what they should really focus on is whether they have the right data.

                                          As businesses try to derive useful insights from pools of big data, many are finding that balancing data size against analytical modeling needs can be a tricky process. But doing so is crucial to the success of big data analytics projects..."

                                          Survey: Big Data Delivers the Goods
                                          Information Management, October 21st, 2014
                                          "Can big data really deliver what it promises - the insights businesses need to leave the competition trailing in their wake? The latest evidence is exciting: Senior leaders in organizations using big data report satisfaction with the results.

                                          Recent research from Accenture Analytics reveals that 59 percent of executives in companies using big data now regard big data as 'extremely important' to their organizations, while a further 34 percent describe it as 'important.'

                                          They are right to prioritize big data: Nine in 10 of the executives surveyed - mainly chief information officers, chief operating officers, chief data officers, chief analytics officers, chief marketing officers, and chief financial officers - said they are happy with the business outcomes..."

                                          8 Big Trends in Big Data Analytics
                                          ComputerWorld, October 23rd, 2014
                                          "Bill Loconzolo, vice president of data engineering at Intuit, jumped into a data lake with both feet. Dean Abbott, chief data scientist at Smarter Remarketer, made a beeline for the cloud. The leading edge of big data and analytics, which includes data lakes for holding vast stores of data in its native format and, of course, cloud computing, is a moving target, both say. And while the technology options are far from mature, waiting simply isn't an option..."
                                          Keys to Avoiding Pitfalls on Analytical Models: Testing, Relevancy
                                          SearchBusinessAnalytics, October 23rd, 2014
                                          "Predictive modeling can lead to some pretty bad insights when done poorly, but overcoming some common issues can help users sidestep problems on predictive analytics projects.

                                          Predictive modeling can be a powerful tool to help businesses see problems and opportunities that are coming their way, but when done poorly, it can lead them down a path of error and uncertainty. Understanding where the pitfalls lie is a must for getting the most out of your analytical models..."

                                          IT - Mobile
                                          Hidden Camera Fingerprints Link Photos to Individuals
                                          ZDNet, October 22nd, 2014
                                          "Your camera's digital sensor has a unique fingerprint. Due to minute manufacturing variations across millions of pixels, some pixels are consistently "hotter" or "cooler" than intended.

                                          Signal processing algorithms can extract this unique Sensor Pattern Noise (SPN). Since each sensor is slightly different, the SPN is also different - and unique - a fact that has been known for almost ten years.

                                          Recently researchers in Europe - see their paper On the usage of Sensor Pattern Noise for Picture-to-Identity linking through social network accounts - took the next logical step in our social media-mad culture: exploiting SPN fingerprints to see if they could link social network accounts to specific cameras.

                                            Can a Phone Replace Your Wallet?
                                            CNET, October 20th, 2014
                                            "It's undeniable -- Apple Pay will be the thing that finally makes mobile payments go mainstream. But it's not the only option. Google and PayPal are also major players, but if their real-world success rates to date are any indication of Apple Pay's reception, it's best we keep a tight grip on those leather wallets.

                                            To better understand the mobile payments landscape, I did something most smartphone owners have yet to do: buy things at brick-and-mortar stores using a phone..."

                                            Skip the Hub; Your Mobile Device is Your IoT Gateway
                                            InfoWorld, October 21st, 2014
                                            "It's the new gold rush: the Internet of things, particularly the home automation segment. You have to watch out for fool's gold, bandits, price gougers, and bad stakes -- whether you're a user, provider, or developer.

                                            Perhaps the biggest danger is that of the common platform. At this week's GigaOm Structure conference, a lot of those dangers are on display as vendors jockey for attention. Dozens of vendors are proposing "smart" home-automation hubs that promise to be your one-stop shop for controlling your thermostat, lights, door locks, windows shades, intercoms, monitoring cameras, security systems, and more..."

                                            Top Ten Articles for last few Issues
                                            Vol 200 Issues 1, 2 and 3; Vol 199 Issues 1, 2,3 and 4; Vol 198 Issues 4 and 5;
                                            We track how frequently each article is viewed on the web site to determine which the readers consider the most important. For last week, the top 10 articles were:

                                            • Oracle Solaris 11 Advanced Administration Cookbook
                                            • Java SE 8 Update 25 and Java SE 7 Update 71 and 72
                                            • SPARC and Solaris Leadership in Security
                                            • The magic of ksplice
                                            • ESG Recap of Oracle OpenWorld 2014
                                            • Oracle Enterprise Manager: The Secret Sauce in Oracle's Hybrid Cloud Strategy
                                            • Virtual Compute Appliance Software Release 2.0.1
                                            • WebSphere Application Server Excels on SPARC T5
                                            • Creating and Managing Network Domains
                                            • Deliver and Deploy Applications Faster

                                            The longer version of this article has list of top ten articles for the last 8 weeks.

                                              IT - Encryption
                                              Why Outlawing Encryption is Wrong
                                              Information Week, October 22nd, 2014
                                              "Putting data encryption solely into the hands of government employees won't prevent bad things from happening -- and it might encourage wrongdoing.

                                              In a chilling move toward an all-knowing police state, FBI Director James Comey is making the news rounds to equate data encryption with letting child pornographers, kidnappers, and terrorists roam unchecked. The assertion: Law enforcement will have no tools to catch bad guys if encryption works as designed. So all of a sudden other advances in law enforcement technology are trumped? Let's get real..."

                                              FBI Again Claims it's Going Dark Thanks to Encryption
                                              Network World, October 20th, 2014
                                              "Unless we find the right 'balance' of security and liberty (privacy), and stop being so 'mistrustful of the government and law enforcement,' then FBI Director James Comey said widespread adoption of encryption will mean the U.S. is no longer 'a country governed by the rule of law'..."
                                              10 ways to help users move from Microsoft Office to LibreOffice
                                              Make a smooth transition from Microsoft Office to LibreOffice. These tips will help you iron out the wrinkles.
                                              Jack Wallen writes, "it's coming -- that day when you decide the path of least resistance no longer runs through Microsoft. When that happens, you'll be seeking out alternative solutions for your business to get work done. One such solution is the LibreOffice suite.

                                              Even though LibreOffice provides everything you need, there is one issue you'll have to get around: migration from Microsoft Office. As anyone in tech will tell you, end users fear and hate change. No one wants to have to jump ship mid-job and learn something new. That downtime could be costly (not just to employee efficiency, but to the bottom line). So how do you make the migration easier? I have 10 tips to help you out. Let's see if one or two won't motivate you to kick off that looming migration..."

                                              Nexenta News
                                              Nexenta CFO to Participate in EY Webcast
                                              What Every CFO Needs to Know about Digital
                                              Nexenta announced that Nexenta Chief Financial Officer, Rick Martig, will be a panelist for EY's 'CFO: need to know-Digital' webcast (@EY_Webcasts) on Friday, October 24th at 9am PT/12pm ET.

                                              During the EY webcast, panelists will explore the meaning of 'digital', highlight common challenges that CFOs face in today's rapidly evolving digital landscape and discuss six keys for successful digital transformation from the perspective of a CFO. With over two decades of experience in the high-tech industry, Mr. Martig will bring to the table his unique insights and share his strategies for adapting in an ever-changing digital environment.

                                              EY's 'CFO: need to know-Digital' webcast will take place live from San Francisco at 9:00 AM PT and from New York at 12:00 PM ET on October 24, 2014.

                                              Nexenta Continues its Asia Expansion with SuperCloud and Cloud Valley
                                              Brings Software-Defined Storage to China

                                              Nexenta announced a partnership with Beijing-based server manufacturer SuperCloud.

                                              SuperCloud is a joint venture between the Beijing government and Cloud Valley. The company is one of the innovative companies working within the auspices of Cloud Valley. Cloud Valley was founded by noted Chinese Internet entrepreneur Edward Tian, and is now home to nearly twenty companies focusing on cloud computing hardware, software and services.

                                              As a result of this partnership, Nexenta's award-winning Software-Defined Storage software is now approved to work impeccably with server hardware from SuperCloud. Chinese companies are now able to benefit from a combined hardware-software solution that is both more advanced and more economical than those offered by legacy storage companies..

                                              Nexenta Honored with Four Awards at 2014 Golden Bridge Awards
                                              Recipient of 2014 Grand Pillar Award for its overall leadership in product innovations
                                              Nexenta has earned multiple honors with the 2014 Golden Bridge Awards. Nexenta was the recipient of the prestigious 2014 Grand Pillar Award for its overall leadership in product innovations. In addition, NexentaStor won Gold for Storage Software Innovation, and two Silver medals in the following categories: Backup, Archive, Recovery and Data Center Innovations.

                                              NexentaStor, Nexenta's flagship Software-Defined Storage (SDS) platform, brings the economic benefits of SDS to high performance, low latency all flash block and file shared storage configurations. For IT executives and storage administrators who have been grappling with new demands on high performance, enterprise-class storage environments, NexentaStor delivers unified file and block storage services, runs on industry standard hardware, scales from tens of terabytes to petabyte configurations, and includes all data management functionality by default.

                                              Nexenta Software-Defined Storage and HGST All-Flash Solutions
                                              Will Increase Performance and Reliability for Global Social Media Analytics Company
                                              Nexenta announced it has collaborated with HGST (@HGSTStorage), a Western Digital Company (NASDAQ: WDC), to create an all-flash storage solution for Tracx,(@Tracx) a global provider of next generation social media platforms for the enterprise.

                                              Established in 2010, Tracx provides an end-to-end solution that enables customers to manage their entire social media presence intelligently. With 100% year-on-year growth, Tracx's next generation social media management solutions (SMMS) are quickly gaining momentum with operations in the US, Europe, Australia, Brazil, Argentina, South Africa, and Israel.

                                              Like many organizations where data is essential to operations, Tracx needed an extremely high performance storage solution that delivers 100% reliability for the mission critical database that runs the real-time analytical section of its social media platform.

                                              A closer look at Nexenta Connect for VSAN
                                              by Cormac Hogan
                                              One of VMware's premier bloggers, Cormac Hogan, spent some time with Gjisbert and Michael Letschin at VMworld and he has just published a blog with his thoughts on how Nexenta helps improve VMware VSAN.

                                              "Whilst at VMworld 2014, I had the opportunity to catch up with the Nexenta team who have been working on a very interesting project with VMware's Virtual SAN (VSAN). The Nexenta Connect for VSAN product, running on top of VSAN, is designed to provide file services, which allows VSAN to not only store your virtual machines, but also to provide SMB and NFS shares for those virtual machines. I caught up with Michael Letschin and Gijsbert Janssen van Doorn of the Nexenta team to learn more and get a tech preview of the product..."

                                              Nexenta CEO to Deliver Keynote at NASSCOM Product Conclave 2014
                                              Nexenta Chairman and CEO, Tarkan Maner
                                              Nexenta announced that Nexenta Chairman and CEO, Tarkan Maner, will be a keynote speaker at the NASSCOM Product Conclave-2014 (@ProductConclave, #NPC2014).

                                              The NASSCOM Product Conclave-2014 brings together emerging and seasoned entrepreneurs for a 3 day conference in Bangalore, India. Over the course of the event, professionals will explore the keys to growth and innovation in today's rapidly evolving landscape. During his keynote, Mr. Maner will offer his unique perspective gained through years of experience as an entrepreneur and industry leader. He'll discuss "How to Build a Billion Dollar Company" with real-world examples, challenges and successes from his previous company, Wyse Technology, which was acquired by Dell in 2012. Additionally, he will share how Nexenta is revolutionizing the data center with its Software-Defined Storage solutions.

                                              The conference will also feature presentations from Tesla Motors CIO Jay Vijayan, Accenture Software Managing Director and President Michael Detwiler, LinkedIn VP of Product Management Michael Korcuska, Nutanix Founder and CEO Dheeraj Pandey, and several other industry leaders.

                                              The Nasscom 'Product Conclave- 2014' will take place October 29-31, 2014 at The Vivanta by Taj hotel in Bangalore.

                                              • Keynote Speaker: Tarkan Maner
                                              • Topic: "How to Build a Billion Dollar Company"
                                              • Venue: The Vivanta by Taj, 2275 Tumkur Rd, Bangalore, 560022, Karataka
                                              • Date/Time: October 31, 2014 at 9 am IST

                                              Hosted by: NASSCOM

                                              Level3 News
                                              Pump Up Security Awareness and Involvement
                                              October is National Cyber Security Awareness Month
                                              What's the most important step in your cyber security plan?

                                              • Setting up your firewalls?
                                              • Implementing strong identity management for your applications?
                                              • Ensuring your network is secure?

                                              All of these are very important steps, but take a look at the big picture. The most important step is AWARENESS.

                                              In every business, we fight a constant battle against complacency. Employees, clients, and partners get caught up in the day-to-day activities of business, and it's all too easy to let security concerns slip. We bypass the process of changing passwords frequently. Or we use a really easy password so we don't forget it. We click on email attachments before we realize that they came from someone we didn't know. We respond to requests for information that may not be legitimate.

                                              We might know better, but it's just too easy to make a mistake that lets the bad guys in.

                                              Fortunately, October is National Cyber Security Awareness Month, so it's a great time to refresh your security education program and messages. Here are a few steps the National Cyber Security Alliance recommends for increasing security awareness in your organization...

                                              Trending in
                                              Vol 235, Issue 2
                                              Trending IT Articles